Reading view

There are new articles available, click to refresh the page.

What to Do If Your Email Is Hacked

I think I could count on one hand the people I know who have NOT had their email hacked. Maybe they found a four-leaf clover when they were kids! Email hacking is one of the very unfortunate downsides of living in our connected, digital world. And it usually occurs as a result of a data breach – a situation that even the savviest tech experts find themselves in.

What is a data breach?

In simple terms, a data breach happens when personal information is accessed, disclosed without permission, or lost. Companies, organisations, and government departments of any size can be affected. Data stolen can include customer login details (email addresses and passwords), credit card numbers, identifying IDs of customers e.g. driver’s license numbers and/or passport numbers, confidential customer information, company strategy, or even matters of national security.

Data breaches have made headlines, particularly over the last few years. When the Optus and Medibank data breaches hit the news in 2022 affecting almost 10 million Aussies apiece, we were all shaken. But then when Aussie finance company Latitude was affected in 2023 with a whopping 14 million people from both Australia and New Zealand, it almost felt inevitable that by now, most of us would have been impacted.

The reality is that data breaches have been happening for years. In fact, the largest data breach in Australian history happened in 2019 to the online design site Canva which affected 139 million users globally. In short, it can happen to anyone, and the chances are you may have already been affected.

Your email is more valuable than you think

The sole objective of a hacker is to get their hands on your data. Any information that you share in your email account can be very valuable to them. Why do they want your data, you ask? It’s simple really – so they can cash in!

Some will keep the juicy stuff for themselves – passwords or logins to government departments or large companies they may want to ’target’ with the aim of extracting valuable data and/or funds. The more sophisticated ones will sell your details including name, telephone, email address, and credit card details to cash in on the dark web. They often do this in batches. Some experts believe they can get as much as AU$250 for a full set of details including credit cards. So, you can see why they’d be interested in you.

The other reason why hackers will be interested in your email address and password is that many of us re-use our login details across our other online accounts. Once they’ve got their hands on your email credentials, they may be able to access your online banking and investment accounts, if you use the same credentials everywhere. So, you can see why I harp on about using a unique password for every online account!

How big is the problem?

There is a plethora of statistics on just how big this issue is – all of them concerning. According to the Australian Institute of Criminology, of all the country’s cybercrime reports in 2024, about 21.9% involved identity theft and misuse. The Australian Bureau of Statistics adds that the identity theft victimisation rate has steadily increased from 0.8% to 1.2% from 2021 to 2024, respectively.

Meanwhile, The Australian Government revealed that at least one cybercrime is reported every 6 minutes, with business email compromise alone costing the national economy up to $84 million in losses. Regardless of which statistic you choose to focus on, we have a big issue on our hands.

How does an email account get hacked?

Hackers use a range of techniques—some highly sophisticated, others deceptively simple—to gain access. It is important to know how these attacks happen so you can stay ahead and prevent them.

  • Phishing scams: These are deceptive emails that trick you into entering your login details on a fake website that looks legitimate.
  • Data breaches: If a website where you used your email and password gets breached, criminals can use those leaked credentials to try and access your email account.
  • Weak or reused passwords: Using simple, easy-to-guess passwords or the same password across multiple sites makes it easy for hackers to gain access.
  • Malware: Malicious software like keyloggers can be installed on your computer without your knowledge, capturing everything you type, including passwords.
  • Unsecure Wi-Fi networks: Using public Wi-Fi without a VPN can expose your data to criminals monitoring the network.

From email hack to identity theft

Yes, absolutely. An email account is often the central hub of your digital life. Once a cybercriminal controls it, they can initiate password resets for your other online accounts, including banking, shopping, and social media. They can intercept sensitive information sent to you, such as financial statements or medical records.

With enough information gathered from your emails, they can commit identity theft, apply for credit in your name, or access other sensitive services. If you suspect your email was hacked, it’s crucial to monitor your financial statements and consider placing a fraud alert with credit bureaus.

