The Grandparent Scam Visual
This visual is a reminder of how the grandparent scam works and is a reminder to call 211 in Ontario for support if in doubt.
One-Time Passcode Scam Visual
A visual reminder of how the One-Time Passcode Scam works and how to avoid it.
Device Security
Cybersafety Tip: If you are gifting or receiving a new device be sure to secure it as soon as it’s unwrapped! Strong passwords including multifactor authentication on all accounts is crucial. Regularly review and restrict app permissions. Keep your operating software up to date. These steps all help you to thwart malware and scammers.
Discord Safety
If you use Discord, this tip sheet will help you secure your account and block unwanted contacts.
Gift Card Safety
This tip sheet will help you avoid the most common gift card scams.
Scammer Trick: Caller ID Spoofing
Scammers can impersonate any phone number and any organization through ‘spoofing’. You can no longer trust the name and number on your display, no matter what type of phone you use. Fraudsters use this trick to conduct scams of all kinds. They will impersonate police, a government department, a bank, a hospital, or any other organization to trick you into providing personal information or to send payment in some form.
how scammers are using ‘malvertising’ this holiday shopping season.
Watch the interview with CTV News Montreal and KnowledgeFlow Co-Founder, Claudiu Popa, to learn about the latest technology traps and how to avoid them
Holiday Survival Cybersafety Tips
Essential Cybersafety Tips & Tools
for Holiday Survival
Common Online Scams Part 1
With the internet now right in our pockets, the opportunities for online scams are endless. Make sure not to fall for these common scams
Investment Scams
This tip sheet explains how to protect yourself from an investment scam. Be on the lookout for investments said to be risk-free or low risk and high return. Always research the investor or investment firm, here’s how:
Scams and Fraud
Scams and Fraud: How to spot them and stop them. This video will help you protect yourself against all kinds of scams and fraud including online and digital scams. This video will demonstrate how to detect fraud in it’s various forms, how to protect yourself against them and how to correct or respond to fraud attempts when they happen.
How to Secure a Google Document
These online safety tips were turned in to handy bookmarks by our amazing Capstone Student Team from Ontario Tech University. Print these out as a daily reminder to stay #UnHackable!
What to do After Identity Theft
If you have been the victim of identity theft or suspect that your information may have been compromised you need to secure your accounts and information immediately. This tip sheet outlines who to notify and how.
All About Malicious Apps
All about malicious apps: what are they, how to spot them, and how to avoid them. This resource was created by one of KnowledgeFlow’s fabulous high-school volunteers!
How to identify misinformation, disinformation, and malinformation
From the Canadian Centre for Cyber Security, this awareness document outlines the types of false information and what businesses and individuals can do to investigate further and protect themselves against MDM.
5 Steps for Vetting a News Source
Created by the News Literacy Project, this infographic explains the steps you can take to vet a news source for signs of credibility.
The CRAAP Test
CRAAP Test is helpful for the educator and the teacher to find out whether the source related to academics is authentic or not. The CRAAP Test is the acronym for Currency, Relevance, Authority, Accuracy, and Purpose. It is not easy to find out whether the source is trustworthy to use as a tool of research or not. Sarah Blakeslee has developed the CRAAP Test with her team at California University, Chico.
CTRL-F-Teaching-Resources
CTRL-F: Find the Facts is a program of CIVIX, which is a non-partisan registered Canadian charity dedicated to building the skills and habits of active and informed citizenship among school-aged youth. False and misleading information is rampant online, and people lack the skills and motivation to determine what to trust. To build the next generation of informed citizens, we need to adopt new ways to teach digital media literacy and source evaluation.
Mount Allison University
This guide was developed in concert with Fighting Fake News: Tips for Aspiring Truth Detectives, a presentation on fake news delivered by Sociology Professor Erin Steuter and Librarian Jeff Lilburn on 3 February 2017.
The presentation covered current examples of fake news, why fake news is on the rise, and how it has political consequences. It also provided an overview of tools individuals can use to identify and debunk fake news. This guide includes many of the resources discussed in the presentation.
How to Spot Fake News
Critical thinking is a key skill in media and information literacy, and the mission of libraries is to educate and advocate its importance. IFLA has made this infographic with eight simple steps (based on FactCheck.org’s 2016 article How to Spot Fake News) to discover the verifiability of a given news-piece in front of you. Download, print, translate, and share – at home, at your library, in your local community, and on social media networks. The more we crowdsource our wisdom, the wiser the world becomes.
“Safety Check” for iOS16
If you have upgraded to iOS16 on your phone you have a handy new security and privacy feature!
Know Your Worth on Social Media
This fascinating look into the business and money behind social media is an eye-opening activity. The slides below may be used in conjunction with the video.
How to password protect a Microsoft Word/ Excel/ PowerPoint Document
How to password protect a Microsoft Word/ Excel/ PowerPoint Document.
The eSafety Guide
Learn about the latest games, apps and social media, including how to protect your information and report harmful content. Do a deep dive on the safety features of the most popular apps and games. How can you report someone? Key safety links. How can you report online abuse or block someone? How can you protect your personal information?
ICTC Digital Dash
This summary highlights ICTC’s approach to jump starting digital careers through it’s K-12 offerings.
5 Tips to Protect Your Online Privacy
This poster was created in partnership with the provincial, territorial and federal privacy commissioner and ombudsman offices in Canada.
A Guide to Privacy and Access to Information in Ontario Schools
This guide provides answers to common questions about privacy and access to information in the school system. The goal is to provide Ontario’s school board officials and education professionals with…
Cryptocurrency Scam Infographic from the Canadian Anti-Fraud Centre
Learn about crypto investment scams and their various forms. This resource was created by the CAFC and its international partners.
Skim a Privacy Policy
“I accept” is said to be the biggest lie on the internet. We know why no one actually reads the entire terms of service, and we totally understand! But before automatically accepting the terms of service or the privacy policy of a site or app, be sure to skim the policy for these 4 key words.
“Malvertising”
See how scammers are purchasing web feed ads to target victims with a tech support scam. It’s sophisticated, professional looking and very difficult for software to block.
The Unusual Activity on Your Account Email
This Scam Hall of Shame winner is “The Unusual Activity in Your Account Email”. This example is supposedly from Amazon, but this type of email is used by scammers to imitate all sorts of companies. Spot the red flags!
Media Smarts for Parents
Get a better understanding of the various activities kids and teens love to do online and learn comprehensive strategies and tips to help them.
Zoom
“Zoom is a cloud-based video communications app that allows you to set up virtual video and audio conferencing, webinars, live chats, screen-sharing, and other collaborative capabilities.” – Business Insider why Zoom?…
“Launched in 2009, WhatsApp is a free, multi-platform messaging app that lets users make video and voice calls, send text messages, share their status, and more with just a Wi-Fi…
Facetime
“FaceTime is an app that supports video and audio calling between Apple devices or Apple to Android phones. It doesn’t replace your regular phone calls but provides an alternative.” – Lifewire…
Google Duo
“Google Duo is a free video and audio calling app made by Google. Duo relies on your phone number, enables you to reach people in your phone’s contacts list, offers…
Skype
“Skype is a service that enables people to make and receive free voice and video calls over the internet using a computer, web browser, or mobile phone.” – Lifewire why skype?…
Become a Cybersecurity Pro
If you are interested in pursuing a career in cybersecurity, here’s your go-to guide to salaries, job markets, skills, and common interview questions.
Comp TIA
The cybersecurity job market is booming, but where to start? CyberSeek has detailed, actionable information for job seekers in this domain!
CybersecurED
An exclusive 10-part podcast series from cybersafety educator Claudiu Popa that looks at the myths and realities of EdTech in North America.
CISCO Threat Builders
Are you ready to join the defense against cyberthreats? Play this game to avoid threats and join the CISCO Bureau of Cyber Intelligence!
Cybrary
The leading cybersecurity and IT career development platform. Find courses for professional certifications to help you down your career path.
