Presentation is loading. Please wait.

Presentation is loading. Please wait.

Stay Safe Online in Six Steps Presented by: Scott Rhinehart 540 Lake Center Parkway, Suite 102 Cumming, GA 30040 Office: 678-513-1864 ext 58727 Fax: 770-887-9339.

Similar presentations


Presentation on theme: "Stay Safe Online in Six Steps Presented by: Scott Rhinehart 540 Lake Center Parkway, Suite 102 Cumming, GA 30040 Office: 678-513-1864 ext 58727 Fax: 770-887-9339."— Presentation transcript:

1 Stay Safe Online in Six Steps Presented by: Scott Rhinehart 540 Lake Center Parkway, Suite 102 Cumming, GA 30040 Office: 678-513-1864 ext 58727 Fax: 770-887-9339 Email: Scott.Rhinehart@LibertyMutual.com

2 Online Safety Quiz  How many people are victims of identity theft each year?  What does the “s” stand for in “https:”?  What does the term “phishing” mean?  Do you know what a “firewall” is?  Is it safe to leave computer running and plugged in at all times?  How often should you change your passwords?  Why might it be a good idea to partition your computer into different accounts for each user?

3 Answers to Quiz 8.4 Million in 2007 (most recent data as of Dec. 2009). Secure. When an intruder is looking for your personal information. A firewall helps block out intruders. Yes, but recommend you turn it off when you will not being using for a long period of time. Every 3 months. So that other users do not have access to your personal information.

4  Step 1: Protect your personal information  Step 2: Be aware  Step 3: Purchase/install protective software  Step 4: Ensure proper set up of your web browser  Step 5: Protect passwords  Step 6: Ensure child-safe internet use 6 Steps to Protect Your Family

5 Step 1: Protecting Your Personal Information  Email is not a secure tool for information  Avoid pop-ups asking for information  Verify a website is secure when shopping –HTTPS: –Lit lock icon  Look for and read a website privacy policy

6  Watch out for impersonators  Lots of people like to go “Phishing” –Update your personal information –Sites look authentic –Don’t take the bait  If you think something is strange, or that something illegal is going on, report them –spam@uce.gov Step 2: Know Who You Are Dealing With

7 Step 3: Purchase/Install Protective Software  Anti-virus software is critical –Scans computer and email for viruses and deletes them –Software should update routinely to catch the latest bugs –Most update automatically  Only download software from company websites or buy in a store

8  Firewalls keep people away from your files –Keeps hackers from breaking into your computer –Blocks communications to and from sources you don’t allow  Some operating systems come with a firewall built in, or you can install separate software or hardware  Make sure it is set up properly and updated regularly Step 3: Purchase/Install Protective Software

9 Step 4: Ensure Proper Set Up of Your Web Browser  Change settings to increase security to stop hackers  Some systems offer free patches to close holes  Email software can filter spam  Turn computer off or unplug from phone or cable line if not using for long periods

10 Step 5: Protect Your Passwords  Keep passwords in safe place, out of plain view  Don’t share passwords over the Internet or on the phone  Choose passwords that are difficult to guess, and change them regularly  Use a variety of passwords for different accounts

11 Step 6: Ensure Child-safe Internet Use  It’s easy for children to mistakenly publish personal information in public places  It’s impossible to supervise all of your children’s online activity

12  Discuss and set guidelines and rules, and post the rules by the computer –Teach children never to give out personal information to people they meet online  Use Internet with children and become familiar with their activities –Know who their online friends are and supervise chat area  Keep computer in central and open location  Partition your computer into separate user accounts  Use parental controls from ISPs, purchased software and browsers –Consider software that monitors children’s email and web traffic (SpectorSoft) Step 6: Ensure Child-safe Internet Use

13  Visit www.getnetwise.org for information about who to contact if you think your child is in danger  Report instances of child exploitation to www.missingkids.com  Don’t let kids’ sophisticated technical skills intimidate you! Step 6: Ensure Child-safe Internet Use

14 Additional Resources  www.staysafeonline.org  www.onguardonline.gov  www.safekids.com  www.safeteens.com  www.bbb.org (Better Business Bureau)  Deceptive spam: spam@uce.govspam@uce.gov  www.clarkhoward.com

15 All Six Steps for Safety  There is no single answer  Online safety requires combination of Internet habits and technology solutions  This set of cyber-security practices can make a difference!

16 Questions

17 Thank You! Call Scott Rhinehart for more information or to learn more about Liberty Mutual Insurance. 678-513-1864 ext 58727


Download ppt "Stay Safe Online in Six Steps Presented by: Scott Rhinehart 540 Lake Center Parkway, Suite 102 Cumming, GA 30040 Office: 678-513-1864 ext 58727 Fax: 770-887-9339."

Similar presentations


Ads by Google