E-Safety Parent`s Workshop May 2016

E-SAFETY PARENT’S WORKSHOP
THURSDAY 5TH MAY
NO EXCUSES!
We can’t be PASSIVE - being unaware or ill-informed is not
an excuse!
PASSIVE
SHARING EXPERTISE –
WE CAN’T DO EVERYTHING OURSELVES
Gap between
children and adults
is widening – we
need to upskill
ourselves.
We need to work
together – share
expertise
Name:
Class No:
Installing antivirus
Applying Windows Updates
Upgrading to Windows 10
Applying Parental controls
Installing a Firewall
Applying Restrictions e.g
iPads
Social media restrictions e.g
Facebook, Instagram &
Twitter
I’m able to
help with
RESTRICTIONS - KEEP IT SIMPLE
The No Technology
Rule!
• Upstairs
• Mealtimes
• Specific times
PASSWORD- FOUR WORDS
Create one with your children so you have access to their devices.
Passwords with Parents: Sharing = Access
INTERNET HISTORY
Do you know how to view your ‘internet history’ on multiple
devices?
Internet Explorer
iPad- Safari History
Google Chrome
Mozilla Firefox
ANTI-VIRUS & FIREWALLS
http://www.moneysavingexpert.com/utilities/fr
ee-anti-virus-software#firewall
THE TECHIE BITS - HOW AWARE ARE YOU?
Terminology
Explanation
Malware
Short for malicious software and used as a single term to refer to virus, spy ware, worm etc. Malware is designed to
cause damage to a stand alone computer or a networked pc.
Worms
Worms are malicious programs that make copies of themselves again and again on the local drive, network shares, etc.
The only purpose of the worm is to reproduce itself again and again.
Virus
Virus is a program written to enter to your computer and damage/alter your files/data. A virus might corrupt or delete
data on your computer. Viruses can also replicate themselves.
Trojans
A Trojan horse is not a virus. It is a destructive program that looks as a genuine application. Unlike viruses, Trojan horses
do not replicate themselves but they can be just as destructive. Trojans also open a backdoor entry to your computer
which gives malicious users/programs access to your system, allowing confidential and personal information to be theft.
Adware
Generically adware is a software application in which advertising banners are displayed while any program is
running. Adware can automatically get downloaded to your system while browsing any website and can be viewed
through pop-up windows or through a bar that appears on a computer screen automatically. Adwares are used by
companies for marketing purpose.
Spyware
Spyware is a type of program that is installed with or without your permission on your personal computers to collect
information about users, their computer or browsing habits tracks each and everything that you do without your
knowledge and send it to remote user.
Spam
Spamming is a method of flooding the Internet with copies of the same message. Most spams are commercial
advertisements which are sent as an unwanted email to users.
Tracking cookies
A cookie is a plain text file that is stored on your computer in a cookies folder and it stores data about your browsing
session. Cookies are used by many websites to track visitor information A tracking cookie is a cookie which keeps tracks
of all your browsing information and this is used by hackers and companies to know all your personal details like bank
account details, your credit card information etc. which is dangerous .
Misleading
applications
Misleading applications misguide you about the security status of your computer and shows you that your computer is
infected by some malware and you have to download the tool to remove the threat. As you download the tool it shows
some threats in your computer and to remove it you have to buy the product for which it asks some personal
information like credit card information etc. which is dangerous.
AGE LIMITS – IT’S NOT ABOUT
KEEPING THEM QUIET!
CHILD FRIENDLY SEARCH ENGINES
CHILD-FRIENDLY APPS
INCREASING AWARENESS
https://www.net-aware.org.uk
ANYONE CAN BECOME A TECHIE!
http://www.internetmatters.org/
http://www.internetmatters.org
/parental-controls/interactiveguide/
PARENTS & CHILDREN
WORKING TOGETHER
LET THEM TEACH YOU!
The people who know best about what your children are up to online, are your
children! Get them to tell you about the sites they’re using. Ask them questions
such as:
•
Why do they like the site?
•
What can they do on it?
•
What’s so fun about it?
•
Who uses it at school?
•
Who you can talk to?
•
Who are their friends on it?
This is a good way to develop a trusting relationship with your child about what
they are up to online.
REACH AN AGREEMENT
A good way to set boundaries with your child about what they can and
can’t do online is to set an agreement with them.
Here are some examples of the areas you might want to discuss:
•
Limits on the amount of time your child spends online, or playing
computer games.
•
Having regular screen breaks – at least five minutes every 45-60
minutes.
•
•
Not sharing any pictures they wouldn’t be happy to share with you.
•
Coming to you if they are concerned. Or, if not, knowing where they can
go for independent help and support.
•
Why not introduce an agreement after watching one of the Thinkuknow
films?
Not giving out personal details, such as mobile phone number and
address without parents permission/knowledge.
GOING THAT EXTRA MILE
• http://www.hongkiat.com/blog/kid-safety-mobile-apps/
TOOLS TO PROTECT YOUR CHILDREN
– PARENTAL CONTROL
Every parental control package is different, but most provide
services such as:
•
•
Filtering – content to restrict access to particular sites
•
Monitoring – where you are informed of certain sites that your
child is attempting to gain access to.
•
Reporting – where you are provided with information about
what sites your child has used.
Time limits – restrict the amount of time your child can be
online, or set periods of time where your child can access
certain sites.
ROUTER SETTINGS & SHIELD
www.routerlogin.net
KNOW YOUR PIES!
Practical principles
Talk with, NOT at your children.
Agree family guidelines and rules.
Discuss regularly online safety
Infrastructure
Virus and firewall software up todate, Browser ‘safe search’ enabled.
Education
Learn together about new
technologies and enjoy! Reflect
together about new technologies, the
benefits, dangers and potential.
Systems
Keep technology in family rooms
Monitor time spent on the internet
View the ‘History’ or purchase
filtering software.
Have proportionate responses to
problems.
Your child will not tell
you about a problem if
they feel their access to
technology will be
restricted.
STAYING INFORMED – SOCIAL MEDIA
USEFUL ONLINE RESOURCES
•
•
•
•
http://www.childnet-int.org/
http://www.iwf.org.uk/
http://www.bbc.co.uk/cbbc/topics/stay-safe
http://www.thinkuknow.co.uk
• https://www.thinkuknow.co.uk/parents/Primary/Convers
ation-Starters/Go-to-the-movies/
•
•
•
•
•
•
•
http://www.kidsmart.org.uk
http://www.childnet.com/resources/kia
http://www.thinkuknow.co.uk
http://primaryschoolict.com
http://www.att.com/Common/images/safety/game.html
http://www.cybersmart.gov.au
www.saferinternet.org.uk/advice-and-resources/a-parentsguide