
Expert says one phone setting protects children better than any app
Expert says one phone setting protects children better than any app
Steven Gannon says the setting on iPhone and Android phones will help keep your children safe online
A parent and child discussig their phone use
Parents have been urged to change one setting on their children's phones to keep them safe, as experts say it is more important than any app. An online content expert says changing the setting on a phone will help ensure your children are protected.
'Most parents I talk to are completely stressed about what their kids might access online, but they don't know where to start with all the technical settings,' said Steven Gannon, Co-Founder of FollowersPanda . Steven said there's one setting that stands above all others when it comes to protecting children online: Content & Privacy Restrictions.
'Changing this single setting does the work of three separate parental controls,' Steven said. 'It blocks explicit content across browsers, prevents dangerous app downloads, and gives parents real control without needing to be tech wizards.'
How To Set Up Content & Privacy Restrictions
Setting up Content & Privacy Restrictions takes just a few minutes but provides powerful protection across your child's entire device.
For iPhone users, Steven said: 'Go to Settings, then Screen Time. If it's not already on, turn it on. Then tap 'Content & Privacy Restrictions' and toggle it on. From there, you can select 'Content Restrictions' to block explicit content in Safari, music, and more.'
Android users follow a similar path through Digital Wellbeing settings. 'Open Settings, tap Digital Wellbeing & Parental Controls, then set up parental controls. You can restrict apps and content based on ratings from the Google Play Store,' says Steven.
Article continues below
The power of Content & Privacy Restrictions lies in its wide-ranging impact. Unlike other controls that might only address one aspect of online safety, this setting creates multiple layers of protection. 'The beauty is that it works across the entire device,' Steven said. 'Your child can't just switch to a different browser to access blocked content. The restrictions apply system-wide.'
Three Major Risks The Setting Helps Prevent
1. Exposure to Adult Content
With content restrictions enabled, browsers automatically filter out websites with adult content, protecting children from stumbling across inappropriate material.
'Kids are curious by nature. Even with the best intentions, they can accidentally end up on websites with explicit content,' Steven says. 'This setting creates a buffer that significantly reduces those accidental exposures.'
2. Dangerous App Downloads
The setting prevents children from downloading new apps without parental approval, stopping potentially harmful applications before they can be installed.
'There are countless apps designed to hide content from parents or that expose kids to inappropriate interactions,' warns Steven. 'By requiring your approval for downloads, you maintain control over what enters your child's digital world.'
3. In-App Purchases
Content restrictions also help prevent unexpected credit card charges from in-app purchases, which can quickly add up.
Steven said: 'A lot of games today are designed to tempt kids into making purchases. This setting requires authentication, preventing surprise bills that can run into hundreds or even thousands of dollars."
He added: 'What makes this setting so useful is its simplicity. You don't need to be a tech expert or spend hours figuring out complicated parental control apps. With just a few taps, you've dramatically improved your child's online safety. As someone who works in tech and sees the online world's risks daily, I can tell you this setting gives you the biggest safety bang for your buck.
Article continues below
'Parents get overwhelmed trying to monitor every app individually or installing complex monitoring software. But often, it's this basic built-in feature they overlook. I've seen families spend hundreds on third-party solutions that don't work nearly as well as this free, built-in option.
'Remember though, no technical solution replaces open conversations with your kids about online safety – this setting just gives you valuable peace of mind while those conversations continue.'

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


The Herald Scotland
2 hours ago
- The Herald Scotland
Millions of iPhone users issued urgent App Store warning
Lee Elliott, chief product officer at Compare and Recycle, said: "Before installing an app from the App Store or Google Play, always ensure it is a verified app and pay attention to its reviews." Users should ensure apps are updated regularly and remember to install any security patches when prompted, too, Lee said. Mr Elliott said: "If you suspect your device has been infected, the first port of call is to turn off your mobile data or Wi-Fi, and uninstall any suspicious apps you can identify. "You could also perform a factory reset. "On Android phones you can run a built-in scan to search for malware and resolve the issue, but due to the OS architecture out of the box, iPhones are well protected and are not generally susceptible to security breaches. "If you're experiencing any strange pop-ups as an Apple user try clearing your browsing history and cache first, and it'll likely solve the problem." He said: "While staying aware of your surroundings is the least you can do to stop your phone being snatched in the first place, there are simple steps you can take to protect yourself and prevent the worst from happening. Recommended reading: "A lesser-known trick for iPhone users is to disable Control Centre access from the lock screen. "This prevents thieves from quickly switching off Wi-Fi or turning on Airplane Mode if they grab your phone while it's locked, helping you retain the ability to track the device via Find My iPhone and making them more likely to let go of the device. "Simply navigate to 'Face ID & Passcode' in settings and toggle off the option for accessing your control centre when the phone is locked."


