How to report cyber crime
Things You'll Need
Monitoring of your child's computer activities
Turn on your spam blocker. Most Internet providers provide a spam blocking feature to prevent unwanted messages, such as fraudulent emails and phising emails, from getting to your inbox.
Make sure you have adequate anti-virus software for your computer, such as McAfee, Norton Anti-Virus, Stopzilla or other similar programs. You also need to make sure you regularly update your anti-virus software and that you do a once-a-week scan to locate and eliminate any malware, spyware, viruses and other problems. If you don't want to purchase security software, then there are programs, such as AVG, that offer free versions.
Use your computer's firewall protection feature, which is a digitally created barrier that prevents hackers from getting into your computer system. Always keep it turned on.
Encrypt important data you don't want compromised. Utilize encryption software, which "garbles" your data to make it unintelligible to anyone who tries to hack into your computer system.
Be wary of providing personal information via
a website you know nothing about, especially those that ask for your name, mailing address, bank account number or social security number.
Make sure that you do online shopping on a secure website, like those with a url that starts with "https" and/or have a TRUSTe or VeriSign seal. If you don't see these anywhere on the site, you run the risk of submitting credit card information and other personal information to a site that may be a fraud.
Avoid getting taken in by common scams, such as foreign lotteries, phony sweepstakes and similar methods used by cyber criminals to get your personal information and money. If it sounds too good to be true, it probably is.
Monitor the online activities of your children. They should only have access to a computer located in a central area of your home and you should regularly check all browser and email activity. A wise thing to do is to use parental control software that limits the types of sites the user can gain access to.Source: ehow.com