How can we protect our children online?

How can we protect our children online?

According to the National Crime Agency more than 2,500 arrests were made last year in the UK, after Facebook reported offenders for trying to entice children into sharing indecent images or meeting in real life.

Today’s children and teenagers have grown up in the online world, and with all its benefits, these arrests are proof of the darker side of the digital space. So how can we better our children and teenagers online?

On this week’s teissPodcast I had the honour of speaking with Lorin LaFave, the mother of Breck Bednar, who was murdered in 2014 after being groomed online. Two weeks after her son’s murder, Lorin set up the Breck Foundation to educate young people and their parents about online grooming and internet safety.

In the interview, Lorin talks about the misconceptions about online grooming, what measures she would like to see put in place when it comes to security by design for products and games and what she feels the cyber security industry could be doing to improve internet safety.

Do watch Breck’s Last Game; it's a tragic, powerful and important story. Details about the Breck Foundation Ball can be found here.

Photo: Breck Bednar

Presenter: Anna Delaney

iTunes: https://itunes.apple.com/gb/podcast/cracking-cyber-security-podcast-from-teiss/id1378994502?mt=2

Stitcher: https://www.stitcher.com/podcast/business-reporter/cracking-cyber-security-podcast

Copyright Lyonsdown Limited 2021

Top Articles

Clubhouse data leak: Data of 1.3m users dumped on a hacker forum

An SQL database containing records of 1.3 million Clubhouse users has been leaked for free on a popular hacker forum.

Iran terms Israeli cyber attack on nuke facility as "nuclear terrorism"

A rumoured cyber attack carried out by Mossad, Israel's official spy agency, destroyed legacy IR-1 centrifuges at Iran's underground nuclear facility located in Natanz.

The Hunt for Red Insider

The analogy to The Hunt For Red October is not far removed from the common reality of cybersecurity.

Related Articles