{"id":119371,"date":"2020-10-12T06:00:09","date_gmt":"2020-10-12T13:00:09","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=119371"},"modified":"2021-03-18T12:57:15","modified_gmt":"2021-03-18T19:57:15","slug":"cc-household-cio","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2020\/10\/cc-household-cio\/","title":{"rendered":"Cybersecurity Tips From Unit 42 for the Household CIO of 2020"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">October is upon us yet again. For many, this means fall festivities and pumpkin spice, but in the cybersecurity industry we look forward to a month of driving cybersecurity awareness. As more students and employees are working from home than ever before, this year\u2019s National Cybersecurity Awareness Month is uniquely significant and we want to help make sure everyone knows how to be secure and remain secure online.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">As classrooms have gone virtual for over<\/span><a href=\"https:\/\/www.edweek.org\/ew\/section\/multimedia\/school-districts-reopening-plans-a-snapshot.html\" rel=\"nofollow,noopener\" > <span style=\"font-weight: 400;\">9 million students<\/span><\/a><span style=\"font-weight: 400;\"> across the United States, this school year means more laptops and tablets instead of backpacks and bus rides. For many parents, the new school year signals re-entry into the role of an in-house teacher and household CIO.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">While using new technologies and apps and navigating school in a virtual environment can seem overwhelming, cybersecurity doesn\u2019t have to be. By following a few simple best practices, parents can help protect their children from cybercrime and also preserve their online privacy.<\/span><\/p>\n<ol>\n<li><b> Understand what your child is doing online.<\/b><\/li>\n<\/ol>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li><span style=\"font-weight: 400;\">If you\u2019re using a personal device, set up parental controls on your child\u2019s device so they must get permission before downloading anything or making purchases.<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Check settings on popular apps, such as Fortnite, where you have the option to block in-game chats.<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Know and understand the social media accounts your child uses. Know who their contacts are and what conversations they\u2019re having.\u00a0<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Talk to your child about the openness of the internet, the ability for anyone to post anything online and how to recognize misinformation.\u00a0<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ol start=\"2\">\n<li><b> Be aware of suspicious behavior with video conferencing applications.<\/b><\/li>\n<\/ol>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li><span style=\"font-weight: 400;\">\u201cStranger danger\u201d applies to the virtual world as it does in the physical.<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Instruct your child to leave a meeting if there\u2019s suspicious behavior that wouldn\u2019t be acceptable in real life, such as unknown and unannounced participants joining.\u00a0<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ol start=\"3\">\n<li><b> Explain the importance of strong passwords.<\/b><\/li>\n<\/ol>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li><span style=\"font-weight: 400;\">Compare a password to the key to your house. That key protects everything inside and you need to keep it safe; keep it from strangers and even from friends.<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Just like different keys open different doors, a household CIO should use different passwords for different personal devices and accounts that require you to choose your own passwords.<\/span><\/li>\n<li><span style=\"font-weight: 400;\">A password manager is like the key chain, an app that keeps passwords together and easy to use. Parents should have access to their child\u2019s passwords\/manager.<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ol start=\"4\">\n<li><b> Keep an eye on what they\u2019re doing.<\/b><\/li>\n<\/ol>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li><span style=\"font-weight: 400;\">Position your child\u2019s screen so that you can monitor their activity.\u00a0<\/span><\/li>\n<li><span style=\"font-weight: 400;\">If possible, use a virtual background when on camera for distance learning. It can help protect privacy and keep the focus on learning.<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Talk to your kids about the dangers of clicking links with too-good-to-be-true offers. Instead, children should ask a parent before clicking. Once permission is granted \u2013 only then \u2013 open a new browser tab and go to the site directly.\u00a0<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ol start=\"5\">\n<li><b> Don\u2019t reveal more than you want to.<\/b><\/li>\n<\/ol>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li><span style=\"font-weight: 400;\">Set boundaries about what your child can post online, such as no pictures of faces, no easily identifiable locations and no personal information, including full name, contact information, school, etc.<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Change your device setting to turn off metadata on camera apps. This helps ensure strangers can\u2019t figure out where you are from the photos posted online.<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ol start=\"6\">\n<li><b> Keeping systems up to date.<\/b><\/li>\n<\/ol>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li><span style=\"font-weight: 400;\">Always keep your devices current with the latest software updates. They can include security updates needed to keep your family safe.\u00a0<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ol start=\"7\">\n<li><b> Still have questions? We\u2019re here to help with interactive programs for parents and children to enjoy together<\/b><span style=\"font-weight: 400;\">:\u00a0<\/span><\/li>\n<\/ol>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li><span style=\"font-weight: 400;\">Palo Alto Networks cybersecurity education for students, <\/span><a href=\"https:\/\/start.paloaltonetworks.com\/cyber-aces.html\"><span style=\"font-weight: 400;\">Cyber ACES<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Upcoming Cyber ACES webinars:<\/span>\n<ul>\n<li><span style=\"font-weight: 400;\">\u00a0<\/span><a href=\"https:\/\/paloaltonetworks.zoom.us\/webinar\/register\/WN_Q_HCNnDmSvmvS431zKxPjA\" rel=\"nofollow,noopener\" ><span style=\"font-weight: 400;\">Ages 8-10: Tuesday, Oct. 13<\/span><\/a><\/li>\n<li><span style=\"font-weight: 400;\">\u00a0<\/span><a href=\"https:\/\/paloaltonetworks.zoom.us\/webinar\/register\/WN_FBUFTOu0SXyC8B8N6c2KDA\" rel=\"nofollow,noopener\" ><span style=\"font-weight: 400;\">Ages 11-13: Tuesday, Oct. 20<\/span><\/a><\/li>\n<li><span style=\"font-weight: 400;\">\u00a0<\/span><a href=\"https:\/\/paloaltonetworks.zoom.us\/webinar\/register\/WN_Sl9_fSK4TwOvDTEbajq1qQ\" rel=\"nofollow,noopener\" ><span style=\"font-weight: 400;\">Ages 14-15: Tuesday, Oct. 27<\/span><\/a><\/li>\n<\/ul>\n<\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/campaigns\/kids-in-cybersecurity\"><span style=\"font-weight: 400;\">Zuky\u2019s Safety Guide<\/span><\/a><\/li>\n<li><a href=\"https:\/\/www.fosi.org\/good-digital-parenting\/cybersafe-young-children-going-back-school\/\" rel=\"nofollow,noopener\" ><span style=\"font-weight: 400;\">Family Online Safety Institute<\/span><\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2020\/04\/network-video-conferencing-security\/\"><span style=\"font-weight: 400;\">Best Practices for Video Conferencing Security<\/span><\/a><span style=\"font-weight: 400;\">\u00a0<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">As we partake in a virtual learning experience this school year, it may seem like there\u2019s a lot to remember for any household CIO aiming to keep kids secure online. While this information may be new for some or a helpful reminder for others, I can assure you that taking these few simple precautions can help keep your whole family protected so your student(s) can remain focused on what\u2019s most important: tackling a school year that will be one for the record books!<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Many parents are taking on the role of an in-house teacher and household CIO. These cybersecurity tips can help keep families safe online.<\/p>\n","protected":false},"author":89,"featured_media":119485,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[6719],"tags":[3967,7315,120,194,7314],"coauthors":[736],"class_list":["post-119371","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-company-culture","tag-best-practices","tag-cyber-aces","tag-cybersecurity","tag-cybersecurity-awareness-month","tag-cybersecurity-tips"],"jetpack_featured_media_url":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/10\/Cyberfest_2020_Image_1600x900.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/119371","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/89"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=119371"}],"version-history":[{"count":2,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/119371\/revisions"}],"predecessor-version":[{"id":128653,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/119371\/revisions\/128653"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/119485"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=119371"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=119371"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=119371"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=119371"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}