Friday, June 27, 2025

Security Boulevard Logo

Security Boulevard

The Home of the Security Bloggers Network

Community Chats Webinars Library
  • Home
    • Cybersecurity News
    • Features
    • Industry Spotlight
    • News Releases
  • Security Creators Network
    • Latest Posts
    • Syndicate Your Blog
    • Write for Security Boulevard
  • Webinars
    • Upcoming Webinars
    • Calendar View
    • On-Demand Webinars
  • Events
    • Upcoming Events
    • On-Demand Events
  • Sponsored Content
  • Chat
    • Security Boulevard Chat
    • Marketing InSecurity Podcast
    • Techstrong.tv Podcast
    • TechstrongTV - Twitch
  • Library
  • Related Sites
    • Techstrong Group
    • Cloud Native Now
    • DevOps.com
    • Security Boulevard
    • Techstrong Research
    • Techstrong TV
    • Techstrong.tv Podcast
    • Techstrong.tv - Twitch
    • Devops Chat
    • DevOps Dozen
    • DevOps TV
  • Media Kit
  • About
  • Sponsor

  • Analytics
  • AppSec
  • CISO
  • Cloud
  • DevOps
  • GRC
  • Identity
  • Incident Response
  • IoT / ICS
  • Threats / Breaches
  • More
    • Blockchain / Digital Currencies
    • Careers
    • Cyberlaw
    • Mobile
    • Social Engineering
  • Humor
Security Bloggers Network Social Engineering 

Home » Security Bloggers Network » Child Safety on the Internet

SBN

Child Safety on the Internet

by Social-Engineer on January 16, 2024

“How do I keep my child safe on the internet?” This question is hard to answer in a few minutes because it is one that is so complex. And since this topic is so vast, let’s focus on one sector, Social Media.

Did you know that 95% of youth today report using social media? “Youth” is somewhat vague, so let’s narrow that down. Forty percent of 8 to 12-year-olds use social media, reports the 2023 Social Media and Youth Mental Health – The U.S. Surgeon General’s Advisory. Keep in mind that social media is not inherently good or bad. However, there are some things we should remember if our child or teen is active on social media today. This article will address some areas of concern, as well as dive into steps we can take to keep our kids safe on the internet.

Child Safety on the Internet

Techstrong Gang Youtube
AWS Hub

Benefits and Dangers

A quote from the previously mentioned report reads “There is broad agreement among the scientific community that social media has the potential to both benefit and harm children and adolescents.” What are some of these potential benefits and dangers? Let’s start with the obvious. Social media provides a sense of connection and community. It also gives us access to information. Additionally, it enables us to form and maintain friendships.

Although there are some positives, we also need to take a look at the negatives. According to the report, spending more than three hours a day doubles the risk of poor mental health (including anxiety and depression). In 2021, eighth and tenth grade students spent an average of 3.5 hours a day on social media. While social media does give us access to information, it can be hard to determine what is real and what is misinformation. Also, we don’t always know if the friends we or our kids meet on social media are really who they say they are. Additionally, malicious users of the internet can use social engineering techniques against our children. Clearly, we need to take action to keep our children safe on the internet. How?

TRIGGER WARNING: The following paragraphs address a topic that may be triggering for some.

Grooming

Before we get into the “how,” we need to understand the “who” and “what.” “Who” are we protecting our children from? Namely, predators. And “what” are we protecting them from? Grooming. What IS grooming? The dictionary defines grooming as “the practice of preparing or training someone for a particular purpose or activity.” Predators will use the grooming method to target and exploit their victims, and unfortunately, many of these victims are children.

To be able to combat grooming, we need to understand it. Let’s take a brief view at how it starts and ends. It starts with a predator targeting a victim. Then they will gain the trust of and information on that victim. This could be obtained by using various social engineering tactics, such as liking, mutual self-disclosure (where the information they provide is false), and sympathy or assistance themes. (To learn more about these techniques, please view the following information: Instant Rapport.) Next, the predator fills a need in the victim’s life, making themselves significant to the victim in some way. Then, they begin to isolate the victim, after which the abuse begins. They will then do everything in their power to maintain control.

By understanding the steps a predator takes to groom their victims, we are more likely to see the signs and jump in where needed. By understanding the social engineering and influence techniques that these predators use, we will be able to spot the dangerous language and actions of said predators. However, one thing is needed if we are to do this, open communication with our children.

Open Communication

Open communication has saved child after child from dangerous situations on the internet. If your child or teen feels uncomfortable with a friendship, their coming to you about it could be what protects them. Because of this, we always encourage open communication and age-appropriate discussions about the dangers of the internet and social media. This is a continuous process as your child grows up, not just one conversation. These conversations can seem daunting if you’re not sure where to start. The Innocent Lives Foundation (ILF) and The National Center for Missing & Exploited Children (NCMEC) both provide guides and free resources for parents looking to have these conversations.

The ILF recommends establishing internet use guidelines with your children. They suggest the following as a starting point:

  • A list of approved apps/websites.
  • Their device privileges are dependent upon your right to view anything on the device at anytime.
  • A list of acceptable content (What types of photos are allowed, no posting hurtful or explicit comments, appropriate types of videos or music) to post or exchange.
  • Guidelines of who they can interact with online.
  • Never share personal details such as school, phone numbers, real names or addresses with anyone online. If they know you personally, they will be able to get a hold of a verified guardian for those details.

Monitoring Your Child’s Devices

Many ask, SHOULD I monitor my child’s devices? Experts recommend yes, with some caveats. Think back to our first point, open communication. This goes two ways, from child to parent AND from parent to child. We feel that discussing AGE APPROPIATE monitoring options with your child can build trust, while monitoring in secret can do much the opposite. After that step is taken, there are some tools that you may find useful.

iKeyMonitor is one such tool that some have found success with. It allows you to monitor text messages, record phone calls, check websites visited, and track current GPS location.

Kidslox is another such app that many have found useful. This app allows you to set daily time limits and lock specific apps.

For a more in-depth look at monitoring, please read the following guide: Guide to Monitoring .

Help Young Ones Thrive

The internet can be a place where children and teens either thrive or find themselves in harm’s way. By keeping your communication open with your young one, setting clear boundaries, and monitoring their devices in an open and age-appropriate way, you can help them remain secure and safe.

Written by:
Shelby Dacko
Human Risk Analyst at Social-Engineer, LLC

*** This is a Security Bloggers Network syndicated blog from Security Through Education authored by Social-Engineer. Read the original post at: https://www.social-engineer.org/general-blog/child-safety-on-the-internet/

January 16, 2024January 16, 2024 Social-Engineer General Social Engineer Blog, keep your kids safe online, Shelby Dacko
  • ← What Is Dynamic DNS
  • GitLab Fixes Password Reset Bug That Allows Account Takeover →

Techstrong TV

Click full-screen to enable volume control
Watch latest episodes and shows

Tech Field Day Events

Upcoming Webinars

Securing Vibe Coding: Addressing the Security Challenges of AI-Generated Code
How to Spot and Stop Security Risks From Unmanaged AI Tools

Podcast

Listen to all of our podcasts

Press Releases

GoPlus's Latest Report Highlights How Blockchain Communities Are Leveraging Critical API Security Data To Mitigate Web3 Threats

GoPlus’s Latest Report Highlights How Blockchain Communities Are Leveraging Critical API Security Data To Mitigate Web3 Threats

C2A Security’s EVSec Risk Management and Automation Platform Gains Traction in Automotive Industry as Companies Seek to Efficiently Meet Regulatory Requirements

C2A Security’s EVSec Risk Management and Automation Platform Gains Traction in Automotive Industry as Companies Seek to Efficiently Meet Regulatory Requirements

Zama Raises $73M in Series A Lead by Multicoin Capital and Protocol Labs to Commercialize Fully Homomorphic Encryption

Zama Raises $73M in Series A Lead by Multicoin Capital and Protocol Labs to Commercialize Fully Homomorphic Encryption

RSM US Deploys Stellar Cyber Open XDR Platform to Secure Clients

RSM US Deploys Stellar Cyber Open XDR Platform to Secure Clients

ThreatHunter.ai Halts Hundreds of Attacks in the past 48 hours: Combating Ransomware and Nation-State Cyber Threats Head-On

ThreatHunter.ai Halts Hundreds of Attacks in the past 48 hours: Combating Ransomware and Nation-State Cyber Threats Head-On

