SlideShare a Scribd company logo
1 of 42
How to be a Tech-Smart
Parent
Barry Caplin
Chief Information Security Officer
Fairview Health Services
bcaplin1@fairview.org, bc@bjb.org
@bcaplin, +barrycaplin, *bcaplin
http://about.me/barrycaplin
http://securityandcoffee.blogspot.com
Slides at http://www.slideshare.net/bcaplin
Handouts at http://www.bjb.org/stuff/talks/

District 196 Parent Fair
Nov. 2, 2013
Interactive
• Please… ask questions!
• Please… answer questions!
Disclaimer
I‟m still figuring out this
Parenting thing also…
Digital Natives
So Much Tech… So Little Time!
Social Networks

Home computers
Cell phones and texting

Reputation Management
Your Home Computer
•
•
•
•
•
•
•
•

Research
Taxes
Shopping
Record keeping
Homework
Email
Social networking
Photos

•
•
•
•
•
•
•
•

Video
Work
Genealogy
Music
Games
News
TV
Movies…
What Can Go Wrong?
•
•
•
•
•
•
•
•

Viruses
Trojans
Worms
„Bots
Click-jacking
Spyware
Adware
“Drive-By” Downloads
How Your Computer Gets Sick
• Attachments
• Downloads
– Intentional
•Clicks
•URL shortening

– Unintentional - Website Visits/Drive-By
Attachments
•
•
•
•

File sent via email
Can execute when the file is opened
doc, xls, pdf, jpg (and other images), etc.
Even zip files can cause problems

• Only open expected attachments
• Don‟t open chain emails
• Watch holiday emails
Downloads
• Intentional – Clicking on link downloads
page or file
Click here to download

http://www.download.com/filename
Downloads
• Only some executables ask permission
– Dialog boxes often ignored
URL shortening
• http://www.pcworld.com/businesscenter/
article/241895/four_ways_rim_can_rebou
nd_from_blackberry_outage.html or…
• http://t.co/JDdriZZj
• bit.ly, tinyurl.com, t.co, goo.gl and others
• Some browsers support URL lengthening
– Long URL Please
URL lengthening
Safe Surfing Tips
•
•
•
•

Look before you click
Use Link Rating
Beware – download, gaming, gambling
Use Care – Social Networking (limit
apps), ads, pop-ups, banners
• https and lock for shopping, banking, etc.
• Limit – open/public networks, scripts
• Protect web pw‟s
Tips for your Home Computer
•
•
•
•
•
•
•
•

Automatic Updates
Anti-Virus/Anti-Malware
Back up
Strong passwords
Password Vault
Careful with Attachments
Be stingy with personal information
Know your computer
Tips for your Home Computer
Handouts
• PC Protection Tips/Tools
• Safe Surfing Tips
17
Social Networks

18
• >1.25B users!
• >2007 net
(2012: 2.5B)
Facebook‟s getting older!

• 65% 35 or older
• Ave. age
• 40.5
• +2 in 2 yrs
Social Network Demographics
pingdom.com – Aug. 21, 2012
Twitter
• Microblogging
• 500M users
• Changed media
paradigm
• IPO coming
Google Plus >340M users

• Not big with teens
LinkedIn >230M users
• Professional networking
Instagram 150M users
• Very big with young adults
Pintrest – 70M Fastest growing
MySpace – Not Dead Yet!

More…
It‟s Getting Better!
• 71% of teens/young adults changed their
online profile privacy settings.
• 57% used search engines to see info
about themselves.
• 47% deleted comments made by others.
• 41% untagged photos.
• 91% of teens use social networks to stay
in touch with people they know/see often,
82% for friends they rarely see.
Reputation Management and Social Media. Pew Internet & American Life Project,
May, 2010
Life without Facebook
• Doing without
•U of Maryland – 24 hours (all tech)
•Harrisburg U – 1 week (social media)
• E-grounding

•Disconnected, addiction-like responses
•Some liked the experience (Harrisburg)
Geolocation
The world knows
• Where you are
• Where you are not
The „Net Never Forgets
• Anything posted remains for a long
time
• Caching/Archiving
• Who else might view your blog, php,
site?
– College admissions officials
– Job interviewers
Reputation Management
•
•
•
•
•
•

