With the start of the school year just around the corner, most parents are frantically looking for the various uniform items, stationery products, and digital devices that their children and young adults will need for their studies. But one extremely important area that can be overlooked is how to keep students safe online in their daily lives. It’s not that parents don’t care, quite the opposite, it’s just that it can be difficult to know what threats are out there and how to protect yourself from them.
All Gen is a company that has been at the forefront of protecting the digital aspects of life for decades, through brands like Norton and Avast, and here are some of its practical tips for ensuring your children don’t fall victim to the darker elements lurking online.
Young people spend a lot of their lives online on social media apps like TikTok and Snapchat. It can be incredibly distressing when these accounts are hacked and used to post nasty messages or send direct messages to people in their contacts. This type of tactic can also be used to bully a child, with their public profile used to support things they oppose or to cause problems for friends or classmates if rude or suggestive messages are sent in their name. Worse still, once in an account, hackers can change the password so the child can no longer access it.
Password protection is essential to stop this phenomenon, as children can tend to use the same passwords for all sites, meaning that if someone can obtain one, then they have complete control over the child’s digital profile.
This can be avoided by teaching them to use different account information for their apps, never sharing this information with anyone, setting up multi-factor authentication, installing antivirus software to prevent malware attacks, or using a password manager that can create unique, hard-to-hack credentials for their accounts.
If you are concerned that your child is experiencing this type of bullying behavior or other forms of cyberbullying, you can visit the National Anti-Bullying Helpline for more advice. September 2024 is Cyberbullying Awareness Month, so it’s good to know that there is help available for this serious issue.
Getty Images
Webcam hijacking
One of the most frightening techniques used by hackers is to take control of a laptop or phone’s webcam and then monitor the owner. If the device is in their bedroom, the hacker can then watch them undress and can even take pictures. These can then be used to blackmail the terrified target, or any information gathered can be used to manipulate the child or young adult.
This type of hack is usually carried out by sending phishing emails containing links that can be clicked to download malware onto the device. It is easy to fall for and can lead to very painful consequences.
Typically, you can tell if the webcam is active by the light that lights up next to the lens when it’s in use. This feature can be disabled by advanced hacking techniques, so we recommend placing a piece of electrical tape over the lens when it’s not needed. It’s also a good idea to close a laptop when not in use, as is laying phones face down. You can learn more about how to fix this in Norton’s guide How to Tell if Someone is Watching You Through Your Phone’s Camera.
VPN for Public Wi-Fi
With young people now left alone with their phones or laptops, there’s a good chance they’ll be using public Wi-Fi networks to connect to the internet. While genuine networks are usable, hackers can easily create fake ones that can then direct unwary children to versions of websites that steal their information. That’s why it’s always a good idea to use a VPN when connecting to public networks, as these encrypt all information so hackers can’t see what kids are doing.
Identity theft
Another common and frightening attack is identity theft. It can be triggered by malware that scans emails, web activity, and other documents for Social Security information or other personal data. This information is then used to create various accounts, all of which can end up ruining a young adult’s credit score, meaning they may have trouble getting student loans as they pursue college or try to rent a place to live.
Becoming a victim of identity theft can be due to factors that are completely out of your control or that of the person you’re talking to. However, it’s important to ensure that your devices are free of malware, that your images aren’t shared, and that your data is protected. If you’d like more information on how to deal with this issue, you can read Norton’s guide to identity theft.
Getty Images
How to stay on top of all threats
As you can see, protecting your child online can be a monumental task. That’s why you need to employ a range of tactics to keep them safe. In addition to the tips mentioned above, there are also a range of software solutions that can help you overcome the daunting task of fighting hackers.
Norton, the security legend, offers several packages designed specifically to prevent malware and other infiltration techniques from compromising a child’s online life. Norton 360 Deluxe includes antivirus and malware protection, a password manager, VPN, privacy monitor and parental controls that can be used on 5 devices. A back-to-school offer is available until 12 September 2024, getting your first year’s subscription for £19.99 – a saving of 33%! If you want coverage for up to 10 devices, as well as identity restoration assistance, credit alerts and wallet theft assistance, the Norton 360 Advanced package is also on sale, with the first year’s subscription down 29% to £24.99.
Avast One is another great option, which supports 3 devices and includes malware protection, a VPN, password monitoring, webcam protection, scam email warnings and many other security features. It’s also available as part of a special back-to-school deal until 12th September 2024, meaning it costs just £22.69 for the first year.
Keeping your child safe online can seem overwhelming, but by taking a few practical steps, educating them about the dangers, and getting help from specialized apps, you can help them avoid threats and enjoy all that the internet and its devices have to offer.
Table of Contents