Cyber Threat Response Comic Part 2
The second part of Cisco’s thrilling comic book series about the Cyber Threat Response team and their quest for good cybersecurity.
Cyber Threat Response Comic Part 1
The first part of Cisco’s thrilling comic book series about the Cyber Threat Response team and their quest for good cybersecurity.
Restricted Intelligence
An entertaining video series that follows hapless office workers whose misadventures teach the importance of workplace cybersecurity.
Trend Micro – Targeted Attack
In this choose-your-own-adventure game, you must make tough choices to keep your company on-budget and safe as you launch a revolutionary product.
Trend Micro – Data Centre Attack
A choose-your-own-adventure game where you play the role of a CISO making tough decisions for a hospital as you try and avoid a major crisis.
IBM Training
IBM’s repository of cybersecurity resources including a quiz to test your current know-how, training courses for students, career planning resources, and a cyber breach experience game called “Terminal”.
Cisco Netacad
Cybersecurity courses developed by Cisco, from cloud and network security to cybersecurity essentials and IoT fundamentals.
Éduquer à la cybersécurité
Cette formation a été développée en collaboration avec terry cutler, un expert canadien de la cybersécurité reconnu mondialement et cybernb, un organisme mandaté par le gouvernement pour mettre l’accent sur…
National Initiative For Cybersecurity Careers and studies
Are you a high school student looking for cybersecurity resources and information?
PicoCTF
Picoctf is a free computer security education program with original content built on a capture-the-flag framework created by security and privacy experts at carnegie mellon university.
Privacy Educators Program
Created by the fordham centre on law and information policy this robust resource includes a teacher training manual and complete lesson plans. It also includes a handbook for schools and…
CyberTitan
Cybertitan prepares middle and secondary school students with learning opportunities through hands-on simulated environments
AIC – Quebec
We therefore invite you to consult the menu on the left intended for the different clienteles.
Fight Back
These cool interactive games by Texas A&M University will make you think about cybersecurity will battling various villains.
Cyber.Org
CYBER.ORG and the Cybersecurity and Infrastructure Security Agency (CISA) partnered to produce this cybersafety video series.
AAPI – Quebec
Development of sound practices in the dissemination of its image and information on the Net.
Toronto Metropolitan University
Parents’ & Guardians’ Guide to Cybersecurity. Empowering your kids in a digital world.
Getcybersafe.ca
Also available in French, this printable work book is loaded with fun activities for kids. All cybersafe resources are available here (insert link) in both English and French. https://getcybersafe.gc.ca/en
#CyberAMA Video
In this “Ask Me Anything” format we let the kids lead the discussion! Topics discussed included online gaming safety, handling online bullying, how to secure accounts with strong passwords and…
PDF Guide
Everything you have ever wanted to know about PDF documents! Learn how to make one, when to use one and how to add a password.
Scam Red Flags
This visual will help you spot a scam regardless of whether it’s a phone call, text, email or any other method of contact.
Password Best Practices
This visual password checklist will remind you to ensure your passwords are secure.
The Ultimate Guide To Securing Your Devices & Accounts
Follow these 10 steps to secure your device and protect your personal information online by securing your accounts too.
CyberSecurED Privacy And Security In Education
This podcast series features discussion about the most pressing topics in cybersecurity in the educational sector. Thought provoking conversation with educators, administrators and security experts.
Tax Scams
In this radio interview, Claudiu Popa, KCF Co-Founder explains common tax scams to watch out for.
Bits And Bytes
In this video from our KnowledgeWise program, Claudiu Popa, KCF Co-Founder, describes where your data goes online and it is used in cyberfraud. Learn about protecting your personal information.
The Covid Relief Fund Email
This example demonstrates how scammers leverage current world events to trick victims.
The Frozen Account Email
This example of the typical “your account is frozen, click here …” scam email points out the typical red flags of such a scam.
the Fraud Department Call
This typical scam comes in many forms and often includes some correct personal information that makes victims let their guard down. Scammers will often use your name, address, part of an account number, a company name, etc. that gives their contact a sense of legitimacy.
