Protect This House: Safety for the Home

Introduction: ...... 2 Why Should We Care?...... 3 Online Rule of Agreement ...... 4 How do I know if a computer has been secured? ...... 4 Example Rules: Online Ten Commandments ...... 5 Who is in the Driver's Seat? - User Restrictions ...... 7 Parental Controls – Keep that Baby Gate Up! ...... 10 Keep the Garbage Out! – Web Filters ...... 12 Anti-Spyware and Anti-Virus – Does my Computer have a Cold? ...... 14 Operating System and Application Updates – Is your Foundation Secure? ...... 17 Cell Phone Parental Controls ...... 19 Safe Web Surfing ...... 23 Get your computer protected! ...... 23 Keep your Passwords Strong ...... 23 What is a strong password? ...... 23 Don't be Click Happy! ...... 24 Shop Safely ...... 24 Nothing in Life is FREE ...... 25 Social Networking – Do You Know Where Your Kids Are? ...... 26

1 Introduction:

About the Author: I am a mother of four children. They are fairly young (all under six). Although they don‟t have cell phones, use the computer, or have an account on Facebook, I want to make sure I am prepared for when they start venturing out in this virtual world in which we live.

I am also an ethical hacker. Before I was married and had kids, I worked for 3 years for a large public accounting firm as a security consultant. Many times I would work on consulting projects, which required me to sit on a company‟s network and try and hack into systems and obtain sensitive information. I would then present my findings, so that the company could make changes and have a more secure network. I now work for the Security department for a mid-sized bank.

Because of my work experience, I have been the “technical support” for friends and family. I soon realized that although almost everyone has a Facebook account and a high speed Internet connection, most moms don‟t know the first thing about computer security. They are scared of their computers and don‟t want to “break” anything.

About this Handout: The purpose of this handout is to educate you on how to PREVENT garbage from coming into your home through your computer, laptop, tablet, iPhone, etc. I built a website dedicated to this topic: www.securemama.com. I have multiple to video tutorials on how to set up controls on the various devices.

Here are some other websites that are helpful as well: http://www.theonlinemom.com http://www.ikeepsafe.org/ http://www.internetsafetyproject.org/

Making changes on a home computer can be scary. This is especially true when making security changes. Your blood rushes, your heart is beating, and in your head you are thinking, “What application will it break? Will I be able to go back to how it was before? What am I doing??!!”

I know this can be overwhelming, but just see what will be the most beneficial to you and your family, and implement a change. Also, just like we say a prayer when we lose something. You can also say a prayer when you are confused in front of the computer especially when you are safeguarding your computer!

2 Why Should We Care? This is direct from LDS.org: http://www.lds.org/study/topics/internet?lang=eng

The Internet can be a wonderful tool and resource for information, but caution must be exercised in order to protect families and individuals from the potential dangers that are present online. Church leaders repeatedly counsel members to avoid Internet pornography, gambling, and other evils that are available on the Web. The Church also provides links to many resources to help individuals and families use the Internet safely and wisely.

“You live in a world of technological miracles. You have access through the Internet to resources one cannot begin to imagine. However, lurking there as well is a sinister evil, as deadly as a rapidly growing cancer. If you allow this pornographic disease a place in your heart, the Spirit withdraws itself and, ere you are aware, you are left alone and vulnerable (see D&C 121:37). You must avoid that pornographic playground. The same self-discipline is required relative to the materials you choose to read and the videos you may select to view. Pornography is poison!” (“Bring Your Mission Home with You,” Ensign, Dec. 2000, 18).

Obviously, we cannot keep everything out, but we MUST provide direction and implement some controls for our kids, before they are inadvertently exposed to objectionable material.

3 Online Rule of Agreement

Online Rule of Agreement This agreement is to promote a discussion of what is allowed and not allowed. Your child is exposed to so much and in so many different ways (home computer, school, cell phones, friends‟ cell phones, library computers, etc.). It is not realistic to assume that all of those devices have been secured. Discuss what types of sites are allowed and what is not allowed. Discuss what your child can and cannot do on the Internet, no matter what or where or how they are accessing the Internet. Use this agreement as a way to safeguard your child when they are accessing the Internet on computers or devices that have not been secured.

