Skip to main content

Internet Security & Protection

Today’s children (and their parents) face a number of challenges that are very different from earlier generations. Children now have access to many online sources of information, socialization and entertainment. With sites such as You Tube, Facebook, Twitter and other Internet web sites, people, young and old, can interact with each other easier than ever, from anywhere in the world.

It is not uncommon for children as young as 5 to be exposed to the internet, and as they grow up, they’ll continue to surf the web, watch online videos, play online games and communicate with others via social media or other apps.

The internet can be a great place for both entertainment and communication, but it is not without potential risk, as cyberbullying, cyberstalking, child exploitation and more have become more prominent.

There a number of useful online resources available to help you better understand the possible risks and protect your children.

 

Online safety

eSafety Commissioner

Advice for parents

Advice Overview

Online safety basics

Cyberbullying

The eSafety Commissioner provides a range of educational material about staying safe online: https://www.esafety.gov.au/

Some families find parental controls and filters a useful addition to parental supervision.

You can find a list of tested and certified "Family Friendly Filters" on the Communications Alliance website: https://www.commsalliance.com.au/Activities/ispi/fff

eSafety is Australia's independent regulator for online safety. 

If you would like to make a complaint to eSafety about serious online abuse, illegal or restricted online content, see https://www.esafety.gov.au/report.  You can also report content to the online service or platform where it appears

Internet Safety & Security

Internet security threats such as viruses, hackers and privacy risks are always changing so it is important that you are aware so you can protect yourself online.

We have put together some information to help you understand the types of risks you might encounter and help protect against those threats.

What you need to know:

These articles cover topics like how to identify phishing emails, what you need to do to protect your privacy online and how to report scam or fake emails.

  • Online Scams and Phishing
  • Malware, Spyware and Adware
Staying safe online:

Protecting yourself and your family, how to secure your devices, protecting your children from inappropriate content, cyberbullying and cyber safety.

  • Internet Security & Protection
  • Keeping your children safe online

What is Phishing?

Scammers often pretend to be a common business or institution you are familiar with, in order to obtain your personal information, such as financial details or information pertaining to your identity.

Phishing methods used by scammers include:

  • Emails
  • Fake websites
  • Text messages
  • Phone calls
  • Instant messaging services
  • Social media

These are designed to deceive you into giving out your private and confidential information.

iPrimus will never ask you for your personal or private information via an email or SMS.

How do I know that I’m being Phished?

It’s not always easy to spot a scammer, but you should look out for these signs;

  • Generic greetings – If you have an account, they should know your name
  • Poor spelling or grammar
  • An ‘urgent’ request for information – Most companies will not send you an email asking for passwords, credit card information, or tax numbers, nor will they send you a link from which you need to login
  • Deals, Offers or Prizes (Holidays, cash prizes, etc.) If an offer comes with a request for personal information, a link to claim your prize, or an attachment to download, it’s a phishing scam. It’s like the old saying “if it seems too good to be true, it probably is.”
  • Scare Tactics – Thing like “your account has been compromised”, “A warrant has been issued for your arrest” and other threats
  • Attachments or Click Links - If something makes you suspicious or doesn’t look right, do not open it and simply delete.

Other useful links:

Australian Cyber Security Centre

Information on phishing

How to protect yourself when using email

Scamwatch

Unexpected money

What are they?

Viruses, worms, Trojans, and bots are all part of a class of software called "malware." Malware is short for "malicious software," also known as malicious code or "malcode." It is code or software that is specifically designed to damage, disrupt, steal, or in general inflict some other "bad" or illegitimate action on data, hosts, or networks.

Ransomware:

A type of malware that can threaten to make your private information public, or lock your system, making it unusable. Requires the user to pay a ransom payment to remove.

Viruses:

A computer virus copies itself into your computer and can spread form one computer to another.Virus can damage data and software. A lot of viruses are attached to an executable file and can be dormant until opened.

Worms:

Worms are similar to viruses but are standalone software and do not require a host program or human help to spread. More advanced worms leverage encryption, wipers, and ransomware technologies to harm their targets.

Trojans:

A Trojan named after the wooden horse that the Greeks used to infiltrate Troy. It is a harmful piece of software that looks legitimate. After it is activated, it can cause irritating pop-up windows, change desktops, delete files, steal data, or activate and spreading other malware.

Trojans are also known to create backdoors to give malicious users access to the system. A trojan infection is usually caused by opening an email attachment or downloading and running a file from the Internet.

Bots:

A malicious bot is self-spreading malware designed to infect a host and connect back another server that act as a command and control centre for an entire network of compromised devices, creating a "botnet."

Bots can include the ability to log keystrokes, gather passwords, capture, gather financial information, launch Denial of Service (DOS) Attacks, relay scams, and open backdoors on the infected host. Advanced botnets may take advantage of common smart devices such as home electronics or appliances to increase automated attacks.

Adware:

Adware is a form of malware that hides on your device and serves you advertisements. Some adware also monitors your behaviour online so it can target you with specific ads.

How do you protect yourself?
  • Don’t download applications from third-party download sites.
  • Don’t click on online ads to download applications and do use ad-blocking software.
  • Don’t download and install applications from peer to peer networks – you never know who has changed the files.
  • Don’t click on links in emails or instant messages or execute attachments unless you are sure they are legitimate. Use an email filter to protect yourself from malicious messages.
  • Don’t install applications received from contacts, say via email or USB sticks, without scanning them with your anti-virus application first.

Other useful links:

Scamwatch

Malware & Ransomware

Australian Cyber Security Centre

Malware

While Online Scams, Phishing and Malware can seem a bit scary, there are a number of things you can do to minimize the risks, and protect yourself.

Anti-Virus software:

Install an anti-virus software program, and make sure you keep it up to date. Anti-virus software can help to protect from many types of malware.

To learn more about anti-virus software visit the Australian Cyber Security Centre

Simple rules to follow:

Following a few simple rules will help to protect you.

  • Use strong password logins for your devices, as well as any online accounts and services you may use.
  • Keep your devices, programs and operating system up to date to prevent possible exploit attacks.
  • If using a home WiFi network, have a strong password and update it regularly.
  • Avoid doing online banking or other tasks that require personal information when using public computers or WiFi hotspots.
  • Be on the lookout for emails asking for personal information, even if they look genuine.
  • Never open email attachments from a source you don’t recognise or are ensure of.
  • Avoid downloading suspicious files when online.

Other useful links:

Australian Competition and Consumer Commission

Protecting yourself from scams

Scamwatch

Protect yourself from scams