Let’s Not Let Cyber Dangers Eat Our Young


Children Internet SafetyYour 7th grader used the family computer this evening for homework. You are a diligent parent and take all the precautions you can to keep your child safe from predators, online bullies and hackers. The computer monitor is always in plain sight and you subscribe to a service that monitors your child’s online activity.

During the homework session, your child receives an interesting looking e-mail from a classmate. The e-mail says something like, “Hey! Look at these great photos of The Bieb at his last concert! They are radical! Take a look and tell me what you think.”

The photos have innocent looking .jpg file extensions, but they are booby-trapped executable files that take your child to a site somewhere in the Ukraine, whereupon your family computer and all its data – everything – becomes the latest victim ofransomware.

Social Engineers End-run Safeguards–Time for Another Talk

The foregoing scenario is a classic example of how hackers look for vulnerable targets in seeking victims, stealing identities and bilking millions of dollars from private citizens and businesses. You may have taken the precaution of installing the best virus protection software, but your child became a victim of an end-run through a social engineering hack.

You’ve had the talk with your child about online predators and never disclosing personal information on line. It’s now time for a second talk on cybersecurity with overtones of protection against social engineering. Before you do, read up on the basics and the threats. This security tip by the United States Computer Emergency Readiness Team is a good starting point.

What to talk about

Here are 3 points you can cover in protecting your child from social engineering:

1. Always be suspicious. A healthy skepticism and awareness of common tricks (phishing, etc.) will overcome curiosity. Caution your child to never click on a link in an e-mail, even if it is from a friend.

2. Repeat this: never give out any confidential or personal information. Remind your child that no website or commercial service will ever solicit personal information, user names, or passwords unless the user is actually logging in. That “Log in here” link in the fake e-mail will likely lead to an equally fake landing page.

3. Don’t use the same password for every website. Likewise, go for strong passwords that are easy to remember, but hard to guess. Click on over to this piece by ConnectSafely.com on devising effective passwords.

Smartphones are everywhere, but security awareness isn’t.

Finally, remember that with the proliferation of smartphones, our children consume technology at an unprecedented rate. They just tap their screen and go web surfing with little or no regard to security awareness and with scant training to guide their behavior.

When out and about with their heads bowed and thumbs working on those smartphone screens, they need to be reminded that:

  • Their phones are part of a family network and could be a doorway to trouble. The smartphone, tablet, laptop and desktop devices that the family owns are interconnected. For example, a smartphone can be one way to breach a home alarm system.
  • A simple screen lock could be a lifesaver if the child loses or misplaces the smartphone or tablet.

The Worldwide Web and the information age are now older than most children who are becoming increasingly tech-savvy, but are not necessarily security conscious. Parents need to take on the role of senior and experienced net denizens. Children, after all, tend to display the sincerest form of flattery to their parents: youngsters imitate good example.

And now a word from our sponsor…

{company} is the trusted choice when it comes to staying ahead of the latest information technology tips, tricks, and news. Contact us at {phone} or send us an email at {email} for more information.

Related Blogs

  • Cloud Migration Strategies for Mitigating Security Risks

    Cloud migration security strategies  Data is a valuable business asset, making it a prime target for thieves and malicious cyber actors (MCAs). The attraction of MCAs to the cloud is simply the...

    Learn More
  • How Higher Education Call Centers Match Student Needs Today

    Today’s college and university students have been raised with evolving technology and have high expectations that include personalized and efficient services from their educational institutions....

    Learn More
  • Evolving Threats, Emerging Solutions: Exploring Trends in Managed Security Services

    Trends in managed security services The managed security services industry is experiencing rapid growth due to the rise in the number of complex cybersecurity threats. The expansion of the threat...

    Learn More