The Technology Instruction staff have curated the following videos to help you better understand how to enjoy the internet safely. The videos are organized by basics, meant to help you understand how scams work, and tips, with practical steps you can take to protect yourself.
Table of Contents
Types of Scams
Phishing: when scammers use fake emails or text messages to “fish” for information.
Features of a fake email or phishing scam:
- Lead you to a fake website
- Try to win your trust
- Claim to be from a real organization
- Ask for your information
- Promise a lot of money if you give a small amount upfront
- Ask you to download an email attachment
Malware: malicious software, is a tool used by scammers that can take many different shapes. Examples:
- A fake email used to infect your computer with malware, or a virus as soon as you open the email.
- Downloading a fake file that has a virus to infect your computer or “spyware” that tracks your online activities.
- A person may claim to be:
- a friend or family member in trouble.
- a company with a great discount or offer.
- working on behalf of a government agency, organization or collection agency.
These fraudsters can approach you by phone, email, text or social media
Stay Safe from Phishing and Scams (3:14)
This video from Google for Education discusses social engineering, a type of scam meant to gain someone’s trust in order to get their personal information.
Understanding Spam and Phishing (5:01)
In this video from GCFLearnFree.org, you’ll learn more about avoiding spam and phishing tactics.
5 Surefire Ways to Protect Your Online Privacy (0:51)
In this video from Common Sense Media for Families learn five surefire ways to protect kids (and your) privacy online
How to Avoid Online Scams (4:13)
This video from Consumer Reports uses a comical game show format to highlight expert advice for protecting yourself from online threats and keeping your personal data secure.
A Cyber Privacy Parable (3:27)
In this video from NOVA PBS Official follow the trials and tribulations of one social media user to better understand how hackers can take advantage of seemingly innocent information we post online.
Lateral Reading (2:56)
This video from the University of Louisville Research Assistance & Instruction explains how and why to use Lateral Reading. This fact checking method will help you to evaluate the credibility of online sources.
How to Create a Strong Password (3:30)
This video from Safety in Canada will help you understand the risks certain password formats can include as well as tips for making passwords stronger.
Former NSA Hacker Reveals 5 Ways To Protect Yourself Online (3:28)
In this video from Tech Insider you’ll hear from a former NSA hacker about 5 practical steps you can take to help prevent getting hacked.
Cybersecurity: Crash Course Computer Science (12:29)
This video from CrashCourse and PBS Digital Studio you’ll learn about Cybersecurity, types of cyber attacks, and strategies you can use to stay safe online.
Staying safe online is essential in today’s world. Use these Internet safety tips to keep yourself and your loved ones protected.
Use the Google Transparency Report site, https://transparencyreport.google.com/safe-browsing/search
Copy & paste the URL of any website into the search bar to verify that it is safe.
Creating strong passwords
- Make the password longer
- 8 – 10 characters min
- Use short phrases
- 6 or more words without spaces
- Meet any requirements of the site you are creating the password for
- Include letters, numbers, and special characters
- Use common words
- Include personal information
- Use the same password on multiple sites
- Share your passwords, especially via text or email
Privacy and Security Tips for Microsoft Edge
email@example.com | 609-882-4050