Girl security

Posted on
Girl security – Girl Security aims at preparing girls, women, and gender minorities for national security through informed learning and training
Read More Girl security

Band runner

Posted on
Band runner – A fun game that puts your knowledge about online safety to the test by asking you to help characters make safe choices
Read More Band runner

Need help now

Posted on
Need help now – The NeedHelpNow is designed to provide youth with practical steps to regain control over the situation and stay safe online
Read More Need help now

E-Safety guide

Posted on
E-Safety guide – Learn about the latest games, apps, and social media, including how to protect your information and report inappropriate content
Read More E-Safety guide


Posted on
WICYS – A global community of women dedicated to bringing talented women together to celebrate and foster their passion
Read More WICYS


Posted on
Hackergals – Hackergal is a charitable organization that inspires girls across Canada to explore the opportunities in code
Read More Hackergals


Posted on
CyberTitan – CyberTitan aims at preparing the next generation of students with the necessary cybersecurity skills
Read More CyberTitan

Scammer Trick: Caller ID Spoofing – Project KnowledgeShare

Posted on
Scammers can impersonate any phone number and any organization through ‘spoofing’. You can no longer trust the name and number on your display, no matter what type of phone you use. Fraudsters use this trick to conduct scams of all kinds. They will impersonate police, a government department, a bank, a hospital, or any other organization to trick you into providing personal information or to send payment in some form.
Read More Scammer Trick: Caller ID Spoofing – Project KnowledgeShare

Investment Scams

Posted on
This tip sheet explains how to protect yourself from an investment scam. Be on the lookout for investments said to be risk-free or low risk and high return. Always research the investor or investment firm, here’s how:
Read More Investment Scams

Scams and Fraud

Posted on
Scams and Fraud: How to spot them and stop them. This video will help you protect yourself against all kinds of scams and fraud including online and digital scams. This video will demonstrate how to detect fraud in it’s various forms, how to protect yourself against them and how to correct or respond to fraud attempts when they happen.
Read More Scams and Fraud

The CRAAP Test

Posted on
CRAAP Test is helpful for the educator and the teacher to find out whether the source related to academics is authentic or not. The CRAAP Test is the acronym for Currency, Relevance, Authority, Accuracy, and Purpose. It is not easy to find out whether the source is trustworthy to use as a tool of research or not. Sarah Blakeslee has developed the CRAAP Test with her team at California University, Chico.
Read More The CRAAP Test


Posted on
CTRL-F: Find the Facts is a program of CIVIX, which is a non-partisan registered Canadian charity dedicated to building the skills and habits of active and informed citizenship among school-aged youth. False and misleading information is rampant online, and people lack the skills and motivation to determine what to trust. To build the next generation of informed citizens, we need to adopt new ways to teach digital media literacy and source evaluation.
Read More CTRL-F-Teaching-Resources

Mount Allison University

Posted on
This guide was developed in concert with Fighting Fake News: Tips for Aspiring Truth Detectives, a presentation on fake news delivered by Sociology Professor Erin Steuter and Librarian Jeff Lilburn on 3 February 2017. The presentation covered current examples of fake news, why fake news is on the rise, and how it has political consequences. It also provided an overview of tools individuals can use to identify and debunk fake news. This guide includes many of the resources discussed in the presentation.
Read More Mount Allison University

How to Spot Fake News

Posted on
Critical thinking is a key skill in media and information literacy, and the mission of libraries is to educate and advocate its importance. IFLA has made this infographic with eight simple steps (based on’s 2016 article How to Spot Fake News) to discover the verifiability of a given news-piece in front of you. Download, print, translate, and share – at home, at your library, in your local community, and on social media networks. The more we crowdsource our wisdom, the wiser the world becomes.
Read More How to Spot Fake News

The eSafety Guide

Posted on
Learn about the latest games, apps and social media, including how to protect your information and report harmful content. Do a deep dive on the safety features of the most popular apps and games. How can you report someone? Key safety links. How can you report online abuse or block someone? How can you protect your personal information?
Read More The eSafety Guide

BuildingU Resources

Posted on
Check out BuildingU’s resources for high school students. Find funding options, internship opportunities and educational programs for high school students from around the globe.
Read More BuildingU Resources

Skim a Privacy Policy

Posted on
“I accept” is said to be the biggest lie on the internet. We know why no one actually reads the entire terms of service, and we totally understand! But before automatically accepting the terms of service or the privacy policy of a site or app, be sure to skim the policy for these 4 key words.
Read More Skim a Privacy Policy


