Is my child being groomed? And what to do next
It is a horrible situation to find yourself in as a parent, finding out that your child has been attacked by an online predator, manipulated, and taken advantage of.
A lot of the information that can be found out there is woefully outdated. Likewise, much of the information about protecting children from online predators is from another Internet era, before smart phones meant that the Internet, GPS and hi-definition audio/video capabilities, were right in our pockets.
In searching for statistics, what we have found (that wasn’t from a bygone era) was that online predators tend to glean a lot of information from social networking sites:
But the specific means of gleaning information is less important than the prolific, yet largely unwitting sharing of information with strangers. Predators may seek out children who are participating in attention-seeking behaviors as a way of finding connections with others. Sadly, these kids are generally the ones least likely to have a concerned adult to turn to, and less likely to report solicitation. These targeted kids may also not wish to report the behavior, as they may simply be glad for the interest and may be naive about its nature.
Tips to reduce the risk of children being victimised generally centre around monitoring and controlling their access to the Internet in an age-appropriate way. But not all solicitation happens online, so more needs to be done to prepare kids to identify the signs. For parents, it is essential to make sure that their kids know from an early age what is the appropriate information to share with others, even people who appear to be friends (as this is what predators pretend to be).
Establish rules about when to:
Let kids know it’s best to:
As older kids become eligible for membership of social networking sites, they may wish to meet in person some of the people they have met online. It is important that a parent or guardian accompanies the teen to any first meeting, to determine if it’s safe and age-appropriate.
The idea of establishing rules is not to make the child fearful of strangers, but to instill in them the ability to scrutinise the communication with a healthy sense of caution. There is a saying that is popular in the security industry: “Trust but verify”. This means not blindly accepting someone’s words at face value, but doing additional research to determine if the communication is indeed trustworthy.
We understand that some of the rules might be perceived by the teens as limiting their independence. However, good parenting (or mentoring) is about finding the balance between providing children with the tools to eventually become independent adults, and spending enough time with them that they feel loved and protected.
A parent can safely lean towards being overprotective when the children are younger and until they can understand and internalise the reasons for the rules. Teenagers and adults alike are targeted by confidence schemes and scams, so learning to avoid them and protect their privacy will serve them well throughout their life.
Establishing a good rapport and open lines of communication with kids is perhaps the most important thing you can do to protect them from predators. Social engineering relies on creating a strong feeling of fear or trust. When talking about such an important topic it’s important to maintain a non-confrontational way of communicating with your child about the issue.
ESET Parental Control for Android allows you to impose limits on your child’s online time and allows you to see what they are up to when surfing. Kids can also talk to their parents about which sites should or should not be banned and ask for extra permissions to access particular sites or point out suspicious behavior they have encountered.
If a child feels comfortable discussing their experiences with a parent, without concerns about punishment or judgment, they can verify whether questionable online communications are scams or solicitation. It is important to remember that even if your children respond positively to online predators, they are still the victims in the same way that anyone who has fallen for a scam is a victim.
*Source: InternetSafety101.org
With ESET Parental Control for Android
TRY FREE FOR 30 DAYSIt is a horrible situation to find yourself in as a parent, finding out that your child has been attacked by an online predator, manipulated, and taken advantage of.
Social media, chat rooms, instant messaging, and online games: all of these offer amazing opportunities for your kids. They can talk to their friends and have fun sharing videos and playing games. At the same time, though, they make it very easy for anyone to contact your child, be it through a message, a comment under a video, or through a game.
Throughout the year, cybercriminal activity has its highs and lows. Cybercriminals often benefit from events that enable them to reach more potential victims, and turn their malicious intentions into profit. The start of a new schoolyear is one such occasion. What types of cyberthreats can you expect to encounter as your child returns to school? And how do you respond to them?