In this time of uncertainty and doubt we should be taking extra steps to ensure our family members are practicing safe Internet security practices.
There has been a marked increase in online cyber security attacks over the past several months. Most are aimed at individuals that are often times working remotely or from a home office. Individuals are easier targets when they are not in their usually corporate office space.
Working remotely creates some specific disadvantages regarding endpoint and data protection. Here are a few recommendations you can apply to reduce online security risks for you, your family and your organization’s intellectual property.
Set aside time to discuss your family’s online behavior. Remind them of the following online best practices:
2. Endpoint Security
We would highly encourage you to purchase or enable existing security software designed to protect your laptop, desktop and mobile devices. Now more than ever, we should all make sure we don’t introduce potential malware, viruses, etc. onto our home and corporate owned PC’s.
If you are one of the lucky ones to own a corporate owned and maintained device, make sure you are getting all of the same updates and levels of security protection while working remotely.
If you own your own device(s) make sure you have up-to-date virus protection software that provides email, Internet and local file protection. Check to see if the subscription on your endpoint security application has expired.
3. Google yourself
If you’ve never done it, you should take a few minutes to perform a few simple checks about your own online identity(s). Most people have more than 1 email address. Most people also have more than 10 online subscriptions. In a perfect world you would use separate login ID’s and passwords for all of the online services that you subscribe to. Unfortunately, this is typically not the case. Most of us are guilty of re-using the same login ID and password combination over and over. If this sounds familiar, you may want to run a few self-diagnostics on your identities. Start with the simple email account check to see if any of the services you use have been breached.
Have I Been Pwned: https://haveibeenpwned.com/
If you get some bad news, you may want to re-read item #1 above (Back to Basics)
4. Knowledge is Power
Read up on current threats. Find local resources to help you. In my resident state of Michigan, experts will come out to schools or local community groups to educate students and parents on cybersecurity risks and challenges. You don’t need to be a security expert to know there are many more online threats today than ever before. Educating yourself is one of the best things you can do. Here are a few good sites to visit for insightful information regarding the current threat landscape on the Internet.
5. Be a watchful parent
In most cases, kids understand today’s technologies better than their parents. They are growing up fast, and they know how to get around controls. At the same time, understand that bad actors have infiltrated social media and apps, even those – especially those – that cater to minors. They are master manipulators, and they are everywhere.
Unfortunately we are all a bit more sheltered than we would like so we all need to become experts on mobile devices. Both Apple and Android phones have some great resources that you can use yourself to ensure you and your family are as secure as possible when using mobile devices.
Learn how to put the right settings in place. Turn off all adult content. For younger children, only allow text. No more Snapchat – you can hide anything. Get extra controls from applications such as Bark or SaferKid.
6. Know your own network
More of us are working from our home offices than ever before. A large portion of home networks are very simple. If you’re like most people you have a “box” somewhere in the house that magically connects you and your family to the Internet. Some of the more sophisticated users will have separate routers, firewalls and switches throughout the house. In any case, you cannot afford to overlook the security holes that may already be present. Take time to perform some of the following basic maintenance tasks:
7. Speaking of Cameras
Consider putting a physical block in front of the camera lens. Adapters and even some masking tape can do the trick. Be selective on which applications you allow to access to your computers’ microphones or your cameras.
8. Clean house
Do a thorough review of your laptop, desktop and phone and get rid of anything you aren’t currently using. Bad actors can find their way into apps you are not actively using or monitoring.
9. Use apps that allow you to monitor their social contact
Many apps exist that allow you to forward all your kids’ texts to you, or to see across all their social media. This is extremely helpful to detect bullying, inappropriate sexual contact or other dangerous situations, or manipulative cyber behavior that your kids may not yet recognize or have not told you about.
These apps allow you to limit, restrict or block access to certain apps, contacts, texts, calls or ads. Many of these apps also have location controls so you always know where your kids are. Here are some examples:
Teen Safe https://teensafe.com/
Kidgy Parental Control App https://kidgy.com/
10. Talk to your kids
To protect our kids from the darker truths, it is important to educate them to recognize danger and know what to do if they face scary situations.
Educate your kids on what is appropriate and what is not, and why. People can abuse children remotely. Explain to your kids what can happen. Pedophiles are manipulative; it’s up to you as parents to learn about these threats and put your kids in the safest position possible.