Keep the computer(s) used by everyone under the legal age in a room frequently used by everyone in the household with the screen in a position where it can be seen from most areas of the room. This is to avoid the situation where the child or young adult will be more tempted to comply with an online request for ‘keeping our friendship a secret’.
Refer to the section about Cyberstalking , Maintain the most current anti-virus software program and install updates for your system. Assign this task to someone on a regular basis.After downloading and before installing, run your anti-virus software program.
Maintain the most current security updates and patches for each operating system and every program installed even if it is not used. Assign this task to someone on a regular basis.
Keep back-up copies of your information on removable media instead of your hard drive.
When you are not using your home computer, unplug it. Try not to leave the telecommunications cable and the electric cord attached at the same time when the computer is not in use.
Close, disable or disconnect any features of all installed operating systems and software programs that are not used. Use a firewall to make unauthorized entry into your computer much more difficult.
Be as careful with online purchases as you are in a store. Review the <a href=”/shop.htm” Internet Shopping Guidelines. Print a copy of your online order with the company’s confirmation number, date, and total amount. Dedicate one account to online purchases. With checking or debit card accounts, deposit funds as needed.
Do not include your social security number, tax identification number, password, address, telephone number, occupation, income, school/employer name, address, and telephone number, or any information used to install your internet service. (Legitimate companies, charities and internet service providers do not ask for personal information through email.
Know that if you do not use encryption software, any third party can potentially read your email.
Save email attachments as a file to run through your anti-virus software before opening. Do not open any attachments unless you confirm with the sender they actually sent the attachment.
For further prevention, print the list of <a href=”/vir/vattach.htm”>infectious email attachments</a> and <a href=”/vir/vsubject.htm”>subjects</a> and keep it available by your computer.
Show a genuine interest about your child’s online activities. Apply the same parental rules you use with everyday situations towards the internet. A filtering software program is like having a babysitter. You trust your child with them for a limited period of time. Although the filtering software program is doing its’ job, nothing can replace your parental interest, concern, and protection. You wouldn’t let your child meet a stranger unsupervised or roam alone in the "bad" section of town. So, why would you let your child unknowingly stumble into a potentially dangerous internet situation
Suggestion: make it a family affair where once a week or day everyone shares their online activities – where they went, who they met, what they learned, etc. Any variation from their personal pattern deserves private questioning. If they did encounter an uncomfortable, threatening, or harassing situation, tell them that this is the situation where they must be rude online by immediately going offline without any further conversation or communication with the person. (They can always get back online.) Also, tell them to tell you as soon as possible about any future incidents. Do not criticize or punish your child for letting themselves get into the situation. It is not their fault. But rather, praise them for having told you immediately. Refer to the article about Cyberstalking and the Children’s Section. If you are concerned about a particular website collecting information from your child, write to the Federal Trade Commission.
Young Adults & Kids Be sure to tell only your age, username, and email address online. Do not email or tell anyone online your school name, your real name, address, city, or your parents’ occupation, income, or credit card numbers. Chances are that your email "friend" is who they say they are, even though many people do exaggerate online their good points, possessions, and abilities. If they send you a picture of themselves, do not send a picture back. However, you can be corresponding with someone, even for a considerable period of time, and trust them now because they have been consistent in how and what they have said. Unfortunately, since you have not met this person, you (including adults) really have no way of being sure that your friend is not an experienced man or woman mascarading online as someone your age looking to cause you harm or even death. Chat rooms (for kids, teens, or adults) are a very effective tool for the person with bad intentions. Refer to the article about Cyberstalking.
Internet safety, like everyday safety precautions, are necessary. Have a wonderful time using the tool of the internet, get done what you set out to do, but be cautious and avoid potentially harmful situations.
FTC’s OnGuard Online.gov
Internet Keep Safe Coalition
National Cyber Security Alliance
US National Strategy to Secure Cyberspace
USB C Hub Ethernet Multiport Type C Adapter For MacBook Pro/Air iPad Pro Laptop
USB 3.0 Hub 4-Port Adapter Charger Data SLIM Super Speed PC Mac Laptop Desktop
Yottamaster 5 in 1 USB Type C Hub USB 3.0 4K HDMI Adapter For Macbook Pro Air
7 Port USB 2.0 / 3.0 Hub Splitter Adapter High Speed For PC Laptop Mac Desktop
4-Port USB 3.0 Hub 5Gbps Portable Compact for PC Mac Laptop Notebook Desktop
4-Port USB 3.0 Hub Adapter Charger Data Slim Super Speed PC Mac Laptop Desktop
USB 3.0 Hub 4-Port USB Hub USB Splitter USB Expander for Laptop, Flash Drive,HDD
USB 3.0 Hub 7 Port On/Off Switch High Speed Splitter AC Adapter Cable PC Laptop
Multiport USB-C Hub Type C To USB 3.0 4K HDMI Adapter For Macbook Pro / Air USA
8-in-1 USB-C Hub Adapter Type-C Hub HDMI For MacBook Pro/Air iPad Pro Laptop