How do I know if a computer has been secured? When I say secure, my main concern is whether or not restrictions are in place for a safe web surfing environment. Does the computer have a separate user account for kids with limited functionality? (See page 7). Does the Computer have a web filter in place? (See page 12). Does the computer have some kind of anti-virus or anti-spyware safeguards? (See page 13). Does the computer have the most recent operating system and application updates installed? (See page 15).

In addition to the discussion of Internet Safety, you should spend time with your child on the Internet. You can build trust with your children and help them know that you are looking out for their best interest. Start as early as you can, before you have to turn into a “bad cop.”

It is inevitable that your child will stumble on something inappropriate. They may have accidentally clicked on a link or an advertisement. Establish a „fire drill‟ routine so that your child can come to you if something inappropriate comes on the screen. Let‟s Teach “Stop, drop, and Tell.” Stop what they are doing on the computer, drop everything and go tell an adult.

4 Below is an example online agreement. The new “Strength of Youth” pamphlet has some good guidelines as well. ://www.lds.org/youth/for-the-strength-of-youth/entertainment-and- media?lang=eng

Example Rules: Online Ten Commandments

1. Do not view inappropriate content including pornography, content with vulgar language, or anything that will take away the Spirit. “If there is anything virtuous, lovely, or of good report or praiseworthy, we seek after these things.” - Articles of Faith 1:13 2. Do not share any personal information on the Internet. (Pictures, Name, address, password, etc.) If you want to join a site that requires this information, you must first get permission. Do not purchase items or give out credit card information without your parents‟ permission. 3. Do not enter chat rooms. Chat Room: A chat room is a interactive website where people of similar interests can communicate at the same time. These are available through popular sites such as yahoo.com. The problem with chat rooms is that your child will be interacting with strangers, and you do not know the stranger‟s intentions. 4. Do not use social media or Instant Messaging applications without your parents permission. Social Media: Any website where you can interact with friends or acquaintances, example Facebook, Twitter. Instant Messaging: You can communicate live with other people over the Internet by typing into a specific application. Popular messangers: msn messanger, yahoo messanger, etc. 5. Do not post mean spirited comments or status updates online. THINKS! Is it True? Is it Helpful? Is it Inspiring? Is it Necessary? Is it Kind? Is it Secure? 6. Do not download any applications from the Internet. There are many free applications available but a lot of these free applications are loaded with malware. (malware: Short for „Malicious Software‟ is any software written with the intent disrupt computer operation, gather sensitive information, or gain unauthorized access to computer systems). 7. Do not click on links, e-mails, or shortened links if you don‟t know the recipient. STRANGER = DANGER!! (Shortened links: Any link that has been shortened and you cannot clearly identify the website on the shortened link. Popular shortened services: bitly, tinyurl). 8. Follow the Internet Firedrill: Stop, Drop, and Tell an adult or parent if any inappropriate material is displayed, or a suspicious event

5 occurs. 9. Your web history and activities will be closely monitored. Do NOT disable any monitoring or web filter controls. 10. Do not spend too much time on the Internet. Get outside, talk to friends face to face, get some fresh air, experience life, and develop your talents instead of smothering your great personality by spending too much time online.

6 Who is in the Driver's Seat? - User Restrictions

Who is Driving your Computer?!

We have all been there. The kids are loaded up in the car, and then we remember we left something in the house. What do you do? Do you get all of the kids out of the car? Do you leave them in the car? Do you turn off the car? We either take all of the kids inside with us, or take all of the precautions necessary so that they don‟t manage to drive and CRASH the car.

What would happen in this scenario? What if you left the car running in drive and told your toddler to keep their foot on the break while you are still inside? Now what are the chances of your kids crashing the car?

CRASH!!!!

Obviously there is a metaphor here. WHEN YOU LET YOUR KIDS USE A COMPUTER under a PRIVILEGED ACCOUNT there will inevitably be some kind of Computer Crash.

What is a Privileged Account?

DEFINITION: A privileged account is any account that is allowed to make changes to the computer (install application, change system settings etc.) This would be the „Local Administrator‟ Account. It‟s the main account that you use to manage your computer.

METAPHOR CONTINUED: For example, the driver can accelerate, break, turn, etc. They are the „local administrator‟ or privileged account. Users are like passengers of the car, they may be able to change the radio station or climate control, but they cannot control the car itself. Likewise, they can still enjoy the car ride and see the same sites.

7 WHAT if I don’t have kids or kids living in the home?

Many of you may not have kids living in your home; however, you may have grandkids, or other relatives that come over and use your computer. If you have not set up controls to limit the use of your computer, closely monitor any activity while your computer is being used. Sit right by them the whole time (shoulder ).

