SlideShare uma empresa Scribd logo
1 de 29
Internet Safety & Awareness
Internet risks
Top six tips for online safety
What to do if there is a problem
Online safety resources
Internet
   Risks
Primary Threats to your Computer Security




Viruses/Worms
Software programs
designed to invade   Trojans
your computer, and   Viruses that pretend to be
copy, damage, or     helpful programs while
delete your data.    destroying your
                                                  Spyware
                     data, damaging your          Software that tracks
                     computer, and stealing       your online activities or
                     your personal                displays endless ads.
                     information.
Primary Threats to your personal online safety



                 Phishing
                 E-mail sent by online
                 criminals to trick you                        Spam
                 into going to fake Web
                 sites and revealing                           Unwanted e-
                 personal information                          mail, instant
                                                               messages,
                                                               and other online
                                                               communication
Identity Theft
A crime where con                Hoaxes
artists get your                 E-mail sent by online
personal information             criminals to trick you into
and access your cash             giving them money
and/or credit
Primary online risks for your children


                                                                 Disturbing
                                                                 Content
                                                                 If kids explore
                                                                 unsupervised, they
                                File-share Abuse                 could stumble upon
Cyberbullies                                                     images or information
                                Unauthorized sharing of
                                                                 you may not want
Both children and adults        music, video, and other
                                                                 them exposed to.
may use the Internet to         files may be illegal,
harass or intimidate            and download
other people.                   malicious software.



                Predators                      Invasion of Privacy
                These people use the           If kids fill out online forms, they
                Internet to trick children     may share information you
                into meeting with them         don’t want strangers to have
                in person.                     about them or your family.
Top six tips for
online safety
Defend your computer & network
 Strengthen your computer’s defenses

 Avoid downloading malware

 Secure your home network
Defend your computer
Strengthen your computer’s defenses


 Keep firewall on

 Defend against
 malware

 Update software
 automatically
Defend your computer
Avoid downloading malicious software

   Think before you click

   Confirm that the message is legitimate

   Close pop-up messages carefully


               Ctrl         F4
Defend your network
 Secure your home network: Wireless Network Security

    Use WPA2 (Wi-Fi Protected Access) or WPA

    If you use the older WEP (Wired Equivalent Privacy) instead
    of WPA, then make sure to maximize the encryption

    Use a strong password/change your network address

    Enable MAC address filtering

    Disable SSID broadcasting

    Use OpenDNS to make your network safer

    Access Restrictions
Protect sensitive personal information
 Look for signs of a secure webpage




 Save financial transactions for home

 Keep sensitive info to yourself

 Avoid scams
Protect sensitive personal information
   Set up dummy e-mail addresses when registering
   for sites

   Turn on privacy settings in browser

   Install adblocking software
Learn how to
spot scams
1   Suspicious email address
2   Generic salutations
3   Alarmist messages
4   Grammatical errors
5   Requests for personal info
Create strong passwords
and keep them secret

   Password:     Str0ngpassw0rdsRsafer!

     Strength:                     BEST




 Use different passwords

 Don’t share your passwords
Take charge of your online reputation
 Discover

 Evaluate

 Protect

 Cultivate

 Restore
Take charge of your online reputation
Use social networks more safely
 Use Settings or Options

 Accept new friends wisely

 Be careful what you post
Share with care
  Don’t take or share suggestive
  photos or videos
  Make social network pages private

  Keep personal info to yourself

  Be choosy about adding friends

  Share your accomplishments
Connect honestly and carefully
Download files legally
   Downloading files and following unreliable links are two of the most
   common ways in which computers are compromised by malware
Use web content honestly
Use web & social sites appropriately
Meet an online “friend” in person VERY cautiously
Take extra steps to help
keep kids safer online
 Set clear rules

 Keep communication open Manage and monitor
                            kids’ computer use
 Use family safety software
                            Get reports of kids’
                            computer use
                            Control time of
                            online access
Pay attention to
kids’ activities online

 Join the fun; “Friend” and “Follow” your kids

 Evaluate websites and devices beforehand

 Locate consoles and computers centrally

 Watch for changes in behavior
Set clear rules
  Keep personal information private

  Respect others

  Only add people you know as friends

  Don’t spread rumours

  Don’t use a real photo as your main profile picture

  Use a nickname or first name

  Don’t add apps without talking to us first

  Don’t upload photos of people without asking first

  Don’t share passwords
What is online bullying?
  Send or post cruel messages
  Disclose secrets
  Shut someone out
  Impersonate the target
  Pretend to befriend someone
What you can do with your kids
  Lay the groundwork: pay attention
  Help bystanders standup to online cruelty
  Help those who are bullied or bully others online
  Promote kindness in your community
What to do
if there is
a problem
What to do if there is a problem
 When using email, a social
 network, or other web service

 Continued harassment
 or physical threats

 Your identity is stolen or you
 responded to a scam
Let’s recap
1: Defend your computer
2: Protect sensitive personal information
3: Create strong passwords and keep secret
4: Take charge of your online reputation
5: Use social networks more safely
6: Take extra steps to help keep kids safer online
Online safety resources
    www.microsoft.com/security

    www.twitter.com/Safer_Online

    www.facebook.com/SaferOnline

    www.youtube.com/MSFTOnlineSafety

    www.mediasmarts.ca

    www.bewebaware.ca

Mais conteúdo relacionado

Mais procurados

Mais procurados (20)

End-User Security Awareness
End-User Security AwarenessEnd-User Security Awareness
End-User Security Awareness
 
Cyber security
Cyber securityCyber security
Cyber security
 
Internet / Cyber Security
Internet / Cyber SecurityInternet / Cyber Security
Internet / Cyber Security
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
 
Customer information security awareness training
Customer information security awareness trainingCustomer information security awareness training
Customer information security awareness training
 
A Quick Online Safety Presentation
A Quick Online Safety PresentationA Quick Online Safety Presentation
A Quick Online Safety Presentation
 
Security awareness
Security awarenessSecurity awareness
Security awareness
 
Presentation on cyber safety
Presentation on cyber safetyPresentation on cyber safety
Presentation on cyber safety
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Internet safety
Internet safety Internet safety
Internet safety
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri
 
Cyber security for kids
Cyber security for kidsCyber security for kids
Cyber security for kids
 
cyber security
cyber securitycyber security
cyber security
 
Cyber security training
Cyber security trainingCyber security training
Cyber security training
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness Training
 
