SlideShare una empresa de Scribd logo
1 de 38
Parent Presentation



                                      Marian Merritt,
                      Norton Internet Safety Advocate
Today’s Digital Native (born in 1990’s or later)
• Our children have never stood up to change a TV channel
• Internet always existed
• They don’t go “online”; they are always connected
• Definitions of privacy getting tweaked
• They expect devices to just turn on, connect and work
• They are more collaborative, get help from social networks, not just a
  web search or in a book
• By age 21, will have sent an average of 250,000 emails, instant
  messages and texts
• By age 21, more than 10,000 hours on their cell phone
• By age 21, more than 14,500 hours online, mostly in social networks
Tonight’s discussion
• Typical top concerns among parents
• Parental controls
• Social networks
• Cell phones
• Viruses and Malware
• Cyberbullying and more
• Currently over 750 million users on Facebook
• Consumer Reports estimates 7.5 million U.S. users on Facebook
  are under 13 years old
• Norton study found 77% of households around the world use
  household internet rules
• 32% of households use parental controls
Typical parental concerns
• How to limit video sites
• Should I report cyber bullying to the school?
• What parental control software do I recommend?
• Can I stop my child using mobile devices to browse or at night?
• Using filters, especially on mobile devices
• Blocking purchases of apps
• Keeping kids off of inappropriate sites or searching for things
  they shouldn’t
• Social drama created because so many kids <13 are on social
  networks
User Accounts
• Easiest way to limit what kids do; and prevent
  malware getting on computer
 – Create standard (limited) accounts for you and your
   kids to use
   •If you want to track what your kids do, create one
    account for each child
 – Administrator account for when you need to do
   maintenance or add or remove software, hardware,
   etc.
Blocking or Filtering YouTube videos




 •Create account and login




  •Bottom of screen you see option for Safety to be set “ON” or “OFF”
Another way to monitor/block– use parental controls
such as Norton Online Family (seen here)




                     Screenshot from Norton Online Family
Cell phone smarts for younger children
• Get limited phones: no apps, no web, to start
• Talk with your child about safe cell use
• Set a password on phone - can stop “Munching” – when an
  image or message is sent out via BBM to wide group
  (cyberbullying ) and stop kids looking at private messages or
  photos
• Charge phone in the kitchen or other public room at night
  – Keeps kids from texting late at night; They get more sleep
• Use time limits to stop calls and texting after hours (via cell
  provider site)
• There are mean, inappropriate apps and games. Monitor what
  is installed and uninstalled.
(Image courtesy of IkeepSafe.org)
Can you block devices after hours?
• Computers – yes, with parental controls or at router
• Mobile devices:
  – Music players with web access
  – Smart phones
  – Tablets
  – Gaming systems
• At the router level you can block and filter web
• Some parents just turn off the house router at night and/or take
  it into their bedroom
Everything can be more secure and more private
• Social networks – you can limit account access, require more
  secure pages, limit who can see your page, your posts and
  photos.
  – Visit your account security and privacy settings to learn more
• Don’t share your user name and password with others
• Logout from computers when you are done
• Protect mobile devices with passwords
• Protect laptops and mobile devices with anti-theft software
  – Track their location
  – Wipe the data
  – Help police with photos and location info
Passwords
• Unique, complex, try a code that can be customized
  – “I Went to Spain in 2010” > Iw2Si10
  – For Amazon, add an “a” and an “n”> aiw2Si10n
  – For ESPN, add an “e” and an “n”>eiw2Si10n


• Not a dictionary word or name
• Not a phrase
• Nothing a good friend might guess (like an address, pet’s
  name, birthday, nickname)
• Most important passwords are for email and social network


• NEVER SHARE A PASSWORD! Not with a
  spouse, partner, roommate, BFF, or from one website to another.

