点击这里 更新您的个人资料并赚取星巴克礼品卡积分

Learn more

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros elementum tristique. Duis cursus, mi quis viverra ornare, eros dolor interdum nulla, ut commodo diam libero vitae erat. Aenean faucibus nibh et justo cursus id rutrum lorem imperdiet. Nunc ut sem vitae risus tristique posuere.

为家庭和学校提供的 30 条网络安全小贴士

,您已登录!
享受此资源并与您的学区共享我们的课程,将这些资源发送给您的整个社区
向您的学区介绍我们的计划
,您已登录!
与家长分享此资源,网址为 (或访问我们的新品 共享中心)
复制分享链接
,您已登录!
享受这张演示通行证。点击该按钮与您所在学区的领导共享访问权限(或访问我们的新版) 共享中心)
与学区领导分享您的演示通行证

成为会员或登录以了解有关此主题的更多信息

主管、董事和校长:申请合作伙伴关系 在这个页面上 为您的整个社区解锁我们的资源。
May 3, 2022

成为会员或登录以了解有关此主题的更多信息

主管、董事和校长:申请合作伙伴关系 在这个页面上 为您的整个社区解锁我们的资源。
Quotation marks

这是很好的信息,感谢你给我一些关于如何与我的孩子开始对话的想法!

StarStarStarStarStar

沙龙 M.

家长 VIP 会员

Quotation marks

乔希关于社交媒体的演讲令人难以置信地精彩。我们的学生学到了很多关于孩子应该做什么和不应该做什么的知识。这是一个经过深思熟虑的过程,这一切都值得。

StarStarStarStarStar

学院咨询主任

教育工作者网络研讨会参与者

Quotation marks

这次网络研讨会让我的学生大开眼界,让我大开眼界。

StarStarStarStarStar

艾琳 C.

教育工作者网络研讨会参与者

为家庭和学校提供的 30 条网络安全小贴士

,您已登录!
享受此资源并与您的学区共享我们的课程,将这些资源发送给您的整个社区
向您的学区介绍我们的计划
,您已登录!
与家长分享此资源,网址为 (或访问我们的新品 共享中心)
复制分享链接
,您已登录!
享受这张演示通行证。点击该按钮与您所在学区的领导共享访问权限(或访问我们的新版) 共享中心)
与学区领导分享您的演示通行证
,现在你有机会通过告诉我们你从这个资源中学到了什么,赚取 10 点积分兑换 5 美元的星巴克礼品卡!
要获得礼品卡,请具体说明并写一句完整的句子,以帮助我们了解您对该主题的喜好。我们的非营利组织使用这些信息来改进我们的计划。

40 characters remaining to reach minimum

您提交的内容已收到!现在,您的账户中已添加了额外积分。

如果您正在现场直播,请评论 “我填写了表格!”在直播活动聊天框中!

否则,您可以自由地在网站上漫游。
谢谢!
-Josh 和 SmartSocial 团队
哎哟!提交表单时出了点问题。
Cybersecurity Tips for Families and Schools

我们保护我们的贵重物品:房屋、汽车、重要的文件... 但是我们在多大程度上保护了我们的数字资产和信息?网络犯罪分子越来越精明地使用网络钓鱼电子邮件和隐藏恶意下载内容。学校和家庭都容易受到来自其网络上每个电子邮件帐户的攻击。

因此,我们请网络安全专家为家庭和学校工作人员提供最佳实践和警告信号,以避免网络钓鱼、勒索软件和恶意下载。

保罗·比绍夫

1。教导网络 “卫生”

Paul Bischoff,隐私权倡导者, Comparitech

对于年幼的孩子来说, 家长监控软件 在笔记本电脑和手机上可以告知父母他们的孩子在网上做什么,并允许家长制定内容政策来屏蔽不当内容。

教孩子基本的网络 “卫生”:

  • 不要点击未经请求的链接或广告
  • 不要在社交媒体上过度分享
  • 保持应用程序和操作系统的更新
  • 为每个账户设置一个唯一的密码
  • 调整所有应用程序和操作系统的隐私设置

我总是建议青少年的父母在社交媒体上关注他们的孩子并与他们交朋友。 通过加入相同的社交网络,父母可以在保持安全距离的同时监视孩子。父母将了解与孩子使用的社交网络相关的风险,如果孩子知道父母在观看,他们就不太可能从事危险行为。

在现实生活中,人们遭受诈骗或黑客攻击并遭受重大损失的例子不少。

利用诸如SmartSocial.com之类的资源不断学习并及时了解网络安全的最新信息 Comparitech.com。

Tech-savvy teens falling prey to online scams faster than their grandparents
麦克莱伦说:“这个年龄段的人非常愿意上网,也非常公开地谈论自己的生活。”“因此,这使他们在上网时非常信任。”