Posted on
See how scammers are purchasing web feed ads to target victims with a tech support scam. It’s sophisticated, professional looking and very difficult for software to block.
Read More “Malvertising”


Posted on
“Zoom is a cloud-based  video communications app that allows you to set up virtual video and audio conferencing, webinars, live chats, screen-sharing, and other collaborative capabilities.” – Business Insider why Zoom?…
Read More Zoom


Posted on
“Launched in 2009, WhatsApp is a free, multi-platform messaging app that lets users make video and voice calls, send text messages, share their status, and more with just a Wi-Fi…
Read More WhatsApp


Posted on
“FaceTime is an app that supports video and audio calling between Apple devices or Apple to Android phones. It doesn’t replace your regular phone calls but provides an alternative.” – Lifewire…
Read More Facetime

Google Duo

Posted on
“Google Duo is a free video and audio calling app made by Google. Duo relies on your phone number, enables you to reach people in your phone’s contacts list, offers…
Read More Google Duo


Posted on
“Skype is a service that enables people to make and receive free voice and video calls over the internet using a computer, web browser, or mobile phone.” – Lifewire why skype?…
Read More Skype

Comp TIA

Posted on
The cybersecurity job market is booming, but where to start? CyberSeek has detailed, actionable information for job seekers in this domain!
Read More Comp TIA


Posted on
An exclusive 10-part podcast series from cybersafety educator Claudiu Popa that looks at the myths and realities of EdTech in North America.
Read More CybersecurED


Posted on
The leading cybersecurity and IT career development platform. Find courses for professional certifications to help you down your career path.
Read More Cybrary

IBM Training

Posted on
IBM’s repository of cybersecurity resources including a quiz to test your current know-how, training courses for students, career planning resources, and a cyber breach experience game called “Terminal”. 
Read More IBM Training

Cisco Netacad

Posted on
Cybersecurity courses developed by Cisco, from cloud and network security to cybersecurity essentials and IoT fundamentals.
Read More Cisco Netacad

Sans Cyber Aces

Posted on
An online course that teaches the core concepts needed to assess and protect information security systems. Developed by the Sans Institute.
Read More Sans Cyber Aces

The Crash Course

Posted on
Want to get up to speed on in-depth cybersecurity quickly? Crash Course Computer Science will inform and engage you in just over ten minutes!
Read More The Crash Course


Posted on
Picoctf is a free computer security education program with original content built on a capture-the-flag framework created by security and privacy experts at carnegie mellon university.
Read More PicoCTF


Posted on
Cybertitan prepares middle and secondary school students with learning opportunities through hands-on simulated environments
Read More CyberTitan

Fight Back

Posted on
These cool interactive games by Texas A&M University will make you think about cybersecurity will battling various villains.
Read More Fight Back


Posted on
CYBER.ORG and the Cybersecurity and Infrastructure Security Agency (CISA) partnered to produce this cybersafety video series.
Read More Cyber.Org

OIPC – Alberta 

Posted on
Lesson Plans and Activities for K-12 Education. These resources were developed with Canada’s federal, provincial and territorial privacy commissioners. 
Read More OIPC – Alberta 

Posted on
Also available in French, this printable work book is loaded with fun activities for kids. All cybersafe resources are available here (insert link) in both English and French. 
Read More 

 #CyberAMA Video 

Posted on
In this “Ask Me Anything” format we let the kids lead the discussion! Topics discussed included online gaming safety, handling online bullying, how to secure accounts with strong passwords and…
Read More  #CyberAMA Video 


Posted on
From KnowledgeFlow, an online challenge that will force you to do some quick research to solve a puzzle and unlock a website!
Read More UnHackThis


Posted on
This interactive children’s activity kit comes with a video and a workbook filled with pictures, games, and activities focused on cybersecurity.
Read More KnowBe4

PDF Guide

Posted on
Everything you have ever wanted to know about PDF documents! Learn how to make one, when to use one and how to add a password.
Read More PDF Guide

Tax Scams

Posted on
In this radio interview, Claudiu Popa, KCF Co-Founder explains common tax scams to watch out for.
Read More Tax Scams

Bits And Bytes

Posted on
In this video from our KnowledgeWise program, Claudiu Popa, KCF Co-Founder, describes where your data goes online and it is used in cyberfraud. Learn about protecting your personal information.
Read More Bits And Bytes

the Fraud Department Call

Posted on
This typical scam comes in many forms and often includes some correct personal information that makes victims let their guard down. Scammers will often use your name, address, part of an account number, a company name, etc. that gives their contact a sense of legitimacy.
Read More the Fraud Department Call