Remove or untag pictures
Ask friends to do the same
Limit info on public profiles
LinkedIn.com
ClaimId.com/Naymz.com
Blog
Reputation Management
• Get involved - generate good
publicity
• Don‟t get into online arguments (and
if you do… drop it!)
• You may need professional help
(technical… not the other kind)
What to Do?
Handouts
• The Parents' Child
Protection Guide for the
Internet
• Parental Tools
Cell Phones
• They‟re everywhere!
• Special plans for younger kids
• Calls, texting, pictures, video, games, apps,
music, Internet…
• Internet access is truly mobile!
• Trickier to know what kids are doing
• Cell data services $$$
So much
has
changed
Cell Phones
Sexting
• Texts/attachments not private
• Currently considered child porn
• Tunkhannock, PA
Cell Phone Tips
• It‟s a computer!

• Appropriate use, bullying, consequences
• Care with links, downloads, or posting number
• Keep it close – deactivate lost/stolen
• Call/Text Detail
• Screen lock
• Use ICE
• Careful with bluetooth
• Monitoring or look at the phone!
What to Do?
Handouts
• Top 12 Tips for Cell Phones
and Kids
• Cell Phone Parental Tips
and Tools
Discussion?
Slides at http://www.slideshare.net/bcaplin
Handouts at http://www.bjb.org/stuff/talks/
bcaplin1@fairview.org, bc@bjb.org
@bcaplin, +barrycaplin, *bcaplin
about.me/barrycaplin, delicious.com/bcaplin
Securityandcoffee.blogspot.com

More Related Content

What's hot

Legal Issues In Social Media Oct. 2012
Legal Issues In Social Media Oct. 2012Legal Issues In Social Media Oct. 2012
Legal Issues In Social Media Oct. 2012curlistl
 
Online Safety for Seniors
Online Safety for SeniorsOnline Safety for Seniors
Online Safety for SeniorsConnectSafely
 
Online Identity- Part 1
Online Identity- Part 1Online Identity- Part 1
Online Identity- Part 1KR_Barker
 
Intellectual Freedom, Privacy and Social Media
Intellectual Freedom, Privacy and Social MediaIntellectual Freedom, Privacy and Social Media
Intellectual Freedom, Privacy and Social MediaElizabeth T. "Eli" Edwards
 
Cybersafety overview
Cybersafety overviewCybersafety overview
Cybersafety overviewJohn Woodring
 
Digital footprints & criminal investigations
Digital footprints & criminal investigationsDigital footprints & criminal investigations
Digital footprints & criminal investigationsCreepSquash
 
Social Media - the legal risks (AIM)
Social Media - the legal risks (AIM)Social Media - the legal risks (AIM)
Social Media - the legal risks (AIM)Pod Legal
 
Cyber Security Awareness October 2014
Cyber Security Awareness October 2014Cyber Security Awareness October 2014
Cyber Security Awareness October 2014Donald E. Hester
 
Filters and monitoring: Panacea or band-aid
Filters and monitoring: Panacea or band-aidFilters and monitoring: Panacea or band-aid
Filters and monitoring: Panacea or band-aidConnectSafely
 
3Rs of Internet Safety: Rights, Responsibilities and Risk Management
3Rs of Internet Safety: Rights, Responsibilities and Risk Management3Rs of Internet Safety: Rights, Responsibilities and Risk Management
3Rs of Internet Safety: Rights, Responsibilities and Risk ManagementConnectSafely
 
How safe are our children
How safe are our childrenHow safe are our children
How safe are our childrenstevewrightco
 
How safe are our children
How safe are our childrenHow safe are our children
How safe are our childrenstevewrightco
 
How safe are our children
How safe are our childrenHow safe are our children
How safe are our childrenstevewrightco
 
Digital Citizenship Redefined
Digital Citizenship RedefinedDigital Citizenship Redefined
Digital Citizenship RedefinedConnectSafely
 
Online safety for children
Online safety for childrenOnline safety for children
Online safety for childrenKumar Manish
 
Digital parenting seminars
Digital parenting seminarsDigital parenting seminars
Digital parenting seminarsEmmanuel Arthur
 
Risk Assessment of Social Media Use v3.01
Risk Assessment of Social Media Use v3.01Risk Assessment of Social Media Use v3.01
Risk Assessment of Social Media Use v3.01overcertified
 