CNBC

凌凌峰

2。家庭讨论

首席执行官凌凌峰, 地铁宝贝

每个家庭都应该讨论网络安全。时代在变化,容易受到此类攻击变得越来越普遍。

无论家庭成员年龄多大,都应积极解决这个问题。 它可以在晚餐时提出,也可以在所有人聚集在一起的任何时候提出。应该讨论的话题包括提醒人们创造强大力量 密码,永远不要点击 弹出垃圾邮件,切勿透露个人信息,并谨慎对待下载的内容。

特别是,需要以学生能够理解的方式向他们通报情况。用简单的语言向他们解释他们必须遵守的规则。对于尚无法理解这个概念的年幼孩子,应始终监督互联网的使用。与家人进行公开对话对于提高对任何在线活动的警惕非常重要。

父母和孩子都应该记住不要在社交媒体上过度分享。社交网络很容易被利用并用于网络攻击。为防止这种情况发生,请限制您在社交媒体上分享的帖子。例如,在假期结束之前不要宣布您的假期。不要发布你的下落,因为这样做基本上是在说我不在家,抢劫我。

与家人讨论将社交媒体帐户更改为私人帐户并定期更新安全页面。删除任何个人信息,解除你不认识的人的好友关系。

乔什·奥克斯

3.下载之前,请先研究所有家长控制

乔什·奥克斯,创始人 smartSocial

家长控制软件和防病毒软件是帮助保护家庭网络安全的绝佳补充。我们建议在购买软件并将其下载到您的设备之前对该软件进行全面研究。一些公司的总部所在的国家/地区不像我们那样具有类似的隐私保护措施,并且可能与他们的政府有联系。阅读我们的 家长控制 资源可了解数十种流行的家长控制和手机监控应用程序的优缺点。

辛迪·科皮斯

4。禁用定位服务

首席执行官辛迪·科皮斯 搜索人物免费.net

防止成为网络攻击目标的最简单方法是让个人计算机系统做好入侵准备,警告家人注意潜在危险,警惕奇怪的行为。

在你的个人电脑上, 你必须下载功能强大的防病毒程序,这些程序将持续监控计算机中是否有危险物品,这些危险物品可能是网络攻击的产物。每晚进行升级扫描将确保您的系统具有更新的安全性。

更改您的隐私选项并禁用定位服务,以避免可能的额外攻击。确保与年幼的孩子沟通网络威胁的严重程度以及需要注意的事项。

防止网络攻击是避免网络攻击的最简单方法,可能就像对奇怪的电子邮件给予足够的关注一样简单。

克劳迪乌·科加尔尼恰努

5。注意你使用的服务

克劳迪乌·科加尔尼恰努, 查找我的数据

这些建议可能看起来不多,但它们确实可以帮助消费者保护和保存他们的信息以及家人的信息。

  • 使用安全性高的密码,但要针对您使用的每个帐户/设备设置不同的密码。考虑使用像 Dashlane 这样的密码管理器来帮助全家人管理安全性高的密码(了解更多:smartsocial.com/dash
  • 一定要经常更改密码——我每 3 个月更改一次所有密码
  • 注意您使用的服务,并确保您知道它们如何处理您的个人信息。可能不会让所有人感到惊讶,但是来自世界各地的许多组织出售和共享其用户的个人信息,而且通常是在用户不知情的情况下这样做的
  • 从不再使用的公司中删除您的信息。 这特别有用,我强烈推荐这个。如果一家公司无法从你身上赚钱,他们可能会出售你的信息以弥补损失。不幸的是,并非所有人都能做到这一点,因为美国只有少数几个州有隐私法,但是那些有这种能力的州应始终清理其数字足迹
阿隆·戈兰

6。备份并制作副本

阿隆·戈兰,产品营销经理, odix

就像任何其他与家庭相关的核心话题一样,我首先要说的是,他们应该投资于价值观、网络教育和网络意识。

  • 知道这点 如果一个优秀的黑客想入侵你的电脑,他们会找到办法
  • 确保在物理可移动介质(U 盘和硬盘)上备份至少两个副本
  • 让副本每月备份一次,并在不同的月份备份每个副本(例如,硬盘 1 将在 1 月、3 月、5 月备份文件... 而 Thumb drive 2 将在二月、四月、六月备份文件...)。这样,即使你的备份中有 “sleeper cell” 勒索软件,你仍然可以从另一个磁盘恢复一些信息
  • 投资云备份
  • 使用强密码并每 6-12 个月或每次听说您正在使用的服务遭到入侵或家人、朋友、同事遭到入侵后,更改一次密码,让黑客的生活变得艰难
  • 虽然大多数人认为使用诸如 “thisi$v3rySafe” 之类的密码是最好的,但最好能记住更长的句子,比如 “曾几何时我忘记了门上的钥匙”
  • 不要偷懒:为不同的账户使用不同的密码。如果黑客获取了您的密码,他们可以而且将会根据您的电子邮件地址将其与您正在使用的不同服务一起使用。不想记住很多不同的密码吗?考虑像SmartSocial.com推荐的那样使用密码库 达什兰