WHAT if your child is using a CLUNKER of a Computer?

I know what you are thinking. “I don‟t really care what my child does on that old Dell in the family room. It‟s old and on it‟s last leg.” Yes, the financial loss is not as great. However, my focus is how to protect your children from inappropriate material. What would you pay to keep your kids away from that garbage?!

Is an old computer vulnerable to predators, hackers, etc? YES, especially if it is connected to the Internet. If a computer is not connected to the Internet, you can still spread malware to and from other computers in the home by transferring files.

Here is the moral of the story … IF YOU DON’T TRUST YOUR KIDS ON YOUR NEW COMPUTER, DON’T LET THEM HAVE PRIVILEGED ACCESS TO ANY COMPUTER!!

Don’t Get “Locked Out of Your Car”

Set up a password for the “Privileged Account.” Make sure it‟s a good password. For a „good‟ password you need at least 8 characters, a special character (not a number or letter), and the rest a combination of letters and numbers. A good tool is a „passphrase‟ that is easier to remember. Such as Secur3mama! I substituted the 3 for the „e‟ and added a exclamation point at the end.

Now, DON’T FORGET the PASSWORD! It‟s so hard because you really shouldn‟t have it written down, because your kids will find it and figure out how to get around all of the controls you set up. Recovering the password is not IMPOSSIBLE, but would require a visit to the Geek Squad or IT savvy neighbor. So, just like you double check that you have your keys before you lock the door, don‟t lock yourself out of your computer.

8

Do not feel overwhelmed! I provided links to video tutorials on my blog, which will show you how to set up a user account on various types of computers. http://securemama.com/2012/03/14/who-is-in-the-drivers-seat-user- accounts/

Creating a separate user account is one of the best things you can do to protect your home computer!! Keep Breathing!! You can do it!!

9 Parental Controls – Keep that Baby Gate Up!

So you may wonder, is there any way to enforce the Online Agreement? Just like we set up a baby gate in front of the stairs for a toddler, we can set up restrictions for a kids‟ account on the computer.

With all of the screen interaction these days you may try to limit the time that your child spends on the computer. The newer operating systems have Parental controls, which limit computer time according to limits set by the parent.

Windows 7 – The Windows 7 Parental controls are not as extensive as the Windows Vista Parental Controls. They allow controls for the following:

o Time limits – What time of day are they allowed on the computer? o Programs – Which programs or applications are they allowed to use? o Game Ratings – What types of computer games can they play? This uses the Game Rating system. Parents can set the level that is appropriate.

The Windows 7 – is the latest Windows operating system. See page 15 for a more complete definition of the term Operating System.

In order to get more granular control over web monitoring and web filtering you have to install Windows Live Family Safety.

Here is a link to some videos on how to install and configure restrictions on Windows Live Family Safety. http://securemama.com/2012/03/29/parental-controls-keep-that-baby- gate-up/

10 If you are going to create a custom list of allowed websites, I give a word of caution regarding Search Engines (Search Engine: Any website that is used to „crawl the web‟ and produce websites that match your search criteria. For example: google.com, bing.com). Search engines are great tools for web surfing, but they can also easily find some inappropriate material without implementing a web filter. (Web Filter: An application that is installed on a computer to block access to known inappropriate websites).

Mac OS

If you own an apple computer, you must first create a new account. Then you can set restrictions for the following items:

o Programs - Which programs or applications are they allowed to use? o Web – You can turn on a setting, which tries to limit access to adult content. (Notice the word „try.‟ Apple is not promising that they can block all adult content). You also can manually configure websites that are allowed. o Time limits – You can limit the amount of time spent per day on weekday or weekend. You can also have time restrictions that block the use of the computer at night or other times when you don‟t want your kids on the computer.

Here is a link to some video tutorials on how to implement Parental Controls on a Mac. http://securemama.com/2012/03/29/parental-controls-keep-that-baby- gate-up/

11 Keep the Garbage Out! – Web Filters

The parental controls are a great start; however, when your growing child needs to create projects and reports for school, he will inevitably want to search for information on the Internet. Now you won‟t be able to manually control the allowed websites. Before you let them loose on the web, you should consider installing a web filter. Even with a web filter and computer controls, you should still sit by your child and shoulder surf. You can teach them safe web browsing skills. (See Page 21)

Free Software - There are a free web filters available. I recommend the K- 9 web protect. (Link http://www1.k9webprotection.com/) It is backed by the Blue Coat web filter database, which is also commonly used by businesses. This database is updated DAILY with the most recent list of inappropriate sites. It will block the inappropriate images and websites that may come from a google search.

