Device Security

Posted on
Cybersafety Tip: If you are gifting or receiving a new device be sure to secure it as soon as it’s unwrapped! Strong passwords including multifactor authentication on all accounts is crucial. Regularly review and restrict app permissions. Keep your operating software up to date. These steps all help you to thwart malware and scammers.
Read More Device Security

Scammer Trick: Caller ID Spoofing

Posted on
Scammers can impersonate any phone number and any organization through ‘spoofing’. You can no longer trust the name and number on your display, no matter what type of phone you use. Fraudsters use this trick to conduct scams of all kinds. They will impersonate police, a government department, a bank, a hospital, or any other organization to trick you into providing personal information or to send payment in some form.
Read More Scammer Trick: Caller ID Spoofing

Investment Scams

Posted on
This tip sheet explains how to protect yourself from an investment scam. Be on the lookout for investments said to be risk-free or low risk and high return. Always research the investor or investment firm, here’s how:
Read More Investment Scams

Scams and Fraud

Posted on
Scams and Fraud: How to spot them and stop them. This video will help you protect yourself against all kinds of scams and fraud including online and digital scams. This video will demonstrate how to detect fraud in it’s various forms, how to protect yourself against them and how to correct or respond to fraud attempts when they happen.
Read More Scams and Fraud

The CRAAP Test

Posted on
CRAAP Test is helpful for the educator and the teacher to find out whether the source related to academics is authentic or not. The CRAAP Test is the acronym for Currency, Relevance, Authority, Accuracy, and Purpose. It is not easy to find out whether the source is trustworthy to use as a tool of research or not. Sarah Blakeslee has developed the CRAAP Test with her team at California University, Chico.
Read More The CRAAP Test

CTRL-F-Teaching-Resources

Posted on
CTRL-F: Find the Facts is a program of CIVIX, which is a non-partisan registered Canadian charity dedicated to building the skills and habits of active and informed citizenship among school-aged youth. False and misleading information is rampant online, and people lack the skills and motivation to determine what to trust. To build the next generation of informed citizens, we need to adopt new ways to teach digital media literacy and source evaluation.
Read More CTRL-F-Teaching-Resources

Mount Allison University

Posted on
This guide was developed in concert with Fighting Fake News: Tips for Aspiring Truth Detectives, a presentation on fake news delivered by Sociology Professor Erin Steuter and Librarian Jeff Lilburn on 3 February 2017. The presentation covered current examples of fake news, why fake news is on the rise, and how it has political consequences. It also provided an overview of tools individuals can use to identify and debunk fake news. This guide includes many of the resources discussed in the presentation.
Read More Mount Allison University

How to Spot Fake News

Posted on
Critical thinking is a key skill in media and information literacy, and the mission of libraries is to educate and advocate its importance. IFLA has made this infographic with eight simple steps (based on FactCheck.org’s 2016 article How to Spot Fake News) to discover the verifiability of a given news-piece in front of you. Download, print, translate, and share – at home, at your library, in your local community, and on social media networks. The more we crowdsource our wisdom, the wiser the world becomes.
Read More How to Spot Fake News

The eSafety Guide

Posted on
Learn about the latest games, apps and social media, including how to protect your information and report harmful content. Do a deep dive on the safety features of the most popular apps and games. How can you report someone? Key safety links. How can you report online abuse or block someone? How can you protect your personal information?
Read More The eSafety Guide

Skim a Privacy Policy

Posted on
“I accept” is said to be the biggest lie on the internet. We know why no one actually reads the entire terms of service, and we totally understand! But before automatically accepting the terms of service or the privacy policy of a site or app, be sure to skim the policy for these 4 key words.
Read More Skim a Privacy Policy

“Malvertising”

Posted on
See how scammers are purchasing web feed ads to target victims with a tech support scam. It’s sophisticated, professional looking and very difficult for software to block.
Read More “Malvertising”

Zoom

Posted on
“Zoom is a cloud-based  video communications app that allows you to set up virtual video and audio conferencing, webinars, live chats, screen-sharing, and other collaborative capabilities.” – Business Insider why Zoom?…
Read More Zoom

