Loading presentation...

Present Remotely

Send the link below via email or IM


Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.


School Staff eSafety Full version Sept 2018

No description

Matthew Knight

on 4 September 2018

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of School Staff eSafety Full version Sept 2018

School Staff eSafety 2016

Multiple accounts
Profile pictures again

Twitter 3 rules
Linked accounts
Public check in

Lose control of image
Linked accounts
Social Media
eSafety is something we all need to work on.

Everyone should take proactive steps to protect themselves in the Digital world.
What are you sharing on your history?
Who can see what you like?
Who else uses your laptop? What are they watching?
They change their settings
They use your phone number
Profile picture will always be public
Covers will always be public
Friends of friends means all of us?
Likes and Interest?
Logged in via Facebook
Hardware and Software
Keep accounts separate?
Is your anti virus up to date?
Who else uses laptop?
Different passwords for all accounts
Letters, Numbers and Symbols
Two step verification?
Who are you linked with?
Who are your friends?
How to defriend?

Friends and Family
What to do?
Tidy up your phone contacts
Delete old contacts
Did you do this?
Time to do it again!
Email contacts and phone numbers
Now bigger than Twitter
What pictures are you taking?
Who are you sharing them with?
What are you saving to the cloud?
How secure is your cloud?
Sports Tracking Apps

Linked Accounts
Going Out
Where do you live?
Disgrace of the six drinking, pole-dancing primary school teachers who published the pictures on Facebook

Read more: http://www.dailymail.co.uk/news/article-1389292/Disgrace-drinking-pole-dancing-primary-school-teachers-published-pictures-Facebook.html#ixzz3IgW7fdek
Follow us: @MailOnline on Twitter | DailyMail on Facebook
Your online reputation will be formed through:

Posts by you
Posts by others but about you or linked to you
Posts by others pretending to be you
When It all goes wrong....
"Disgrace of the six drinking, pole-dancing primary school teachers who published the pictures on Facebook".
How long since you last changed them?
It's not about the App but the critical thinking skills you need to use to remain safe.
Lock machines & Phones
Be on the Lookout for Sexual Predators
If you're a single and like to use online dating sites, be on the lookout for potential sexual predators. It's not always easy to tell if a potential date is merely lying about their appearance or trying to conceal a criminal past. If you do decide to arrange a personal meeting with someone you met online, always request that your first date be in a restaurant or similar public place. It's also a good idea to tell a friend where you're going and make sure someone is available to check up on you later in the evening.
Stay Vigilant at All Times
A lapse in attention can lead you to automatically click on a link or open an email attachment that may put your computer or your information at risk. Staying vigilant can help you stay safe.
Watch Out for Keyloggers and Malware
Certain computer programs, called keyloggers, can keep track of the keys you type and transmit this information to people who might want to steal your accounts. Be sure you have adequate security programs on your computer and that you are extremely careful when entering password information on public computers.
Keep an Eye on Accounts
If you use a credit card for online shopping, be sure to keep a close eye on the account activity. If you notice purchases that you haven't made, contact your card company immediately.
2-Step Verification
Whenever you sign in to your email, you'll enter your password as usual.

You'll be asked for something else
Then, a code will be sent to your phone via text, voice call, or mobile app.
Choose a Great Password
Eight or more characters
A number, as well as letters
A special character, like %,*,@, or ?
Upper and lowercase letters
No personal information
Don't Reuse Passwords
In order to remember your passwords, you may reuse the same password for multiple accounts. Avoid this if at all possible, since it makes multiple accounts vulnerable if your password is discovered.
michael master
shadow access
111111 abc123
letmein monkey
1234567 football
123456789 qwerty
password 123456
Common Passwords
Get anti-virus software
Make sure you have anti-virus software installed on your computer and be careful what you download or install on your computer.
Delete old accounts
If you've stopped using a social media site or forum, then close your account down. There's no point in leaving personal information out there unnecessarily.
Direct message if you can
It's almost always possible to send a direct message or private message on social media platforms. If you're having a personal chat, this is the best option to go for - unless you don't mind sharing your conversation with millions of other users. Alternatively, send an email from a private account.
Check what's needed
Don't give out information online simply because it's asked for - think whether whoever is asking for it, really needs it. When you're filling in forms online, for example to register with a website or sign up for a newsletter, always provide the minimum information possible.
Photos and videos
Be careful about which photos and videos you share on social media sites - avoid photos of your home, work, school or places you're associated with. Remember, once you've put a picture of yourself online, other people may be able to see it and download it - it may not just be yours anymore.

