Practical steps parents can take to help teens navigate Instagram safely

Issue 1 2022 Information Security

Instagram (IG) is one of the most popular social media platforms in the world, particularly among teenagers. The photo-sharing app ranked third in terms of preferred social networks among teenagers in the United States, second to Snapchat and TikTok.


Carey van Vlaanderen.

According to research from World Wide Worx in partnership with Ornico, there are 10 million Instagram users in South Africa, making the platform one of the biggest and most popular in the country. Left unchecked, providing teens with open access to the platform can result in situations with unfortunately dire consequences. Social media can be a fun way to connect with friends, share content and pursue various creative interests. On the opposite end of the scale, however, unsupervised and untrammelled social media access has been shown to have a negative impact on teens. A study of more than 12 000 teens in the UK published in The Lancet Child & Adolescent Health journal, found that using social media more than three times a day predicted poor mental health and wellbeing in teens.

Children aged 13-17 make up 8% of Instagram’s entire userbase, with the Meta-owned [formerly Facebook] photo-sharing platform boasting almost 1,4 billion active users of all ages every month. With such a large use base, Instagram is not immune to the variety of threats linked to social media including cyberbullying, predators, scams and inappropriate content.

As parents and caregivers, it is important to be aware of both the positive and negative influence of social media on teenagers. For many parents though, the challenge is understanding the various social media platforms well enough to keep teens away from harm.

Account privacy

Any account on Instagram can be public or private. While recent measures by Instagram have been taken to automatically have users under 16 set up with private accounts when they join Instagram, it is possible for that option to be manually set to public. A private account is generally the better option, as it requires the owner to approve any follow activity and who can view their content.

If a public profile is the option your teen wants and you agree, consider discussing the risks carefully: letting everybody see everything on their feed might provide unsavoury characters with enough material to use for nefarious purposes.

Sliding into DMs

Not everything that happens on Instagram is visible – teenagers do not just like and comment on each other’s posts or watch each other’s stories – they also 'slide into each other’s DMs'. This means to send a direct message or DM. DMs are a big part of Instagram’s culture. It’s therefore sensible to have control over who is messaging your children.

While Instagram prevents adults from sending messages to anyone under 18 unless they follow those adults, safety features recently rolled out by the platform to protect young users include prompts and safety notices to encourage vigilance in teens during conversations with adults they’re already following.

Comments, tags and mentions

Comments, tags, and mentions are more ways users can interact with each other. It would be wise to ensure random strangers can’t tag your children to prevent any inappropriate interactions. Instagram’s online support pages provide detailed guidance on removing tags, unwanted comments and managing privacy settings.

Stop the trolls by hiding and filtering

Social media interactions can sometimes turn sour with malicious comments and insulting messages. This is often the work of online trolls who try to encourage negative comments or enrage commenters further. As trolling can evolve into cyberbullying or cyberstalking, Instagram has a handful of features and settings to protect users from abusive behaviour. This is found under Instagram’s Hidden Words setting.

Parents and users are able to hide offensive comments by turning on Instagram’s comment filtering system which will conceal comments containing flagged words or set up a custom word list to include offending terminology.

Safety should not be an afterthought

Whether your teenagers use Instagram to socialise, stay up to date with trends or share their lives, privacy and security should not be overlooked.

Parents can better supervise their teenager’s Instagram if they become familiar with the platform, so consider nudging your teen to take additional steps themselves aimed at promoting a rational use of the app. Open discourse with your teenager about both the dangers and benefits of the app will help to promote a sensible and safe use of Instagram.

School before cool

Algorithms on social media apps attempt to keep users on the platform for longer, many times distracting teenagers to the detriment of schoolwork and studying. In addition to providing a secure environment where links out to malicious content can be controlled, products like ESET’s Security and ESET Parental Control has the ability for parents and caregivers to curate the content categories accessed across devices children are using to connect to the Internet, whether it’s a laptop, tablet or mobile.

The added benefit is that access times and screen times can be managed, too. With proper dialogue and understanding, children learn to see it as something in their best interest and value the time that they get to enjoy on the platform rather than censorship which provides for a more productive focus on school and schoolwork.

ESET offers various solutions to help parents and teens manage technology with confidence. Where technology is vital to progress, ESET is there to protect it. To learn more about more dangers faced by children online as well as about how technology can help, head over to Safer Kids Online.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

New ransomware using BitLocker to encrypt data
Technews Publishing Information Security Residential Estate (Industry)
Kaspersky has identified ransomware attacks using Microsoft’s BitLocker to attempt encryption of corporate files. It can detect specific Windows versions and enable BitLocker according to those versions.

Read more...
Create order from chaos
Information Security
The task of managing and interpreting vast amounts of data is akin to finding a needle in a haystack. Cyberthreats are growing in complexity and frequency, demanding sophisticated solutions that not only detect, but also prevent, malicious activities effectively.

Read more...
Trend Micro launches first security solutions for consumer AI PCs
Information Security News & Events
Trend Micro unveiled its first consumer security solutions tailored to safeguard against emerging threats in the era of AI PCs. Trend will bring these advanced capabilities to consumers in late 2024.

Read more...
Kaspersky finds 24 vulnerabilities in biometric access systems
Technews Publishing Information Security
Customers urged to update firmware. Kaspersky has identified numerous flaws in the hybrid biometric terminal produced by international manufacturer ZKTeco, allowing a nefarious actor to bypass the verification process and gain unauthorised access.

Read more...
Responsible AI boosts software security
Information Security
While the prevalence of high-severity security flaws in applications has dropped slightly in recent years, the risks posed by software vulnerabilities remain high, and remediating these vulnerabilities could hinder new application development.

Read more...
AI and ransomware: cutting through the hype
AI & Data Analytics Information Security
It might be the great paradox of 2024: artificial intelligence (AI). Everyone is bored of hearing it, but we cannot stop talking about it. It is not going away, so we had better get used to it.

Read more...
NEC XON shares lessons learned from ransomware attacks
NEC XON Editor's Choice Information Security
NEC XON has handled many ransomware attacks. We've distilled key insights and listed them in this article to better equip companies and individuals for scenarios like this, which many will say are an inevitable reality in today’s environment.

Read more...
iOCO collaboration protection secures Office 365
Information Security Infrastructure
The cloud, in general, and Office 365, in particular, have played a significant role in enabling collaboration, but it has also created a security headache as organisations store valuable information on the platform.

Read more...
Cybercriminals embracing AI
Information Security Security Services & Risk Management
Organisations of all sizes are exploring how artificial intelligence (AI) and generative AI, in particular, can benefit their businesses. While they are still figuring out how best to use AI, cybercriminals have fully embraced it.

Read more...
A strong cybersecurity foundation
Milestone Systems Information Security
The data collected by cameras, connected sensors, and video management software can make a VMS an attractive target for malicious actors; therefore, being aware of the risks of an insecure video surveillance system and how to mitigate these are critical skills.

Read more...