Protect Your Kids from Online Predators

Some practical thoughts to guide parents and grandparents

It can’t happen in my home… can it?

Just because your children are playing online games in the safety of your home doesn’t mean that they are safe from perverts.

This is the reality of today’s digital world.

It’s hard to believe, but every parent’s worst worry is now partly digital: how to protect kids from online predators who can reach children through games, apps and social networks in the safety of your own home. This guide discusses online grooming, practical steps you can take at home, and how tools from Vox and Norton™ can help you keep children safer online.

[Editor’s note: This article comes with a sensitivity warning, particularly for parents, grandparents and other concerned family and friends.]

According to the United Nations Children’s Fund (UNICEF), in South Africa, according to its ‘SA Kids Online Study’, one-third of children in the country are at risk of online violence, exploitation and abuse.

  • One-quarter (25%) of those surveyed confirmed that they had added people whom they’d never met face-to-face to their friends or contacts list.
  • Similarly, nearly one-fifth (18%) of those surveyed had sent a photo or video of themselves to someone they had never met in real life.

 

These stats also confirm just how naïve and vulnerable children can be – and why parents and guardians need to protect them.

Protect kids from online grooming_1

And so, when we read about the pervasiveness of online grooming, your first response as a parent might be: ‘It can’t happen in my home – can it?’ but your second response should be: ‘How can I make absolutely sure that it doesn’t?”

With Vox and global cybersecurity expert company Norton™, parents can exert real parental control by setting up tools to help your kids explore the Internet more safely.

 

Unpacking Online Grooming

In decades past, parents and caregivers worried about ‘flashers’ – perverts lurking around schools in long coats, who waited to suddenly give their young victims an eyeful that they weren’t expecting.

Today, the perverts are looking for the reveal to be the other way around – and the effects can be far more lingering and devastating.

Online grooming

Norton™ warns that, as part of the attempted grooming process: ‘…predators may spend months steadily getting to know their potential victims. They might start this process by contacting children as they play popular online games such as Fortnite or Minecraft.

‘…Once predators gain the trust of their victims, they will then steer conversations more often toward sexual topics and will eventually ask children to engage in sexual conversations, send explicit photos, or meet them in real life.’

Reports have also surfaced of cyber predators infiltrating another online game popular with kids, namely Roblox.

But there ARE ways to fight back – and in the Vox family, we’re definitely here to help.

 

The Danger Lurking Behind Everyday Apps

Vox has teamed up with Norton™, which provides industry-leading antivirus and security software for PC, Mac and mobile devices.

According to Norton, children today gravitate toward social media apps that allow them to connect easily with their friends. But these social networking apps and websites are also favoured by predators who use them to communicate with their intended victims.

Norton says that, in addition to online games, some of the apps that predators may use to communicate with children include WhatsApp, Snapchat, TikTok, Kik, Monkey, Whisper and Chat Avenue.

For any parent, it’s frightening to think about the multiple ways that predators can use technology to find and target their victims.

So let the experts take care of it for you.

child 1073638 1920 | Vox | Protect Your Kids from Online Predators

 

What Norton and Vox can do for you 

Vox has partnered with Norton to make industry-standard protections readily available to families with Norton Family and Norton 360 providing one app for many devices.

These tools don’t replace conversations, but they give you clear alerts, activity reports and the ability to set safe boundaries.

Smart monitoring allows parents to monitor search terms, videos and app downloads; receive alerts for unsafe behaviour; and get detailed activity reports.

In addition, options such as location tracking allow you to define safe zones for your children and receive real-time alerts if those boundaries are crossed. Children can share their location through the mobile app.

All of these safety features – and many more – are available from Norton’s comprehensive protection for your devices and online privacy.

 

Protect Kids from Online Predators at Home

UNICEF says that keeping children safe online also relies on parents and caregivers maintaining open communication; using technology to protect children; spending time with them online; and encouraging healthy online habits

  • Talk regularly and openly: Start conversations about online life the same way you’d talk about who your child plays with in the street. Ask gentle questions: who are your friends online? What games do you play? What apps do you use?
  • Agree house rules: Device-free zones (dinner table, bedrooms at night), time limits for play, and rules about sharing photos or personal information.
  • Use parental controls: Industry tools such as Norton Family and Norton 360 offer activity monitoring, content filtering, screen-time limits, location supervision and alerts for risky behaviour. These tools help you set boundaries while still allowing kids to explore.
  • Co-play and co-view: Sit with younger children while they play online and encourage older children to show you new apps and settings. This builds trust and gives you a live view of who they interact with.
  • Check privacy and friend lists: Make sure profiles are set to private, review followers and friends together, and remind children never to share addresses or phone numbers in chats.
  • Watch for signs: Increased secrecy, sudden changes in behaviour, new devices or new online friends that appear overnight are all red flags.