Signs that your email has been hacked

  • You can no longer log in. The most obvious sign of an email hack is when your password suddenly stops working. Cybercriminals often change the password immediately to lock you out.
  • Friends receive strange messages from you. If your contacts report receiving spam or phishing emails from your address that you didn’t send, it’s a major red flag that someone else has control of your account.
  • Unusual activity in your folders. Check your “Sent” folder for messages you don’t recognize. Hackers might also set up forwarding rules to send copies of your incoming emails to their own address, so check your settings for any unfamiliar forwarding addresses.
  • Password reset emails you didn’t request. Receiving unexpected password reset emails for other services (like your bank or social media) is a sign that a hacker is using your email to try and take over your other online accounts.
  • Security alerts from your provider. Pay attention to notifications about new sign-ins from unfamiliar devices, locations, or IP addresses. These are often the first warnings that your account has been compromised.

Steps to email recovery

If you find yourself a victim of email hacking, these are a few very important steps you need to take. Fast.

Change your password

Using a separate, clean device, this is the very first thing you must do to ensure the hacker can’t get back into your account. It is essential that your new password is complex and totally unrelated to previous passwords. Always use random words and characters, a passphrase with a variety of upper and lower cases, and throw in some symbols and numbers.

I really like the idea of a crazy, nonsensical sentence – easier to remember and harder to crack! But, better still, get yourself a password manager that will create a password that no human would be capable of creating. If you find the hacker has locked you out of your account by changing your password, you will need to reset the password by clicking on the ‘Forgot My Password’ link.

Update other accounts that use the same password

This is time-consuming, but essential. Ensure you change any other accounts that use the same username and password as your compromised email. Hackers love the fact that many people use the same logins for multiple accounts, so it is guaranteed they will try your info in other email applications and sites such as PayPal, Amazon, Netflix – you name it!

Once the dust has settled, review your password strategy for all your online accounts. A best practice is to ensure every online account has its own unique and complex password.

Sign out of all devices

Most email services have a security feature that lets you remotely log out of all active sessions. Once you’ve changed your password, signing out from your email account also signs out the hacker and forces them to log-in with the new password, which fortunately they do not know. These, combined with two- or multi-factor authentication, will help you to regain control of your account and prevent further compromise.

Inform your email contacts

A big part of the hacker’s strategy is to get their claws into your address book to hook others as well. Send a message to all your email contacts as soon as possible so they know to avoid opening any emails—most likely loaded with malware—that have come from you.

Commit to multi-factor authentication

Two-factor or multi-factor authentication may seem like an additional, inconvenient step to your login, but it also adds another layer of protection. Enabling this means you will need a special one-time-use code to log in, aside from your password. This is sent to your mobile phone or generated via an authenticator app. So worthwhile!

Check your email settings

It is common for hackers to modify your email settings so that a copy of every email you receive is automatically forwarded to them. Not only can they monitor your logins to other sites; they can also keep a watchful eye on any particularly juicy personal information. So, check your mail forwarding settings to ensure no unexpected email addresses have been added.

Also, ensure your ‘reply to’ email address is actually yours. Hackers have been known to create an email address that looks similar to yours, so that when someone replies, it will go straight to their account, not yours.

Don’t forget to check your email signature to ensure nothing spammy has been added, as well as your recovery phone number and alternate email address. Hackers also change these to maintain control. Update them to your own secure details.

Scan your computer for malware and viruses

Regularly scanning your devices for unwanted invaders is essential. If you find anything, please ensure it is addressed, and then change your email password again. If you don’t have antivirus software, please invest in it.

Comprehensive security software will provide you with a digital shield for your online life, protecting all your devices – including your smartphone – from viruses and malware. Some services also include a password manager to help you generate and store unique passwords for all your accounts.

Consider creating a new email address

If you have been hacked several times and your email provider isn’t mitigating the amount of spam you are receiving, consider starting afresh. Do not, however, delete your old email address because email providers are known to recycle old email addresses. This means a hacker could spam every site they can find with a ‘forgot my password’ request and try to impersonate you and steal your identity.

