IT Services Secure IT Online Security at Home
Online Security at Home
- Aboriginals and Torres Strait Islanders in Marine Science
- Courses
- Future Students
- Current Students
- Research and Teaching
- Partners and Community
- About JCU
- Reputation and Experience
- Celebrating 50 Years
- Academy
- Anthropological Laboratory for Tropical Audiovisual Research (ALTAR)
- Anton Breinl Research Centre
- Agriculture Technology and Adoption Centre
- Living on Campus
- Advanced Analytical Centre
- Applying to JCU
- Alumni
- AMHHEC
- JCU Aquaculture Solutions
- AusAsian Mental Health Research Group
- ARCSTA
- Area 61
- Association of Australian University Secretaries
- Australian/NZ Students
- Australian Lions Stinger Research
- Australian Tropical Herbarium
- Australian Quantum & Classical Transport Physics Group
- Boating and Diving
- JCU-CSIRO Partnership
- Employability Edge
- Career Ready Plan
- CASE
- Careers at JCU
- Careers and Employability
- Chancellery
- Centre for Tropical Bioinformatics and Molecular Biology
- CITBA
- CMT
- College of Business, Law and Governance
- College of Healthcare Sciences
- WHOCC for N&M Education and Research
- College of Medicine and Dentistry
- College of Science and Engineering
- CPHMVS
- Centre for Disaster Solutions
- CSTFA
- Cyber Security Hub
- Cyclone Testing Station
- The Centre for Disaster Studies
- Daintree Rainforest Observatory
- Discover Nature at JCU
- Research Division
- Services and Resources Division
- Education Division
- Economic Geology Research Centre
- Elite Athletes
- eResearch
- Environmental Research Complex [ERC]
- Estate
- Fletcherview
- Foundation for Australian Literary Studies
- Gender Equity Action and Research
- General Practice and Rural Medicine
- GetReady4Uni
- Give to JCU
- Governance
- Information for JCU Cairns Graduates
- Art of Academic Writing
- Art of Academic Editing
- Graduate Research School
- Graduation
- Indigenous Education and Research Centre
- Indigenous Engagement
- Indigenous Legal Needs Project
- Inherent Requirements
- IsoTropics Geochemistry Lab
-
IT Services
- Student IT Essentials
- Staff IT Essentials
- Help and Support
- Stay Informed
-
Secure IT
- Choosing a strong Password
- Cyber Security Hub
- Data Protection
- Device Security
- Email Safety
- Online Security at Home
- Web Safety
- Malware and Virus Protection
- Keep a clean device
- Protect myself from phishing
- Recover a hacked or compromised account
- Protect your digital reputation
- Report a cybersecurity incident
- Password Manager
- Multi-Factor Authentication (MFA)
- Student Systems
- IT Service Catalog
- About
- International Schools
- International Students
- Research and Innovation Services
- JCU Eduquarium
- JCU Events
- JCU Global Experience
- JCU Ideas Lab
- JCU Job Ready
- JCU Motorsports
- JCU Prizes
- JCU Sport
- JCU Turtle Health Research
- Language and Culture Research Centre
- CEE
- LearnJCU
- Library
- Mabo Decision: 30 years on
- MARF
- Marine Geophysics Laboratory
- New students
- Off-Campus Students
- Office of the Vice Chancellor and President
- Virtual Open Day
- Orpheus
- Outstanding Alumni
- Parents and Partners
- Pathways to university
- Planning for your future
- Placements
- Policy
- PAHL
- Publications
- Professional Experience Placement
- Queensland Research Centre for Peripheral Vascular Disease
- Rapid Assessment Unit
- RDIM
- Researcher Development Portal
- Safety and Wellbeing
- Scholarships
- Contextual Science for Tropical Coastal Ecosystems
- Staff
- State of the Tropics
- Strategic Procurement
- Student Equity and Wellbeing
- Student profiles
- SWIRLnet
- TARL
- TESS
- TREAD
- TropEco for Staff and Students
- TQ Maths Hub
- TUDLab
- Unicare Centre and Unicampus Kids
- UAV
- VAVS Home
- Work Health and Safety
- WHOCC for Vector-borne & NTDs
- Media
- Copyright and Terms of Use
- Australian Institute of Tropical Health & Medicine
- Clinical Psychedelic Research Lab
It is natural to be concerned about the well-being of children using the internet. In addition to ensuring they follow the good advice covered here - kids need to be aware of the dangers, talk to them about these issues and encourage them to be alert.
Good Practice:
Make sure you know what sites your children are visiting online.
Ensure that children get your approval before downloading software or apps.
Educate your kids not to provide ANY personal information to people they meet online - not even their name.
Monitor your kid’s online interactions - the people they are talking to may not be who they claim to be.
Consider installing parental lock software, or better still consider placing the computer in a shared space (such as the living room).
The Queensland Police, amongst others, have useful information regarding risks posed to children over the internet. Kids are often naive when it comes to computer use - behaviour that would trigger 'stranger danger' in person, may not get the same reaction from your child when online.
Make sure you children know, never to provide personal information (and especially not photos) to anyone, unless you (the parent) have met and verified the identity of the person face to face.
Security on Social Networking Sites
The popularity of social networking sites continues to increase, especially among teenagers and young adults. The nature of these sites introduces additional risks, so you should take precautions.
DO
Check your security settings for you profile and ensure only the information you want to be released is made public.
Only log into the website or service by typing the address into your browser.
DON’T
Use your social media account details to log onto a 3rd party website or App. Create a separate account on that website with a unique password.
Post information you don’t want to be in the public domain, you don’t know when the service might change its terms and conditions and make your information public.
Wireless Security
Wireless internet access poses a number of risks, the most concerning of these is others using your access without permission. Additional risks include: theft of internet bandwidth (you probably pay for access); contamination of your computer by someone using your wireless without your authorisation and theft of private information.
Perhaps the scariest potential risk with unauthorised access to your wireless network, is what someone could do with that access. They could be involved with child exploitation, illegal software downloads or computer hacking. When the authorities track this activity, it will trace back to YOU (your wireless access point) - this could make for an interesting discussion with authorities.
On your computer make sure you always turn your wireless adapter off when not in use. On your access point, enable encryption, WEP is weak (but better than nothing) and WPA2 is stronger. Allow only a certain set of MAC addresses to connect to the router and don't broadcast your SSID.