Information and communication technology has become an integral part of teenagers day-to-day life. It has just transformed the way we communicate, make friends, share updates, play games, and do shopping and so on.


  • Kids and Teens need to know that you and other family members can walk in and out of the room any time and can ask them about what they’re doing online.
  • It’s important to emphasize the concept of credibility to teens.
  • Even the most tech-savvy kids need to understand that not everything they see on the Internet is true, that people on the Internet may not be who they appear to be, that information or images they share can be seen far and wide, and that once something is posted online, it’s close to impossible to “take it back.”
  • Because they don’t see facial expressions, body language, and other visual cues online, teens may feel free to do or say things online that they wouldn’t offline.
  • Remind them that behind the screen names, profiles, and avatars are real people with real feelings.
  • Talk to your teens about avoiding sex talk online. Research shows that teens who don’t talk about sex with strangers online are less likely to come in contact with predators.
  • In fact, researchers have found that predators usually don’t pose as children or teens, and most teens who are contacted by adults they don’t know find it creepy.
  • Teens should not hesitate to ignore or block them. Install file-sharing software properly.
  • Activate the proper default settings so that nothing private is shared. By default, almost all P2P file-sharing apps will share downloads in your “save” or “download” folder.
  • That’s why it’s important to set it not to. If you don’t set the defaults properly, other P2P users may access files you never meant to share, including personal documents on your hard drive, like your tax returns or other financial documents.

Cyberbullying is bullying or harassment that happens online. It can happen in an email, a text message, an online game, or comments on a social networking site. It might involve rumors or images posted on someone’s profile or passed around for others to see, or creating a group or page to make a person feel left out.

Child grooming  (a.k.a. enticement of children or solicitation of children for sexual purposes) "can be described as a practice by means of which an adult 'befriends' a child (often online, but offline grooming also exists and should not be neglected) with the intention of sexually abusing her/him"

Children’s Online Privacy Protection Act (COPPA) helps parents protect their children’s privacy by giving you specific rights. COPPA requires websites to get parental consent before collecting or sharing information from children under 13. The law covers sites designed for kids under 13 and general audience sites that know certain users are under 13. COPPA protects information that websites collect upfront and information that kids give out or post later.

Protecting Children’s Privacy Under COPPA - Cybermaterial

The Internet offers a world of opportunities. 

People of all ages are:
- Posting video from mobile devices

- Building online profiles
texting each other from their mobile devices.

-Creating alter egos in the form of online avatars

-Connecting with friends online they don’t see regularly in person

-Sending photos to friends

-Broadcasting what they’re doing to hundreds of people

Talk to your kids about online threats.

Read Full CISA Booklet


A Practical Guide to Teen Business and Cybersecurity

This book series isn't necessarily about financial endeavors, the love of money and power or pushing teens into any particular business-centric direction. Your children study history and mathematics without the motivating factor of being a professional historian or mathematician. This book of business and cybersecurity should be studied in the...

Read more


Cybersmart Challenge

Teacher-led activities using animated videos to introduce primary school students to key online safety issues including cyberbullying, protecting personal information and sharing images. Students will be better equipped to understand and manage key online safety issues, including inappropriate or unwanted contact, cyberbullying and the risks of sharing images online.

Read more



In the field of computer security, is the process of attempting to hack into a person's webcam and activate it without the webcam owner's permission.

Read more




Welcome Back!

Login to your account below

Retrieve your password

Please enter your username or email address to reset your password.

Add New Playlist