2. Get that Computer Out of the Bedroom! If its still there, get that computer out of the bedroom. It's a no safe zone when they have unfetted internet access. Computers need to be in a visable location so you can see what your children are doing.
3. Educate Your Kids Once you have educated yourself around the dangers and risks, sit your children down and explain it to them. Draw up a set of internet house rules. You can find examples of these on Google. That way your children can agree with you, what the terms and appropriate behaviour should be.
4. Understand the Issues Around the 3 C's Contact: understand the various scenarios: you may be contacted by fraudsters, scammers, sexual deviants and predators. Scammers are often after personal details for criminal gain, such as your birthdate, social security number, bank account number, credit card information or online passwords. Learn how to identify these.
Content: learn about the appropriate content, not only pornographic imagery, but also extreme speech, sites relating to drugs, alcohol, explosives, and more.
Conduct: Discuss with your children appropriate conduct. Posting sexy or adult like images on the internet may seem harmless at the time, but can be used against you by anyone. Any personal material posted by anyone becomes part of their electronic footprint. This can last a lifetime, and can be problematic when applying for a job.
5. Educate, Discuss, Monitor Once you have educated yourself, and discussed issues with your children, make them aware that as part of the internet house rules, you will be monitoring their internet activity. You do not want to pry into their personal messages, but merely want to ensure they are kept safe while online.
Install Parental Control software as a minimum. There are many software companies out there producing fantastic products at reasonable prices. For a total monitoring solution, look at PC Pandora by clicking the link on this page. As a minimum, I install K9 or OnlineFamily.Norton as a minimum, depending on the home configuration.