BNMC Blog

How to Keep Your Kids Safe from Devices (and Vice Versa)

How to Keep Your Kids Safe from Devices (and Vice Versa)

It is no secret that kids these days have more access to technology than any generation before them. While this access can truly help to enrich their lives if leveraged properly, it can also have serious ramifications if it isn’t checked.

Many apps that are available on the various app stores out there are simply inappropriate for children to interact with, and many can leave them vulnerable to criminal acts.

Therefore, as they use their mobile devices, it is important that the adults in their life step in and create some common-sense boundaries. Here, we’ll go over some problematic apps that should probably be avoided, and some means of ensuring that these common-sense boundaries are enforced.

Apps to Watch Out For
There are a variety of applications that can prove problematic if children utilize them, for numerous reasons. Obviously, there are the dangers of anonymous, randomized chat and video applications, like Omegle, and their capability to connect children with predatory adults. Even Omegle has acknowledged this, their homepage itself cautioning users to “be careful” for exactly this reason.

Another app, Yubo (formerly known as Yellow), is supposed to be a friend-making application, using a Tinder-like swipe interface to connect teens. However, not only can this app be used as a means to misrepresent oneself, the Tinder-like interface also allows it to be used like Tinder. Worse, also like Tinder, this application bases its results on the user’s location, allowing for relatively simple real-life meetings.

Sarahah was originally intended to be an app that could be used to provide anonymous feedback and encouragement in the workplace. However, it was quickly adopted as a means for cyberbullying, and proved to be so effective that it was pulled from app stores - but not necessarily deleted from devices.

There are other examples as well - for instance, the application Vora was meant to assist those who were practicing intermittent fasting to track their time but was quickly adopted by teens who have anorexia and other eating disorders. Other apps are also commonly used by the “pro-ana” audience, including MyFitnessPal and Carrot Fit (which, if comparing a “carrot” to the “stick” approach, ironically uses more of a “stick” approach to dieting).

Even popular sites like Reddit can easily become an issue when kids are involved. There are plenty of subreddits dedicated to materials that are by no means appropriate for children, including pornography. While the app does state that users must be 18 years of age or older, there is no built-in means of preventing someone younger from confirming that.

In addition to these issues, many apps are little more than just delivery systems for malware and other problems.

What You Can Do
If you have a child or teen in your life that you are responsible for, there are a few different approaches you can take to protect them from this access.

Talk to Them
Yeah, it’s a cliché, but sometimes the most effective way to get through to a kid is to have a frank and honest discussion with them. Discussing some best practices about computer safety and making sure they know that many apps can’t be trusted might just be enough to get them to pay closer attention to what they are doing.

Set Controls
While it is important to trust, it is also important to eliminate temptation as much as possible. As a result, Google has incorporated a few safeguards that parents and guardians have the option to choose from.

The Google Play Store contains media of all kinds, from applications, books, and video content. On a child’s device, a guardian can set limits on Play Store app downloads. By accessing the Play Store, and from there, the hamburger menu (the three horizontal lines at the top left), and then Settings. Under User controls, you will find the Parental controls option. Switching this option on will prompt you to create a PIN and confirm it. After this has been completed, you can set your preferred age restrictions for which content can be downloaded. Make sure you hit Save before exiting out.

Windows 10 also allows you to create a specialized account for a child you are responsible for, which allows you to check in on their recent activities or schedule the amount of time they are permitted to use the device each day. Furthermore, you can restrict the content they are able to access and require every purchase (except those made with gift cards) from the Microsoft Store to receive your stamp of approval before proceeding.

To create this account, click on Settings > Accounts > Family and other people > Add a family member > Add a child. You can then either set up an account with an email address, or it the child doesn’t have an email address of their own, follow the appropriate link and create the account through the Setup Wizard.

Use Family Link
Family Link is an application that allows a parent or guardian an added level of management over a child’s device. It provides the capability to block certain apps and require permission for any downloads from the Play Store to complete, set screen time limits for the device, and manage settings on Google Search and YouTube Kids. Guardians can also use Family Link to remotely lock a child’s device and locate them as necessary.

If you implement a BYOD policy at work, make sure you also discuss the prospect of your child using the device with management. After all, you wouldn’t want an inquisitive kid somehow getting into company documents and messing them up.