Software for Purchase – The NetNanny (http://www.netnanny.com/) This software has a lot more monitoring tools on top of the basic web filter, including social media monitoring, IM & chat room monitoring, profanity masking, and time management software. This would be a good choice if you have a computer that does not have the built-in parental controls. Also the software allows for remote reporting. This means that if someone changes any settings or accesses inappropriate sites while you are gone, you get an e-mail with a detailed report of what was viewed, when, and for how long.

Another option is to install a free that is built for kids. See (http://www.kidzui.com/) The KidZui K2 browser is stuffed with millions of websites, games, and videos which are all pre-screened and approved by an editorial staff, teachers and parents. Think of it like web browsing with

12 training wheels.

13

Anti-Spyware and Anti-Virus – Does my Computer have a Cold?

As a mom, I have come to accept the fact that my kids will get a cold almost 3 times a year. Believe it or not, my kids like to play with other kids. My kids like to go to parks, and even indoor play gyms. Even though these activities increase the chances of getting a cold, I don‟t want to raise my kids in a vacuum and away from germs and bacteria ... or can I?

So, what if there was a vaccine for the common cold? The cold has been mapped to 99 variations of the RhinoVirus. What if I could vaccinate my kids against every type of cold? What if my kids could get vaccinated automatically for any new forms or mutations of the cold? That would be AMAZING!!!

This cure of the common cold is my analogy for Anti-virus software. Every time you perform any kind of transfer of data on your computer (i.e. like the analogy above, the playdate that your computer has on the Internet) you are increasing the risk of getting some kind of computer virus (Computer virus – A type of software that can replicate itself and spread from one computer to another). Transfering files, browsing web pages, e-mails, even Facebook links can be a vehicle for getting a virus.

Should we all just maroon our computers and take everything offline?

No, that‟s just silly.

14

All you need is an anti-virus software solution!!

Here are my recommendations:

o For a Windows computer my RECOMMENDATION is the BitDefender Antivirus Plus – 2012. Usually you can find the software to have a license for 3 computers. http://www.bitdefender.com/

o For a Mac my RECOMMENDATION is Norton Anti-Virus 2012.

o Free software - Windows AVG Anti-Virus FREE 2012 http://free.avg.com/us-en/homepage Microsoft Security Essentials http://windows.microsoft.com/en-US/windows/products/security- essentials

Here are some things to consider while picking an anti-virus solution:

o Service fees - You need to think about your anti-virus solution as a SERVICE as opposed to purchasing software. You are paying for the automated updates to your anti-virus signatures. New viruses are created every day. YOU NEED a DAILY VIRUS SIGNATURE UPDATE, not just the software.

o You still need to SURF SAFELY! (See page 21) Just like we told our kids, “Don‟t talk to strangers, don‟t take candy from strangers, and especially, DON‟T GET IN A VAN WITH A STRANGER!” Likewise, Tell them, “Don‟t download software from ‟stranger‟ websites, Don‟t click on the pop-up ad that says „YOU ARE A WINNER!” (I know it feels good, but if you click on it, you will be a LOSER!) No amount of anti-virus software can protect if you don’t surf safely.

o Protect ALL of your computers. If you are only concerned about your NEW computer, it can be infected by transferring files and data online or from another computer at home.

o Beware of “Free Anti-Spyware” and “Free Anti-Virus” software. They are sometimes spyware applications themselves! I know that you may not want to spend money on the anti-virus software, but resist the urge to search for “Free Anti-Virus” software. It may be a 15 spyware application in disguise!

16 Operating System and Application Updates – Is your Foundation Secure?

What is an Operating System? Think of the Operating system as the different systems in your house: Electrical System and Plumbing. They all provide services to all of the rooms in your house (kitchen, bedrooms, living room)

Example Operating Systems that you may be familiar with:

Windows (Bill Gates): XP, Vista, Windows 7

Apple (Steve Jobs) Mac OS – Lion, Snow Leapord, etc

What is an Application? – An application interacts directly with the user and performs a function or purpose. Just like the analogy above, as a homeowner, I interact directly with the various rooms in my house. The rooms are different; each has a different purpose just like applications. I benefit from the electrical, plumbing systems, but I do not (Heavens NO!!) change or interact directly with our electrical or plumbing systems.

