Cyber Awareness for Parents ONLY How to support your family in an always-connected world
Your Presenters… Tim Rapoza • 20 years working in technology field; the last 12 years working in Educational Technology. • Dighton Middle School Council • Dighton-Rehoboth Technology Steering Committee • Dighton-Rehoboth Regional School Committee Chris Andrade • 20 years working in technology field. • Dighton-Rehoboth Regional School Committee
ONLINE SAFETY BASICS • Never share names, schools, ages, phone numbers, or addresses or any personal information. • Never open an email from a stranger – it may contain a virus that can harm a computer. • Children should never send pictures to strangers or view pictures that strangers send to them. • Never allow your children to meet with someone from an online session unless the parent approves. • Keep passwords private (except to parents). • Tell a trusted adult if something mean or creepy happens on the Internet. • Never respond to an unsubscribe on a pornographic email. • MOST IMPORTANT – Parents must take the time to discuss these guidelines with their children.
COMPUTER PLACEMENT PAST PRACTICE • Place your computer in an open room with the monitor facing out. This allows you to see and control what is occurring on the Internet. NEW REALITY • Most children age 9 and above already have an iPod Touch or other “smart” handheld device / phone. This IS a computer and exposes your children to all the same online threats that an “old school” desktop computer can – and it fits in their pocket.
CHAT ROOMS A few years ago “chat rooms” were a separate entity on the internet and were pretty easy to restrict. Today virtually every web-enabled application has a chat feature built into it. • Oovoo • Facebook • Instagram • Skype • Kik • Pinger • Twitter Some particularly dangerous websites like “chatroulette” promote anonymous chatting and are targeted specifically towards teens and readily incorporate webcams into the chat sessions.
Pictures speak louder than words • Everybody has a camera/camcorder! • Inappropriate photos / sexting • Cyber-bullying via texting • Your child may not realize that recording a person’s voice without their knowledge is a felony.
So, What can you do about it ? • Parental controls in routers – FREE • Norton Security – FREE! • Internet Filtering – FREE! • Admin Passwords on Computer • Children should not have devices locked with PINs • Content restrictions on devices (iPhone/iTouch) • Sharing/privacy settings on Facebook
Parental Controls WHY USE PARENTAL CONTROLS • Block and eliminate computer viruses • Monitor and block inappropriate web sites • Protect personal information COMMON METHODS • Blacklist • Whitelist • Content Filtering & Monitoring EXAMPLES • PC based - Demonstration • Wi-Fi / Router based – Demonstration • Web based – Demonstration • Device based - Demonstration
PC Based Security WHY USE SECURITY SOFTWARE • Pro – Easier to configure than Router or web filtering • Con – Can’t protect other devices (iPods, iPads etc ..) – Software must be installed on each computer FREE SECURITY SOFTWARE • Norton Security (free for Comcast subscribers) • Microsoft Security Essentials • AVG Antivirus PAID SECURITY SOFTWARE • Kaspersky Internet Security 2013 • McAfee Internet Security 2013
Wi-Fi / Router Based Security When to use • Use when you have multiple devices. • Pro’s – Free and usually has support from router mfg. – Customizable time schedules to permit/allow access – Nothing to install on individual computers • Con – Can be a bit challenging to configure – Blanket security – same for ALL devices
Web Based Security When to use • Use when you have multiple devices. • When you need content filtering • Pro’s – Fairly easy to configure and free! – Nothing to install on individual computers – Content filtering • Con – Blanket security – same for ALL devices – Pretty easily bypassed if you know just a little bit about networking.
Device Based Security When to use • Use in conjunction with PC based software to protect individual non-PC devices. • Pro’s – Easy to configure and free! – Customizable security to each users device • Con – has to be configured on each device separately
What to watch out for • Bypassing of parental controls – Proxies, Static DNS and other mumbo-jumbo • Fake identities on Facebook and other social network sites. – One for Mom and one for ME and my friends • The danger of the stored credit card – iTunes – Kindles/Amazon – Use gift cards not credit cards • If your kid is a geek/nerd/techie …. – He/She will find ways to bypass any security you put in place. – In this case the best method is trust and frequent conversation even if you don’t understand what they are talking about . (geeks love to explain things)
Security Links ROUTER BASED SECURITY TOOLS • Open DNS: http://www.opendns.com/ • Netgear Parental Controls (Open DNS): http://countries.netgear.com/lpc • D-link Parental Controls (Open DNS): http://www.dlink.cc/tag/parental-control • Linksys Parental Controls (Netopia): http://support.linksys.com/en-us/support/ccc/PARENTALCONTROLS • Linksys Parental Controls (Cisco Connect): http://kb.linksys.com/Linksys/ukp.aspx?pid=80&vw=1&articleid=21458 PC SECURITY TOOLS • Norton Comcast Download: http://xfinity.comcast.net/constantguard/Products/CGPS/norton/ • Norton Family Safety Login: https://onlinefamily.norton.com/ • Microsoft Security Essentials: http://www.microsoft.com/security/pc-security/mse.aspx • Microsoft Family Safety Tools: http://www.microsoft.com/security/family-safety/compare-tools.aspx • AVG AntiVirus FREE 2013: http://free.avg.com/us-en/homepage MOBILE SECURITY TOOLS • Mobicip: http://www.mobicip.com/products/ • McGruff Crime Dog: http://www.gomcgruff.com/ • Android Parental Controls 101: http://digitalsecuritymom.com/archives/260 • Apple iOS Parental Controls: http://support.apple.com/kb/ht4213 • Apple iTunes Parental Controls: http://support.apple.com/kb/ht1904
Questions…
Recommend
More recommend