{"id":8322,"date":"2013-02-15T07:48:28","date_gmt":"2013-02-15T12:48:28","guid":{"rendered":"http:\/\/www.ict-pulse.com\/?p=8322"},"modified":"2013-02-15T07:48:28","modified_gmt":"2013-02-15T12:48:28","slug":"7-tips-stay-safer-online","status":"publish","type":"post","link":"https:\/\/ict-pulse.com\/2013\/02\/7-tips-stay-safer-online\/","title":{"rendered":"7 tips to stay safer online"},"content":{"rendered":"
Safe Internet use is more important than ever, as more of our lives move online the online population increases, but also the threats to which we are exposed also increase and get more sophisticated. Below is some advice \u2013 seven tips \u2013 to be better protected online.<\/em><\/p>\n <\/a>Last week Tuesday, 5 February, was the 10th \u201cSafer Internet Day\u201d. Safer Internet Day was first launched in the European Union in 2004, with the aim of \u201cpromoting safe, responsible use of the internet by children and young people, and protecting them from illegal and harmful content and conduct online\u201d<\/i> (Source: Safer Internet Day<\/a>). \u00a0Outside of Puerto Rico and the Dominican Republic, no other Caribbean\/CARICOM country officially commemorated Safer Internet Day, although as in our latest news roundup<\/i><\/b><\/a>, we noted that telecoms company, LIME, engaged in safer Internet sensitization activities in Jamaica and St. Kitts and Nevis.<\/p>\n Notwithstanding the seemingly limited public promotion of safe Internet practices across the region, it is imperative that we all become more vigilant regarding our use of computing devices, not only for ourselves, but more so for those under our care. Outlined below are seven tips that are applicable to both adults and minors, which should improve safety online.<\/p>\n 1.\u00a0 Ensure computer security software is current and active.<\/b>\u00a0 With the plethora of viruses, worms, spyware and other threats to which our computing devices are continuously being subjected, it is crucial that PCs, laptops, tablets, smartphones, etc., all have appropriate computer and Internet security software installed and maintained up to date. As was noted in Are we really serious about cybercrime and security?<\/i><\/b><\/a>, too often we are prepared to skimp on the security software we use, by relying only on free applications. However those products frequently have very abbreviated features, which limits the quality of the security they provide, and ultimately that of the device. Hence if you value your devices, and more importantly the content that they store and manipulate, do ensure that you are using reputable computer\/Internet security software that gives you the protection that you need.<\/p>\n 2.\u00a0 Avoid using USB and other removable storage devices.<\/b> Again, this point was raised in Are we really serious about cybercrime and security?<\/i><\/b><\/a>, but it bears repeating. USB drives and other removable storage disks and devices can be a hotbed for malicious code, compromised applications, and a broad range of threats. Although it might be impossible to completely eliminate use of those devices, it is advisable to be strict about which equipment they can be connected to, and that your security software regularly scans them.<\/p>\n 3.\u00a0 Do not circulate pornographic or other offensive material.<\/b> In addition to the fact that the dissemination of pornographic and other offensive material is illegal in many jurisdictions, connecting to such websites can expose your device to a variety of dangers. Additionally, depending on how and\/or to whom such content is circulated, it is possible to attract unwanted attention, which at the very least could result in excessive spam, to concentrated efforts to breach your device.<\/p>\n 4.\u00a0 Limit the personal information published online.<\/b> This tip is applicable to both adults and children, and is stressed regularly. As users, we all have some degree of control over what personal information is available on us online. Although we might hesitate to upload on Google or Yahoo our home address, daily schedule or intimate photos, we will mindlessly publish the same to our social network accounts. Although social networks gets much of its value from the communication and sharing of their users, it is important to remember to be guarded about some aspects of your life, lest you compromise your and your family\u2019s personal safety.<\/p>\n 5.\u00a0 Decline or block unwanted or unknown contacts.<\/b> Although many of us take pride in the size of our social networks, those environments can cause a false sense of security \u2013 that all of those connections are truly \u201cfriends\u201d. While adults might be more likely to discern threats and take appropriate action, it is imperative to teach children to decline or block unwanted or unknown contacts, and not to meet anyone they do not know (or without parental supervision\/consent), especially if the interaction has been exclusively online.<\/b><\/p>\n 6.\u00a0 Do not download files from unknown websites.<\/b> Have you ever done a search for a document, music or video and ended up at an unknown or somewhat shady-looking website? Or, you are browsing and a pop-up window appears telling you that you have spyware, or some other irregularity, and there is an offer to scan your hard drive? Do you download? The short answer is no. Again, it is recommended that you be careful and err on the side of caution, by being scrupulous about the sites you visit and more importantly, the content you allow to be downloaded on to your device<\/p>\n <\/a>7.\u00a0 Do not be afraid to set rules and boundaries with your children.<\/b> Finally, to a considerable degree, children need to be taught to be vigilant on the Internet. For parents and guardians it is critical that rules and boundaries be established regarding Internet use and behaviour in order to inculcate good practices. Among the suite of rules devised, it is important that you as parents\/guardians implement systems to ensure children access age-appropriate content, e.g. by activating the parental control features most web browsers have, and that you are still prepared to oversee your children\u2019s as required. Oversight is not only necessary to ensure that rules are adhered to, but also allow as parents and guardians to be in a position to moderate and guide in such a dynamic environment.<\/p>\n <\/p>\n Image credits: \u00a0Safer Internet Day<\/a>; \u00a0Claire Bloomfield \/ FreeDigitalPhotos.net<\/a><\/em><\/p>\n ____________<\/p>\n","protected":false},"excerpt":{"rendered":" Safe Internet use is more important than ever, as more of our lives move online the online population increases, but also the threats to which we are exposed also increase […]<\/p>\n","protected":false},"author":2,"featured_media":8328,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","om_disable_all_campaigns":false,"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false},"version":2}},"categories":[17,27,11,33],"tags":[105,38,36,39,34,37],"class_list":["post-8322","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-caribbean","category-computing","category-ict-tech","category-lists","tag-cybercrimecybersecurity","tag-data-protection","tag-devices","tag-equipment-security","tag-lists-2","tag-smartphones","et-has-post-format-content","et_post_format-et-post-format-standard"],"jetpack_publicize_connections":[],"aioseo_notices":[],"jetpack_sharing_enabled":true,"jetpack_featured_media_url":"https:\/\/i0.wp.com\/ict-pulse.com\/wp-content\/uploads\/2013\/02\/Child-On-Computer-by-Clare-Bloomfield-FreeDigitalPhotos.net_.jpg?fit=400%2C326&ssl=1","jetpack_shortlink":"https:\/\/wp.me\/p2iE1G-2ae","jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/posts\/8322","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/comments?post=8322"}],"version-history":[{"count":8,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/posts\/8322\/revisions"}],"predecessor-version":[{"id":8333,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/posts\/8322\/revisions\/8333"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/media\/8328"}],"wp:attachment":[{"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/media?parent=8322"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/categories?post=8322"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/tags?post=8322"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}