NEW RESOURCE - Parental Control Guidance

Education. . education . . education!

An evening webinar with Layer 8 and an Outstanding Primary School in Bedfordshire.

It starts from Reception years at Primary School, and we never stop learning.

As parents – or relatives, teachers and other adults responsible for children’s safety – we want our children and those we look after to be healthy and happy … and to develop well both physically and mentally. Above all, it’s instinctive that we want kids to be safe.

Children learn through exploration and natural curiosity, and it is part of our job as parents and carers to encourage that. However, as our children grow up and develop and discover new experiences, we have to take more and different steps to ensure their safety.

Until their understanding and instincts catch up with their curiosity, our children need to be protected from everyday dangers – whether crossing the road, in and around the home, trying new foods or talking to new people they meet.

And sooner or later … going online. To be able to give them the best tools possible, we also need an understanding of how the world of cyber can sometimes be, unsavoury.

We are excited to have partnered with a Primary School in Bedfordshire to give teachers and parents an insight into the mind of a hacker

Throughout this webinar, attendees will begin to develop an understanding as to why cyber-criminals are so successful. Experience how it feels to be a victim and how the hacker achieved their goal. We will explore the tricks used by scammers to extract information from their victims.

A common misconception about cyber attackers is they use only highly advanced tools and techniques to hack into people’s computers. This is simply not true. Cyber attackers have learned that often the easiest way to steal your information, hack your accounts, crack your passwords or infect your systems is by tricking you into making a mistake. This is more commonly known as Social engineering.

Social engineering is the term used for a broad range of malicious activities accomplished through human interactions such as Phishing, Spear Phishing, Vishing Baiting and Tailgating. It uses psychological manipulation to trick users into making security mistakes or giving away sensitive information.

Share this post

Share on facebook
Share on google
Share on twitter
Share on linkedin
Share on pinterest
Share on print
Share on email

READ MORE

View our other posts and insights

Scroll to Top