Geeky Gadgets
9 hours ago
- Geeky Gadgets
The ULTIMATE New iPhone Setup Guide: Every Secret Unlocked!
Setting up a new iPhone is an exciting experience, but it can feel overwhelming if you're unsure where to start. The video below from Simple Alpaca provides a clear, step-by-step process to help you navigate everything from unboxing to customizing your device. By following these steps, you'll ensure your iPhone is ready to use and tailored to your preferences. Step 1: Unbox and Power On Carefully unbox your iPhone to avoid accidental damage. Consider applying a screen protector and using a case to safeguard your device from scratches or drops. Once your iPhone is secure, press and hold the power button to turn it on. Follow the on-screen instructions to select your preferred language and region. These settings will determine the default options for your device, such as date, time, and keyboard preferences. Step 2: Transfer Your Data Transferring data from your old device ensures you retain important files, contacts, and settings. Depending on your previous device, you can choose from several methods: From another iPhone: Use the Quick Start feature by placing your old and new iPhones near each other. This allows for a wireless transfer of data and settings. Use the Quick Start feature by placing your old and new iPhones near each other. This allows for a wireless transfer of data and settings. From iCloud: Restore your data from an iCloud backup during the setup process. Restore your data from an iCloud backup during the setup process. From a Mac or PC: Connect your iPhone to your computer and use Finder (macOS Catalina or later) or iTunes to transfer data manually. Connect your iPhone to your computer and use Finder (macOS Catalina or later) or iTunes to transfer data manually. From Android: Download the 'Move to iOS' app on your Android device to migrate contacts, photos, and other data seamlessly. Select the method that best suits your situation and follow the prompts to complete the transfer. Ensure your old device is fully charged and connected to Wi-Fi for a smooth process. Step 3: Connect to Wi-Fi and Set Up Your SIM To activate your iPhone, connect to a reliable Wi-Fi network or use cellular data. If your iPhone uses a physical SIM card, insert it into the SIM tray using the provided ejector tool. For eSIM-compatible models, follow the on-screen instructions to scan a QR code or manually enter the eSIM details provided by your carrier. This step is essential to enable calls, texts, and mobile data on your device. Step 4: Sign In with Your Apple ID Your Apple ID is central to accessing key iPhone features like the App Store, iMessage, FaceTime, and iCloud. During setup, sign in with your existing Apple ID or create a new one if you don't already have an account. Use a strong password and enable two-factor authentication for enhanced security. By signing in, your data, such as photos, notes, and app preferences, will sync across all your Apple devices, making sure a seamless experience. Step 5: Set Up Security Features Securing your iPhone is a critical step. Configure biometric authentication by setting up Face ID or Touch ID, depending on your device model. These features allow you to unlock your phone, authorize purchases, and access apps securely. Additionally, create a passcode for added protection. You can choose a six-digit code, four-digit code, or a custom alphanumeric passcode. These measures ensure your personal information remains safe. Step 6: Personalize Your iPhone Customizing your iPhone allows you to tailor it to your preferences and needs. Adjust the following settings to make your device uniquely yours: Display Preferences: Choose between light mode, dark mode, or auto mode, which adjusts based on ambient lighting conditions. Choose between light mode, dark mode, or auto mode, which adjusts based on ambient lighting conditions. Home Screen Layout: Organize app icons, create folders, and adjust widget placement for easy access to frequently used features. Organize app icons, create folders, and adjust widget placement for easy access to frequently used features. Sounds and Haptics: Set custom ringtones, vibration patterns, and notification tones to suit your style. These adjustments enhance your overall user experience and make your iPhone feel more personal. Step 7: Enable Advanced Features Maximize your iPhone's potential by setting up additional features that improve functionality and usability: Location Services: Enable GPS for apps like Maps, Weather, and Find My iPhone. Enable GPS for apps like Maps, Weather, and Find My iPhone. Siri: Set up Apple's voice assistant to perform tasks, answer questions, and provide hands-free assistance. Set up Apple's voice assistant to perform tasks, answer questions, and provide hands-free assistance. Screen Time: Monitor and manage your device usage by tracking app activity and setting daily limits. Monitor and manage your device usage by tracking app activity and setting daily limits. iOS Updates: Decide whether to enable automatic updates for convenience