The Reward Is Waiting Email
The lure of a prize or other reward is very tempting. Be on the lookout for claims of winning. These oftem come with requests for payment of taxes or shipping on a nonexistent prize.
Romance Scams
This tip sheet explains the signs of a romance scam. Be on the lookout when a new relationship seems too perfect!
Holiday Scams Part 4
In this 4 part series of tip sheets, we highlight the common shopping scams that are most prevalent during this busy time of year.
Holiday Scams Part 3
In this 4 part series of tip sheets, we highlight the common shopping scams that are most prevalent during this busy time of year.
Holiday Scams Part 2
In this 4 part series of tip sheets, we highlight the common shopping scams that are most prevalent during this busy time of year.
Holiday Scams Part 1
In this 4 part series of tip sheets, we highlight the common shopping scams that are most prevalent during this busy time of year.
Rental Scams
This tip sheet explains some of the common indicators of a rental scam.
Covid-19 Scams
This scam alert points out fraud related to the pandemic but scammers will use the same tactics regardless of the world event.
What To Do After A Breach
If you suspect your personal information has been compromised this tip sheet will explain what to do and who to contact.
Two-factor Authentication
This tip sheet explains Two-factor Authentication and how it keeps your accounts secure.
Phishing
This tip sheet explains the typical signs of Phishing which are scams designed to trick victims into giving personal information or $.
Online Banking
This tip sheet reminds you how to stay safe while online banking.
Malware
This tip sheet explains malware and how to prevent it.
How To Track Your Data
This tip sheet explains a simple but effective way of tracking which accounts have shared your email address with third parties.
How To Pick A Password Manager
This tip sheet explains what to look for when selecting a password manager program.
Facebook Privacy
This tip sheet reminds you how to secure your privacy on Facebook.
The Grandparent Scam
This tip sheet highlights the typical signs of a common scam that preys on seniors and is so common it has its own nickname.
Parental Guide
This guide lists some of the most important factors for parents to consider regarding their children’s cybersafety.
Cybersafety Travel Tips
As you head out on vacation there are 4 key things to remember to stay safe online while travelling.
Summer Cybersafety Tips
This reminder for students as they begin their summer vacation highlights key cybersafety steps.
Browser Cookies
This tip sheet explains browser cookies and how to block them.
Secure Your Network
Separate your least secure devices from your most important information. Make sure your router is secure and you have created a guest network before connecting devices like ‘smart speakers’ or allowing guests to connect to your wifi.
Recovery Pitch Scams
This tip sheet explains what a Recovery Pitch scam is and how to spot it. Remember, scammers don’t always ask for $, sometimes they offer it!
Cybercrime Fighters Calendar
This 2022/2023 calendar from our CyberCrime Fighters program is a great daily cybersafety reminder for at home or at school. Nominate a CyberCrime Fighter today!
Just Hang Up
This quick reference is a key reminder for identifying scam callers. When in doubt “Just Hang Up”!
Just Delete It
This quick reference is a key reminder for identifying scam emails. When in doubt “Just Delete It”!
Be #UnHackable
This visual representation of KnowledgeFlow’s First Principles of Cybersafety outline how To Be #UnHackable.
Online Shopping Tips
This tip sheet is a reminder for how to shop safely when online.
Tips To Stop Text Scams
Spot and stop a text scam in its tracks.
Discord Tips
This tip sheet outlines how to secure your Discord account.
Privacy Policy Tip
This quick reference is a reminder about reading the privacy policy before downloading.
Parental Control Layers
This reminder highlights the importance of layering your parental controls in order to make them effective.
New Device Tips
If your device is new there are a few things you need to remember to do!
Phishing Scams
This tip sheet highlights the typical signs of a phishing attempt.
Public Wifi Safety
This visual is a quick reminder for utilizing public wifi safely.
Malware Symptoms
Think your device has been infected by malware? Check this out.
Video Chat Safety Tips
From our KnowledgeConnect program this sheet highlights how to have video chats safely and privately.