{"id":22395,"date":"2017-10-12T10:50:53","date_gmt":"2017-10-12T16:50:53","guid":{"rendered":"https://www.webroot.com/blog/?p=22395"},"modified":"2023-10-10T09:42:26","modified_gmt":"2023-10-10T15:42:26","slug":"raising-cyber-savvy-kids","status":"publish","type":"post","link":"https://www.webroot.com/blog/2017\/10\/12\/raising-cyber-savvy-kids\/","title":{"rendered":"Raising Cyber Savvy Kids"},"content":{"rendered":"<p>Over the last year, a handful of cyberattacks have made news headlines and affected families. High-tech toy maker <a href=\"http:\/\/www.huffingtonpost.com\/entry\/cloudpet-hack-recordings-messages_us_58b4aef0e4b0a8a9b7857b45\">Spiral Toys<\/a> was the victim of a particularly cunning hacking scheme. The maker of CloudPets stuffed animals reportedly exposed more than two million private voice recordings and the login credentials of 800,000 accounts. While these \u201csmart toys\u201d are part of a wave of internet-connected devices providing fun and memorable experiences, they are also exposing millions of users to cyber threats. These toys may appear harmless on the surface, but their vulnerability to attack should be kept top-of-mind by any parent.<\/p>\n<h2>Educate your family<\/h2>\n<p>One of the best ways to ensure your children maintain a safe online presence is to start the conversation around the potential risks they face in our increasingly connected world early on.<\/p>\n<p>When it comes to online safety, the U.S. Department of Homeland Security recommends looking for \u201cteachable moments\u201d that arise naturally during day-to-day computer use. For example, if you get a phishing message, show it to your kids so they can identify similar messages in the future and recognize they are not always what they seem.<\/p>\n<p>BBC <a href=\"http:\/\/www.bbc.com\/news\/technology-32067158\">reported<\/a> that \u201cchildren aged five to 16 spend an average of six and a half hours a day in front of a screen compared with around three hours in 1995, according to market research firm Childwise.\u201d With the amount of time kids and teens spend in front of a computer screen daily, and with hacking and cybercriminals becoming more advanced and sophisticated, it\u2019s more important than ever to teach kids how to be cyber savvy.<\/p>\n<blockquote><p>One of the best ways to ensure your children maintain a safe online presence is to start the conversation around the potential risks they face in our increasingly connected world early on.<\/p><\/blockquote>\n<h2>Tips for your cyber savvy kids<\/h2>\n<p>In addition to using tools like Webroot\u2019s Parental Controls, CISO Gary Hayslip summarizes a few safety tips:<\/p>\n<ul>\n<li>Don&#8217;t give out financial account numbers, Social Security numbers, or other personal identity information unless you know exactly who&#8217;s receiving it.<\/li>\n<li>Remember to also protect other people\u2019s information as you would your own.<\/li>\n<li>Never send personal or confidential information via email or instant messages as these can be easily intercepted.<\/li>\n<\/ul>\n<p>Find <a href=\"https:\/\/www.webroot.com\/us\/en\/home\/landing\/cyberaware\">more tips<\/a> to keep your family safe online, wherever they connect.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Over the last year, a handful of cyberattacks have made news headlines and affected families. High-tech toy maker Spiral Toys was the victim of a particularly cunning hacking scheme. The maker of CloudPets stuffed animals reportedly exposed more than two million private voice recordings and the login credentials of 800,000 accounts. While these \u201csmart toys\u201d [&hellip;]<\/p>\n","protected":false},"author":90,"featured_media":22397,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[2985],"tags":[],"yst_prominent_words":[3597,3579,3571,3605,3587,3575,3607,3589,3577,3603,3585,3593,3581,3573,3609,3599,3601,3591,3583,3595],"acf":[],"_links":{"self":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/22395"}],"collection":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/users\/90"}],"replies":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/comments?post=22395"}],"version-history":[{"count":4,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/22395\/revisions"}],"predecessor-version":[{"id":32089,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/22395\/revisions\/32089"}],"wp:featuredmedia":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media\/22397"}],"wp:attachment":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media?parent=22395"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/categories?post=22395"},{"taxonomy":"post_tag","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/tags?post=22395"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/yst_prominent_words?post=22395"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}