web analytics

Tag Archive | "internet"

Shopping Safely Online


 

From the US Computer Emergency Readiness Team 

Why do online shoppers have to take special precautions? 

The Internet offers convenience not available from other shopping outlets. From the comfort of your home, you can search for items from multiple vendors, compare prices with a few mouse clicks, and make purchases without waiting in line. However, the Internet is also convenient for attackers, giving them multiple ways to access the personal and financial information of unsuspecting shoppers. Attackers who are able to obtain this information may use it for their own financial gain, either by making purchases themselves or by selling the information to someone else.

Online shopping has become a popular way to purchase items without the hassles of traffic and crowds. However, the Internet has unique risks, so it is important to take steps to protect yourself when shopping online.

How do attackers target online shoppers? 

There are three common ways that attackers can take advantage of online shoppers:

Creating fraudulent sites and email messages – Unlike traditional shopping, where you know that a store is actually the store it claims to be, attackers can create malicious websites or email messages that appear to be legitimate. Attackers may also misrepresent themselves as charities, especially after natural disasters or during holiday seasons. Attackers create these malicious sites and email messages to try to convince you to supply personal and financial information.

Intercepting insecure transactions – If a vendor does not use encryption, an attacker may be able to intercept your information as it is transmitted.

Targeting vulnerable computers – If you do not take steps to protect your computer from viruses or other malicious code, an attacker may be able to gain access to your computer and all of the information on it. It is also important for vendors to protect their computers to prevent attackers from accessing customer databases.

How can you protect yourself? 

Do business with reputable vendors – Before providing any personal or financial information, make sure that you are interacting with a reputable, established vendor. Some attackers may try to trick you by creating malicious websites that appear to be legitimate, so you should verify the legitimacy before supplying any information. Attackers may obtain a site certificate for a malicious website to appear more authentic, so review the certificate information, particularly the “issued to” information. Locate and note phone numbers and physical addresses of vendors in case there is a problem with your transaction or your bill.

Make sure your information is being encrypted – Many sites use secure sockets layer (SSL) to encrypt information. Indications that your information will be encrypted include a URL that begins with “https:” instead of “http:” and a padlock icon. If the padlock is closed, the information is encrypted. The location of the icon varies by browser; for example, it may be to the right of the address bar or at the bottom of the window. Some attackers try to trick users by adding a fake padlock icon, so make sure that the icon is in the appropriate location for your browser.

Be wary of emails requesting information – Attackers may attempt to gather information by sending emails requesting that you confirm purchase or account information. (See Avoiding Social Engineering and Phishing Attacks.) Legitimate businesses will not solicit this type of information through email. Do not provide sensitive information through email. If you receive an unsolicited email from a business, instead of clicking on the provided link, directly log on to the authentic website by typing the address yourself.

Use a credit card – There are laws to limit your liability for fraudulent credit card charges, but you may not have the same level of protection for your debit cards. Additionally, because a debit card draws money directly from your bank account, unauthorized charges could leave you with insufficient funds to pay other bills. You can minimize potential damage by using a single, low-limit credit card to making all of your online purchases. Also use a credit card when using a payment gateway such as PayPal, Google Wallet, or Apple Pay.

Check your shopping app settings – Look for apps that tell you what they do with your data and how they keep it secure. Keep in mind that there is no legal limit on your liability with money stored in a shopping app (or on a gift card). Unless otherwise stated under the terms of service, you are responsible for all charges made through your shopping app.

Check your statements – Keep a record of your purchases and copies of confirmation pages, and compare them to your bank statements. If there is a discrepancy, report it immediately.

Check privacy policies – Before providing personal or financial information, check the website’s privacy policy. Make sure you understand how your information will be stored and used.

For more information on this and other alerts and tips connected to cyber security, visit www.us-cert.gov, an official website of the Department of Homeland Security.

Posted in NewsComments Off on Shopping Safely Online

Grieving in the Internet Age


Charlie Waller and his mother Abigail.

Charlie Waller and his mother Abigail.

Charlie Waller loved trick-or-treating, pirates, his kindergarten class at Marble Elementary, his sister, Esther, and so much more during his all-too-brief life.

He died last December from an inoperable brain tumor that slowly robbed him of his ability to play, to walk and to see, but never his kindness. His parents, John and Abigail, have turned to the Internet to help them harness Charlie’s spirit and his kindness by launching a new social media campaign, #CouragetobeKind, in Charlie’s honor.

