The Bottom Line
Small business is important to Central Oregon, and to Mid Oregon. Find tips and resources for business, and information about Mid Oregon’s commercial services and business members.

Keeping your children safe online
on·line safe·ty | noun
- The act of staying safe online. It encompasses all technological devices, from PCs and laptops to smartphones and tablets, which have access to the internet.
My five-year-old nephew visited me last week and I was amazed at how savvy he was at navigating my computer to watch his favorite shows. Although I found him to be very clever, it made me wonder what else he had access to and what parental controls, if any, were in place for someone so young.
How risky is it for kids to be online?
Risks to kids vary from age, gender, online exposure and other factors. This could range anywhere from online bullying to accessing inappropriate websites to sharing too much personal information. Due to the COVID restrictions in the last few years, more kids are accessing the internet for schooling, social interaction and self-entertainment. Unfortunately, this also opened a window for scammers to actively target kids online to capture their personal information for nefarious reasons. Scammers also found that kids can be a gateway to obtaining your personal information too.
Tips For Keeping your children safe online
However, there are simple ways to make them aware of the risks of online scammers. Help them build skills to avoid becoming a victim. Keep them from opening a gateway to your family’s financial security and privacy.
1. Talk openly with your child about their online activity
As soon as your child starts accessing the internet, talk to them about what they are reading, watching and who they are communicating with online. Keep the conversation going as they grow older. Ask your child what sites they visit or apps they use, write a list, and look at them together. Talk to your child about what you think is appropriate. Remind them that this may be different for other parents and their children.
Listen to your child and reach an agreement about what is right for your family. Remember the time will come when they will access the internet outside the safety of home and you want them to be prepared for that.
It’s vital to teach them about their online reputation, too, and how they must be careful about how they behave, interact with people and represent themselves in such a public forum. They must always remember that the internet isn’t private.
2. Keep screens and devices where you can see them
Always monitor your child’s time online, particularly younger children. Keep the computer in a central spot in the home. Put it where it’s easy to keep an eye on what your child is doing and viewing online. For mobile devices, you can set them to forget Wi-Fi passcodes so your children cannot go online without you knowing. You can also try to make an agreement that there are no tablets, laptops or gaming in bedrooms.
For younger children, you might also consider checking browser histories after your child has been online to see what sites they are visiting. This approach obviously gets harder as children grow older and work out how to clear histories. This is even more reason to open the lines of communication about internet use at an early age.
Use Parental Controls
3. Know your parental controls
Innocent searches online can lead to not-so-innocent results. So it’s wise to know how to use the parental controls/search restrictions offered by web browsers, internet service provider and devices. For example, the SafeSearch Filters feature on Google will block sites with explicit sexual material. To turn it on, go to Settings/SafeSearch Filters. Although not 100 per cent accurate, parental controls can help prevent your child from seeing and accessing most violent or sexual material. See https://www.internetmatters.org/parental-controls/. Paid for security tools and features will offer extra protection and control.
4. Know your children’s online friends
As adults, we know that some people online aren’t who they say they are. But children and teens can be alarming naïve about who they are chatting with. Especially if they are not taught to be cyber wise from an early age.
Make sure you become friends with contacts within your child’s social media circles and ensure you monitor posts. Your children may resist but tell them that is one of the conditions for you to allow them access.
5. Be ‘share aware’ to protect your privacy
If your child is a regular user of social networks, they must be aware of the risk of personal information or images being made public once they post it. While they won’t fully understand the consequences of revealing personal information online, you should teach them to be cautious and thoughtful about what they post and share. Encourage your children to ask themselves before posting anything if the information (i.e. name, phone number, home address, email, name of school) or photo is something they would give a stranger. If the answer is no, don’t post it.
If your child is sharing photos or posts online ask your child to let you see what they are sharing or ask an older sibling to check any photos before they’re shared.
6. Keep control of your family’s digital footprint
Every picture and personal detail that is posted and shared on social media and the internet contributes to someone’s digital footprint. The big risk with this is that once information is shared publicly, it can be used in ways you may not expect and cannot control. You should also assume that anything that is put online is permanent (it can sometimes be deleted but not always before others have seen it and saved it). For this reason, children and teens need to be smart about protecting their images and information. The same goes for parents who regularly post pictures of their children’s online.
Teach your child to stay in control of their digital footprint, by only sharing with people who they know and trust. Rather than posting to all their friends on social media, encourage them to be selective and use the privacy settings on the social media platforms they use.
Don’t Disclose Locations
7. Teach your children to keep their location private
Most apps, networks and devices have geo-tagging features which make your whereabouts public and can lead someone directly to you. These features should be turned off for obvious privacy and safety reasons. Digital photos also contain metadata (information about the time, date and GPS coordinates) which may reveal more then you want to. Some social media platforms automatically hide or remove this data, but not all, so do your homework and know how much info you’re sharing.
8. Keep track of online time
Set a time limit for daily screen time. It’s important to monitor your child’s online time, particularly younger children, to ensure they do not develop bad habits. Get your children to agree on a period of time, say 30 minutes per session, and set a timer to go off—don’t forget to make this a non-negotiable finish time. You could also switch off the home Wi-Fi at a set time each night (ideally before bedtime) so everyone has some ‘time-out’ from the internet. A good practice is to try making some days ‘screen-free’ in your home to encourage everyone to pursue other more active and/or less technology-driven ways to entertain themselves.
9. Be #SocialNetworkSavvy
Educate yourself on ways to be safe on social networks so that you can give the best advice to your children. Sign up to the social networks and apps your children are using and find out how to use the privacy settings and reporting mechanisms. Talk about how they can stay safe on social networks, including talking to a trusted person when they are worried, and being aware of what constitutes online bullying – both as a perpetrator and a victim.
If your child uses social networks, be sure they know how to:
- Report inappropriate and/or offensive posts
- Block someone
- Keep information private.
Be the Model for Your Kids
10. Lead by example
Lead by example and always model the kind of positive online behavior you would like your children to use. If they see you being cautious and respectable when you are online, they are more likely to follow in your footsteps. And, yes, this includes limiting your own screen time.
Finally, you don’t want to instill fear in your child or prevent them from experiencing the many educational, entertainment, social and other benefits of the internet, but rather to assist them in maximizing its benefits and avoid its dangers. You can accomplish this while still keeping your children safe online.
Content provided by By Laura Easterbrook, Child Protection and Forensic Medical Service