                                                                    13
Online Reputation and Privacy



                                14
Other Private information
• Social network posts
  – Reveal location,
  – Travel plans,
  – Just embarrassing




• More common, posting information about ourselves we later
  regret
  – “Bored at work” – girl posted while at a UK job and was later fired
  – Posting photos of underage drinking – lost college scholarships; school
    teacher lost job;
Reputation and Privacy Risks

•   “Digital Reputation” -
    everything you put on the
    internet is permanent
•   It can be difficult to
    maintain control over even
    your own content




                                 16
Real story of Alison Chang of Dallas, TX

                            http://www.nytimes.com/2007/10/01/techno
                            logy/01link.html



Photo taken at church BBQ   Posted to    Ends up on Australian bus ad
Real story of Smith family of St. Louis, MO

 They take a lovely Christmas card        That turns up as a Czech grocery
 photo                                    ad!




                     http://www.npr.org/templates/story/story.ph
                     p?storyId=105318456

                                                                             18
Using Social Networks appropriately                           Privacy
                                                           settings’ use
• Use privacy settings and safety settings                is higher than
• Use unique password and don’t share it                       ever!
• Log out when you are done
  – “frape” – term used to describe having your Facebook hacked by a friend
• 1 in 10 social network accounts is hacked (Norton study)
• Users can temporarily de-activate their account
• FBParents.org has a free guide to using Facebook safely
Pew study of Facebook Users and Privacy Settings




http://www.pewinternet.org/~/media/Files/Reports/2012/PIP_Privacy_manag
ement_on_social_media_sites_022412.pdf
Pew Study: Teens versus Adults
Helping Kids Use Email Safely
Email Issues
• Training wheels first (parents should review emails for trouble)
• Filter/block spam and unwanted senders
• Spam
• Viruses/Malware
• Dangerous links/scams
• Kids being mean to each other
What is Spam?

•Unwanted emails
•Up to 80% of the world’s email is spam
•Some is dangerous:
   •Chain letters with virus or mail hoaxes
   •links to websites with malware
   •attachments that have viruses in them
   •Phishing emails – offers that are dangerous or fake
Spam examples
Avoiding Spam and Staying Safe
• Never click unknown links or reply to these emails
• Check sender’s email or web address. Look at the part that is
  “.com” or “.gov”. Whatever is just to the left is the website.
• i.e. onlinefamily.norton.com = a norton website
• Never respond to “urgent” or “emergency” emails
• Never give out your private information like passwords, account
  number, social security numbers, etc.
• Just because it looks legit, or has the right logos doesn’t mean it
  is
• When in doubt, visit the website and login as normal to see if
  your account needs attention
Avoiding Viruses and Malware
⅔ OF ADULTS
GLOBALLY HAVE BEEN
VICTIMS OF CYBERCRIME
Only 1 in 10 people feel “very safe” online



                                              28
Old school view of a virus writer as harmless nerd
   and a virus as more annoyance than threat




                                                     29
How Do Computers Get Infected

•   Dangerous downloads
•   Clicking on ads, links
•   Visiting infected websites
•   Buying into “security” alerts
    & scare tactics by
    unknown companies




                                    30
How Do Computers Get Infected

•   Peer-to-peer file sharing networks
•  Through “holes” left by web browser
   vulnerabilities
• Poisoned search results




                                         31
Spotting Virus or Malware Infection
• Your computer might run more slowly or have trouble starting
• Some programs might not start, especially your security
  software
• You might see flickering hard drive light when you aren’t using
  computer
• When you look at your computer’s list of programs you might
  spot odd listings
• OFTEN YOU CAN’T EVEN TELL!!!
• Best bet: run security software at all times, regularly scan the
  computer and let your parents know if something weird
  happens when you are online.
YOU, YOUR FRIENDS AND
CYBERBULLYING.