What's hot (20)

Legal Issues In Social Media Oct. 2012
Legal Issues In Social Media Oct. 2012Legal Issues In Social Media Oct. 2012
Legal Issues In Social Media Oct. 2012
 
Online Safety for Seniors
Online Safety for SeniorsOnline Safety for Seniors
Online Safety for Seniors
 
Online Identity- Part 1
Online Identity- Part 1Online Identity- Part 1
Online Identity- Part 1
 
Intellectual Freedom, Privacy and Social Media
Intellectual Freedom, Privacy and Social MediaIntellectual Freedom, Privacy and Social Media
Intellectual Freedom, Privacy and Social Media
 
Cybersafety overview
Cybersafety overviewCybersafety overview
Cybersafety overview
 
Digital footprints & criminal investigations
Digital footprints & criminal investigationsDigital footprints & criminal investigations
Digital footprints & criminal investigations
 
Social Media - the legal risks (AIM)
Social Media - the legal risks (AIM)Social Media - the legal risks (AIM)
Social Media - the legal risks (AIM)
 
Cyber Security Awareness October 2014
Cyber Security Awareness October 2014Cyber Security Awareness October 2014
Cyber Security Awareness October 2014
 
Filters and monitoring: Panacea or band-aid
Filters and monitoring: Panacea or band-aidFilters and monitoring: Panacea or band-aid
Filters and monitoring: Panacea or band-aid
 
3Rs of Internet Safety: Rights, Responsibilities and Risk Management
3Rs of Internet Safety: Rights, Responsibilities and Risk Management3Rs of Internet Safety: Rights, Responsibilities and Risk Management
3Rs of Internet Safety: Rights, Responsibilities and Risk Management
 
KidSafe - Parental Training Presentation
KidSafe  - Parental Training PresentationKidSafe  - Parental Training Presentation
KidSafe - Parental Training Presentation
 
Digital Self
Digital SelfDigital Self
Digital Self
 
How safe are our children
How safe are our childrenHow safe are our children
How safe are our children
 
How safe are our children
How safe are our childrenHow safe are our children
How safe are our children
 
How safe are our children
How safe are our childrenHow safe are our children
How safe are our children
 
Digital Citizenship Redefined
Digital Citizenship RedefinedDigital Citizenship Redefined
Digital Citizenship Redefined
 
Online safety for children
Online safety for childrenOnline safety for children
Online safety for children
 
Technology gadgets a boon or a bane
Technology gadgets a boon or a baneTechnology gadgets a boon or a bane
Technology gadgets a boon or a bane
 
Digital parenting seminars
Digital parenting seminarsDigital parenting seminars
Digital parenting seminars
 
Risk Assessment of Social Media Use v3.01
Risk Assessment of Social Media Use v3.01Risk Assessment of Social Media Use v3.01
Risk Assessment of Social Media Use v3.01
 

Viewers also liked

Viewers also liked (7)

Social media
Social media Social media
Social media
 
Fasciculo general-comunicacion
Fasciculo general-comunicacionFasciculo general-comunicacion
Fasciculo general-comunicacion
 
Chapitre2 1 c
Chapitre2 1 cChapitre2 1 c
Chapitre2 1 c
 
LA CRÓNICA 656
LA CRÓNICA 656LA CRÓNICA 656
LA CRÓNICA 656
 
Revista
RevistaRevista
Revista
 
Ingeniería Económicas
Ingeniería EconómicasIngeniería Económicas
Ingeniería Económicas
 
Mecanismo extrarenales
Mecanismo extrarenalesMecanismo extrarenales
Mecanismo extrarenales
 

Similar to How to be a Tech-Smart Parent

Internet Safety Presentation for Parents
Internet Safety Presentation for ParentsInternet Safety Presentation for Parents
Internet Safety Presentation for ParentsMarian Merritt
 
The Digital Footprint: An Understanding of What It Means for Kids and Criminals
The Digital Footprint: An Understanding of What It Means for Kids and CriminalsThe Digital Footprint: An Understanding of What It Means for Kids and Criminals
The Digital Footprint: An Understanding of What It Means for Kids and CriminalsCreepSquash
 