Since being a homeowner, there is one thing that you dread and try to avoid - WATER DAMAGE. Water can sneak into the smallest crack in a house foundation. Or what about a pipe that has gone out? More WATER DAMAGE!!

So, in our computer world there are cracks in our operating system. Vulnerabilities! Vulnerability: a security weakness that could be exploited by a virus or hacker. By exploiting the vulnerability, they could hack into your computer.

What!!! Someone could break into my computer!? Yes! That is why the Internet relates well to rain water. (If not properly protected) It can be an onslaught of malware that could potentially damage your computer or 17 steal personal information. Think of a huge rainstorm and huge puddles around your house. Don‟t you get a little nervous?!

So how do I protect my computer?

INSTALL ALL RECOMMENDED OPERATING SYSTEM UPDATES

RESTART YOUR COMPUTER AFTER INSTALLING THE UPDATES!!

The updates are not effective if you don‟t restart your computer. Don‟t ignore the reminders. Take the time immediately and install the updates and restart the computer while you are thinking about it!

Here is a link to my blog with video tutorials on how to install updates on your Windows or MAC computer -

Enable automatic updates in Windows 7 http://www.youtube.com/watch?v=3diwDOfEdPs

Windows XP http://www.youtube.com/watch?v=i7qqKEhBM7k

Mac: http://www.youtube.com/watch?v=y26vBQecp4M

INSTALL RECOMMENDED APPLICATION UPDATES

It‟s usually at the most inconvenient moment, but if you see an update available for any application that you have installed INSTALL them. (Example applications: Adobe Acrobat Reader, , , iTunes). An onslaught of viruses and spyware has been created to attack old versions of Adobe Acrobat Reader (Adobe Reader – Popular software to publish and read pdf documents).

INSTALL ANY RECOMMENDED UPDATES OF APPLICATIONS THAT YOU HAVE INSTALLED!!

18 Cell Phone Parental Controls

Ahhh cell phones!! I remember when I got my first cell phone. I was in college and I still felt like it was a splurge because the campus did have courtesy phones in many buildings. Now with the growing trend of cell phones, it is not uncommon to have an eight or ten year old with a cell phone.

How do we manage this WHOLE NEW PIECE of technology?!!

I would recommend creating a cell phone agreement. Set up rules for the proper use of the phone. Even though most plans allow for UNLIMITED texting, should your child have UNLIMITED access to texting day and night? I worry when my son finally gets a cell phone, will I only be talking to the top of his head?!

Example Rules:

1) BE RESPONSIBLE! Stay within budgeted minutes or texts. Be responsible for any overage fees. 2) BE CLEAN! Do not text anything lude, profane, or inappropriate. 3) BE SAFE! Do not give your cell phone number to strangers, on on- line forms, or raffle giveaways. 4) BE SMART! Do not stay up late texting with friends. Even if it is about a report or homework, it creates bad habits, which won‟t help you succeed in school. 5) BE POLITE! Do not use your cell phone during inappropriate social situations such as at the dinner table, during family time, or at church. 6) BE REASONABLE! Do not text too much. Even though a plan will

19 allow for unlimited texts, keep your texts to be less than predetermined amount. 7) BE KIND! Remember to THINKS (Is it True? Is it Helpful? Is it Inspiring? Is it Necessary? Is it Kind? Is it Safe?) 8) BE TRUE! Follow all school or teacher policies regarding cell phone usage. 9) BE HONEST! Parents will be able to perform random checks of the phone to see text and call history. Do not delete messages or phone history. Parents will be able to review the history on the monthly bill. 10)Violations of any of these rules will result in the confiscation of the cell phone.

What controls can I implement to help keep this agreement?

I would first recommend getting a basic, no frills cell phone for their first phone. The cell phone carriers are really pushing the sale of smart phones (Smart Phone – Phone that can download applications and surf on the web, example iPhone, Droid, etc.). In addition to the monthly data fees, the smart phones have so many capabilities it is like its own computer. (See page 19).