Before sharing a picture, take a few minutes to examine the background for details. Be sure you fuzz out or crop photos that show your house address, your car license plate, and other information people could use to find you.
Guard personal information
Don't post any personal information- your address, email address or mobile number - publicly online. Just one piece of personal information could be used by a complete stranger to find out even more. If you want to include your birthday in your profile it's safer not to actually display it publicly - providing your full date of birth makes you more vulnerable to identity fraud.
Mother's maiden name
Don't use your mother's real maiden name as a password or as a bank security answer. It doesn't really matter whether you use the real one so make up a name that only you know. Just make sure you remember it.
Check your settings
Use the privacy and security settings on social media sites so that only friends and family can see your pages.

Then speak to friends and family and encourage them to tighten their privacy settings too as they could affect you.

Even if your account is locked as private, personal information you have shared with others could still be accessed through their pages.
Whenever you're about to post something online, pause and just imagine someone in authority, someone you respect, reading that post or looking at that photo. If that feels uncomfortable, don't do it.
Watch your back
Got a nickname?
Think about using a nickname instead of your real name if you're signing up to a microblogging site like Twitter.

Consider setting up a separate, personal email account to use with social media sites, rather than using your work, or even your main personal email. Remember, only connect to people you know.

eSafety lessons every term
Looking this year at Digital Footprints, Filtering, Passwords, Personal Data and Personal Hand Held Devices
eSafety for us all

Parents & Carers
Community & Extended Schools
Matthew Knight
Wildern School

Advice for Home
Talk to your child about what they’re up to online
Use parental controls on devices that link to the internet, such as the TV, laptops, computers, games consoles and mobile phones
Know what connects to the internet and how
Keep all equipment that connects to the internet in a family space
Set boundaries in the online world just as you would in the real world
Keep up-to-date with your child’s development online
Watch Thinkuknow films and cartoons with your child

Remember that mobile!
Have a conversation

It is really important to chat with your children on an ongoing basis about staying safe online.

Not sure where to begin? These conversation starter suggestions can help.

Ask your children to tell you about the sites they like to visit and what they enjoy doing online.

Ask them about how they stay safe online. What tips do they have for you, and where did they learn them? What is OK and not OK to share?

Ask them if they know where to go for help, where to find the safety advice, privacy settings and how to report or block on the services they use.

Encourage them to help someone! Perhaps they can show you how to do something better online or they might have a friend who would benefit from their help and support.

Think about how you each use the internet. What more could you do to use the internet together? Are there activities that you could enjoy as a family?
Safe Profile Pictures
Safe Profile Photos
Useful links for eSafety


CEOP (Child Exploitation and Online Protection Centre): www.ceop.police.uk

Childline: www.childline.org.uk

Childnet: www.childnet.com

Cybermentors: www.cybermentors.org.uk

Digizen: www.digizen.org.uk

Internet Watch Foundation (IWF): www.iwf.org.uk

Kidsmart: www.kidsmart.org.uk

Teach Today: http://en.teachtoday.eu

Think U Know website: www.thinkuknow.co.uk

Virtual Global Taskforce — Report Abuse: www.virtualglobaltaskforce.com
Online Dating
Online dating sites such as Match.com, eHarmony.com and Zoosk.com take the traditional matchmaking process online and allow people to meet one another via the internet, with many encounters leading to long-term relationships.
Hands Down
Too good to be true?
What is used by who?
Found You?
Fake Requests!
Clear that history
Partners Accounts as secure as yours?
Parents think they know you?
Anyone Following me on Twitter already knows what I did this past summer.
Keyboard Damage
Monitor Damage
Ethernet Ports Unplugged
Equipment Safety
Full transcript