How to Keep Your Kids Safe from Devices (and Vice Versa)

How to Keep Your Kids Safe from Devices (and Vice Versa)

It is no secret that kids these days have more access to technology than any generation before them. While this access can truly help to enrich their lives if leveraged properly, it can also have serious ramifications if it isn’t checked.

Many apps that are available on the various app stores out there are simply inappropriate for children to interact with, and many can leave them vulnerable to criminal acts.

Therefore, as they use their mobile devices, it is important that the adults in their life step in and create some common-sense boundaries. Here, we’ll go over some problematic apps that should probably be avoided, and some means of ensuring that these common-sense boundaries are enforced.

Apps to Watch Out For
There are a variety of applications that can prove problematic if children utilize them, for numerous reasons. Obviously, there are the dangers of anonymous, randomized chat and video applications, like Omegle, and their capability to connect children with predatory adults. Even Omegle has acknowledged this, their homepage itself cautioning users to “be careful” for exactly this reason.

Another app, Yubo (formerly known as Yellow), is supposed to be a friend-making application, using a Tinder-like swipe interface to connect teens. However, not only can this app be used as a means to misrepresent oneself, the Tinder-like interface also allows it to be used like Tinder. Worse, also like Tinder, this application bases its results on the user’s location, allowing for relatively simple real-life meetings.

Sarahah was originally intended to be an app that could be used to provide anonymous feedback and encouragement in the workplace. However, it was quickly adopted as a means for cyberbullying, and proved to be so effective that it was pulled from app stores - but not necessarily deleted from devices.

There are other examples as well - for instance, the application Vora was meant to assist those who were practicing intermittent fasting to track their time but was quickly adopted by teens who have anorexia and other eating disorders. Other apps are also commonly used by the “pro-ana” audience, including MyFitnessPal and Carrot Fit (which, if comparing a “carrot” to the “stick” approach, ironically uses more of a “stick” approach to dieting).

Even popular sites like Reddit can easily become an issue when kids are involved. There are plenty of subreddits dedicated to materials that are by no means appropriate for children, including pornography. While the app does state that users must be 18 years of age or older, there is no built-in means of preventing someone younger from confirming that.

In addition to these issues, many apps are little more than just delivery systems for malware and other problems.

What You Can Do
If you have a child or teen in your life that you are responsible for, there are a few different approaches you can take to protect them from this access.

Talk to Them
Yeah, it’s a cliché, but sometimes the most effective way to get through to a kid is to have a frank and honest discussion with them. Discussing some best practices about computer safety and making sure they know that many apps can’t be trusted might just be enough to get them to pay closer attention to what they are doing.

Set Controls
While it is important to trust, it is also important to eliminate temptation as much as possible. As a result, Google has incorporated a few safeguards that parents and guardians have the option to choose from.

The Google Play Store contains media of all kinds, from applications, books, and video content. On a child’s device, a guardian can set limits on Play Store app downloads. By accessing the Play Store, and from there, the hamburger menu (the three horizontal lines at the top left), and then Settings. Under User controls, you will find the Parental controls option. Switching this option on will prompt you to create a PIN and confirm it. After this has been completed, you can set your preferred age restrictions for which content can be downloaded. Make sure you hit Save before exiting out.

Windows 10 also allows you to create a specialized account for a child you are responsible for, which allows you to check in on their recent activities or schedule the amount of time they are permitted to use the device each day. Furthermore, you can restrict the content they are able to access and require every purchase (except those made with gift cards) from the Microsoft Store to receive your stamp of approval before proceeding.

To create this account, click on Settings > Accounts > Family and other people > Add a family member > Add a child. You can then either set up an account with an email address, or it the child doesn’t have an email address of their own, follow the appropriate link and create the account through the Setup Wizard.

Use Family Link
Family Link is an application that allows a parent or guardian an added level of management over a child’s device. It provides the capability to block certain apps and require permission for any downloads from the Play Store to complete, set screen time limits for the device, and manage settings on Google Search and YouTube Kids. Guardians can also use Family Link to remotely lock a child’s device and locate them as necessary.

If you implement a BYOD policy at work, make sure you also discuss the prospect of your child using the device with management. After all, you wouldn’t want an inquisitive kid somehow getting into company documents and messing them up.

