The Tech Wise Interactive Learning Hub

Protecting Accounts & Devices

About The Resource

Welcome to the Tech Wise Interactive Learning Hub, a hands-on extension of the Tech Wise six-part cybersafety series. This page offers practical H5P activities designed to help older adults strengthen their digital safety skills through real-world scenarios and guided practice.

Here, you’ll explore key topics covered in the Tech Wise program, such as recognizing scams, protecting personal information, using strong passwords, and browsing safely online. Each activity helps you apply what you’ve learned in a simple, interactive way using your own device.

Whether you’re new to technology or looking to build confidence online, this resource gives you a safe space to learn, test your knowledge, and become #UnHackable.

session 1 slideshow

Activity Instructions

Set Up 2FA 5

When you see the “On Your Device” icon in the presentation slide, scroll to the corresponding activity number to the presentation slide and complete the activity. Happy learning!

Disclaimer

Device and platform specific instructions are general and may vary slightly depending on version/model.


Account & Device Security Practices

Understanding the difference between secure and not secure practices helps protect your accounts and devices from unauthorized access and cyberattacks. Test your knowledge by completing the activity below.

Instructions:
Drag each phrase below into the correct category: Secure or Not Secure.


Optional Activity: Create an Account and Practice a Strong Password

  • Explore one of our free online courses at cybersafetyacademy.org.
  • Visit the website and register for an account.
  • Create an account using a strong password, something unique and hard to guess.
  • Write your password down or save it securely until you can store it in your password manager at home (if you don’t have one on your device).
  • Then enrol in a course:
    • Cybersafety for Everyone, or
    • How Scammers Target Seniors
Set Up 2FA 2

Enrolling In Our cybersafety Academy

To learn how to enrol in a course within our Cybersafety Academy, view the instructional video.


Password Managers – True or False?

Instructions:
Read the statement below and select True or False. Then click Check to see if you’re correct.


Learning How To Use Password managers

Password managers securely store and generate strong, unique passwords for each account, reducing the risk of password reuse and helping protect against hacking or phishing attacks.

To strengthen your online security, watch the video on how to use a password manager to safely store and create strong, unique passwords for all your accounts.


HaveIBeenPwned

  • Go to haveibeenpwned.com.
  • Enter your email address or phone number to see if it’s been exposed in a data breach.

If you’ve been Pwned, this doesn’t mean someone is actively using your account, but your information has been leaked in a past breach. It’s a warning sign that your accounts may be at risk.

Change your password if you are still using those accounts and ensure that you use a different password for each account.


Recognizing the Importance of 2FA

Two-Factor Authentication (2FA) adds an extra layer of protection by requiring something you know (like a password) and something you have (like a code or app) to access your account.

Flip through the dialog cards to see the features of each verification method.


Enabling Screensavers

A screensaver isn’t just decorative, it helps protect your privacy. When your device is idle, it can automatically lock your screen, preventing others from accessing your information. Set it to activate after a few minutes of inactivity and require a password to unlock for stronger security.

To view device-specific instructions on setting up a screensaver, click on your device below.


Software Updates

Software updates are important because they fix security weaknesses and improve how your device works. Installing updates promptly helps protect your device from new threats. The purpose of this activity is to encourage safe digital habits such as checking to see if your software requires updating, and ensuring that you do so.

To check if your software requires updating, you can check manually:

  • Apple (Applicable on Mac and iPhone): Settings > General > Software Update
  • Android: Settings > System > Software Update
  • Windows: Settings > Windows Update

Reviewing Apps & Their Permissions

  • Open the device you use most often (phone, tablet, or computer).
  • Look through your installed apps or programs. On a computer, you can check the Start Menu (Windows) or Applications folder (Mac).
  • Identify any apps or programs you haven’t used in a while.
  • Open your Settings or Privacy menu to see what permissions those apps have, like access to your camera, microphone, or location.
  • If the app isn’t needed, uninstall it. If you still use it, turn off unnecessary permissions.

Mac

  1. Click “Finder” in your taskbar.
  2. Select “Applications” in the left sidebar. View applications.
Screenshot 2025 11 07 at 2.02.06 PM

Windows

  1. Click on the Windows Logo in your taskbar, then type “Settings” in the search bar.
  2. Click on “Apps” in the left sidebar, then view installed and default apps etc.
Set Up 2FA 6

iPhone

  1. Click on the “Settings” app on your phone.
  2. Scroll down and click on “Apps”.
  3. Select your desired app, and review app permissions.
Set Up 2FA 1.5 x 3 in 1 x 2 in 1

Android

  1. Tap the Settings app on your home screen or in the app drawer.
  2. Scroll down and tap Apps (or Apps & notifications, depending on your device).
  3. Select Permissions or Permission Manager.
  4. Choose a permission category (Camera, Location, Contacts, Microphone, etc.).
  5. Tap an app to Allow or Deny permissions you no longer want it to use.
Untitled design 2

After checking for updates in your device settings, note if any updates are available and plan to install them later when you’re not using the device. Your device offers you the ability to set a convenient time for updates to install automatically to avoid interruptions.


Analyzing VPNs

  • Open your browser and search for “ free VPN”.
  • What do you notice about the top results?
  • Can you tell which are ads versus real recommendations?
  • Click on one of the websites. Do they give information about privacy and data collection?
Screenshot 2025 11 07 at 1.44.03 PM

Wrapping Up Session 2 – Test Your Learning!

Now that you’ve completed Session 2, it’s time to see how much you remember!
This short quiz will challenge what you’ve learned about creating strong passwords, recognizing secure connection methods, and keeping your personal information private.

Click the Test Your Knowledge button to begin and see how well you can apply what you’ve learned about staying safe online.


Bonus Activity

As a bonus activity, you will have the opportunity to review selected UnHackathon project entry developed by student participants across Canada. These young creators worked hard to design their own cybersecurity resources for seniors, and this is your chance to see their ideas in action.

Please note that the projects may be incomplete or contain inaccuracies, as they were created as part of a learning process. Enjoy reviewing their work and give them a big round of applause for their effort and creativity!

For each entry:

  • Discuss what you think was done well.
  • Identify what could be improved or was missing.
  • Reflect on how the project could better support cyber safety for older adults.

Session 2 Wrap-Up & Checklist

In this session, you enhanced your understanding of digital security by exploring effective methods for safeguarding passwords, implementing multi-factor authentication, and maintaining online privacy. These practices are essential to protecting both personal and organizational information in an increasingly digital world.

  • Use a password manager to create and store strong, unique passwords.
  • Enable two-factor authentication (2FA) for an added layer of account security.
  • Be cautious when connecting to public Wi-Fi; consider using your mobile hotspot or a reputable VPN.
  • Secure your devices by enabling a lock screen, using strong PINs or passwords, or adding a physical lock when needed.
  • Regularly review your accounts and devices for unfamiliar programs or suspicious activity.
  • Secure your home network by creating a strong router password and setting up a separate guest network for visitors.
  • Keep your system protected with up-to-date antivirus software and ensure your firewall is enabled to block unauthorized access.