Tips For Not ‘Hack’ Your Kids Toys

·         Increasingly more dolls, drones or small robots can be connected to the internet, so parents must increase security measures to minimize the risks

·         Some of the warnings of experts are careful with photos, not give actual location data or change the password that comes by default

 

Number of toys is increasingly greater for kids that offer the possibility of connection to the internet to access extra features. Beyond consoles or tablets, in the market there are a wide range of products such as dolls, cars, robots or small drones that allow the online connection.

more information

·         These toys can be recording your children

For this reason, it is increasingly important that families take into account that this network access, even though it is a great advantage for the services it offers, also means greater exposure to hackers who could have access to the same control. This is especially dangerous in those toys or devices of surveillance of the smallest cameras incorporate or video because it would allow a possible attacker to access those images and use them for illicit purposes.

“We want to educate families about safe use of new technologies and here, of course, include the so-called Internet of things that has come to toys and will continue implementing in a greater number of articles. It is not not to use these products, but know the risks and learn how to use them in a safe and responsible way to enjoy with them without danger”, says Miguel A. Juan, founder and CEO of S2 group.

How to protect connected toys?

Experts say that, in order to use these children’s gadgets in a safe and proper manner, it is important to follow the following guidelines:

-Monitor the information that is shared. We must pay special attention to the personal information that the child may facilitate and avoid to use your full real name.

-Not give actual location data. To access the functions some toys online registration is required. When this happens, it is important to not provide actual data and only an approximate location. In this way, if there is a theft of information on the platform, we would have not run any risk.

-Careful with the photos. For those toys that allow you to upload photos, it is critical to never use real pictures of minors that can identify. You can opt for other options such as avatars or simulators drawings of image that can be made with some apps.

-Cover the cameras. Articles that incorporate camera photos or video, it is important to cover it so that, in case of attack, a hacker could access its control and take pictures of the child.

-Changing passwords. It is necessary to change the password that comes by default with the toy as soon as possible and create a different from that we use in other environments.

-Careful with payments. If the connected article allows the possibility of access services against payment, it is advisable to check your settings to prevent access by children through the use of a password. In addition, if you need to register a payment method is interesting to do it with a card wallet, to prevent disbursements.

-Turn them off completely. When this kind of toys are no longer used to shut down completely so that I could access them via the Wifi.

-Control the use of Wifi. Access to public networks wifi, which are unsafe, may increase the exposure of the toy before hackers. For this reason, it is interesting to connect only to those that are safe, as the House.

-Updates a day. If the toy offers the option of software update it is advisable to perform it every time it is possible because they tend to incorporate versions with greater ciberproteccion.