Pod camp boston 2011 locking up yourself online
Pod camp boston 2011 locking up yourself onlinePod camp boston 2011 locking up yourself online
Pod camp boston 2011 locking up yourself onlineLane Sutton
 
Digital parenting seminars
Digital parenting seminarsDigital parenting seminars
Digital parenting seminarsEmmanuel Arthur
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for ParentsScott Burnett
 
Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...Justin Denton
 
Surviving and Thriving Online 2011
Surviving and Thriving Online 2011Surviving and Thriving Online 2011
Surviving and Thriving Online 2011Pat Sine
 
Online Self Defense
Online Self DefenseOnline Self Defense
Online Self DefenseBarry Caplin
 
Public by Default: Life Online in 2012
Public by Default:  Life Online in 2012Public by Default:  Life Online in 2012
Public by Default: Life Online in 2012Pat Sine
 
Help! I'm the parent of a tech saavy child!
Help! I'm the parent of a tech saavy child!Help! I'm the parent of a tech saavy child!
Help! I'm the parent of a tech saavy child!Scott Burnett
 
Digital Natives? Basics of Information Literacy
Digital Natives? Basics of Information LiteracyDigital Natives? Basics of Information Literacy
Digital Natives? Basics of Information LiteracySarah Uthoff
 
Social groups for awareness
Social groups for awarenessSocial groups for awareness
Social groups for awarenessKaran Veer Singh
 
Social Media Security: What to Watch out for...
Social Media Security: What to Watch out for...Social Media Security: What to Watch out for...
Social Media Security: What to Watch out for...Carl B. Forkner, Ph.D.
 

Similar to How to be a Tech-Smart Parent (20)

Internet Safety Presentation for Parents
Internet Safety Presentation for ParentsInternet Safety Presentation for Parents
Internet Safety Presentation for Parents
 
Riverview
RiverviewRiverview
Riverview
 
Do it Best Corp. Techapalooza 2014 Presentation
Do it Best Corp. Techapalooza 2014 PresentationDo it Best Corp. Techapalooza 2014 Presentation
Do it Best Corp. Techapalooza 2014 Presentation
 
The Digital Footprint: An Understanding of What It Means for Kids and Criminals
The Digital Footprint: An Understanding of What It Means for Kids and CriminalsThe Digital Footprint: An Understanding of What It Means for Kids and Criminals
The Digital Footprint: An Understanding of What It Means for Kids and Criminals
 
Pod camp boston 2011 locking up yourself online
Pod camp boston 2011 locking up yourself onlinePod camp boston 2011 locking up yourself online
Pod camp boston 2011 locking up yourself online
 
Digital parenting seminars
Digital parenting seminarsDigital parenting seminars
Digital parenting seminars
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 
Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...
 
Surviving and Thriving Online 2011
Surviving and Thriving Online 2011Surviving and Thriving Online 2011
Surviving and Thriving Online 2011
 
Cyber security - Trend Micro
Cyber security  - Trend MicroCyber security  - Trend Micro
Cyber security - Trend Micro
 
Online Self Defense
Online Self DefenseOnline Self Defense
Online Self Defense
 
Public by Default: Life Online in 2012
Public by Default:  Life Online in 2012Public by Default:  Life Online in 2012
Public by Default: Life Online in 2012
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Help! I'm the parent of a tech saavy child!
Help! I'm the parent of a tech saavy child!Help! I'm the parent of a tech saavy child!
Help! I'm the parent of a tech saavy child!
 
Digital Natives? Basics of Information Literacy
Digital Natives? Basics of Information LiteracyDigital Natives? Basics of Information Literacy
Digital Natives? Basics of Information Literacy
 
Judy Taylour's Digital Privacy Day 2014 Presentation
Judy Taylour's Digital Privacy Day 2014 PresentationJudy Taylour's Digital Privacy Day 2014 Presentation
Judy Taylour's Digital Privacy Day 2014 Presentation
 
Social groups for awareness
Social groups for awarenessSocial groups for awareness
Social groups for awareness
 
Social Media Security: What to Watch out for...
Social Media Security: What to Watch out for...Social Media Security: What to Watch out for...
Social Media Security: What to Watch out for...
 