                        33
Cyberbullying is serious and mean

•   Electronic harassment,
    teasing, cruelty, usually
                                                   Megan
    repetitive                                     Meier
•   Email, digital phones, cell
    phones, instant messaging,
                                  Phoebe Prince
    and texting
•   Only 10% of kids report
•   Many who report to
                                                    Tyler
    school staff say it made                      Clementi
    matters worse
                                                             34
Tips for Dealing with Cyberbullying
Talk about it   Set rules          Don’t reply,     Don’t let
before          and                Keep copies      bystander off
it happens      consequences                        the hook


Most kids don’t cyberbully!
• Work together as a community
• If you see cyberbullying, don’t be a silent bystander. Do
  something!
• Involve the school, (law enforcement if necessary)
• Don’t dismiss threats of violence or self-harm: report!
• Teach kids coping mechanisms when there’s “drama”.


                                                                    35
Cyber bullying Resources
• From the US Government: stopbullying.gov
• From top researchers: cyberbullying.us
• ADL has CyberAlly: a whole school education program
• CommonSenseMedia.org
• IkeepSafe.org
• Review your school’s bullying policy (include cyber bullying)
Review and Wrapping up
• Key parent issues
• Video site management
• User Accounts
• Using Phones, Email, Social Networks
• Passwords
• Privacy and reputation issues
• Spam and Malware
• Cyber bullying
Free Resources from Norton



   •Family Online Safety Guide, in English and Spanish –
   email me at marian@norton.com for free copies

   •Norton Online Family –
   parental control software for PC, Mac and Android
   www.onlinefamily.norton.com

Más contenido relacionado

La actualidad más candente

Cyber safety
Cyber safetyCyber safety
Cyber safetyYash Jain
 
Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint bgmartinez1971
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety PresentationPamela Moeai
 
Internet do's and don'ts. Kids safety on the Internet
Internet do's and don'ts. Kids safety on the Internet Internet do's and don'ts. Kids safety on the Internet
Internet do's and don'ts. Kids safety on the Internet Queens Library
 
Power Point Cyber-bullying
Power Point Cyber-bullyingPower Point Cyber-bullying
Power Point Cyber-bullyingbolan1jt
 
Kids cyber safety-talk - Being Safe online
Kids cyber safety-talk - Being Safe onlineKids cyber safety-talk - Being Safe online
Kids cyber safety-talk - Being Safe onlineIan Krieger
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber BullyingCoachElrod
 
Internet Safety Elementary
Internet Safety ElementaryInternet Safety Elementary
Internet Safety Elementaryjaimejoyh
 
Cyber bullying slide share
Cyber bullying slide shareCyber bullying slide share
Cyber bullying slide sharebr03wood
 
Internet safety tips for kids and teens
Internet safety tips for kids and teensInternet safety tips for kids and teens
Internet safety tips for kids and teensSearchLock
 
Social Media Safety Presentation
Social Media Safety PresentationSocial Media Safety Presentation
Social Media Safety PresentationLJ Henshell
 
Cyber security for kids
Cyber security for kidsCyber security for kids
Cyber security for kidsChris Burrows
 
Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying caitlynx48
 
Internet safety presentation for parents 2018
Internet safety presentation for parents 2018Internet safety presentation for parents 2018
Internet safety presentation for parents 2018KanelandSvihlik
 
Social Media and Children
Social Media and ChildrenSocial Media and Children
Social Media and ChildrenAdeKoh123
 

La actualidad más candente (20)

Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Internet / Cyber Security
Internet / Cyber SecurityInternet / Cyber Security
Internet / Cyber Security
 
What is Cyberbullying?
What is Cyberbullying?What is Cyberbullying?
What is Cyberbullying?
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
 
Internet do's and don'ts. Kids safety on the Internet
Internet do's and don'ts. Kids safety on the Internet Internet do's and don'ts. Kids safety on the Internet
Internet do's and don'ts. Kids safety on the Internet
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Power Point Cyber-bullying
Power Point Cyber-bullyingPower Point Cyber-bullying
Power Point Cyber-bullying
 