Computer Security 101
Computer Security 101Computer Security 101
Computer Security 101
 

Destaque

Internet awareness by komalvekariya
Internet awareness by komalvekariyaInternet awareness by komalvekariya
Internet awareness by komalvekariyakomalatel
 
Internet Awareness 2011
Internet Awareness 2011Internet Awareness 2011
Internet Awareness 2011klbeasley
 
Netiquette Presentation
Netiquette PresentationNetiquette Presentation
Netiquette Presentationsydnee15
 
Social Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness BriefingSocial Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness BriefingDepartment of Defense
 

Destaque (6)

Internet awareness by komalvekariya
Internet awareness by komalvekariyaInternet awareness by komalvekariya
Internet awareness by komalvekariya
 
Internet Awareness 2011
Internet Awareness 2011Internet Awareness 2011
Internet Awareness 2011
 
Netiquette Presentation
Netiquette PresentationNetiquette Presentation
Netiquette Presentation
 
Army Social Media Presentation
Army Social Media PresentationArmy Social Media Presentation
Army Social Media Presentation
 
Social Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness BriefingSocial Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness Briefing
 
Netiquette
NetiquetteNetiquette
Netiquette
 

Semelhante a Internet safety

Microsoft protect ppt_ms_final
Microsoft protect ppt_ms_finalMicrosoft protect ppt_ms_final
Microsoft protect ppt_ms_final21_zaheer
 
Keep your Kids Safe Online
Keep your Kids Safe OnlineKeep your Kids Safe Online
Keep your Kids Safe Online_chimes_
 
Rules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxRules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxNoelBuctot1
 
EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2JayMarkBandoy1
 
CYBERCRIME: AN OVERVIEW
CYBERCRIME: AN OVERVIEWCYBERCRIME: AN OVERVIEW
CYBERCRIME: AN OVERVIEWBilly Warero
 
Lesson 2 rules of netiquette
Lesson 2 rules of netiquetteLesson 2 rules of netiquette
Lesson 2 rules of netiquetteEmmanuelaSernicul
 
Learn internet governance initiative child online safety by shreedeep rayamaj...
Learn internet governance initiative child online safety by shreedeep rayamaj...Learn internet governance initiative child online safety by shreedeep rayamaj...
Learn internet governance initiative child online safety by shreedeep rayamaj...Shreedeep Rayamajhi
 
Learn internet governance initiative child online safety by shreedeep rayamaj...
Learn internet governance initiative child online safety by shreedeep rayamaj...Learn internet governance initiative child online safety by shreedeep rayamaj...
Learn internet governance initiative child online safety by shreedeep rayamaj...Shreedeep Rayamajhi
 
How safe are our children
How safe are our childrenHow safe are our children
How safe are our childrenstevewrightco
 
Rules of Netiquette
 Rules of Netiquette Rules of Netiquette
Rules of NetiquetteRochelle Nato
 
Cybercrimes (Against Children)
Cybercrimes (Against Children)Cybercrimes (Against Children)
Cybercrimes (Against Children)Can R. PAHALI
 
Lesson 2 Rules of Netiquette
Lesson 2   Rules of NetiquetteLesson 2   Rules of Netiquette
Lesson 2 Rules of NetiquetteACLC Antipolo
 
Digital safety[1]
Digital safety[1]Digital safety[1]
Digital safety[1]sheenau
 

Semelhante a Internet safety (20)

Microsoft protect ppt_ms_final
Microsoft protect ppt_ms_finalMicrosoft protect ppt_ms_final
Microsoft protect ppt_ms_final
 
Keep your Kids Safe Online
Keep your Kids Safe OnlineKeep your Kids Safe Online
Keep your Kids Safe Online
 
Rules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxRules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptx
 
EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2
 
CYBERCRIME: AN OVERVIEW
CYBERCRIME: AN OVERVIEWCYBERCRIME: AN OVERVIEW
CYBERCRIME: AN OVERVIEW
 
Lesson 2 rules of netiquette
Lesson 2 rules of netiquetteLesson 2 rules of netiquette
Lesson 2 rules of netiquette
 
Learn internet governance initiative child online safety by shreedeep rayamaj...
Learn internet governance initiative child online safety by shreedeep rayamaj...Learn internet governance initiative child online safety by shreedeep rayamaj...
Learn internet governance initiative child online safety by shreedeep rayamaj...
 
Learn internet governance initiative child online safety by shreedeep rayamaj...
Learn internet governance initiative child online safety by shreedeep rayamaj...Learn internet governance initiative child online safety by shreedeep rayamaj...
Learn internet governance initiative child online safety by shreedeep rayamaj...
 
Students I Safety
Students I SafetyStudents I Safety
Students I Safety
 
lesson-2.pptx
lesson-2.pptxlesson-2.pptx
lesson-2.pptx
 
Online Safety
Online Safety Online Safety
Online Safety
 
2.InternetSafety.ppt
2.InternetSafety.ppt2.InternetSafety.ppt
2.InternetSafety.ppt
 
How safe are our children
How safe are our childrenHow safe are our children
How safe are our children
 
Boushrat 9 a
Boushrat   9 aBoushrat   9 a
Boushrat 9 a
 
Rules of Netiquette
 Rules of Netiquette Rules of Netiquette
Rules of Netiquette
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cybercrimes (Against Children)
Cybercrimes (Against Children)Cybercrimes (Against Children)
Cybercrimes (Against Children)
 
Lesson 2 Rules of Netiquette
Lesson 2   Rules of NetiquetteLesson 2   Rules of Netiquette
Lesson 2 Rules of Netiquette
 
Cyberbullying and Cybercrime
Cyberbullying and CybercrimeCyberbullying and Cybercrime
Cyberbullying and Cybercrime
 
Digital safety[1]
Digital safety[1]Digital safety[1]
Digital safety[1]
 

Último

Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 

Último (20)

Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 

Internet safety

  • 1. Internet Safety & Awareness
  • 2. Internet risks Top six tips for online safety What to do if there is a problem Online safety resources
  • 3. Internet Risks
  • 4. Primary Threats to your Computer Security Viruses/Worms Software programs designed to invade Trojans your computer, and Viruses that pretend to be copy, damage, or helpful programs while delete your data. destroying your Spyware data, damaging your Software that tracks computer, and stealing your online activities or your personal displays endless ads. information.
  • 5. Primary Threats to your personal online safety Phishing E-mail sent by online criminals to trick you Spam into going to fake Web sites and revealing Unwanted e- personal information mail, instant messages, and other online communication Identity Theft A crime where con Hoaxes artists get your E-mail sent by online personal information criminals to trick you into and access your cash giving them money and/or credit
  • 6. Primary online risks for your children Disturbing Content If kids explore unsupervised, they File-share Abuse could stumble upon Cyberbullies images or information Unauthorized sharing of you may not want Both children and adults music, video, and other them exposed to. may use the Internet to files may be illegal, harass or intimidate and download other people. malicious software. Predators Invasion of Privacy These people use the If kids fill out online forms, they Internet to trick children may share information you into meeting with them don’t want strangers to have in person. about them or your family.
  • 7. Top six tips for online safety
  • 8. Defend your computer & network Strengthen your computer’s defenses Avoid downloading malware Secure your home network
  • 9. Defend your computer Strengthen your computer’s defenses Keep firewall on Defend against malware Update software automatically
  • 10. Defend your computer Avoid downloading malicious software Think before you click Confirm that the message is legitimate Close pop-up messages carefully Ctrl F4
  • 11. Defend your network Secure your home network: Wireless Network Security Use WPA2 (Wi-Fi Protected Access) or WPA If you use the older WEP (Wired Equivalent Privacy) instead of WPA, then make sure to maximize the encryption Use a strong password/change your network address Enable MAC address filtering Disable SSID broadcasting Use OpenDNS to make your network safer Access Restrictions
  • 12. Protect sensitive personal information Look for signs of a secure webpage Save financial transactions for home Keep sensitive info to yourself Avoid scams
  • 13. Protect sensitive personal information Set up dummy e-mail addresses when registering for sites Turn on privacy settings in browser Install adblocking software
  • 14. Learn how to spot scams 1 Suspicious email address 2 Generic salutations 3 Alarmist messages 4 Grammatical errors 5 Requests for personal info
  • 15. Create strong passwords and keep them secret Password: Str0ngpassw0rdsRsafer! Strength: BEST Use different passwords Don’t share your passwords
  • 16. Take charge of your online reputation Discover Evaluate Protect Cultivate Restore
  • 17. Take charge of your online reputation
  • 18. Use social networks more safely Use Settings or Options Accept new friends wisely Be careful what you post
  • 19. Share with care Don’t take or share suggestive photos or videos Make social network pages private Keep personal info to yourself Be choosy about adding friends Share your accomplishments
  • 20. Connect honestly and carefully Download files legally Downloading files and following unreliable links are two of the most common ways in which computers are compromised by malware Use web content honestly Use web & social sites appropriately Meet an online “friend” in person VERY cautiously
  • 21. Take extra steps to help keep kids safer online Set clear rules Keep communication open Manage and monitor kids’ computer use Use family safety software Get reports of kids’ computer use Control time of online access
  • 22. Pay attention to kids’ activities online Join the fun; “Friend” and “Follow” your kids Evaluate websites and devices beforehand Locate consoles and computers centrally Watch for changes in behavior
  • 23. Set clear rules Keep personal information private Respect others Only add people you know as friends Don’t spread rumours Don’t use a real photo as your main profile picture Use a nickname or first name Don’t add apps without talking to us first Don’t upload photos of people without asking first Don’t share passwords
  • 24. What is online bullying? Send or post cruel messages Disclose secrets Shut someone out Impersonate the target Pretend to befriend someone
  • 25. What you can do with your kids Lay the groundwork: pay attention Help bystanders standup to online cruelty Help those who are bullied or bully others online Promote kindness in your community
  • 26. What to do if there is a problem
  • 27. What to do if there is a problem When using email, a social network, or other web service Continued harassment or physical threats Your identity is stolen or you responded to a scam
  • 28. Let’s recap 1: Defend your computer 2: Protect sensitive personal information 3: Create strong passwords and keep secret 4: Take charge of your online reputation 5: Use social networks more safely 6: Take extra steps to help keep kids safer online
  • 29. Online safety resources www.microsoft.com/security www.twitter.com/Safer_Online www.facebook.com/SaferOnline www.youtube.com/MSFTOnlineSafety www.mediasmarts.ca www.bewebaware.ca