由于成功的黑客活动中有很大一部分来自电子邮件,因此我将把精力集中在这个话题上:

  • 对自己和家人进行网络钓鱼和社会工程方面的自我教育。许多网络钓鱼模拟器在网上都很友善,可以帮助您训练自己并区分合法电子邮件和可疑电子邮件。根据一般的经验, 如果你不认识发件人或者文件听起来太棒了——不要打开它!
  • 寻找文件清除工具,也称为深度内容解除和重建 (CDR) 或深度文件分析解决方案
  • 切勿通过电子邮件提供任何个人信息。任何服务提供商都不会要求您在线提供密码、信用卡信息等。如果你从近亲、同事或朋友那里收到这样的请求,可能是他们的账户被劫持了。最佳做法是给他们打个电话,确认他们确实发送了该请求
  • 在尽可能多的工具中应用 MFA(多因素身份验证)。如果可能,将备用电子邮件地址设置为与主电子邮件地址不同的备用电子邮件地址

7。确定您的安全威胁

克雷格汤普森, HackingVision

借助互联网,我们现在可以获得丰富的信息,这些信息可以帮助我们以新颖有趣的方式改善生活。另一方面,互联网有可能伤害我们和我们关心的其他人。我们经常听到另一家公司遭到黑客攻击,或者朋友的电子邮件或社交媒体账户被劫持的消息。这些危险非常严重。

以下提示可帮助最大限度地降低这些风险:

确定您的房屋和设备上存在的安全威胁: 黑客可以访问您家的Wi-Fi网络。考虑使用安全软件,它可以识别网络上的入侵者,并确保您的密码难以猜出。教导您的孩子远离公共 Wi-Fi 网络的重要性。

你上次使用公共 Wi-Fi 热点是什么时候?现在,几乎每家咖啡店、学校、机场和酒店都提供了一种使用手机或其他移动设备访问互联网的方式。这意味着,除非你努力保护数据,否则该地区的黑客可能会获得对你手机数据的访问权限。

Become an authority on the subject of phishing: You may know better than to click on a URL that looks to be from your bank or a friend, but does everyone in your household? Teach your kids about phishing and don't let them click on links in emails or social media posts. Invest in a security program that can identify and block questionable URLs.  Read more at SmartSocial.com’s Parental Control Software & Cell Phone Monitoring Guide.

Recognize that cybersecurity is an ever-changing target: Because cybercriminals are continuously developing new risks, you must be vigilant about downloading the most recent security updates and patches and keeping an eye on the news for any new threats.

Remind your family that just because their gadgets are protected by antivirus and firewall software does not imply that a hacker will not deactivate them.

Keep a watch out for con artists: There are many techniques to persuade you to provide your personal data. Even ostensibly, legal firms can dupe you into signing yearly payments and other similar contracts. Pay close attention to the statements on your credit cards.

Students should be taught the significance of online safety: When it comes to cybersecurity, children are typically the weakest link. Install security software to prevent minors from viewing or clicking on inappropriate links or websites. Teach kids about unethical internet behavior and encourage them to seek help if something seems strange.

Michael Miller

8. Consider an identity protection service

Michael Miller, CEO, VPN Online

In our increasingly digital world, protecting our families against cyberattacks is more important than ever. While there are many steps we can take to safeguard our online identities, one of the most important things families can do is to subscribe to an identity protection service. 

These services monitor your personal information for signs of fraud or theft and provide tools to help you recover your accounts if they are compromised. In addition, they often offer insurance in case of financial losses due to identity theft. By subscribing to an identity protection service, you can give your family the peace of mind that comes with knowing you have taken a proactive step to protect them from cyberattacks.

Additionally, families should make sure their home computer networks are secure and that their devices are up-to-date with the latest security patches. 

Finally, it is important to have a plan in place in case of a cyberattack. By having a plan in place, families can ensure that they know what to do if their personal information is compromised or if they are the victim of identity theft. In addition, a plan can help families quickly and efficiently recover from an attack, minimizing the disruption to their lives. 

By taking these precautions, families can help to protect themselves against the ever-growing threat of cybercrime.

Bill Mann

9. Don’t take "candy" from strangers

Bill Mann, Privacy Expert, Restore Privacy

We teach our children to never take candy from strangers on the street, but the same type of conversation needs to be had with our kids surrounding the use of the internet. Children are naturally impressionable which makes them far more likely to be susceptible to social engineering scams where they voluntarily give personal information that cybercriminals then use against them.

A great way to instruct kids about cyber security is to show them obvious phishing messages and ask them to identify why they are fake. Turn it into a game where you quiz your kids on the signs of scam emails, like if there are obvious spelling errors or low-resolution logos. 

