Guard yourself against these 3 things

cyberbullying, school, parents, online student safety, Securly

October is National Cyber Security Awareness Month. Each week in October is dedicated to a different cyber security theme, and features appropriate resources to help all internet users protect themselves from threats online.

Both children and adults should be cautious of their interactions online, while also considering whom they are dealing with:

BOTS

Bots are useful tools and potentially constitute 60% of website traffic. However, they are oftentimes employed to conduct cybercriminal activity. They are a type of malware, allowing hackers to remotely take control over the infected computer.

Bots can be website scrapers and spammers, while extensive “botnets” (an army of infected computers) can take down a website in mere seconds called a Denial-of-Service Attack. Bots send viruses and are often used to steal personal information (credit card information, bank credentials, social security numbers), putting victims at risk of fraud.

STRANGERS

The digital age promised to bring the world closer – and indeed the younger generation seems to be reflecting the sentiment, sharing increasingly more personal information with strangers online. The study extrapolates that 1 in 5 people share sensitive data (including passport scans, bank information, and personal documents) online with others they do not know well.

Neglecting to install proper security measures or voluntarily sharing personal information introduces many risks, from Venmo scams and fraud to sexual predators.

PEERS

Incorporating people from your physical environment into your online social community may seem like a natural extension. However, a recent study by Robin Dunbar of Oxford Universityshows that most of your online friends are in fact not your “real friends”. In fact, cyberbullying is more likely to come from a teen’s peers than from internet trolls or strangers. There are cases where aggressive “strangers” were exposed as peers operating under fake accounts/names.

Online communication platforms are efficient, but “the lack of face-to-face interactions makes it difficult to invest in a relationship for maintaining an essential level of ‘emotional intensity.’” This lack of empathy and selective sharing on social media garners a feeling of detachment, which empowers cyberbullying. October is also National Bullying Prevention Month. Cyber Security can be integral in bullying prevention. Both campaigns intersect, working towards the same goal: safety.

To learn more about how we keep kids safe online, visit our website:

Learn more about our Built-In Cyberbullying Detection

10 Reasons Why Securly is the Best Web Filter

parents, securly, web filter, schools

Between our unrivaled student safety features and dedicated team, here’s why schools and parents trust Securly to keep their kids safe online:

1. Free Chromebook Filtering

Set-up takes less than 5 minutes and it works seamlessly at home. In July, our Chromebook filtering became free for all schools everywhere. Since then, 700 districts (and counting) signed up and installed our self-serve Chromebook solution.

2. Free self-harm detection via Auditor

Our Auditor tool monitors Gmail for signs of self-harm and has kept over 1M students safer in its first 4 months. Our system uses Natural Language Processing & Artificial Intelligence algorithms to infer the sentiment behind e-mails. We notify parents and administrators in real-time at first sign of at-risk behavior.

3. Expanded Parent Settings

We upgraded our industry-first parent portal to give parents more control to set policies for school-owned devices at home. Parents can customize what your student can do and see on their devices, allow or deny access to specific sites and categories. This is one of our most popular features with parents.

4. Page Scanour blacklist that learns

PageScan is able to accurately block new content and meet the strict performance constraints of modern K-12 networks. Each day, PageScan adds 100s of sites to keep our database in tune with an ever-growing Internet. In fact, our blacklist recently upgraded to recognize images containing nudity, giving parents even less to worry about.

5. Azure AD

Can you ask for anything more than Google SSO and on-prem AD support? Now, you can. Azure AD support has been completed and deployed to many happy customers.

6. Product Stability

Despite our meteoric growth, support tickets are only on track to increase a mere 20%. Why? Because cloud-based filtering works and our product is more stable than ever.

7. Auto Scaling

Our DevOps infrastructure was upgraded to handle auto scaling. This means that as traffic fluctuates, servers turn on or go to sleep based on use  which mitigates chances of a server getting maxed out or even crashing. So, go ahead and throw all you can at us – we can handle it.

Advantages of cloud-based auto scaling:

  • Better fault tolerance: Auto scaling detects when an unhealthy instance, terminates it, and launches a replacement.
  • Improved availability: This ensures that our servers always have the capacity to handle the current traffic demands.
  • Blazing fast DNS resolution.
  • Automated load handling.
  • Highly scalable.
  • Higher service uptime.

 

8. Our Rockstar Team

The guy who works on our Squid proxy wrote the code for our SSL decryption engine over a weekend. Our recruiter hired 30 top-notch sales reps in just under one month. Industry veterans from Microsoft, Amazon, and Qualys are just a sample of the talent that Securly’s been attracting.

9. WiscNet

We secured our first state-wide contract when WiscNet (Wisconsin’s K-12  Research and Education Network) chose to partner with Securly. Along with other large district deals reaching over 2M students, Securly is on track to achieve triple digit sales growth 4 years in a row.

10. Breakneck Growth

Securly is bursting at the seams with 70+ employees across California, North Carolina, and India. Our Charlotte and India offices continue to expand and our HQ in Silicon Valley is having to move to an office 3x the size of our old space. It’s a great feeling.

 

For more information about online child safety, subscribe to our newsletter:


 

The first ever proxy-less browser-less DNS-based iPad filtering solution for K-12

securly, filtering, schools, ipad, proxy, filter, device, app

iPads have a prominent place in the K-12 ecosystem. While we often see the higher grades go with Chromebooks as the 1:1 device of choice, lower grades typically go with iPads due to its tactile interface. Educational apps minimize the need to type while fostering learning.

With many schools choosing to send these devices home, both the CIPA law and pressure from the local parent community forces schools to provision their iPads with some form of filtering. Apple’s architectural limitations have thus far allowed only 2 options. Both of these have their own limitations.

Safe browsers: This approach requires uninstalling Safari and installing a specialized browser that filters web traffic. The approach suffers from the following limitations:

  • App traffic is not filtered.
  • Hyperlinks on any webpage tend to use Safari as the default browser.
  • Removing Safari breaks a number of Edu critical apps such as docs and drive.

In other words, Safe Browsers are simply not an option for a school or district trying to ensure that their taxpayer dollars spent on devices will move the needle on student achievement.

Proxy: Apple provides the option to push out a global proxy setting via MDM. This would mean that every byte of data from the iPad would need to be routed through the designated proxy. This approach has the following downsides:

  • Most proxy solutions are hardware appliance based. When the device leaves the network, the traffic is forced back through the appliance which is usually installed on the school’s network. By definition, this requires the school to become a 24/7 ISP for at-home traffic!
  • Even those proxy solutions that are cloud based like Securly’s often see Apps “break” because many cloud based services simply do not like to see their App traffic be proxy-ed. These services need to be constantly exempted from PAC files as the school runs in to them.
  • Many Firewalls tend to block proxy traffic out of the box. To address this, schools often need to maintain a running proxy whitelist on their Firewall.

The holy grail of iPad filtering: Thanks to months of often time frustrating R&D + recent advances in iOS 10, Securly is able to introduce the first proxy-less off-site filtering solution for iPads that is not a safe browser. The solution involves provisioning the iPad with a lightweight DNS setting – as a result of which ~1% of the device’s traffic is selectively proxy-ed. This includes App traffic. Securly is also able to avoid proxy-ing all of the traffic.

For more updates and product releases, subscribe to our newsletter: 


Your Digital Citizenship Resource Guide

digital citizenship, digital literacy, education, schools, cyberbullying

What is digital citizenship? Essentially, it is responsible technology use rooted in community awareness. In order to be practice good digital citizenship, you must consider how your actions online can compromise your safety, and also of those (virtually) around you. In recent years, many school districts have begun implementing digital citizenship education for educators and students. Why? Digital  Citizen training is not only essential for student online safety but also integral for cyberbullying prevention.

At the advent of personal computing, many focused mainly on digital literacy, the ability to understand and integrate into a digital society. However, understanding the technology is not enough. By contrast, digital citizenship is all encompassing. Common Sense Media defines multiple components of digital citizenship including awareness of Internet Safety, Privacy and Security, Relationships & Communication, Cyberbullying, Digital Footprint, Self Image & Identity, Information Literacy, and Copyright Laws.

digital citizenship, digital literacy

Google Trends search frequencies for “digital citizenship” vs “digital literacy” from 2012 – present.

Then, with personal computing came to the rise of social media and cyberbullying. However, though cyberbullying awareness has increased over the years, the numbers for digital citizenship queries are dismal – especially given the positive relationship between them. In fact, many schools require digital citizenship education as part of their 1:1 Acceptable Use Policy. Some states even mandate digital training for students and administrators for school districts to receive funding. Florida House Bill 5101, grants at least $250,000 for digital classroom development. To receive this funding, each district must submit a digital classroom plan which includes provisions for digital citizenship education.

digital citizenship, digital literacy

Search frequency for “cyberbullying” and “digital citizenship” (2012-2017) – we need to close this gap.

 

The following free education resources are intended to impart digital citizenship best practices in the everyday technology usage of parents, educators, and students:

> Teach InCtrl

The Internet & Television Association (NCTA) launched InCtrl to provide free lessons for both teachers and students on digital citizenship. InCtrl is unique from other online curriculums in two main ways:

  • it provides guides for teaching digital citizenship across different subject areas, giving specifics for how to integrate digital citizenship into English/Language Arts, Social Studies, Science, Math, and Library/Media.
  • the curriculum is based heavily on collaboration and communication

> Common Sense Media Curriculum

Common Sense Media has crafted a Digital Citizenship curriculum intended to teach children how to make “safe, smart, and ethical decisions online”. Lesson plans come in a variety of formats (PDFS, iBooks, Nearpod, videos, interactive games, etc), segmented by grade (K-12) and subject. 76% of public schools across the US use these guides. However, it is not isolated only to the classroom. They also provide separate modules for professional development, teacher training, and family education.

> Microsoft Digital Citizenship Training

Last month, Microsoft released their “Digital Civility Index” in honor of the 5th anniversary of Safer Internet Day in the US. Despite their findings, Microsoft is still optimistic for a safer Internet and has started a new initiative The Digital Civility Campaign. This is an addition to their newly released training courses published for the public on their Microsoft Education platform.

Their 30 min Digital Citizenship course provides a toolkit for educators to use in their classrooms and is based on three pillars: (1) Digital Literacy, (2) Digital Civility, and (3) Information Literacy.

> iKeepSafe Generation Safe – New Media Mentor for Digital Citizenship

The iKeepSafe organization provides benchmark tests (ex: 360 Self Assessment) to help schools examine the school’s e-safety competence. They then break down Digital Citizenship Success into six tenets: each page devoted to an individual element provides (1) comprehensive definition (2) tips for schools (3) tips for youth and (4) guiding questions to assess readiness. iKeepSafe also breaks down concepts into three action items – Prevention, Detection & Intervention, and Incident Management & Response – accompanied by worksheets and themed curriculums for classrooms.

 

For more information on digital citizenship and best practices, subscribe to our newsletter: 


Who else is collecting data about your children?

privacy, COPPA, data, online, child

Digital footprints are not exclusive to online shoppers or avid social media users; everyone has one, including your 5-year-old child. Any online activity contributes to their “digital portrait”, making them vulnerable targets to advertisers and internet predators.

Taking Precautions

In an effort to protect minors on the world wide web, the FTC Children’s Online Privacy Protection Act (COPPA) created compliance regulations for online operators that host children under the age of 13 in 1998. Websites must (1) provide notice of what type of information is being collected and what it is being used for (2) obtain verifiable parental consent for collection/use of said information and (3) establish procedures to ensure confidentiality of data collected. In addition, it is illegal to make site entry/game participation contingent upon the amount of information disclosed.

However, “age limits” did not stop persistent pre-teens from joining social media and gaming sites. Regardless, 10 years later, data collection came to be mostly implicit. Thus, the FTC expanded COPPA in 2013 to include photos, videos, audio, device location, as well as other “persistent identification systems” (cookies, unique serial numbers on mobile phones, IP addresses).

The Current Situation

COPPA mostly attempts to thwart behavioral advertisers and 3rd party marketing agencies. For example, this past year, consumers claimed that Google violated user privacy as they consolidate user data across all platforms (Google Maps, Google search, etc.), making for a more comprehensive user profile. The announcement of this pervasive policy change was deemed “deceptive” by consumer advocates. This is not the first time they have received contention.  Now, Google Maps includes “shareable lists”; on the note of privacy, WLRN writes “..the latest version of the Google Privacy Policy — dated Aug. 29, 2016 — states that ‘depending on your account settings, your activity on other sites and apps may be associated with your personal information in order to improve Google’s services and the ads delivered by Google.’ A note on the side specifies that ‘your activity on other sites and apps’ might come from your use of other Google products.”

However, parents need be aware of the privacy policies of common online tools (covered under COPPA or not), as well as the unconventional modes of data collection –like the following– and their possible repercussions. 

> 3rd party utilities. Despite this Facebook Hoax that claimed all personal information would be disclosed, Facebook privacy policies have relatively come under less fire. However, the 3rd-party Stalkscan makes access to FB personal content easier than ever before: “Stalkscan collects the huge amount of information revealed by that search term and puts it in an easily accessible form, allowing anyone to see all of the information about a person that it would be able to dredge up.” Although they claim it is not a breach of Privacy Policy, it exposes data that users may not know is defaulted “public”. Facebook provided Privacy Checkup to mitigate this vulnerability.

> Smart Toys. In recent years, toy companies have released products that allow for major security breaches. In Germany, the Federal Network Agency advised parents to destroy the My Friend Cayla doll. The Cayla doll interacts with children and responds to their questions by searching the web; it then stores child searches to be used by agencies.  In addition, researchers discovered “a hack allowing strangers to speak directly to children via the My Friend Cayla doll”. Mattel’s version Hello Barbie proved vulnerable after reports that the Wi-FI-enabled doll could be used as a surveillance device by hackers via the connected network; hackers could find out where the toy/child was or send back false data to the parent about child’s location. Hello Barbie also stores Wi-FI network names, the account IDs, and the audio it records.

> Video games.  According to the Wisconsin Department of Justice, child predators a lurk in chat rooms of sites “kid-friendly” gaming platforms. The predators can randomly search for a name in the database, see that the child is a Minecraft player, and then strike up a conversation in a chat room. Minecraft, not unlike other games, allows kids to play with other people in three ways: (1) a local area network (LAN) (2) online server or (3) Minecraft Realms. In addition, many kids post videos of themselves playing games which leak heavy clues to personal information and location.

For more information on online student safety, subscribe to our newsletter: 


The Edtech Revolution: 2010 – 2017

School Devices People Isometric

In December 2010, The Journal –“the leading Technology based education publication for K-12 and higher education”– published an article with a 5-prong prediction for the following year. Will the cloud continue to reign? Will more schools embrace student-centric mobile devices? These were the pressing questions of the time – a time 8-months after the release of the first iPad and 6-months before the release of the first Chromebook.

Now, we know that edtech has been proven to improve test scores and overall classroom engagement. But, how does the 2010 vision for edTech match what’s actually happening today?
 

7 YEARS LATER…

 

1. “There will be more momentum for mobile devices in classrooms with an eye toward affordable alternatives to traditional 1:1 rollouts.”

The 1:1 initiative aimed for districts to issue each student a laptop for use in-school and at home. For some districts, the cost per student quickly became unrealistic to initially implement, leading schools to create alternate strategies.

Then there was the iPad. Appealing to all ages for all occasions, the iPad topped the market in the following years after its release. Given that many children were acquiring iPads for personal use, some schools adopted a Bring Your Own Device (BYOD) Policy. Districts even integrated the two models to cut costs.

However, it was the Chromebook (2011) that truly revolutionized 1:1. While the iPad cost anywhere from $300 – $400, Chromebooks were sold from $199. The cost, plus it’s easy manageability and durability, made Chromebooks a main player in the edtech game. In 2012, Chromebooks accounted for only 1% of the devices sold to US classrooms; now, they make up more than half of the edtech market.
 

2. “Web-based instruction will gain more traction at the K-12 level.”

2010 was also the year that the Common Core Standards Initiative was enacted in response to numerous indicators of low student academic performance. Although the Common Core itself elicits mixed feelings, its effect on edtech is unwavering: “Integral to the Common Core was the expectation that they would be tested on computers using online standardized exams. As Secretary Duncan’s chief of staff wrote at the time, the Common Core was intended to create a national market for book publishers, technology companies, testing corporations, and other vendors.”

Indeed, $2.3 Billion has been invested in US K-12 education technology companies since 2010. Globally, edtech spending is predicted to reach $252 Billion by 2020.
 

3. “More tech-based monitoring and assessment tools will be incorporated into to the instructional mix.”

In 2000, the FCC created the Children’s Internet Protection Act (CIPA). CIPA requires schools and libraries to install measures to protect children from obscene or harmful content in exchange for discounts offered by the E-rate program. Many schools employ the use of a web filter to meet these requirements; however, administrators required new solutions that extended protection to school-owned devices at home.

Monitoring now includes take home policies and cyberbullying & self-harm detection. Parents are engaged via student activity reports on school-owned devices.
 

4. “The cloud will help ease the financial burden on schools while helping to expand technological capabilities.”

1:1 + Common Core = $$$$$. Valerie Strauss, a Washington Post reporter, claimed: “The financial cost of implementing Common Core has barely been mentioned in the national debates. All Common Core testing will be done online. This is a bonanza for the tech industry and other vendors. Every school district must buy new computers, new teaching materials, and new bandwidth for the testing. At a time when school budgets have been cut in most states and many thousands of teachers have been laid off, school districts across the nation will spend billions to pay for Common Core testing.”

Ironically, the cloud brought us light. Along with Chromebooks came Google Apps for Education – a suite of free, cloud-based productivity tools that allow for easy collaboration and engagement on any device. Check out their “Impact Portraits” to see specific examples of how the GSuite has benefited school districts in a variety of ways.

In addition, cloud-based web filtering allowed schools to abandon appliance based filters – saving them time, money, and effort with utmost CIPA compliance.
 

5. “Teachers will have access to expanded professional development programs.”

In 2011, the FCC updated CIPA compliance requirements. By 2012, all school Internet safety policies had to include educational programs detailing proper online behavior, cyberbullying awareness and response. In order to impart this knowledge to their students, teachers also had to go through digital literacy training.

Now, many schools now provide digital training professional workshops to help teachers integrate online safety best practices in their everyday classrooms. Some states mandate digital citizenship training for students and administrators in order for school districts to receive funding. By the 2014 House Bill 5101, each Florida school district will be granted at least $250,000 for digital classroom development. In order to receive this funding, each district must submit a digital classroom plan. The proposal must meet Florida Department of Education criteria. This includes creating a device Acceptable/Responsible Use Policy for students and providing digital literacy training for teachers, both of which are intended to combat cyberbullying by teaching students to be good digital citizens.

For more information on edtech, subscribe to our newsletter: 


How to Balance Trust and Safety in Digital Monitoring

parents, online, content, trust, safety, teens

Malware, spyware, online predators, phishing, etc. – your child faces these threats each time they log in to their device. The internet can be a devious place, with questionable content tucked into its darker corners.  As parents, you are inclined to install every safety measure possible to protect your children from harm.

Sure, these precautions are imperative for younger, elementary school-aged children. However, as kids become teens – chances are they won’t want you tracking their movements, monitoring their online activity, and/or filtering their content. To them, it is a breach of their privacy and a lack of trust. Perhaps this sentiment is merely a front for content they are trying to hide, but let’s not start off too skeptical. Psychologist Michael Rubino has worked with teens and families for 20 years; he says teenagers often ask, “If they want me to be responsible, how can I be responsible if they do not give me a chance?”

This in turn often leaves parents with the question: How do I walk the line between trusting and monitoring my teen?

It is possible.


In most cases, parents buy their child’s device (smartphone, laptop, etc.) and parents pay for the data service. Thus, it is important to remind your kid that their screentime is a privilege and thus can be taken away. Although this seems rather authoritarian, it is a point often taken for granted.

On a lighter note, the following includes more collaborative practices for establishing trust, while maintaining your child’s safety:

1. Transparency

“Spying” is masked with an incredibly negative connotation that lies in deception and secrecy. Tracking all of your child’s online activity without their knowledge already diminishes the chance of parent-child relationship built on trust.

It is best to tell your child of the x,y, z security measures you have installed to avoid feelings of betrayal, and later retaliation. By being frank with your child, you are establishing an openness intended to be respected/reciprocated. It sends the message: “Hey, I think these security measures are necessary. I can see what you’re doing. I’m giving you the responsibility to make decisions, and I’m holding you accountable for them.”

2. Compromise

48% of parents have read through their teen’s messages, and 61% monitor their browser history. However, this does not encourage an atmosphere of trust. A recent NYT article Should You Spy on Your Kids? claims: “A parent who constantly micromanages a teenager’s life — Why did you stop here? Why did you go there? — risks stifling the independence needed to develop into an adult.”

Please, do allow your child more freedom as they move through elementary school and onto middle and high school – but this does not mean you have to relinquish all responsibilities as the protectorate. Oscar Wilde once said, “With age come wisdom, but sometimes age comes alone.” Although a bleak statement, this lends to the more moderate notion: although the transition from child to young adult marks a large jump in maturity, there is still a lot to be learned.

To foster a relationship built on mutual trust, discuss trade-offs. This can be as simple as being “friends” on Facebook or keeping Location Services on, but no reading through messages. When approached correctly, these tools should need not feel intrusive.

3. Talk Boundaries   

First and foremost, teach your children how to properly use technology as with great power, comes great responsibility. Impart digital literacy and digital citizenship practices and make clear what sites should and should not be accessed. Set ground rules and discuss expectations with your young adult as soon as possible: this includes individual screen time limits as well as restrictions on interacting with others on online platforms. In doing their part, parents should also be aware of the current technological climate.

On the other hand, if your teen is sharing a part of their world with you (being friends/sharing updates on social media) show the same respect by being courteous and following online etiquette: do not comment on every post, do not like every photo, etc. Check out this guide “How Parents Should Approach Their Teens on Social Media” for helpful tips to navigating this fairly new type of relationship.

4. Data Usage/Limits

Relative to the other practices, this is quite simple. Parents can set the data plan through their wireless provider to limit their teen’s browsing and app usage. This includes specifications like (1) app access only through Wi-Fi or (2) blocking texts, calls, and browsing during a designated time. These simple implementations limit access to online content (and also saves money), while still giving teens the freedom they crave.

For more online safety tips and resources, subscribe to our newsletter: 


Help Your Kids Spend Screen Time Wisely

screen time, games, children, parents, media

A recent study conducted by the American Academy of Pediatrics re-evaluated appropriate screen time limits for young children. The assessment redefined “screen time” as the use of digital media exclusively for entertainment.

In the past, scientists and parents regarded screen time as the collective amount of time a child interacted with their device –and used this as the main factor to assess the potential benefits and/or consequences of screen exposure. However, this new metric focuses on the content and intent of device usage, addressing the positive results from educational-technology research. For example, an experiment in Australia concluded that children who play video games every day tend to perform better academically than those who do not. The theory goes that children who play video games develop critical thinking skills by solving challenges presented in the game. In contrast, students who use social media more frequently performed lower on standardized tests.

Given the debate over the relationship between screen time and child development –especially in the edtech world–this provides a point of clarity for parents as they work with their child to develop healthy device usage habits.

The new guidelines are as follows:

  • 18 months and younger: no screen time
  • 2-5 years old: one hour/day
  • 6-years-old and up: prioritize and complete other activities before screentime. Another study showed that ~4 hours was “just right” for peak performance.

Ultimately, it’s not necessarily how long children spend online, but what they are spending their time on. The following are fun resources for quality, engaging, and educational online content:

Common Sense Media

Common Sense Media includes resources for educational purposes or pure entertainment. They regularly compile a “Best of” List for Games, Apps, Websites, Movies, TV, etc. that are easily accessible through a navigation pane. These lists are broken down on a scale of 1-5 and organized by age group (“Preschoolers”, “Little Kids”, “Big Kids”, and “Tweens”). Another helpful feature for parents: they provide reviews for new movies and games, basing their rating on seven key elements (positive messages, positive role models, violence, sex, language, consumerism, drinking/drugs/smoking).

screen time, games, children, parents, mediascreen time, games, children, parents, media

 

PBS Kids – Reading Games

PBS Kids hosts a variety of game on their website and mobile app. The games are organized by subject/topic or by the TV show it’s based on.

screen time, games, children, parents, media

 

Kids.gov

“The U.S. government’s portal site that provides a gateway to hundreds of Federal and other websites for use by kids and teens.”

Kids.gov provides games and other educational resources for Kids (grades K-5)  and Pre-Teens (grades 6-8). They have a variety of interactive activities centered around learning the science and history of your environment – for example, they have a “Design Your Own Roller Coaster” challenge listed under the Science category. Other resources include Art and Music, Math, Jobs & Careers, Online Safety, etc.

screen time, games, children, parents, media

For more online safety tips and resources, subscribe to our newsletter: 


How to Be a Digitally Aware Parent in 2017

parents, children, screen time, online safety

Kids are trading in swing sets for headsets and see-saws for Slither. There are apps developed specifically for 1-year-olds, and on average, a child receives their first smartphone at the age of 10. It’s 2017 – parents must be cognizant of the virtual playground, just as they looked on while their children scaled the jungle gym.

This constant influx of technology – and at increasingly younger ages – poses a variety of risks for children that range from compromised cybersecurity to impaired cognitive development. However, the best way for parents to ensure online child safety is to be digitally literate and digitally aware themselves. And here’s how:

1. Know the Trends

To understand your child’s device habits, it’s important to know what types of content they are consuming.  For parents who feel that monitoring browser history is too overbearing, this is a less intrusive way to gain insight into what type of material their kids are exposed to. Business Insider surveyed a large group of teens to see what the biggest trends were among young adults this past year.

App Annie regularly reports top download apps and games by category: social networking, kids, entertainment, etc. Google Trends reports top searches and YouTube populates the most viewed videos on their home page.

2. Use Your Resources

The US government has compiled a list of resources centered around cybersafety and cyberbullying prevention. Additionally, there are a variety of tools available that are designed to help parents monitor and protect their children online at all times:

Web filters block inappropriate content, protect from malware, and can detect instances of bullying or self-harm. For full coverage, these apps allow parents to track and regulate their kid’s activity undetected. Google’s My Activity feature compiles watch and search history across all Google Apps, including YouTube. It also tracks devices, where they have been, and what apps you have used; these settings are adjustable. Although controversial, checking your child’s “My Activity” is a free way to follow their digital footprints.

 

3. Engage With Your Child

Younger Children

A recent study focused on how toddlers learn from touchscreens. Researchers observed the difference in a child’s retention and reproduction of a puzzle pattern when the puzzle-assembly tutorial was (1) demonstrated by a “ghost demonstration” on a tablet and (2) performed by an adult sitting next to them. The results: “The 2- and 3-year-olds who saw the ghost demonstration had a hard time replicating the task — but did well after they saw the human hand. Researchers concluded that having a human guide — often referred to as having social scaffolding — helped these young children learn.”

Young Adults

Reassign the hours usually devoted to scrolling through social media apps or online shopping in for a “device-free”, family activity time: start a project with your children, decide upon a book to read together, or introduce a regular time to catch-up and talk about your day. Being attuned to your child’s behavior on-and-off screen is an integral part of keeping them safe. Many young adults fall victim to cyberbullying and serious consequences may ensue. However, many teens do not reach out for help;. Spotting the signs early through shifts in your child’s behavior can prevent the devastating consequences, and ensure they are receiving the proper support they need.

Signs your child may be experiencing cyberbullying:

  • Becomes withdrawn
  • Suddenly stops using the computer
  • Loses interests in hobbies once enjoyed
  • Stops using computer or dims the screen when someone is nearby
  • More can be found here

4. Connect with Other Parents

Many parents have the same concerns when it comes to privacy and internet safety. CommonSense Media, a non-profit that works to promote safe technology usage, has created a trusted forum for parents to voice their concerns. Parents can both “Ask an Expert” and receive guidance from other parents. The forum is segmented by age group.

parents, children, screen time, safety

 

5. Set Guidelines for both Parents and Kids

In 2016, parents spent a daily average of 9 hours and 22 minutes interacting with some sort of screen media. About 8 of these hours were devoted to recreational use. To effectively set screen time boundaries for children, parents must lead by example and consciously make an effort to forgo picking up their device.  Set “no-phone zones”, schedule outdoor activity time, and impose daily screen time limits. Also, make sure that children do not use their device directly before bedtime; studies have shown that this disrupts sleep patterns and can lead to poor academic performance.

It’s especially important to limit screen time during early stages of development. Check out these new guidelines for screen time exposure by age group, abridged from an American Academy of Pediatrics report.

To learn more about online student safety measures, sign up for our newsletter:

Securly’s Year in Review

As 2016 comes to an end, here’s a brief summary detailing just some of our accomplishments this year.  2017, here we come!

SPRING

We receive the Tech & Learning Stellar Service Award for “Sales Support You Can Believe In”With a first response time of 12 minutes and a median ticket solve time of 1.5 hrs, pre- and post-sales, Securly was recognized by Tech & Learning for excellent sales support. We give prospects a white-glove onboarding experience which includes network configuration changes and an end-to-end UI walkthrough and training.


We start serving 1 in 4 schools in the San Francisco Bay AreaMany school districts –including Los Gatos, Morgan Hill, Campbell, Milpitas, Portola Valley, Dublin, Healdsburg– made the switch to Securly given our cloud-based platform and unique features:

  • Ability to secure a heterogeneous mix of devices including iPads, laptops, and Chromebooks both in school and at home.
  • Bullying and self-harm detection on social media using natural language processing.
  • Free e-mail reports and parent portal that offer the promise of boosting parental engagement.

We also serve our nation’s leading Charter networks – Aspire Public Schools, Summit Public Schools, KIPP and Rocketship.

SUMMER

Delegated Administration – our “set-and-forget” Solution for District IT . You asked, we listened. Support tickets for web-filtering in K-12 districts generally fall into two large buckets: 1) requests for unblock websites 2) requests for pulling user reports for disciplinary purposes. In addition, IT admins are responsible for timely response to detection of self-harm or cyberbullying.  This feature unburdens district IT and provides Principals, Guidance Counselors, and Parents access to student activity reports.

Seamless logins for our parent portal.  Parents can get access to the Securly portal by simply clicking through their weekly email reports. The portal gives parents a bird’s eye view of their child’s activity on school owned devices. They also have the ability to set policies at home

Auditor by Securlya free tool to monitor Google Mail and Chat for bullying and self-harmThis tool uses Natural Language Processing and Machine Learning algorithms to detect harmful sentiment in messages on Gmail, Drafts, and Chat without relying solely on keywords that require human audits. Keeping this tool free forever is our commitment to K-12 schools.


We become the first web filtering company to receive the iKeepSafe California Privacy Badge. To achieve this badge, companies must meet all requirements outlined in primary federal and California laws. This program helps educators and parents in the state of California identify edtech tools and services that protect student data privacy.

“We congratulate Securly on successfully completing a careful privacy review by iKeepSafe.  In the past few years, a large amount of legislation has emerged protecting and governing student data. By receiving the iKeepSafe privacy badge, Securly has taken an essential step in helping educators navigate this new terrain and keep student information safe.” Marsali Hancock, president and CEO of iKeepSafe


Securly @ ISTE Denver.  Securly rocked the floor at the 2016 ISTE Conference & Expo where 16,000 educators gathered for four days of ed-tech immersion.


We release Can Social Media Save Lives? –a quantified study on cyberbullying Through analysis of over a half million social media posts from over 300 school districts in 2016, Securly found that the average school district faces the threat of teen suicide about every two weeks. Our research centered around student online behavior and its tendencies towards suicide, self-harm, and depression.


We become the first self-servable web filterTo save IT Admins time and frustration during the back-to-school rush, we streamlined our setup process to be independently completed through a web browser session – without ever needing to speak with a sales or support person. With this update, we eliminated the complexity of network based web-filters with the simplicity of EdTech tools like Remind and ClassDojo.

FALL

We raise $4M in Series A funding. In the new year, we will extend beyond B2B software solutions for schools by engaging parents through a consumer application that allows parents to easily monitor and guide their child’s online activity.

Funding was led by Owl Ventures, a fund that invests in the world’s top Ed-tech startups. Amit Patel, a Partner at Owl Ventures, said, “Securly’s vision of what the future should look like for online student safety combined with the team’s deep expertise with information security and impressive execution is what made Owl Ventures excited to be part of their journey.”   


We are chosen as a SC Media 2017 Excellence Award FinalistOur unique approach to student safety that goes beyond basic CIPA compliance sets itself apart in the web filtering industry, and the SC Awards has taken notice – recognizing us as one of the finalists for Excellence Awards: Best Compliance Solution Category. We see this as recognition of the fact that Securly has made it easier and cheaper than ever for K-12 IT admins to be CIPA compliant.

“Ransomware, nation-state cyber attacks, IoT vulnerabilities, data privacy issues and more are dominating the headlines right now, and it’s critical that we amplify the importance of these problems and highlight the actions organizations can take to safeguard their organizations and their critical data assets,” said Illena Armstrong, VP, editorial, SC Media. “As bad actors are constantly changing strategy, so too are the men, women, and companies endeavoring to stop them in their tracks. These finalists have shown that they are the best at what they do.”


We are selected for Tech & Learning’s Award of ExcellenceWe are honored to have been recognized by Tech & Learning under the “Best Upgraded Product” category. This year alone, we have announced new features that are first-in-industry. We will continue to work towards student safety in 2017!

 

For more about our online student safety initiatives, sign up for our newsletter: