Protecting Our Children Against Online Threats

Teaching our kids to be wary online

Chesley Brown E-Brief May 2018

CB-Seal-White-250

From Chesley Brown International

Risk Management

Cyber bullying and cyber-predators are real online threats to our children.

 

We have heard these threats broadcast on the news.  Children are sometimes mocked on social media and characters within the online games can be verbally attacked while playing. Cyber-predators take advantage of the trusting innocence of children in attempts to lure them into unsafe encounters.

The best protection is to be able to talk to your children about what is happening in their lives and online.

These are not the only online dangers faced by children today. Their trusting nature and their adept command of technology presents new dangers seemingly innocent to them.

Discuss public boundaries with your kids. Teach them to avoid clicking on emails or texts from strangers.

Children can easily fall for scams or post private information without realizing the depth of the threat, or the longevity of the post.

Children are vulnerable because they have not yet learned to be wary.

Malware can be accidentally downloaded. A child can easily be misled into responding to phishing schemes with the promise of something “free”.

If it sounds too good to be true, then it probably is. Teach your children to be leery of online offers.

What Can We do?

We can teach them not to communicate with people they don’t know.

If you choose to purchase a phone for your child, apply restrictions and restriction codes immediately. Check the phone periodically. Configure the phone to prompt or alert you when an attempt to download a restricted app occurs.

We can use virus-protection programs to protect computers from phishing and malware.

In a world where kids are more adept at new technology than adults, it behooves us learn about potential threats, and signs of bullying and abuse, to better protect our children.

 

Always be prepared. Sign up for our Mailing List

Get expert insight and analysis delivered directly to your inbox.

  • This field is for validation purposes and should be left unchanged.

How Can We Help?

Contact us today to discuss how Chesley Brown can help navigate your organization navigate around ever-evolving threats, and mitigate your risk.

Meet our Experts

Kim Meador

Executive VP & COO
(888) 711-7644 | Email

Josh Noland

VP of Operations
(888) 711-7644 | Email

Max Briggs

VP of Operations
(888) 711-7644 | Email

Latest Security Updates

risk-takers #2 Terry Fisher — Electronic Countermeasures

Have you ever stopped to ask yourself what it is about your business that is truly valuable? When you really think about it, any business with a product or service has something a competitor or adversary could use. And if you're being honest, you probably haven't fully considered all the ways they might get their hands on that information. You've spent years building your business, but all it takes is one bad day to compromise that dream. In this week's episode Brent sits down with FBI Special Agent (Ret.) and engineer Terry Fisher to discuss corporate espionage, electronic countermeasures (sweeps), bugging, and the common methods bad actors have used throughout history to gain access to proprietary information.
Read More

risk-takers #3 Surveillance Detection Routes (SDR)

Have you ever had a gut feeling you were being followed? You might not be so crazy after all. It's a frightening thought. You've spent years building your business, but all it takes is one bad day to compromise that dream. In this week's episode Brent sits down with FBI Special Agent (Ret.) Dell Spry to discuss surveillance detection routes, what they are, and how they can be used as a spy detector device to find out if you are under surveillance.
Read More

SIGN UP FOR EXCLUSIVE INSIGHTS

Get the latest Chesley Brown insights and strategies directly in your inbox.

Sign Up Form Inline

  • This field is for validation purposes and should be left unchanged.