Do Your Kids Put Your Computer At Risk?
by Kim Boatman
As a computer user, you might never throw caution to the wind by opening suspicious emails or clicking on questionable links. But that doesn't mean your computer isn't at risk for security threats -- and the culprit might be sitting at your family dinner table.
It's not just a matter of protecting your teen or tween from troubling situations online. You also need to protect the family computer from your teen's or tween's risky online behavior. "Teenagers are a big target for hackers," says Ken Colburn, president of Data Doctors Computer Services, a company based in Tempe, Ariz. "The highest risk group of Internet users is suburban households with high-speed Internet connections and teenagers."
Behavior That Jeopardizes Your Computer
Teens love content sharing at online sites such as Kazaa and YouTube, but your computer could be infected with viruses and other forms of malware from these sites, says Tara Belzer, owner of Friendly Computers in Charlotte, N.C. "While you are downloading the newest Beyonce song, someone is downloading something from you," says Belzer. "You are inviting others into your computer."
Wily bad guys can use that access to collect your sensitive personal information off your computer files, says Belzer. "Many, if not most, files have malicious code embedded in the background of that free song."
Adults Take Risks Too
Of course, all the finger-pointing shouldn't be directed at young people. Facebook's popularity is skyrocketing with adults, and Facebook applications can threaten your computer's security too, says Mark Smetana, previously the owner of a CMIT Solutions computer support and service franchise in Hayward, Calif. Your mother-in-law clicking on a popup -- or another family member secretly visiting X-rated sites -- also poses a potential hazard.
Even if you don't share a computer with family members, their love of instant messaging or downloading movies could be affecting your computer's operating speed on a shared network.
What You Can Do
Experts recommend taking these steps to protect your computer from your kids and family:
Establish an acceptable-use policy
Set expectations about computer use, communicating how you want family members to use the computer, says Smetana. A policy won't guarantee that a family member isn't tempted to download a free song, but education goes a long way toward changing behavior.
Keep the family computer in a public area
This familiar advice is often geared toward protecting your child from potential online threats, but it also allows you to monitor behavior that could place your computer at risk.
Use strong antivirus, antimalware protection
Don't cheap out, cautions Belzer. Buy a high-quality product and run regular scans.
Set up user accounts
Create a user account for each family member. Place passwords on the adult accounts but not on the kids' accounts, advises Belzer.
Use parental controls
Savvy kids often find their way around parental controls, but it doesn't hurt to make the effort, says Smetana. When you establish a user account, you can set controls. You can also buy commercial products that monitor and control your child's behavior online.
Back up often
"Backing up is a must," says Belzer. "Too many times in my business I see people get very upset when their hard drive crashes and they lose all their precious pictures and documents." Keep a copy of critical information secure elsewhere.
Use an external hard drive with a power switch
If you store sensitive information on an external hard drive rather than on your computer, you'll minimize your risk, says Thomas K. McCabe, president of HeroTechs Inc., a computer service company based in Long Island, N.Y. "Turn off the device when it's not in use," says McCabe.
Finally, it helps if you're aware of the warning signs that your computer has been compromised. "If you see a ton of music, if your cursor is now a pretty bird or there are smiley faces -- emoticons -- in your emails, you can be sure your computer has been downloading items for some time," cautions Belzer.
- Building a Defensible Cyberspace
- Americans Careless With Online Passwords
- North Korea's Cyber Warfare Cell that Worries the West
- The Numbers Behind the WannaCry Attack
- Cyber Attacks Blame Game Grows Murkier
- Bitcoin & Its Murkier Rivals
- Android Most Vulnerable Operating System
- What if the U.S. Dismantled China's Internet Firewall?
- When Hackers Call, Hang Up
- Cyber Street Smarts: Stay Safe in the Social Space
- What Cyber Security Means for Banks
- Fingerprint Security: Not as Secure as You Think
- Are SS7 Exploitation Platforms Tracking You?
- Political Campaigns May Put Your Personal Data at Risk
- Protect Your Business from Hackers Without Breaking the Bank
- Your Guide to Tumblr Security
- Social Networking Security Scams
- 5 Things Putting You at Risk of Identity Theft
- Do Your Kids Put Your Computer At Risk?
- Shopping Personalization: Awesome or Risky?
- 10 Signs that an Online Shopping Site is Secure
- Big Brother is Cashing In on You
- The Mobile App Security Mantra: Don't Trust, But Verify
- Anonymity, Privacy, and Security Online
- Security Issues for Multicore Processors
- Report Highlights Economic Threat of Hacking
- Twitter Hit by Cyber Attack
- Cloud Computing: Cost, Efficiency and Security
- Microsoft experiences cyberattack; employee computers affected
- Android targeted by malware and cybercriminals
- The Cyber Menace
- Cyber Threats: Establishing the First Line of Defense
- Securing the Enterprise Better With Encryption Instructions
- Why Linux Needs Malware Protection
- China's Cyber 'Predators' Must Be Stopped
- CISPA Lacks Protections for Individual Rights
- CISPA Not the Right Way to Achieve Cybersecurity