A great safe-guard to prevent cyber attacks is to set up a VPN for your home computer (learn more on SmartSocial's Parental Control recommendations page). This will make it much more difficult for cybercriminals to prey on your family by masking the whereabouts of your IP address. These are common in businesses but are less so in home computers. 

Start drilling into your kids that they should never respond to any direct message or emails without your supervision. Make the downloading of any file or program off-limits. Create hard lines that they know they shouldn't cross, and enforce consequences if they are crossed. Kids will naturally try to push the limits and will be given many opportunities to do so. Make sure you are prepared by frequently monitoring their online activity and putting parental controls in place whenever possible. 

Artem Sryvkov

10. Secure your printers

Artem Sryvkov, EB Solution

It may sound trivial but you won’t believe how much valuable private information can be pulled by hackers from your printer without you even noticing it. And that’s not all, printers nowadays have access to your devices, network, and the internet which makes them a perfect target for hackers trying to spread their botnets and malicious software.

So, what can an ordinary person do to protect their printer? First of all, use a stronger password. If I had to guess, I’d say that every 4th or 5th printer can be “hacked“ by using a simple list of 50 most common passwords. So please, change your “admin” or “password123” or even worse “qwerty” password to something stronger. A good password should be something in a range of 12-16 characters that has numbers, letters (both lower and upper case), and special symbols like asterisks, underscores, braces, etc.

Also, look into your printer settings/properties. Going through the tabs you’ll probably find a tab with all the users that have access to that printer. Make sure that only devices you trust have access to your printer. Found someone you don’t know? Remove their access and change your printer password. Didn’t find anyone suspicious? Great, check back in a month or two. This is a nice habit to have and it takes less than a minute to do.

And lastly, update your printers regularly. Every printer company spends huge amounts of time and resources on finding and fixing software vulnerabilities.

Brent Hale

11. Consider a credit report freeze for your kids 

Brent Hale, Chief Content Strategist, Tech Guided

I have seen a lot of disturbing cases of cyberattacks in my career which is why I'm always so worried about my family, especially my kids. 

We often see network safety for seniors on the news as they succumb to email and telephone phishing tricks. Be that as it may, with regards to fraud, kids are considerably more prone to be impacted. 

Why are children an ideal target? Consider it - kids won't have to look at their credit reports for as long as 18 years. Criminals can assume cards in their names and enjoy the good life, damaging your kids’ future credit scores. They'll pile up unpaid liability until your child is denied a school advance since they're some way or another $1 million strapped in debt.

I explain to my kids that I'll put a credit freeze on their report (or if nothing else check it) to keep key safety issues from influencing them later on. Every time I survey their credit report I include them in the process to cultivate knowledge of what I'm doing, how I'm doing it, and also why it's important for them to learn.

Tristan Harris

12. Use familiar words and metaphors to explain digital safety to kids

Tristan Harris, Demand Generation Senior Marketing Manager, Thrive Internet Marketing Agency

The simplest approach to explaining these cybersecurity concepts to a child is by using familiar words and analogies that they can understand. Some examples are talking about computer viruses, password sharing as well as fraud. The risk that your information might get hacked or stolen is called cybercrime!

As for me, I relate the risk of sharing the password to giving your house key to a stranger. Another example is how anti-virus software can best defend yourself against online threats like malware and other computer viruses; you can compare it to vaccinations against common flu that help boost the immune system against future attacks on the body.

By making simple connections to the real world, children can better comprehend the dangers of cybersecurity. I also recommend the FBI’s Safe Online Surfing. This site offers games and teacher resources to help children of all ages stay safe online.

13. Always use multi-factor authentication

Timothy Robinson, CEO and Cybersecurity Expert, InVPN

Headshot of Timothy Robinson
Timothy Robinson

Being a cybersecurity expert, there are many tools and techniques schools can use in addition to security awareness training to avoid cyber incidents. 

Phishing can be prevented by allowing multi-factor authentication (MFA) for all school facilities, including teacher and student email accounts and any other program that stores confidential information. It's also never too early for students to learn how to apply this method to their online lives outside of school.

With the volume of data brought in by remote learning, educational institutions can back up their systems on a regular basis and store backups in an 'offsite' spot. Offsite can be described as a location that is not linked to the main network, making it much more difficult for a criminal hacker to delete or encrypt backups.

14. Read tips from the Federal Trade Commission, FBI, and even PBS

Aliza Vigderman, Senior Content Manager, Security.org

Headshot of Aliza Vigderman
Aliza Vigderman

Here are some clues that an email is potentially phishing, according to the Federal Trade Commission:

  • The email looks like it’s from a company you’re familiar with, whether that’s a social media site, a bank, a credit card company, etc.
  • The email tries to get you to click on an attachment or link, saying something like there’s a problem with your account, you have to confirm personal information, or you’re eligible for a coupon.
  • The email has a generic greeting that doesn’t use your name.