Notas do Editor

  1. Slide 3: [agenda]TALKING POINTSTo better protect ourselves online, we need to understand some of the potential risks to our safety, the privacy of our information, and the security of our computers.Once we’re more familiar with those risks, I’ll share Microsoft’s top six tips for protecting your information and devices.Then I’ll touch on what you can do if you run into problems like online harassment or identity theft. I’ll finish by distributing the printed tips, reviewing the links with you (so you don’t need to worry about taking notes as we go along), and leave you with some of Microsoft’s top safety resources. [click]
  2. Slide 4: Risks to your online safetyTALKING POINTSSo, what are some of the risks to our personal safety online? Microsoft groups them into four areas: CONTENT, CONTACT, CONDUCT, and COMMERCE. [click]
  3. Slide 5: Risks to your online safetyTALKING POINTSCONTENT. All of you know the saying from reading the newspaper or watching TV that “just because it’s in the news doesn’t mean it’s all true.” Well this same adage applies online because these days, anyone with an Internet connection can be a “citizen journalist” through blogs and social networks. You may also come across extreme political or racial views or questionable advice that encourages eating disorders or gives instructions for building a bomb. [click]CONTACT. These are risks we’re exposed to through our interactions online: Cyberbullying, which is using the Internet for repeated unwanted or cruel behavior against someone, opens the door to 24-hour harassment. Anyone can experience online bullying, but it’s of particular concern among childrenCyber harassment is the adult equivalent of cyberbullying.Child predators can also make unwanted contact with children. Although there is no doubt that this is the worst kind of contact (and makes the news most often), it’s also the most infrequent form. [click]CONDUCT. The risks of conduct have to do with what we do and say online as well as what others post about us. Our reputations (and how others view us) are shaped by our actions, interactions, and what we post on social networks, in games and virtual worlds, or on mobile phones. [click]And last, the risks of online COMMERCE. Information about us, particularly about our online preferences and habits, is a valuable commodity to people and businesses, whether trustworthy or not. So the risks of e-commerce have to do with an invasion of privacy or identity theft when unsavory people get access to sensitive, personal information like bank account, credit card, or social security numbers.[Note to speaker: You might also include mention of this statistic: the Cybersource Online Fraud Report estimated that in 2011, the total revenue loss from online fraud was approximately US$3.4 billion, a US$700 million increase over 2010. (The report based its research on 2011 industry market projections on e-commerce in North America.)]But, rather than avoid the Internet or unplug your computer completely, what can you do? [click]
  4. Slide 5: Risks to your online safetyTALKING POINTSCONTENT. All of you know the saying from reading the newspaper or watching TV that “just because it’s in the news doesn’t mean it’s all true.” Well this same adage applies online because these days, anyone with an Internet connection can be a “citizen journalist” through blogs and social networks. You may also come across extreme political or racial views or questionable advice that encourages eating disorders or gives instructions for building a bomb. [click]CONTACT. These are risks we’re exposed to through our interactions online: Cyberbullying, which is using the Internet for repeated unwanted or cruel behavior against someone, opens the door to 24-hour harassment. Anyone can experience online bullying, but it’s of particular concern among childrenCyber harassment is the adult equivalent of cyberbullying.Child predators can also make unwanted contact with children. Although there is no doubt that this is the worst kind of contact (and makes the news most often), it’s also the most infrequent form. [click]CONDUCT. The risks of conduct have to do with what we do and say online as well as what others post about us. Our reputations (and how others view us) are shaped by our actions, interactions, and what we post on social networks, in games and virtual worlds, or on mobile phones. [click]And last, the risks of online COMMERCE. Information about us, particularly about our online preferences and habits, is a valuable commodity to people and businesses, whether trustworthy or not. So the risks of e-commerce have to do with an invasion of privacy or identity theft when unsavory people get access to sensitive, personal information like bank account, credit card, or social security numbers.[Note to speaker: You might also include mention of this statistic: the Cybersource Online Fraud Report estimated that in 2011, the total revenue loss from online fraud was approximately US$3.4 billion, a US$700 million increase over 2010. (The report based its research on 2011 industry market projections on e-commerce in North America.)]But, rather than avoid the Internet or unplug your computer completely, what can you do? [click]
  5. Slide 5: Risks to your online safetyTALKING POINTSCONTENT. All of you know the saying from reading the newspaper or watching TV that “just because it’s in the news doesn’t mean it’s all true.” Well this same adage applies online because these days, anyone with an Internet connection can be a “citizen journalist” through blogs and social networks. You may also come across extreme political or racial views or questionable advice that encourages eating disorders or gives instructions for building a bomb. [click]CONTACT. These are risks we’re exposed to through our interactions online: Cyberbullying, which is using the Internet for repeated unwanted or cruel behavior against someone, opens the door to 24-hour harassment. Anyone can experience online bullying, but it’s of particular concern among childrenCyber harassment is the adult equivalent of cyberbullying.Child predators can also make unwanted contact with children. Although there is no doubt that this is the worst kind of contact (and makes the news most often), it’s also the most infrequent form. [click]CONDUCT. The risks of conduct have to do with what we do and say online as well as what others post about us. Our reputations (and how others view us) are shaped by our actions, interactions, and what we post on social networks, in games and virtual worlds, or on mobile phones. [click]And last, the risks of online COMMERCE. Information about us, particularly about our online preferences and habits, is a valuable commodity to people and businesses, whether trustworthy or not. So the risks of e-commerce have to do with an invasion of privacy or identity theft when unsavory people get access to sensitive, personal information like bank account, credit card, or social security numbers.[Note to speaker: You might also include mention of this statistic: the Cybersource Online Fraud Report estimated that in 2011, the total revenue loss from online fraud was approximately US$3.4 billion, a US$700 million increase over 2010. (The report based its research on 2011 industry market projections on e-commerce in North America.)]But, rather than avoid the Internet or unplug your computer completely, what can you do? [click]
  6. Slide 6: Top six tips for online safetyTALKING POINTSWell, Microsoft has put together six tips to help you stay safer while you conduct business and socialize on the web. [click]
  7. Slide 7: Tip 1 Defend your computer TALKING POINTSSo let’s get to our first tip: securing your computer against malicious software (also known as malware). Cybercriminals work relentlessly to seize control of your computer, spread spam, or spy on your online activities—ultimately in an attempt to steal personal information or money.Criminals use two broad strategies to try to break through a computer’s defenses. Theyinstall malicious software on computers that haven’t been updated. This can happen in a couple of ways. They can exploit older weaknesses in the software, or they can break into accounts guarded by simple passwordsThey also try to trick people into installing their malware, including adware, worms, and keystroke loggers (software that can spy on what you type—passwords, user names, and so on). [click]So there are two things you can do to defend against them:Strengthen your computer’s defenses.Train yourself to act cautiously to avoid downloading malware. [click]
