1 / 13

Keeping your family safe in the digital world

Keeping your family safe in the digital world. The blessings of technology.

tamra
Download Presentation

Keeping your family safe in the digital world

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Keeping your family safein the digital world

  2. The blessings of technology “We live at a time when technology can be used to replicate reality, to augment reality, and to create virtual reality. For example, a medical doctor can use software simulation to gain valuable experience performing a complicated surgical operation without ever putting a human patient at risk. A pilot in a flight simulator repeatedly can practice emergency landing procedures that could save many lives. And architects and engineers can use innovative technologies to model sophisticated design and construction methods that decrease the loss of human life and damage to buildings caused by earthquakes and other natural disasters.” Elder David A. Bednar, “Things as They Really Are,” may3, 2009

  3. The adversary perverts this blessing “If the adversary cannot entice us to misuse our physical bodies, then one of his most potent tactics is to beguile you and me as embodied spirits to disconnect gradually and physically from things as they really are. In essence, he encourages us to think and act as if we were in our premortal, unembodied state. And, if we let him, he can cunningly employ some aspects of modern technology to accomplish his purposes.”

  4. Avoid Internet Dangers • When using the Internet and related tools, protect yourself, your family, others, and the Church from the dangers found online. Some of these dangers include viruses, spyware, and other malicious software; identity theft; and pornography. Other Internet dangers include incorrect and misleading information about important gospel principles, excessive time spent on the Internet, and misrepresentation of people’s intent and identity. • Internet filtering reduces but does not eliminate these risks. Ensure that computers and devices connected to the Internet have proper protections in place. Protections include antivirus and anti-spyware applications, content filters, and other security tools. Internet safety may also be increased as family members help one another. https://www.lds.org/pages/internet-usage-helps?lang=eng

  5. Consider the following suggestions: • Place computers in commonly used areas of the home. • If you use e-mail or social media sites, consider establishing accounts on a family basis, rather than for each individual. • Actively monitor website access to help family members remain safe. • Discuss Internet and media safety with children from an early age. • Be alert and aware of media that enters the home through computers, mobile media players, and mobile phones. • Share access or passwords to private e-mail and social media sites with your spouse. • Talk to your stake technology specialist for other suggestions and advice.

  6. topics • Personal security • Steps to consider & take to protect a person online • Computer/device security • Steps to protect the device and data on it • Security in the Cloud • Network security • Considerations for home network security • Considerations for connecting to open wifi networks

  7. Personal security • Internet filter (parental control) • Track web history, searches, social networking • Keyword and website filtering/blocking • File transfer blocking • Remote reporting (email, website, etc) • Passwords (best practices) • Use a good password manager • No personally identifiable/important people or things • Don’t use the same password for multiple sites/logins • Longer is better. Always use numbers and special characters (if allowed) • <>Treaded55SandDough

  8. Personal security • Browsing and Internet privacy • Use HTTPS or SSL anywhere it is available • HTTPS Everywhere https://www.eff.org/https-everywhere-node • DoNotTrackMehttps://abine.com/dntdetail.php • Ghosteryhttps://www.ghostery.com/ • Consider 2-step authentication • For social sites: set the privacy setting to the most restrictive possible

  9. Computer security • Security suite • Protect against all threats (malware, scareware/ransomware, rootkits, phishing attacks, etc) • Email & IM scanning • Registry startup protection • How much does it slow down the PC? • Only install one suite on your PC • OS & application updates • Encrypt your local drives using FileVault or BitLocker

  10. Network security • DSL router/firewall • NAT firewall • Parental controls (bonus) • VPN support (if you work from home) • WEP vs. WPA vs. WPA2 vs. ???? • Ditch the stock configuration • Change the SSID • Change the channel • Use a strong password

  11. Mobile safeguards • Encrypt all data • Use a password • Install a remote wipe app • Anti-virus not necessary, but not a bad idea (Android is more exposed than iOS) • Physical lock for laptops? • Don’t let your device talk to strange networks

  12. Non-computer safeguards • Don’t keep your social security card in your wallet. Don’t have your SSN printed on your DL. • Be careful who you give your personal identifying information to. • Shred or burn everything • Check your credit regularly (every 3-4 months) • Check your bank & credit card statements monthly • Always know where your credit & debit cards are. • Get rid of your debit/credit card • “[Security experts] recommend using a simple ATM card along with a separate credit card, rather than the combined debit/credit cards that are now so popular. That constitutes a tradeoff, unfortunately, given that many banks are now requiring a minimum number of debit-card-used-as-a-credit-card purchases in order for account holders to qualify for high-performance bank accounts, which pay slightly less anemic rates than otherwise.”

  13. Useful links • Electronic Frontier Foundation: https://www.eff.org • Adjust Your Privacy: http://adjustyourprivacy.com/ • National Cyber Security Alliance: http://staysafeonline.org/ • LDS Tech Family Safety: https://tech.lds.org/wiki/Family_safety • US-CERT: https://www.us-cert.gov/ • Google Alerts: http://www.google.com/alerts • This presentation: http://logandaletech.weebly.com/presentations.html

More Related