staying safe in a digital world.. why we are here & why i do this job

32
Staying safe in a digital world.

Upload: keyshawn-cantrall

Post on 14-Dec-2015

217 views

Category:

Documents


0 download

TRANSCRIPT

Staying safe in a digital world.

Why we are here

& why I do this job.

Outcomes• To know the “Key Words” in e-safety.• Reporting inappropriate use on the internet,

mobile phones games consoles, etc.• To examine what e-safety in the home is.• But above all……

TO BE EMPOWERED

It’s all in a word – or rather, several

Grooming Cyberbullying Sexting Trolling Hacking Cyber-sniping Grunging

….e-safety vocabulary changes rapidly.

(Glossary of e-safety terms)

It’s all in a word – things they type

POSWMMASL??WC?TTO

Language changes – what was once perfectly harmless now yields surprises.

Signs and Symptoms.

Aggression. Unexplained behavioural changes Disturbed sleep pattern. Secrecy Sexualised behaviour/language Change in dress sense Signs of addiction – won’t leave the PC alone

The most telling EWS of all – YOU feeling that something isn’t quite right.

The Good News!• Far more benefits to working, learning and

playing online than risks.• WE can be in control!• You will only ever hear the “Dark Side Of The

Force” in the media…BUT this can be useful!• EVERYONE who wants to abuse on the

internet relies on the fact that it is usually embarrassing to talk about it.

• The more we talk about e-safety the better!

Where do I start?

• First, identify WHAT you have and WHERE it is. (you might want to think about portable/mobile devices.)

• Next, WHO uses it (mainly), and for what PURPOSE?

• You may be surprised at just how much connectible equipment you have in your home. DON’T FORGET THE “MAN DRAWER”

Where do I start?

• Next up is YOUR OWN PERSONAL E-SAFETY.

• Do you have online shopping accounts?• Do you have Social Networking accounts?• Do any of the above share a password?• Do you have any general interest accounts?• (Accounts where NO personal information

exists and no financial transactions take place are low-level in terms of security)

Where do I start?

• Does anyone else in your home know your passwords/PIN numbers/Secret Word(s)?

• Do you know anyone else’s? (It’s OK to know your child’s)

• Have you ever encouraged your child to “log on as you?”

• Fact:- in 145 Primary school visits, at least 40% of Y5s know mum or dad’s PIN number.

• Fact:- 92% of year 10s say they know and have used Mum/Dad’s username, password or PIN number.

Then what?

• Once you know what you have, where it is, what it does, who uses it and what for, you are in a good place to have a family discussion…

• WHAT IS IT OK TO DO WITH CONNECTED TECHNOLOGY AT HOME?

• Make a list of do’s and don’ts• This becomes your home “Acceptable Use

Policy, or “Trust Agreement”.

The Home Acceptable Use Policy?• The school has one• Colleges and Universities have one• All workplaces have one. • Agreed – worded in their language.

Here’s mine.

1) This is MY phone. I paid for it, and I am lending it to you.

2) To help you use it safely, this phone must not be used:-

i) To send nasty messagesii) To take or download any image you would not

want me to see

…..etc…etc….

Here’s mine.

• 10) Finally, if you mess up, and you will mess up, we will talk about it, and there will be a consequence. That consequence will be less if you tell me about it rather than let me find out about it.

Filtering

• A logon with appropriate age-related settings, plus the activation of parental controls is a start……..

• Children WILL, eventually, see material that you would rather they didn’t.

• Make it “OK TO TELL.”• http://www.NetNanny.com• NO filter is 100% effective – especially with

regard to images.• NOTHING replaces vigilance.

Filtering

Filtering

• A logon with appropriate age-related settings, plus the activation of parental controls is a start……..

• Children WILL, eventually, see material that you would rather they didn’t.

• Make it “OK TO TELL.”• http://www.NetNanny.com

Filtering

• NO SYSTEM CAN 100% guarantee that your child will never come across anything inappropriate – beware the “security blanket”.

• NOTHING beats regular discussions• Use the News.

Now the first “Tough one”

• Let’s talk about monitoring.• Do you feel the need to?• How would you go about it?• When does caring overseeing become

spying?• What about the old “I need my privacy”

argument?

How To Take A look”

• Internet History can be deleted. • Temporary files can be deleted.• Most young people will think they can hide

files by putting files within folders within folders.

• You CAN search a computer for images and videos.

How To Take A look”

• Start|Search• *.jpg (pulls up ALL photographs stored)• *.avi (pulls up most videos)• *.wmv (pulls up a different format of video)

If you do monitor a PC or phone….

PLEASE REMEMBER….

Images found on computers may NOT have been put there deliberately.

They may even PRE-DATE your ownership of the computer.

It may be perfectly OK, but you DO need to know what is on your machine.

Killing spouses/children/ is usually frowned upon!!!

A few facts of connected life…

• In general terms – there is no such thing as privacy – every electronic contact leaves a trace.

• Once an image is posted online, you loose control of it – forever.

• Young people find hacking highly attractive.

• Young children can and do experiment sexually online.

Blu-jacking

To Block, or Not To Block…..

• Your rules, and your comfort are important!• Some parents/carers block, others do not.• If you ban without discussion, it drives the

activity underground.• Youngsters need to understand why

something is not good.• You need a “non-verbal” means of them

telling you they have had a problem.

Reporting Abuse

• If your child is being affected by any kind of online abuse, your child’s teacher will want to know.

Reporting Abuse• 99% of SN suppliers offer some kind of

reporting tools.

Reporting Abuse• 99% of SN suppliers offer some kind of

reporting tools.

Reasons to be cheerful….Schools, Colleges, Work In the home

Have individual logons Individual logons are easy to set up and manage – especially with Windows 7 or 8.

Have an acceptable use policy What is “OK” what is not “OK”

Monitor How might you know?

Restrict access according to need Later versions of Windows make this easy – there are other methods.

Do not share passwords No matter HOW tempting

Review regularly Needs change – your rules need to

People who abuse on the internet do not want you to talk about it, and they do not want their activities discussed or shared.

The more you talk about it, use the news, the safer your family becomes. There are many “myths” on the internet and to do with technology in general.

Hardware Essentials….

• A good, all round anti-virus, anti-spyware, anti-malware package installed and regularly updated.

• A WPA2 secured wireless network…(If you use one)

• Windows Update configured to download and apply updates regularly.

• A plan for how old equipment will be disposed off – including destroying information stored on it. (Old Mobile Phone Companies!)

The Future (the other “F” word.

• Faster, better, more, technology AND pace of change.

• A good idea not to be the first in the queue.• Let new technology settle into the market –

even release candidates have been found to have serious bugs.

• NOTHING IS FREE – THERE IS ALWAYS A COST – EVEN IF IT IS ONLY YOUR EMAIL

ACCOUNT NAME.

Over To You….

Q & A