Practical steps parents can take to help teens navigate Instagram safely

Issue 1 2022 Information Security

Instagram (IG) is one of the most popular social media platforms in the world, particularly among teenagers. The photo-sharing app ranked third in terms of preferred social networks among teenagers in the United States, second to Snapchat and TikTok.


Carey van Vlaanderen.

According to research from World Wide Worx in partnership with Ornico, there are 10 million Instagram users in South Africa, making the platform one of the biggest and most popular in the country. Left unchecked, providing teens with open access to the platform can result in situations with unfortunately dire consequences. Social media can be a fun way to connect with friends, share content and pursue various creative interests. On the opposite end of the scale, however, unsupervised and untrammelled social media access has been shown to have a negative impact on teens. A study of more than 12 000 teens in the UK published in The Lancet Child & Adolescent Health journal, found that using social media more than three times a day predicted poor mental health and wellbeing in teens.

Children aged 13-17 make up 8% of Instagram’s entire userbase, with the Meta-owned [formerly Facebook] photo-sharing platform boasting almost 1,4 billion active users of all ages every month. With such a large use base, Instagram is not immune to the variety of threats linked to social media including cyberbullying, predators, scams and inappropriate content.

As parents and caregivers, it is important to be aware of both the positive and negative influence of social media on teenagers. For many parents though, the challenge is understanding the various social media platforms well enough to keep teens away from harm.

Account privacy

Any account on Instagram can be public or private. While recent measures by Instagram have been taken to automatically have users under 16 set up with private accounts when they join Instagram, it is possible for that option to be manually set to public. A private account is generally the better option, as it requires the owner to approve any follow activity and who can view their content.

If a public profile is the option your teen wants and you agree, consider discussing the risks carefully: letting everybody see everything on their feed might provide unsavoury characters with enough material to use for nefarious purposes.

Sliding into DMs

Not everything that happens on Instagram is visible – teenagers do not just like and comment on each other’s posts or watch each other’s stories – they also 'slide into each other’s DMs'. This means to send a direct message or DM. DMs are a big part of Instagram’s culture. It’s therefore sensible to have control over who is messaging your children.

While Instagram prevents adults from sending messages to anyone under 18 unless they follow those adults, safety features recently rolled out by the platform to protect young users include prompts and safety notices to encourage vigilance in teens during conversations with adults they’re already following.

Comments, tags and mentions

Comments, tags, and mentions are more ways users can interact with each other. It would be wise to ensure random strangers can’t tag your children to prevent any inappropriate interactions. Instagram’s online support pages provide detailed guidance on removing tags, unwanted comments and managing privacy settings.

Stop the trolls by hiding and filtering

Social media interactions can sometimes turn sour with malicious comments and insulting messages. This is often the work of online trolls who try to encourage negative comments or enrage commenters further. As trolling can evolve into cyberbullying or cyberstalking, Instagram has a handful of features and settings to protect users from abusive behaviour. This is found under Instagram’s Hidden Words setting.

Parents and users are able to hide offensive comments by turning on Instagram’s comment filtering system which will conceal comments containing flagged words or set up a custom word list to include offending terminology.

Safety should not be an afterthought

Whether your teenagers use Instagram to socialise, stay up to date with trends or share their lives, privacy and security should not be overlooked.

Parents can better supervise their teenager’s Instagram if they become familiar with the platform, so consider nudging your teen to take additional steps themselves aimed at promoting a rational use of the app. Open discourse with your teenager about both the dangers and benefits of the app will help to promote a sensible and safe use of Instagram.

School before cool

Algorithms on social media apps attempt to keep users on the platform for longer, many times distracting teenagers to the detriment of schoolwork and studying. In addition to providing a secure environment where links out to malicious content can be controlled, products like ESET’s Security and ESET Parental Control has the ability for parents and caregivers to curate the content categories accessed across devices children are using to connect to the Internet, whether it’s a laptop, tablet or mobile.

The added benefit is that access times and screen times can be managed, too. With proper dialogue and understanding, children learn to see it as something in their best interest and value the time that they get to enjoy on the platform rather than censorship which provides for a more productive focus on school and schoolwork.

ESET offers various solutions to help parents and teens manage technology with confidence. Where technology is vital to progress, ESET is there to protect it. To learn more about more dangers faced by children online as well as about how technology can help, head over to Safer Kids Online.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

New campaign exploiting Google Tasks notifications
News & Events Information Security
New phishing scheme abuses legitimate Google Tasks notifications to trick corporate users into revealing corporate login credentials, which can then be used to gain unauthorised access to company systems, steal data, or launch further attacks.

Read more...
Making a mesh for security
Information Security Security Services & Risk Management
Credential-based attacks have reached epidemic levels. For African CISOs in particular, the message is clear: identity is now the perimeter, and defences must reflect that reality with coherence and context.

Read more...
What’s in store for PAM and IAM?
Access Control & Identity Management Information Security
Leostream predicts changes in Identity and Access Management (IAM) and Privileged Access Management (PAM) in the coming year, driven by evolving cybersecurity realities, hybridisation, AI, and more.

Read more...
The challenges of cybersecurity in access control
Technews Publishing SMART Security Solutions Access Control & Identity Management Information Security
SMART Security Solutions summarises the key points dealing with modern cyber risks facing access control systems, from Mercury Security’s white paper “Meeting the Challenges of Cybersecurity in Access Control: A Future-Ready Approach.”

Read more...
Securing your access hardware and software
SMART Security Solutions Technews Publishing RBH Access Technologies Access Control & Identity Management Information Security
Securing access control technology is critical for physical and digital security. Every interaction between readers, controllers, and host systems creates a potential attack point for those with nefarious intent.

Read more...
From friction to trust
Information Security Security Services & Risk Management Financial (Industry)
Historically, fraud prevention has been viewed as a trade-off between robust security and a seamless customer journey, with security often prevailing. However, this can impair business functionality or complicate the customer journey with multiple logins and authentication steps.

Read more...
Phishing and social engineering are the most significant risks
News & Events Information Security
ESET Research found that phishing accounted for 45,7% of all detected cyberthreats in South Africa, with higher-quality deepfakes, signs of AI-generated phishing websites, and short-lived advertising campaigns designed to evade detection.

Read more...
Zero Trust access control
Technews Publishing SMART Security Solutions CASA Software NEC XON Editor's Choice Access Control & Identity Management Information Security
Zero Trust Architecture enforces the rule of ‘never trust, always verify’. It changes an organisation’s security posture by assuming that threats exist both inside and outside the perimeter, and it applies to information and physical security.

Read more...
OT calculator to align cyber investments with business goals
Industrial (Industry) Information Security Security Services & Risk Management
The OT Calculator has been developed specifically for industrial organisations to assess the potential costs of insufficient operational technology (OT) security. By offering detailed financial forecasts, the calculator empowers senior management to make well-informed decisions.

Read more...
Protecting high-value data from AI
CASA Software Infrastructure Information Security Products & Solutions
As artificial intelligence accelerates the speed and sophistication of cyberattacks, protecting high-value data, such as financial records, legal files, patient data, intellectual property, and compliance records, has never been more urgent.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.