BNMC Blog

How to Keep Your Kids Safe from Devices (and Vice Versa)

How to Keep Your Kids Safe from Devices (and Vice Versa)

It is no secret that kids these days have more access to technology than any generation before them. While this access can truly help to enrich their lives if leveraged properly, it can also have serious ramifications if it isn’t checked.

Many apps that are available on the various app stores out there are simply inappropriate for children to interact with, and many can leave them vulnerable to criminal acts.

Therefore, as they use their mobile devices, it is important that the adults in their life step in and create some common-sense boundaries. Here, we’ll go over some problematic apps that should probably be avoided, and some means of ensuring that these common-sense boundaries are enforced.

Apps to Watch Out For
There are a variety of applications that can prove problematic if children utilize them, for numerous reasons. Obviously, there are the dangers of anonymous, randomized chat and video applications, like Omegle, and their capability to connect children with predatory adults. Even Omegle has acknowledged this, their homepage itself cautioning users to “be careful” for exactly this reason.

Another app, Yubo (formerly known as Yellow), is supposed to be a friend-making application, using a Tinder-like swipe interface to connect teens. However, not only can this app be used as a means to misrepresent oneself, the Tinder-like interface also allows it to be used like Tinder. Worse, also like Tinder, this application bases its results on the user’s location, allowing for relatively simple real-life meetings.

Sarahah was originally intended to be an app that could be used to provide anonymous feedback and encouragement in the workplace. However, it was quickly adopted as a means for cyberbullying, and proved to be so effective that it was pulled from app stores - but not necessarily deleted from devices.

There are other examples as well - for instance, the application Vora was meant to assist those who were practicing intermittent fasting to track their time but was quickly adopted by teens who have anorexia and other eating disorders. Other apps are also commonly used by the “pro-ana” audience, including MyFitnessPal and Carrot Fit (which, if comparing a “carrot” to the “stick” approach, ironically uses more of a “stick” approach to dieting).

Even popular sites like Reddit can easily become an issue when kids are involved. There are plenty of subreddits dedicated to materials that are by no means appropriate for children, including pornography. While the app does state that users must be 18 years of age or older, there is no built-in means of preventing someone younger from confirming that.

In addition to these issues, many apps are little more than just delivery systems for malware and other problems.

What You Can Do
If you have a child or teen in your life that you are responsible for, there are a few different approaches you can take to protect them from this access.

Talk to Them
Yeah, it’s a cliché, but sometimes the most effective way to get through to a kid is to have a frank and honest discussion with them. Discussing some best practices about computer safety and making sure they know that many apps can’t be trusted might just be enough to get them to pay closer attention to what they are doing.

Set Controls
While it is important to trust, it is also important to eliminate temptation as much as possible. As a result, Google has incorporated a few safeguards that parents and guardians have the option to choose from.

The Google Play Store contains media of all kinds, from applications, books, and video content. On a child’s device, a guardian can set limits on Play Store app downloads. By accessing the Play Store, and from there, the hamburger menu (the three horizontal lines at the top left), and then Settings. Under User controls, you will find the Parental controls option. Switching this option on will prompt you to create a PIN and confirm it. After this has been completed, you can set your preferred age restrictions for which content can be downloaded. Make sure you hit Save before exiting out.

Windows 10 also allows you to create a specialized account for a child you are responsible for, which allows you to check in on their recent activities or schedule the amount of time they are permitted to use the device each day. Furthermore, you can restrict the content they are able to access and require every purchase (except those made with gift cards) from the Microsoft Store to receive your stamp of approval before proceeding.

To create this account, click on Settings > Accounts > Family and other people > Add a family member > Add a child. You can then either set up an account with an email address, or it the child doesn’t have an email address of their own, follow the appropriate link and create the account through the Setup Wizard.

Use Family Link
Family Link is an application that allows a parent or guardian an added level of management over a child’s device. It provides the capability to block certain apps and require permission for any downloads from the Play Store to complete, set screen time limits for the device, and manage settings on Google Search and YouTube Kids. Guardians can also use Family Link to remotely lock a child’s device and locate them as necessary.

If you implement a BYOD policy at work, make sure you also discuss the prospect of your child using the device with management. After all, you wouldn’t want an inquisitive kid somehow getting into company documents and messing them up.

