By Harry Chenevix-Trench, Intelligence Analyst, Blackstone Consultancy It has perhaps never been harder to keep up with the blistering pace of technological change. It has also never been more necessary to do so. As increasing amounts of our life takes place online, cyber security issues have never been more pressing for relocating families.
Children particularly are uniquely placed to thrive in the digital age, their minds being plastic enough to simply adapt to the changing situation around them. Adaptability does not mean wisdom however, and parents must find a way of striking a balance between allowing children to learn and discover the joys of the online world as well as protecting them from the threats that exist. Families must also begin to learn how to protect their home from cyber security threats as these are becoming increasingly damaging.
As most modern homes rely on wireless Internet, the router is effectively the hub of all electronic data coming in and out of the house. An unsecured router can allow hostile parties to gain access to a great deal of potentially sensitive information. This can include information on devices connected to the router as well as a recording of any data that has passed through it. Should a gifted hacker target the network; a lack of security can have potentially devastating consequences with the third party able to gain access to digital desktops, webcams and some files.
Many modern homes contain advanced computer networks that integrate everything from lighting to security. Although the rise of the ‘smart home’ has led in to more comfortable (and environmentally friendly) living, greater reliance on networks can make a home vulnerable to electronic attack.
Though having all devices connected within a single security zone does promote simplicity. Any vulnerable devices operating within that zone can potentially compromise the others. For example one of the Apple TV operating systems (specifically OS 7.0.2) contained a vulnerability that provided hackers with a way into home networks. From this point of access a skilled hacker could gain access to many of the other devices linked within the same network.
To proof a home against cyber security threats you will need advanced security that combines several layers of protection with network segregation. All of this however, can be undone by simple human nature. This is because it is the users of a computer system are in fact the highest threat to its security. Many passwords that are easy to type or remember can be cracked by a dictionary-based attack in a matter of minutes (sometimes less when the attacker has access to personal information).
Although it is a well-worn truism most ignore, it is sensible to be strict when comes to password and account management. Passwords must not be sentimental; a dogs name is too easy to find out. Proud parents now often post pictures of new additions to the family and their date of birth on social media. All of these pieces of personal information can be loaded into a list of possible passwords and used to brute force access to online accounts.
Using the same password for multiple sites is also strongly discouraged. Darren Desmond, Operations Director for cyber security group Welund Horizon states that once criminals have gained access to one set of passwords they will begin ‘mapping’ other linked accounts to exploit further vulnerabilities. The use of password manager such as Dashlane or Lastpass that generates and manages high security passwords is therefore encouraged.
Children represent a unique paradigm within the cyber security space. They are simultaneously an asset that needs protecting at all costs and as well as being capable causing an enormous threat (often completely by accident). Blackstone consultants conducting investigations have often noticed that children and teens with a large online presence often give away more about their family’s lives than they think. At the same time children are often under threat online themselves from both from bullies and potential abusers.
The modern Internet is huge however; children tend to put themselves at risk through two key areas; these being social media and online video games.
Daily Beast writer Marlow Stern stated that generation Y could also be named ‘generation overshare’. Children born from 1990-2000 were the first generation that grew up alongside social media and they appear to share everything (even if they probably shouldn’t). There are a multitude of social media sites that exist that allow users to share a constant stream of content with their friends and the world. This does not even begin to count other apps such as Snapchat and WhatsApp that allow people to share images and text between groups of smart phones for free.
Social media presents a unique series of challenges for both parents and children but there are some key factors worth bearing in mind:
– Anything that is put on social media stays there forever. Although it is possible to delete pictures off of sites such as Facebook, it is impossible to know if they are truly gone or just obscured. Every photo and every phrase can therefore be recorded and dug up at a later date.
– The audience may be far larger than the one you think. Raising the privacy settings on social media profiles is a must, but perhaps more sensible is not saying or doing anything foolish on social media in the first place. Rory Cullinan, the chairman of RBS was bought down after a humiliating incident where his daughter posted pictures of him pulling a silly face in a board meeting. The picture carried that caption ‘very boring’. The Sun newspaper, which had been checking social media profiles found the pictures and the story exploded. RBS suffered major reputational damager and Cullinan lost his job.
Perhaps the most important lesson for children (and adults) to learn is this: The world of social media is not a private one. You never know who may be watching and the amount of information a skilled individual can extract from social media profile is astonishing. The solution to these problems is not for children to stop using social media but think, would my parents be pleased with what I am about to post?
Many online games carry a strong social element as part of the gameplay experience. Their content can very from pastel colored worlds of blocks to the blood soaked battlefields of the future. The threat to children from online games comes not from the game itself (although parents are recommended to obey the 15/18 certificates on games such as Grand Theft Auto). But instead from the actions of the players, abuse and bullying online are often common. Anyone wishing to test this theory need only go by a female nickname, as this will almost certainly see the player receive a torrent of sexist abuse.
Danger also comes from the ability of players to form power structures that allow them to coerce or befriend others for malign purposes such as gaining compromising images or information.
If your children do play online games, it is strongly advised to take interest.
Common safeguards include only allowing children to join online groups or clans that contain school friends. As well as teaching them not to respond to strangers who attempt to make contact with them online especially if they are trying to meet in the real world.
Cyberbullying (also called Trolling) is an affliction that has grown parallel to the rise of the Internet. Modern children are online constantly and therefore it is logical to suggest that their tormentors are the same. Cyberbullying is so dangerous and unpleasant precisely because of how pervasive it is. Pre Internet a child could go home, shut the door and escape their bullies but in the modern age it is not so easy. The online and connected nature of modern technology means that like Mephistopheles in Faust, hell travels with them. A child’s detractors are constantly there, watching and judging every aspect of their lives. Adult bewilderment of the situation can lead to feelings of depression and isolation, especially when the only solution given is to just turn everything off.
Although the morality of using technology to effectively ‘spy’ on your children is a subject of intense debate, It is true that is such technology is very effective (especially when used with consent). We believe that parents can use technology to monitor social media as a way of dispensing guidance and advice rather than censoring action. With regards to cyber bullying, technology can help parents detect potentially serious problems that they may previously have been unaware of and report them to the appropriate authorities.
www.blackstoneconsultancy.com