{"id":46933,"date":"2015-10-14T13:44:56","date_gmt":"2015-10-14T20:44:56","guid":{"rendered":"http:\/\/www.intego.com\/mac-security-blog\/?p=46933"},"modified":"2016-10-06T08:51:24","modified_gmt":"2016-10-06T15:51:24","slug":"keeping-your-family-protected-in-our-always-connected-world","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/keeping-your-family-protected-in-our-always-connected-world\/","title":{"rendered":"6 Ways to Keep Your Family Protected in Our Always-Connected World"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-46942\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/10\/keeping-family-protected-online.jpg\" alt=\"Keeping Your Family Protected In Our Always-Connected World\" width=\"600\" height=\"411\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/10\/keeping-family-protected-online.jpg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/10\/keeping-family-protected-online-150x103.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/10\/keeping-family-protected-online-300x206.jpg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>It&#8217;s 2015, and in today&#8217;s interconnected world\u00a0we live robust, online lives. From banking and shopping to health care, social networking and downloading the latest apps \u2014 we&#8217;re always connected to the online world. While the benefits are aplenty, this increased connectivity and our ever-growing number of connected devices has also made us more vulnerable to cybercrime. We must take precautionary steps to keep ourselves and our families more secure. That&#8217;s why\u00a0the third week of National Cyber Security Awareness Month (NCSAM) focuses on making our families and communities more secure.<\/p>\n<p>We covered some\u00a0ways <a href=\"https:\/\/www.staysafeonline.org\/blog\/teaching-kids-to-be-safe-and-responsible-cyber-citizens\" target=\"_blank\">parents can teach their kids to be safe and responsible cyber citizens<\/a> for StaySafeOnline.org, but there are plenty more tips being passed around.\u00a0Of the many reasons children can benefit from the\u00a0online world, today&#8217;s threats are also connected to our digital lives, and risk prevention begins by responding to cybercrime, cyber-bullying\u00a0and more, and by teaching children how to use the Internet safely, more securely and responsibly.<\/p>\n<p>Ensuring a safe online experience for your family can be challenging, but with the right steps can be easily obtained. The same, of course, applies to keeping your kids informed about online threats that can affect them. So how can you keep your family protected in our always-connected world? Here are six essential actions you can take right now.<\/p>\n<h3>1. Protect Your Family from Fraud and Identity Theft<\/h3>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-46936\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/10\/child-identity-theft-fraud.jpg\" alt=\"Child Identity Theft\" width=\"500\" height=\"331\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/10\/child-identity-theft-fraud.jpg 500w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/10\/child-identity-theft-fraud-150x99.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/10\/child-identity-theft-fraud-300x199.jpg 300w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/p>\n<p>Unfortunately, identity theft is still a very serious threat online. That&#8217;s why ensuring your family protects itself from fraud and identity theft should remain a top priority. To protect yourself and your account, here are two steps you can take right now:<\/p>\n<ol>\n<li><strong>Regularly update your password<\/strong>: Frequently changing your password using special characters and a combination of upper and lower case characters significantly reduces the chance that hackers will figure out your password and fraudulently log into your online accounts.<\/li>\n<li><strong>Update your Internet browser to the latest version<\/strong>: Older versions of Internet browsers are more susceptible to viruses, spyware, and other security issues. They&#8217;re also slower and more likely to crash. By using the latest version of Mozilla Firefox, Apple&#8217;s Safari, or Google Chrome, your data will be more secure, and you&#8217;ll also have a much smoother online experience.<\/li>\n<\/ol>\n<h3>2. Teach Kids to Keep Passwords Private<\/h3>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-36466\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/01\/family-password-security.jpg\" alt=\"Family passwords and online security tips\" width=\"500\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/01\/family-password-security.jpg 500w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/01\/family-password-security-150x90.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/01\/family-password-security-300x180.jpg 300w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/p>\n<p>Passwords are like underwear: it&#8217;s good to keep them hidden, and you should change them often. In a world where by the age of 13 many kids have excelled at using computers, teenagers are often resilient in the face of new technology, but also sophomoric. A troubling trend with young kids these days is carelessly handling their passwords. It has become trendy for teens to share passwords with friends\u00a0\u2014\u00a0as a sign of trust and intimacy\u00a0\u2014and it&#8217;s a spectacularly bad idea.<\/p>\n<p>Even some adults have a hard time managing their passwords securely.