How To Teach Kids To Be Safe Online

Size: px
Start display at page:

Download "How To Teach Kids To Be Safe Online"

Transcription

1 McAfee, an Intel company, is the world's largest dedicated security technology company. We are relentlessly focused on finding new ways to keep our customers and our communities safe, and especially our most vulnerable population, children. In order to do that, McAfee has partnered with the Department of Homeland Security, the National Cyber Security Alliance, the Anti-Phishing Working Group, and other organizations to develop curriculum aimed at helping kids understand how to stay safe and act responsibly online. Through McAfee Cares Online Safety for Kids, McAfee empowers its employees to volunteer in communities where they live and work to deliver these important messages to school-aged kids. One critical component of the Online Safety for Kids program is to educate parents on some of the risks that kids of all ages may encounter online, as well as offer some tips on how to help keep them safe as they use the Internet. 1

2 The primary message delivered in our Online Safety for Kids program is based on three pillars. They are: Cyber-security = Keeping your devices and information safe Cyber-safety = Keeping yourself safe Cyber-ethics = Acting responsibly and keeping the web a safer place for everybody By exploring these three key areas, students will learn the importance of making good decisions online. The core message we are promoting is STOP.THINK.CONNECT. 2

3 Just like you taught your children to stop, look and listen before crossing the street, they should take similar precautions when connecting to the Internet. Any time kids are about to go online, they need to make sure they re avoiding putting themselves or their personal information (as well as that of their family) at risk. In order to do that, it s important to: Stop Before using the Internet, take time to understand the risks and learn how to spot potential problems. Think Take a moment to be certain the path is clear ahead. Watch for warning signs and consider how your actions online could impact your safety, or your family s. Connect Enjoy the Internet with greater confidence, knowing you ve taken the right steps to safeguard yourself and your computer. 3

4 Just like you taught your children to stop, look and listen before crossing the street, they should take similar precautions when connecting to the Internet. Any time kids are about to go online, they need to make sure they re avoiding putting themselves or their personal information (as well as that of their family) at risk. In order to do that, it s important to: Stop Before using the Internet, take time to understand the risks and learn how to spot potential problems. Think Take a moment to be certain the path is clear ahead. Watch for warning signs and consider how your actions online could impact your safety, or your family s. Connect Enjoy the Internet with greater confidence, knowing you ve taken the right steps to safeguard yourself and your computer. 4

5 Just like you taught your children to stop, look and listen before crossing the street, they should take similar precautions when connecting to the Internet. Any time kids are about to go online, they need to make sure they re avoiding putting themselves or their personal information (as well as that of their family) at risk. In order to do that, it s important to: Stop Before using the Internet, take time to understand the risks and learn how to spot potential problems. Think Take a moment to be certain the path is clear ahead. Watch for warning signs and consider how your actions online could impact your safety, or your family s. Connect Enjoy the Internet with greater confidence, knowing you ve taken the right steps to safeguard yourself and your computer. 5

6 [Possible discussion questions: ] What are the top three reasons your kids use the Internet? (Examples: homework, social networking, research, music, gaming, etc.) What are some websites that your kids visit regularly? What is your biggest concern about your kids online activity? We used to need a computer and phone line to use the Internet, but today we connect wirelessly via gaming systems like Nintendo DS, PlayStation 3, Xbox Live, as well as tablets, smartphones, and even some television sets. It s important for you to understand the capabilities that each of these devices has, so that you can be proactive in the ways you look after your children s safety. 6

7 [Possible discussion questions: ] What are the top three reasons your kids use the Internet? (Examples: homework, social networking, research, music, gaming, etc.) What are some websites that your kids visit regularly? What is your biggest concern about your kids online activity? We used to need a computer and phone line to use the Internet, but today we connect wirelessly via gaming systems like Nintendo DS, PlayStation 3, Xbox Live, as well as tablets, smartphones, and even some television sets. It s important for you to understand the capabilities that each of these devices has, so that you can be proactive in the ways you look after your children s safety. 7

8 Kids today were born into this digital world. They are what we call digital natives. Adults, on the other hand, are digital immigrants, and we have had to adopt these new technologies. The Internet has been referred to as the Wild Wild Web because it is a wide open territory where anything can happen. As kids navigate this environment, they can accidentally (or intentionally) visit risky sites. McAfee conducted a U.S. study in May 2012 called The Digital Divide, which revealed that 48% of parents believe that their teens tell them everything they do online. In contrast, 71% of teens reported having hidden their online activities from their parents at some point. The term digital divide refers to the disconnect between what parents believe their kids are doing online, and what they actually are doing. We ll explore what some of those behaviors are in a few minutes, but, first, let s take a look at what is at stake for our children. 8

9 Computers can create a feeling of anonymity, and we are more likely to do things online that we wouldn t even consider in real life. One in five teens reported ending a friendship because of something that happened online. What starts out in the school yard no longer stays there. When school ends, aggressive online behaviors cyberbullying -- continue denying kids of the refuge they would normally find at home. Shoplifting is an obvious crime, yet almost one third of teens reported pirating movies and music on the Internet. While a majority of kids would not consider cheating in front of a teacher, almost half of teens reported looking up test answers on the Internet. Cheating, bullying and stealing aren t new issues, but even kids who wouldn t normally engage in these behaviors might be tempted to do so online. 9

10 Another big concern is that many teens are accessing inappropriate content online. Nearly half of kids have stumbled across pornography through sources like online ads, spam and Facebook while one-third of teens admit to accessing porn intentionally. Less common, but more frightening, is the fact that one in ten teens reported meeting someone in person that they only knew online. 10

11 In this same study, McAfee identified different ways in which teenagers hide their behavior online. Let s take a minute to read through a few of them. Why do you think so many kids are hiding their behavior? [Take a few parent responses.] If your child is clearing the browsing history on your computer, or hiding online activities, it may be because he or she is too embarrassed or ashamed to talk to you about it. Opening up the lines of communication, and letting kids know about the risks to their safety (not to mention the risks to the digital devices they love) may persuade them to be more accountable for their actions on the Internet. 11

12 In order to teach our kids how to keep their devices and personal information safe, we need to first discuss some of the most common types of malware (malicious software) that they might encounter while traveling the world wide web. 12