Your email is an important part of your online identity so being vigilant and addressing any fallout from hacking is essential for your digital reputation. Even though it may feel that getting hacked is inevitable, you can definitely reduce your risk by installing some good-quality security software on all your devices.

Trusted and reliable comprehensive security software will alert you when visiting risky websites, warn you when a download looks dodgy, and block annoying and dangerous emails with anti-spam technology. It makes sense really – if you don’t receive the dodgy phishing email – you can’t click on it. Smart!

Finally, don’t forget that hackers love social media – particularly those of us who overshare on it. So, before you post details of your adorable new kitten, remember it may just provide the perfect clue for a hacker trying to guess your email password!

Report the incident

Reporting an email hack is a crucial step to create a necessary paper trail for disputes with banks or credit agencies. When reporting, gather evidence such as screenshots of suspicious activity, unrecognized login locations and times, and any phishing emails you received. This information can be vital for the investigation.

  • Your email provider: Use their official support or recovery channels immediately. They can help you investigate and regain control of your account. Do not use links from suspicious emails claiming to be from support.
  • Financial institutions: If you’ve disclosed sensitive financial information or use the email for banking, contact your bank and credit card companies immediately. Alert them to potential fraud and monitor your statements.
  • Friends, family, and contacts: Send a message to your contacts warning them that your account was compromised. Advise them not to open suspicious messages or click on links sent from your address during that time.
  • Your employer: If it’s a work email, or if your personal email is used for work purposes, notify your IT department immediately. They need to take steps to protect company data and systems.
  • Relevant authorities: For financial loss or identity theft, you can report the incident to authorities like the FBI’s Internet Crime Complaint Center or Action Fraud in the UK. This creates an official record and aids in wider law enforcement efforts.

Check if online accounts linked to your email were compromised

  • Prioritize critical accounts: Immediately check your online banking, financial, and government-related accounts. Review recent activity for any unauthorized transactions or changes.
  • Review social media and shopping sites: Check your social media for posts or messages you didn’t send. Review your online shopping accounts like Amazon for any purchases or address changes you don’t recognize.
  • Enable alerts: Turn on login and transaction alerts for your sensitive accounts. This will give you real-time notifications of any suspicious activity in the future.

Should you delete your hacked email account?

Generally, no. Deleting the account can cause more problems than it solves. Many online services are linked to that email, and deleting it means you lose the ability to receive password reset links and security notifications for those accounts.

More importantly, some email providers recycle deleted addresses, meaning a hacker could potentially re-register your old email address and use it to impersonate you and take over your linked accounts.

The better course of action is to regain control, thoroughly secure the account with a new password and multi-factor authentication, and clean up any damage. Only consider migrating to a new email address after you have fully secured the old one.

Future-proof your email after reclaiming control

  • Run a full security scan: Before doing anything else, run a comprehensive scan with a trusted antivirus program on all your devices to ensure no malware or keyloggers remain.
  • Double-check security settings: Confirm that your recovery email and phone number are correct and that multi-factor authentication is enabled, preferably using an authenticator app rather than SMS.
  • Review account permissions: Check which third-party apps and websites have access to your email account. Revoke access for any service you don’t recognize or no longer use.
  • Set periodic reminders: Make it a habit to review your account’s security logs and settings every few months to catch any potential issues early.
  • Learn to spot phishing: Be skeptical of unsolicited emails asking for personal information or creating a sense of urgency. Check the sender’s address and hover over links before clicking.
  • Keep software updated:Regularly update your operating system, web browser, and security software to protect against the latest vulnerabilities.
  • Secure your devices: Use comprehensive security software like McAfee+ on all your devices—computers, tablets, and smartphones—to protect against malware, viruses, and risky websites.

