Online Security at Home
- Future Students
- Current Students
- Research and Teaching
- Partners and Community
- About JCU
- Celebrating 50 Years
- Anton Breinl Research Centre
- Living on Campus
- Advanced Analytical Centre
- Applying to JCU
- Australian Lions Stinger Research
- Australian Tropical Herbarium
- Association of Australian University Secretaries
- Careers and Employability
- Australian Quantum & Classical Transport Physics Group
- Centre for International Trade and Business in Asia
- Centre for Tropical Bioinformatics and Molecular Biology
- College of Business, Law and Governance
- College of Healthcare Sciences
- College of Medicine and Dentistry
- College of Science and Engineering
- COVID-19 Advice
- Diploma of Higher Education
- Division of Research and Innovation
- Division of Tropical Environments and Societies
- Division of Tropical Health and Medicine
- Economic Geology Research Centre
- Foundation for Australian Literary Studies
- Give to JCU
- Graduate Research School
- JCU Ideas Lab
- Indigenous Education and Research Centre
- Student IT Essentials
- Staff IT Essentials
- Help and Support
- Stay Informed
- Choosing a strong Password
- Data Protection
- Device Security
- Email Safety
- Online Security at Home
- Web Safety
- Malware and Virus Protection
- Keep a clean device
- Protect myself from phishing
- Recover a hacked or compromised account
- Protect your digital reputation
- Report a cybersecurity incident
- Password Manager
- IT Service Catalog
- International Students
- JCU Eduquarium
- JCU Global Experience
- JCU Halls of Residence
- Language and Culture Research Centre
- Marine Geophysics Laboratory
- Off-Campus Students
- Open Day
- Outstanding Alumni Awards
- Parents and Partners
- Pathways to University
- Planning and Performance
- Planning for your future
- Professional Experience Placement
- Rapid Assessment Unit
- JCU Connect
- Safety and Wellbeing
- Scholarships @ JCU
- Study Now
- Student Equity and Wellbeing
- VAVS Home
- WHOCC for Vector-borne & NTD
- Australian Institute of Tropical Health & Medicine
It is natural to be concerned about the well-being of children using the internet. In addition to ensuring they follow the good advice covered here - kids need to be aware of the dangers, talk to them about these issues and encourage them to be alert.
Make sure you know what sites your children are visiting online.
Ensure that children get your approval before downloading software or apps.
Educate your kids not to provide ANY personal information to people they meet online - not even their name.
Monitor your kid’s online interactions - the people they are talking to may not be who they claim to be.
Consider installing parental lock software, or better still consider placing the computer in a shared space (such as the living room).
The Queensland Police, amongst others, have useful information regarding risks posed to children over the internet. Kids are often naive when it comes to computer use - behaviour that would trigger 'stranger danger' in person, may not get the same reaction from your child when online.
Make sure you children know, never to provide personal information (and especially not photos) to anyone, unless you (the parent) have met and verified the identity of the person face to face.
The popularity of social networking sites continues to increase, especially among teenagers and young adults. The nature of these sites introduces additional risks, so you should take precautions.
Check your security settings for you profile and ensure only the information you want to be released is made public.
Only log into the website or service by typing the address into your browser.
Use your social media account details to log onto a 3rd party website or App. Create a separate account on that website with a unique password.
Post information you don’t want to be in the public domain, you don’t know when the service might change its terms and conditions and make your information public.
Wireless internet access poses a number of risks, the most concerning of these is others using your access without permission. Additional risks include: theft of internet bandwidth (you probably pay for access); contamination of your computer by someone using your wireless without your authorisation and theft of private information.
Perhaps the scariest potential risk with unauthorised access to your wireless network, is what someone could do with that access. They could be involved with child exploitation, illegal software downloads or computer hacking. When the authorities track this activity, it will trace back to YOU (your wireless access point) - this could make for an interesting discussion with authorities.
On your computer make sure you always turn your wireless adapter off when not in use. On your access point, enable encryption, WEP is weak (but better than nothing) and WPA2 is stronger. Allow only a certain set of MAC addresses to connect to the router and don't broadcast your SSID.