13 What are the security risks to your digital devices? We saw several examples in the video we watched earlier, but what are they, really? Viruses Viruses are malicious programs capable of attaching to disks or other files that then replicate repeatedly, typically without user knowledge or permission. Some viruses can cause major damage to data and computer systems, and can spread from one system to another via , file sharing platforms and USB drives. Spyware These are unwanted programs that exploit infected computers for commercial gain. Some forms of spyware, such as keyloggers, run in the background on your system and record your keystrokes to gather personal information. You might not even know your computer is infected, which is why it s important have up-to-date anti-spyware software installed on your computer. Phishing/pharming Imagine the online bad guys throwing out virtual bait (such as a Pop-Up Ad for a free ipad or game) to get you to enter personal information (such as your name, address or credit card information). This information might then be used to hack into your online accounts, steal your financial assets or spread malware to other computers that connect to yours. Let s take a closer look at each of these types of threats. 13

14 One common type of phishing is the pop-up ad, which is designed to entice you to connect so that cybercriminals can take advantage of you in any one of several ways: Downloading malware onto your computer Taking you to a malicious website Getting you to share personal information. It s important to remind kids that if something seems too good to be true, it probably is! They should never click on pop-up ads not even to close them. Here are some tips to closing pop-up ads safely and securely. 14

15 To safely close a pop-up: On a PC, hold down the Alt key and press F4. For Mac users, hold down the Command key and press W. 15

16 Here s an example of spyware from the video we watched earlier. Jennifer checks her Facebook before school, and starts surfing on the Internet. What she doesn t realize is that when she searches for her favorite celebrity, she actually downloads a keylogger as well. Keylogger also called key logging and keystroke logging, is malware that usually runs hidden in the background of your computer automatically recording all keystrokes, including user names and passwords. Users are typically unaware of its presence. Here s a great tip to safe searching on the Internet: at McAfee we offer a free software product called Site Advisor. It let s you know BEFORE you go to a website if it s a threat to your computer s security by showing you a green, yellow, or red light. How does Site Advisor work? Each day, thousands of times a day, McAfee visits websites and tests them for a comprehensive set of security threats. From annoying pop-ups to back door Trojans that can steal your identity, we find the danger zones before you stumble on them. 16

17 When multiple computers have been infected with malware, they can create something called a botnet. As such, these computers can be controlled by cybercriminals sending out spam and viruses to other computers on the Internet essentially turning them into zombies. Something as simple as opening an infected attachment containing malware can turn a computer into a zombie. Once YOUR computer is infected, you can spread malware to all of your contacts. Safety Tip: NEVER open suspicious attachments. If the attachment is from someone you know, ask that person if it s safe to open. 17

18 It s critical to keep mobile devices secure, especially with all of the information we store on our mobile devices, such as pictures, contacts, texts, s, personal and financial information. We could be putting ourselves and our family members at risk if a phone ends up in the wrong hands. Here are some tips to help keep this sensitive information private: Always use a complex security passcode to lock a mobile device and help your children understand how important it is to keep it private. Remind them to log out of games and accounts like and Facebook and to never leave their device unattended. Keep in mind, there is anti-virus security software available for mobile devices. 18

19 One way to safeguard your personal information is to create secure passwords. Here are tips to creating safe, strong passwords: Mix upper and lower case letters, Include numbers and special characters, Make sure your password is at least 8 characters long, and Update/change them regularly. 19

20 Our kids are the first generation to grow up with hands-on access to the entire world via the Internet. With that access comes expanded risk. Helping our kids to develop good decision-making skills with regard to the Internet is critical to their safety and that process needs to start as soon as they are old enough to connect for the first time. 20

21 When we were growing up, the word friend had a much different meaning than it has with kids today. Today s social environments are the new playgrounds and kids are making friends with total strangers who may, or may not, be who they say the are. 92% of youth have at least one social media account. (McAfee Digital Deception study, June 2013) Because of this, it s important to explain to children from a very early age that people they meet online are STRANGERS, not friends. * Set parental controls: Sites like Club Penguin, Toontown and Webkinz are intended for younger children, but parents have to proactively go into their child s account and set privacy preferences because most of these websites default to open settings. * Read End User License Agreement: While some websites and apps like Facebook, Instagram and Keek, require that kids be 13 or older to create an account, many kids bypass these rules with fake birthdays. As a result, children may be exposed to inappropriate content. * Beware of posting TMI - Kids need to understand that if they reveal too much information about their personal lives (such as their full name, school, address, location, etc.) it could lead to problems like susceptibility to cyberbullies, online predators, invasion of privacy, and identity theft. 21

22 Here s an example of what can happen when someone shares too much information online. In this scenario, a child shares a picture of herself that she thinks is funny with four of her best friends. <Click > They think it s funny too and they can t resist sending it to a few more of their friends <Click for more faces> who send it to a few of their friends <Click for more faces> and so on <Click for more faces> and so forth. <Click for more faces> Eventually, the private picture has been sent to hundreds of people like her teachers, parents, and even strangers. Even if the girl tries to delete this picture from her device, it s too late it has already been forwarded, saved and possibly even altered. Kids need to understand that anything they post or send over the Internet (photos, messages, or personal information) is there forever even if they try to delete it. 22

23 Here s an example of what can happen when someone shares too much information online. In this scenario, a child shares a picture of herself that she thinks is funny with four of her best friends. <Click > They think it s funny too and they can t resist sending it to a few more of their friends <Click for more faces> who send it to a few of their friends <Click for more faces> and so on <Click for more faces> and so forth. <Click for more faces> Eventually, the private picture has been sent to hundreds of people like her teachers, parents, and even strangers. Even if the girl tries to delete this picture from her device, it s too late it has already been forwarded, saved and possibly even altered. Kids need to understand that anything they post or send over the Internet (photos, messages, or personal information) is there forever even if they try to delete it. 23

24 Here s an example of what can happen when someone shares too much information online. In this scenario, a child shares a picture of herself that she thinks is funny with four of her best friends. <Click > They think it s funny too and they can t resist sending it to a few more of their friends <Click for more faces> who send it to a few of their friends <Click for more faces> and so on <Click for more faces> and so forth. <Click for more faces> Eventually, the private picture has been sent to hundreds of people like her teachers, parents, and even strangers. Even if the girl tries to delete this picture from her device, it s too late it has already been forwarded, saved and possibly even altered. Kids need to understand that anything they post or send over the Internet (photos, messages, or personal information) is there forever even if they try to delete it. 24

