Protecting Our Children Against Online Threats

Teaching our kids to be wary online

Chesley Brown E-Brief May 2018

CB-Seal-White-250

From Chesley Brown International

Risk Management

Cyber bullying and cyber-predators are real online threats to our children.

 

We have heard these threats broadcast on the news.  Children are sometimes mocked on social media and characters within the online games can be verbally attacked while playing. Cyber-predators take advantage of the trusting innocence of children in attempts to lure them into unsafe encounters.

The best protection is to be able to talk to your children about what is happening in their lives and online.

These are not the only online dangers faced by children today. Their trusting nature and their adept command of technology presents new dangers seemingly innocent to them.

Discuss public boundaries with your kids. Teach them to avoid clicking on emails or texts from strangers.

Children can easily fall for scams or post private information without realizing the depth of the threat, or the longevity of the post.

Children are vulnerable because they have not yet learned to be wary.

Malware can be accidentally downloaded. A child can easily be misled into responding to phishing schemes with the promise of something “free”.

If it sounds too good to be true, then it probably is. Teach your children to be leery of online offers.

What Can We do?

We can teach them not to communicate with people they don’t know.

If you choose to purchase a phone for your child, apply restrictions and restriction codes immediately. Check the phone periodically. Configure the phone to prompt or alert you when an attempt to download a restricted app occurs.

We can use virus-protection programs to protect computers from phishing and malware.

In a world where kids are more adept at new technology than adults, it behooves us learn about potential threats, and signs of bullying and abuse, to better protect our children.

 

Always be prepared. Sign up for our Mailing List

Get expert insight and analysis delivered directly to your inbox.

  • This field is for validation purposes and should be left unchanged.

How Can We Help?

Contact us today to discuss how Chesley Brown can help navigate your organization navigate around ever-evolving threats, and mitigate your risk.

Meet our Experts

Kim Meador

Executive VP & COO
(888) 711-7644 | Email

Josh Noland

VP of Operations
(888) 711-7644 | Email

Max Briggs

VP of Operations
(888) 711-7644 | Email

Latest Security Updates

risk-takers #1 The Aldrich Ames Espionage Case

Dell Spry, a former FBI investigator and counterespionage expert, sits down to discuss the biggest case of insider theft in U.S. History: The Aldrich Ames Case. Hear how he, along with the help of the CIA, and the fellow FBI agents used their cunning, hard work, and old fashioned investigative work to capture and convict most infamous CIA officer-turned traitor: Aldrich Hazan "Rick" Ames. Beginning in 1985 the CIA experienced the unparalleled loss of its of Soviet assets, which nearly destroyed the government's ability to gather intelligence on the Soviet Union. In this interview Mr. Spry discusses his personal involvement in the case as the FBI's lead investigator including many of the investigative methods they used. Hear never before details about the harrowing investigation to not only investigate and convict the highest ranking government official ever accused of spying, but to protect future Russian assets. In 1991, the quest led them to search for a Soviet spy in the CIA. They came to identify that spy as CIA Case Officer, Aldrich Hazan "Rick" Ames, a long-time CIA case officer and analyst. In February of 1994, Ames was arrested by the FBI and sentenced to life in prison.
Read More

risk-takers #2 Terry Fisher — Electronic Countermeasures

Have you ever stopped to ask yourself what it is about your business that is truly valuable? When you really think about it, any business with a product or service has something a competitor or adversary could use. And if you're being honest, you probably haven't fully considered all the ways they might get their hands on that information. You've spent years building your business, but all it takes is one bad day to compromise that dream. In this week's episode Brent sits down with FBI Special Agent (Ret.) and engineer Terry Fisher to discuss corporate espionage, electronic countermeasures (sweeps), bugging, and the common methods bad actors have used throughout history to gain access to proprietary information.
Read More

SIGN UP FOR EXCLUSIVE INSIGHTS

Get the latest Chesley Brown insights and strategies directly in your inbox.

Sign Up Form Inline

  • This field is for validation purposes and should be left unchanged.