Volume 3 number 8 August 2010.
From the Desk of David Badertscher
Protecting Children Online.
What are the threats online?
Children are spending more of their time online than ever before. According to one study, 8-18 year-olds spend an average of 1.5 hours a day using a computer outside of school. As use of the Internet and online technologies becomes more ingrained into our everyday lives, it is important we ensure that our youth understand how to use these powerful tools and how to protect themselves from becoming cyber victims. Children of all ages face online risks, including the following:
· Inappropriate Contact: Children may come in contact with individuals with malicious intent, such as bullies and predators.
· Inappropriate Content: Children may be exposed to inappropriate content while online, such as violent or sexually explicit material.
· Inappropriate Conduct: Children have a sense of anonymity while online and may do things that they would not do when face to face with someone.
· Identify Theft: Because of the perceived sense of anonymity online, children may post personal or identifying information that can then be used by identity thieves.
How do I keep my children safe?
There are steps parents, educators and others who work with children can take to help keep children safe on-line:
· Computer Location: Keep your computer in a central and open location in your home.
· Supervise Access: Supervise computer access for children and monitor the types of sites visited. Consider using parental control tools on your home computer. These tools are provided by some Internet Service Providers or are available for purchase as a separate software package. You may be able to set some parental controls within your browser. As an example, in Internet Explorer click on Tools on your menu bar, select Internet Options, choose the Content tab, and click the Enable button under Content Advisor. (For other browsers, contact the vendor to determine what parental controls are included.)
· Establish Rules: Create guidelines for computer use. Include the amount of time that may be spent online and the type of sites that may be visited. Post these rules near the computer.
· Personal Information: Teach children not to post or share personal information such as their photograph, address, age or activity schedule. Create a safe screen name that does not reveal personal information about the child.
· Web Filtering: Use web filtering software that restricts access to inappropriate websites and content.
· Communication: Maintain an open line of communication. Encourage children to come to you if they feel threatened online.
· Cyberbullying: Teach children not to respond to cyberbullies. Report incidents of cyberbullying to school administrators and local law enforcement when appropriate.
Here are some resources focused on protecting children online.
· NET CETERA: Chatting with Kids About Being Online: http://www.ftc.gov/bcp/edu/pubs/consumer/tech/tec04.pdf
· iKEEPSafe Internet Safety Coalition
The above information is from tips provided by the Multi-State Information and Analysis Center (MS-ISAC). To learn more about MS-ISAC go to http://www.msisac.org/
For additional monthly cyber security newsletter tips visit: www.msisac.org/awareness/news/
MORE NEWS AND INFORMATION:
Free Webinar:Hacking Exposed Live! September 2010, 11:00 AM PDT / 2:00 PM EDT
Web 2.0: New avenues for blended attacks
In this FREE webcast, McAfee Senior Systems Engineer, Erik Elsasser will join Hacking Exposed co-author and McAfee Senior Vice President and General Manager, Risk and Compliance, Stuart McClure to analyze the stages of a blended attack. While today’s blended attacks use a number of avenues including social media to deliver malicious payload, they often follow a similar pattern. In this webcast, they will discuss and demonstrate the attack stages
Click here to Register and obtain additional information.
Highlights:Strategic Security Survey: Global Threat, Local Pain
08/30/2010 Highlights of exclusive InformationWeek Analytics research as it appears in “Global Threat, Local Pain,” our report assessing whether the high-profile infiltration of corporate networks worldwide (Google China leaps to mind) is forcing execs to reconsider their security strategies and pony up related resources
White Paper: Cloud Based Security Survey.
If you aren’t frightened by the changing threat landscape, you should be. Security threats are on the rise and cybercriminals are finding new ways to take advantage of Web ubiquity to scam users, breach personal information, and steal billions of dollars.
What needs to be done and how? This white paper concludes:
• The threat landscape is changing.
• Exsisting solutions are no longer enough.
• Large organizations need to join cloud-based security communities.