  8. Slide 8: Tip 1 Defend your computer: Strengthen your computer’s defensesTALKING POINTSFirst, to strengthen your computer’s defenses, leave your computer’s firewall on at all times. Turning it off even for a minute increases risk.A firewall creates a barrier between your computer and the Internet, a kind of security checkpoint that both information and software must pass through before they can enter or leave your computer. The firewall can also help prevent your computer from accepting updates without your permission. [click]Second, to defend against malware:Installantispyware and antivirus software from a trusted source,like Microsoft® Security Essentials, which is automatically updated once a day. This software helps protect your computer by scanning downloaded files and attachments for the latest threats, and detecting and removing thousands of specific viruses before they have a chance to damage anything.Never download anything in response to a warning from a program you didn’t install or don’t recognize that claims to protect your computer or offers to remove viruses. It’s highly likely it will do the exact opposite. [click]Third, cybercriminals are inventive in their efforts to exploit vulnerabilities in software. Many software companies frequently provide updates that you need to install. So:Regularly install updates for all your software—antivirus and antispyware programs, browsers (like Windows® Internet Explorer®), operating systems (like Windows), and word processing and other programs (games included).The safest and easiest way to stay current is to change your computer’s security settings to subscribe to automatic updates whenever they are offered. For example, to automatically update all Microsoft software, go to update.microsoft.com, or if you use Windows, go to Control Panel.It’s also a good idea to uninstall any software that you don’t use. If you use Windows, you can remove it using Control Panel. [click]
  9. SLIDE 9TALKING POINTSWhen you receive email, instant, or text messages, or messages on social networks like Facebook, LinkedIn, and Twitter: be cautious. [click]Stop and think before you click links, open photos, songs, or other attachments in a message from someone you don't know. Be wary of "free" games, apps, and the like, which are notorious for including malware in the download.Even be suspicious of links and attachments from someone within your company, especially if it’s something unexpected, like ilovepinkponies.pdf from your boss. Or, just because the email message says it’s a LinkedIn update, doesn’t mean it is. You never know if a criminal has hacked into a coworker’s account, or that his or her computer has been infected with a virus that is automatically sending spam. [click]Confirm. If you think it’s suspicious, don’t click anything or use phone numbers or email addresses in the message. Instead, use a different device and another account to confirm with the sender that the message is legitimate. Or do some research. For example, the executives in our example might have paused to consider whether their companies were involved in litigation that could result in a subpoena from this court. [click]Close. Avoid clicking Agree, OK, or I accept in banner ads, in unexpected pop-up messages or warnings, on websites that seem suspicious to you, or in offers to remove spyware or viruses. These also could trigger the download of malware. [click]Instead close the window. To do this, press Ctrl and F4on your keyboard.And the advice, “If you see something, say something,” applies here. If you do see a message that seems suspicious or problematic, report it to the system administrator who can take action including warning others what to do if they see the same thing. Now, let’s go to Step 3 and see how you can further protect sensitive business data and our company’s financial assets. [click]
  10. Slide 7: Tip 1 Defend your computer TALKING POINTSSo let’s get to our first tip: securing your computer against malicious software (also known as malware). Cybercriminals work relentlessly to seize control of your computer, spread spam, or spy on your online activities—ultimately in an attempt to steal personal information or money.Criminals use two broad strategies to try to break through a computer’s defenses. Theyinstall malicious software on computers that haven’t been updated. This can happen in a couple of ways. They can exploit older weaknesses in the software, or they can break into accounts guarded by simple passwordsThey also try to trick people into installing their malware, including adware, worms, and keystroke loggers (software that can spy on what you type—passwords, user names, and so on). [click]So there are two things you can do to defend against them:Strengthen your computer’s defenses.Train yourself to act cautiously to avoid downloading malware. [click]
  11. Slide 10: Tip 2 Protect sensitive personal informationTALKING POINTSOur second tip is to protect sensitive personal information which includes social security numbers, passwords, addresses, phone numbers, mother’s maiden name, and bank account, credit card, and PIN numbers.Of course, protecting this info is important in all online activities, but especially when you are making any type of financial transaction online—for instance, banking, shopping, or making donations. [click]Secure webpage. So before you enter sensitive data like that, look carefully for signs that the web page is secure. The Woodgrove Bank example on the screen illustrates good indicators that include:A web address that begins with https. (The “s” stands for secure.)A closed padlock either next to the web address or in the lower right corner of the window. These tell you the website uses data encryption, an extra security measure that helps protect your sensitive data as it traverses the Internet.Make sure you are at the site you want and not a fake. If you’re using a recent version of Internet Explorer, for example, a sign of trustworthiness is the green address bar, like the one you see here. Plus, if you were to click the down arrow next to that padlock, a matching Woodgrove Bank web address would appear. When both addresses match, you can be quite certain that you are where you want to be. [click]Next, save bill paying and online purchases for a secure Internet connection at home rather than risk using a public computer or wireless network, which may not be secure. (Of course, this advice depends on protecting your home wireless connection with a password. Find out how to do this from the company that provided your router.) [click]Keep sensitive info to yourself. Never share sensitive information in response to a request in email or IM or on a social network.Responding to such requests can often direct you to a web page or a toll-free number, where the information you give may later be used to steal your identity.Sometimes you’ll get requests for sensitive data—say your bank account number—in response to pleas for money from “family members” or a foreign money scam. Deals that sound too good to be true, usually are. [click]Which leads me to the next point: Avoiding scams.[click]
  12. Slide 10: Tip 2 Protect sensitive personal informationTALKING POINTSOur second tip is to protect sensitive personal information which includes social security numbers, passwords, addresses, phone numbers, mother’s maiden name, and bank account, credit card, and PIN numbers.Of course, protecting this info is important in all online activities, but especially when you are making any type of financial transaction online—for instance, banking, shopping, or making donations. [click]Secure webpage. So before you enter sensitive data like that, look carefully for signs that the web page is secure. The Woodgrove Bank example on the screen illustrates good indicators that include:A web address that begins with https. (The “s” stands for secure.)A closed padlock either next to the web address or in the lower right corner of the window. These tell you the website uses data encryption, an extra security measure that helps protect your sensitive data as it traverses the Internet.Make sure you are at the site you want and not a fake. If you’re using a recent version of Internet Explorer, for example, a sign of trustworthiness is the green address bar, like the one you see here. Plus, if you were to click the down arrow next to that padlock, a matching Woodgrove Bank web address would appear. When both addresses match, you can be quite certain that you are where you want to be. [click]Next, save bill paying and online purchases for a secure Internet connection at home rather than risk using a public computer or wireless network, which may not be secure. (Of course, this advice depends on protecting your home wireless connection with a password. Find out how to do this from the company that provided your router.) [click]Keep sensitive info to yourself. Never share sensitive information in response to a request in email or IM or on a social network.Responding to such requests can often direct you to a web page or a toll-free number, where the information you give may later be used to steal your identity.Sometimes you’ll get requests for sensitive data—say your bank account number—in response to pleas for money from “family members” or a foreign money scam. Deals that sound too good to be true, usually are. [click]Which leads me to the next point: Avoiding scams.[click]
