The Tech Wise Interactive Learning Hub

Safer Email & Messaging

About The Resource

Welcome to the Tech Wise Interactive Learning Hub, a hands-on extension of the Tech Wise six-part cybersafety series. This page offers practical H5P activities designed to help older adults strengthen their digital safety skills through real-world scenarios and guided practice.

Here, you’ll explore key topics covered in the Tech Wise program, such as recognizing scams, protecting personal information, using strong passwords, and browsing safely online. Each activity helps you apply what you’ve learned in a simple, interactive way using your own device.

Whether you’re new to technology or looking to build confidence online, this resource gives you a safe space to learn, test your knowledge, and become #UnHackable.

session 1 slideshow

Activity Instructions

Set Up 2FA 5

When you see the “On Your Device” icon in the presentation slide, scroll to the corresponding activity number to the presentation slide and complete the activity. Happy learning!

Disclaimer

Device and platform specific instructions are general and may vary slightly depending on version/model.


Checking For Unsafe Files or Websites

VirusTotal is a free online tool that scans files, links, or websites using multiple antivirus engines at once.

Type in knowledgeflow.org and see what pops up.

  • To check a file: upload it directly from your computer.
  • To check a website or link: paste the URL into the search bar.
  • VirusTotal will show if any antivirus programs flag it as malicious.
  • Use it before opening downloads, email attachments, or unfamiliar links.
Screenshot 2025 11 11 at 2.07.28 PM

Password-Protected Attachments

Emails can be intercepted, forwarded, or accessed by unauthorized users, especially if your recipient’s inbox is compromised. Attaching unprotected files increases the risk of exposing personal or financial details to scammers. Password-protected attachments ensure that even if someone gains access to the email, they cannot open the file without the password.

To practice encrypting files, follow the device specific instructions below.


Encrypting Emails

Gmail Users

  1. Open Gmail and start a new email.
  2. Click the lock-and-clock icon (Confidential Mode).
  3. Choose an expiration date and enable SMS passcode.
  4. Send a test email to a partner and confirm they can open it only with the passcode.
Set Up 2FA 8

Outlook Users

  1. Create a new message in Outlook.
  2. Go to Options →Click on the 3 dots Encrypt → Encrypt-Only.
  3. Send a test message and verify that the recipient must sign in to view it.
Set Up 2FA 10

Yahoo

Yahoo Mail does not support built-in encrypted emails, so the safest method is to password-protect the file before attaching it.


Auto-forwarding Settings

Scammers may secretly set up your email to auto-forward incoming messages to their address, giving them access to sensitive information without your knowledge. To protect yourself, check your email settings regularly and look for any unknown forwarding addresses.

Click on your email provider below to learn the steps of reviewing forwarding settings.


Email Recovery Settings

Your email recovery settings are the key to regaining access if you ever get locked out of your account. Keeping them up to date helps protect against hackers who may try to reset your password or take over your account using outdated information.

Click on your email provider below for step-by-step instructions on how to review and update your recovery settings.


Email Filters

Gmail

  • Open Gmail and click the Show search options icon in the search bar.
  • Enter your search criteria, then click Search to preview the results.
  • At the bottom of the window, select Create filter.
  • Choose the actions you want the filter to perform, then click Create filter again to save it.

Resource from Google.

Outlook

  • Right-click an existing email and choose Rules > Create Rule.
  • Set a condition (for example, Subject contains) and choose an action (such as Move the item to folder).
  • Select an existing folder or create a New folder, then click OK.
  • To apply the rule immediately, check Run this new rule now on messages already in the current folder.
  • Click OK , the messages will move to the selected folder.

Resource from Microsoft.

Yahoo

  • Open Yahoo and click the three dots (More) in the bottom left corner.
  • Select “Settings”.
  • Navigate to “Filters”.
  • Click Add new filters and give it a name.
  • Set your filter rules (sender, subject, keywords, etc.) → choose the destination folder.
  • Click Save to apply the filter.

Enabling custom Notifications

gmail

  • Open Gmail, and select “Settings”, then “General”.
  • Enable your desired notification and sound.
Set Up 2FA 11

outlook

  • Open Outlook, and click “Settings”, then search for “Notifications” in the search bar.
  • Go to “Notify Me About” and click on dropdown arrow.
  • Customize and enable desired notifications.
Set Up 2FA 12

Yahoo

  • Open Yahoo and click the three dots (More) in the bottom left corner.
  • Select “Settings”.
  • Navigate to “Notifications”.
  • Customize and enable desired notifications.
Set Up 2FA 13

Identifying Scam Text Messages

Receiving scam text messages occur often for many individuals, and learning how to spot them will strengthen your ability to protect yourself. In this activity you will practice safe digital habits through reviewing your text messages.

  • Open your text messages.
  • Look for messages from unsaved numbers. Who do they claim to be?
  • Do any ask for urgent action, money, or personal info?
  • Do the messages come with links?
  • Practice deleting and reporting messages as spam.
Untitled design 1

Messaging Settings

Enabling messaging settings to control who can contact you is crucial for protecting your privacy and security. It helps reduce unwanted messages, spam, and potential scams by limiting interactions to trusted contacts. This control also minimizes exposure to phishing attempts and impersonation, creating a safer and more comfortable online experience.

To learn how to enable messaging settings to control who can contact you throughout different messaging platforms, click through the presentation below.


Wrapping Up: phishing Quiz

Now that you’ve completed Session 3, it’s time to see how much you remember about spotting phishing scams! This phishing quiz, created by Google, will test your ability to differentiate between legitimate and scam content in emails, text messages, and attachments.


Bonus Activity

As a bonus activity, you will have the opportunity to review selected UnHackathon project entries developed by student participants across Canada. These young creators worked hard to design their own cybersecurity resources for seniors, and this is your chance to see their ideas in action.

Please keep note that the projects may be incomplete or contain inaccuracies, as they were created as part of a learning process. Enjoy reviewing their work and give them a big round of applause for their effort and creativity!

For each entry:

  • Discuss what you think was done well.
  • Identify what could be improved or was missing.
  • Reflect on how the project could better support cybersafety for older adults.

Session 3 Wrap-Up & Checklist

In this session, you strengthened your ability to communicate safely online by learning how to spot unsafe emails and messages, identify phishing attempts, and understand the risks of malicious links and attachments. You also explored how scammers use techniques like email header spoofing to appear legitimate, gaining the knowledge to protect your personal information and stay secure in your digital communications.

  • Check email headers to verify the true sender before replying or clicking links.
  • Hover over links to preview their destination and avoid unsafe or shortened URLs.
    Be cautious with attachments. Only open files from verified sources.
  • Encrypt sensitive emails and use password-protected documents for financial or health information.
  • Review and update your email recovery options to ensure they’re current and secure.
  • Delete and report spam or scam text messages immediately.
  • Adjust social media settings to control who can message or tag you.
  • Use filters to automatically sort, label, or block unwanted emails and messages.
  • Monitor your account for unauthorized logins or unfamiliar devices and sign out of anything you don’t recognize. Change your password immediately.