Just like you can protect your kids’ use of devices at home, BNMC can protect your use of devices in the workplace. Reach out to learn more by calling 978-482-2020.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, December 10 2018

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Technology Email Cloud Privacy Malware Network Security Hackers Business Computing Business User Tips Software Internet Microsoft Google Computer Tech Term IT Services Mobile Devices Hosted Solutions Efficiency Ransomware Smartphone Small Business Communication Managed IT Services Productivity Android IT Support Backup Data Hardware Data Recovery Windows 10 Cloud Computing Browser Windows Innovation Internet of Things Data Management Saving Money Business Continuity Microsoft Office Productivity Cybersecurity Workplace Tips Data Backup Managed IT Services Business Management App Gmail Artificial Intelligence Word Disaster Recovery Encryption Passwords Windows 10 Server Facebook Upgrade Remote Monitoring Office 365 Outsourced IT Network BYOD Money IT Support Employer-Employee Relationship Smartphones Chrome Applications Mobile Device Managed Service Provider Tip of the week Phishing Infrastructure Vulnerability Analytics communications Website Government Office Tips Maintenance IT Management Data storage Managed Service Big Data VoIP Settings Save Money Robot Google Drive Content Filtering Bandwidth Users Miscellaneous Antivirus Company Culture YouTube Risk Management Social Media Firewall VPN SaaS Access Control Development Data Security Holiday Business Technology Laptop Server Management Virtual Private Network The Internet of Things Employee-Employer Relationship Touchscreen Quick Tips HIPAA Wireless Alert Spam Computing Display Outlook WiFi Mobile Security Operating System Information LiFi Paperless Office Hosted Solution Vendor Management Monitors Administration Two-factor Authentication Business Intelligence Mouse Avoiding Downtime Scam Automation Unified Threat Management Data loss End of Support Telephone Systems Education Apple Virtual Reality desktop Storage Managing Stress Collaboration Password Dark Web Spying Star Wars Legal Network Management Buisness Chatbots eWaste Virtual Desktop Analysis Nanotechnology Unified Communications Drones Wi-Fi Sports Human Error Wearable Technology Network upgrade Windows 8 Writing Cyber Monday Motherboard Cables Uninterrupted Power Supply Alerts USB Document Management Spyware Hacker Computers Legislation File Sharing Mobile Device Management Microsoft Excel Fraud Cost Management Computer Care IBM Deep Learning Dark Data Update SharePoint Identity Continuity Smart Technology Screen Reader Charging Solid State Drive Techology Device Smart Office Retail Managed IT Wires How To Politics Lenovo LED Licensing Dongle Identity Theft Alt Codes Statistics Tablet Mail Merge Blockchain Cybercrime PowerPoint Assessment Training Corporate Profile Bring Your Own Device Customer Service Downloads Downtime Solar Office Samsung Shortcut Distributed Denial of Service Smart Tech Hard Disk Drive Budget VoIP Unified Threat Management Marketing Mobility Work Automobile Social Router Voice over Internet Protocol Dell Information Technology Firefox Tech Support Superfish Gadgets Co-Managed IT Cooperation Service Level Agreement Typing Humor Bluetooth Comparison Cabling Current Events Address Permissions Onboarding Hotspot Internet Exlporer WannaCry Best Practice Chromebook Compliance Social Engineering Patch Management Managed IT Service Slack Connectivity User Error IT Technicians Optimization Google Maps Modem FinTech Apps Customer Relationship Management Websites Halloween Content Staff Leominster Cryptocurrency Specifications IT solutions Going Green Digital Signage Language Value Google Docs Heating/Cooling Multi-Factor Security Regulations Hacks Safety Break Fix Monitoring IoT Time Management Printer Mirgation Recycling Cookies MSP Google Wallet Networking Scary Stories Streaming Augmented Reality K-12 Schools Digital Payment Bitcoin Remote Computing Search Black Friday Social Networking Disaster Printing Emergency Running Cable Troubleshooting Computing Infrastructure Professional Services Digital Business Growth Network Congestion Servers Google Calendar Cleaning CCTV Machine Learning Processors Webcam Unsupported Software Printers Virtualization Computer Repair Relocation Error BDR Point of Sale Ben McDonald shares Mobile Data Travel Mobile Computing How To Work/Life Balance Recovery Regulation G Suite Health Private Cloud Supercomputer CrashOverride Black Market Motion Sickness Law Enforcement Staffing Notifications Taxes Electronic Medical Records Print Toner Administrator Web Server what was your? Physical Security IT Budget Twitter Upgrades Gadget GPS Emoji Crowdsourcing IT Consultant Cameras Personal Information Botnet Meetings 3D Printing Tracking Cortana

What Our Clients Say

  • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
  • 1
  • 2
  • 3