Subscribe to our Newsletters

ThreatLocker

Most Read on the Boulevard

16 Billion Leaked Records May Not Be a New Breach, But They’re a Threat
Scattered Spider Targets Aflac, Other Insurance Companies
WhatsApp BANNED by House Security Goons — But Why?
Heightened Cyber Threat from Iran Sparks Urgent Calls for Vigilance and Mitigation
AWS Raises Expertise Bar for MSSP Partners
Will AI Replace You — or Promote You? How to Stay Ahead
JWT Security in 2025: Critical Vulnerabilities Every B2B SaaS Company Must Know
Feel Reassured with Advanced Secrets Scanning Technologies
Black Hat SEO Poisoning Search Engine Results For AI to Distribute Malware
Threat Casting a Nation State Attack on Critical Infrastructure Scenario at CognectCon2025

Industry Spotlight

WhatsApp BANNED by House Security Goons — But Why?
Application Security Cloud Security Cyberlaw Cybersecurity Data Privacy Data Security DevOps Endpoint Featured Governance, Risk & Compliance Humor Incident Response Industry Spotlight Mobile Security Most Read This Week Network Security News Popular Post Security Awareness Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight Threats & Breaches Vulnerabilities 

WhatsApp BANNED by House Security Goons — But Why?

June 24, 2025 Richi Jennings | 2 days ago 0
Scattered Spider Targets Aflac, Other Insurance Companies
Cloud Security Cybersecurity Data Privacy Data Security Featured Identity & Access Industry Spotlight Mobile Security Network Security News Security Awareness Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Social Engineering Spotlight Threat Intelligence 

Scattered Spider Targets Aflac, Other Insurance Companies

June 22, 2025 Jeffrey Burt | 4 days ago 0
US Pig Butchering Victims ‘Will’ Get Refunds — Feds Seize $225M Cryptocurrency
Analytics & Intelligence Blockchain Cyberlaw Cybersecurity Data Privacy Digital Currency Featured Governance, Risk & Compliance Humor Incident Response Industry Spotlight Mobile Security Most Read This Week Network Security News Popular Post Security Awareness Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Social Engineering Spotlight Threat Intelligence Threats & Breaches 

US Pig Butchering Victims ‘Will’ Get Refunds — Feds Seize $225M Cryptocurrency

June 20, 2025 Richi Jennings | Jun 20 0

Top Stories

N. Korean Group BlueNoroff Uses Deepfake Zoom Calls in Crypto Scams
Cloud Security Cybersecurity Data Privacy Data Security Featured Identity & Access Malware Mobile Security Network Security News Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Social Engineering Spotlight Threat Intelligence 

N. Korean Group BlueNoroff Uses Deepfake Zoom Calls in Crypto Scams

June 26, 2025 Jeffrey Burt | Yesterday 0
Fortanix Adds Dashboard to Better Prioritize Remediation Efforts for PQC Era
Cybersecurity Featured News Security Awareness Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight 

Fortanix Adds Dashboard to Better Prioritize Remediation Efforts for PQC Era

June 25, 2025 Michael Vizard | 1 day ago 0
LapDogs Campaign Shows Chinese Groups’ Growing Use of ORB Networks
Cloud Security Cybersecurity Data Privacy Data Security Endpoint Featured Malware Network Security News Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight Threat Intelligence Threats & Breaches 

LapDogs Campaign Shows Chinese Groups’ Growing Use of ORB Networks

June 25, 2025 Jeffrey Burt | 1 day ago 0

Security Humor

Randall Munroe’s XKCD ‘Interoperability’

Randall Munroe’s XKCD ‘Interoperability’

Download Free eBook

7 Must-Read eBooks for Security Professionals

Security Boulevard Logo White

DMCA

Join the Community

  • Add your blog to Security Creators Network
  • Write for Security Boulevard
  • Bloggers Meetup and Awards
  • Ask a Question
  • Email: [email protected]

Useful Links

  • About
  • Media Kit
  • Sponsor Info
  • Copyright
  • TOS
  • DMCA Compliance Statement
  • Privacy Policy

Related Sites

  • Techstrong Group
  • Cloud Native Now
  • DevOps.com
  • Digital CxO
  • Techstrong Research
  • Techstrong TV
  • Techstrong.tv Podcast
  • DevOps Chat
  • DevOps Dozen
  • DevOps TV
Powered by Techstrong Group
Copyright © 2025 Techstrong Group Inc. All rights reserved.
×