Just like you can protect your kids’ use of devices at home, BNMC can protect your use of devices in the workplace. Reach out to learn more by calling 978-482-2020.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, February 17 2019

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Technology Email Cloud Privacy Business Computing Malware Network Security Hackers Productivity Tech Term Google Software User Tips Business Computer Internet Microsoft Mobile Devices IT Services Hosted Solutions Efficiency Communication Ransomware Small Business Hardware Smartphone IT Support Android Data Innovation Managed IT Services Backup Saving Money Business Continuity Cloud Computing Browser Windows 10 Data Recovery Windows Internet of Things Data Management Managed IT Services Workplace Tips Data Backup Cybersecurity Productivity Microsoft Office Server Business Management App Vulnerability Remote Monitoring Disaster Recovery Mobile Device Encryption Office 365 Passwords Facebook Upgrade Phishing Windows 10 Word Outsourced IT Artificial Intelligence Gmail Website Network Employer-Employee Relationship Money IT Support Applications VoIP Smartphones Chrome BYOD Managed Service Provider Infrastructure Analytics Users communications Tip of the week Information Office Tips Data storage Automation Virtual Reality Access Control Router Big Data IT Management Paperless Office Government Google Drive Settings Content Filtering Bandwidth Company Culture Employee-Employer Relationship Miscellaneous Managed Service Display Maintenance YouTube Antivirus Save Money Social Media Robot Risk Management Hacker Wireless HIPAA Networking End of Support Laptop Mobile Security Computing The Internet of Things VPN Outlook Spam Operating System Data Security WiFi Server Management LiFi Business Technology SaaS Business Intelligence Hosted Solution Virtual Private Network Downtime Touchscreen Holiday Quick Tips Computers Administration Tablet Mouse Gadgets Data loss Unified Threat Management Telephone Systems Retail Alert desktop Apple Education Managing Stress Storage Firewall Two-factor Authentication Development Vendor Management Avoiding Downtime Monitors Printing Document Management Scam Social Engineering Software as a Service Unified Communications Drones Computer Care Running Cable IBM Fraud Cost Management Onboarding Windows 8 File Sharing Identity Continuity Heating/Cooling Multi-Factor Security Solid State Drive Screen Reader Charging Break Fix Slack Websites Buisness Smart Office Time Management Printer Print Toner Wires Search Black Friday Deep Learning Identity Theft Sports Licensing Dongle Content Mobile Device Management Virtual Desktop Safety Training Corporate Profile Assessment Emergency Digital Signage Solar Servers Google Calendar G Suite Hard Disk Drive Smart Tech Dark Web Monitoring Alt Codes Automobile Work Network Management Remote Computing Shortcuts Voice over Internet Protocol Cyber Monday Bring Your Own Device Cooperation Service Level Agreement Network Congestion Streaming Dell Legislation Budget WannaCry Hotspot Internet Exlporer Troubleshooting Social Cabling Compliance Information Technology Cybercrime Connectivity Microsoft Excel Wi-Fi Spying Typing Humor Google Maps IT Technicians Optimization SharePoint Writing Security Cameras Modem FinTech Managed IT Smart Technology Analysis Best Practice Marketing Staff Leominster Techology Virtualization Human Error Current Events Statistics Language Value How To Lenovo Dark Data Update Regulations Apps IoT Mail Merge Blockchain Cryptocurrency Mirgation Recycling Downloads Managed Services Cookies MSP Shortcut Distributed Denial of Service Politics Google Docs Digital Payment Augmented Reality K-12 Schools VoIP Unified Threat Management Device IT solutions Going Green Bluetooth Comparison Halloween Digital Computing Infrastructure Professional Services Firefox Superfish Customer Service LED Hacks Disaster Social Networking Google Wallet Star Wars Address Permissions PowerPoint Bitcoin Collaboration Chatbots eWaste Office Samsung Laptops Nanotechnology Patch Management Managed IT Service Tech Support Business Growth Wearable Technology Network upgrade User Error Mobility Specifications Legal Scary Stories Spyware Alerts USB Customer Relationship Management Chromebook Co-Managed IT Password Uninterrupted Power Supply Motherboard Cables Notifications Electronic Medical Records Physical Security Error Twitter BDR Upgrades Gadget Emoji Point of Sale Ben McDonald shares Crowdsourcing Entertainment Travel Regulation Personal Information Botnet 3D Printing Supercomputer CrashOverride Cortana Mobile Computing Staffing Motion Sickness Taxes Machine Learning Administrator Processors Unsupported Software IT Budget Web Server what was your? GPS Printers IT Consultant Computer Repair Relocation Cameras Mobile Data How To Work/Life Balance Tracking Recovery Meetings Cleaning Health Private Cloud CCTV Black Market Law Enforcement Webcam

What Our Clients Say

  • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
  • 1
  • 2
  • 3