Kids cyber safety-talk - Being Safe online
Kids cyber safety-talk - Being Safe onlineKids cyber safety-talk - Being Safe online
Kids cyber safety-talk - Being Safe online
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyber safety tips
Cyber safety tipsCyber safety tips
Cyber safety tips
 
Internet Safety Elementary
Internet Safety ElementaryInternet Safety Elementary
Internet Safety Elementary
 
Cyber bullying slide share
Cyber bullying slide shareCyber bullying slide share
Cyber bullying slide share
 
Internet safety tips for kids and teens
Internet safety tips for kids and teensInternet safety tips for kids and teens
Internet safety tips for kids and teens
 
Social Media Safety Presentation
Social Media Safety PresentationSocial Media Safety Presentation
Social Media Safety Presentation
 
Cyber security for kids
Cyber security for kidsCyber security for kids
Cyber security for kids
 
Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying
 
Internet safety presentation for parents 2018
Internet safety presentation for parents 2018Internet safety presentation for parents 2018
Internet safety presentation for parents 2018
 
Social Media and Children
Social Media and ChildrenSocial Media and Children
Social Media and Children
 

Destacado

Kids project danger snakes
Kids project danger snakesKids project danger snakes
Kids project danger snakesdipika k
 
School Assembly Quiz (Grade wise)
School Assembly Quiz (Grade wise)School Assembly Quiz (Grade wise)
School Assembly Quiz (Grade wise)jayanthbalaji2012
 
Assembly powerpoint
Assembly powerpointAssembly powerpoint
Assembly powerpointshirleyclubb
 
School Assembly Presentation
School Assembly PresentationSchool Assembly Presentation
School Assembly PresentationBex Lewis
 
Alcohol & drinking presentation
Alcohol & drinking presentationAlcohol & drinking presentation
Alcohol & drinking presentationCTecson
 

Destacado (7)

Kids project danger snakes
Kids project danger snakesKids project danger snakes
Kids project danger snakes
 
School Assembly Quiz (Grade wise)
School Assembly Quiz (Grade wise)School Assembly Quiz (Grade wise)
School Assembly Quiz (Grade wise)
 
Assembly powerpoint
Assembly powerpointAssembly powerpoint
Assembly powerpoint
 
Safe unsafe-touch
Safe unsafe-touchSafe unsafe-touch
Safe unsafe-touch
 
Safetyville Stranger Danger
Safetyville Stranger DangerSafetyville Stranger Danger
Safetyville Stranger Danger
 
School Assembly Presentation
School Assembly PresentationSchool Assembly Presentation
School Assembly Presentation
 
Alcohol & drinking presentation
Alcohol & drinking presentationAlcohol & drinking presentation
Alcohol & drinking presentation
 

Similar a Internet Safety Presentation for Parents

8th grade presentation for slideshare
8th grade presentation for slideshare8th grade presentation for slideshare
8th grade presentation for slideshareMarian Merritt
 
How safe are our children
How safe are our childrenHow safe are our children
How safe are our childrenstevewrightco
 
How safe are our children
How safe are our childrenHow safe are our children
How safe are our childrenstevewrightco
 
How safe are our children
How safe are our childrenHow safe are our children
How safe are our childrenstevewrightco
 
Managing Technology in the Home
Managing Technology in the HomeManaging Technology in the Home
Managing Technology in the HomeScott Burnett
 
Digital parenting seminars
Digital parenting seminarsDigital parenting seminars
Digital parenting seminarsEmmanuel Arthur
 
Digital parenting seminars
Digital parenting seminarsDigital parenting seminars
Digital parenting seminarsEmmanuel Arthur
 
Internet safety update
Internet safety updateInternet safety update
Internet safety update14071828
 
Safely Traveling the Web 2015
Safely Traveling the Web 2015Safely Traveling the Web 2015
Safely Traveling the Web 2015Staci Trekles
 
Internetsafety
InternetsafetyInternetsafety
Internetsafetydanriles
 
Cyber Awareness.pptx
Cyber Awareness.pptxCyber Awareness.pptx
Cyber Awareness.pptxadblue2017
 
Digital footprints & criminal investigations
Digital footprints & criminal investigationsDigital footprints & criminal investigations
Digital footprints & criminal investigationsCreepSquash
 
The Digital Footprint: An Understanding of What It Means for Kids and Criminals
The Digital Footprint: An Understanding of What It Means for Kids and CriminalsThe Digital Footprint: An Understanding of What It Means for Kids and Criminals
The Digital Footprint: An Understanding of What It Means for Kids and CriminalsCreepSquash
 
CH e-safety presentation
CH e-safety presentationCH e-safety presentation
CH e-safety presentationQEwebAdmin
 
Family Online Safety: Truth and Consequences
Family Online Safety: Truth and ConsequencesFamily Online Safety: Truth and Consequences
Family Online Safety: Truth and ConsequencesMarian Merritt
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for ParentsScott Burnett
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for ParentsScott Burnett
 

Similar a Internet Safety Presentation for Parents (20)

8th grade presentation for slideshare
8th grade presentation for slideshare8th grade presentation for slideshare
8th grade presentation for slideshare
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 
How safe are our children
How safe are our childrenHow safe are our children
How safe are our children
 
How safe are our children
How safe are our childrenHow safe are our children
How safe are our children
 
How safe are our children
How safe are our childrenHow safe are our children
How safe are our children
 
Managing Technology in the Home
Managing Technology in the HomeManaging Technology in the Home
Managing Technology in the Home
 
Digital parenting seminars
Digital parenting seminarsDigital parenting seminars
Digital parenting seminars
 
Digital parenting seminars
Digital parenting seminarsDigital parenting seminars
Digital parenting seminars
 
Internet safety update
Internet safety updateInternet safety update
Internet safety update
 
Safely Traveling the Web 2015
Safely Traveling the Web 2015Safely Traveling the Web 2015
Safely Traveling the Web 2015
 
Internetsafety
InternetsafetyInternetsafety
Internetsafety
 
Cyber Awareness.pptx
Cyber Awareness.pptxCyber Awareness.pptx
Cyber Awareness.pptx
 
Digital footprints & criminal investigations
Digital footprints & criminal investigationsDigital footprints & criminal investigations
Digital footprints & criminal investigations
 
The Digital Footprint: An Understanding of What It Means for Kids and Criminals
The Digital Footprint: An Understanding of What It Means for Kids and CriminalsThe Digital Footprint: An Understanding of What It Means for Kids and Criminals
The Digital Footprint: An Understanding of What It Means for Kids and Criminals
 
CH e-safety presentation
CH e-safety presentationCH e-safety presentation
CH e-safety presentation
 
Family Online Safety: Truth and Consequences
Family Online Safety: Truth and ConsequencesFamily Online Safety: Truth and Consequences
Family Online Safety: Truth and Consequences
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 
2.InternetSafety.ppt
2.InternetSafety.ppt2.InternetSafety.ppt
2.InternetSafety.ppt
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 

Más de Marian Merritt

Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital AgeMarian Merritt
 
Internet Safety: Social, Mobile, Messy
Internet Safety: Social, Mobile, MessyInternet Safety: Social, Mobile, Messy
Internet Safety: Social, Mobile, MessyMarian Merritt
 
The Norton Report 2013
The Norton Report 2013The Norton Report 2013
The Norton Report 2013Marian Merritt
 
Cyberbullying by Marian Merritt, Norton Internet Safety Advocate
Cyberbullying by Marian Merritt, Norton Internet Safety AdvocateCyberbullying by Marian Merritt, Norton Internet Safety Advocate
Cyberbullying by Marian Merritt, Norton Internet Safety AdvocateMarian Merritt
 
Internet Security: Protect the Personal; Defend the Workplace
Internet Security: Protect the Personal; Defend the WorkplaceInternet Security: Protect the Personal; Defend the Workplace
Internet Security: Protect the Personal; Defend the WorkplaceMarian Merritt
 
2012 norton cybercrime report
2012 norton cybercrime report2012 norton cybercrime report
2012 norton cybercrime reportMarian Merritt
 
Let me in! 10 tips to better passwords
Let me in! 10 tips to better passwordsLet me in! 10 tips to better passwords
Let me in! 10 tips to better passwordsMarian Merritt
 
12 tips for cell phone safety for kids
12 tips for cell phone safety for kids12 tips for cell phone safety for kids
12 tips for cell phone safety for kidsMarian Merritt
 

Más de Marian Merritt (9)

Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital Age
 
Internet Safety: Social, Mobile, Messy
Internet Safety: Social, Mobile, MessyInternet Safety: Social, Mobile, Messy
Internet Safety: Social, Mobile, Messy
 
The Norton Report 2013
The Norton Report 2013The Norton Report 2013
The Norton Report 2013
 
Cyberbullying by Marian Merritt, Norton Internet Safety Advocate
Cyberbullying by Marian Merritt, Norton Internet Safety AdvocateCyberbullying by Marian Merritt, Norton Internet Safety Advocate
Cyberbullying by Marian Merritt, Norton Internet Safety Advocate
 
Internet Security: Protect the Personal; Defend the Workplace
Internet Security: Protect the Personal; Defend the WorkplaceInternet Security: Protect the Personal; Defend the Workplace
Internet Security: Protect the Personal; Defend the Workplace
 
2012 norton cybercrime report
2012 norton cybercrime report2012 norton cybercrime report
2012 norton cybercrime report
 
Let me in! 10 tips to better passwords
Let me in! 10 tips to better passwordsLet me in! 10 tips to better passwords
Let me in! 10 tips to better passwords
 
12 tips for cell phone safety for kids
12 tips for cell phone safety for kids12 tips for cell phone safety for kids
12 tips for cell phone safety for kids
 
School presentation
School presentationSchool presentation
School presentation
 

Último

TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 

Último (20)

TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 

Internet Safety Presentation for Parents

  • 1. Parent Presentation Marian Merritt, Norton Internet Safety Advocate
  • 2. Today’s Digital Native (born in 1990’s or later) • Our children have never stood up to change a TV channel • Internet always existed • They don’t go “online”; they are always connected • Definitions of privacy getting tweaked • They expect devices to just turn on, connect and work • They are more collaborative, get help from social networks, not just a web search or in a book • By age 21, will have sent an average of 250,000 emails, instant messages and texts • By age 21, more than 10,000 hours on their cell phone • By age 21, more than 14,500 hours online, mostly in social networks
  • 3. Tonight’s discussion • Typical top concerns among parents • Parental controls • Social networks • Cell phones • Viruses and Malware • Cyberbullying and more
  • 4. • Currently over 750 million users on Facebook • Consumer Reports estimates 7.5 million U.S. users on Facebook are under 13 years old • Norton study found 77% of households around the world use household internet rules • 32% of households use parental controls
  • 5. Typical parental concerns • How to limit video sites • Should I report cyber bullying to the school? • What parental control software do I recommend? • Can I stop my child using mobile devices to browse or at night? • Using filters, especially on mobile devices • Blocking purchases of apps • Keeping kids off of inappropriate sites or searching for things they shouldn’t • Social drama created because so many kids <13 are on social networks
  • 6. User Accounts • Easiest way to limit what kids do; and prevent malware getting on computer – Create standard (limited) accounts for you and your kids to use •If you want to track what your kids do, create one account for each child – Administrator account for when you need to do maintenance or add or remove software, hardware, etc.
  • 7. Blocking or Filtering YouTube videos •Create account and login •Bottom of screen you see option for Safety to be set “ON” or “OFF”
  • 8. Another way to monitor/block– use parental controls such as Norton Online Family (seen here) Screenshot from Norton Online Family
  • 9. Cell phone smarts for younger children • Get limited phones: no apps, no web, to start • Talk with your child about safe cell use • Set a password on phone - can stop “Munching” – when an image or message is sent out via BBM to wide group (cyberbullying ) and stop kids looking at private messages or photos • Charge phone in the kitchen or other public room at night – Keeps kids from texting late at night; They get more sleep • Use time limits to stop calls and texting after hours (via cell provider site) • There are mean, inappropriate apps and games. Monitor what is installed and uninstalled.
  • 10. (Image courtesy of IkeepSafe.org)
  • 11. Can you block devices after hours? • Computers – yes, with parental controls or at router • Mobile devices: – Music players with web access – Smart phones – Tablets – Gaming systems • At the router level you can block and filter web • Some parents just turn off the house router at night and/or take it into their bedroom
  • 12. Everything can be more secure and more private • Social networks – you can limit account access, require more secure pages, limit who can see your page, your posts and photos. – Visit your account security and privacy settings to learn more • Don’t share your user name and password with others • Logout from computers when you are done • Protect mobile devices with passwords • Protect laptops and mobile devices with anti-theft software – Track their location – Wipe the data – Help police with photos and location info
  • 13. Passwords • Unique, complex, try a code that can be customized – “I Went to Spain in 2010” > Iw2Si10 – For Amazon, add an “a” and an “n”> aiw2Si10n – For ESPN, add an “e” and an “n”>eiw2Si10n • Not a dictionary word or name • Not a phrase • Nothing a good friend might guess (like an address, pet’s name, birthday, nickname) • Most important passwords are for email and social network • NEVER SHARE A PASSWORD! Not with a spouse, partner, roommate, BFF, or from one website to another. 13
  • 14. Online Reputation and Privacy 14
  • 15. Other Private information • Social network posts – Reveal location, – Travel plans, – Just embarrassing • More common, posting information about ourselves we later regret – “Bored at work” – girl posted while at a UK job and was later fired – Posting photos of underage drinking – lost college scholarships; school teacher lost job;
  • 16. Reputation and Privacy Risks • “Digital Reputation” - everything you put on the internet is permanent • It can be difficult to maintain control over even your own content 16
  • 17. Real story of Alison Chang of Dallas, TX http://www.nytimes.com/2007/10/01/techno logy/01link.html Photo taken at church BBQ Posted to Ends up on Australian bus ad
  • 18. Real story of Smith family of St. Louis, MO They take a lovely Christmas card That turns up as a Czech grocery photo ad! http://www.npr.org/templates/story/story.ph p?storyId=105318456 18