The easiest way for employees, staff, and teachers to avoid phishing, ransomware, and downloads in their professional communications is to download antivirus software on all of their work-related devices. Antivirus software scans for phishing, ransomware, and other types of malware, quarantining malicious software if it finds it so that it can’t affect the rest of the device.

As soon as students are granted access to school-provided email accounts is also when schools should start teaching students about phishing, ransomware, and malware. Being able to recognize phishing emails is essential for safe internet usage. There are a number of user-friendly digital security resources for kids that can teach them the basics of malware and cyber-attacks from organizations like PBS and the FBI.

15. Creating a cyber threat team and response before there’s ever an incident is key

Sidra Ijaz, Research Analyst, InvoZone

Headshot of Sidra Ijaz
Sidra Ijaz

There are many clues that an email is phishing. These emails are designed in a way that the victims respond and click on the links immediately. The content of such emails is specially designed to manipulate the emotions of the victims. For example, sometimes they have a sense of fear in them.

These are a few patterns in a phishing attack:

  • Such emails manipulate victims emotionally
  • They have a sense of urgency
  • Links look suspicious. The best way to identify phishing links is by using secure phishing detection services such as Google Transparency Report
  • There may be spelling and grammatical errors

Awareness is the key. The major source of ransomware attacks is phishing emails. For example, unaware employees can unknowingly assist in ransomware attacks by downloading malware through phishing emails. Awareness training of all the staff, teachers, and students can significantly reduce the impact of phishing and ransomware.

We have to change our cyber defense mindset from ‘incident response’ to ‘continuous response’. We have to adopt proactive cybersecurity measures against evolving ransomware attacks. These include offensive cybersecurity measures (such as ethical hacking and pen-testing), and cybersecurity drills. You can check the level of awareness and security culture in a school by launching a mock phishing attack.

Ransomware and phishing attack mitigation requires swift measures from incident response teams. Data protection and backup, forensic analysis, and disaster recovery plans are key to reduce the impact of the attack. School administration should work on developing a cybersecurity team.

As soon as students start using computers/smart devices is when schools should be teaching cybersecurity training to them. Students should be aware of the cyber threat landscape.

16. Read every sentence & review the sender’s email address

Tom Kirkham, Founder and CEO, IronTech Security

Headshot of Tom Kirkham
Tom Kirkham

Here are some tips on how to spot a phishing email on your own:

  • Is it coming from a public email domain or a private email domain? It shouldn’t be coming from an email address with a public email domain. For example, you’re not going to get an email from someone at our company that says irontechsecurity@gmail.com. It’s going to be from an email address such as commandcenter@irontechsecurity.com. Make sure to look at the email address before you do anything else
  • Are there spelling errors in the email address? Read the email and check for spelling errors. Check the sender’s email address for spelling errors. It will be an error that will be hard to spot and it looks correct at first glance. This happens pretty often because cybercriminals think you won’t be cautious enough to check the spelling. For example, they might spell Amazon like Arnazon. (They would change the m to an r and n to make it look like an m.)
  • Is the content grammatically correct or is it poorly written in general? If you get an email and it’s full of grammatical errors and not well written, that’s a sign it’s a scam. Actual companies/organizations aren’t going to make this mistake
  • Is there an attachment or link in the email that you weren’t expecting? Hover your mouse over any unsure link or attachment. If the link isn’t what you are expecting, it’s possibly malicious. It’s better to be safe than sorry, so if you’re unsure about opening a link or attachment, ere on the side of caution and don’t open it
  • Does the email sound strangely urgent? Some examples of this are when the email says they need money now or they need you to give them information ASAP. This isn’t realistic and can easily be debunked. They’ll usually pose as your boss, a senior executive at your company, or your bank because they think you are more likely to give these types of people sensitive information

The best way to educate employees/staff on phishing emails, malware, and ransomware is by implementing a continuous cybersecurity training program. By enrolling your employees/staff in a continuous cybersecurity training program, you’re giving them the knowledge to keep themselves safe from cybercriminals.

When it comes to students, it’s best to educate students about phishing emails, malware, and ransomware as soon as possible. By doing this, you’re giving them the knowledge to avoid these types of attacks. The younger they’re able to recognize these things, the better it will be. Learning about how to stay safe online early on in life will be beneficial as they get older and use technology for college and their careers.

