, Smart Phone, Tablet, and Social Networking Best Practices Rod Tosten 1.

Slides:



Advertisements
Similar presentations
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Advertisements

How to protect yourself, your computer, and others on the internet
Developed by Technology Services 1:1 Laptop Initiative
Keeping Your Child Safe on the Internet
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
NICOLE STACEY, MSW, LISW-S MENTAL HEALTH SPECIALIST BRUNSWICK HIGH SCHOOL Social Media and Your Teen.
Cybersafety Elimbah State School Cybersafety and cyberbullying: A guide for parents and caregivers, May 2012., Dept of Education, Training and Employment.
Internet Safety Gleneagles Computer Club February 16, 2015 by Deborah Benson.
Internet Safety & Awareness Dan Tomlinson 02/23/2013.
Internet and App Safety 10/8/14. Introduction  Julie Lechich, Assistant Principal of Academics  Drew Hart, IT Director.
Internet Safety and Awareness Cyberbullies and Predators Enfield High School Computer Network.
Ask.fm is an app anyone can post anonymous questions and comments and has been used to send sexual, cyberbullying and other abusive content.
What you don’t know CAN hurt you!
e-safety and cyber bullying
Internet Safety Basics Never share names, schools, ages, phone numbers, or addresses. Never open an from a stranger – it may contain viruses that.
Company LOGO Internet Safety A Community Approach.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
© 2009 SCHOOL FAMILY MEDIA Keeping Your Child Safe on the Internet © 2009 SCHOOL FAMILY MEDIA.
Online Social Networking. Agenda Survey Results What is Online Social Networking? Popular Online Social Networking Sites Privacy Settings for Facebook.
The Internet Netiquette and Dangers. Outline Netiquette Dangers of the Internet.
Dangerous Apps: What to look for, why it’s important, and other web safety. Ramona R. Santa Maria, PhD. SUNY Buffalo State Associate Professor Computer.
Keeping Your Child Safe on the Internet. Welcome We are first-generation Internet parents Our children are the first generation to be born and raised.
Donette Mullinix ED 505 UWA Clipart:
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
Keeping Safe While Using the Internet. We live in a community. What are some safety rules we have in our community? Cyberspace is also a community. What.
Online Security By:. The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access.
ARE YOU BEING SAFE? What you need to know about technology safety Shenea Haynes Digital Citizenship Project ED 505.
Welcome to Week 3 in the Mrs. DeRita’s computer lab!
Ms. Park.  Q&A: What are some Internet safety tips you already know?
E-Safety E-safety relates to the education of using new technology responsibly and safely focusing on raising awareness of the core messages of safe content,
Etiquette – a list of rules that we observe Phishing - sending an to a user falsely claiming to be a legitimate company to scam the user into providing.
Lee County’s intent is to provide free and equal access to resources via the internet. All school rules for appropriate use of technology also apply.
Internet Safety Tips.
Questions National Picture What social networking sites is your child a member of? Vote –
Cyberbullying What does it mean? What can we do?.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
Cyber Safety Jamie Salazar.
DIGITAL CITIZENSHIP. Digital Citizenship covers 9 areas according to Mike Ribble, an expert in the field.  Etiquette  Communication  Literacy  Access.
The internet is an amazing resource. We can connect, communicate and be creative in a number of different ways, on a range of devices. However, the internet.
The internet is an inspiring and positive place. It is an amazing resource which enables people (young and old) to connect, communicate and be creative.
Cybersecurity Test Review Introduction to Digital Technology.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Awareness raising session for Parents and Carers June Todd Awareness raising session for Parents and Carers June Todd.
1. Guard your privacy. What people know about you is up to you. 2. Protect your reputation. Self-reflect before you self-reveal. What’s funny or edgy.
An Overview of Legislation and Board Policy. Federal Legislation (CIPA, COPPA) WCPSS Board of Education ◦ Policy 2313, 3013, and 4013 Federally Mandated.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
Internet Safety Sam Farnsworth Utah PTA Technology Specialist
Social Media Whats Out? What’s In? What’s New?. Social Media- What’s Out: Ask.fm Tumblr Facebook.
Popular Sites/Apps and How to Monitor Them. Now a days students don’t just communicate at school or through phone calls, they also communicate through.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Social Media Safety. Discuss O As a class discuss the different types of social media and what it is used for.
STOP. THINK. CONNECT. Online Safety Quiz. Round 1: Safety and Security.
Aristotle, a great thinker, once said: “We are what we repeatedly do.”
“Doing the Right thing online” Online Safety. Socializing Communicating Creating Playing Exploring Learning.
Christian Citizenship in a Digital World Lesson 4:Digital Etiquette.
Technological Awareness for Teens and Young Adults.
Apps to Get Rid of.
Whats Out? What’s In? What’s New?
How to stay safe using the internet & App’s
Desiree Alexander Parental Pitfalls Desiree Alexander
Social Media and Parenting
Discussion – what kind of bullying is taking place in the images
Teaching Internet Safety
Your Child’s Digital Footprint
Digital Citizenship EIT, Author Gay Robertson, 2017.
Rules To Help You Navigate the Internet Safely
Click Clever. Click Safe.
Presentation transcript:

, Smart Phone, Tablet, and Social Networking Best Practices Rod Tosten 1

2 Welcome and Intention For everyone to make informed choices about their engagement and citizenship in their virtual communities

Today Virtual Communities and Services have replaced the traditional “community and business centers” in the social and work life of teens, young adults, and many others People are not aware of the timeless and global nature of these new virtual communities People are making uninformed decisions 3

