Cisco Blogs


Cisco Blog > The Platform

Online Safety Tips for Data Privacy – An Update

In January of this year, I posted an entry focused on keeping families safe online. The post garnered much interest and many of you contributed additional insights on the topic. This entry includes updates to my initial tips list, as well as updates gathered from many of you (thank you!).  I’ve also added additional links as reference to topics I discussed.  I hope you find this updated post helpful, and as I identify new online safety tips, I will continue to share my insights.  And, please, stay safe online!

My updated list of online safety tips:

Internet Access: Inventory all the devices that your kids use to access the Internet. That means not just computers and laptops, but also gaming consoles, smart phones and friends’ devices. Establish appropriate rules and boundaries for each environment.

Privacy Controls: Familiarize yourself with the privacy controls for each device and set the appropriate protections. For example, set up your Instant Messenger application so that only your children’s buddies – not strangers – can see and interact with them. Similarly, in Facebook and MySpace, set the privacy controls to ensure that your kids can’t be tagged in photos.

Administrator Control: Who has control of your computer? Take control by making yourself the administrator. Set a unique password so that you, and you alone, can change the computer settings.

Chat Rooms: Make sure your kids understand that they need your permission before joining chat rooms. Take the time to review and observe the chat room before giving the go ahead.  Familiarize yourself with the many new developments in Web-based chat groups, including those that are unaffiliated with an email service.  

User IDs: Have your kids choose user IDs that are age and gender neutral, since the first thing online predators do to identify potential victims is gather user IDs.  Also, consider using a variety of different user IDs, rather than just one, so that even if a hacker gets your password to one account, the rest of your information will remain safe.

Online Friends: Talk to your children about the need to discuss with you before meeting any online friends face-to-face.

Browser History: Check your browser history to find out where your children are spending time online. If the history does not exist or has been selectively deleted, that’s a red flag. You should also review the SMS and browser logs on smart phones from time to time.

Information Sharing: Teach your children not to share any personal information over the Internet without your permission.

Location Sharing: Certain social networking sites give you the option of publicizing your current location, and even make a game of “checking in” at various locations.  The danger in these sites comes from the ability of potential burglars or stalkers to keep tabs on specific individuals’ patterns of movement and current locations.  Be aware of whether you have given these sites permission to publish your location, and educate your children about the dangers of oversharing online.

E-mail: To avoid phishing scams, teach your family never to reply or click on links within e-mails asking for personal or financial information. If a retailer or vendor asks you to e-mail your credit or debit card details, absolutely do not do it.  If you need to go to the linked website, manually type the targeted Web address directly into your browser.   

Be Mindful Where You Are: Any time you consider sending out private information from a location other than your home, be aware of where you are and who or what is nearby.  Some public computers have malicious software that can collect passwords and other sensitive data.  Before you access sensitive information, such as your bank account, ask yourself whether doing so can wait until you’re at a more secure location.  If you are using your own laptop, be careful of people watching what you type, or cameras recording patrons. 

Wireless Networks:  Private homes, as well as, public locations are increasingly using wireless networks to provide a connection to the internet.  If you have a wireless network in your home, protect your family’s information by securing the network with a password.  Many cell phones can also be set to broadcast information wirelessly via Bluetooth or GPS.  Make sure your device is only accessible to computers that you have prescreened.

Passwords: Use strong passwords that incorporate symbols, numbers and letters – never a word from a dictionary of any language. Do not share your passwords with others and change them often (every 90–120 days or when they are exposed).  Avoid using programs that store all of your passwords, either on your hard-drive or on the browser.

Protecting Your Computer: Use anti-virus and anti-spyware software. Keep them automatically updated and do not ignore warnings. Install a firewall, especially if your computer is left on at all times.  Guide your family to alert you when a warning presents itself. 

Awareness: One of the most important weapons you can use to protect yourself and your family knowing the potential dangers posed by the Internet.  Many of those dangers can be avoided simply by being conscious of what information you provide online.

These are just a few basics for online safety. Above all, keep the communication lines open and help your kids understand the potential dangers on the Internet so they feel comfortable reporting unusual activity. In addition, you can turn to technology products such as Linksys by Cisco’s Home Network Defender, which can block preset sites and report Internet activities to network administrators.

Useful Links:

Data Privacy Day

Facebook Page for Data Privacy Day

Online Privacy: Protecting You and Your Family

http://www.staysafeonline.org

http://www.onguardonline.gov

Please Rob Me: The Dangers of Online Oversharing

Identity Theft Resource Center

http://www.ftc.gov/bcp/edu/microsites/idtheft/consumers/index.html

HIPAA Information For Consumers  (Protect your medical information)

http://ftc.gov/bcp/edu/pubs/consumer/idtheft/idt10.shtm (Medical Identity Theft)

Cisco’s Social Media Guidelines, Policies, and FAQs

In an effort to keep conversations fresh, Cisco Blogs closes comments after 60 days. Please visit the Cisco Blogs hub page for the latest content.

8 Comments.


  1. Tim Sammut

    Hi, Van.Great post, thanks for sharing! If I was to add one thing, I would emphasize that we should work to keep the software on our computers up to date. Current anti-virus and anti-spyware is a good start, but keeping a computer’s operating system, browser, and helper software–for example, Adobe Reader, Flash and Java–up to date really does go a long way.thanks againtim

       0 likes

  2. Hello Van,Pretty cool share. But i think, this happen several times to me, sometimes any very updated antivirus erase my data, although it’s clean, says the file suspected then automatically antivirus delete it, so my program can’t running and frustated. Now i’m not using antivirus, just using deep freeze, it’s safe.

       0 likes

  3. Thanks Van. Great tips regarding email safety. You don’t know how many infected PC’s I have had to clean because of nasty email links that people click on.

       0 likes

  4. Tim Sammut pointed a very relevant concern, as there are many security threats that exploit well know software breaches that are already fixed in newer versions.

       0 likes

  5. I reinstalled few operating systems at work because users are not careful with their online safety. One of them didn’t know about the danger of data stealing. It uses an infected computer for shopping online, with the card. I think the most important thing on the online security is to be always careful with your personal data.

       0 likes

  6. Impressive set of pointers and tips on how to guarantee safety and reduce the risk of getting your privacy abused online.. Thanks for sharing Van!More power!

       0 likes

  7. Hi Van,Thanks for giving us more tips.I avoid using public internet cafes and use your own laptop or pc when making online transaction as much as possible..This reduces the risk of getting accounts hacked and other related problems.

       0 likes

  8. This is by far the best and most concise article on this topic – bookmarked it for future reference. I completely agree with an earlier poster: keeping your anti-virus software up to date is very important as new viruses are created”” often.”

       0 likes