Provider-specific email recovery

Each email provider has a specific, structured process for account recovery. It is vital to only use the official recovery pages provided by the service and be wary of scam websites or third-party services that claim they can recover your account for a fee. Below are the official steps of the major providers that you can follow.

Gmail

  1. Go to Google’s official Account Recovery page.
  2. Enter your email address and follow the on-screen prompts. You will be asked questions to confirm your identity, such as previous passwords or details from your recovery phone number or email.
  3. Once you regain access, you will be prompted to create a new password.
  4. Immediately visit the Google Security Checkup to review recent activity, remove unfamiliar devices, check third-party app access, and enable 2-step verification.

Yahoo email

  1. Navigate to the Yahoo Sign-in Helper page.
  2. Enter your email address or recovery phone number and click “Continue.”
  3. Follow the instructions to receive a verification code or account key to prove your identity.
  4. Once verified, create a new, strong password.
  5. After regaining access, go to your Account Security page to review recent activity, check recovery information, and turn on 2-step verification.

Outlook or Hotmail

  1. Go to the official Microsoft account recovery page.
  2. You’ll need to provide your email, phone, or Skype name, and verify your identity using the security information linked to your account.
  3. If you cannot access your recovery methods, you will be directed to an account recovery form where you must provide as much information as possible to prove ownership.
  4. After resetting your password, visit your Microsoft account security dashboard to review sign-in activity, check connected devices, and enable two-step verification.

Final thoughts

Your email account is the master key to your digital kingdom, and protecting it is more critical than ever since many of your other accounts are connected with your email. Realizing “my email has been hacked” is a stressful experience, but taking swift and correct action can significantly limit the damage.

By following the recovery steps and adopting strong, ongoing security habits like using a password manager and enabling multi-factor authentication, you can turn a potential crisis into a lesson in digital resilience. Stay vigilant, stay proactive, and keep your digital front door securely locked.

To add another wall of defense, consider investing in a trusted and reliable comprehensive security software like McAfee+. Our solution will help you dodge hacking attempts by alerting you when visiting risky websites, or downloading questionable apps, and blocking malicious emails with anti-spam technology.

The post What to Do If Your Email Is Hacked appeared first on McAfee Blog.

My Instagram Has Been Hacked – What Do I Do Now?

In my world of middle-aged mums (mams), Instagram is by far the most popular social media platform. While many of us still have Facebook, Instagram is where it all happens: messaging, sharing, and yes, of course – shopping!! So, when one of my gal pals discovers that her Instagram account has been hacked, there is understandably a lot of panic!

How Popular Is Instagram?

Believe it or not, Facebook is still hanging onto the top spot as the most popular social media platform with just over 3 billion active monthly users, according to Statista. YouTube comes in 2nd place with 2.5 billion users. Instagram and WhatsApp tie in 3rd place with 2 billion users each. Interestingly, TikTok has 1.5 billion users and is in 4th place – but watch this space, I say!

Why Do Hackers Want To Hack My Instagram?

Despite Facebook having the most monthly users, it isn’t where the personal conversations and engagement take place. That’s Instagram’s sweet spot. Instagram messaging is where links are shared and real personal interaction occurs. In fact, a new report shows that Instagram accounts are targeted more than any other online account and makeup just over a quarter of all social media hacks. So, it makes sense why hackers would expend considerable energy in trying to hack Instagram accounts. They’ll have a much greater chance of success if they use a platform where there is an appetite and trust for sharing links and personal conversations.

But why do they want to get their hands on your account? Well, they may want to steal your personal information, scam your loyal followers by impersonating you, sell your username on the black market or even demand ransoms! Hacking Instagram is big business for professional scammers!!

What To Do If You’ve Been Hacked

So, you reach for your phone early one morning to do a quick scroll on Instagram before you start the day, but you can’t seem to log on. Mmmmm. You then see some texts from friends checking whether you have in fact become a cryptocurrency expert overnight. OK – something’s off. You then notice an email from Instagram notifying you that the email linked to your account has been changed. Looks like you’ve been hacked! But please don’t spend any time stressing. The most important thing is to take action ASAP as the longer hackers have access to your account, the greater the chance they can infiltrate your life and create chaos.

