Friday, 22 May 2015

10 Tips to Keep You Protected






Internet Security for Teens and Tweens- 10 Tips to Keep You Protected
There are a lot of safety risks out there for teens and tweens who use the Internet. However,
this doesn't mean that they have to stop using the 'Net. Instead, they should use good
judgment and try to make wise decisions. The following article lists some helpful tips to keep
your teen and tween's internet security protected.
1
.Don' let your username say too much about you. For instance, don't make it your name and
age, like Susan16. Instead, make it something that doesn't say much about your name, age, or
sex. Keep it as neutral and vague as possible.
2.Don't ever post your social security number, driver's license number, phone number,
ome address or credit card information on the internet. If a friend asks you for your number
on Myspace then either email them a private message or wait until you see them in person.
3
.Don't add friends on the Internet that you don't know. People often misrepresent themselves
and pretend to be something they are not. It happens all the time and they are very good
about it. Don't think that you will know the difference.
4
.Never agree to meet someone in person that you have met off of the Internet. If you are part
of a group and someone wants to get together to discuss something that sounds legitimate,
ave a parent go with you and meet in a public place. Never substitute a friend for a parent.
5
.If you have concerns about someone who is harassing you on the Internet, tell an
adult. Cyber stalking is being controlled these days and awareness is growing.
6
.Make your profile private so that only the people you know can see your information and
photos.
7
.Do some research on sites before you sign up for them. Don't just join them because
everyone else is. Learn how they work before you post anything.
8.Don't store your passwords on your computer. It can make hacking easier.
9.If you purchase something with a credit card, ensure that you are using a secure server.
This should be noticeable by a little emblem on the bottom right hand side of your screen.
1
0. consider not using your full name when you join a site. Not posting your last name is a great
preventive measure when it comes to Internet security.
7


 
Internet Security- Parental Control Software
K
eeping your child safe is one of the biggest challenges that parents face today. Good
communication is an excellent tool and necessary when it comes to warning your children about
dangers that they may face. However, sometimes it takes more than just good communication
when it comes to protecting your child online.
A
lthough you can go through the process of putting your family's computer in a common room,
looking into the Facebook and Myspace accounts from time to time, and talking to your child
about the risks of posting personal information, risks still arise.
The fact is that sometimes your child will be subjected to adult material, or material that is
otherwise inappropriate for children, by mistake. There are some pornography websites
whose addresses are very close to popular websites with the same name. Sometimes, the
only difference is whether it is .net, .com. or even .gov.
One of the things that you can do to protect your child's internet security is to install parenta l
contro l  software. Although it might seem extreme, a parent will do whatever it necessary to
protect their children.
So what can parental control software do?
l
Create alerts. You can be notified at once troug eiter text messages, pone calls,
or e-mails when someone in your home visits an inappropriate website.
l
Time controls. Tese are good because you can actually set a pre-determined
amount of time that your child can spend on the Internet. Of course, when their time runs out,
they can still access other features of the computer such as word programs which they might
need for school purposes. A common complaint that parents have is that their child spends
too much time on the Internet.
l
Usage Logging. Wit tis feature, you can produce and review logs of your child's
internet activity. You can see what websites were visited, logs of Instant messaging chats,
as well as the various programs that were used during the Internet session.
l
Content controls. Tese allow you to choose wat types of content, such as
adult content, that you want your child to avoid access to.
l
Program controls. Program controls control te access to certain programs such
as downloading music files or other files that could be dangerous.
l
All in one solution
. Look for an advance piece of software that has all its bases
covered. Email recording, Content filtering,  and Keystroke logging are among the most
important.
There are many great products available. To save you some time I have provided a link to the
software I use personally. C li ck here
Internet Security- Online Safety for Your Children
Every parent wants to keep their child safe. Protecting your children when they are on the Internet
is no exception to this. While you don't want to think about people harassing your child
8


