Tag: Internet Safety


Online Rule of Agreement

Posted on February 29th, by Cathy Olsen in Securemama Site, Tutorial. 2 comments

This is part one in my “Top Ten ways to protect your kids on the Internet.” I will be hosting a booth at BYU Women’s Conference.  I think I will have this countdown as my main topic.

STEP ONE:

1. Online Rule of Agreement – This agreement is to promote a discussion of what is allowed and not allowed.  Your child is exposed to so much and in so many different ways (home computer, school, cell phones, friends' cell phones, etc.).  It is not realistic to think that all of those devices have been secured.  Discuss what types of sites are allowed and what is not allowed.  Discuss what your child can and cannot do on the Internet no matter what.  Use this agreement as a way to safeguard your child when they are accessing the Internet on computers or devices that … Read More »


iTouch/iPhone Security for kids and Teens

Posted on February 9th, by Cathy Olsen in Mobile Security, Popular, Web Surfing. 7 comments

The top requested present this year for kids ages 10-15 was an iTouch. Those ages 15+, it was an iPhone, or iPad. I LOVE the iTouch. I got it for one of my anniversary gifts two years ago and I posted on my blog how I like gadgets better than jewelry. Fast forward two years and I have an iPad and iPhone as well. Ok, we get it. Everyone loves apple products, so what are the implications of these AMAZING devices.

An iTouch, iPhone, iPad are very similar to a COMPUTER. Let me repeat.  THEY ARE JUST LIKE A COMPUTER!!! The blogs about Internet Safety have been telling us for years to keep our computers in a 'public' location. The kitchen, family room, somewhere where you are likely to be seen. Also, the sites you are browsing can be seen. Any … Read More »




Recent Posts

The Securemama blog is updated regularly to teach and help people with technology and Internet. Keep it Fun!  Keep it Safe!

Securemama KSL Studio 5 – YouTube Safety

I was on TV again!!

I have posted about YouTube Safety Tips. Click on that link to get the written list that was discussed on...

How to detect a Phishing scheme?

 

Phishing e-mails are designed to steal personal information by gaining access to your computer through malicious software. Phishing is any attempt to steal personal...

What is a DDOS Attack?

The news has been full of stories of attacks on American banks.  Wells Fargo, Bank of America among them.  The attack also slammed other...