Cyber Safe – WGC Parents

Slides:



Advertisements
Similar presentations
Surfing the net: Ways to protect yourself. Internet Safety Look into safeguarding programs or options your online service provider might offer. Look into.
Advertisements

How do I talk to my child about Internet safety? How do I protect my child from cyberbullying? What do I do if my child is cyberbullied? What information.
Definition Is when a child, preteen is tormented, threatened, harassed, humiliated, embarrassed, or otherwise targeted by another child, preteen, or teen.
Cyberbullying Contributed by Sarah Bell All resources in the "Safeguarding Resources" section of our resource bank have been submitted by delegates on.
What is identity theft, and how can you protect yourself from it?
CYBERSAFETY Acting Sergeant Kate Brown Christchurch Police Youth Education.
You can socialise with the internet by using websites such as Facebook, twitter and MySpace. The good things about this is that you can talk to your friends.
How do you use the internet?
e-safety and cyber bullying
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
Created by Mr. Hemmert.  Have you ever received a mean or instant message? Have you ever sent one? This is called cyberbullying. A cyberbully uses.
Internet Safety By: Brianna Brown. Index What Is Internet Safety? Passwords Cyber Bullying Safety Tips Quiz.
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Cyberbullying By: Kayla Banks EDF 204 Spring 2015.
Technology Safety Ways to be safe on the internet and social world.
Stay Safe on the Internet!
Lets Put An End To Cyberbullying By Derek and David.
Scams & Schemes Common Sense Media.
Donette Mullinix ED 505 UWA Clipart:
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
November 10,  Acceptable use  Internet Filtering  Social Web (MySpace, Facebook, etc.)  Cyberbullying  Plagiarism  Phishing.
 ❂ Cyber bullying is a mean or threatening  ❂ Cyber bullying is forwarding a private IM communication to others  ❂ Cyber bullying is a humiliating.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
Company LOGO Internet Safety By: Melissa Pinnell.
Internet Safety Mr. Richard Orr Technology Teacher Murphy Jr. High School.
My Digital Footprint.
Scams and Schemes Essential Question: What is identity theft, and how can you protect yourself from it?
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
I’M CYBER SAFE.
Cyberbullying Activity 4: Advice Quiz. Ask an Internet Expert These people need help from someone who knows how to be safe online... YOU! What advice.
Internet safety.. Dangers of the internet: Paedophiles. Cyber bullying. Money theft. Sexual harassment. Identity theft. Hacking of your accounts. Viruses.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
Aristotle, a great thinker, once said: “We are what we repeatedly do.”
Cyber Safety with Cell Phones By: Tanner Putnam. Cell phones  Cell phones are used to talk and now are used as mini computers.  You can download APPS.
“Doing the Right thing online” Online Safety. Socializing Communicating Creating Playing Exploring Learning.
PCS Technology for Students: Acceptable Use, Privacy, and Safety.
Online Reputation A guide for children aged 7+
Internet Safety How to stay safe online.
Safe Surfin’ on the Internet
As modern children, we have a huge number of electronic devices available to us. We might use computers, tablets, mobile phones or games consoles; for.
Cyberbullying project
8 online danger tips By: kailee bariring.
Remember cyber Bullying can also lead to death!!!
Welcome to our Online Safety assembly by Year 5/6
Cyber Safe – WGC Wellness Day
How To Be Safe On The Internet
PCS Technology for Staff: Acceptable Use, Privacy, and Safety
Information Security.
Online Safety! By: Michelle Deng.
Netiquette and Online Safety
Cyber-bullying.
Cyber bullying is a form of teen violence that can do lasting harm to young people.
Issues In media studies: Cyberbullying
Appropriate Use of Technology
How many of these apps do you really know?
STOP. THINK. CONNECT. Online Safety Quiz.
Conyers Middle School Advisement Lesson October 20, 2014
By Farhaan Khan (4 White)
Internet Safety Vocabulary
R E A D What is cyber bullying? Hall
Pause Before You Post! CHC Peer Education. Pause Before You Post! CHC Peer Education.
Rules for Being Safe on the Internet for Kids
How to be SAFE when you use the internet..
Santa’s s By……..
Cyber-bullying.
Cyberbullying PREPARED FOR STUDENTS OF SHAC ST. JOHN’S COLLEGE.
Personal Safety Online
Founded in 2002, Credit Abuse Resistance Education (CARE) educates high school and college students on the responsible use of credit and other fundamentals.
Presentation transcript:

Cyber Safe – WGC Parents Mark Knowles Director of Cyber Security and Risk May 2017

What we plan to cover? What is a Cyber Attack Keeping yourself Cyber safe So what? Why would anyone want my details Who can help? How can you protect yourself Cyber Security and Risk at IAG A Career Option?!

What is a Cyber Attack? Cyber attacks according to international law enforcement have become a bigger crime than the world drug trade, Last year more than $400 billion. So what are cyber attacks (Here are a few): Whaling, Phishing Malware, Ransomeware (Cypto Locker) Cyberwarfare and Cyberterrorism Sink Holes Exploit kits Drive byes Grooming, Identity theft

Click here  Many cyber attacks are simple emails You could win, just click HERE You have won $1,000, all we need you to do is to transfer money to this account number and the funds will be relea$ed Emails that look like SPAM usually are SPAM People that you have met online sending you links to documents may not be the most trustworthy …..

How well do I know you? https://youtu.be/F7pYHN9iC9I

So what? And what do I do? Your identity is really valuable NZ Passports are one of the most sort after in the world An adversary may want to sell your details to someone Its not about how much money you have in your bank account So what do you do? Talk to your kids Contact the department of Internal affairs…. (Do a google search on Identity Theft) Don’t ignore it! Its not OK

How good is the support?

So what? And what do I do? Cyber Bullying Cyber Bullying Facts. “Cyber bullying” is defined as a tormenting, threatening, harassing, or embarrassing another person using the internet or other technologies, such as posting embarrassing pictures on social media or sending hurtful or threatening text messages. Over 80 percent of teens use a cell phone regularly, making it the most popular form of technology and a common medium for cyber bullying. About half of young people have experienced some form of cyber bullying, and 10 to 20 percent experience it regularly. So what do you do? Talk to your Kids Contact Netsafe www.netsafe.org.nz/contactnetsafe and or the Police, they will be great Don’t ignore it! Again its not OK

How hacking works? https://www.youtube.com/watch?v=4gR562GW7TI My Mobile phone https://www.youtube.com/watch?v=klJu-KR-jcs

What else can you do? Do the basics right Have a great password Change your password regularly Don’t share your password (except maybe with your parents, yeah right Dad!!) Don’t write your password in a book, under your keyboard Don’t use easy to guess passwords e.g: Password001 P@ssword001 P@$$w0rd001 001P@$$w0rd 12345678

Be smart with your online activity Don’t post anything online you might regret later Photos of you away from home on holiday (when no one is at home) Be careful of sending photos that you don’t want shared Don’t make comments that could be taken out of context Potential employers will look at your Online presence Be careful of Cloud environments that are Public Clouds – As soon as you put something there you no longer own it. E.g. Presentations, Photos, Letters, CV’s

Questions about you??

Cyber Security and Risk at IAG What do we do? I thought we’d tell you a bit about what we do at IAG to protect our company and our customers from Cyber attacks. We’ll give you a few examples.

What about a Career in Cyber? On the good team Why consider a role in cyber security? How many women are working in cyber security? Are there many options? What do you need to study? How long would it take for me to get a role in cyber security? What about if you don’t want to be in a technical role? What is it like when you get into the Cyber Security and Risk team? (Great question for Ben and Murray, Mark may need to leave the room??)

Cyber crimes https://www.youtube.com/watch?v=mCt2hzpyWZc