The good news is that if you act quickly and strategically, you may be able to get your account back. Here is what I suggest you do – fast!:

1. Change Your Password & Check Your Account

If you are still able to log in to your account then change your password immediately. And ensure it is a password you haven’t used anywhere else. Then do a quick audit of your account and fix any changes the hacker may have made eg remove access to any device you don’t recognise, any apps you didn’t install, and delete any email addresses that aren’t yours.

Next, turn on two-factor authentication (2FA) to make it harder for the hacker to get back into your account. This will take you less than a minute and is absolutely critical. Instagram will give you the option to receive the login code either via text message or via an authentication app. I always recommend the app in case you ever lose control of your phone.

But, if you are locked out of your account then move on to step 2.

2. Locate The Email From Instagram

Every time there is a change to your account details or some new login activity, Instagram will automatically send a message to the email address linked with the account

But there’s good news here. The email from Instagram will ask you if you in fact made the changes and will provide a link to secure your account in case it wasn’t you. Click on this link!! If you can access your account this way, immediately check that the only linked email address and recovery phone number are yours and delete anything that isn’t yours. Then change your password.

But if you’ve had no luck with this step, move on to step 3.

3. Request a Log-In Link

You can also ask Instagram to email or text you a login link. On an iPhone, you just need to select ‘forgot password?’ and on your Android phone, tap ‘get help logging in’. You will need to enter the username, email address, and phone number linked to your account.

No luck? Keep going…

4. Request a Security Code

If the login link won’t get you back in, the next step is to request a security code. Simply enter the username, email address, or phone number associated with your account, then tap on “Need more help?” Select your email address or phone number, then tap “Send security code” and follow the instructions.

5. Video Selfie

If you have exhausted all of these options and you’ve had no luck then chances are you have found your way to the Instagram Support Team. If you haven’t, simply click on the link and it will take you there. Now, if your hacked account contained pictures of you then you might just be in luck! The Support Team may ask you to take a video selfie to confirm who you are and that in fact you are a real person! This process can take a few business days. If you pass the test, you’ll be sent a link to reset your password.

How To Prevent Yourself From Getting Hacked?

So, you’ve got your Instagram account back – well done! But wouldn’t it be good to avoid all that stress again? Here are my top tips to make it hard for those hackers to take control of your Insta.

1. It’s All About Passwords

I have no doubt you’ve heard this before but it’s essential, I promise! Ensuring you have a complex and unique password for your Instagram account (and all your online accounts) is THE best way of keeping the hackers at bay. And if you’re serious about this you need to get yourself a password manager that can create (and remember) crazily complex and random passwords that are beyond any human ability to create. Check out McAfee’s TrueKey – a complete no-brainer!

2. Turn on Multifactor Authentication (MFA)

Multi-factor authentication adds another layer of security to your account making it that much harder for a hacker to get in. It takes minutes to set up and is essential if you’re serious about protecting yourself. It simply involves using a code to log in, in addition to your password. You can choose to receive the code via a text message or an authenticator app – always choose the app!

3. Choose How To Receive Login Alerts

Acting fast is the name of the game here so ensure your account is set up with your best contact details, so you receive login alerts ASAP. This can be the difference between salvaging your account and not. Ensure the alerts will be sent to where you are most likely to see them first so you can take action straight away!

4. Audit Any Third-Party Apps

Third-party apps that you have connected to your account could potentially be a security risk. So, only ever give third-party apps permission to access your account when absolutely necessary. I suggest taking a few minutes to disconnect any apps you no longer require to keep your private data as secure as possible.

Believe it or not, Instagram is not just an arena for middle-aged mums! I can guarantee that your teens will be on there too. So, next time you’re sharing a family dinner, why not tell them what you’re doing to prevent yourself from getting hacked? And if you’re not convinced they are listening? Perhaps remind them just how devastating it would be to lose access to their pics and their people. I am sure that might just work.