WhatsApp

Posted on
“Launched in 2009, WhatsApp is a free, multi-platform messaging app that lets users make video and voice calls, send text messages, share their status, and more with just a Wi-Fi…
Read More WhatsApp

Facetime

Posted on
“FaceTime is an app that supports video and audio calling between Apple devices or Apple to Android phones. It doesn’t replace your regular phone calls but provides an alternative.” – Lifewire…
Read More Facetime

Google Duo

Posted on
“Google Duo is a free video and audio calling app made by Google. Duo relies on your phone number, enables you to reach people in your phone’s contacts list, offers…
Read More Google Duo

Skype

Posted on
“Skype is a service that enables people to make and receive free voice and video calls over the internet using a computer, web browser, or mobile phone.” – Lifewire why skype?…
Read More Skype

Comp TIA

Posted on
The cybersecurity job market is booming, but where to start? CyberSeek has detailed, actionable information for job seekers in this domain!
Read More Comp TIA

CybersecurED

Posted on
An exclusive 10-part podcast series from cybersafety educator Claudiu Popa that looks at the myths and realities of EdTech in North America.
Read More CybersecurED

Cybrary

Posted on
The leading cybersecurity and IT career development platform. Find courses for professional certifications to help you down your career path.
Read More Cybrary

IBM Training

Posted on
IBM’s repository of cybersecurity resources including a quiz to test your current know-how, training courses for students, career planning resources, and a cyber breach experience game called “Terminal”. 
Read More IBM Training

Cisco Netacad

Posted on
Cybersecurity courses developed by Cisco, from cloud and network security to cybersecurity essentials and IoT fundamentals.
Read More Cisco Netacad

PicoCTF

Posted on
Picoctf is a free computer security education program with original content built on a capture-the-flag framework created by security and privacy experts at carnegie mellon university.
Read More PicoCTF

CyberTitan

Posted on
Cybertitan prepares middle and secondary school students with learning opportunities through hands-on simulated environments
Read More CyberTitan

Fight Back

Posted on
These cool interactive games by Texas A&M University will make you think about cybersecurity will battling various villains.
Read More Fight Back

Cyber.Org

Posted on
CYBER.ORG and the Cybersecurity and Infrastructure Security Agency (CISA) partnered to produce this cybersafety video series.
Read More Cyber.Org

Getcybersafe.ca 

Posted on
Also available in French, this printable work book is loaded with fun activities for kids. All cybersafe resources are available here (insert link) in both English and French.  https://getcybersafe.gc.ca/en 
Read More Getcybersafe.ca 

 #CyberAMA Video 

Posted on
In this “Ask Me Anything” format we let the kids lead the discussion! Topics discussed included online gaming safety, handling online bullying, how to secure accounts with strong passwords and…
Read More  #CyberAMA Video 

PDF Guide

Posted on
Everything you have ever wanted to know about PDF documents! Learn how to make one, when to use one and how to add a password.
Read More PDF Guide

Tax Scams

Posted on
In this radio interview, Claudiu Popa, KCF Co-Founder explains common tax scams to watch out for.
Read More Tax Scams

Bits And Bytes

Posted on
In this video from our KnowledgeWise program, Claudiu Popa, KCF Co-Founder, describes where your data goes online and it is used in cyberfraud. Learn about protecting your personal information.
Read More Bits And Bytes

the Fraud Department Call

Posted on
This typical scam comes in many forms and often includes some correct personal information that makes victims let their guard down. Scammers will often use your name, address, part of an account number, a company name, etc. that gives their contact a sense of legitimacy.
Read More the Fraud Department Call

Phishing

Posted on
This tip sheet explains the typical signs of Phishing which are scams designed to trick victims into giving personal information or $.
Read More Phishing

Secure Your Network

Posted on
Separate your least secure devices from your most important information. Make sure your router is secure and you have created a guest network before connecting devices like ‘smart speakers’ or allowing guests to connect to your wifi.
Read More Secure Your Network