There are parental controls available for each carrier. Here is a link to a great article that goes into the various cell phone parental controls. Most of the parental controls require an additional monthly fee. http://www.theonlinemom.com/secondary.asp?id=635

Also, you could look into getting pre-paid phones. One cell-phone provider was created with the parental controls as the main priority: http://www.kajeet.com/

In addition, there is software available that can allow you to view everything that is sent or received on a phone. This seems a little extreme, but would be helpful to have for someone that has had a problem with inappropriate texting.

Mobile Spy - http://www.mobile-spy.com/spy_features.html

My Mobile Watch Dog – http://www.mymobilewatchdog.com/

20

iPhone, iTouch, & iPad Security

The top requested present this year for kids ages 10-15 was an iTouch. For those ages 15+, it was an iPhone, or iPad. I LOVE the iTouch. I received it for one of my anniversary gifts two years ago, and I posted on my blog how, “I like gadgets better than jewelry.” Fast forward two years, and I have an iPad and iPhone as well. Ok, we get it. Everyone loves Apple products, so what are the implications of these AMAZING devices?!

An iTouch, iPhone, iPad are very similar to a COMPUTER. Let me repeat. THEY ARE JUST LIKE A COMPUTER!!! Experts in Internet Safety have been telling us for years to keep our computers in a „public‟ location: The kitchen, family room, somewhere where you are likely to be seen. Also, the sites you are browsing can be seen. Any of these apple devices have a web browser and can browse the web just like the computer you have in your kitchen. So, if you wouldn‟t put a computer in your teenager, or childs‟ bedroom because of Internet Safety concerns, don‟t buy them an iTouch.

Well, you need to decide if you want to TRUST your child, or you can take the steps to lock down the device.

Here is a link to a step-by-step tutorial of how to change the restrictions on an Apple device. http://securemama.com/2012/02/09/itouchiphone-security-for-kids-and- teens/

21 So there is one very OBVIOUS flaw with the apple mobile devices:

NO BUILT-IN WEB FILTER!! C’MON Apple!

There are a few applications for free and for purchase from the App store that can help you out if your teenager wants to browse the web.

Recommended Free Application: K9 Web Protection

Their desktop application is pretty good, and I recommend this mobile browser as well. You would need to disable the Safari browser and install this application. It blocks questionable content, but is not overly protective. Some of the reviews says that the browser is slow, but I guess you get what you pay for.

Recommended Purchased App: Mobicip Safe Browser

This is 4.99, and had a positive CNET review (CNET is a popular review site for all things technology). From the reviews the browser interaction is closer to Safari and runs faster. It has different levels depending on the child‟s age: Elementary, Middle, etc.

HIDDEN COST!!! If you want to customize the filtering, you have to pay for a subscription service at $9.99 per year. If there is a site that your son loves like „Hard Core Rocks.‟ This filter may block it because of the „Hard Core‟ phrase. You cannot manually allow this site without the subscription.

Here is a quote from a review that I thought was hilarious, “I‟m 12 years old and my parents got this app to block out bad stuff and whatever, which I understand …My only issue is that it is completely OVERPROTECTIVE!”

So there you go! You are happy! Your kids are happy! Hopefully some better web filter settings or products come down the pipe!

22

Safe Web Surfing

Get your computer protected! Install some sort of anti-virus or anti-spyware application. Some anti-virus software can also help you navigate the web and let you know if a website can be trusted.

Stay current with operating and application updates. (See page 15).

Have a firewall installed. Windows comes with a free firewall. Enable it. Anti-Virus software labeled „Internet Security‟ usually comes with a firewall. Consider buying that type of Anti-Virus solution if you don‟t have a firewall.

Keep your Passwords Strong We are past the days of having the password „password123.‟ If you want to protect your online accounts, you need a STRONG password.

What is a strong password?

8 to 14 characters, upper and lower case letters and numbers, AND a special character. WHAT?! How would I ever remember that? Using a 23 Passphrase helps. A passphrase is where you substitute numbers or special characters for a letter. 2gre@t4you! This password says “Too Great for you!”

Also, do NOT have the same passwords for similar websites. Gmail, yahoo, hotmail accounts get hacked all of the time. Once the hacker has access to your e-mail they can see e-mails from your bank and will try the same user and password combination. You could add a tag line at the end of the strong password to make it easier to remember, Example: 2gre@t4you!gmail 2gre@4you!b@nk, and so on.

Don't be Click Happy!

Don‟t click on ads or pop-ups that say “WINNER!! WINNER!! CLICK NOW!!” If you do you will be a LOSER.