17. Provide fun, engaging, gamification cybersecurity training for everyone - students, parents, teachers

Andee Harston, Curriculum Manager, Infosec

Headshot of Andrea Harston
Andrea Harston

In this day and age, you must be extra vigilant when it comes to checking your emails for phishing attempts. There are several things you can do to determine if an email is a phishing email:

  • Hover (don't click!) over the sender's email address and check for any misspelled or suspicious domain names. Double-check the sender's email address and ensure it matches your expectations
  • Read emails with caution that use words like immediately, cancellation, or notification. This is very likely an indicator that the email is a phishing attempt. Hackers often use psychological tactics to pressure users to respond quickly or out of fear
  • Verify unexpected email attachments before clicking or downloading. Always contact a trusted secondary source to validate if the email is legitimate. This could mean calling a coworker from a phone number in your school/business directory and asking them if they sent an email or reporting the email as SPAM to your IT department
  • Watch for misspelled words, grammatical errors, or strangely constructed sentence structure. A poorly written email may also be (but not always) an indication that it is a phishing attempt

One of the best ways to inspire secure habits among faculty and staff is through relatable, relevant training that leverages educational best practices like micro-learning and gamification. This starts with engaging training that helps faculty and staff understand why bad actors target schools and student data - and what they can do to protect themselves and their students. Where possible, we recommend using real-world examples to help make training real for educators.

You can start by implementing a good cybersecurity education program to educate teachers, employees, and staff to identify malicious emails. Train thoroughly and often, at least quarterly. Teach employees to question all digital correspondence and always, always trust their gut instinct. Then make sure employees know who to report suspicious emails to and how to report them using the school's incident response call tree or email reporting system.

Recommended topics include password complexity guidelines for home routers/computer assets, timely system patching, and good data privacy practices, including how to share information safely online and how to recognize phishing emails.

It's all of our responsibility to teach children about the security risks associated with email accounts and internet access. This is no different than teaching kids to look both ways before crossing a street; their safety and welfare depend on their ability to stay safe online.

Additionally, schools should consider an outreach program to parents. A fun monthly or quarterly newsletter, written and researched by students, helps educate parents and students simultaneously.

18. Use the old adage: ‘don’t talk to strangers’

Janis von Bleichert, Founder, EXPERTE.com

Headshot of Janis von Bleichert
Janis von Bleichert

Generally speaking, phishing, ransomware, and malicious downloads all have one thing in common: they require the user to 'get the ball rolling.’ Starting from that point, the best defense against getting infected with such files is to encourage faculty, students, or teachers to do nothing if they think something is 'fishy' or 'too good to be true’. 

Should a teacher or student have any doubt whatsoever about an email, a download, or an attachment, they should err on the side of caution. For schools, this can be done similarly to how students are instructed to 'not talk to strangers', albeit, in a digital context.

Apart from instilling a very healthy dose of care when opening links or downloading files, it's also good to show faculty, staff, and students how to set up and use a (qualitative) and free antivirus or anti-malware suite. During our internal review process, Avast, Sophos, and AVG were the three best free suites we tested. Teachers can integrate installing and running virus scans into computer lessons, and show students how to engage real-time protection.

Finally, within browsers, it's a good idea to introduce students and teachers alike to ad-blocking extensions, since this can also close off a lot of the avenues for an attack that malware can use to establish itself on computers.

19. Create a healthy dialogue around internet privacy

Elizabeth l. Jeglic Ph.D., John Jay College – City University of New York
Elizabeth Jeglic headshot
Elizabeth l. Jeglic Ph.D.

Talk to your child about online privacy issues, making sure they know to never identify their name, school or city/state in which they live.
If they ever see or experience something that makes them uncomfortable they should tell/show you.
Do periodic browser history checks. If the computer uses internet explorer you can check their browser history to see what websites they have been frequenting. You want to be especially mindful to see if there are any inappropriate related sites or chat rooms or social media sites that you are unaware that they are frequenting. These sorts of checks should be done every 2 weeks or so.
Consider installing software or devices that can help you with monitoring and detecting inappropriate online activity.
Enlist your community. While teens may not always tell their parents what they are doing – they may tell their friends – who may, in turn, tell their parents. While we as parents don’t want to be engaging in covert espionage on our children if another parent hears from their child that their friend is doing something potentially dangerous on-line we need to share that information.

20. Pause and think before you post anything about someone else

Vasiliki Baskos, Learn Greek Online
Vasiliki Baskos headshot
Vasiliki Baskos

Respect people’s privacy in general and transfer it to the online world. Never give out a friend’s email address, social media usernames etc. Do not attempt to hack social media accounts or read other people’s emails.

Before you post, tag, comment, “like” etc. anything about another person, think: Will this hurt their feelings or reputation? Do you have permission to post this? Will they be in trouble if their parents, spouse, college admissions officers, current or future employers see it?

Example: you post a picture of your friends and someone thinks they do not look good, or it reveals they are in a relationship with someone.

21. Teach students to avoid hiding behind the anonymity of social media

Justin Lavelle headshot
Justin Lavelle
Justin Lavelle, Beenverified

Don’t do, say, or repeat anything that you wouldn’t say if the person was standing right in front of you. Common sense communication seems to have gone out the window with all of the texting, tweeting, messaging, and other means of communication available today. Make sure that if you ask, repeat, say, or share something that you would do it in person as well. Don’t hide behind the anonymity of a device. If you wouldn’t say it to a person’s face, don’t say it! Also, remember when your mom or grandma would use the old adages ‘don’t judge until you walk in their shoes’ or ‘what if the shoe was on the other foot?’ Well, these apply perfectly to this scenario. What if it was you? What if it was your picture? Govern your action by treating others as you want to be treated… words to live by!