25 Here s an example of what can happen when someone shares too much information online. In this scenario, a child shares a picture of herself that she thinks is funny with four of her best friends. <Click > They think it s funny too and they can t resist sending it to a few more of their friends <Click for more faces> who send it to a few of their friends <Click for more faces> and so on <Click for more faces> and so forth. <Click for more faces> Eventually, the private picture has been sent to hundreds of people like her teachers, parents, and even strangers. Even if the girl tries to delete this picture from her device, it s too late it has already been forwarded, saved and possibly even altered. Kids need to understand that anything they post or send over the Internet (photos, messages, or personal information) is there forever even if they try to delete it. 25

26 Here s an example of what can happen when someone shares too much information online. In this scenario, a child shares a picture of herself that she thinks is funny with four of her best friends. <Click > They think it s funny too and they can t resist sending it to a few more of their friends <Click for more faces> who send it to a few of their friends <Click for more faces> and so on <Click for more faces> and so forth. <Click for more faces> Eventually, the private picture has been sent to hundreds of people like her teachers, parents, and even strangers. Even if the girl tries to delete this picture from her device, it s too late it has already been forwarded, saved and possibly even altered. Kids need to understand that anything they post or send over the Internet (photos, messages, or personal information) is there forever even if they try to delete it. 26

27 Here s the cover of a popular teen magazine, promoting tips on sexting (the act of sending sexually explicit messages and/or photographs). Sexting is rampant among youth today and carries serious legal consequences including charges for distribution of child pornography. Children must be encouraged to take charge of their own online presence and reputation. Once a picture (or text, post, , etc.) is sent over the Internet, it leaves a digital footprint forever. 27

28 Most phones and cameras today have a feature that geotags photos by embedding the GPS coordinates of the location where you took the picture. Why is this a concern? If you take a picture in your home or at school and post it, anyone can figure out exactly where you are in that picture if your geotag feature isn t disabled potentially leading cybercriminals to your front door. Check your phone s manual for instructions on how to disable the geotag setting. 28

29 Keep in mind, even after disabling the geotag feature on your devices, you still need to be very careful about what you post. For example, in this picture the name of the school is visible on the wall behind the students. A simple Google search on the school s name can provide not only an address, but also a map that shows where these students are approximately eight hours a day. Introduce these safety tips when kids are young, and reinforce them frequently so that when they are old enough to use social networks, they re prepared to use them safely. Things to avoid: Photos taken in school uniform or school sweatshirt Displaying home address or license plate numbers 29

30 It s imperative to teach children that just like in real life, they must treat others online the way that they would like to be treated. We call this cyberethics. 30

31 When school children leave campus, they don t necessarily leave their classmates and their conflicts behind. Using computers and cell phones, students can be in touch with each other at all times and they may abuse this technology to pester, bully, and harm others. Rumors, embarrassing messages and pictures circulate MUCH more quickly than any playground rumor. Here are just a few warning signs that indicate your child might be a victim of cyberbullying: Being ill at ease when receiving an , IM, or text message Feeling upset after using the computer Refusing to leave the house or go to school Withdrawing from friends and family 31

32 Depending upon where you live, consequences for the BULLY range from being blocked from school sports and activities, to suspension or expulsion, to arrest and jail time. You as parents can also be sued for damages resulting from cyber bullying. Consequences for the victim may include anxiety, depression, fear, loneliness, low selfesteem, drop in academic achievement, serious long-term health issues, and injury. 32

33 Depending upon where you live, consequences for the BULLY range from being blocked from school sports and activities, to suspension or expulsion, to arrest and jail time. You as parents can also be sued for damages resulting from cyber bullying. Consequences for the victim may include anxiety, depression, fear, loneliness, low selfesteem, drop in academic achievement, serious long-term health issues, and injury. 33

34 Teach your kids that if they receive a mean or inappropriate text, post, , or photo they should STOP correspondence with the bully, and NOT respond or forward, BLOCK that person from being able to communicate with them, TELL a parent, teacher, or other trusted adult. 34

35 Teach your kids that if they receive a mean or inappropriate text, post, , or photo they should STOP correspondence with the bully, and NOT respond or forward, BLOCK that person from being able to communicate with them, TELL a parent, teacher, or other trusted adult. 35

36 Teach your kids that if they receive a mean or inappropriate text, post, , or photo they should STOP correspondence with the bully, and NOT respond or forward, BLOCK that person from being able to communicate with them, TELL a parent, teacher, or other trusted adult. 36

37 Part of teaching your kids to be responsible cybercitizens is to point out the real-life consequences of their online behavior. Remind them that if they wouldn t do something in person, they shouldn t do it online. <click to go through 5 examples> Reinforce the message that all of these things are illegal and have serious consequences. 37

38 Here s a real-life example of a serious consequence for stealing music some of you may have heard about it. This student from Boston University lost a lawsuit for downloading 30 songs. In May, 2012, the Supreme Court upheld the very stiff penalty. This college student could have purchased the music for about $30, but will end up paying over half a million dollars. 38

39 Thank you for being here today to discuss Online Safety for Kids. You have already taken a big step in helping to insure your family s online safety and security. We encourage you and your family to create your own Online Action Plan. In the meantime, here is a recap of steps you can take immediately to help safeguard your family. <Click to review steps listed on the slide.> Create complex passwords Keep devices in open high-traffic areas Disable geotagging Keep personal information private and NEVER share passwords Be careful about what you post online. Remember, anything you post online is there forever, even if you try to delete it. Use parental controls to block, filter and monitor content Keep a clean machine Make sure to use up-to-date, comprehensive security software Download SiteAdvisor which is a free tool from McAfee that provides website safety ratings For more information, and for links to additional resources, please visit For a fun, interactive way for kids 13 and under to learn about online safety, visit [Everloop is a fun, monitored/filtered online environment for kids ages 13 and under which complies with U.S. child privacy laws. Children can visit the McAfee loop and engage in activities without becoming an Everloop member, however, membership is required to enter Everloop and experience full functionality. Children cannot become members without parent permission validated by a $1.00 account transaction.] Questions? 39

STOP. THINK. CONNECT. Online Safety Quiz

STOP. THINK. CONNECT. Online Safety Quiz STOP. THINK. CONNECT. Online Safety Quiz Round 1: Safety and Security Kristina is on Facebook and receives a friend request from a boy she doesn t know. What should she do? A. Accept the friend request.