Till next time

Stay safe online!

Alex

The post My Instagram Has Been Hacked – What Do I Do Now? appeared first on McAfee Blog.

Top Strategies For Keeping Your Kids Safe Online

What if I told you that the most important thing you need to keep your kids safe online doesn’t come in a box or via a download? And that it doesn’t require you to be monitoring or supervising their every move. And even better – it doesn’t cost any money!! Yep – you’d be interested, I’m sure. After almost 13 years as Cybermum, I’ve experienced plenty of ‘aha’ cybersafety moments. But, without doubt, one of the biggest learnings for me is that creating a family culture where there is calm, honest, and truly open communication is the best way to protect your kids online. In fact, it’s likely far more powerful than the latest apps or software, and here’s why…

Like It Or Not, Screens Are Here To Stay

I’m a big fan of trying to minimise the amount of time kids spend in front of a screen for so many reasons. There is a plethora of research to support how ‘too much’ screen time can adversely affect kids’ behaviour. A 2022 US study of K-12 educators in the US showed that 80% of educators believed that increased screen time worsened children’s behaviour. There are studies that show excessive (and early) screen time can potentially affect a child’s cognitive, linguistic, and social-emotional growth. And even some research shows that the effects of excessive screen time can be similar to the symptoms of autism.

But the reality is that screens aren’t going anywhere soon. We live in a digital world where you actually can’t go about your business without a device and a screen. When was the last time you tried going into a bank branch??? Instead, I believe we need to think of screens a little like we think of sugar. We know it’s not great for us, so we try and minimise our intake.

But how good would it be if our kids understood this perspective, so they also realised that too much screen time wasn’t ideal? Well, they can – weave it into family conversations!

24/7 Monitoring Is Impossible – You Have To Sleep and Work and Live!

When ‘digital parenting’ became a thing about 15 – 20 years ago, we were all told that we needed to constantly monitor our kids to ensure they weren’t visiting inappropriate websites or speaking to strangers online. I remember trying so hard to stay across the online movements of four kids – I’ve got to admit it was quite time-consuming and exhausting!! Full credit to those parents who put in the hours to keep their kids safe.

Fast forward to 2024 and there is now a comprehensive range of ‘parental control’ apps and software that can act as another set of ‘eyes and ears’ for parents. And while they can be great tools to have in your digital parenting toolbox, they are not the silver bullet. What happens when your child is visiting at another family’s house that doesn’t have parental controls set up? What happens if your child uses a friend’s device while travelling home on the bus to ‘get around’ the parental controls at home? And what about, if they work out how to turn them off?? Remember, are digital natives are quite savvy!!

But if you regularly talk online safety with your kids at home then you have a big head start here. In fact, your stress levels should be relatively low. When you make it a priority to talk to your kids about what they do online – in a non-judgemental way – and share your stories, the latest trends and risks then you are in a good place. If your kids know you understand their digital life, know that you can handle the tough stuff, and know with 100% confidence that you are NOT going to go berserk if they come to you with a problem then you do not need to worry about monitoring their every move. You’ve empowered them with knowledge and offered them a safety net – perfect!

How To Create a Culture of Calm and Honest Communication

Before I share my top tips with you I want to make it very clear that this is not an exercise in being a perfect parent. There is no such thing as a perfect parent – we are all on a journey and learning as we go. So, please don’t feel psyched out or worry that it’s too late. We’re all doing the best we can to raise our kids – so just keep on keeping on!

There are a few key things that I believe contribute to creating a top-notch communication culture in a family. Here are my top recommendations.

