{"id":40,"date":"2021-10-20T06:36:27","date_gmt":"2021-10-20T06:36:27","guid":{"rendered":"https:\/\/cybersecurityinfocus.com\/?p=40"},"modified":"2021-10-20T06:36:27","modified_gmt":"2021-10-20T06:36:27","slug":"recommendations-for-parents-about-cyber-bullying","status":"publish","type":"post","link":"https:\/\/cybersecurityinfocus.com\/?p=40","title":{"rendered":"Recommendations for Parents about Cyber Bullying"},"content":{"rendered":"<p>Here are some dedicated tips for keeping younger children safe online. One of these training tips goes into the risks of young children on the Internet, covers cyber bullying and other risky Internet behavior.<\/p>\n<p><strong>Here are the suggestions parents should take into account regarding kids online.<\/strong><\/p>\n<p>\u2022 Talk with your kids about online safety and the dangers of communicating with strangers.<\/p>\n<p>\u2022 Put the computer your children use in a public part of your house so you can supervise their Internet access. Act immediately if they seem to be hiding something from you.<\/p>\n<p>\u2022 Limit children\u2019s Internet access to a set amount of time each day, with a regular schedule.<\/p>\n<p>\u2022 Teach them never to use their real name, address or school name for an avatar.<\/p>\n<p>\u2022 Teach them never to agree to meet someone in the real world whom they met online, and to tell you immediately if someone wants to meet them in the real world.<\/p>\n<p>\u2022 Set up an account on sites your child visits, and \u2018friend\u2019 your child. Become a positive part of their online world.<\/p>\n<p>\u2022 Switch \u2018open chat\u2019 off until you are sure your child is mature enough to use it appropriately.<\/p>\n<p><strong>Parents and teens should be aware of the ways older teens can get in serious trouble on the Internet<\/strong><\/p>\n<p>\u2022 Downloading movies or music illegally.<\/p>\n<p>\u2022 Visiting porn sites that put malware on your computer.<\/p>\n<p>\u2022 Engaging in cyber bullying.<\/p>\n<p>\u2022 Sexting (sending and receiving inappropriate pictures).<\/p>\n<p>\u2022 Posting inappropriate pictures of themselves or others on social media sites.<\/p>\n<p>\u2022 Getting involved with online hate sites.<\/p>\n<p>\u2022 Becoming part of an online \u2018hacktivists\u2019 group to attack public websites. Your PC is not anonymous and can be tracked.<\/p>\n<p>\u2022 Experimenting with illegal hacking. It may start as just a challenge, but it\u2019s a way teens can get in very serious trouble.<\/p>\n<p><strong>Technical tips for parents<\/strong><\/p>\n<p>\u2022 Kids should use a separate computer. They tend to download carelessly, and infect that computer with malware.<\/p>\n<p>\u2022 We suggest that you use a parental control software product and monitoring software like eBlaster from SpectorSoft to help protect children online.<\/p>\n<p>\u2022 Computers use a service called DNS to link your web browser to Internet sites. We recommend OpenDNS, a free DNS provider that creates an extra security filter that scans the Internet for inappropriate sites, and has built-in parental controls.<\/p>","protected":false},"excerpt":{"rendered":"<p>Here are some dedicated tips for keeping younger children safe online. One of these training tips goes into the risks of young children on the Internet, covers cyber bullying and other risky Internet behavior. Here are the suggestions parents should take into account regarding kids online. \u2022 Talk with your kids about online safety and [&hellip;]<\/p>\n","protected":false},"author":0,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-40","post","type-post","status-publish","format-standard","hentry","category-blog"],"_links":{"self":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/40"}],"collection":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=40"}],"version-history":[{"count":0,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/40\/revisions"}],"wp:attachment":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=40"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=40"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=40"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}