More information

National Cybersecurity Awareness Campaign. Kids Presentation

National Cybersecurity Awareness Campaign. Kids Presentation National Cybersecurity Awareness Campaign Kids Presentation About Stop.Think.Connect. In 2009, President Obama asked the Department of Homeland Security to create the Stop.Think.Connect. Campaign to help

More information

FAMILY GUIDE TO. Mobile Safety. How to keep your children safe and connected in today s mobile world SPONSORED BY:

FAMILY GUIDE TO. Mobile Safety. How to keep your children safe and connected in today s mobile world SPONSORED BY: FAMILY GUIDE TO Mobile Safety How to keep your children safe and connected in today s mobile world SPONSORED BY: Is Your Child Ready for a Mobile Phone? MOBILE PHONES ARE PART OF OUR LIVES. They re powerful

More information

Sarah Smythe Youth Community Developer Western Ottawa Community Resource Centre. Genevieve Hupe School Resource Officer Ottawa Police Service

Sarah Smythe Youth Community Developer Western Ottawa Community Resource Centre. Genevieve Hupe School Resource Officer Ottawa Police Service Sarah Smythe Youth Community Developer Western Ottawa Community Resource Centre Genevieve Hupe School Resource Officer Ottawa Police Service From the choices below, which screen name is the worst for

More information

HOW TO STAY SAFE. Smartphones

HOW TO STAY SAFE. Smartphones HOW TO STAY SAFE Smartphones Smartphones provide a variety of interesting activities and ways for young people to engage with their friends and families. However, it is important to be aware of what these

More information

Digital Citizenship Lesson Plan

Digital Citizenship Lesson Plan Digital Citizenship Lesson Plan This course is to help people to understand how to use the Internet in a safe, productive way. Additional resources and links are available on the TechTECS website. http://techtecs.com/digital-citizenship

More information

Cyber Security Awareness. Internet Safety Intro. www.staysafeonline.org

Cyber Security Awareness. Internet Safety Intro. www.staysafeonline.org Cyber Security Awareness Internet Safety Intro www.staysafeonline.org 1 What is Cyber Security? Cyber Security is the body of technologies, processes and practices designed to protect from attack, damage

More information

Cyber safety Parent Easy Guide 63

Cyber safety Parent Easy Guide 63 Cyber safety Parent Easy Guide 63 The online world is part of everyday life for many children and young people. It is a huge virtual playground where they can play, learn and socialise. It can be accessed

More information

E-Safety Issues and Online Safety

E-Safety Issues and Online Safety E-Safety Issues and Online Safety Parents Evening Aims of This Presentation To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and

More information

Guideline on Windows 7 Parental Controls

Guideline on Windows 7 Parental Controls CMSGu2012-01 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Windows 7 Parental Controls National Computer Board Mauritius

More information

10 Quick Tips to Mobile Security

10 Quick Tips to Mobile Security 10 Quick Tips to Mobile Security 10 Quick Tips to Mobile Security contents 03 Introduction 05 Mobile Threats and Consequences 06 Important Mobile Statistics 07 Top 10 Mobile Safety Tips 19 Resources 22

More information

C-SAVE. Scenario #1 Jake and the Bad Virus. The two major C3 concepts this scenario illustrates are:

C-SAVE. Scenario #1 Jake and the Bad Virus. The two major C3 concepts this scenario illustrates are: Scenario #1 Jake and the Bad Virus The two major C3 concepts this scenario illustrates are: Cyber Security: Jake compromised his computer s security by providing personal information to an unknown online

More information

National Cybersecurity Awareness Campaign Families Presentation

National Cybersecurity Awareness Campaign Families Presentation National Cybersecurity Awareness Campaign Families Presentation About Stop.Think.Connect. In 2009, President Obama issued the Cyberspace Policy Review, which tasked the Department of Homeland Security

More information

HEADS up. stop think connect

HEADS up. stop think connect HEADS up stop think connect Stop.Think.Connect. TM is a national public awareness campaign aimed at increasing the understanding of cyber threats and empowering the American public to be safer and more

More information

Only talk with people online that you know in person Time does not equal trust It doesn t mean you really know the person Be suspicious; ANY person worth having as a friend wouldn t ask you to put yourself

More information

National Cyber Security Month 2015: Daily Security Awareness Tips

National Cyber Security Month 2015: Daily Security Awareness Tips National Cyber Security Month 2015: Daily Security Awareness Tips October 1 New Threats Are Constantly Being Developed. Protect Your Home Computer and Personal Devices by Automatically Installing OS Updates.

More information

E-Safety Issues and Online Safety

E-Safety Issues and Online Safety E-Safety Issues and Online Safety Parents Evening Aims of This Presentation To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and

More information

Saheel KHOYRATTY. Partner Technology Advisor

Saheel KHOYRATTY. Partner Technology Advisor Saheel KHOYRATTY Partner Technology Advisor The Internet = A World of Opportunities Look what s at your fingertips A way to communicate with friends, family, colleagues Access to information and entertainment

More information

Internet Safety Plan for Your Family

Internet Safety Plan for Your Family The Mcafee 10-Step Internet Safety Plan for Your Family How to talk to kids, tweens, teens, and novices of any age about online security 10 Table of Contents 3 Introduction 4 5 Today s Internet: Proceed

More information

Internet Safety Guidelines

Internet Safety Guidelines Internet Safety Guidelines Clear, simple, easy-to-read house rules should be posted on or near the monitor. Create your own computer rules or search for an Internet safety pledge you like. The pledge can

More information

PROTECT YOUR COMPUTER AND YOUR PRIVACY!

