Home Tech News Recommendations to prevent children from falling into internet traps during vacations

Recommendations to prevent children from falling into internet traps during vacations

Recommendations to prevent children from falling into internet traps during vacations
Safety recommendations for children to use technology carefully.

All users are exposed and minors are a target that cybercriminals continually look for as they are an influential public. So as parents there must be help for the children so that they can navigate in a safe environment.

Table of Contents

Create a good password

A safe key is the start of good security practices. cybersecurity. It is important to explain to minors that having a good password will allow all the accounts they have to be well protected and that continually modifying them is the ideal complement to avoid losing information, such as a profile in a video game and all its content.

One recommendation is not to use a single word to create a password, but to implement short phrases. In this way, different characters are combined and a long key is generated, difficult to detect.

“Phrase-format passwords consist of multiple words. And although they include different types of characters and are long, they are not so long and complex that you cannot memorize them. Something like ‘HarryPotterY5DinoNuggies!’ it is much better than, say, ‘cherry’”, he assures Camilo Gutierrez Amayahead of the Research Laboratory of ESET Latin America.

Along with this, it is important to make it clear that the key is not shared with anyone and that there is an option called two-step authentication that gives much more security to the accounts.

It may interest you:

Safety recommendations for children to use technology carefully.
Safety recommendations for children to use technology carefully.

Personal information

The value of personal data is not always taking into account, much less the risk involved in giving it away. It is essential to explain to minors that this information can never fall into the hands of strangers or even friends, because they can also be vulnerable. The information is personal and no one else can know it.

Do not open links sent by third parties, give access permissions to the cell phone that exceed the personal limits and always verify each received content. For this, good communication between both parties is key so that there is trust and the children tell their parents about the situation.

The value of the data

Closely linked to the above is the recognition of what personal information means. That they understand why they should take care of it, since companies can access a lot of data, even with simple posts on social media or comments to make profiles of and there to create legal or illegal databases.

Safety recommendations for children to use technology carefully.
Safety recommendations for children to use technology carefully.

be careful when sharing

Borrowing devices between friends is an option when playing games or watching videos, but this practice can mean an attack option for cybercriminals. That is why you should never share your cell phone with a stranger and in case of sharing it with a stranger, parents must be vigilant.

Risks with strangers

This is one of the biggest concerns for parents. Just as minors are told that they should not receive anything from a stranger on the street or get into a strange car, they should also be made clear that there are many people on the internet who will seek to harm them.

Hiding this problem will only make them more vulnerable, because they will not have the knowledge to assume a situation or understand that there is a risk nearby. It is also essential to explain to them what cyberbullying and grooming mean, which is when an adult contacts them hiding their identity.

“We always recommend not prohibiting or just controlling, because it is more effective to teach how to prevent by giving tools so that they know how to act when they have to make their own decisions,” he says. Romina Cavallomentor of Argentina Cybersecurity.

Keep reading:

Previous articleThese capsules would be used to grow food on the Moon and other planets
Next articleTop 5 Latin artists who preferred streaming platforms to show their concerts