{"id":184,"date":"2020-02-11T06:16:33","date_gmt":"2020-02-11T06:16:33","guid":{"rendered":"https:\/\/www.itminister.co.uk\/blog\/?p=184"},"modified":"2020-02-11T06:16:33","modified_gmt":"2020-02-11T06:16:33","slug":"keeping-children-safe-online","status":"publish","type":"post","link":"https:\/\/www.itminister.co.uk\/blog\/keeping-children-safe-online\/","title":{"rendered":"Keeping Children Safe Online"},"content":{"rendered":"\n<p><strong>What unique risks are associated with children?<\/strong><\/p>\n\n\n\n<p>When a\nchild is using your computer, normal safeguards and security practices may not\nbe sufficient. Children present additional challenges because of their natural\ncharacteristics: innocence, curiosity, desire for independence, and fear of\npunishment. You need to consider these characteristics when determining how to\nprotect your data and the child.<\/p>\n\n\n\n<p>You may\nthink that because the child is only playing a game, or researching a term\npaper, or typing a homework assignment, they can&#8217;t cause any harm. But what if,\nwhen saving their paper, the child deletes a necessary program file? Or what if\nthey unintentionally visit a malicious web page that infects your computer with\na virus? These are just two possible scenarios. Mistakes happen, but children\nmay not realize what they&#8217;ve done or may not tell you what happened because\nthey&#8217;re afraid of getting punished.<\/p>\n\n\n\n<p>Online predators present another significant threat, particularly to children. Because the nature of the internet is so anonymous, it is easy for people to misrepresent themselves and manipulate or trick other users. Adults often fall victim to these ploys, and children, who are usually much more open and trusting, are even easier targets. Another growing problem is cyberbullying. These threats are even greater if a child has access to email or instant messaging programs, visits chat rooms, and\/or uses social networking sites. <a href=\"https:\/\/www.us-cert.gov\/ncas\/tips\/ST05-002\">Read more<\/a> to find out what you can do to help<\/p>\n\n\n\n<p>iTM covers all aspects of cybersecurity from Home cyber security managed  solutions to automated, manage threat intelligence, forensic  investigations and cyber security training. Our objective is to support  organisations and consumers at every step of their cyber maturity  journey.<a href=\"https:\/\/www.itminister.co.uk\/contact.html\"> Contact Us<\/a> <\/p>\n","protected":false},"excerpt":{"rendered":"<p>What unique risks are associated with children? When a child is using your computer, normal safeguards and security practices may not be sufficient. Children present additional challenges because of their natural characteristics: innocence, curiosity, desire for independence, and fear of punishment. You need to consider these characteristics when determining how to protect your data and &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/www.itminister.co.uk\/blog\/keeping-children-safe-online\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Keeping Children Safe Online&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","beyondwords_generate_audio":"","beyondwords_integration_method":"","beyondwords_project_id":"","beyondwords_content_id":"","beyondwords_preview_token":"","beyondwords_player_content":"","beyondwords_player_style":"","beyondwords_language_code":"","beyondwords_language_id":"","beyondwords_title_voice_id":"","beyondwords_body_voice_id":"","beyondwords_summary_voice_id":"","beyondwords_error_message":"","beyondwords_disabled":"","beyondwords_delete_content":"","beyondwords_podcast_id":"","beyondwords_hash":"","publish_post_to_speechkit":"","speechkit_hash":"","speechkit_generate_audio":"","speechkit_project_id":"","speechkit_podcast_id":"","speechkit_error_message":"","speechkit_disabled":"","speechkit_access_key":"","speechkit_error":"","speechkit_info":"","speechkit_response":"","speechkit_retries":"","speechkit_status":"","speechkit_updated_at":"","_speechkit_link":"","_speechkit_text":""},"categories":[9],"tags":[],"class_list":["post-184","post","type-post","status-publish","format-standard","hentry","category-training"],"_links":{"self":[{"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/posts\/184","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=184"}],"version-history":[{"count":1,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/posts\/184\/revisions"}],"predecessor-version":[{"id":185,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/posts\/184\/revisions\/185"}],"wp:attachment":[{"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=184"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=184"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=184"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}