ICTC Logo Colour new logo 2
2li FrEn Wordmark C

In trusted partnership with the KnowledgeFlow Cybersafety Foundation


National CyberDay 2025 Operation Lockdown banner 1
image 1

Welcome to mission lockdown: Technology defence briefing!


mission support


Mission support

Maintaining a secure device

cybersafety

Having an Access password

Setting a password on your device is one of the simplest and most important ways to keep it secure. As a teacher, your laptop, tablet and/or phone might hold student records, lesson plans, or personal files. Using a strong access password ensures that only you can open your device, which is especially important if you step away or use shared or school-issued devices. This can prevent any unauthorized access, including from curious students. Always remember to sign out and close any sessions when you’re done, especially on shared or public devices.

Configure Inactivity Settings

As a busy teacher, you’re often moving from one task to the next. Whether you’re stepping out of the room for a moment, helping a student, or getting called into a meeting, it’s easy to leave your laptop unattended. Setting your device to lock after one to three minutes of inactivity automatically helps keep it secure. This way, the screen shuts off and can’t be turned back on without your pre-set access password. It’s an easy step that helps protect things like your gradebook, lesson plans, or email from being accessed by others, especially in shared spaces. Just as you would never leave physical copies of sensitive student records on your desk during class time, you should also never leave unlocked devices unattended.

Keeping apps and systems updated

Keeping your devices and apps up to date is one of the simplest ways to protect your information and ensure technology runs reliably in the classroom. School board devices are usually updated automatically, but personal devices like phones, tablets, and laptops rely on you to install updates. Regular updates fix glitches, improve performance, and close security gaps that could put your information at risk. If possible, turn on automatic updates so nothing gets missed, and encourage students and families to do the same at home to help keep their devices secure.

Recognizing Indicators of Compromise

Sometimes your devices or apps may start to act strange. They might slow down, freeze, or behave in ways that don’t seem normal, all of which could be signs that something is wrong. It’s essential not to ignore these warning signs, as doing so could put both your data and your students’ information at risk. If you notice anything unusual, take it seriously. Some school board policies do not allow staff to manually run virus scans on board-managed devices, so in those cases, you must always contact your IT department and follow their guidance. On personal devices, you can run checks yourself using built-in tools like Windows Defender on Windows or XProtect on Mac. If anything concerning is detected, follow the recommended steps to remove the risk, which may include having your device serviced by a trusted professional. Regardless of whether a scan finds anything or not, always report unusual behaviour to IT. Leaving issues unreported or unresolved could put you, coworkers, students, or the school at risk. By seeking help early, you can prevent minor problems from escalating and protect everyone’s safety and information.

Mission Lockdown indicators scaled

Mission support

Recognizing and naming scams

Mission Lockdown Scam

Warning: Scam!

As scam incidents continue to rise each year, everyone, including educators, faces growing risks to their digital security. These attacks seek to obtain money, personal information, or access to devices and accounts, and may occur through both school-related and personal communication channels. Understanding how scams operate is essential to safeguarding yourself, your students, and your institution

Types of scams

Tech scams exploit trust in technology and often target people with limited technical knowledge. Scammers often pose as tech support or security experts to gain unauthorized access to devices, sensitive data, or financial information.
Some scams use fake pop-ups or messages claiming your device is infected, urging you to click a link or call a number. Others impersonate legitimate companies and request remote access, which can lead to the installation of malware or the theft of sensitive information.

Some scams use real technology threats, such as:

  • Ransomware: Locks files and demands payment to restore access.
  • Spyware/Keyloggers: Secretly track and steal personal data and passwords.
  • Viruses & Worms: Spread through infected links or downloads to damage systems or steal data.

Some orchestrate fake technology scams that include:

  • Scareware: Alerts that trick you into thinking your data is at risk to get you to pay or download malware.
  • Pop-ups: Fake alerts claiming prize wins, account breaches, or software issues.

Mission support

Password best practices

CyberDay Wordpress image highlight 2 1

Passwords may seem like a small detail, but they’re your first and most important layer of protection against cyber threats. Weak passwords are often the easiest way for hackers to gain access to sensitive data, whether it’s your email, classroom tools, bank accounts, or student info systems.
Why Strong Passwords Matter
Hackers use various methods to crack passwords, including:

Characteristics of a good password

Unique:

Complex (to crack):

Secure:

Strong:

Password Managers

A password manager is a secure tool that stores all your passwords in one place, allowing you to create strong, unique passwords for every account without needing to remember them all. It can also help track fake answers to security questions for added protection.

When choosing one:

  • Read the privacy policy to ensure your info won’t be shared.
  • Check who makes it and their reputation for security.
  • Ensure it works properly on all your devices and stores data securely.

Multi-factor Authentication

Enable multi-factor authentication (MFA) whenever possible. MFA adds a powerful layer of security by requiring more than just a password to access your accounts. In addition to something you know (your password), MFA requires something you have (like a one-time code sent to your phone or an authentication app) or something you are (like a fingerprint or facial recognition).

This means that even if someone manages to steal your password, they won’t be able to access your account without the second form of verification.

Classroom Implementation

Teaching Materials (Slide Decks)

Classroom Implementation

Classroom Activities

continuing the cybersafety mission

Cybersafety for Schools Kit mailchimp landing page 2
KnowledgeFLow cybersafety foundation

Cybersafety for Schools Kit

KnowledgeFlow offers a comprehensive Cybersafety for Schools Kit designed to support educators in teaching safe and responsible technology use. The kit includes a structured email course with weekly, easy-to-digest content, lesson plans, and classroom resources. Topics cover Digital Citizenship, Mobile Device Safety, Selecting Classroom Technology, Cybersafety Curriculum Integration, and more. The materials are designed to help teachers guide students in becoming confident, responsible, and safe digital citizens.

CyberBytes: Digital Skills Professional Development for Teachers
Information and Communications Technology Council (ICTC)

CyberBytes: Cyber Security and Privacy

CyberBytes is a free, self-paced professional development program for Canadian K–12 educators, developed by certified cybersecurity experts to strengthen digital literacy while supporting personal and professional growth. One of four key topics in the course is “Cybersecurity and Privacy”, where teachers learn essential cybersafety skills, including understanding the Information Triad, managing private and personal data, controlling digital footprints, and responding to cyberattacks. By the end, you’ll be equipped to protect your own information, safeguard your students’ data, and confidently apply practical cybersecurity practices in your classroom and everyday digital life. Check out this section and explore the full CyberBytes course to build your skills across all four key areas and enhance your digital literacy even further!

cira image
The Canadian Internet Registration Authority (CIRA)

Free, printable activities and resources for teaching kids about Cybersafety.

The Canadian Internet Registration Authority (CIRA) designed these activities to help educators introduce cybersafety concepts to students in an age-appropriate manner and equip their families with tools to protect them against cyber threats.

logo