More from Barry Caplin

Healing healthcare security
Healing healthcare securityHealing healthcare security
Healing healthcare securityBarry Caplin
 
It’s not If but When 20160503
It’s not If but When 20160503It’s not If but When 20160503
It’s not If but When 20160503Barry Caplin
 
Dreaded Embedded sec360 5-17-16
Dreaded Embedded   sec360 5-17-16Dreaded Embedded   sec360 5-17-16
Dreaded Embedded sec360 5-17-16Barry Caplin
 
It’s not if but when 20160503
It’s not if but when 20160503It’s not if but when 20160503
It’s not if but when 20160503Barry Caplin
 
Online Self Defense - Passwords
Online Self Defense - PasswordsOnline Self Defense - Passwords
Online Self Defense - PasswordsBarry Caplin
 
The CISO Guide – How Do You Spell CISO?
The CISO Guide – How Do You Spell CISO?The CISO Guide – How Do You Spell CISO?
The CISO Guide – How Do You Spell CISO?Barry Caplin
 
Bullying and Cyberbullying
Bullying and CyberbullyingBullying and Cyberbullying
Bullying and CyberbullyingBarry Caplin
 
3 factors of fail sec360 5-15-13
3 factors of fail   sec360 5-15-133 factors of fail   sec360 5-15-13
3 factors of fail sec360 5-15-13Barry Caplin
 
Embracing the IT Consumerization Imperative NG Security
Embracing the IT Consumerization Imperative NG SecurityEmbracing the IT Consumerization Imperative NG Security
Embracing the IT Consumerization Imperative NG SecurityBarry Caplin
 
Embracing the IT Consumerization Imperitive
Embracing the IT Consumerization ImperitiveEmbracing the IT Consumerization Imperitive
Embracing the IT Consumerization ImperitiveBarry Caplin
 
Stuff my ciso says
Stuff my ciso saysStuff my ciso says
Stuff my ciso saysBarry Caplin
 
IT Consumerization – iPad’ing the Enterprise or BYO Malware?
IT Consumerization – iPad’ing the Enterprise or BYO Malware?IT Consumerization – iPad’ing the Enterprise or BYO Malware?
IT Consumerization – iPad’ing the Enterprise or BYO Malware?Barry Caplin
 
Toys in the office 11
Toys in the office 11Toys in the office 11
Toys in the office 11Barry Caplin
 
Accidental Insider
Accidental InsiderAccidental Insider
Accidental InsiderBarry Caplin
 
Teens 2.0 - Teens and Social Networks
Teens 2.0 - Teens and Social NetworksTeens 2.0 - Teens and Social Networks
Teens 2.0 - Teens and Social NetworksBarry Caplin
 
Laws of the Game For Valley United Soccer Club travel soccer refs
Laws of the Game For Valley United Soccer Club travel soccer refsLaws of the Game For Valley United Soccer Club travel soccer refs
Laws of the Game For Valley United Soccer Club travel soccer refsBarry Caplin
 
Laws of the Game for Valley Athletic Assn (VAA) Community Soccer refs
Laws of the Game for Valley Athletic Assn (VAA) Community Soccer refsLaws of the Game for Valley Athletic Assn (VAA) Community Soccer refs
Laws of the Game for Valley Athletic Assn (VAA) Community Soccer refsBarry Caplin
 
Internet Safety for Families and Children
Internet Safety for Families and ChildrenInternet Safety for Families and Children
Internet Safety for Families and ChildrenBarry Caplin
 
Security Lifecycle Management
Security Lifecycle ManagementSecurity Lifecycle Management
Security Lifecycle ManagementBarry Caplin
 
Elements of an Information Security Awareness Program
Elements of an Information Security Awareness ProgramElements of an Information Security Awareness Program
Elements of an Information Security Awareness ProgramBarry Caplin
 

More from Barry Caplin (20)

Healing healthcare security
Healing healthcare securityHealing healthcare security
Healing healthcare security
 
It’s not If but When 20160503
It’s not If but When 20160503It’s not If but When 20160503
It’s not If but When 20160503
 
Dreaded Embedded sec360 5-17-16
Dreaded Embedded   sec360 5-17-16Dreaded Embedded   sec360 5-17-16
Dreaded Embedded sec360 5-17-16
 
It’s not if but when 20160503
It’s not if but when 20160503It’s not if but when 20160503
It’s not if but when 20160503
 
Online Self Defense - Passwords
Online Self Defense - PasswordsOnline Self Defense - Passwords
Online Self Defense - Passwords
 
The CISO Guide – How Do You Spell CISO?
The CISO Guide – How Do You Spell CISO?The CISO Guide – How Do You Spell CISO?
The CISO Guide – How Do You Spell CISO?
 