  1. Active Listening Is Essential

I learnt pretty early on in my parenting career that if you’re not being an active listener, you’re not really getting the full story. Active listening happens when you’re fully engaged with your child and is one of the best ways to communicate that you care and that you’re interested which in turn encourages them to open up more. Perfect! Here’s what I suggest:

  • Use body language to show you’re paying attention – make eye contact, face them, and be at their level (if they are shorter than you)
  • Pay attention to their facial expression and body language too. Sometimes words only tell part of the story.
  • Ask questions to encourage them to share more ‘tell me more’ or ‘what happened next?’
  • Don’t finish their sentences or interrupt – even if they are stalling or struggling to find the right words. Bite your tongue, if you need to!
  • Resist the urge to problem-solve straight away. Sometimes they just need someone to listen and share with.
  1. Commit To Being Calm

Let’s be honest, very few of us are calm or relaxed 365 days of the year! But if you’re keen to maximise the chances that your kids will come to you if they do find themselves in a tricky situation then you need to ‘fake it till you make it’ my friends!

Conflict and heated discussions with teens are inevitable – I’ve definitely had my fair share! But it’s how you work through it that’s important. If you want a truly open and honest relationship with your child where they feel safe to talk about awkward things like sex, alcohol, cyberbullying, and even pornography, then you need to be ready to manage your own feelings and reactions when you hear things that you don’t expect or simply don’t like.

If you’re struggling to remain calm and deal with emotions from conversations with your teen then why not take some time to invest in yourself? Hit the road and walk it off, find some breathing exercises or a meditation on YouTube, or pick up the phone and call a friend.  By role-modelling honest conversation and a calm approach, you’re teaching your children how to be respectful and calm and have open and tough conversations. What a life skill!

And if you can’t manage to remain calm and you lose your cool – simply apologise, give them a hug, and commit to doing better next time.

  1. Don’t Shy Away From The Tricky Stuff eg Sex, Pornography and Cyberbullying

When I was growing up, I had a few friends who had very open relationships with their parents. Everything was discussed – nothing was off-limits! These friends all had a certain confidence, a knowing that they had someone in their corner who had their back, wouldn’t judge, and would be their ‘come what may’ for any situation. I was a little jealous!

Talking to your kids about sex, pornography, and cyberbullying can be really stressful. But there is so much research that shows that proactive conversations about tricky topics such as sex can be really beneficial. A review of research on British parents’ involvement in sex education found that they often felt embarrassed about broaching the subject with their kids. The same review compared this to countries such as Sweden where parents talked openly to their children about sex from an early age. It attributed the difference in approaches to the higher rates of teenage pregnancy and sexually transmitted diseases in England and Wales. Fascinating!

How To Talk About The Tricky Stuff

  • Start As Early As You Can

Start by teaching them the correct names for body parts. When they start preschool or school, you can teach them about respecting others and also about how to express their feelings. This will set them up for open and honest conversations and relationships.

  • Acknowledge The Awkwardness

Own the fact that it may feel really embarrassing or awkward when chatting to your kids about these topics. Perhaps make a joke of it. But assure them you’re going to do your best to help them navigate these issues and that you can absolutely handle it.

  • It’s Not ‘One and Done’

Why not break it up into small regular chats and take the pressure off? One big talk is overwhelming and could feel really awkward and pressured. A little bit of chatter often will feel more natural. Why not use films, books, or movies as a trigger for a conversation? The more natural and less contrived it feels, the more relaxed and receptive everyone will be.

  • Don’t Be Judgemental

Expressing disapproval or shock when your kids are sharing something tricky with you is the fastest way to shut down communication. So stop yourself! And if they do share something that surprises you, make sure you thank them and suggest you both talk about it more so you can better understand.

Now, if you have tweens or teens and you regret not prioritising your family’s communication culture earlier, do not stress. It’s never too late to make a difference! Yes, there might be a whole lot of awkwardness, but it will absolutely pass. Share stories of your online life, and news stories that you will start a conversation, ask them questions about their online life, and most importantly, be calm and don’t be critical or negative when they start sharing. Otherwise, it will be over ASAP.

You can absolutely handle this!

The post Top Strategies For Keeping Your Kids Safe Online appeared first on McAfee Blog.

❌