or opt for manual updates to maintain control over software changes. Decide whether to enable automatic updates for convenience or opt for manual updates to maintain control over software changes. Analytics Sharing: Review your preferences for sharing usage data with Apple to help improve their services. These features enhance your iPhone's capabilities and allow you to make the most of its advanced technology. Step 8: Finalize and Explore Before completing the setup, review and accept Apple's terms and conditions. Once accepted, your iPhone will finalize the configuration process and take you to the home screen. From here, you can begin exploring your device, downloading apps, and further customizing it to suit your lifestyle. Take time to familiarize yourself with the settings and features to ensure you're getting the most out of your new iPhone. Check out more relevant guides from our extensive collection on iPhone setup guide that you might find useful. Source & Image Credit: Simple Alpaca Latest Geeky Gadgets Deals Some of our articles include affiliate links. If you buy something through one of these links, Geeky Gadgets may earn an affiliate commission. Learn about our Disclosure Policy


The Guardian
17 hours ago
- The Guardian
US supreme court rules Doge can access personal records during legal challenge
The US supreme court on Friday permitted the so-called 'department of government efficiency' (Doge), a key player in Donald Trump's drive to slash the federal workforce, broad access to the personal information of millions of Americans in Social Security Administration data systems while a legal challenge plays out. At the request of the justice department, the justices put on hold Maryland-based US district judge Ellen Hollander's order that had largely blocked Doge's access to 'personally identifiable information' in data such as medical and financial records while litigation proceeds in a lower court. Hollander found that allowing Doge unfettered access likely would violate a federal privacy law. The court's brief, unsigned order did not provide a rationale for siding with Doge. The court has a 6-3 conservative majority. Its three liberal justices dissented. Doge swept through federal agencies as part of the Republican president's effort, spearheaded by billionaire Elon Musk, to eliminate federal jobs, downsize and reshape the US government and root out what they see as wasteful spending. Musk formally ended his government work on 30 May. Two labor unions and an advocacy group sued to stop Doge from accessing sensitive data at the SSA, including social security numbers, bank account data, tax information, earnings history and immigration records. The agency is a major provider of government benefits, sending checks each month to more than 70 million recipients, including retirees and disabled Americans. In their lawsuit, the plaintiffs argued that the SSA had been 'ransacked' and that Doge members had been installed without proper vetting or training and had demanded access to some of the agency's most sensitive data systems. Hollander in a 17 April ruling found that Doge had failed to explain why its stated mission required 'unprecedented, unfettered access to virtually SSA's entire data systems'. 'For some 90 years, SSA has been guided by the foundational principle of an expectation of privacy with respect to its records,' Hollander wrote. 'This case exposes a wide fissure in the foundation.' Hollander issued a preliminary injunction that prohibited Doge staffers and anyone working with them from accessing data containing personal information, with narrow exceptions. The judge's ruling did allow Doge affiliates to access data that had been stripped of private information as long as those seeking access had gone through the proper training and passed background checks. Hollander also ordered Doge affiliates to 'disgorge and delete' any personal information already in their possession. Based in Richmond, Virginia, the fourth US circuit court of appeals in a 9-6 vote declined on 30 April to pause Hollander's block on Doge's unlimited access to SSA records. Justice department lawyers in their supreme court filing characterized Hollander's order as judicial overreach. 'The district court is forcing the executive branch to stop employees charged with modernizing government information systems from accessing the data in those systems because, in the court's judgment, those employees do not 'need' such access,' they wrote. The six dissenting judges wrote that the case should have been treated the same as one in which a fourth circuit panel ruled 2-1 to allow Doge to access data at the US treasury and education departments and the office of personnel management. In a concurring opinion, seven judges who ruled against Doge wrote that the case involving social security data was 'substantially stronger' with 'vastly greater stakes', citing 'detailed and profoundly sensitive Social Security records', such as family court and school records of children, mental health treatment records and credit card information.