{"id":14698,"date":"2018-10-03T16:29:34","date_gmt":"2018-10-03T16:29:34","guid":{"rendered":"https:\/\/blog.trendmicro.com\/?p=542113"},"modified":"2018-10-03T16:29:34","modified_gmt":"2018-10-03T16:29:34","slug":"keeping-kids-safe-online-starts-with-good-habits-at-home","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/keeping-kids-safe-online-starts-with-good-habits-at-home\/","title":{"rendered":"Keeping Kids Safe Online Starts with Good Habits at Home"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"200\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/10\/NCSAM-300x200.jpg\" class=\"attachment-medium size-medium wp-post-image\" alt=\"\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/10\/NCSAM-300x200.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/10\/NCSAM-768x512.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/10\/NCSAM-640x426.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/10\/NCSAM-440x293.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/10\/NCSAM-380x253.jpg 380w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/10\/NCSAM.jpg 800w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\"\/><\/p>\n<p>During the month of October, we celebrate <a href=\"https:\/\/staysafeonline.org\/ncsam\/themes\/\">National Cybersecurity Awareness Month<\/a> (NCSAM). This long-running annual event is all about raising awareness about the importance of protecting our information and privacy online. And for some of us who may have allowed our good habits to lapse, it offers a chance to refresh our knowledge. Although the initiative covers a range of areas \u2014 from protecting national critical infrastructure to getting more kids into cybersecurity careers \u2014 it begins in week one with a focus on cybersecurity in the home.<\/p>\n<p>For families of school-aged kids, this is a great time to ensure the environment you\u2019ve set up at home means they have the best and safest online experience possible.<\/p>\n<p><strong>From then to now<\/strong><\/p>\n<p>We\u2019ve come a long way since NCSAM was first launched in 2004. Back then, Facebook had just been created and was years away from becoming a household name. Internet threats were relatively unsophisticated, and limited in scope and volume. Your kids were more likely to be playing hand-held gaming devices in the school yard than fiddling with their cell phones. In fact, it\u2019s unlikely they would have had on-the-go internet access at all, with clunky feature phones still the norm.<\/p>\n<p>How times have changed. Today we live in a mobile-centric, hyper-connected world where online threats are never far away. Trend Micro <a href=\"https:\/\/documents.trendmicro.com\/assets\/rpt\/rpt-2018-Midyear-Security-Roundup-unseen-threats-imminent-losses.pdf\">blocked<\/a> over 20.4 billion in the first six months of 2018 alone. Smartphones are a great tool for kids to stay connected with parents and friends, but we also want to keep them safe: not just from malware and identity theft but inappropriate content, cyber-bullying, grooming and other online threats. With the average American teenager spending 4.5 hours each day on their phone, <a href=\"https:\/\/thinkdifferentlyaboutkids.com\/letter\/?acc=1\">legitimate concerns have also been raised<\/a> over how much screen time we should be allowing them.<\/p>\n<p>This isn\u2019t meant to shock you into action. As a concerned parent you\u2019ll already no doubt be aware of some of the negative aspects of our increasingly digital-centric lifestyles. Let\u2019s instead take a look at some concrete actions you can take to make things better for your family.<\/p>\n<p><strong>A safer home<\/strong><\/p>\n<p>This year, the theme of NCSAM is <em>Our Shared Responsibility<\/em>. With that in mind, we\u2019d like to do our part by offering up a few ideas to help you improve online safety at home:<\/p>\n<ol>\n<li><strong>Set up a good place in the home for kids to access the internet<\/strong><\/li>\n<\/ol>\n<p>A family area with the home PC in the living room or kitchen can help as it will enable you to monitor internet use directly. Similarly, if you create charging rooms in the shared areas, it reduces the likelihood of devices being used in bedrooms all night. If they have friends over, make sure these visitors also know the rules.<\/p>\n<ol start=\"2\">\n<li><strong>Technology can help<\/strong><\/li>\n<\/ol>\n<p>Make the most of the built-in security and privacy protections that come with many consumer electronics, apps and web services today:<\/p>\n<ul>\n<li>Use parental controls via router or security software on each device to ensure kids only access sites\/services appropriate for them<\/li>\n<li>Switch on restrictions native to devices, apps or websites to ensure kids only download games\/apps appropriate for their age. Sites like Google and YouTube, stores like iTunes, services like Spotify, and gaming consoles like Xbox have their own settings to help you<\/li>\n<li>Turn off access to mobile device cameras, microphones and location services on your kids\u2019 apps, games, etc. if they\u2019re not functionally necessary<\/li>\n<\/ul>\n<ol start=\"3\">\n<li><strong>Set the rules<\/strong><\/li>\n<\/ol>\n<p>It\u2019s important before you start to set some ground rules around the use of technology and the internet at home. These could include:<\/p>\n<ul>\n<li>Ask before downloading\/using\/connecting<\/li>\n<li>Don\u2019t connect with strangers online, or give out any personal information<\/li>\n<li>Tell parents if a stranger contacts you<\/li>\n<\/ul>\n<ol start=\"4\">\n<li><strong>Use technology together<\/strong><\/li>\n<\/ol>\n<p>Technology should be an opportunity to bring the family closer together, rather than building yet another wall between parents and their children. Try the following:<\/p>\n<ul>\n<li>Learn a new app or play a new game as a family<\/li>\n<li>When your kids make a mistake, be sure to use it as a moment to teach, not take away<\/li>\n<\/ul>\n<p>After a decade, Trend Micro\u2019s Internet Safety for Kids and Families (ISKF) initiative has reached nearly two million parents, teachers and kids over that time. \u00a0We are proud to help celebrate National Cybersecurity Awareness Month. But we believe that any month in any home is a good time and place to help our kids practice habits that will help them be safe and responsible online well into adulthood.<\/p>\n<p>For more topics and tips on keeping your kids safe online, check out our <a href=\"http:\/\/internetsafety.trendmicro.com\/\">extensive resources<\/a>. Have a great National Cybersecurity Awareness Month!<\/p>\n<p> Read More <a href=\"https:\/\/blog.trendmicro.com\/keeping-kids-safe-online-starts-with-good-habits-at-home\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>During the month of October, we celebrate National Cybersecurity Awareness Month (NCSAM). This long-running annual event is all about raising awareness about the importance of protecting our information and privacy online. And for some of us who may have allowed our good habits to lapse, it offers a chance to refresh our knowledge. Although the&#8230;<br \/>\nThe post Keeping Kids Safe Online Starts with Good Habits at Home appeared first on . Read More HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":14699,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[61],"tags":[390],"class_list":["post-14698","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-trendmicro","tag-consumer"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Keeping Kids Safe Online Starts with Good Habits at Home 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/keeping-kids-safe-online-starts-with-good-habits-at-home\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Keeping Kids Safe Online Starts with Good Habits at Home 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/keeping-kids-safe-online-starts-with-good-habits-at-home\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2018-10-03T16:29:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/10\/keeping-kids-safe-online-starts-with-good-habits-at-home.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/keeping-kids-safe-online-starts-with-good-habits-at-home\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/keeping-kids-safe-online-starts-with-good-habits-at-home\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Keeping Kids Safe Online Starts with Good Habits at Home\",\"datePublished\":\"2018-10-03T16:29:34+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/keeping-kids-safe-online-starts-with-good-habits-at-home\\\/\"},\"wordCount\":787,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/keeping-kids-safe-online-starts-with-good-habits-at-home\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/10\\\/keeping-kids-safe-online-starts-with-good-habits-at-home.jpg\",\"keywords\":[\"Consumer\"],\"articleSection\":[\"TrendMicro\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/keeping-kids-safe-online-starts-with-good-habits-at-home\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/keeping-kids-safe-online-starts-with-good-habits-at-home\\\/\",\"name\":\"Keeping Kids Safe Online Starts with Good Habits at Home 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/keeping-kids-safe-online-starts-with-good-habits-at-home\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/keeping-kids-safe-online-starts-with-good-habits-at-home\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/10\\\/keeping-kids-safe-online-starts-with-good-habits-at-home.jpg\",\"datePublished\":\"2018-10-03T16:29:34+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/keeping-kids-safe-online-starts-with-good-habits-at-home\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/keeping-kids-safe-online-starts-with-good-habits-at-home\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/keeping-kids-safe-online-starts-with-good-habits-at-home\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/10\\\/keeping-kids-safe-online-starts-with-good-habits-at-home.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/10\\\/keeping-kids-safe-online-starts-with-good-habits-at-home.jpg\",\"width\":300,\"height\":200},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/keeping-kids-safe-online-starts-with-good-habits-at-home\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Consumer\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/consumer\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Keeping Kids Safe Online Starts with Good Habits at Home\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Keeping Kids Safe Online Starts with Good Habits at Home 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/keeping-kids-safe-online-starts-with-good-habits-at-home\/","og_locale":"en_US","og_type":"article","og_title":"Keeping Kids Safe Online Starts with Good Habits at Home 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/keeping-kids-safe-online-starts-with-good-habits-at-home\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2018-10-03T16:29:34+00:00","og_image":[{"width":300,"height":200,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/10\/keeping-kids-safe-online-starts-with-good-habits-at-home.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/keeping-kids-safe-online-starts-with-good-habits-at-home\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/keeping-kids-safe-online-starts-with-good-habits-at-home\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Keeping Kids Safe Online Starts with Good Habits at Home","datePublished":"2018-10-03T16:29:34+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/keeping-kids-safe-online-starts-with-good-habits-at-home\/"},"wordCount":787,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/keeping-kids-safe-online-starts-with-good-habits-at-home\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/10\/keeping-kids-safe-online-starts-with-good-habits-at-home.jpg","keywords":["Consumer"],"articleSection":["TrendMicro"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/keeping-kids-safe-online-starts-with-good-habits-at-home\/","url":"https:\/\/www.threatshub.org\/blog\/keeping-kids-safe-online-starts-with-good-habits-at-home\/","name":"Keeping Kids Safe Online Starts with Good Habits at Home 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/keeping-kids-safe-online-starts-with-good-habits-at-home\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/keeping-kids-safe-online-starts-with-good-habits-at-home\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/10\/keeping-kids-safe-online-starts-with-good-habits-at-home.jpg","datePublished":"2018-10-03T16:29:34+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/keeping-kids-safe-online-starts-with-good-habits-at-home\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/keeping-kids-safe-online-starts-with-good-habits-at-home\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/keeping-kids-safe-online-starts-with-good-habits-at-home\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/10\/keeping-kids-safe-online-starts-with-good-habits-at-home.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/10\/keeping-kids-safe-online-starts-with-good-habits-at-home.jpg","width":300,"height":200},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/keeping-kids-safe-online-starts-with-good-habits-at-home\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Consumer","item":"https:\/\/www.threatshub.org\/blog\/tag\/consumer\/"},{"@type":"ListItem","position":3,"name":"Keeping Kids Safe Online Starts with Good Habits at Home"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/14698","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=14698"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/14698\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/14699"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=14698"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=14698"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=14698"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}