Your Credit Report: Know Your Most important Number
The recent cyberattack on the Oregon Department of Motor Vehicles and other agencies is a good reminder of the importance of monitoring your credit report.
Checking your report is more than knowing your credit standing, it can show any recent purchase activity made with your credit. Noticing unauthorized activity and acting quickly can make it easier to recover if you are ever a victim of identity fraud.
How to access your credit report
You can get your credit report from several sources or buy it from one of the three major credit reporting agencies. You can also take advantage of Mid Oregon’s free, secure option Credit Savvy in Digital Banking. When you enroll, you will receive anytime, anywhere access to your credit score, as well as key information from your credit report. You can also sign up for emails to alert you to changes to your credit report.
In the age of increased identity fraud, there’s never been a more crucial time to pay attention to your credit report.
More about the Oregon DMV breach
Stickley on Security. According to the U.S. Cybersecurity and Infrastructure Security Agency (CISA), several U.S. federal government agencies, including the Oregon DMV, have fallen victim to a global cyberattack involving MOVEit software.
MOVEit is a file-transfer software developed by Progress Software Corporation. It is widely used by organizations for secure and managed file transfers. It provides a reliable and controlled method of transferring files both within an organization and between different entities. It offers encryption and advanced security features to protect files in transit. Recently, a zero-day vulnerability against MOVEit file transfer software was discovered. Government agencies were ordered to immediately apply the patch released by the developer.