  13. Slide 11: Tip 2 Protect sensitive personal information: avoid scamsTALKING POINTSScams come in all varieties. They can include links that advertise false products, hoaxes that claim you’ve won a lottery you never entered, offers of large sums of money if you help transfer funds, or urgent requests to update private account information like the scam email shown here. All scams are designed to collect personal information so the scammer can steal your money or your identity (or both). [click]The best ways to avoid them are to use common sense and learn to recognize some telltale signs, such as: [click]Number 1 is a suspicious email address. You can see that the actual email address of the sender has nothing to do with Windows Live® Hotmail®. [click]Number 2 Look for generic salutations (like “Dear Account User”) rather than ones using your name. [click]Number 3 Look for an alarmist tone in messages. The scammer is trying to create a sense of urgency so you’ll respond without thinking. Here it’s the threat that the recipient’s Hotmail account will be closed if he or she doesn’t give the information requested. [click]Number 4 Watch for misspellings or grammatical errors, which are tactics used to break through phishing filters. [click]Number 5 There may be requests for sensitive data to verify or update an account or stop payment on a charge.Once you get the hang of it, spotting the red flags that characterize a scam isn’t hard. So when you do see scams like these, here are a couple of things you can do:Never reply to spam, not even to ask to be removed from the mailing list. Just mark it as junk mail or delete it.Don’t buy, invest, or donate anything based on an email solicitation. It is safer to contact the organization directly. [click]
  14. Slide 12: Tip 3 Create strong passwords and keep them secretTALKING POINTSTip number 3 is to create strong passwords and keep them secret.We use passwords in so many places—for email accounts, social network sites, the library, bank accounts, games, online stores, our computers. Strong passwords are important because if someone is able to steal, say, your computer’s login password, all the information protected by that password is then at risk. [click]Does anyone know what the number 1 most commonly used password is?That’s right: Password. Please do not use “password” as your password!!! And yes, 123456 or your pets’ names are no good either!  Too easy a code to crack. [click][Speaker note: This is a true story you may want to tell before you click. During a password audit by Microsoft and Google, they found a child using this password: z"MickeyMinniePlutoHueyLouieDeweyDonaldGoofyOlympia." When asked why she had such a long password, she said she was told that it had to be at least eight characters long and include at least one “capital.”] To make passwords strong, use long phrases or sentences that mix capital and lowercase letters, numbers, and symbols.Start with something like Strong passwords are safer. With a little tinkering, you can come up with a password that is very strong and yet memorable, like the one you see on the screen: Str0ngpassw0rdsRsafer!Did you see how the color bar changed from red to yellow and finally to green as the password was entered. That was Microsoft’s password checker in action, which you can use to check the strength of your password. I’ll give you the link to it at the end of this presentation. [click]Don’t use the same password everywhere. If it’s stolen or inadequately protected by the site, all the accounts it protects are at risk. [click]Don’t share your passwords with anyone or be tricked into giving them away. Many account takeovers occur because the owner disclosed the password. [click]
  15. Slide 13: Tip 4 Take charge of your online reputationTALKING POINTSChances are, you already have a reputation online, even if you don’t know it. The fourth tip has to do with protecting and maintaining a positive online reputation. [click]First, discover what is on the Internet about you.Use multiple search engines and all variations of your name. Search for images as well as text.Review what others have posted about you in comments, pictures, or videos. Explore blogs, personal pages on social networks, and photosharing sites. [click]Then evaluate the story that information tells. Because information online is searchable, often permanent, and may be seen by anyone on the Internet, ask yourself some questions. Your answers are important—they may determine what personal information you decide to share.Does it reflect the reputation you want to have? Is it accurate? If not, what should be deleted or corrected?Do you need more than one online profile—whether professional, personal, or for an area of interest, like a hobby or volunteer work? If so, is it okay to mix info from different profiles? If so, what is okay to mix?Do you want your profiles to be public or more private? [click]Next, take steps to protect your reputation. Think about what you are posting and how it will reflect on your reputation.Talk with friends about what you do and do not want shared. Ask them to remove anything you don’t want disclosed.Periodically reassess who has access to your pages. It’s okay to remove those who no longer belong in your circle. [click]Cultivate your reputation. Be proactive about sharing online the positive things you do. For example, link anything you publish to your name. [click]And finally, if you find information about yourself that doesn’t fit the reputation you want to uphold, take steps to restore your online reputation.In a respectful way, ask the person who posted it to remove it or correct an error.If the person doesn’t respond or refuses to help, ask the site administrator to remove the digital damage. [click]
  16. Slide 13: Tip 4 Take charge of your online reputationTALKING POINTSChances are, you already have a reputation online, even if you don’t know it. The fourth tip has to do with protecting and maintaining a positive online reputation. [click]First, discover what is on the Internet about you.Use multiple search engines and all variations of your name. Search for images as well as text.Review what others have posted about you in comments, pictures, or videos. Explore blogs, personal pages on social networks, and photosharing sites. [click]Then evaluate the story that information tells. Because information online is searchable, often permanent, and may be seen by anyone on the Internet, ask yourself some questions. Your answers are important—they may determine what personal information you decide to share.Does it reflect the reputation you want to have? Is it accurate? If not, what should be deleted or corrected?Do you need more than one online profile—whether professional, personal, or for an area of interest, like a hobby or volunteer work? If so, is it okay to mix info from different profiles? If so, what is okay to mix?Do you want your profiles to be public or more private? [click]Next, take steps to protect your reputation. Think about what you are posting and how it will reflect on your reputation.Talk with friends about what you do and do not want shared. Ask them to remove anything you don’t want disclosed.Periodically reassess who has access to your pages. It’s okay to remove those who no longer belong in your circle. [click]Cultivate your reputation. Be proactive about sharing online the positive things you do. For example, link anything you publish to your name. [click]And finally, if you find information about yourself that doesn’t fit the reputation you want to uphold, take steps to restore your online reputation.In a respectful way, ask the person who posted it to remove it or correct an error.If the person doesn’t respond or refuses to help, ask the site administrator to remove the digital damage. [click]