Just like you can protect your kids’ use of devices at home, BNMC can protect your use of devices in the workplace. Reach out to learn more by calling 978-482-2020.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, April 20 2019

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Cloud Email Privacy Business Computing User Tips Malware Hackers Business Google Network Security Productivity Microsoft Software Tech Term Computer Hosted Solutions Communication Internet IT Services Efficiency Mobile Devices Ransomware Data Small Business Smartphone IT Support Innovation Android Workplace Tips Backup Hardware Cloud Computing Saving Money Business Continuity Data Recovery Managed IT Services Windows Browser Managed IT Services Internet of Things Data Backup Data Management Users Windows 10 Microsoft Office Business Management Windows 10 Passwords Productivity Outsourced IT Server Word Vulnerability Cybersecurity App Office 365 Smartphones Chrome Facebook Phishing Remote Monitoring Upgrade Mobile Device Social Media communications Gmail Artificial Intelligence Disaster Recovery Network Encryption VoIP IT Support Money Managed Service Tip of the week Managed Service Provider Information Save Money Employer-Employee Relationship Analytics Website Applications Infrastructure BYOD Big Data Company Culture Employee-Employer Relationship Display Settings Maintenance Robot Antivirus Google Drive Bandwidth Automation Content Filtering YouTube Miscellaneous Virtual Reality Risk Management Access Control Apple IT Management Paperless Office Office Tips Government Router Hacker Data storage Telephone Systems Retail Alert desktop Outlook Spam Computing Downtime Operating System Firewall WiFi Two-factor Authentication Managing Stress Vendor Management Avoiding Downtime Monitors Gadgets LiFi Development Document Management Scam Chromebook Hosted Solution Administration Wireless Solid State Drive Mouse Networking End of Support HIPAA VPN Mobile Security Education Hard Disk Drive Storage Data Security Business Technology SaaS Printing Server Management Virtual Private Network Touchscreen Business Intelligence Holiday Quick Tips Computers Virtualization Laptop Data loss The Internet of Things Unified Threat Management Tablet Scalability Mail Merge Blockchain Language Value Mobile Device Management Downloads Regulations Deep Learning Politics IoT Digital Payment VoIP Unified Threat Management Mirgation Recycling Managed Services Shortcut Distributed Denial of Service Cookies MSP Digital Alt Codes Firefox Superfish Customer Service Cybercrime Augmented Reality K-12 Schools Disaster Device Bluetooth Comparison Bring Your Own Device Migration Address Permissions Computing Infrastructure Professional Services Collaboration LED Office Samsung Marketing Social Networking Managed IT Service Tech Support Star Wars Social PowerPoint User Error Chatbots eWaste Budget Laptops Patch Management Nanotechnology Spyware Typing Humor Customer Relationship Management Wearable Technology Network upgrade Uninterrupted Power Supply Information Technology Mobility Specifications Best Practice Alerts USB File Sharing Current Events Co-Managed IT Heating/Cooling Multi-Factor Security Social Engineering Motherboard Cables Computer Care IBM Break Fix Websites Fraud Cost Management Onboarding Time Management Printer Halloween Identity Continuity Software as a Service Screen Reader Charging Identity Theft Cryptocurrency Slack Smart Office Apps Print Toner Search Black Friday Corporate Profile Google Docs Messaging Emergency Licensing Dongle IT solutions Going Green Content Servers Google Calendar Safety Wires Training Dark Web Assessment Automobile Hacks Digital Signage Network Management Remote Computing Scary Stories Solar G Suite Entertainment Smart Tech Bitcoin Monitoring Network Congestion Running Cable Work Dell Google Wallet Shortcuts Cyber Monday WannaCry Business Growth Employee-Employer Relationships Cooperation Service Level Agreement Cabling Streaming Legislation Buisness Voice over Internet Protocol iOS Microsoft Excel Wi-Fi Virtual Desktop Hotspot Internet Exlporer Google Maps Password Troubleshooting SharePoint Writing Sports Compliance Legal Connectivity Windows 8 Spying Techology IT Technicians Optimization Unified Communications Drones Security Cameras Managed IT Smart Technology FinTech Analysis How To Lenovo Dark Data Update Staff Leominster Human Error Statistics Modem Computer Repair Relocation Printers IT Consultant Mobile Data Cameras Tracking Recovery Meetings How To Work/Life Balance Health Private Cloud Mobile Computing Cleaning Black Market CCTV Webcam Law Enforcement Windows 7 Electronic Medical Records Notifications Physical Security Error Twitter Emoji Point of Sale Ben McDonald shares Upgrades Gadget Travel Crowdsourcing BDR Personal Information Botnet Regulation Supercomputer CrashOverride Cortana 3D Printing Staffing Motion Sickness Machine Learning Administrator Processors Taxes IT Budget Web Server what was your? Unsupported Software GPS Students

What Our Clients Say

  • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
  • 1
  • 2
  • 3