1 / 0

STAYING SAFE IN A DIGITAL WORLD

STAYING SAFE IN A DIGITAL WORLD. Part 2 – Protecting your identity and your family from the threats of the electronic age. Overview. Safe web use practices Protecting your identity Protecting your family What to do when something bad happens. Bio and Disclaimer.

arwen
Download Presentation

STAYING SAFE IN A DIGITAL WORLD

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. STAYING SAFE IN A DIGITAL WORLD

    Part 2 – Protecting your identity and your family from the threats of the electronic age
  2. Overview Safe web use practices Protecting your identity Protecting your family What to do when something bad happens
  3. Bio and Disclaimer Opinions of Kevin Bong kbong@johnsonbank.com, not those of Johnson Financial Group. Software and website recommendations are my experience, your mileage may vary. Kevin Bong is the Director of Security for Johnson Financial Group. Kevin has a BS in Physics and Computer Science from Carroll University, an MS in Information Security Engineering from the SANS Institute, and has earned multiple computer security certifications including the GIAC GSE. Kevin is also an amateur astronomer, beekeeper, a SANS author and community instructor, and a pretty neat Dad.
  4. Social Networking Sites Limit the amount of personal information you post. Be wary of strangers. Be skeptical. Take advantage of a site's privacy settings. Be wary of programs that people share with you Use and maintain anti-virus software.
  5. Parental Controls The internet is too dangerous to give your child “privacy” Have access to email, frequented chat rooms, phone text messages and pictures Review them regularly - make oversight a habit, not an event. Keep your home computer in a central and open location; be aware of other computers your child may be using. Surf the Internet with your children.
  6. Parental Controls – con’t. Use parental control tools that are free from many Internet service providers or can be purchased in software packages. Create and discuss rules for computer use with your children. Post these rules by the computer as a reminder. Rules should include a list of permitted chat areas. Know your children's online friends.
  7. Parental Controls – con’t. Teach your children never to give out personal information to people they meet online such as in chat rooms or bulletin boards. Know whom to contact if you believe your child is in danger. If you know of a child in immediate risk or danger, call law enforcement immediately. National Center for Missing and Exploited Children
  8. Child Predators/Child Abuse It happens to more kids than you think It happens to smart kids at all ages Be wary in the digital world and the real world Child predators are very crafty at fooling kids and adults Trust your gut! Act!!
  9. Parental Control Software Many ISP’s provide filtering solutions Free and Paid-for software products available http://www1.k9webprotection.com/ http://kids.getnetwise.org/
  10. Shopping Online Get some background on the seller Vendor reviews, consumer feedback/reporting sites Google – search by address, phone, email Be aware of common scams Look for security clues – https://, Padlock icon Safe payment options – Credit Card is safest Paper Trail – receipts, review cc statements
  11. Be Wary of Scams On (and Off) Line Counterfeit Check Scams Lottery Online Classifieds and Auctions Job listings comparison shopper money transfer agent (work at home!)
  12. Identity Theft Dumpster Diving Skimming Phishing Change Address Old-Fashioned Stealing “New-Fashioned” Stealing Pretexting
  13. Identity Theft - Deter Safeguard your Information Shred documents before discarding Protect your SSN Don’t give out personal info unless you know who you are dealing with Keep personal information in a safe place, especially if you have roommates, employ babysitters or other outside help, or are having work done in your house.
  14. Identity Theft - Detect Be alert to signs that require immediate attention: Bills that do not arrive as expected Unexpected credit cards or account statements Denials of credit for no apparent reason Calls or letters about purchases you did not make Inspect your credit report and financial statements http://www.annualcreditreport.com
  15. Identity Theft - Defend As soon as you suspect ID theft Place a “Fraud Alert’ on your credit reports Close associated accounts File a police report Report theft to the FTC
  16. Checklist for When You Get Home Talk to your kids about online predators, sexting, etc. Review kids browsing history, call history, Myspace/Facebook account, email – start the habit today Check your free credit report
  17. Thank You
More Related