Keep the computer(s) used by everyone under the legal age in a room frequently used by everyone in the household with the screen in a position where it can be seen from most areas of the room. This is to avoid the situation where the child or young adult will be more tempted to comply with an online request for ‘keeping our friendship a secret’.

Refer to the section about Cyberstalking , Maintain the most current anti-virus software program and install updates for your system. Assign this task to someone on a regular basis.After downloading and before installing, run your anti-virus software program.

Maintain the most current security updates and patches for each operating system and every program installed even if it is not used. Assign this task to someone on a regular basis.

Keep back-up copies of your information on removable media instead of your hard drive.

When you are not using your home computer, unplug it. Try not to leave the telecommunications cable and the electric cord attached at the same time when the computer is not in use.

Close, disable or disconnect any features of all installed operating systems and software programs that are not used. Use a firewall to make unauthorized entry into your computer much more difficult.

Shopping

Be as careful with online purchases as you are in a store. Review the <a href=”/shop.htm” Internet  Shopping Guidelines.  Print a copy of your online order with the company’s confirmation number, date, and total amount. Dedicate one account to online purchases. With checking or debit card accounts, deposit funds as needed.

E-Mail

Do not include your social security number, tax identification number, password, address, telephone number, occupation, income, school/employer name, address, and telephone number, or any information used to install your internet service. (Legitimate companies, charities and internet service providers do not ask for personal information through email.

Know that if you do not use encryption software, any third party can potentially read your email.

Save email attachments as a file to run through your anti-virus software before opening.  Do not open any attachments unless you confirm with the sender they actually sent the attachment.

For further prevention, print the list of <a href=”/vir/vattach.htm”>infectious       email attachments</a> and <a href=”/vir/vsubject.htm”>subjects</a> and keep it available by your computer.

Parents

Show a genuine interest about your child’s online activities. Apply the same parental rules you use with everyday situations towards the internet. A filtering software program is like having a babysitter. You trust your child with them for a limited period of time. Although the filtering software program is doing its’ job, nothing can replace your parental interest, concern, and protection. You wouldn’t let your child meet a stranger unsupervised or roam alone in the &quot;bad&quot; section of town. So, why would you let your child unknowingly stumble into a potentially dangerous internet situation

Suggestion: make it a family affair where once a week or day everyone shares their online       activities – where they went, who they met, what they learned, etc. Any variation from their personal pattern deserves private questioning. If they did encounter an uncomfortable, threatening, or       harassing situation, tell them that this is the situation where they must be rude online by immediately going offline without any further conversation or communication with the person. (They can always get back online.) Also, tell them to tell you as soon as possible about any future incidents. Do not criticize or punish your child for letting themselves       get into the situation. It is not their fault. But rather, praise them for having told you immediately. Refer to the article about Cyberstalking and the Children’s Section. If you are concerned about a particular website collecting information from your child, write to the Federal Trade Commission.

Young Adults & Kids Be sure to tell only your age, username, and email address online. Do not  email or tell anyone online your school name, your real name, address,  city, or your parents’ occupation, income, or credit card numbers. Chances  are that your email &quot;friend&quot; is who they say they are, even though many people do exaggerate online their good points, possessions,  and abilities. If they send you a picture of themselves, do not send a picture back. However, you can be corresponding with someone, even for a considerable period of time, and trust them now because they have been  consistent in how and what they have said. Unfortunately, since you have  not met this person, you (including adults) really have no way of being sure that your friend is not an experienced man or woman mascarading online as someone your age looking to cause you harm or even death. Chat rooms (for kids, teens, or adults) are a very effective tool for the person with bad intentions. Refer to the article about Cyberstalking.

Internet safety, like everyday safety precautions, are necessary. Have a wonderful time using the tool of the internet, get done what you set  out to do, but be cautious and avoid potentially harmful situations.

Related Websites

ByteCrime.org
CyberAngels.org
FTC’s OnGuard Online.gov
i-SAFE
Internet Keep Safe Coalition
National Cyber Security Alliance
Stay Safe
US National Strategy to Secure Cyberspace



Dynex USB 2.0 7  Port Hub & Dynex CPSU0536 Power Adapter picture
Dynex USB 2.0 7 Port Hub & Dynex CPSU0536 Power Adapter
$17.99


New Kramer vs-40FW 4-Port FireWire 800 Repeater/HUB picture
New Kramer vs-40FW 4-Port FireWire 800 Repeater/HUB
$199.99


MACALLY UC3HUB3GBC USBC To A Hub Charge Ethernet picture
MACALLY UC3HUB3GBC USBC To A Hub Charge Ethernet
$70.77


NEW Chocolate Bar 4 Port USB Hub Support 2.0 picture
NEW Chocolate Bar 4 Port USB Hub Support 2.0
$0.14


Ibuffalo Usb2.0Hub Bus-Powered 4-Port White Playstation4 Ps4 Ps3 Confirmed The picture
Ibuffalo Usb2.0Hub Bus-Powered 4-Port White Playstation4 Ps4 Ps3 Confirmed The
$37.99


SynOptics LattisHub 2814 16 Port Ethernet Bay NETWORKS HUB Network Switch  picture
SynOptics LattisHub 2814 16 Port Ethernet Bay NETWORKS HUB Network Switch
$39.99


Netgear DS108 8-Port Hub 10/100 dual speed w/ power adapter picture
Netgear DS108 8-Port Hub 10/100 dual speed w/ power adapter
$8.55


1 USB 2.0 Male To 2 Dual Female Jack Y Splitter Hub Power Cord Adapter Cable picture
1 USB 2.0 Male To 2 Dual Female Jack Y Splitter Hub Power Cord Adapter Cable
$0.01