  17. Slide 14: Tip 5 Use social networks more safelyTALKING POINTSLet me ask you this: How many of you have joined (or have kids who have joined) any of the social networks like those illustrated here—Facebook, Xbox LIVE®, YouTube, Foursquare? Or have you used services like Skype?The pointers that follow will help you make those connections safer. [click]Use Settings or Options featuresto help you:Manage who can view your profile and how public or private you want your profile to be.Control how people can search for you—for example, by high school, current town, or employer.Block any unwanted access.And as your preferences change over time, check those settings and modify them as needed. [click]Be selective about accepting new friends.Don’t accept requests from people you don’t know. Think before accepting colleagues or acquaintances, too.Periodically reassess who has access to your account. Friends can change over time.Review what your friends write about you. Make sure they don’t share sensitive information. It’s okay to ask someone to remove anything that you don’t want disclosed. [click]Think before you post something online. Remember that what you post may be seen by anyone and once it is out there, it’s probably out there for good.Keep to yourself details that could be used to identify you or your location—home address, phone, account numbers, etc.Never share your whereabouts. For example, wait to share vacation details until after you come back. No one needs to know that you are not at your house at a specific time.[Note for speaker:You could mention pleaserobme.com, a site that was developed to help raise awareness about over sharing. It aggregated all of the social networking posts that revealed when people weren’t home.]Don’t post anything you’d say only to a close friend.Pay attention to what you post about others (including pictures), being careful not share their sensitive personal information. [click]
  18. Slide 9: Share with careTALKING POINTSIt’s important to remember that you lose control once you post something, and itcan be on the Internet forever. For sure, Vanessa should not have posted that image. But it would have been safer if Vanessa had never taken the photo in the first place.Did you know that anyone under the age of 18 who has sent a suggestive photo or video of themselves or friends—in a text or Facebook message, say (also known as sexting)—runs the risk of being charged with breaking laws that prohibit the distribution of child pornography? And that anyone who gets the images may also violate laws which forbid possessing child pornography?If convicted, they could face the same fate as adult pornographers—jail time as felons (with potentially long sentences), registration as a sexual offender, and so on.These laws are one example of the consequences of losing control, so let’s talk about some of the ideas you’ve mentioned to help you keep control of your info, friends, and reputation. [click]Private pages. Does anyone know how to make social network pages private? On Facebook, for example? [OR: What other social networks do you use? How would you control your privacy there?]Look in Settings, Options, or Preferences for ways to manage your privacy: who can see your profile or photos tagged with your name, how people can search for you, who can make comments, and how to block people.Another idea: Some sites let you create separate friend lists—for family, your sports team or school club, your closest friends, and so on—so you can manage what you share with each group.From time to time, review your settings because these sites change what you can control (particularly in response to public pressure—Facebook is a perfect example). [click]Personal info. No settings are perfect. No matter how private you make your pages, remember that whoever has access (your friends) can still forward what you post. You still need to use good judgment.Keep to yourself sensitive details that could be used to impersonate you, defraud you, or find you in person—your home address, phone and account numbers, age or birth date, even photos, especially suggestive ones. This also means creating profile pages on socials sites or in games that don’t show such details. This is particularly important for Twitter profiles, which are public by default.Of course, you don’t want to share your password. We’ve already talked about the problem with that!Don’t post anything you’d ordinarily say only to a close friend, including feelings. Whether you’re happy, sad, angry, or have money worries, confiding broadly could increase your risk of being bullied or targeted for scams.If you use a check-in service, pay attention to where and when you check in.Think about who will know where you are—a teacher, your parents? Will it harm your reputation? Are you alone? If so, is it safe?Consider restricting who knows your location. [click]Adding friends.Consider friending only those you or your close friends have met in person, or with whom you have friends in common.Look at your friends list from time to time and make sure everyone who’s there still belongs. Friends change over time.Review what others write about you.Make sure they don’t post anything you don’t want to share, like private photos, or tell where you are (like you’re out of town on vacation with your family).It’s okay to ask someone to remove information that you don’t want to tell. [click]Accomplishments. Post what you’re proud of and want others to see—a recital video, academic successes, pictures from a school play, a persuasive essay, art you made, or music you performed. Adding good material about yourself is also a way to push the negative stuff lower on your pages, like pictures you wish you hadn’t posted or mean comments by others.So, did you know that the adult world is so interested in how you share on social networks that they’ve done research on how you interact on them? [click]NOTES FOR SPEAKERAbout sexting and child pornography. For some background on the legal and practical issues related to sexting, turn to the 2010 report, “Sexting: Youth Practices and Legal Implications” (//cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/Sacco_Argudin_Maguire_Tallon_Sexting_Jun2010.pdf) from the Berkman Center at Harvard University.Private pages. If you have Internet access for your presentation, kids could look up the specifics about how to specify privacy settings for Facebook (and perhaps one other social site) on their phones or laptops, and report to the group.If you feel comfortable with the group you’re talking with, and with taking a more relaxed approach, consider asking them to expand on each bullet point instead of giving the explanations yourself. Then fill in where they don’t have ideas.
  19. Slide 15: Connect honestly and carefullyTALKING POINTSDownload files legally. You saw what happened to the gamers. Get permission or pay before you download copyrighted content like music and games; otherwise, downloading is illegal. Plus, it’s also safer for your computer, because pirated files are often used to secretly distribute viruses and spyware. Well, it’s a secret until you realize that the malware has slowed your computer to a crawl, delivers nonstop ads, or destroys what’s on your hard drive. [click]Use web content honestly. If you use the web for schoolwork:Put the ideas you find there into your own words. Don’t simply copy text from the web. Give credit to those who came up with ideas, and the words they use to share them.Don’t buy finished essays or reports and turn them in as your own work. When you copy web content and buy reports you are plagiarizing. Your school has rules against plagiarism—and consequences for breaking those rules, too. (Plus your teachers have ways of finding out that it wasn’t your own work.) [click]Use social sites appropriately. Make sure to follow the rules of social sites so you’re not kicked off. For example, Facebook requires you to be at least 13 years old before you can create an account. (In some places, the age limit may be even higher.) In addition, social sites may have special safeguards for minors. For example, they may restrict adults from sharing and connecting with them. [click]Meeting an online “friend” in person is a VERY risky thing to do—online, someone can pretend to be anyone. I don’t recommend it, but if you must, get permission from your parents. Always bring a parent, a trusted adult, or a friend, and meet in a busy public place. And be on your guard: bring along your mobile phone and keep it on.Okay. We’ve covered the five top points of advice from Microsoft. Let’s recap what we’ve come up with. [click]NOTES FOR SPEAKERThis would be a good time to distribute the printed tip sheet, “Top Tips for Online Safety.” As you recap each point, you can review it in the brochure as well as any links to instructions about how to do things like create a strong password.