Bullying and Cyberbullying
Bullying and CyberbullyingBullying and Cyberbullying
Bullying and Cyberbullying
 
3 factors of fail sec360 5-15-13
3 factors of fail   sec360 5-15-133 factors of fail   sec360 5-15-13
3 factors of fail sec360 5-15-13
 
Embracing the IT Consumerization Imperative NG Security
Embracing the IT Consumerization Imperative NG SecurityEmbracing the IT Consumerization Imperative NG Security
Embracing the IT Consumerization Imperative NG Security
 
Embracing the IT Consumerization Imperitive
Embracing the IT Consumerization ImperitiveEmbracing the IT Consumerization Imperitive
Embracing the IT Consumerization Imperitive
 
Stuff my ciso says
Stuff my ciso saysStuff my ciso says
Stuff my ciso says
 
IT Consumerization – iPad’ing the Enterprise or BYO Malware?
IT Consumerization – iPad’ing the Enterprise or BYO Malware?IT Consumerization – iPad’ing the Enterprise or BYO Malware?
IT Consumerization – iPad’ing the Enterprise or BYO Malware?
 
Toys in the office 11
Toys in the office 11Toys in the office 11
Toys in the office 11
 
Accidental Insider
Accidental InsiderAccidental Insider
Accidental Insider
 
Teens 2.0 - Teens and Social Networks
Teens 2.0 - Teens and Social NetworksTeens 2.0 - Teens and Social Networks
Teens 2.0 - Teens and Social Networks
 
Laws of the Game For Valley United Soccer Club travel soccer refs
Laws of the Game For Valley United Soccer Club travel soccer refsLaws of the Game For Valley United Soccer Club travel soccer refs
Laws of the Game For Valley United Soccer Club travel soccer refs
 
Laws of the Game for Valley Athletic Assn (VAA) Community Soccer refs
Laws of the Game for Valley Athletic Assn (VAA) Community Soccer refsLaws of the Game for Valley Athletic Assn (VAA) Community Soccer refs
Laws of the Game for Valley Athletic Assn (VAA) Community Soccer refs
 
Internet Safety for Families and Children
Internet Safety for Families and ChildrenInternet Safety for Families and Children
Internet Safety for Families and Children
 
Security Lifecycle Management
Security Lifecycle ManagementSecurity Lifecycle Management
Security Lifecycle Management
 
Elements of an Information Security Awareness Program
Elements of an Information Security Awareness ProgramElements of an Information Security Awareness Program
Elements of an Information Security Awareness Program
 

Recently uploaded

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 

Recently uploaded (20)

