Let’s Not Let Cyber Dangers Eat Our Young

BY:

Children Internet SafetyYour 7th grader used the family computer this evening for homework. You are a diligent parent and take all the precautions you can to keep your child safe from predators, online bullies and hackers. The computer monitor is always in plain sight and you subscribe to a service that monitors your child’s online activity.

During the homework session, your child receives an interesting looking e-mail from a classmate. The e-mail says something like, “Hey! Look at these great photos of The Bieb at his last concert! They are radical! Take a look and tell me what you think.”

The photos have innocent looking .jpg file extensions, but they are booby-trapped executable files that take your child to a site somewhere in the Ukraine, whereupon your family computer and all its data – everything – becomes the latest victim ofransomware.

Social Engineers End-run Safeguards–Time for Another Talk

The foregoing scenario is a classic example of how hackers look for vulnerable targets in seeking victims, stealing identities and bilking millions of dollars from private citizens and businesses. You may have taken the precaution of installing the best virus protection software, but your child became a victim of an end-run through a social engineering hack.

You’ve had the talk with your child about online predators and never disclosing personal information on line. It’s now time for a second talk on cybersecurity with overtones of protection against social engineering. Before you do, read up on the basics and the threats. This security tip by the United States Computer Emergency Readiness Team is a good starting point.

What to talk about

Here are 3 points you can cover in protecting your child from social engineering:

1. Always be suspicious. A healthy skepticism and awareness of common tricks (phishing, etc.) will overcome curiosity. Caution your child to never click on a link in an e-mail, even if it is from a friend.

2. Repeat this: never give out any confidential or personal information. Remind your child that no website or commercial service will ever solicit personal information, user names, or passwords unless the user is actually logging in. That “Log in here” link in the fake e-mail will likely lead to an equally fake landing page.

3. Don’t use the same password for every website. Likewise, go for strong passwords that are easy to remember, but hard to guess. Click on over to this piece by ConnectSafely.com on devising effective passwords.

Smartphones are everywhere, but security awareness isn’t.

Finally, remember that with the proliferation of smartphones, our children consume technology at an unprecedented rate. They just tap their screen and go web surfing with little or no regard to security awareness and with scant training to guide their behavior.

When out and about with their heads bowed and thumbs working on those smartphone screens, they need to be reminded that:

  • Their phones are part of a family network and could be a doorway to trouble. The smartphone, tablet, laptop and desktop devices that the family owns are interconnected. For example, a smartphone can be one way to breach a home alarm system.
  • A simple screen lock could be a lifesaver if the child loses or misplaces the smartphone or tablet.

The Worldwide Web and the information age are now older than most children who are becoming increasingly tech-savvy, but are not necessarily security conscious. Parents need to take on the role of senior and experienced net denizens. Children, after all, tend to display the sincerest form of flattery to their parents: youngsters imitate good example.

And now a word from our sponsor…

{company} is the trusted choice when it comes to staying ahead of the latest information technology tips, tricks, and news. Contact us at {phone} or send us an email at {email} for more information.

Related Blogs

  • AI-Driven Customer Service Chatbots: Enhancing Customer Experience & Business Efficiency

    What’s All the Fuss about AI-Driven Customer Service Chatbots? Using AI technology, customers can interact with chatbots via phone, email, text, or social media. AI-driven chatbots offer answers to...

    Learn More
  • Elevating Customer Experiences: Unleashing AWS Conversational AI in Contact Centers

    Learn what Conversational AI is and how you can benefit from it. Traditional first-tier customer service support has moved to AI. Why? Because AI offers conversational interfaces that act and...

    Learn More
  • Artificial Intelligence and Multi-Channel Contact Centers: The Future of Customer Service

    AI Innovation and Multichannel Contact Centers  Multi-channel contact centers offer better service by allowing customers to choose their communication preferences. Customers are no longer forced to...

    Learn More