What do you do when the largest CyberSecurity risk(s) for both your personal and business use(s) lives in your home? In the Tech Space, a Mobile Cloud or in a bicycle chain a network is only as strong as it weakest link. For many people that weakest link lives in your home which is your child or children. They inadvertently download viruses, create security holes by attempting to work around technology controls parents put in place and believe it or not most millenniums are more tech-savvy than their parents. In a recent survey, half (50%) of Americans with children under eighteen (18) reported that their children had breached their online security in some way. The cost of these breaches add up such as damaged computers, corrupted hard drives, loss of data and my favorite, unauthorized purchases.
This is where TechForward steps into the process to help and assist our readership. Happily, there are plenty of steps that not only will ensure your CyberSecurity but also make you as a parent a useful guide to your child or children. Here are a few Technologists Insights free of charges thanks to TechForward. One, “Assess Your Technology & Your Children”; a well behaved five years old and a rebellious fourteen year old represent radically different Cyber-Security risk(s). The younger child may accidentally bang on or damage some keys or waste some liquids in the keyboard. Your fifth grader might be tech-savvy enough to download some files or music and viruses. That fourteen year old might be the one to use your credit card to pay for the latest and greatest online game or drift into some online porn sites which are both laced with many of the more malicious viruses. Second, make sure you know exactly which machine(s), device(s) and files your children use so you are clear on what to lock down and properly secure with CyberSecurity tools. Not just their own devices; remember many of us as parents hand our own mobile devices to our children at times. Also, do not forget other Internet connected devices such as TVs, gaming consoles, eBook-Readers and set-top boxes such as Rocka or NetFlix.
Next, identify which login and passwords your child knows and determine which ones need to be adult-only. With preteens and teens a good practice is to have separate logins for all devices so you can properly track who is doing what and going where online. Another key step is to delete “Incognito” from Google Chrome because this feature allows a child to go to a website without cache which means the visited websites are not being captured in the tracking database (hope that makes sense as it was a little technical) which can be quite dangerous. Never give your child or children “administrator rights” on the computer, laptop or mobile device because once granted their login will be enabled to visit any website regardless of your setting on the computer or mobile device.
Finally, as parents assess your child and take a realistic view at your child’s demeanor, disposition, temperament and behavior if you will. Do you have a teen that is constantly testing your limits in all categories? A natural “hacker” who is always curious about what she or he can get into, break, test or reprogram? That means taking a tougher position or stance on CyberSecurity. I will leave you with this; “Is your connected car a Security Risk” for you and your company? Stay tuned for the answer.