 

Balancing Safety and Privacy

Monitoring doesn’t mean spying. Explain to your child why you’re using parental controls and that the aim is safety, not punishment. As children grow, shift from more direct monitoring to regular check-ins and shared agreements about responsible online behaviour.

Quick checklist for parents and grandparents (bullet list for snippet targeting)

  • Have an open conversation about online risks this week.
  • Set simple house rules for devices and sharing.
  • Install parental controls and review activity reports weekly.
  • Make social profiles private and review friend lists together.
  • Know how to report abuse to the app/platform and to local authorities.
  • Keep devices in communal spaces for younger children.

 

Before our world became as digital as it is today, parents only had to worry about their children’s safety in the physical environment. Today, we have to be concerned about online predators that can access our homes through our digital devices.

This is all a lot to think about, so why not let Vox and Norton take care of it for you with our comprehensive and proactive suite of solutions?

We’re here to help you keep your children safe in the online world for as long as possible without becoming another statistic.  Please click here for more information.

 

“Making the decision to have a child is momentous. It is to decide forever to have your heart go walking around outside your body.” ~Elizabeth Stone, author

mother 2935723 1280 | Vox | Protect Your Kids from Online Predators

 

Frequently Asked Questions

How can I tell if my child is being groomed online?
Look for signs such as secrecy around devices, sudden new friendships, unexplained gifts, changes in mood or sleep, or attempts to isolate the child from family. If a child is using private messaging apps or deleting chat histories, take note and ask open, non-judgemental questions.

What do Norton parental controls actually do?
Norton Family and Norton 360 provide content filtering, web and search supervision, screen-time controls, social media monitoring, location supervision and alerts for unsafe behaviour. They produce activity reports so you can spot potential problems early.

Will parental controls invade my child’s privacy?
Used thoughtfully, parental controls are a safety tool. Be transparent: explain why you’re using them, involve your child in setting the rules, and gradually reduce monitoring as your child demonstrates responsible behaviour.

At what age should I set up parental controls?
Start young, because even pre-schoolers benefit from basic content filtering and supervised access. For older children, combine tools with conversation and digital literacy lessons so they understand safe behaviour.

What should I do immediately if I suspect grooming?
Stay calm, listen to the child, preserve any evidence (screenshots, chat logs), report the account to the platform, and contact local authorities or child-protection organisations for guidance.

Where can I get help in South Africa if I need to report abuse?
Report serious threats to the police (SAPS) and the platform where it occurred. Seek support from child-protection organisations and trusted local counselling services.

 

 

How To Manage Your Digital Footprint

Protect your personal data – how much key information are you really exposing?

Wherever there are people, there are those who decide to prey on them – this is true for the digital world just as much as the physical. And so, before you take the fun-looking quiz that popped up in your social media feed, think twice – and learn how to manage your digital footprint!

Do you really need to know what your ‘spooky Halloween’, ‘Harry Potter alter ego’ or ‘professional wrestler’ names are, based on a combination of – let’s say – your birth month, the first letter of your name, your street address details and the name of your pets / children?

It’s clear how easy it is to start building up personal information about you based on some of those details.

Most of us have had these seemingly innocent quizzes popping up on our social media feeds at some point. But the software program that’s going to send back the amusing ‘answer’ based on the personal information you shared… might just be a hacker.

Individual pieces of data may seem harmless, but when collected, they can tell a detailed story about your habits, preferences and even personal details like your birthday or location, which allows cybercriminals to go deeper into your online profile for their own personal gain.

Let’s look at ‘digital footprints’ and how much personal information you are actually exposing to the underworld.

 

Footprints Across the World Wide Web

Manage your digital footprint
Learn how to manage your digital footprint!

 A digital footprint means the trail of data you leave when using the Internet, and it can be used to track a person’s online activities and devices. Internet users create their digital footprint either actively or passively, through everyday activities that create it such as social media, browsing, shopping, apps and location services.

The types of data being exposed includes personally identifiable information (PII) such as a phone number or ID number, your financial data, browsing and shopping habits, location tracking, and metadata, including information about your device, your IP address and cookies. Your digital footprint can be used legitimately enough for targeted advertising, when companies use your data to categorise you and show you personalised ads; as well as for data analysis, when companies use technology to collect and analyse this data to build profiles about you – let’s say to offer you better service as a customer.

More sinisterly, though, a comprehensive footprint makes you an attractive target for hackers and scammers and puts you at risk of identity theft and scams. And everyone should be aware that your reputation and potential employment can also be affected, because your online activity can be seen by potential employers.

We look at how to reduce your online footprint.