<\/p>\n<p><a href=\"http:\/\/www.forbes.com\/sites\/kashmirhill\/2012\/01\/18\/why-sharing-passwords-with-your-girlfriendboyfriend-is-a-spectacularly-bad-idea\/\" target=\"_blank\">Kashmir Hill at Forbes<\/a>, for instance, speaking from experience in a past relationship where she and her then-boyfriend knew one another&#8217;s email passwords, described how emotions can sometimes get the better of a person when times turn bad in a password-sharing relationship.<\/p>\n<blockquote><p>It wasn&#8217;t healthy. Curiosity is a devastating emotion when you have access to a significant other&#8217;s account. When times turned bad, I found myself addicted to seeing how he was describing our crumbling relationship to others. I eventually had to ask him to change his password\u00a0\u2014 which he initially refused to do, seeing it as a\u00a0nail in the coffin of the relationship\u00a0\u2014 but I insisted, because I couldn&#8217;t stop myself from looking.<\/p><\/blockquote>\n<p>An important takeaway is that parents should teach their kids the importance of not sharing passwords. It&#8217;s simple: Just say not to password sharing!<\/p>\n<h3>3. Monitor Your Child&#8217;s Online Activities<\/h3>\n<p><img loading=\"lazy\" class=\"aligncenter wp-image-25150\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/04\/parental-concerns-digital-era.jpg\" alt=\"Mother Concerned About Teenage Daughter\u2019s Over Online Activity\" width=\"500\" height=\"333\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/04\/parental-concerns-digital-era.jpg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/04\/parental-concerns-digital-era-150x99.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/04\/parental-concerns-digital-era-300x199.jpg 300w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/p>\n<p>With a very young child, you may want to be the one directly interacting with the computer. As they are more dexterous and begin to have school work that requires computer use, they will need to start taking over the interactions. You may still wish to stay physically nearby to offer assistance and to make sure they stay within appropriate boundaries. Older children still need monitoring and restrictions, but you may wish to install a <a href=\"https:\/\/www.intego.com\/family-protector\" target=\"_blank\">parental control app<\/a> or patrol their activities.<\/p>\n<h3>4. Establish Rules for Safe Online Activities<\/h3>\n<p><img loading=\"lazy\" class=\"aligncenter wp-image-34570\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/12\/safe-browsing-osx-ios.jpg\" alt=\"Safe online browsing\" width=\"500\" height=\"360\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/12\/safe-browsing-osx-ios.jpg 597w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/12\/safe-browsing-osx-ios-150x108.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/12\/safe-browsing-osx-ios-300x216.jpg 300w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/p>\n<p>Whatever restrictions you put in place will vary depending on the age of your child. Let your child know what is acceptable online behavior\u00a0\u2014 when they can use the computer, access the Internet, and whether to ask you before opening or downloading files. You can be a lot more specific and nuanced with caveats when your child is 16 than when they are\u00a06 (and teenagers\u00a0will need access to more functions on the computer). For instance, this might be a tricky concept for a kid in elementary school to comprehend: &#8220;It&#8217;s okay to download files from these specific sites, but ask me before downloading anything else.&#8221; Your teenager, on the other hand, will know better.<\/p>\n<p>With a younger child, you can take an additive approach\u00a0\u2014 they can use only specific applications, for a set length of time. With an older child, let them know what things are off-limits, and at what time they are to cease Internet use.<\/p>\n<h3>5. Know the Signs Your Child Is Being Cyberbullied<\/h3>\n<p><img loading=\"lazy\" class=\"aligncenter wp-image-27394\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/05\/how-to-know-if-your-child-is-facing-cyberbullying.jpg\" alt=\"Moms and Kids against bullying\" width=\"500\" height=\"333\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/05\/how-to-know-if-your-child-is-facing-cyberbullying.jpg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/05\/how-to-know-if-your-child-is-facing-cyberbullying-150x99.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/05\/how-to-know-if-your-child-is-facing-cyberbullying-300x199.jpg 300w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/p>\n<p>Internet safety is understandably a big concern for today&#8217;s parents. <a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-protect-a-child-from-online-predators\/\" target=\"_blank\">Predators are always a danger<\/a>, but unfortunately kids also face hazards from their own peers.\u00a0There&#8217;s an old saying, &#8220;Children can be cruel,&#8221; and that bullying has always existed, but that doesn&#8217;t make it any more acceptable or any less harmful. And the Internet, with its anonymity and scalability, has taken bullying to frightening new levels.\u00a0It&#8217;s important to stay proactive by <a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-know-if-your-child-is-facing-cyberbullying\/\" target=\"_blank\">watching for signs that may suggest your child is being cyberbullied<\/a>.<\/p>\n<h3>6. Limit Administrative Privileges<\/h3>\n<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-securely-set-up-your-new-mac\/new-guest-acct\/\" rel=\"attachment wp-att-7483\"><img loading=\"lazy\" class=\"aligncenter size-full wp-image-7483\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/11\/new-guest-acct.png\" alt=\"new guest acct\" width=\"500\" height=\"374\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/11\/new-guest-acct.png 500w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/11\/new-guest-acct-150x112.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/11\/new-guest-acct-300x224.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/11\/new-guest-acct-100x74.png 100w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/a><\/p>\n<p>There is no reason a child needs to be able to access system files or your important data files. It&#8217;s a good idea to create a separate\u00a0user account with limited permissions and higher security settings for your child to use. This can help keep them from accidentally installing unwanted programs and it also has a side benefit of giving them a feeling of having their own separate space to personalize their taste. For an extra measure of protection, you can encrypt any folders where you keep sensitive data files. This too has another benefit: It can help protect your data in the case of malware or other intrusion.<\/p>\n<p>You wouldn&#8217;t let your kid play in a busy intersection, and you shouldn&#8217;t leave your kid on the Internet unattended. It&#8217;s simple to set age-appropriate restrictions for your kids that can be modified as their abilities and needs change. Not only can it potentially protect your child, but your computer and data as well.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>It&#8217;s 2015, and in today&#8217;s interconnected world\u00a0we live robust, online lives. From banking and shopping to health care, social networking and downloading the latest apps \u2014 we&#8217;re always connected to the online world. While the benefits are aplenty, this increased connectivity and our ever-growing number of connected devices has also made us more vulnerable to [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":46948,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[10,13],"tags":[925,711,2494,2497],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"It&#039;s 2015, and in today&#039;s interconnected world\u00a0we live robust, online lives. From banking and shopping to health care, social networking and downloading\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/keeping-your-family-protected-in-our-always-connected-world\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"6 Ways to Keep Your Family Protected in Our Always-Connected World - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"It&#039;s 2015, and in today&#039;s interconnected world\u00a0we live robust, online lives. From banking and shopping to health care, social networking and downloading\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/keeping-your-family-protected-in-our-always-connected-world\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2015-10-14T20:44:56+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2016-10-06T15:51:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/10\/Family-Security-Featured.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Derek Erwin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/keeping-your-family-protected-in-our-always-connected-world\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/10\/Family-Security-Featured.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/10\/Family-Security-Featured.jpg\",\"width\":400,\"height\":260,\"caption\":\"Family Online Security\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/keeping-your-family-protected-in-our-always-connected-world\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/keeping-your-family-protected-in-our-always-connected-world\/\",\"name\":\"6 Ways to Keep Your Family Protected in Our Always-Connected World - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/keeping-your-family-protected-in-our-always-connected-world\/#primaryimage\"},\"datePublished\":\"2015-10-14T20:44:56+00:00\",\"dateModified\":\"2016-10-06T15:51:24+00:00\",\"description\":\"It's 2015, and in today's interconnected world\\u00a0we live robust, online lives. From banking and shopping to health care, social networking and downloading\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/keeping-your-family-protected-in-our-always-connected-world\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/keeping-your-family-protected-in-our-always-connected-world\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/keeping-your-family-protected-in-our-always-connected-world\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"6 Ways to Keep Your Family Protected in Our Always-Connected World\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/keeping-your-family-protected-in-our-always-connected-world\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/keeping-your-family-protected-in-our-always-connected-world\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812\"},\"headline\":\"6 Ways to Keep Your Family Protected in Our Always-Connected