February 2016
                         
  Digital Forensics           IT Support           Cyber Security 
Portrait of smart schoolgirls and schoolboys looking at the laptop

broken_computer.jpg

Microsoft Internet Explorer Upgrade

Microsoft has ended support for Internet Explorer 8, 9 and 10 in January 2016. Just like when Microsoft ended support for Windows XP, this means that those versions will continue to work, however Microsoft will no longer issue security updates and as a result, those versions will quickly become security risks. It is highly recommended that you update your browser (if it is not already up to date).
 
Click here to determine the Internet Explorer version you are currently running.  
 
If you're running an old version of Internet Explorer, you can update to the latest version using Windows Update (look for this in your Start menu).

keyboard-abstract-blue.jpg

What is Metadata?

In short, metadata is data that provides information about other data.  Metadata is to digital information as an old-fashioned card catalog is to a library book.  It summarizes basic information that can make finding and working with data easier.  

For example, metadata for a document includes author, date created, modifications, file size and other information.  It can include specifics of a phone call and the location of reading an email.  Metadata is used for documents, images, videos, spreadsheets and web pages and other varied uses.  For example, metadata found in hotel WiFi systems has successfully identified parties in criminal investigations.  

Meet the 
Seltek Team

Kara Mueller is an eDiscovery specialist and a Certified Computer Examiner with a certification from ISFCE. Kara is part of Seltek's digital forensics team and has years of eDiscovery and data retrieval experience. Kara also provides IT support for Seltek clients. She  
graduated from Randolph-Macon College in 2007 with a degree in Computer Science and experience working with the Randolph-Macon I.T. department as a student tech. She worked for the University of Richmond and Circuit City before joining Seltek in 2008. 




Keep Your Kids Safe Online
by Kara Mueller
IT Support Specialist & Certified Computer Examiner
 
The World Wide Web has integrated itself firmly into our lives - and into our children's lives.  It is an invaluable tool for learning and connecting, but there are downsides - cyber bullying, violence, pornography, identity theft and child predators.  It is essential that parents take an active role in their children's online safety.
 
Be Part of Your Child's 
Online Activities

Being actively engaged in your child's technology activities will give you more access to what they are doing on the online. Watch videos or play games together. Have them show you their favorite websites and teach you how to use them. If your child uses social media such as Facebook or Twitter, "follow" or "friend" them. Consider setting a rule that your child may only use social media as long as you are able to see their posts (no "unfriending" or blocking).  Some parents choose to have log-in information to their child's social media and e-mail accounts in order to check messages periodically. 
 
Educate Your Children on Safety

Children and teens can be smart when it comes to knowing how to use electronics, but they need to learn online safety online and privacy protection.  Teach them not to give out personal information like passwords, home address and school name. Be as anonymous as possible.  Keep social media accounts private or limit their group of "friends."  Teach them to think before making a post - once something is posted online, it may be impossible to later remove it.  Have them recognize that not everyone is who they say they are.  Consider a rule that they not chat with strangers or people you don't know.  Of course, children should respect others online and report bullying or online activity that makes them uncomfortable.
 
Establish House Rules

Create and enforce family technology rules. Some examples include limiting computer and game time each day; keeping technology in rooms where parents can observe computer use; creating docking stations and family times when no technology is permitted; having parents control the WiFi password and providing it only after homework and chores are completed; having your child sign a technology contract when receiving a new gadget or computer.  

Become Educated 

Learn how to use your children's technology devices so you have an understanding about how they will be using them.  If you need help, watch tutorials online, read the manual or even have your child give you a lesson.  I 
 
Understand that most devices are connected to one another through the Internet.  Many gadgets can access the Internet - iPods, tablets, Xbox, Playstation, Wii, even handheld game systems like the Nintendo 3DS.  These items also have chat features. Just because your child isn't text messaging from a cell phone doesn't mean they aren't chatting online using another device.  
 
Be acquainted with and know the purpose of the technology, websites and apps your child is using. Suppose, for example, you find an app called "ooVoo" on your child's phone or tablet. What is it and what does it do? If you aren't sure, Google it and you will get a description and links to articles with additional information.  Look at one of the websites specifically designed for parents to ask these questions. Common Sense Media for example.  On this site, parents can search books, games, websites, apps and music for information which also includes other parent comments.  Understand computer and Internet safeguards and your child's school, public library and friends' homes.  Ask if they use web filtering and whether or not their web usage is monitored.  

Use Parental Controls

1.  For PCs, there are many products that can block inappropriate web content, set time limits, and monitor your child's computer usage and web history. See:  Cyberpatrol , Qustodio or NetNanny
2.  For iOS smartphones and tablets, there is a feature called "restrictions." Go to Settings, then General, then Restrictions. Here you can disable or enable in-app purchases (such as those for games); disable songs with explicit lyrics; disallow movies with certain ratings; disable app installation; disable the camera; and more.  Restrictions are protected by a passcode lock which is separate from the phone's entry passcode.
3.  Android has similar options to to those offered in iOS devices. There is a helpful  guide to assist with Android security.  4.  All of the major game systems offer parental controls. Restrictions can be set for playback of games and DVDs with specified ratings, web browsing and chat usage. 
See Parental Controls: Playstation 3, Playstation 4, XBOX and Nintendo.
 
Always remember that kids may learn to maneuver parental controls. When implementing technology security, it is wise to check periodically to ensure the products and systems are current and working properly. Research a product before buying it and read the reviews for guidance on effectiveness. 

The FBI's  Parent's Guide to Internet Safety is a great resource.  It discusses warning signs of a child at risk online, suggested practices and additional information about online safety.  
Seltek | 804-360-4490 x20 | gini@seltekinc.com | http://www.seltekinc.com
8814 Fargo Road
Suite 201
Richmond, VA 23229