It remains uncertain whether the hackers responsible for breaching these federal agencies are affiliated with the Russian-speaking ransomware group known as Clop, which has claimed responsibility for numerous other victims in their hacking campaigns. Notably, this includes a recent attack against a third-party agency providing human resources services to the British Broadcasting Corporation (BBC) and British Airways.
While several agencies, such as the Transportation Security Administration (TSA) and the State Department, denied being victims of this particular attack, the incident contributes to an increasing number of victims affected by an extensive hacking campaign initiated recently. Other targets have included major U.S. universities, including the University of Georgia system, as well as various state governments.
As with all ransomware attacks, the attackers set a deadline for victims to contact them regarding ransom payment at less than a week from the date of the attack. Per the usual tactics, after the deadline for the payment expires, they claim they will disclose additional alleged victims on their dark web extortion site. And as usual, anyone who receives a ransomware note should not pay the ransom. Criminals in general are not known to stand by their word and it’s likely they will disclose the information whether they get payment or not.
In addition, make regular backups of any important data that may be vulnerable and keep those copies out of reach, meaning off the network. Test them once in a while too, to make sure they are ready to go in case you need them. You’ll be happy if you do.
This latest hacking campaign underscores the widespread impact that a single software vulnerability can have when exploited by skilled criminals. It is crucial to update any outdated software versions on systems and devices. For products that are no longer supported, such as Microsoft Internet Explorer, users should transition to a supported version. Once developers end support for a product, they no longer create patches to address such vulnerabilities.
For more information: Read Fraud or Stickley on Security Articles, explore Mid Oregon’s Security and Fraud Center, visit the FTC’s Identity Theft Information Webpage

Tips to keep your grocery budget lean
Have you ever been surprised by your grocery bill after checking out? Whether it’s inflation, that buy-one-get-one-half-off deal, or the bright, shiny packaging displayed so cleverly— it’s easy to let our grocery bill get too big if we’re not careful.
According to the Bureau of Economic Analysis, Oregon’s yearly average per-capita grocery expenditure is $4,104. This translates to $342 per month/per person (or $1,368 for a family of four) depending on your appetites and where in the state you live. This can be a significant amount of money for many households already struggling to make ends meet.
Spending money on food is non-negotiable—we have to eat, but there are ways to keep that expense under control.
Figure out how much you can reasonably spend on food
Financial advisors suggest spending no more than 10% of your income after taxes on food. That includes the supermarket as well as restaurants. If you want actual figures worked out for you, check out the USDA’s website for food plans based on averages for four levels: thrifty, low-cost, moderate, and liberal plans.
Make a shopping list
There are many grocery shopping apps available. Find one that fits your needs. These help you create digital shopping lists, including some that offer digital coupons. If you prefer going old school, make your list with a pen and paper and post the list on a board in your kitchen. As you run low on items, put them on your list. Then, when it’s time to shop, stick to that list and try to avoid impulse buying.
Use reward programs
If you use a major retailer, the store will likely have a store reward program. Make sure you sign up for it to get store discounts and coupons. The store may even have its own shopping app.
Use your Mid Oregon VISA Rewards points
With the Mid Oregon Everyday Rewards VISA you receive a point for every $1 and double points for gas and groceries: $1,000 gas/groceries = 2,000 points; $500 miscellaneous purchases = 500 points. Total of 2,500 points = $25 in prepaid gift cards or cash!
Consider ordering online
Not only does it save you a trip inside a store, it also keeps a running total of your expenses before you check out. If you go over your shopping limit, you simply take certain items off your list to bring down your total. Ordering online can also lessen impulse buying.
Track your food spending habits
Keeping tabs on your purchases can help keep you on budget. Mid Oregon offers a Financial Wellness widget in Digital Banking providing an accurate snapshot of your finances. Your transactions are automatically categorized allowing you to stay on top of your spending and budget. See how much and where you spend, giving you control of your finances and access at a glance.

Buy only what you need
Avoid buying anything simply because you have a coupon or because the store offers a bulk discount. If you can’t eat 2 bags of salad greens in a week, a “buy one get one 50% off” offer will simply fill your garbage can with wasted food. Another rule of thumb is not to go to the store on an empty stomach—even that canned cheeseburger (yes, it’s a thing) looks good when you’re hungry.
By following the tips above and making smart decisions, you can reduce your food spending. Keeping your food expenses under control is easy with a little planning. The digital tools available makes this even easier. The hardest part will be controlling your impulse to reach for a sweet treat before checking out, and for that, you’re on your own.