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 

How to be a Tech-Smart Parent

  • 1. How to be a Tech-Smart Parent Barry Caplin Chief Information Security Officer Fairview Health Services bcaplin1@fairview.org, bc@bjb.org @bcaplin, +barrycaplin, *bcaplin http://about.me/barrycaplin http://securityandcoffee.blogspot.com Slides at http://www.slideshare.net/bcaplin Handouts at http://www.bjb.org/stuff/talks/ District 196 Parent Fair Nov. 2, 2013
  • 2.
  • 3. Interactive • Please… ask questions! • Please… answer questions!
  • 4. Disclaimer I‟m still figuring out this Parenting thing also…
  • 6. So Much Tech… So Little Time! Social Networks Home computers Cell phones and texting Reputation Management
  • 7. Your Home Computer • • • • • • • • Research Taxes Shopping Record keeping Homework Email Social networking Photos • • • • • • • • Video Work Genealogy Music Games News TV Movies…
  • 8. What Can Go Wrong? • • • • • • • • Viruses Trojans Worms „Bots Click-jacking Spyware Adware “Drive-By” Downloads
  • 9. How Your Computer Gets Sick • Attachments • Downloads – Intentional •Clicks •URL shortening – Unintentional - Website Visits/Drive-By
  • 10. Attachments • • • • File sent via email Can execute when the file is opened doc, xls, pdf, jpg (and other images), etc. Even zip files can cause problems • Only open expected attachments • Don‟t open chain emails • Watch holiday emails
  • 11. Downloads • Intentional – Clicking on link downloads page or file Click here to download http://www.download.com/filename
  • 12. Downloads • Only some executables ask permission – Dialog boxes often ignored
  • 13. URL shortening • http://www.pcworld.com/businesscenter/ article/241895/four_ways_rim_can_rebou nd_from_blackberry_outage.html or… • http://t.co/JDdriZZj • bit.ly, tinyurl.com, t.co, goo.gl and others • Some browsers support URL lengthening – Long URL Please
  • 15. Safe Surfing Tips • • • • Look before you click Use Link Rating Beware – download, gaming, gambling Use Care – Social Networking (limit apps), ads, pop-ups, banners • https and lock for shopping, banking, etc. • Limit – open/public networks, scripts • Protect web pw‟s
  • 16. Tips for your Home Computer • • • • • • • • Automatic Updates Anti-Virus/Anti-Malware Back up Strong passwords Password Vault Careful with Attachments Be stingy with personal information Know your computer
  • 17. Tips for your Home Computer Handouts • PC Protection Tips/Tools • Safe Surfing Tips 17
  • 19. • >1.25B users! • >2007 net (2012: 2.5B)
  • 20. Facebook‟s getting older! • 65% 35 or older • Ave. age • 40.5 • +2 in 2 yrs Social Network Demographics pingdom.com – Aug. 21, 2012
  • 21. Twitter • Microblogging • 500M users • Changed media paradigm • IPO coming
  • 22. Google Plus >340M users • Not big with teens LinkedIn >230M users • Professional networking Instagram 150M users • Very big with young adults Pintrest – 70M Fastest growing MySpace – Not Dead Yet! More…
  • 23. It‟s Getting Better! • 71% of teens/young adults changed their online profile privacy settings. • 57% used search engines to see info about themselves. • 47% deleted comments made by others. • 41% untagged photos. • 91% of teens use social networks to stay in touch with people they know/see often, 82% for friends they rarely see. Reputation Management and Social Media. Pew Internet & American Life Project, May, 2010
  • 24.
  • 25. Life without Facebook • Doing without •U of Maryland – 24 hours (all tech) •Harrisburg U – 1 week (social media) • E-grounding •Disconnected, addiction-like responses •Some liked the experience (Harrisburg)
  • 26.
  • 27. Geolocation The world knows • Where you are • Where you are not
  • 28. The „Net Never Forgets • Anything posted remains for a long time • Caching/Archiving • Who else might view your blog, php, site? – College admissions officials – Job interviewers
  • 29. Reputation Management • • • • • • Remove or untag pictures Ask friends to do the same Limit info on public profiles LinkedIn.com ClaimId.com/Naymz.com Blog
  • 30. Reputation Management • Get involved - generate good publicity • Don‟t get into online arguments (and if you do… drop it!) • You may need professional help (technical… not the other kind)
  • 31. What to Do? Handouts • The Parents' Child Protection Guide for the Internet • Parental Tools
  • 32. Cell Phones • They‟re everywhere! • Special plans for younger kids • Calls, texting, pictures, video, games, apps, music, Internet… • Internet access is truly mobile! • Trickier to know what kids are doing • Cell data services $$$
  • 34.
  • 35.
  • 37.
  • 38.
  • 39. Sexting • Texts/attachments not private • Currently considered child porn • Tunkhannock, PA
  • 40. Cell Phone Tips • It‟s a computer! • Appropriate use, bullying, consequences • Care with links, downloads, or posting number • Keep it close – deactivate lost/stolen • Call/Text Detail • Screen lock • Use ICE • Careful with bluetooth • Monitoring or look at the phone!
  • 41. What to Do? Handouts • Top 12 Tips for Cell Phones and Kids • Cell Phone Parental Tips and Tools
  • 42. Discussion? Slides at http://www.slideshare.net/bcaplin Handouts at http://www.bjb.org/stuff/talks/ bcaplin1@fairview.org, bc@bjb.org @bcaplin, +barrycaplin, *bcaplin about.me/barrycaplin, delicious.com/bcaplin Securityandcoffee.blogspot.com

Editor's Notes

  1. Digital Natives have different views on privacy