PROTECT YOUR COMPUTER AND YOUR PRIVACY! PROTECT YOUR COMPUTER AND YOUR PRIVACY! Fraud comes in many shapes simple: the loss of both money protecting your computer and Take action and get peace of and sizes, but the outcome is and time. That

More information

E-Safety Issues and Online Safety. Parents Evening

E-Safety Issues and Online Safety. Parents Evening E-Safety Issues and Online Safety Parents Evening To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and privacy for your children

More information

Online Safety for Middle and High School

Online Safety for Middle and High School Online Safety for Middle and High School Presented by Warren County Schools Technology Department 2010-2011 Internet & Technology Safety The purpose of this presentation is to TEACH YOU about INTERNET

More information

The Digital Divide: How the Online Behavior of Teens is Getting Past Parents

The Digital Divide: How the Online Behavior of Teens is Getting Past Parents June 2012 The Digital Divide: How the Online Behavior of Teens is Getting Past Parents Parent Disconnect Despite the obvious disconnect between teens online behaviors and parents knowledge of them, parents

More information

Activities for Protecting Your Identity and Computer for Middle and High School Students

Activities for Protecting Your Identity and Computer for Middle and High School Students Activities for Protecting Your Identity and Computer for Middle and High School Students Overview There are three posters about protecting your computer for this grade span. We recommend that these be

More information

guide to staying safe online How to shop, bank, socialise and protect your identity online.

guide to staying safe online How to shop, bank, socialise and protect your identity online. THE Mcafee guide to staying safe online How to shop, bank, socialise and protect your identity online. contents 1 Introduction 2 Today s Internet: Proceed with Caution 3 Consider the Upsides 4 Be Aware

More information

Safety Tips for Social Networking

Safety Tips for Social Networking Internet Safety for Kids & Families Safety Tips for Social Networking As a social medium, the Internet enables young people to stay in touch with friends when they are physically separated from them and

More information

DIGITAL DECEPTION: THE ONLINE BEHAVIOUR OF TEENS

DIGITAL DECEPTION: THE ONLINE BEHAVIOUR OF TEENS DIGITAL DECEPTION: THE ONLINE BEHAVIOUR OF TEENS Foreword We love technology, and with good reason. It offers so much to the home in terms of entertainment, education, as well improving the functionality

More information

Affirmative Action Presentation

Affirmative Action Presentation Affirmative Action Presentation Woodbridge Township School District A Guide to Social Media, Schools, and the Law. Woodbridge Township School District Staff Development 2012-2013 To provide school personnel,

More information

Cybersecurity Protecting Yourself, Your Business, Your Clients

Cybersecurity Protecting Yourself, Your Business, Your Clients Cybersecurity Protecting Yourself, Your Business, Your Clients Global Summit of Women June 7, 2014 Celina B. Realuyo Professor of Practice of National Security Affairs William J. Perry Center for Hemispheric

More information

Introduction to Computer Security

Introduction to Computer Security Introduction to Computer Security Rev. Sept 2015 What is Computer Security? 2 Computer Security is the protection of computing systems and the data that they store or access 3 Why is Computer Security

More information

A Parents' Guide to. Snapchat. 2013 ConnectSafely.org

A Parents' Guide to. Snapchat. 2013 ConnectSafely.org A Parents' Guide to Snapchat 2013 ConnectSafely.org Top 5 Questions Parents Have About Snapchat 1. Why do kids love Snapchat? They love the spontaneity of it. It s been (rightfully) drummed into their

More information

BE SAFE ONLINE: Lesson Plan

BE SAFE ONLINE: Lesson Plan BE SAFE ONLINE: Lesson Plan Overview Danger lurks online. Web access, social media, computers, tablets and smart phones expose users to the possibility of fraud and identity theft. Learn the steps to take

More information

Social Networking Sites like Facebook, MSN

Social Networking Sites like Facebook, MSN Most people, young and old, can use a computer and mobile phone these days. Using computers, mobile phones, Tablets (like the ipad) and the internet can be fun and let you keep in touch with friends and

More information

Appropriate Online Behavior Social Networking Etiquette Cyber Bullying Awareness

Appropriate Online Behavior Social Networking Etiquette Cyber Bullying Awareness Appropriate Online Behavior Social Networking Etiquette Cyber Bullying Awareness Gordon Cooper Technology Center 2012 From http://onguardonline.gov/ Think Before You Share What you post could have a bigger

More information

Social Networking Sites A Predator s Playground?

Social Networking Sites A Predator s Playground? Social Networking Sites A Predator s Playground? Posting too much information on social networking sites may be dangerous. A new craze is spreading among teens across the nation and it s growing with every

More information

Protect Yourself. Who is asking? What information are they asking for? Why do they need it?

Protect Yourself. Who is asking? What information are they asking for? Why do they need it? Protect Yourself Your home computer serves many purposes: email, shopping, social networking and more. As you surf the Internet, you should be aware of the various ways to protect yourself. Of primary

More information

Internet Safety & Awareness. Dan Tomlinson 02/23/2013

Internet Safety & Awareness. Dan Tomlinson 02/23/2013 Internet Safety & Awareness Dan Tomlinson 02/23/2013 Internet risks Top six tips for online safety What to do if there is a problem Online safety resources Internet Risks Primary Threats to your Computer

More information

YOUNG PEOPLE, MUSIC & THE INTERNET

YOUNG PEOPLE, MUSIC & THE INTERNET YOUNG PEOPLE, MUSIC & THE INTERNET a guide for parents about P2P, file-sharing and downloading What is P2P? As a parent, you ve probably already heard your children talk about file-sharing, downloading

More information

EADS up. stop think connect

EADS up. stop think connect EADS up stop think connect table of contents 2 4 8 12 Share with Care Interact with Tact The Protection Connection Word Search You text, you play games, you share photos and video. You update your status,

More information

Cyber-Safety Keeping Australians Safe Online

Cyber-Safety Keeping Australians Safe Online Cyber-Safety Keeping Australians Safe Online AIMIA Digital Policy Group DIGITAL POLICY GROUP Contents DIGITAL POLICY GROUP Facebook 2 Google 4 Yahoo!7 8 ebay 10 Summary 12 Key Contacts 12 Millions of people

More information

Technology Acceptable Use Policy

Technology Acceptable Use Policy Technology Acceptable Use Policy Introduction San Gabriel Christian School recognizes that access to technology in school gives students greater opportunities to learn, engage, communicate, and develop

More information

Malware & Botnets. Botnets

Malware & Botnets. Botnets - 2 - Malware & Botnets The Internet is a powerful and useful tool, but in the same way that you shouldn t drive without buckling your seat belt or ride a bike without a helmet, you shouldn t venture online

More information

2 nd - Watch My Online Neighborhood Video: https://www.commonsensemedia.org/videos/my- online- neighborhood

2 nd - Watch My Online Neighborhood Video: https://www.commonsensemedia.org/videos/my- online- neighborhood K- Going Places Safely Essential Question: How do I go places safely on the computer? Students will: discover the Internet can be used to visit far- away places and learn new things; compare how staying

More information

What you need to know to keep your computer safe on the Internet

What you need to know to keep your computer safe on the Internet What you need to know to keep your computer safe on the Internet Tip 1: Always install Operating System updates The most important steps for any computer user is to always install updates, especially security

More information

A Parents Guide to. 2014 ConnectSafely.org

A Parents Guide to. 2014 ConnectSafely.org A Parents Guide to 2014 ConnectSafely.org Parenting in the age of social media can be tricky. Australians are amongst the highest users of social media in the world, averaging 22 hours per week per person.

