Protecting your Family From the dark places on the Internet Going beyond the standard PC Filter, and dealing with the multiple devices that access the.

Slides:



Advertisements
Similar presentations
Keeping Your Child Safe on the Internet. Welcome We are first-generation Internet parents Our children are the first generation to be born and raised.
Advertisements

Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
How to protect yourself, your computer, and others on the internet
Internet Safety and Cyber Bullying All info came from
How do I talk to my child about Internet safety? How do I protect my child from cyberbullying? What do I do if my child is cyberbullied? What information.
Developed by Technology Services 1:1 Laptop Initiative
Keeping Your Child Safe on the Internet
Keeping Your Child Safe on the Internet.  To understand what our children are doing online  To keep our children safe when they’re online  To teach.
_Protecting Our Kids New Technology: New Pitfalls Purpose: To help families ask the right questions, and make an informed decision for their children regarding.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Cyber Safety What Every Parent Needs to Know If your child is surfing the Web, you need to be paddling right alongside him/her.
ICT Curriculum Evening – an introduction to Wizkid.
Tracking, Privacy, You & The 21 st Century When you talk online the internet listens.
STRATEGIES. Non-Technical Measures to Protect Kids Online.
Growing up Digital Opportunities and challenges for parents.
Cyber-bullying & Cyber Security UNM Anderson School of Management For Jefferson Middle School’s 8 th Grade InfoTech Class.
Parental Control Awareness Bolingbrook Geek Squad.
Parental Controls What Should You Watch Out For. What’s Out There. There are a lot of new devices and pieces of technology that can go on the internet.
E-Safety at MPL and beyond…... What are the risks our children face? Understanding the potential risks and encouraging safe and responsible use of the.
Teenangel Gabriella. AIM is an instant messaging system. You have to be thirteen years old to use AIM. Besides sending messages, AIM is also used to tell.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Internet Safety Child proofing your home. Personal info No Jesus Know Jesus Entered IT security 5 years ago Certified Ethical Hacker Computer Hacking.
© 2009 SCHOOL FAMILY MEDIA Keeping Your Child Safe on the Internet © 2009 SCHOOL FAMILY MEDIA.
 Social Networking  Posting and watching videos on YouTube  Blogging  Chat Rooms  Visiting Wikis  Googeling virtually ANY subject.
Welcome to E.L. Wright iPad Safety Night I. Using Technology and Protecting Your Child E.L. Wright Technology Department and Richland County Sheriff's.
Keeping Your Child Safe on the Internet. Welcome We are first-generation Internet parents Our children are the first generation to be born and raised.
Internet SafetyInternet Safety Danita RussellDanita Russell Intro.
Social Media Safety Manchester Township Middle School Guidance Department
WIRELESS IN YOUR LIBRARY The Anatomy of a Library Communications Network.
E-Safety E-safety relates to the education of using new technology responsibly and safely focusing on raising awareness of the core messages of safe content,
Parenting 2.0 Raising Responsible Digital Citizens.
Parental controls 101. What are they? Tools to help parents regulate their children’s internet use. You can set them: At network level. On your child’s.
A Day of technology Improving upon your technology skills Giving every child the opportunity to learn in a robust digital environment everyday. making.
Social Media: The Basics Teresa Marks School Community Oral Health Conference Friday, October 16, 2015.
Helping your family to stay in control Living with technology.
Parenting 2.0 Raising Responsible Digital Citizens.
Internet Safety. Sexual Predators Sexual Predators Harmful images – disturbing, overly graphic, explicit Harmful images – disturbing, overly graphic,
Welcome to Parenting in the Digital Age. This session will: Help you to get to grips with what your children are doing online Explain the W-W-W- approach.
Keeping Children Safe Online. Where to report abuse? To report any abuse on social media or internet: CEOP will accept reports from parents, teachers.
Internet Information for Parents. Objectives The Realities Benefits Learn the language Identify concerns and risks Learn strategies to increase safety.
HART RESEARCH ASSOTESCIA Key findings from telephone survey of parents of children who access the Internet, conducted for Who Needs Parental Controls?
Protecting Teens Online Practical Steps. Statistics  One in every three teens say they have been a victim of cyber- bullying  One in every two teens.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Awareness raising session for Parents and Carers June Todd Awareness raising session for Parents and Carers June Todd.
Internet Safety Sam Farnsworth Utah PTA Technology Specialist
Kender Primary School E-Safety for Parents and Carers *Look at how children use the internet *Raise awareness of eSafety issues *Offer guidance on how.
Victor PTSA Fall Forum Don’t Lose Touch With Your Teen Tuesday, October 22, 2013 – 7PM Social media is now an integral part of our every day lives. For.
The internet is a place of both useful and bad information. It has both good and bad side- and it’s all too easy for kids to stray into it. And no parents/guardian.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
E-safety Parent Workshop Helping to keep your children safe online.
Christa Marsh Southern Arkansas University Biology Professor.
Ashdell Safer Internet Evening 2014 Prepared and presented by Dawn Pooley.
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
Dial For Twitter Support Number. How to Join Twitter to Use for Business and Marketing? While the registered users can post and share tweets,
E-safety Training Tuesday, 12 th April, Aims of the session: Examine ‘The Digital Landscape’ – current statistics To underline the message of.
KASPERSKY INTERNET SECURITY FOR ANDROID. YOUR MOBILE DEVICES NEED PROTECTION More online communications and transaction are happening on tablets and phones.
Are your children safe online?. Welcome You are first-generation Internet parents Our children are the first generation to be born and raised with the.
Yarborough Academy E-Safety
Creating your online identity
Tips to help keep children safe on the internet and social networks
Keeping Children Safe Online
Welcome to Parenting in the DigitalAge.
More and more pre-schoolers are using their parents’ computers, smartphones or tablets to play games, use apps, and watch their favourite TV shows.  Habits.
Our Children and Social Media
Tips to help keep children safe on the internet and social networks
Safety in the Digital World
Tools & Tips for keeping your kids safe online
Social Interactions In The Digital Age:
Managing and Monitoring Screen Time
Online Safety Evening 2019.
Presentation transcript:

Protecting your Family From the dark places on the Internet Going beyond the standard PC Filter, and dealing with the multiple devices that access the internet in your home

First, the stats The US porn industry generated $13B in % of all websites are pornography related 25% of all internet searches are porn related 42% of internet users have viewed porn Average age of first exposure to internet porn, age 11 90% of boys have seen pornography by age 18 60% of girls have seen pornography by age 18 71% of teens hide online behavior parents Breakdown of visitors to porn sites o 72% Male o 28% Female Sources:

Some of the dark places Pornography & adult themed sites Social Media – Facebook, SnapChat, Instagram o Some studies suggest 20% of divorces are linked to Social Media usage o Social Networking sites are a common target for predators Peer to Peer/File Sharing o Easy source for adult and illegal content Proxy/Anonymizer o Tools that will allow a user to bypass filters/restrictions Virus/Trojans/Malware/Bots/Spyware/Phishing o Can easily steal private information (identity theft) o Can be used to activate camera, microphone, etc.

Develop a plan If you fail to plan, you are planning to fail. -Benjamin Franklin There are two aspects of a plan to protect your family Spiritual/MentalPhysical

Let’s Get Started Let’s look at specific examples, and the tools needed to protect your family Internet Service Provider Cell Phone Provider

Family PC If you have one central computer, then some common sense steps, and a few simple programs will work to protect your family Internet Service Provider

Family PC Keep the computer in an open area o Kitchen, Living room, Family room o Don’t put it in a room where a door can be closed Utilize User Accounts to limit access o Admin account for full access o Kids account to limit program installs, set child friendly homepages Utilize Parental Controls to limit content and time

PC Level Protection Following is a list of recommended programs to use on individual computers Each program is free for personal use o WebContent Filter o Virus Protection o Ad-Ware/Malware Protection o PC Optimization & Registry Cleaner

Whole Home Protection With so many cell phones, tablets, laptops and other mobile devices, the strategy has to change Internet Service Provider

Basic Networking To understand how to protect your whole home, a simple understanding of basic networking will help Internet Service Provider IP Addresses are the way devices communicate Each IP address is unique, like a phone number A gateway/firewall will have 2 IP addresses Public (can be seen by the outside world) Private private public

Basic Networking Dynamic Name Servers (DNS) The Internet doesn’t understand Any time you enter a website in your browser, a DNS server is sent the information, and translates that into a public IP address. This becomes a point that you can intercept requests, and direct traffic where you want it to go. I’d like to go to a bad place on the interwebs Not on my watch. Your mother wouldn’t approve Home Computer DNS Server

Whole Home Protection OpenDNS FamilyShield is an easy and free way to control web access for your whole home Go to Select Web Filtering for Home, and follow the steps to setup FamilyShield on a Router

OpenDNS Once you’ve signed in, you can select categories of websites to restrict. You can also add websites as allowed or blocked.

Routers with Parental Controls There are many commercial options for routers with parental controls. Netgear o Linksys SkyDog is a new product just funded on KickStarter o Offers an online portal with user level control for content, time, etc. o Will notify you via or SMS of events o Keeps a log of websites visited

Cell Phones Cell phones pose a unique challenge If you have your home Wifi secured, they can easily be bypassed by using the cellular data network Cell Phone Provider

Cell phones Check with your carrier to see if they offer parental controls o Usually these controls are for limiting IM’s or calling patterns, not content Utilize the phone settings to control content Each phone is unique Consult your user manual or google your phone and ‘parental controls’ to learn about your phone

Cell phones There are many apps that will also help you control content on your phone o K9 Web Protection Safe Browser Available for free for iPhone and Android o iWonder Pro Available for free for iPhone Paid option for reporting

Cell phones There are also many location based apps that will help you track your child’s whereabouts, and offers some other extras, like locking the phone

The Key to it all

Communication Talk about your plan as a family Take the time to sit with each child and discuss their individual needs and resolve concerns If you pay for their phone, then know their password and check it every once in a while o Check the internet history o Check IM’s and texts o Check social media posts (Facebook, Twitter, Snapchat, etc) If a mistake is made, talk about it in love o explaining why you set up rules, and why they need to be followed Have shared passwords with your spouse Be accountable to someone beside yourself DON’T FORGET TO PRAY!!! o This is a war between good and evil that started eons ago. You can’t win it alone, so don’t try.

Thank you To download the presentation, go to