{"id":10568,"date":"2021-08-18T11:02:58","date_gmt":"2021-08-18T11:02:58","guid":{"rendered":"https:\/\/acora.local\/?p=10568"},"modified":"2024-05-24T14:52:24","modified_gmt":"2024-05-24T14:52:24","slug":"protecting-the-innocent","status":"publish","type":"post","link":"https:\/\/acora.s.nomatter.dev\/nltest\/news\/archive\/protecting-the-innocent\/","title":{"rendered":"Protecting the Innocent"},"content":{"rendered":"\r\n<p>For us as IT professionals, the deceptively simple term \u2018security\u2019 encompasses a vast range of tasks and topics. And after spending all day dealing with <a href=\"https:\/\/acora.com\/our-services\/managed-services\/cyber-security\/managed-firewall-service\/\">firewalls<\/a>, Web Application Gateways, anti-virus, anti-malware, proxy services, tenancy restrictions, just-in-time admin access, password vaults, Event Detection and Response, disaster recovery and the rest, security is probably the last thing we want to think about when we get home.<\/p>\r\n\r\n\r\n\r\n<p>Then come the summer holidays.<\/p>\r\n\r\n\r\n\r\n<p>Suddenly, we\u2019re aware that our children are using a whole array of internet-capable devices and toys, with their own email and social media accounts and connections that aren\u2019t safely behind firewalls and other protections we can control. In our work life, this would, could and should never happen. Yet here we are: the most vulnerable users and the highest-risk environment imaginable, right under our own roof.<\/p>\r\n\r\n\r\n\r\n<p>So how do those of us who are parents and guardians keep our kids safe online, without home life simply turning into a busman\u2019s holiday?<\/p>\r\n\r\n\r\n\r\n<p>In business, we choose our ecosystems carefully and stick with them. It should be no different at home, where the fewer ecosystems you have, the easier they are to manage. The three big decisions concern:<\/p>\r\n\r\n\r\n\r\n<ul class=\"wp-block-list\">\r\n<li>Laptops and desktops \u2013 Microsoft vs Apple<\/li>\r\n<li>Phones and tablets \u2013 Apple vs Android<\/li>\r\n<li>Automation \u2013 Google, Amazon, Ring, Eufy and so on<\/li>\r\n<\/ul>\r\n\r\n\r\n\r\n<p>When it comes to other elements \u2013 wireless speakers, printers, storage appliances \u00a0\u2013 limiting the mix reduces the number of logins and management portals you need to look after.<\/p>\r\n\r\n\r\n\r\n<p>Securing your existing home devices beings with basics that are familiar to all of us but are easy to miss, including:<\/p>\r\n\r\n\r\n\r\n<ul class=\"wp-block-list\">\r\n<li>Managing logins and passwords. In my experience, this is the toughest job with children when it comes to IT. But teaching them the importance of securing those logins is critical for everyone\u2019s safety and security, since you and your ecosystems are all linked together<\/li>\r\n<li>Checking all devices before dropping them onto your network \u2013 wifi or wired<\/li>\r\n<li>Keeping firmware and software up to date on all your devices, right down to the smart lightbulb in the living-room lamp<\/li>\r\n<\/ul>\r\n\r\n\r\n\r\n<p>You also need to consider each ecosystem\u2019s capabilities and limitations. Ideally, this is something to check before you buy, but of course, this isn\u2019t always possible. In our house, we have four, which I manage as follows:<\/p>\r\n\r\n\r\n\r\n<ul class=\"wp-block-list\">\r\n<li>Microsoft \u2013 all our laptops run Windows 10, and we\u2019re subscribed to\u00a0<a href=\"https:\/\/go.microsoft.com\/fwlink\/p\/?linkid=2013703&amp;CLCID=0x809&amp;culture=en-gb&amp;country=GB\" target=\"_blank\" rel=\"noreferrer noopener\"><span class=\"has-inline-color\" style=\"color: #ed1c24;\">Microsoft 365 Family<\/span><\/a>.\u00a0 This lets me govern all my family logins and allows everyone to use their device safely with a common set of web and application limits. (Handily, it also covers Xbox in terms of screen time and limits.) I was pleasantly surprised to find the Family Safety app is very well-featured: my wife and I can both receive and respond to web access and time extension requests easily.<\/li>\r\n<li>Apple \u2013 our chosen ecosystem for mobiles and tablets. I\u2019ve learned to repair the devices myself \u2013 something I\u2019d highly recommend to keep costs down! For me, the Family Sharing Group and Screentime functionality, which includes web and app limits and two-way device tracking, are second to none. They\u2019re common across all IOS devices (apart from Apple TV which has its own limitations) and you manage the platform directly from your own device.<\/li>\r\n<li>Nintendo Switch \u2013 our chosen gaming platform. I\u2019ve limited my children\u2019s access to online play quite effectively; again, managed from an app on my personal Apple device.<\/li>\r\n<li>Eufy Security \u2013 my chosen security platform, including doorbell, because the data stays on-premise rather than being housed in the cloud. There\u2019s no subscription, and the system works effectively even if the internet goes down.<\/li>\r\n<\/ul>\r\n\r\n\r\n\r\n<p>The ultimate goal is to give our children the skills to protect themselves and make good choices about who they interact with, and how. But while they\u2019re still young, it\u2019s our responsibility as parents and carers to keep them safe. So whatever devices and ecosystems we choose, we MUST make sure they\u2019re managed \u2013 and apply the principles we use at work to ourselves. Of course, the one downside of getting it right is that all your friends with children will notice and start asking for help\u2026if it happens, please accept my apologies!<\/p>\r\n","protected":false},"excerpt":{"rendered":"<p>For us as IT professionals, the deceptively simple term \u2018security\u2019 encompasses a vast range of tasks and topics. And after spending all day dealing with firewalls, Web Application Gateways, anti-virus, anti-malware, proxy services, tenancy restrictions, just-in-time admin access, password vaults,&#8230;<\/p>\n","protected":false},"author":13,"featured_media":10569,"comment_status":"closed","ping_status":"open","sticky":false,"template":"full-width-single-post.blade.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-10568","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-archive"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.5 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Protecting the Innocent - Acora NL Test<\/title>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Protecting the Innocent\" \/>\n<meta property=\"og:description\" content=\"For us as IT professionals, the deceptively simple term \u2018security\u2019 encompasses a vast range of tasks and topics. And after spending all day dealing with firewalls, Web Application Gateways, anti-virus, anti-malware, proxy services, tenancy restrictions, just-in-time admin access, password vaults,...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/acora.s.nomatter.dev\/nltest\/news\/archive\/protecting-the-innocent\/\" \/>\n<meta property=\"og:site_name\" content=\"Acora NL Test\" \/>\n<meta property=\"article:published_time\" content=\"2021-08-18T11:02:58+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-24T14:52:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/acora-staging.b-cdn.net\/app\/uploads\/sites\/5\/2021\/08\/DAM-Protect-innocent.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"David Murphy\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"David Murphy\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nltest\\\/news\\\/archive\\\/protecting-the-innocent\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nltest\\\/news\\\/archive\\\/protecting-the-innocent\\\/\"},\"author\":{\"name\":\"David Murphy\",\"@id\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nltest\\\/#\\\/schema\\\/person\\\/a6e310effbb31ff6579d8af577d68d79\"},\"headline\":\"Protecting the Innocent\",\"datePublished\":\"2021-08-18T11:02:58+00:00\",\"dateModified\":\"2024-05-24T14:52:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nltest\\\/news\\\/archive\\\/protecting-the-innocent\\\/\"},\"wordCount\":699,\"image\":{\"@id\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nltest\\\/news\\\/archive\\\/protecting-the-innocent\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/acora-staging.b-cdn.net\\\/app\\\/uploads\\\/sites\\\/5\\\/2021\\\/08\\\/DAM-Protect-innocent.jpg\",\"articleSection\":[\"Acora Archives\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nltest\\\/news\\\/archive\\\/protecting-the-innocent\\\/\",\"url\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nltest\\\/news\\\/archive\\\/protecting-the-innocent\\\/\",\"name\":\"Protecting the Innocent - Acora NL Test\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nltest\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nltest\\\/news\\\/archive\\\/protecting-the-innocent\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nltest\\\/news\\\/archive\\\/protecting-the-innocent\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/acora-staging.b-cdn.net\\\/app\\\/uploads\\\/sites\\\/5\\\/2021\\\/08\\\/DAM-Protect-innocent.jpg\",\"datePublished\":\"2021-08-18T11:02:58+00:00\",\"dateModified\":\"2024-05-24T14:52:24+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nltest\\\/#\\\/schema\\\/person\\\/a6e310effbb31ff6579d8af577d68d79\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nltest\\\/news\\\/archive\\\/protecting-the-innocent\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/acora.s.nomatter.dev\\\/nltest\\\/news\\\/archive\\\/protecting-the-innocent\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nltest\\\/news\\\/archive\\\/protecting-the-innocent\\\/#primaryimage\",\"url\":\"https:\\\/\\\/acora-staging.b-cdn.net\\\/app\\\/uploads\\\/sites\\\/5\\\/2021\\\/08\\\/DAM-Protect-innocent.jpg\",\"contentUrl\":\"https:\\\/\\\/acora-staging.b-cdn.net\\\/app\\\/uploads\\\/sites\\\/5\\\/2021\\\/08\\\/DAM-Protect-innocent.jpg\",\"width\":1920,\"height\":1080},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nltest\\\/news\\\/archive\\\/protecting-the-innocent\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nltest\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Acora News\",\"item\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nltest\\\/news\\\/category\\\/acoranews\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Protecting the Innocent\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nltest\\\/#website\",\"url\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nltest\\\/\",\"name\":\"Acora NL Test\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nltest\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nltest\\\/#\\\/schema\\\/person\\\/a6e310effbb31ff6579d8af577d68d79\",\"name\":\"David Murphy\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8aa65039464ce67697eee8ca7459a2542a98fe0bf5dae592bea2011ee853fbbe?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8aa65039464ce67697eee8ca7459a2542a98fe0bf5dae592bea2011ee853fbbe?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8aa65039464ce67697eee8ca7459a2542a98fe0bf5dae592bea2011ee853fbbe?s=96&d=mm&r=g\",\"caption\":\"David Murphy\"},\"url\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nltest\\\/news\\\/author\\\/dmurphyacora-com\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Protecting the Innocent - Acora NL Test","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_GB","og_type":"article","og_title":"Protecting the Innocent","og_description":"For us as IT professionals, the deceptively simple term \u2018security\u2019 encompasses a vast range of tasks and topics. And after spending all day dealing with firewalls, Web Application Gateways, anti-virus, anti-malware, proxy services, tenancy restrictions, just-in-time admin access, password vaults,...","og_url":"https:\/\/acora.s.nomatter.dev\/nltest\/news\/archive\/protecting-the-innocent\/","og_site_name":"Acora NL Test","article_published_time":"2021-08-18T11:02:58+00:00","article_modified_time":"2024-05-24T14:52:24+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/acora-staging.b-cdn.net\/app\/uploads\/sites\/5\/2021\/08\/DAM-Protect-innocent.jpg","type":"image\/jpeg"}],"author":"David Murphy","twitter_card":"summary_large_image","twitter_misc":{"Written by":"David Murphy","Estimated reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/acora.s.nomatter.dev\/nltest\/news\/archive\/protecting-the-innocent\/#article","isPartOf":{"@id":"https:\/\/acora.s.nomatter.dev\/nltest\/news\/archive\/protecting-the-innocent\/"},"author":{"name":"David Murphy","@id":"https:\/\/acora.s.nomatter.dev\/nltest\/#\/schema\/person\/a6e310effbb31ff6579d8af577d68d79"},"headline":"Protecting the Innocent","datePublished":"2021-08-18T11:02:58+00:00","dateModified":"2024-05-24T14:52:24+00:00","mainEntityOfPage":{"@id":"https:\/\/acora.s.nomatter.dev\/nltest\/news\/archive\/protecting-the-innocent\/"},"wordCount":699,"image":{"@id":"https:\/\/acora.s.nomatter.dev\/nltest\/news\/archive\/protecting-the-innocent\/#primaryimage"},"thumbnailUrl":"https:\/\/acora-staging.b-cdn.net\/app\/uploads\/sites\/5\/2021\/08\/DAM-Protect-innocent.jpg","articleSection":["Acora Archives"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/acora.s.nomatter.dev\/nltest\/news\/archive\/protecting-the-innocent\/","url":"https:\/\/acora.s.nomatter.dev\/nltest\/news\/archive\/protecting-the-innocent\/","name":"Protecting the Innocent - Acora NL Test","isPartOf":{"@id":"https:\/\/acora.s.nomatter.dev\/nltest\/#website"},"primaryImageOfPage":{"@id":"https:\/\/acora.s.nomatter.dev\/nltest\/news\/archive\/protecting-the-innocent\/#primaryimage"},"image":{"@id":"https:\/\/acora.s.nomatter.dev\/nltest\/news\/archive\/protecting-the-innocent\/#primaryimage"},"thumbnailUrl":"https:\/\/acora-staging.b-cdn.net\/app\/uploads\/sites\/5\/2021\/08\/DAM-Protect-innocent.jpg","datePublished":"2021-08-18T11:02:58+00:00","dateModified":"2024-05-24T14:52:24+00:00","author":{"@id":"https:\/\/acora.s.nomatter.dev\/nltest\/#\/schema\/person\/a6e310effbb31ff6579d8af577d68d79"},"breadcrumb":{"@id":"https:\/\/acora.s.nomatter.dev\/nltest\/news\/archive\/protecting-the-innocent\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/acora.s.nomatter.dev\/nltest\/news\/archive\/protecting-the-innocent\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/acora.s.nomatter.dev\/nltest\/news\/archive\/protecting-the-innocent\/#primaryimage","url":"https:\/\/acora-staging.b-cdn.net\/app\/uploads\/sites\/5\/2021\/08\/DAM-Protect-innocent.jpg","contentUrl":"https:\/\/acora-staging.b-cdn.net\/app\/uploads\/sites\/5\/2021\/08\/DAM-Protect-innocent.jpg","width":1920,"height":1080},{"@type":"BreadcrumbList","@id":"https:\/\/acora.s.nomatter.dev\/nltest\/news\/archive\/protecting-the-innocent\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/acora.s.nomatter.dev\/nltest\/"},{"@type":"ListItem","position":2,"name":"Acora News","item":"https:\/\/acora.s.nomatter.dev\/nltest\/news\/category\/acoranews\/"},{"@type":"ListItem","position":3,"name":"Protecting the Innocent"}]},{"@type":"WebSite","@id":"https:\/\/acora.s.nomatter.dev\/nltest\/#website","url":"https:\/\/acora.s.nomatter.dev\/nltest\/","name":"Acora NL Test","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/acora.s.nomatter.dev\/nltest\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https:\/\/acora.s.nomatter.dev\/nltest\/#\/schema\/person\/a6e310effbb31ff6579d8af577d68d79","name":"David Murphy","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/8aa65039464ce67697eee8ca7459a2542a98fe0bf5dae592bea2011ee853fbbe?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/8aa65039464ce67697eee8ca7459a2542a98fe0bf5dae592bea2011ee853fbbe?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8aa65039464ce67697eee8ca7459a2542a98fe0bf5dae592bea2011ee853fbbe?s=96&d=mm&r=g","caption":"David Murphy"},"url":"https:\/\/acora.s.nomatter.dev\/nltest\/news\/author\/dmurphyacora-com\/"}]}},"_links":{"self":[{"href":"https:\/\/acora.s.nomatter.dev\/nltest\/wp-json\/wp\/v2\/posts\/10568","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/acora.s.nomatter.dev\/nltest\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/acora.s.nomatter.dev\/nltest\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/acora.s.nomatter.dev\/nltest\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/acora.s.nomatter.dev\/nltest\/wp-json\/wp\/v2\/comments?post=10568"}],"version-history":[{"count":1,"href":"https:\/\/acora.s.nomatter.dev\/nltest\/wp-json\/wp\/v2\/posts\/10568\/revisions"}],"predecessor-version":[{"id":17104,"href":"https:\/\/acora.s.nomatter.dev\/nltest\/wp-json\/wp\/v2\/posts\/10568\/revisions\/17104"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/acora.s.nomatter.dev\/nltest\/wp-json\/wp\/v2\/media\/10569"}],"wp:attachment":[{"href":"https:\/\/acora.s.nomatter.dev\/nltest\/wp-json\/wp\/v2\/media?parent=10568"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/acora.s.nomatter.dev\/nltest\/wp-json\/wp\/v2\/categories?post=10568"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/acora.s.nomatter.dev\/nltest\/wp-json\/wp\/v2\/tags?post=10568"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}