Protecting Our Children Against Online Threats

Teaching our kids to be wary online

Chesley Brown E-Brief May 2018


Warning: file_get_contents(https://efzcsfrbk8x.exactdn.com/wp-content/uploads/2017/12/CB-Seal-White-250.png): failed to open stream: HTTP request failed! HTTP/1.1 404 Not Found in /home/chesle6/public_html/wp-includes/class-wp-image-editor-imagick.php on line 156

From Chesley Brown International

Risk Management

[dpArticleShare]

Cyber bullying and cyber-predators are real online threats to our children.

 

We have heard these threats broadcast on the news.  Children are sometimes mocked on social media and characters within the online games can be verbally attacked while playing. Cyber-predators take advantage of the trusting innocence of children in attempts to lure them into unsafe encounters.

The best protection is to be able to talk to your children about what is happening in their lives and online.

These are not the only online dangers faced by children today. Their trusting nature and their adept command of technology presents new dangers seemingly innocent to them.

Discuss public boundaries with your kids. Teach them to avoid clicking on emails or texts from strangers.

Children can easily fall for scams or post private information without realizing the depth of the threat, or the longevity of the post.

Children are vulnerable because they have not yet learned to be wary.

Malware can be accidentally downloaded. A child can easily be misled into responding to phishing schemes with the promise of something “free”.

If it sounds too good to be true, then it probably is. Teach your children to be leery of online offers.

What Can We do?

We can teach them not to communicate with people they don’t know.

If you choose to purchase a phone for your child, apply restrictions and restriction codes immediately. Check the phone periodically. Configure the phone to prompt or alert you when an attempt to download a restricted app occurs.

We can use virus-protection programs to protect computers from phishing and malware.

In a world where kids are more adept at new technology than adults, it behooves us learn about potential threats, and signs of bullying and abuse, to better protect our children.

 

Always be prepared. Sign up for our Mailing List

Get expert insight and analysis delivered directly to your inbox.

  • This field is for validation purposes and should be left unchanged.

How Can We Help?

Contact us today to discuss how Chesley Brown can help navigate your organization navigate around ever-evolving threats, and mitigate your risk.

Meet our Experts

Kim Meador

Executive VP & COO
(888) 711-7644 | Email

Josh Noland

VP of Operations
(888) 711-7644 | Email

Max Briggs

VP of Operations
(888) 711-7644 | Email

Latest Security Updates

Crisis communication in action standing near a firetruck. Emergency safety. Protection, rescue from danger.

Building a Crisis Communication Strategy: Effective Communication During Emergencies

Written by: James Hart During a crisis, good communication can save lives. That’s especially true for larger office buildings.  Some properties hold thousands of people during a typical workday. If there’s a fire, an active shooter or some other emergency, the building staff and security must be able to quickly alert everyone and tell them…
Read More
de-escalation training: An image of a young woman at the center of a crowd feeling overwhelmed practicing de-escalation techniques

Effective De-escalation Techniques: Conflict Resolution Strategies

Written by: James Hart If your job requires you to talk to other human beings, then you could probably benefit from de-escalation training.  De-escalation is a conflict resolution strategy where security officers or other front-line workers use dialogue to calm angry individuals, understand their problems and persuade them to choose a better course of action.…
Read More

SIGN UP FOR EXCLUSIVE INSIGHTS

Get the latest Chesley Brown insights and strategies directly in your inbox.

Sign Up Form Inline

  • This field is for validation purposes and should be left unchanged.