  20. Slide 15: Tip 6 Take extra steps to help keep kids safer onlineTALKING POINTSThe sixth and final tip is about protecting your kids online, which I know is very important to all of you, whether you have children, grandkids, or nieces and nephews. You’re in the best position to make decisions about what is appropriate for children and to talk to them about online safety. Kids may know the technology better than you do, but you have the wisdom to show them how to make smart choices and to help them use it safely. [click]First, set clear and age-appropriate rules for Internet use. Make online safety a family effort, a mix of guidance and monitoring. Negotiate clear guidelines for using the web and online games that fit your kid’s maturity and your family’s values. Discuss what sites are appropriate, what information can and can’t be shared, and the boundaries for communicating with others through gaming, IM, mobile phones, and on social sites.For the younger ones, keep the gaming consoles and computers (especially those with webcams) in a central location at home and restrict access to websites with offensive content.Teach kids to keep personal information private. Help all kids choose email addresses and account names that are not suggestive. Teach them how to create strong passwords and not to share them with anyone but you.Remind kids to treat others as they would like to be treated—to be kind and honest online.Teach kids safe and responsible computer use—to be careful about accepting new friends and not to open attachments or click links with so-called “free offers.” [click]Keep communication open.Have regular discussions with kids about their online activities—who their friends are, the games they play, and the sites they visit. This is also a great way to stay involved in their lives and learn about their interests.If there’s a problem, teach kids to trust their instincts. Ask them to come to you and you’ll do what you can to help solve it. It’s important to make sure kids know that you won’t punish them or take away their privileges or devices if they come to you. [click]Use family safety software as appropriate and set specifically for each child to help minimize the safety risks. For example, Microsoft has built family safety controls into all home editions of Windows Vista® and Windows 7. [click]Using the Parental Controls panel, you can:Create separate accounts for each family member.Specify which websites kids can visit and which programs they can use. Get detailed activity reports to look for potentially inappropriate sites the child might be visiting.Limit access to PC software games based on title, content, or rating. [click]And last, you can specify when and how long kids can use the computer.[click]
  21. Slide 7: Step 1 Pay attention to kids’ activities onlineTALKING POINTSJoin. Just as you’d start in the pool with the littlest ones, regularly sit with young ones while they play online. Or—even more fun--play with them! Let them show you what they’re doing and who they’re interacting with. [click]Evaluate. Visit the websites your children want to visit and, if you can, test the games they want to play. Evaluate the devices children want to use before they use them—preferably before you even buy them.Experiment to make sure you’re comfortable with their features. Restrict any functionality your child isn’t yet ready for. Some examples of features to explore:GPS on mobile phones—this is the phone’s ability to pinpoint where you are at any given time and mark (or “tag”) the location of photos.Internet access on mobile phones.Computer webcams for use with video calls like Skype.The ability to send unfiltered images or download applications (apps). [click]Locate. Put Internet-connected game consoles and computers—especially those with webcams—in central family spaces, and explain why you’re doing this. Make video calls there, too. This helps you watch over kids more comfortably. [click]Watch. As your little ones begin to navigate the web on their own, keep on the lookout for changes in behavior that may be signs of cyberbullying or other issues—for example, if children show an uncharacteristic reluctance to go online or to go to school, unusual secretiveness, or they seem to be spending too much time online. [click]
  22. Slide 9: Step 2 Set clear rulesTALKING POINTSAs children begin to go online, these three rules offer supportive guidance with room to grow. Set the stage by discussing with kids …the kinds of sites that are off limits,what information shouldn’t be shared, andthe boundaries for communicating respectfully.Explain that the rules are to protect, not to control, them.Let’s take a closer look at each rule. [click]
  23. Slide 6: What is online bullying?TALKING POINTSKids can bully others online using any type of Internet-connected device—gaming consoles, laptops, mobile phones and their cameras—through web services like instant and text messaging, games, or social media like Facebook, Tumblr, Twitter, or YouTube. [click]Kids who bully may:Send repeated hurtful or threatening messages to a target’s phone or in an online game, post embarrassing pictures on a social network site, or distribute a humiliating video or digitally altered photo.[click]Disclose secrets or private information—for example, by posting a confidential email or text, or tricking someone into revealing a secret and then forwarding it. [click]Deliberately shut someone out of an online group—in a game or virtual world (like Club Penguin or Second Life), or on social media. A bully may even create a page on a social site solely for the purpose of demeaning someone. [click]Impersonate the target. Break into someone’s phone or social network account, and post or send hateful comments or make trouble with friends. [click]Pretend to befriend someone, gain his or her trust, and then betray that trust. Understanding how cyberbullying can occur gives you some insight into how you can help kids who may experience it. So let’s discuss some things you can do to help kids make choices that are good for them whether they observe online cruelty, have been on the receiving end, or have bullied others. [click]NOTE TO SPEAKERIf you’re comfortable with these ideas, you could check with your audience to see if they have any questions.
  24. Slide 7: What you can doTALKING POINTSWe’ll start with something you already know—the importance of paying attention to kids and what they do online—before bullying ever even comes up, so you’ll be tuned in to what their online interactions are like.Then we’ll discuss how empathy can help kids who witness online cruelty stand up for others, and how it can help guide your actions when kids are involved in online bullying whether as a target or by being mean to someone. [click]
  25. Slide 16: What to do if there is a problemTALKING POINTSMost of the time spent on the Internet is safe, but if you run into problems, it’s good to know what to do. [click]NOTE FOR SPEAKERThis would be a great time to distribute the printed tips. That way you can point out the links on the back where people can go for each of the issues they might face.
  26. Slide 17: What to do if there is a problemTALKING POINTSWhen using email, a social network, or other web serviceIf you encounter scams, offensive material, content that exploits minors, threatening behavior, or theft of your account, report it. For example, in Microsoft services or software look for a Report Abuse link, or contact the company at microsoft.com/reportabuse.If your email account is taken over by someone, change your password immediately (if possible) and report the incident to your email provider. [click]If you experience continued harassment or physical threats, report them to local police, and if a child or teen is involved, to the National Center for Missing and Exploited Children. [click]If your identity is stolen or you have responded to a scam, immediately change the passwords and PINs on all your accounts, and report:The incident to your credit card company, bank, or health insurer.Identity theft, scams, or fraud in the United States to the U.S. Federal Trade Commission (FTC). [click]
  27. Slide 18: Let’s recapTALKING POINTS[Note for speaker: Again, if you’ve distributed the printed tips, people will be able to follow as the tips come up on the screen. This is also a good time to point out all the links that you referred to earlier.]We have covered a lot in a very short amount of time and the top six tips may seem more like 36 small ones! But again, if you can just remember the ones that resonate most with what you and your family do online, you are on your way to better protecting yourself.
  28. Slide 19: Microsoft’s online safety resourcesTALKING POINTSSo here’s a list of online safety resources from Microsoft.Microsoft.com/security offers articles on online safety topics as well as access to all sorts of safety materials like brochures, tip cards, and videos.Visit Microsoft’s Twitter, Facebook, and YouTube pages to get more helpful online safety tips tools, and videos.[Note for speaker: Round out your presentation with a discussion among audience members so they can share their experiences, or try a question-and-answer session if you feel comfortable answering questions on online safety.]Thank you for your time today. Be sure you take your materials home. If you have comments or questions, I’d be happy to take them now. [click]