World\",\"datePublished\":\"2015-10-14T20:44:56+00:00\",\"dateModified\":\"2016-10-06T15:51:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/keeping-your-family-protected-in-our-always-connected-world\/#webpage\"},\"wordCount\":1122,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/keeping-your-family-protected-in-our-always-connected-world\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/10\/Family-Security-Featured.jpg\",\"keywords\":[\"Family\",\"National Cyber Security Awareness Month (NCSAM)\",\"National Cybersecurity Awareness Month (NCSAM)\",\"NCSAM 2015\"],\"articleSection\":[\"How To\",\"Security &amp; Privacy\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/keeping-your-family-protected-in-our-always-connected-world\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812\",\"name\":\"Derek Erwin\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g\",\"caption\":\"Derek Erwin\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/derek-erwin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"It's 2015, and in today's interconnected world\u00a0we live robust, online lives. From banking and shopping to health care, social networking and downloading","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/keeping-your-family-protected-in-our-always-connected-world\/","og_locale":"en_US","og_type":"article","og_title":"6 Ways to Keep Your Family Protected in Our Always-Connected World - The Mac Security Blog","og_description":"It's 2015, and in today's interconnected world\u00a0we live robust, online lives. From banking and shopping to health care, social networking and downloading","og_url":"https:\/\/www.intego.com\/mac-security-blog\/keeping-your-family-protected-in-our-always-connected-world\/","og_site_name":"The Mac Security Blog","article_published_time":"2015-10-14T20:44:56+00:00","article_modified_time":"2016-10-06T15:51:24+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/10\/Family-Security-Featured.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Derek Erwin","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/keeping-your-family-protected-in-our-always-connected-world\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/10\/Family-Security-Featured.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/10\/Family-Security-Featured.jpg","width":400,"height":260,"caption":"Family Online Security"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/keeping-your-family-protected-in-our-always-connected-world\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/keeping-your-family-protected-in-our-always-connected-world\/","name":"6 Ways to Keep Your Family Protected in Our Always-Connected World - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/keeping-your-family-protected-in-our-always-connected-world\/#primaryimage"},"datePublished":"2015-10-14T20:44:56+00:00","dateModified":"2016-10-06T15:51:24+00:00","description":"It's 2015, and in today's interconnected world\u00a0we live robust, online lives. From banking and shopping to health care, social networking and downloading","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/keeping-your-family-protected-in-our-always-connected-world\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/keeping-your-family-protected-in-our-always-connected-world\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/keeping-your-family-protected-in-our-always-connected-world\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"6 Ways to Keep Your Family Protected in Our Always-Connected World"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/keeping-your-family-protected-in-our-always-connected-world\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/keeping-your-family-protected-in-our-always-connected-world\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812"},"headline":"6 Ways to Keep Your Family Protected in Our Always-Connected World","datePublished":"2015-10-14T20:44:56+00:00","dateModified":"2016-10-06T15:51:24+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/keeping-your-family-protected-in-our-always-connected-world\/#webpage"},"wordCount":1122,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/keeping-your-family-protected-in-our-always-connected-world\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/10\/Family-Security-Featured.jpg","keywords":["Family","National Cyber Security Awareness Month (NCSAM)","National Cybersecurity Awareness Month (NCSAM)","NCSAM 2015"],"articleSection":["How To","Security &amp; Privacy"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/keeping-your-family-protected-in-our-always-connected-world\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812","name":"Derek Erwin","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g","caption":"Derek Erwin"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/derek-erwin\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/10\/Family-Security-Featured.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-ccZ","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/46933"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=46933"}],"version-history":[{"count":15,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/46933\/revisions"}],"predecessor-version":[{"id":57913,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/46933\/revisions\/57913"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/46948"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=46933"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=46933"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=46933"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}