  • 19. Using Social Networks appropriately Privacy settings’ use • Use privacy settings and safety settings is higher than • Use unique password and don’t share it ever! • Log out when you are done – “frape” – term used to describe having your Facebook hacked by a friend • 1 in 10 social network accounts is hacked (Norton study) • Users can temporarily de-activate their account • FBParents.org has a free guide to using Facebook safely
  • 20. Pew study of Facebook Users and Privacy Settings http://www.pewinternet.org/~/media/Files/Reports/2012/PIP_Privacy_manag ement_on_social_media_sites_022412.pdf
  • 21. Pew Study: Teens versus Adults
  • 22. Helping Kids Use Email Safely
  • 23. Email Issues • Training wheels first (parents should review emails for trouble) • Filter/block spam and unwanted senders • Spam • Viruses/Malware • Dangerous links/scams • Kids being mean to each other
  • 24. What is Spam? •Unwanted emails •Up to 80% of the world’s email is spam •Some is dangerous: •Chain letters with virus or mail hoaxes •links to websites with malware •attachments that have viruses in them •Phishing emails – offers that are dangerous or fake
  • 26. Avoiding Spam and Staying Safe • Never click unknown links or reply to these emails • Check sender’s email or web address. Look at the part that is “.com” or “.gov”. Whatever is just to the left is the website. • i.e. onlinefamily.norton.com = a norton website • Never respond to “urgent” or “emergency” emails • Never give out your private information like passwords, account number, social security numbers, etc. • Just because it looks legit, or has the right logos doesn’t mean it is • When in doubt, visit the website and login as normal to see if your account needs attention
  • 28. ⅔ OF ADULTS GLOBALLY HAVE BEEN VICTIMS OF CYBERCRIME Only 1 in 10 people feel “very safe” online 28
  • 29. Old school view of a virus writer as harmless nerd and a virus as more annoyance than threat 29
  • 30. How Do Computers Get Infected • Dangerous downloads • Clicking on ads, links • Visiting infected websites • Buying into “security” alerts & scare tactics by unknown companies 30
  • 31. How Do Computers Get Infected • Peer-to-peer file sharing networks • Through “holes” left by web browser vulnerabilities • Poisoned search results 31
  • 32. Spotting Virus or Malware Infection • Your computer might run more slowly or have trouble starting • Some programs might not start, especially your security software • You might see flickering hard drive light when you aren’t using computer • When you look at your computer’s list of programs you might spot odd listings • OFTEN YOU CAN’T EVEN TELL!!! • Best bet: run security software at all times, regularly scan the computer and let your parents know if something weird happens when you are online.
  • 33. YOU, YOUR FRIENDS AND CYBERBULLYING. 33
  • 34. Cyberbullying is serious and mean • Electronic harassment, teasing, cruelty, usually Megan repetitive Meier • Email, digital phones, cell phones, instant messaging, Phoebe Prince and texting • Only 10% of kids report • Many who report to Tyler school staff say it made Clementi matters worse 34
  • 35. Tips for Dealing with Cyberbullying Talk about it Set rules Don’t reply, Don’t let before and Keep copies bystander off it happens consequences the hook Most kids don’t cyberbully! • Work together as a community • If you see cyberbullying, don’t be a silent bystander. Do something! • Involve the school, (law enforcement if necessary) • Don’t dismiss threats of violence or self-harm: report! • Teach kids coping mechanisms when there’s “drama”. 35
  • 36. Cyber bullying Resources • From the US Government: stopbullying.gov • From top researchers: cyberbullying.us • ADL has CyberAlly: a whole school education program • CommonSenseMedia.org • IkeepSafe.org • Review your school’s bullying policy (include cyber bullying)
  • 37. Review and Wrapping up • Key parent issues • Video site management • User Accounts • Using Phones, Email, Social Networks • Passwords • Privacy and reputation issues • Spam and Malware • Cyber bullying
  • 38. Free Resources from Norton •Family Online Safety Guide, in English and Spanish – email me at marian@norton.com for free copies •Norton Online Family – parental control software for PC, Mac and Android www.onlinefamily.norton.com

Notas del editor

  1. From Gawker hack; 13 most common passwords used (of millions of accounts): 123456Password 12345678Lifehack Qwertyabc123111111MonkeyConsumer123450LetmeinTrustno1Most common Iphone passwords: 0000, 1234, 2580 (straight shot down keypad)Most important two passwords are your email and social network? Because with email I can hit “forgotmy password” at almost any account and get the code to reset yours. With your social network I can spread a scam to all your friends and make money or spread malware. Or just embarrass you by using your account and posting silly or embarassing stuff. Sharing – lots of girls will test their friendships by saying you’re not “BFF” until you share a FB password. Or boyfriend/girlfriends will post for each other or share an account, then whenthey break up it’s a disaster.
  2. So what about the dumb stuff we do to hurt ourselves online? Those are things that can damage our online reputation and privacy.