22. Secure your webcam from hackers

Aileen Menchaca, PeepShield

Update software and anti-virus/anti-malware on a regular basis

New computer viruses crop up daily. Update your computer as soon as you see a software update notification. In addition, schedule your antivirus/anti-malware program to run on a regular basis. Cover your bases.

Disconnect camera when not in use

If you have a USB webcam, disconnect it from your computer when not in use. This ensures that your camera cannot be compromised. It has no power source or internet connection. Similarly, for laptop users, close your laptop when you are not using it. Never leave your laptop open in your room or private setting.

Cover your webcam

Many current devices include built in webcams. These cameras offer flexibility, but many people do not consider the potential security risks. These days technology tools enable hackers to access these cameras putting you and your family's privacy at risk. A simple fix is to cover the webcam.

23. Have a candid conversation with your students about internet and social media safety

Aaron Zar, Management & leadership professional

Even though it can be an uncomfortable subject, not unlike the birds and the bees, every child should understand that there are an unfortunate few among us who would exploit them. Teach your children about the pitfalls of social media such as coming into contact with predators and stalkers, cyberbullies, and thieves. Tell them to limit the amount of personal information on their profiles. Explain that mentioning vacationing on these outlets while the family is away from home is a great way to invite burglars to break in.

24. Address "red zone" areas

Dan Konzen headshot
Dan Konzen

Dan Konzen, Campus Chair, University of Phoenix

One of the most important things to address is that they have to be cognizant of everything they are posting. One thing we did at the University of Phoenix is create a live hack. We wanted to show people instead of just saying, "Be careful, be careful.” So I would pull up a website that shows all third parties who are tracking everything that they do on their computers: their IP addresses, their browser history, all of their contacts, etc. They don't realize this. Once we do this demonstration, I will grab a volunteer and I hack into their Facebook account (with their permission), all of the places that they have checked into over the last few years, where they worked last, etc.

25. Think about fake profiles

Satnam Narang headshot
Satnam Narang

Satnam Narang, Senior Security Officer Symantec

Over time we’ve had cases where there are fake profiles of companies appearing on Instagram and other social media sites. Someone claims to be from Nike or Apple and sends out links offering free shoes or free iPhones. If you click on the link, they start asking for personal information. It puts you, your family, and your students at risk.Certain apps such as Facebook or Instagram have a blue checkmark so you can verify the legitimacy of a company or brand. If you are going to follow a particular brand, make sure that you are following the legitimate brand.

26. One word: passwords

Kevin Haley headshot
凯文·海利

凯文·海利,导演安全响应,赛门铁克

你知道常用的密码是 “密码” 吗?我希望它不适合你。 密码 是你的第一道防线,明智地对待它们非常重要,因为连人们都猜不到。这是一台同时运行成千上万个密码来破解你的密码的机器。但是时间越长,如果有大写、小写、特殊字符等,就越难以猜测。黑客攻击可以在任何地方发生。

为了教孩子,我认为我们必须使用与他们相关的故事和例子。我可以坐在这里说 “使用密码”,但这并不像告诉他们有一次不使用密码会伤害我那么有力。

27。立即设置安全边界

Headshot of Clayton Cranford
克莱顿·克兰福德

克莱顿·克兰福德,奥兰治县警长部门

一旦您的孩子可以访问互联网,就立即介入并为他们设置安全界限,因为他们在网上接触到的许多事情都是无意的。我建议家长,尤其是那些不是在社交媒体时代长大的父母,是寻找机会更多地了解科技。无论你的学校是举办研讨会,还是寻找在线会议,都要了解你的孩子可以参加什么,以及接下来你可以做些什么来确保他们的上网安全。下载您的孩子想要下载的应用程序并查看它们。然后查看评论并确定该应用程序是否适合您的孩子。问与你的孩子去另一个孩子家时相同的问题。你的孩子要去哪里上网,他们会接触什么?

28。不要犹豫,让警察介入

Headshot of  Marc Marty
马克·马蒂

马克·马蒂,蒙特贝罗警察局

如果您的孩子在社交媒体上受到欺凌或威胁,请立即让警察介入。我们非常重视网络欺凌行为,因此我们鼓励家长和学校专业人员立即让警方介入,无论问题多么小,因为我们可能可以在问题升级之前将其防患于未然。

29。使用密码管理器并为每个站点设置唯一的密码

Headshot of  Gibby McCaleb
Gibby McCaleb

吉比·麦卡勒布,索尼 PlayStation

保护您的在线身份至关重要,因为有人可以访问您的在线身份并以 “您” 的身份发布内容,而且我们已经看到了许多造成无法弥补的损害的案例。使用 密码管理器,比如 LastPass。为每个网站设置一个唯一的密码,因为您不想使用游戏密码作为美国银行的密码。它使黑客知道一个用于多个不同帐户的密码即可进入您的私人帐户。

30。家长控制

Headshot of Dr. Adam Pletter
亚当·普莱特

亚当·普莱特博士,iParent 101

一定要看 家长控制,不是为了掌控一切,而是要作为父母有权知道你的孩子可能接触到什么,以及家长控制可以预防什么。在保护方面,它关乎平衡。注意孩子在网上做什么,学会如何积极主动而不是被动。

结论

尽管有许多网络安全预防措施,但没有任何措施可以百分之百保证。如果某些东西看起来很可疑(本来是双关语),那可能是网络钓鱼。查看电子邮件的每一个细节,安装高质量的软件来扫描攻击,并及时了解黑客和其他人每天如何诈骗他人。

其他资源

最适合家庭的密码管理器

我可以和我最好的朋友分享我的密码吗?

家庭媒体对话指南和协议模板

电子游戏的优缺点

在线诈骗:父母需要知道的内容和专家提示

观看本次小组访谈

收听 momTalk 播客,其中 Beth 和 Andrea 讨论网络安全小贴士

学区:申请合作伙伴关系 在这个页面上 为您的整个社区解锁我们的资源。

成为会员或登录以了解有关此主题的更多信息

主管、董事和校长:申请合作伙伴关系 在这个页面上 为您的整个社区解锁我们的资源。
Quotation marks

这是很好的信息,感谢你给我一些关于如何与我的孩子开始对话的想法!

StarStarStarStarStar

沙龙 M.

家长 VIP 会员

Quotation marks

乔希关于社交媒体的演讲令人难以置信地精彩。我们的学生学到了很多关于孩子应该做什么和不应该做什么的知识。这是一个经过深思熟虑的过程,这一切都值得。

StarStarStarStarStar

学院咨询主任

教育工作者网络研讨会参与者

Quotation marks

这次网络研讨会让我的学生大开眼界,让我大开眼界。

StarStarStarStarStar

艾琳 C.

教育工作者网络研讨会参与者

了解更多

不管怎么样,我们都很友善,祝你好运。在悲惨的情绪中,人们对各种各样的恐惧感情有独钟。这门课程,我想要活下去,但痛苦一点都没有,所以自由的生活就是这样。Aenean faucibus nibus nibh and justo cursus de rutrum cursures di rutrum现在,你将面临悲惨的生命风险。

参加我们的 Next Live 家长问答活动(并赢取 5 美元的星巴克礼品卡)*

Jan
14
注册
注册参加此活动

如何在网上使用社交媒体账号大放异彩

了解学员如何使用他们的社交媒体账户来帮助他们在网上大放异彩并改进他们的社交媒体。

Jan
16
注册
注册参加此活动

通过社交媒体,协力保护您的家人

了解如何为整个家庭制定的家庭媒体争论,以通过便利技术和社交媒体让您的家庭更美好。

Jan
21
注册
注册参加此活动

如何在网上使用社交媒体账号大放异彩

了解学员如何使用他们的社交媒体账户来帮助他们在网上大放异彩并改进他们的社交媒体。

Jan
23
注册
注册参加此活动

打击网络欺凌:支持学生在校园和家中的积极行为(额外直播活动)

赚取 5 美元的星巴克礼品卡,学习如何打击在线欺凌行为并确保孩子的上网安全

Jan
28
注册
注册参加此活动

在线闪耀:帮助您的孩子建立积极的在线足迹(现场直播 #3)

赚取一张5美元的星巴克礼品卡,了解学生如何使用社交媒体账户来帮助他们在网上大放异彩,改善自己的未来。

*仅适用于合作学区的家庭或个人付费 VIP 会员:要获得礼品卡,只需参加直播活动,参加活动,您的家人每年就有资格获得一张礼品卡(售完即止)。

成为知情家长(VIP),每周二和周四在您的电子邮件中获取我们的社交媒体建议。

Dotted arrow to right
了解我们的
“非常了解情况的家长”
贵宾计划
Right arrow
你好,我是 SmartSocial.com 的创始人乔什。参加我的 1 分钟测验来保护你的家人

此测验将帮助您了解家人的安全程度

参加 Josh 的 1 分钟测验
Right arrow
Smart Social Logo

学校和地区:和我们合作 保护您的在线社区

我们的远程演示(和网站)每年教导超过一百万名学生如何在网上大放异彩。我们教导学生如何使用他们的账户来创建积极成就的作品集,给大学和雇主留下深刻的印象。

与 SmartSocial.com 合作
Right arrow
Smart Social Logo
加入我们的 聪明 社交播客
每周在 iTunes 上

Josh Ochs 共有 240 多集,采访了心理学家、治疗师、辅导员、教师和家长,同时向你展示了如何利用社交媒体,有朝一日能在网上大放异彩。

听着: