VALHALLA PTSA November 17, 2015 Dr. Amy Fox
Teens spend a 'mind-boggling' 9 hours a day using media report/index.html CNN SPECIAL REPORT: BEING 13
Use social media sites and apps Facebook, Twitter, Instagram, Kik or Yik Yak? Text or play games on your cell phone or their own phones? Use Google to help with their homework? Play computer games or games on a gaming console? Play in a virtual world like Club Penguin? Download music from iTunes? Watch videos on YouTube? Download apps from the App Store or Google Play? How many of your children like to:
Consequences – Damage their reputation at school, in the workplace or among their friends. – Be punished at school if what they post breaks school rules. – Be charged with a crime if they are breaking a law. – Hurt their chances of getting into college, getting a scholarship or getting a job in the future
NEW LANGUAGE, OLD CRIME Phishing A form of identity theft where fake s are sent out to you in hopes that you will give away information that is priceless
PHARMING A step that takes phishing to an all new level. A fake web site is developed so that when you answer the fake it will lead to their fake web sight which will look very similar to the real thing.
Program hijacking devices; use your credit or debit card information from your “ Pay at the pump ” option at your local gas station. The information is then sent to the thieves at the same time it i s sent to your bank. Skimmers; Small readers that is similar to those used in grocery stores which captures your card information for future use. Keystroke catchers; A small device is attached to the cable that connects the keyboard to the computer. Looks like a regular cable and is used in public places where computers are available to anyone. Database Identity theft. Thieves hack into company data bases that store the personal information of their customers. High tech innovations
Low tech, but effective Dumpster divers; Thieves will go through your trash looking for items with personal information, such as utility bills, credit card information and/or credit card applications. Shoulder Surfing; Reading over your shoulder at the bank counter, ATM or eavesdropping on your phone conversations. Telephone Scams; Thieves will try to solicite information from you by posing as a legitimate compnay or entity
TIPS FOR PROTECTING YOURSELF Guard your social security number. Do not carry it with you. Keep important personal information in a safe place, and always lock your dorm room or apartment, even if you think your only going to be gone for a minute. Do not lend your credit cards or passwords to anyone. Watch out for shoulder surfers and eavesdroppers. Do not give out personal information on the phone unless you initiated the call, and you know who you are dealing with.
TIPS FOR PROTECTING YOURSELF Don ’ t toss credit card convenience checks or pre-approved credit offers without shredding them. Do not carry extra credit cards or other important identity documents except when needed. Do not mail bill payments and checks from home, they can be stolen from your mailbox. Examine the charges on your credit card statements before paying them. Photocopy, and keep in a safe place, both sides of identification and credit cards from your wallet or purse in case they would get stolen.
TIPS FOR PROTECTING YOURSELF Avoid printing social security, middle name and drivers license numbers on your checks. Be creative when making up your passwords and pin numbers, making sure they are at least 8 characters long. SAFEST = 14 chars. Be aware of phone and scams.
QUESTIONS/COMMENTS?