{"id":11715,"date":"2013-05-30T07:58:43","date_gmt":"2013-05-30T14:58:43","guid":{"rendered":"http:\/\/www.intego.com\/mac-security-blog\/?p=11715"},"modified":"2015-05-18T12:25:15","modified_gmt":"2015-05-18T19:25:15","slug":"5-tips-for-protecting-your-child-online","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/5-tips-for-protecting-your-child-online\/","title":{"rendered":"5 Tips for Protecting Your Child Online"},"content":{"rendered":"<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/Family1.jpg\"><img loading=\"lazy\" class=\"aligncenter size-full wp-image-14643\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/Family1.jpg\" alt=\"Family\" width=\"600\" height=\"399\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/Family1.jpg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/Family1-150x99.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/Family1-300x199.jpg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/a><\/p>\n<p>We all know the stereotype: If you want your computer fixed, ask the nearest kid. But that doesn\u2019t mean children understand how to use those devices safely; that knowledge may be only enough to make them dangerous. What can a parent do to keep both the family machine and its users safe?<\/p>\n<p>Security tips are security tips, regardless of age, but the level and type of communication and monitoring will depend on the kids\u2019 age. If you\u2019re reading this blog, you probably already know that <a title=\"Mac antivirus and Security - Mac Internet Security X8\" href=\"https:\/\/www.intego.com\/antivirus-internet-security-x8\" target=\"_blank\">anti-virus\u00a0and firewall software<\/a> are a must-have, as these are crucial to keeping your machine safe regardless of whether a child uses your machine. But here are 5 more in-depth tips, and how you can modify them by age:<\/p>\n<p><strong>1. Establish rules for safe usage<\/strong><br \/>\nThis is the one thing that will vary most depending on the age of your child. Let your child know what is acceptable online behavior \u2013 when they can use the computer, whether to ask you before opening files, etc. You can be a lot more specific and nuanced with caveats when the kid is 16 than when they\u2019re 6, and 16 year old will need access to more functions on the computer. For instance: \u201cIt\u2019s okay to download files from these specific sites, but ask me before downloading anything else\u201d &#8211; this might be a tricky concept for a kid in elementary school. With a younger child, you can take an additive approach \u2013 they can use only specific programs, for a set length of time. With an older child, let them know what things are off-limits, and at what time they are to cease use.<\/p>\n<p><strong>2. Monitor your child\u2019s activities<\/strong><br \/>\nWith a very young child, you may want to be the one directly interacting with the computer. As they are more dexterous and begin to have schoolwork that requires computer use, they will need to start taking over the interactions. You may still wish to stay physically nearby to offer assistance and to make sure they stay within appropriate boundaries. Older children still need monitoring and boundaries, but you may wish to install a program to patrol their activities.<\/p>\n<p><strong>3. Limit access<\/strong><br \/>\nThere is no reason a child needs to be able to access system files or your important data files. It\u2019s a good idea to create a separate user account with limited permissions and higher security settings for your child to use. This can help keep them from accidentally installing unwanted programs and it also has a side benefit of giving them a feeling of having their own separate space to personalize to their taste. For an extra measure of protection, you can encrypt any folders where you keep sensitive data files. This too has another benefit: It can help protect your data in the case of malware or other intrusion.<\/p>\n<p><strong>4. Implement parental controls<\/strong><br \/>\nParental controls are no longer limited to web-filtering. Programs like Intego&#8217;s\u00a0<a title=\"Mac Parental Control &amp; Security - Family Protector Secure X8 \" href=\"https:\/\/www.intego.com\/mac-parental-control-security-software\" target=\"_blank\">ContentBarrier<\/a> can be used to automate a lot of the boundaries we talk about before like enforcing time limits, specifying which applications they can use and when, as well as taking periodic screenshots.<\/p>\n<p><strong>5. Keep the lines of communication open<\/strong><br \/>\nLet kids know that whatever happens on the computer, they can come to you to talk about it. There are ways to back out of accidental deletions, remove malware, etc. It\u2019s better that you know what\u2019s happened, so that you can fix the problem quickly.<\/p>\n<p>You wouldn&#8217;t let your kid play in a busy intersection, and you shouldn&#8217;t leave your kid on the Internet unattended. It&#8217;s simple to set age-appropriate boundaries for your kids that can be modified as their abilities and needs change. Not only can it potentially protect your child, but your computer and its data as well.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>We all know the stereotype: If you want your computer fixed, ask the nearest kid. But that doesn\u2019t mean children understand how to use those devices safely; that knowledge may be only enough to make them dangerous. What can a parent do to keep both the family machine and its users safe? Security tips are [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":14673,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[10],"tags":[37,415,413,365],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"We all know the stereotype: If you want your computer fixed, ask the nearest kid. But that doesn\u2019t mean children understand how to use those devices\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/5-tips-for-protecting-your-child-online\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"5 Tips for Protecting Your Child Online - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"We all know the stereotype: If you want your computer fixed, ask the nearest kid. But that doesn\u2019t mean children understand how to use those devices\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/5-tips-for-protecting-your-child-online\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2013-05-30T14:58:43+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2015-05-18T19:25:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/Family_FT.