Safeguarding Generation Z: A Comprehensive Guide to Cybersecurity
In 2017, IoT botnet infections surged by 140% compared to 2016, and the trend shows no sign of slowing. Yossi Atias, GM IoT Security at BullGuard, emphasizes that cybersecurity deserves the same seriousness as physical safety for anyone who relies on connected services.
While families worldwide invest heavily in protecting homes and property, it’s equally critical to safeguard the digital lives of the next generation. Mobile operators and communication providers must step forward as the first line of cyber defense in the smart, connected home.
Gen Z's Digital Landscape
Generation Z has never known a world without the internet. Research shows that children aged five to 16 spend an average of 6.5 hours daily in front of screens—more than twice the time recorded in 1995.
Surprisingly, 55% of parents list “internet safety” among their top five health concerns. Daily, new threats surface: cyberbullying, inappropriate content, and online predators. These dangers can spill into the physical realm as bullies and predators learn about and infiltrate their victims’ lives.
Cybercriminals worldwide generate a staggering US$1.5 trillion (≈€1.28 trillion) in profit each year—roughly the GDP of Russia. They continually refine their tactics, demanding that both developers and consumers adopt the latest security measures to stay ahead.
Threats to Generation Z
From the moment they can hold a device, children quickly master smart technology—almost as if they possess a sixth sense. The cost of cybercrime has risen 27% from 2016 to 2017, underscoring the urgency of staying ahead of evolving vulnerabilities.
Cyberbullying thrives because the internet allows anonymity, making it easier for bullies to target and predators to succeed. Parents must monitor their children’s online experiences and teach them how to recognize and avoid malicious activity.
Our homes are increasingly saturated with connected devices: fitness trackers, smart thermostats, intelligent lightbulbs, and even refrigerators that log inventory in real time. A single compromised device can expose the entire network.

The most insidious entry point for attackers is the home Wi‑Fi router. Once a hacker gains control, they can monitor all traffic and launch attacks on connected devices—sometimes escalating to physical crimes.
Protecting Generation Z
Securing the Wi‑Fi router—often delivered by a mobile or fixed-line provider—is the first step. Every IoT device requires connectivity; when all devices share a central gateway, attackers can bypass firewalls and access every device on the network. Strengthening network-level security dramatically reduces threats to all connected devices.
Consumers must adopt advanced network security solutions, keep Wi‑Fi networks private, and educate children on internet safety. Mobile and communication providers are uniquely positioned to lead the charge toward a more cyber‑secure future.
Author: Yossi Atias, GM IoT Security at BullGuard.
Internet of Things Technology
- From Traditional Machine Building to Smart Industry: How Suppliers Shape the Future
- The IoT Ecosystem: From Devices to Tangible Business Value
- From IoT to Cryptojacking: A Guide to Emerging Mobile Device Threats
- Future-Proofing IoT Security: Expert Strategies for a Safer Connected World
- Human‑Centric Strategies for IoT Security in Manufacturing
- Effective Strategies to Recover After a Cyber Attack
- Safeguarding Your Supply Chain Against Forced Labor: Best Practices & Compliance
- Manufacturers Embrace AI-Enhanced IoT for Supply Chain, Production, and Innovation
- 3 Key Obstacles to Successful Industrial IoT Implementation
- Could Bug-Inspired Neural Networks Revolutionize AI for the Internet of Things?