 

Active Versus Passive

laptop 614213 1280 | Vox | How To Manage Your Digital Footprint

Active digital footprints take place when the Internet user has deliberately shared information about themselves. They include:

    • Social media posts, comments and messages;
    • Emails and newsletters you send and receive;
    • Online purchases and shopping history; and
    • Website content you upload or download.

 

Passive digital footprints are created when information is collected about the user without them being aware that this is happening. They include:

    • Internet browsing and search history;
    • Location data from your phone or devices;
    • Data collected by cookies on websites; and
    • Information from apps and wearable devices.

 

Online Privacy Tips to Protect Your Personal Data and Reduce Your Online Footprint

shield 9553555 1280 | Vox | How To Manage Your Digital Footprint

Here are some tips for protecting your personal data and help you to manage your digital footprint.

  • Double-check your privacy settings on social media to control who sees your posts.
  • Use search engines to check your digital footprint: You could contact the site administrator to see if information about you that you find can be removed. You could also set up Google alerts to keep an eye on your name.
  • Avoid oversharing on social media: Think twice before revealing your location or travel plans, or other personal information like your phone number or email address.
  • Avoid unsafe websites: Make sure you’re transacting with a secure website – the URL should start with https:// rather than http:// – the ‘s’ stands for ‘secure’ and indicates that the site has a security certificate. There should also be a padlock icon to the left of the address bar.
  • Don’t send personal information on public Wi-Fi: A public Wi-Fi network is less secure than your personal one.
  • Delete old accounts: This reduces your exposure to potential data breaches.
  • Create strong passwords and use a password manager: Using a password manager will help generate, store and manage all your passwords in one secure online account.
  • Don’t log in with Facebook: Every time you sign into a third-party website using your Facebook credentials, you give that company permission to mine your Facebook user data.
  • Keep software up to date: Cybercriminals can access a victim’s devices and data by exploiting vulnerabilities in software. You can help prevent this by keeping your software up to date.
  • Review your mobile use: Set a passcode for your mobile device, and when installing an app, read the user agreement. Is the app possibly going to mine personal data like your email, location and online activities?
  • Act fast after a breach: If a financial loss is involved, contact your bank or credit card provider. Change passwords that might have been exposed.
  • Use a VPN: Using a virtual private network, or VPN, can help safeguard your digital footprint. This is because VPNs mask your IP address which makes your online actions virtually untraceable.

 

Digital footprints matter because cybercriminals can exploit your digital footprint, for example using it for phishing for account access, or creating false identities based on your data. You can’t erase your digital footprint entirely, but you can control its visibility.

Why not use the steps outlined here to look at your online presence today and see how you can make your digital footprint more manageable, to better protect your online privacy and yourself?

Keeping your digital privacy in South Africa (and around the globe) safer and more secure will help to keep your banking and other details private and therefore safer, in turn bringing you increased peace of mind.

The message is clear: no more funny quizzes to find out your Harry Potter alter ego, because there’s nothing at all magical about being hacked.

Vox has teamed up with Norton to help individuals and also families to stay safe online – you can block hackers from accessing your devices, keep your online activity private and better protect your identity.

 

Frequently Asked Questions

What is a digital footprint?
A digital footprint is the trail of information you leave online from actions like social posts, searches, purchases and app use. It includes active data you deliberately share and passive data collected about your device, location and browsing habits.

Why does my digital footprint matter?
Your digital footprint can be used for personalised services and ads, but it also makes you a target for scams, identity theft and reputation risks — for example, employers or fraudsters may view or use that information.

How can I check what’s in my digital footprint?
Start by Googling your name, checking social profiles, and using Google Alerts for your name. Review privacy settings on social sites and request removal from sites or directories that publish your personal details.

What simple steps help manage your digital footprint?
Limit what you share on social media, tighten privacy settings, delete old accounts, use strong unique passwords with a password manager, and avoid logging into third‑party sites with Facebook or Google where possible.

Are online quizzes and personality apps safe?
Many quizzes ask for pieces of personal data that, when combined, can be exploited. Treat them sceptically — don’t give out real birthdates, ID numbers, addresses or your mother’s maiden name for a bit of fun.

How can I protect personal data on my mobile device and apps?
Set a passcode or biometric lock, check app permissions before installing (location, contacts, microphone), update apps and the OS regularly, and avoid using public Wi‑Fi for sensitive transactions unless you use a trusted VPN.

What should I do if my personal data is exposed in a breach?
Act quickly: change passwords, notify your bank or card provider if financial details were involved, enable two‑factor authentication, and monitor accounts for unauthorised activity or identity fraud.

Will a VPN and password manager improve my digital privacy?
Yes. A reputable VPN masks your IP and helps protect activity on public networks, while a password manager generates and stores strong unique passwords — together they significantly reduce your exposure when managing your digital footprint.