 
or trying to bring harm to them, there are still those out there who might try. The following is
an article that contains tips on how you can provide online safety for your children.
l
You can purchase online tools for added internet security. These contain features that
allow you to control your child's access to adult material. Some ISPs also contain parent-control
options that block some types of material. In addition, you can purchase programs that block
access to sites that is based on a list that your ISP makes.
l
You can also purchase filtering programs that restrict personal information from
being sent online. This is particularly helpful in protecting your financial and personal
information.
l
Install a program that lets you set a time limit on how long your child can stay online.
This way, you can ensure that they are not spending a large amount of time on the internet.
However, they will still be able to use office programs for school.
l
If your child has a Myspace of Facebook account, get one as well and befriend them
in order to monitor their use. Only intervene if there is a safety concern in order to give them
more privacy.
l
D
on't let your child participate in chat rooms. Some ISPs offer programs that block chat
rooms. Sometimes people enter chat rooms designed for children and teens and pretend to be
one themselves.
l
If you're aware of any child pornography contact the National Center for Missing
and Exploited Children. If your child receives pornography, contact your local law
enforcement office.
l
Talk to your child about their screen name creation. A screen name should be neutral
and should not reveal any of the child's personal information such as their name or age.
l
Talk to your child about posting personal information like their address, age, and full
name on social utility sites. When they create an account, have them make it private to
ensure that only people they know can access it.
l
Continuously monitor your credit cards and banking account in order to be aware of
any unusual activity. Talk to your child if you become aware of something different on the
account. Then, talk to your credit card company or bank.
Cyber Bullying- Another Aspect of Breaking Internet Security
When you think of Internet security, you are probably thinking of protecting your personal and
financial information. However, there are other types of internet security breeches. One type is
cyber bullying.
A
 phrase that is becoming more and more prevalent in the world wide web, cyber bullying can
be very invasive and emotionally upsetting to children, teens, and even adults. It's difficult to
control because in many cases the perpetrator is known but can not be proven. How? Because
they will give just enough information to let their victim know who they are, but not enough
information to actually be convicted of anything. They can do this by using pretend user names,
fake pictures, and revealing very little information about themselves.
So what types of things happen with cyber bullying?
l
Threats- a lot of times, a cyber bully will make threats. These can be thinly veiled or
outright vicious.
9


 
l
Harassment on victim's out website- another type of cyber bullying occurs when the
bully posts negative material in abundance on the victim's own website. This can come in the
form of negative comments, threats, and other types of general harassment.
l
Slander- if the bully has their own site (like a blog or a facebook or myspace page) they
might make slanderous comments about the victim. These can be falsities, such as claiming
that the victim is cheating on their spouse/significant other, or they can be harmful truths that
the general population doesn't need to need.
l
A
ccusations- a rare form of cyber bullying, but equally dangerous, is when the bully actually
accuses the victim of doing the same thing that the bully is doing. An example would be this: the
bully sends negative e-mails to the victim. Then, the bully gets on their own blog or website and
writes about ow upset they are due tot he fact that the victim is sending THEM negative emails. In
such cases, the bully might even receive sympathy and the victim is then harassed even more by
people who feel sorry for the victim.
So why do things like this happen?
It is very difficult to know why. Anger, resentment, lack of self-esteem, or sometimes plain
boredom can lead to cyber bullying. In addition, the anonymity of the internet makes it easier
than every to bully someone. Still, cyber bullying can be emotionally devastating and can
threaten your own emotional security. If it is happening to you, don't sit back and let it continue.
5
 Tips to Ensure Internet Security
D
o you want to keep your computer and personal information safe? Of course you do. Here
are 5 tips to help ensure your internet security.
1
. Be careful of em-mail attachments
One of the most common ways to threaten your internet security is to open an e-mail
attachment that contains a virus. Sometimes, just clicking on the attachment itself will unleash
the virus. If you receive an email from someone that you don't know and it contains an
attachment, don't open it just to be on the safe side. You can always send a message to that
person to verify that the email is legitimate. It's best to invest in an anti virus software program
that can scan the attachment before you open it. Some e-mail systems will scan emails for you.
However, if you go through a free program (like hotmail) don't count on the system being as
complete as an email account that you pay for.
2. Anti-virus software
You must invest in anti-virus software. It is one of the most important things for your computer.
In addition to keeping you safe from viruses, it can also scan your hard drive and clear out
unnecessary information, thus making your computer run more efficiently as well. Anti-virus
software programs are everywhere but it helps to do some research before investing in one.
With some of them, you have to update them and pay again every year.
3
. Update security patches for your browser
1
0


 
On Windows, you can go to “Windows Update” under the “Start” menu it will update security
patches for you. This is necessary because holes are formed on the Internet frequently and
while you might be protected this week, that doesn't guarantee that you will be next week.
4
. Protect your passwords
While it is easier to use your same password, or a variation of it, for all of your accounts, it is
safer not to do so. When forming your password, it is better to use a combination of letters
and numbers. Also, never give your password out to anyone and resist the urge to store them
on your computer. From time to time, change your password on your important accounts that
contain personal information or financial information for added internet security.
5
. Install a firewall.
A
 firewall blocks unwanted access to your computer. Some systems, like Windows Vista,
ave firewalls built into them. You can also download others.

0 comments:

Post a Comment