More information

Norton 360. Benefits. Our ultimate protection, now even more so. Introducing the new Norton 360.

Norton 360. Benefits. Our ultimate protection, now even more so. Introducing the new Norton 360. Norton 360 Our ultimate protection, now even more so. Introducing the new Norton 360. Our ultimate Internet and antivirus protection for all you do online Provides proactive protection, so you can do what

More information

A Parents' Guide to Cybersecurity

A Parents' Guide to Cybersecurity A Parents' Guide to Cybersecurity In partnership with Top 5 Questions Parents Have About Cybersecurity 1.What are the biggest security threats to kids? Children and teens can be caught by the same kinds

More information

Practical tips for a. Safe Christmas

Practical tips for a. Safe Christmas Practical tips for a Safe Christmas CONTENTS 1. Online shopping 2 2. Online games 4 3. Instant messaging and mail 5 4. Practical tips for a safe digital Christmas 6 The Christmas holidays normally see

More information

UNDERSTANDING YOUR ONLINE FOOTPRINTS: HOW TO PROTECT YOUR PERSONAL INFORMATION ON THE INTERNET

UNDERSTANDING YOUR ONLINE FOOTPRINTS: HOW TO PROTECT YOUR PERSONAL INFORMATION ON THE INTERNET UNDERSTANDING YOUR ONLINE FOOTPRINTS: HOW TO PROTECT YOUR PERSONAL INFORMATION ON THE INTERNET SPEAKING NOTES FOR GRADES 4 TO 6 PRESENTATION SLIDE (1) Title Slide SLIDE (2) Key Points It can be really

More information

NET CETERA Chatting with Kids About Being Online

NET CETERA Chatting with Kids About Being Online NET CETERA Chatting with Kids About Being Online People of all ages are: connecting with friends and family online Communicating online is a way of life, yet it comes with certain risks: Inappropriate

More information

Parents guide to online safety. Practical, issue-focussed information and advice for parents of children of all ages.

Parents guide to online safety. Practical, issue-focussed information and advice for parents of children of all ages. Parents guide to online safety Practical, issue-focussed information and advice for parents of children of all ages. Cybersmart is a national cybersafety education program managed by the Australian Communications

More information

Fireside Script. [INSERT VIDEO #4 WHAT KIDS ARE DOING/USING at www.ikeepsafe.org/fbo.]

Fireside Script. [INSERT VIDEO #4 WHAT KIDS ARE DOING/USING at www.ikeepsafe.org/fbo.] 1 Fireside Script INTRO MODERATOR: ALL DIGITAL PRODUCTS LIKE IPODS, CELL PHONES, COMPUTERS, WEBCAMS, DIGITAL CAMERAS AND GAME CONSOLES CONNECT TO WEB 2.0, WHICH ALLOWS US TO UPLOAD AND DOWNLOAD INFORMATION.

More information

Class 3: Identify Tricks and Scams Online

Class 3: Identify Tricks and Scams Online Class 3: Identify Tricks and Scams Online Identify Tricks and Scams Online Instructor s Overview DESCRIPTION: In this lesson, students will learn how to avoid online tricks and scams, and learn best practices

More information

Overexposed: Sexting and Relationships & Private Today, Public Tomorrow Grades 9-12

Overexposed: Sexting and Relationships & Private Today, Public Tomorrow Grades 9-12 Overexposed: Sexting and Relationships & Private Today, Public Tomorrow Grades 9-12 Essential Question: What are the risks and responsibilities when you share online in a relationship? How can you respect

More information

Youth Online Behavior

Youth Online Behavior Youth Online Behavior Created by: Andrea Pieters, Project Researcher, Youth and Education Christine Krupin, Project Researcher, Youth and Education June 1, 2010 Harris Interactive 6/21/2010 1 Methodology

More information

i-safe America Internet Safety Tips for Parents

i-safe America Internet Safety Tips for Parents i-safe America Internet Safety Tips for Parents Online predators are out there. They can infect your computer with viruses, they want to steal your personal information and possibly your identity, and

More information

SOCIAL NETWORKING SITES

SOCIAL NETWORKING SITES YOUNG PEOPLE AND SOCIAL NETWORKING SITES A GUIDE FOR PARENTS, CARERS & TEACHERS ABOUT SOCIAL NETWORKING SITES Social networking sites such as Facebook, MySpace and Twitter, are very popular with children,

More information

A Parents Guide to. 2015 ConnectSafely.org saferinternet.org.uk

A Parents Guide to. 2015 ConnectSafely.org saferinternet.org.uk A Parents Guide to 2015 ConnectSafely.org saferinternet.org.uk At the UK Safer Internet Centre, one of our key objectives is to develop new educational and awareness-raising resources for parents in the

More information

platforms Android BlackBerry OS ios Windows Phone NOTE: apps But not all apps are safe! malware essential

platforms Android BlackBerry OS ios Windows Phone NOTE: apps But not all apps are safe! malware essential Best Practices for Smartphone Apps A smartphone is basically a computer that you can carry in the palm of your hand. Like computers, smartphones have operating systems that are often called platforms.

More information

15 Dangerous Apps Every Parent Should Know About

15 Dangerous Apps Every Parent Should Know About 15 Dangerous Apps Every Parent Should Know About It s safe to say that the advent of the digital age and specifically the Internet, smartphones and social media have brought unique and daunting challenges

More information

Today s teens use technology more than ever. Most have

Today s teens use technology more than ever. Most have Today s teens use technology more than ever. Most have high-speed Internet access, which they use to send instant messages to their friends, create blogs and online videos, keep personal profiles on social

More information

Hint: Best actions: Find out more in videos and FAQ: Hint: Best actions: Find out more in videos and FAQ:

Hint: Best actions: Find out more in videos and FAQ: Hint: Best actions: Find out more in videos and FAQ: Game Cheatsheet This is a spam email, an unsolicited and unwanted email from an unknown sender. Hint: Does this offer seem too good to be true? Perhaps you need to know more? Best actions: Delete, Check

More information

WISE Online: An Internet and Mobile Phone Guide. http://esafety.ngfl-cymru.org.uk

WISE Online: An Internet and Mobile Phone Guide. http://esafety.ngfl-cymru.org.uk WISE Online: An Internet and Mobile Phone Guide http://esafety.ngfl-cymru.org.uk File sharing and Copyright Everyone loves to file share to get music files. But here are some points to take note of: Downloading

More information

Cyber Safety For Parents

Cyber Safety For Parents Cyber Safety For Parents Introduction With the advent of the Internet, good and bad information is available with just the click of a mouse. Kids spend a lot of time online, e-mailing, blogging, chatting

More information

Report on Consumer Behaviors and Perceptions of Mobile Security. Presented by NQ Mobile & NCSA January 25, 2012

Report on Consumer Behaviors and Perceptions of Mobile Security. Presented by NQ Mobile & NCSA January 25, 2012 Report on Consumer Behaviors and Perceptions of Mobile Security Presented by NQ Mobile & NCSA January 25, 2012 Methodology Online survey of 1,158 consumers. Participants had to own a smartphone. Respondents

More information

A Publication of the GCPS Information Management Division

A Publication of the GCPS Information Management Division GCPS A Publication of the GCPS Information Management Division Gwinnett County Public Schools is committed to providing information related to student technology use in a manner that is clear, concise,

More information

How Do People Use Security in the Home

How Do People Use Security in the Home How Do People Use Security in the Home Kaarlo Lahtela Helsinki University of Technology Kaarlo.Lahtela@hut.fi Abstract This paper investigates home security. How much people know about security and how

More information

Today s mobile ecosystem means shared responsibility

Today s mobile ecosystem means shared responsibility It seems just about everybody has a mobile phone now, including more than three-quarters of U.S. teens and a rapidly growing number of younger kids. For young people as well as adults, the technology has

More information

Defense Media Activity Guide To Keeping Your Social Media Accounts Secure

Defense Media Activity Guide To Keeping Your Social Media Accounts Secure Guide To Keeping Your Social Media Accounts Secure Social media is an integral part of the strategic communications and public affairs missions of the Department of Defense. Like any asset, it is something

More information

The Online Generation Gap. Contrasting attitudes and behaviors of parents and teens

The Online Generation Gap. Contrasting attitudes and behaviors of parents and teens The Online Generation Gap Contrasting attitudes and behaviors of parents and teens The Online Generation Gap: Contrasting attitudes and behaviors of parents and teens Submitted to: The Family Online Safety

More information

Cyber Safety for Parent Involvement Council. Sandi Paul Director of Technology Edward Aguiles Director of Curriculum and Instruction

Cyber Safety for Parent Involvement Council. Sandi Paul Director of Technology Edward Aguiles Director of Curriculum and Instruction Cyber Safety for Parent Involvement Council Sandi Paul Director of Technology Edward Aguiles Director of Curriculum and Instruction Topics for Presentation Parent Habits Poll Everywhere quiz Stats on actual

More information

e-safety for Parents

e-safety for Parents e-safety for Parents Helenswood Academy Published June 2014 1 Contents Introduction 4 The Web 5 Children online 6 Friends of your child 7 Information about your child 8 Ownership of your child s technology

More information

This document has been produced following a request from the Hft National Speak Out Group for help with staying safe when using the internet.

This document has been produced following a request from the Hft National Speak Out Group for help with staying safe when using the internet. This document has been produced following a request from the Hft National Speak Out Group for help with staying safe when using the internet. Hft Safeguarding Group commissioned a member of Hft National

More information

Staying Safe Online. A Practical Guide for Parents and Children.

Staying Safe Online. A Practical Guide for Parents and Children. Staying Safe Online A Practical Guide for Parents and Children. Introduction Young people are growing up in a technology rich world. They are surrounded by various forms of technology and they use it extensively

More information

Front Range Christian School ipad Acceptable Use Policy

Front Range Christian School ipad Acceptable Use Policy Introduction Front Range Christian School ipad Acceptable Use Policy Front Range Christian School recognizes that access to technology in school gives students greater opportunities to learn, engage, communicate,

More information

IT & DATA SECURITY BREACH PREVENTION A PRACTICAL GUIDE. Part I: Reducing Employee and Application Risks

IT & DATA SECURITY BREACH PREVENTION A PRACTICAL GUIDE. Part I: Reducing Employee and Application Risks IT & DATA SECURITY BREACH PREVENTION A PRACTICAL GUIDE Part I: Reducing Employee and Application Risks As corporate networks increase in complexity, keeping them secure is more challenging. With employees

More information

Who Needs Parental Controls?

Who Needs Parental Controls? A Survey Of Awareness, Attitudes, And Use Of Online Parental Controls Findings From A National Survey Among Parents Supported by: A Survey Of Awareness, Attitudes, And Use Of Online Parental Controls Findings

More information

OCT Training & Technology Solutions Training@qc.cuny.edu (718) 997-4875

OCT Training & Technology Solutions Training@qc.cuny.edu (718) 997-4875 OCT Training & Technology Solutions Training@qc.cuny.edu (718) 997-4875 Understanding Information Security Information Security Information security refers to safeguarding information from misuse and theft,

More information

SCRIPT FOR OUTREACH. Disconnected and Cyber Predators. Introduction. How many of you have your own cell phones or smart phone?

SCRIPT FOR OUTREACH. Disconnected and Cyber Predators. Introduction. How many of you have your own cell phones or smart phone? SCRIPT FOR OUTREACH Disconnected and Cyber Predators Introduction Hello! How is everyone doing today? My name is and I am here with some friends of mine from the American Bar Association Young Lawyers

More information

Cyber Security. Maintaining Your Identity on the Net

Cyber Security. Maintaining Your Identity on the Net Cyber Security Maintaining Your Identity on the Net Why Cyber Security? There are three points of failure in any secure network: Technology (hardware and software) Technology Support (ITS) End Users (USD

More information

Digital Citizenship Lesson

Digital Citizenship Lesson Digital Citizenship Lesson Categories: School Environment and Student Behavior/ Student Life Outside of School Environment Element: Digital Security Lesson: Malware Grade Level: 6-12 Part I Introduction

More information

Marlon R Clarke, Ph. D., CISSP, CISM Director Network Operations and Services, NSU 10-17-2013

Marlon R Clarke, Ph. D., CISSP, CISM Director Network Operations and Services, NSU 10-17-2013 Marlon R Clarke, Ph. D., CISSP, CISM Director Network Operations and Services, NSU 10-17-2013 Todays Discussion Overview of Computer and Internet Security What is Computer and Internet Security Who Should

More information

How To Avoid The Identity Theft Predators

How To Avoid The Identity Theft Predators Camp Watwuzithinkin How To Avoid The Identity Theft Predators Predator 0 An organism that lives by preying on other organisms Identity Thief 0 A person who makes a living by preying on other people Outsmart

More information

STOP.THINK.CONNECT NATIONAL CYBERSECURITY AWARENESS CAMPAIGN UNDERGRADUATE STUDENT PRESENTATION

STOP.THINK.CONNECT NATIONAL CYBERSECURITY AWARENESS CAMPAIGN UNDERGRADUATE STUDENT PRESENTATION STOP.THINK.CONNECT NATIONAL CYBERSECURITY AWARENESS CAMPAIGN UNDERGRADUATE STUDENT PRESENTATION ABOUT STOP.THINK.CONNECT. In 2009, President Obama issued the Cyberspace Policy Review, which tasked the

More information

Digital Safety and Privacy

Digital Safety and Privacy Digital Safety and Privacy Class Description: As computers and the Internet become more and more the way we communicate, we need to be aware of potential threats to our security online. This class discusses

More information

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS ftrsecure.com Can You Separate Myths From Facts? Many Internet myths still persist that could leave you vulnerable to internet crimes. Check out

More information

Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences

Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences Prepared by Detective Russell Stephens Computer Crimes Unit Dallas Police Department 214-671-3545 Cyber-bullying

More information

Britannica s Guide to e-safety

Britannica s Guide to e-safety Britannica s Guide to e-safety Welcome to Britannica s guide to e-safety Here at Britannica we have long understood that while the internet opens up a whole new world of learning and discovery, it also

More information

Computer Security Maintenance Information and Self-Check Activities

Computer Security Maintenance Information and Self-Check Activities Computer Security Maintenance Information and Self-Check Activities Overview Unlike what many people think, computers are not designed to be maintenance free. Just like cars they need routine maintenance.

More information

ANDRA ZAHARIA MARCOM MANAGER

ANDRA ZAHARIA MARCOM MANAGER 10 Warning Signs that Your Computer is Malware Infected [Updated] ANDRA ZAHARIA MARCOM MANAGER MAY 16TH, 2016 6:05 Malware affects us all The increasing number of Internet users worldwide creates an equal

More information

CYBER SAFETY Kids & Computers: Strategies on Cyberbullying and Personal Web Sites. Mahwah Police Department Police Officer Rosario Zito

CYBER SAFETY Kids & Computers: Strategies on Cyberbullying and Personal Web Sites. Mahwah Police Department Police Officer Rosario Zito CYBER SAFETY Kids & Computers: Strategies on Cyberbullying and Personal Web Sites Mahwah Police Department Police Officer Rosario Zito What is IM? Yahoo! Messenger America Online Instant Messenger (AIM)

More information

THE LITTLE BIG BOOK OF BADNESS

THE LITTLE BIG BOOK OF BADNESS THE LITTLE BIG BOOK OF BADNESS How to stay safe on the Internet a guidebook for students and parents USE THIS BOOK TO FIND OUT HOW YOU AND YOUR COMPUTER CAN STAY AWAY FROM BAD THINGS 2 CONTENTS Why you

More information

A Parent s Guide to Social Networking Sites

A Parent s Guide to Social Networking Sites A Parent s Guide to Social Networking Sites Five Lessons to Keep Your Kids Safe When They Socialize Online fa ye boo web mod. book.c club pe myspace facebook club peng.com yomo space webk yomod.com facebook

More information

COMPUTERS & INTERNET SAFETY. Saint Francis Academy April 26, 2012

COMPUTERS & INTERNET SAFETY. Saint Francis Academy April 26, 2012 COMPUTERS & INTERNET SAFETY Saint Francis Academy April 26, 2012 HELLO! Mr. Michael Hoehl Pronounced Mr. Hale AGENDA Let s talk about the Internet! Challenges Trivia Safety Awareness Call to Action CHALLENGE

More information

2014 Teen Internet Safety Survey. Conducted by The Futures Company

2014 Teen Internet Safety Survey. Conducted by The Futures Company 2014 Teen Internet Safety Survey Conducted by The Futures Company Contents Background, Objectives, Methodology Major Findings Important Trends Next Steps 2 Background + Objectives Cox s commitment to Online

More information

Learn to protect yourself from Identity Theft. First National Bank can help.

Learn to protect yourself from Identity Theft. First National Bank can help. Learn to protect yourself from Identity Theft. First National Bank can help. Your identity is one of the most valuable things you own. It s important to keep your identity from being stolen by someone

More information

Cyberbullying: What Parents Can Do to Protect Their Children

Cyberbullying: What Parents Can Do to Protect Their Children Cyberbullying: What Parents Can Do to Protect Their Children Sponsored by: 2013, PACER Center, Inc. As Technology Evolves, So Do the Ways to Bully Imagine the note, a piece of paper ripped from a notebook,

More information

TWITTER AND YOUR CHILD, A PARENT S GUIDE TO PRIVACY AND SAFETY

TWITTER AND YOUR CHILD, A PARENT S GUIDE TO PRIVACY AND SAFETY TWITTER AND YOUR CHILD, A PARENT S GUIDE TO PRIVACY AND SAFETY What is Twitter? Twitter is one of the leading tools for connecting users with bite-sized pieces of information and status updates. Each message

More information

Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:

Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details: Malicious software About ENISA The European Network and Information Security Agency (ENISA) is an EU agency created to advance the functioning of the internal market. ENISA is a centre of excellence for

More information