Charlie, a patient in Hospice of Michigan’s pediatric program, battled his illness for two-plus years, all with the help of family, friends, and a supportive care team. Throughout this experience, John and Abigail relied on social media to keep far-flung family and friends informed of their son’s condition. Abigail launched a blog where she shared imaginary letters to her son, chronicling their journey with courage, profundity and poignancy.

With help of Abigail’s father, they launched the nonprofit Art for Charlie Foundation to raise both awareness and funds for pediatric hospice. Facebook and Twitter accounts were opened to amplify the site and promote its annual art show and sale, as well as this year’s statewide conference on pediatric hospice and bereavement support.

“Social media has become a strong outlet for public mourning,” said Karen Monts, director of grief support service at Hospice of Michigan. “It allows people a medium to express their feelings when experiencing a significant loss, and it also provides an opportunity to ensure the memory of a lost loved one isn’t forgotten.””

When counseling the bereaved, Monts often refers to the Six Tasks of Mourning, as defined by Dr. Alan Wolfelt, grief educator and author of Healing the Bereaved Child. Monts explains that social media can help in achieving each of Wolfelt’s tasks:

Task One: Need to acknowledge the reality of the death. When family members hear word of a loved one’s death, many immediately turn to social media as they process the news. The reality of someone’s passing becomes clear when seeing the details of the death, finality of funeral details, and posts of love and support by family and friends.

Task Two: Need to approach the pain of loss while being supported. Social media not only provides a platform for the bereaved to express pain, but it also gives family and friends the opportunity to offer words of support, which validates and normalizes the grief they feel.

Task Three: Need to remember the person who died. Through blogs, posts and picture sharing, there are countless ways that the bereaved can use social media to share memories of their loved ones. Feedback from family and friends also lets the bereaved know those memories are treasured by others.

Task Four: Develop a new self-identity. This is often one of the more challenging tasks of grief. What role do you play in life now that your loved one is gone? Through open discussion of the deceased life on social media, the bereaved can develop a better understanding of the many roles the deceased played in the lives of others. The bereaved can use that information to determine the new roles they will take on in their own life.

Task Five: Searching for meaning in what has happened: When a loved one dies, it may prompt questions regarding the purpose of life and how such a tragic event could happen. Social Media allows the bereaved to express their questions, concerns and doubts while providing reassurance as one searches for a new sense of purpose or clarity.

Task Six: Experience continued support in future years. Social media provides the perfect medium for the bereaved to share feelings of grief, regardless of how long it’s been since a loved one died. It might be recognition of a birthday or an anniversary of death, or it could be a simple statement like “Really missing my mom today. “Not only does expressing these feelings help the bereaved, but family and friends who see this public expression often respond with encouraging words.

Monts adds that in addition to helping cope with grief, social media can simply provide the bereaved with a needed distraction. However, even with all the benefits, she warns that there can be negatives to using social media in the grieving process.

While publically expressing grief may be helpful to one family member, seeing these reminders on social media may be difficult for a family member who grieves more privately. While Monts advises people to consider others when expressing grief publicly, she believes the benefits of social media in grieving far outweigh the cons.

For the Waller family, social media continues to be a source of solace, education and hope. The launch of their Courage to be Kind social campaign acknowledges Charlie’s gentleness and wisdom in advocating kindness to all.  Wise beyond his years, he argued for tolerance for those who were unkind, explaining that some children (and adults, we would add) have to learn to be kind just as they have to learn their ABCs.

The vision of the campaign is that it will create a system to allow people to report acts of kindness anonymously on social media.  To learn more about Charlie’s story and #CouragetobeKind, visit artforcharlie.org.

Hospice of Michigan offers a variety of grief support and educational services. These programs are available to all families involved with Hospice of Michigan, as well as the community at large. For more information, visit www.hom.org.

Posted in FeaturedComments Off on Grieving in the Internet Age

Making learning come alive through technology!


Our students are learning new reading strategies, writing, vocabulary, science, and social studies in new ways with ELMOS (document cameras) and the internet.  Teachers now have the means to share real pictures of communities in other countries, habitats and support new vocabulary by transferring the live pictures from the internet onto the wall of their classroom.  Also, teachers can model reading, writing and allow students to share with this new (PTO purchased) technology.

Posted in Cedar Springs Public SchoolsComments Off on Making learning come alive through technology!


advert

Archives

Get Your Copy of The Cedar Springs Post for just $40 a year!