Don‟t open or click on links in e-mails, instant message, or social media from someone that you don‟t know. The link takes you to a website that is loaded with malicious software. Just like we told our kids to not get in a car or get candy from Strangers, warn them, “Don‟t open e-mails, download attachments, or click on links from strangers.”

Don‟t open or click on “weird” e-mails or Facebook status updates, messages from friends. Since these free e-mail accounts get hacked all of the time, the hackers use the address book to try hack other accounts. So if I get an e-mail from my brother-in-law (who NEVER e-mails me) with the subject line of, “Check out my new ride!” I will pick up the phone and see if he actually sent that e-mail. If he hasn‟t, now he knows that his e- mail account has been hacked.

Facebook scams – I‟ve seen people post links to sites that claim to offer free gift certificates to Cheesecake Factory, Costco, Walmart. THESE are SCAMS!! They are trying to gather information about you!! I promise!! You are NOT missing out on some great deal! Don‟t click on the link. Tell your friend that they are mistaken. They are trying to gather information about you!! I promise!! You are NOT missing out on some great deal! Don‟t click on the link. Tell your friend that they are mistaken.

Shop Safely

Shop on sites that have encrypted the web traffic. You can tell by looking at the address bar and seeing „https‟ and a lock sign. Also, some websites have pictures with the „Verisign Trusted‟ logo. This means that the website security has been reviewed by a third party. 24

Before you press the purchase button, make sure you read vendor reviews. How are they at fulfilling shipments? Are the products received as described? I typically buy from Amazon. If I can‟t find something on Amazon, I use a vendor that supports paypal (paypal – commonly used online money transfer system). This way I don‟t have to give my credit card information to random vendors. Also, around Thanksgiving time, there will be sites that have all of the security features (https, verisign, etc), and they are selling a TV for half the price. If it is too good to be true, don‟t get fooled! It‟s a scam!

Nothing in Life is FREE

Beware of peer-to-peer software. (peer-to-peer software – Any software that allows you to get and share files with other people online). Remember Nabster? Current peer-to-peer sites are Limewire, Bittorent, Sharaza, Kazaa, Bearshare. If you recognize any of those names as installed applications, remove them from your computer. There may be files (music, videos, games) that your child wanted to get. However, the files are often included with a FREE gift of pornography or malware.

Beware of free software. Again, only download software from a trusted source where you can see reviews of the software and make sure that it is „clean.‟ Look for software at http://download.cnet.com/ or another site that has legitimate reviews of the software.

25 Social Networking – Do You Know Where Your Kids Are?

What are your kids doing? Who are their friends? What are they doing with their friends?

When I grew up, my friends had to call my house to talk to me. We had to go to each other's house to hang out. Inevitably my parents would know my friends and my friends‟ parents would know me.

Today kids can connect in SOOOO many ways:

o Facebook message, Facebook status comment, wall post, like button o Twitter o Text message o Cellphone o I could go on and on ...

Referring back to the online rules of agreement (See page 4), your permission is required before a child signs up for ANY social media site.

List of popular social network sites: o Facebook o Twitter o Google + o Pinterest 26 o Instagram o MySpace o FourSquare

Here is a link to a complete list with the various restrictions: http://en.wikipedia.org/wiki/List_of_social_networking_websites

If your child wants to join any of these social network websites, you most approve it and you MUST BE THEIR FRIEND!! You will be able to see their activity - status updates, their friends, what pictures they are posting, what pictures their friends are posting of them.

You will need to adjust the security controls so that they are not sharing pictures and personal information with „EVERYONE.‟ Here is a helpful article that goes through the Facebook security settings. http://www.theonlinemom.com/secondary.asp?id=936&t=tips-for-new- facebook-parents The security settings change often, so do this at least every three months. Rule of thumb “FRIENDS ONLY.”

If something inappropriate is going on, you will be able to stop it before it gets out of hand.

Since there are so many ways of communicating, refresh your children on being kind and courteous online as well as in person. Before posting, tagging, commenting, etc. tell them to think about „THINKS.‟

Is it True? Is it Helpful? Is it Inspiring? Is it Necessary? Is it Kind? Is it Safe?

Is it Safe? We love to share information about ourselves .. here is another article that lists the 10 things you should never share on Facebook. http://theonlinemom.com/secondary.asp?id=1995&t=10-things-you- should-never-post-on-facebook

27