1 / 17

Stay Safe Online in Six Steps

Stay Safe Online in Six Steps. Presented by: Scott Rhinehart 540 Lake Center Parkway, Suite 102 Cumming, GA 30040 Office: 678-513-1864 ext 58727 Fax: 770-887-9339 Email: Scott.Rhinehart@LibertyMutual.com. Online Safety Quiz. How many people are victims of identity theft each year?

amalie
Download Presentation

Stay Safe Online in Six Steps

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Stay Safe Online in Six Steps Presented by: Scott Rhinehart 540 Lake Center Parkway, Suite 102 Cumming, GA 30040 Office: 678-513-1864 ext 58727 Fax: 770-887-9339 Email: Scott.Rhinehart@LibertyMutual.com

  2. Online Safety Quiz • How many people are victims of identity theft each year? • What does the “s” stand for in “https:”? • What does the term “phishing” mean? • Do you know what a “firewall” is? • Is it safe to leave computer running and plugged in at all times? • How often should you change your passwords? • Why might it be a good idea to partition your computer into different accounts for each user?

  3. Answers to Quiz 8.4 Million in 2007 (most recent data as of Dec. 2009). Secure. When an intruder is looking for your personal information. A firewall helps block out intruders. Yes, but recommend you turn it off when you will not being using for a long period of time. Every 3 months. So that other users do not have access to your personal information.

  4. Step 1: Protect your personal information Step 2: Be aware Step 3: Purchase/install protective software Step 4: Ensure proper set up of your web browser Step 5: Protect passwords Step 6: Ensure child-safe internet use 6 Steps to Protect Your Family

  5. Step 1: Protecting Your Personal Information Email is not a secure tool for information Avoid pop-ups asking for information Verify a website is secure when shopping HTTPS: Lit lock icon Look for and read a website privacy policy

  6. Watch out for impersonators Lots of people like to go “Phishing” Update your personal information Sites look authentic Don’t take the bait If you think something is strange, or that something illegal is going on, report them spam@uce.gov Step 2: Know Who You Are Dealing With

  7. Step 3: Purchase/Install Protective Software Anti-virus software is critical Scans computer and email for viruses and deletes them Software should update routinely to catch the latest bugs Most update automatically Only download software from company websites or buy in a store

  8. Firewalls keep people away from your files Keeps hackers from breaking into your computer Blocks communications to and from sources you don’t allow Some operating systems come with a firewall built in, or you can install separate software or hardware Make sure it is set up properly and updated regularly Step 3: Purchase/Install Protective Software

  9. Step 4: Ensure Proper Set Up of Your Web Browser Change settings to increase security to stop hackers Some systems offer free patches to close holes Email software can filter spam Turn computer off or unplug from phone or cable line if not using for long periods

  10. Step 5: Protect Your Passwords Keep passwords in safe place, out of plain view Don’t share passwords over the Internet or on the phone Choose passwords that are difficult to guess, and change them regularly Use a variety of passwords for different accounts

  11. Step 6: Ensure Child-safe Internet Use • It’s easy for children to mistakenly publish personal information in public places • It’s impossible to supervise all of your children’s online activity

  12. Discuss and set guidelines and rules, and post the rules by the computer Teach children never to give out personal information to people they meet online Use Internet with children and become familiar with their activities Know who their online friends are and supervise chat area Keep computer in central and open location Partition your computer into separate user accounts Use parental controls from ISPs, purchased software and browsers Consider software that monitors children’s email and web traffic (SpectorSoft) Step 6: Ensure Child-safe Internet Use

  13. Visit www.getnetwise.org for information about who to contact if you think your child is in danger Report instances of child exploitation to www.missingkids.com Don’t let kids’ sophisticated technical skills intimidate you! Step 6: Ensure Child-safe Internet Use

  14. Additional Resources www.staysafeonline.org www.onguardonline.gov www.safekids.com www.safeteens.com www.bbb.org (Better Business Bureau) Deceptive spam: spam@uce.gov www.clarkhoward.com

  15. All Six Steps for Safety There is no single answer Online safety requires combination of Internet habits and technology solutions This set of cyber-security practices can make a difference!

  16. Questions

  17. Thank You! Call Scott Rhinehart for more information or to learn more about Liberty Mutual Insurance. 678-513-1864 ext 58727

More Related