{"id":26299,"date":"2018-11-21T06:00:30","date_gmt":"2018-11-21T13:00:30","guid":{"rendered":"https://www.webroot.com/blog/?p=26299"},"modified":"2019-03-20T17:33:40","modified_gmt":"2019-03-20T23:33:40","slug":"keep-kids-safe-online","status":"publish","type":"post","link":"https://www.webroot.com/blog/2018\/11\/21\/keep-kids-safe-online\/","title":{"rendered":"How to Keep Your Kids Safe Online"},"content":{"rendered":"<p>As digital natives become more immersed in and dependent upon technology, they are likely to experience <a href=\"https:\/\/theconversation.com\/overcoming-cyber-fatigue-requires-users-to-step-up-for-security-70621\">\u201ccyber fatigue,\u201d<\/a> which can be thought of cybersecurity complacency. Paired with the invincible feeling that often accompanies being young, this can be a dangerous combination. It\u2019s easy to mistakenly believe that hacked devices and identity theft are things that only happen to adults. Kids and teenagers, however, are just as high-risk and the impacts of cybersecurity breaches could potentially affect them for years into their future. So how can we protect our kids\u2019 digital lives in the same way we protect their offline lives?<\/p>\n<h2>Frank Conversations<\/h2>\n<p>The internet may seem like a playground of endless entertainment, but we need to educate our children about the dangers that exist there as well. Have you had a friend or family member who\u2019s been hacked or somehow had important information compromised? Talk to your kids about it, how it happened, why it happened, and the work needed to fix it. These real-life examples may be one of your most powerful education tools, as they help children more concretely understand the concept of cybersecurity threats. Demonstrating that these things can happen to anyone, including them, is the quickest way to get their cybersecurity guard up. Looking for fresh ideas on how to talk to your kids about cybersecurity? Check out the <a href=\"https:\/\/community.webroot.com\/\">Webroot Community<\/a> for advice and tips.<\/p>\n<h2>Common Scams<\/h2>\n<p>Teach your children about <a href=\"https:\/\/www.webroot.com\/blog\/2017\/03\/21\/common-social-engineering-attacks\/\">the most common cybersecurity threats<\/a>, especially ones that are particularly pervasive on social media, including phishing, identity theft, and malicious websites. They should never accept private messages from people they don\u2019t know, or click on links from friends or family that seem out of character or suspect. If they aren\u2019t sure a message from a friend is actually from that individual, they should not hesitate to verify their identity by calling them, or by asking specific questions only that individual would know. The comments sections of websites like YouTube are also potential flashpoints. Clever comments can entice users into clicking on a risky link that navigates them to a malicious site.<\/p>\n<h2>Illegal Downloads<\/h2>\n<p>The temptation to download an illegal copy of a favorite movie, game, or album can be strong, but ethical and legal implications aside, it remains one of the most risky online behaviors. In fact, <a href=\"https:\/\/weis2018.econinfosec.org\/wp-content\/uploads\/sites\/5\/2018\/06\/WEIS_2018_paper_57.pdf\">a recent study<\/a> found that there was a 20% increase in malware infection rates associated with visits to infringing sites. Make sure your kids know the impact illegal downloads have on their security, and inform them of alternative streaming and download options. If you\u2019re able, give your child an allowance for services like Steam for video games, or Amazon Video for films and shows. Providing them with alternative options is the best way to keep your child from giving into the temptation of illegally torrenting content.<\/p>\n<h2>Mobile Safety<\/h2>\n<p><a href=\"https:\/\/www.telegraph.co.uk\/news\/2018\/08\/01\/decade-smartphones-now-spend-entire-day-every-week-online\/\">A recent study found<\/a> that people aged 15 to 24 spend about four hours a day on their phones. This works out to roughly 1,456 hours of mobile engagement a year, making mobile devices one of the most vulnerable entry points for cybersecurity breaches. Make sure your child\u2019s phone is protected with a pin number, password, or biometrics on the lock screen, and that they know to leave Bluetooth turned off when not in use. Connecting to public WiFi networks could also leave your child vulnerable, but you can protect their devices from open networks by <a href=\"https:\/\/www.webroot.com\/us\/en\/home\/products\/vpn-wifi-security\">securing them with a VPN<\/a>.<\/p>\n<h2>Digital Footprint<\/h2>\n<p>Many young people today use anonymous or \u201cprivate\u201d messaging services, like Whisper, Sarahah, or Snapchat, believing that they are protected by the apparent anonymity. However, cybersecurity experts have long been critical of these services, as nothing online is 100% anonymous.<\/p>\n<p>\u201cThere is no single app that is capable of providing complete anonymity,\u201d says Randy Abrams, Sr. Security Analyst at Webroot. \u201cEven though someone may think they are anonymous, our online behavior allows people to track and identify us. Apps that claim to provide anonymity often collect and sell personally identifying data left behind from internet searches.\u201d<\/p>\n<p>\u201cSome apps may offer much higher degrees of anonymity, but it takes a tremendous amount of knowledge and discipline to be anonymous,\u201d he adds. \u201cIf an app requires access to your contacts, pictures, storage, location or the ability to make and receive phone calls or SMS messages, anonymity quickly starts to disappear.\u201d<\/p>\n<p>Free applications have to make a profit somewhere, which often means that they are storing, tracking and selling user data. This is particularly dangerous as users are lulled into a false sense of security, which can quickly be shattered when <a href=\"https:\/\/bits.blogs.nytimes.com\/2014\/01\/02\/snapchat-breach-exposes-weak-security\/?_php=true&amp;_type=blogs&amp;_r=0\">these services are affected by a cybersecurity breach<\/a>. Make sure your kids know <em>nothing <\/em>they say online is truly private, and that a negative digital footprint can drastically alter the course of their lives.<\/p>\n<h2>Shared Responsibility<\/h2>\n<p>We believe cybersecurity is a shared responsibility, and that it is not just up to parents to educate digital natives. This is why we\u2019ve developed a cybersecurity awareness initiative with the <a href=\"https:\/\/aurorak12.org\/2018\/10\/19\/hack-a-thon\/\">Aurora Public School System<\/a> in Colorado. In addition to providing students with online safety tips, we\u2019ve given them insights on potential career paths, and connected them with our engineers to solve problems using skills like math and coding that could benefit them later in their careers.<\/p>\n<p>We encourage parents to explore and advocate for cybersecurity and STEM education opportunities for children in their local communities. For more educational content to help keep your family safe from cyber threats,<a href=\"https:\/\/www.webroot.com\/blog\/category\/home-mobile\/\"> visit the Home + Mobile section of our blog.<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>As digital natives become more immersed in and dependent upon technology, they are likely to experience \u201ccyber fatigue,\u201d which can be thought of cybersecurity complacency. Paired with the invincible feeling that often accompanies being young, this can be a dangerous combination. It\u2019s easy to mistakenly believe that hacked devices and identity theft are things that [&hellip;]<\/p>\n","protected":false},"author":109,"featured_media":27345,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[2985],"tags":[21939,21940,23437],"yst_prominent_words":[23581,3745,3631,23567,23569,16963,23577,23565,6301,23571,20379,23575,3715,3609,3713,23579,23563,18967,23573,23561],"acf":[],"_links":{"self":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/26299"}],"collection":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/users\/109"}],"replies":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/comments?post=26299"}],"version-history":[{"count":1,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/26299\/revisions"}],"predecessor-version":[{"id":26303,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/26299\/revisions\/26303"}],"wp:featuredmedia":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media\/27345"}],"wp:attachment":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media?parent=26299"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/categories?post=26299"},{"taxonomy":"post_tag","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/tags?post=26299"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/yst_prominent_words?post=26299"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}