4 Living in a Virtual Space Forever and Global nature of content Impacts of bad social networking choices Appropriate and inappropriate content Understanding Privacy Settings Intellectual Property and Copyright Social networking agreements Social networks share personal profiles with advertisers Apps are everywhere!! NOTHING is FREE … You will pay with Your Money, Your Intellectual Property, or Your Being Foundation of safety and healthy social networking Awareness

5

Topics Smart Phone / Tablet Other Devices Data Security (Web, Cloud, Passwords) Social Networking 6

Etiquette / Best Practices Assume everyone will see your Allow only one round trip before picking up the phone Not a comedy venue is a record of a conversation 7

Unsubscribing / SPAM Use unsubscribing wisely Filter SPAM with rules as needed (Rules exist in most systems) Never respond to password requests 8

Personal s Have a personal account Have a junk account 9

Organizing with Folders and Rules Use folders to organize (Topic, User, Event) Leverage rules in system 10

Scams How can you tell if the is a Scams? it suggests tragic consequences for not performing some action it promises money or gift certificates for performing some action it offers instructions or attachments claiming to protect you from a virus that is undetected by anti-virus software 11

Attachments Some hints to avoid problems: Be wary of unsolicited attachments, even from people you know Keep software up to date Trust your instincts Save and scan any attachments before opening them Turn off the option to automatically download attachments 12

Smart Phone/Tablet Best Practices Phone/Tablet is YOU!!! Have a password Set phone/tablet to clear data after failed attempts Know how to deactivate phone/tablet Set location services to be requested Texts, Images, Videos are forever 13

App Best Practices Be careful of Apps Set location services to be requested Read Reviews (Google App Name) Know what the App tracks Free Version versus Pay Version 14

Potentially Dangerous Apps Whisper - This app allows you to post secrets anonymously and also allows you to chat with other users in your geographic area. YikYak - All Yik Yak users are anonymous. They don’t create a profile or account, but they can post comments that are accessible to the nearest 500 people (within a 1-5 mile radius). Kik - A free app-based alternative texting service that allows texts/pictures to be sent without being logged in the phone history. (Similar apps: Viber, WhatsApp, TextNow) 15

Potentially Dangerous Apps Snapchat – Allows you to capture an image or video and make it available to a recipient for a specific time. After that time limit is up, the picture/video automatically disappears forever…or so Snapchat claims. (Similar apps: Poke, Wire, and Wickr) Vine – Allows users to watch and post six second videos. ChatRoulette and Omegle – These apps allow you to video chat with strangers. 16

Potentially Dangerous Apps Tinder – Users post pictures and scroll through the images of other users. When they think someone is attractive they can “flag” the image. If that person has also “flagged” them in return, the app allows you to contact them. Poof – Hides other apps on your phone. You select which apps you would like to hide and their icons will no longer show up on your smartphone screen. Ask.fm – Parent-free digital space where kids go to goof off and escape the built-in accountability of Facebook. 17

Other Devices Digital Cameras o Internet uploading Flickr and other photo sites o Ownership of photos E-Readers o Internet safety USB Memory Sticks o Viruses and lose of data 18

Home Wireless Networks Shared communication Change default passwords Restrict access by MAC address Encrypt the data on your network - WEP (Wired Equivalent Privacy) and WPA (Wi-Fi Protected Access) Protect your SSID Install a firewall Maintain anti-virus software 19

Data Security Best Practices Encrypt Data When Possible Use difficult passwords Remove downloads Be careful of public wireless (WiFi) Be careful of public computers Be careful of printers, copiers, and fax machines Backup, Backup, Backup 20

Best Password ever! Your password must: - be 15 to 30 characters long - contain at least two uppercase letters (A-Z) - contain at least two lowercase letters (a-z) - contain at least two numbers (0-9) - contain at least two of the following special characters: $ % ^ ! * + = _ - change at least four characters from your previous password Your password cannot: - contain spaces -be one of your last ten previous password 21

Web Browsing Viruses, Malware, and Adware Use software protection Avoid clicking unknown links Avoid clicking unknown attachments and links within s Be thoughtful about using the Cloud 22

What social networking sites do you use? 23 - Reddit - Pinterest - 4Chan(image board) - Facebook - Twitter - Free Texting Apps - Clam Text (Anonymous texting) - Tumblr - Chat Roulette - Instagram—pictures and captions - Google Plus - Gaming online - YouTube - FourSquare Others you have heard of?

What is Cyberbullying? Insulting –Posting false information that is hurtful to a person and their reputation Targeting –Singling someone out and inviting others to attack or make fun of him or her Impersonation –Pretending to be someone else 24

What is Cyberbullying? Uploading –Sharing someone’s text or pictures without their permission Excluding –Pressuring others to omit someone from an activity Harassment –Repeatedly sending someone unwanted messages 25

26 Your Webutation What should YOU consider? Forever and Global nature of content Impacts of bad social networking choices Appropriate and inappropriate content Social networking agreements Social networks share personal profiles with advertisers Understanding Privacy Settings Understanding Social App(lications)

27 Your Webutation What should YOU consider - continued? Intellectual Property and Copyright Scams Identity Theft Keeping Home Computers Up-to-date Family and Home Safety Jobs ( Exercising Judgment ) Professional Decisions Related to inappropriate content Related to information describing illegal situations

28 Your Webutation Online Reputation Management (ORM) Google Yourself Consider Creating Your Online Presence ReputationDefender.com GoGoStat.com SocialShield.com ReputationHawk.com Think Bumper Stickers

29

30

31

32 Your Webutation Think Bumper Stickers

When you use Virtual Communities and Services, YOU give a piece of YOURSELF to companies to make a PROFIT from YOUR BEING 30

Good Resources Department of Homeland Security's Stop.Think.Connect.™ Campaign US-CERT: US Computer Emergency Readiness Team 34