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"266\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lysa Myers\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/5-tips-for-protecting-your-child-online\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/Family_FT.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/Family_FT.jpg\",\"width\":400,\"height\":266},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/5-tips-for-protecting-your-child-online\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/5-tips-for-protecting-your-child-online\/\",\"name\":\"5 Tips for Protecting Your Child Online - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/5-tips-for-protecting-your-child-online\/#primaryimage\"},\"datePublished\":\"2013-05-30T14:58:43+00:00\",\"dateModified\":\"2015-05-18T19:25:15+00:00\",\"description\":\"We all know the stereotype: If you want your computer fixed, ask the nearest kid. But that doesn\\u2019t mean children understand how to use those devices\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/5-tips-for-protecting-your-child-online\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/5-tips-for-protecting-your-child-online\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/5-tips-for-protecting-your-child-online\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"5 Tips for Protecting Your Child Online\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/5-tips-for-protecting-your-child-online\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/5-tips-for-protecting-your-child-online\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a\"},\"headline\":\"5 Tips for Protecting Your Child Online\",\"datePublished\":\"2013-05-30T14:58:43+00:00\",\"dateModified\":\"2015-05-18T19:25:15+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/5-tips-for-protecting-your-child-online\/#webpage\"},\"wordCount\":632,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/5-tips-for-protecting-your-child-online\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/Family_FT.jpg\",\"keywords\":[\"Children\",\"Family Protector\",\"Parental Controls\",\"Security Tips\"],\"articleSection\":[\"How To\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/5-tips-for-protecting-your-child-online\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a\",\"name\":\"Lysa Myers\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g\",\"caption\":\"Lysa Myers\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/lysam\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"We all know the stereotype: If you want your computer fixed, ask the nearest kid. But that doesn\u2019t mean children understand how to use those devices","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/5-tips-for-protecting-your-child-online\/","og_locale":"en_US","og_type":"article","og_title":"5 Tips for Protecting Your Child Online - The Mac Security Blog","og_description":"We all know the stereotype: If you want your computer fixed, ask the nearest kid. But that doesn\u2019t mean children understand how to use those devices","og_url":"https:\/\/www.intego.com\/mac-security-blog\/5-tips-for-protecting-your-child-online\/","og_site_name":"The Mac Security Blog","article_published_time":"2013-05-30T14:58:43+00:00","article_modified_time":"2015-05-18T19:25:15+00:00","og_image":[{"width":400,"height":266,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/Family_FT.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Lysa Myers","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/5-tips-for-protecting-your-child-online\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/Family_FT.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/Family_FT.jpg","width":400,"height":266},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/5-tips-for-protecting-your-child-online\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/5-tips-for-protecting-your-child-online\/","name":"5 Tips for Protecting Your Child Online - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/5-tips-for-protecting-your-child-online\/#primaryimage"},"datePublished":"2013-05-30T14:58:43+00:00","dateModified":"2015-05-18T19:25:15+00:00","description":"We all know the stereotype: If you want your computer fixed, ask the nearest kid. But that doesn\u2019t mean children understand how to use those devices","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/5-tips-for-protecting-your-child-online\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/5-tips-for-protecting-your-child-online\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/5-tips-for-protecting-your-child-online\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"5 Tips for Protecting Your Child Online"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/5-tips-for-protecting-your-child-online\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/5-tips-for-protecting-your-child-online\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a"},"headline":"5 Tips for Protecting Your Child Online","datePublished":"2013-05-30T14:58:43+00:00","dateModified":"2015-05-18T19:25:15+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/5-tips-for-protecting-your-child-online\/#webpage"},"wordCount":632,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/5-tips-for-protecting-your-child-online\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/Family_FT.jpg","keywords":["Children","Family Protector","Parental Controls","Security Tips"],"articleSection":["How To"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/5-tips-for-protecting-your-child-online\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a","name":"Lysa Myers","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g","caption":"Lysa Myers"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/lysam\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/Family_FT.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-32X","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/11715"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=11715"}],"version-history":[{"count":20,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/11715\/revisions"}],"predecessor-version":[{"id":41620,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/11715\/revisions\/41620"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/14673"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=11715"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=11715"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=11715"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}