Cyber awareness illustration
Stay Safe Online

Understanding The Dangers Of The Internet

The internet is an amazing place to stay connected, explore interests, and manage everyday tasks. You can chat with family, learn new skills, shop, or even handle banking — all from home. But with so much convenience comes responsibility: knowing how to stay safe online.

Cyber threats can affect anyone. Scammers use fake emails, links, and websites to steal personal information or money. The good news? A few simple habits can protect you from most risks.

On this website, you’ll learn six key ways to stay safe online:

Each section of this site explains these topics step by step, with examples and simple actions you can start using right away. Learning to protect yourself online doesn’t need to be complicated — just a few smart habits make a big difference.

Two-Factor Authentication (2FA)

Two-Factor Authentication (2FA) adds another step to logging in — besides your password, you need a second code (for example, from your phone or email). This makes it much harder for hackers to get into your accounts, even if they know your password.

Video: Get Cyber Safe (Government of Canada) — "Two-Factor Authentication"

Why It Matters

Two-factor authentication protects your accounts from scammers and identity theft. Even if someone steals your password, they can't log in without your unique code.

Think of it like a bank vault — a password is just the first lock. 2FA is the second lock that keeps your accounts truly secure.

How to Set It Up

📧 Gmail

  1. Go to myaccount.google.com
  2. Click Security on the left
  3. Find 2-Step Verification
  4. Follow the prompts to add your phone number

👥 Facebook

  1. Click the menu icon (three lines) in the top right
  2. Go to Settings & PrivacySettings
  3. Click Security and Login
  4. Find Two-Factor Authentication and click Edit

🔑 Other Services

  1. Look for Security Settings
  2. Search for Two-Factor Authentication or 2FA
  3. Choose your preferred method (text, app, or email)
  4. Follow the verification steps

App Permissions

Many apps ask for permissions they don't actually need to function. By controlling what access you give to each app — like location, camera, contacts, and microphone — you can protect your privacy and prevent unnecessary data collection.

How It Works

📋

Step 1: Review Permissions

Check what permissions each app is requesting when you install or use it. Ask yourself: does this app really need this?

🚫

Step 2: Deny Unnecessary Access

Disable permissions that don't make sense. A flashlight app doesn't need your contacts or location.

📍

Step 3: Manage Location & Sensitive Data

Set location to "only while using app" and regularly audit what apps have access to your sensitive information.

Video: What the Tech: App Permissions — WILX News 10

Why It Matters

Apps often collect data beyond what they need. Your location, contacts, camera, and microphone can reveal sensitive information about you, your habits, and your relationships.

Data is valuable: Companies sell user data to advertisers and third parties. By controlling app permissions, you limit what information companies can collect and exploit about you.

How to Manage App Permissions

📱 iPhone/iOS

  1. Go to Settings on your home screen
  2. Scroll down to find Privacy
  3. Click each permission type: Location, Camera, Microphone, Contacts, Photos, etc.
  4. Review which apps have access and toggle OFF for unnecessary ones
  5. For location, change to "Only While Using" instead of "Always"
  6. Check back monthly to see what new permissions apps have requested

🤖 Android

  1. Open Settings on your device
  2. Go to Apps and notifications or Applications
  3. Tap Permissions (or find it under "Advanced")
  4. Select each permission: Camera, Location, Microphone, Contacts, etc.
  5. Review apps and change to "Only while using the app"
  6. Uninstall apps that ask for suspicious or unnecessary permissions

🖥️ Windows/Mac

  1. Windows: Go to Settings → Privacy & security → Permissions
  2. Mac: Go to System Preferences → Security & Privacy
  3. Review app access to Camera, Microphone, Documents, and Screen Recording
  4. Remove apps that don't need specific access
  5. Check browser extension permissions regularly
  6. Use privacy-focused browsers like Firefox or DuckDuckGo

Be Careful with Attachments

Malware is often hidden in email attachments and files. Don't open files from unknown senders, and be cautious even with files from people you know. One click on a malicious file can compromise your entire device.

How It Works

📨

Step 1: Unexpected Attachment

You receive an email with an attachment you weren't expecting, even from someone you know.

🦠

Step 2: Hidden Malware

The file contains malware that installs when you open it, giving scammers access to your computer.

💀

Step 3: System Compromised

Your personal files, passwords, and banking information can be stolen without your knowledge.

Video: How Hackers Use Malicious Attachments to Give You Malware — Ask leo!

Why It Matters

Malware-infected attachments are a primary way criminals gain access to your devices and personal information. Unlike phishing, you don't need to enter your information — just opening the file can compromise your entire system.

Prevention is key: Most viruses and malware spread through attachments. Being cautious about what you download and open is your strongest defense against infection.

File Safety Guidelines

🚫 Never Open

  1. Executable files (.exe, .bat, .scr) from unknown sources
  2. Compressed files (.zip, .rar) unless you're expecting them
  3. Documents with macros enabled if unsure of sender
  4. Any file from an email address you don't recognize
  5. Attachments with double extensions (.jpg.exe)
  6. Files labeled as "urgent" or "action required"

✅ Safe Practices

  1. Call or contact the sender directly if you're unsure
  2. Scan files with antivirus software before opening
  3. Use cloud storage preview (Google Drive, OneDrive) instead of downloading
  4. Keep your antivirus software updated
  5. Use Windows Sandbox or virtual machines to test suspicious files
  6. Save attachments to a specific "Downloads" folder for review

🔍 Check Before Opening

  1. File Extension: Does it match what was described?
  2. File Size: Is it unusually large for the content?
  3. Sender Address: Is it from someone you actually know?
  4. Message Content: Does it have spelling errors or seem generic?
  5. Timing: Were you expecting this file?
  6. Permissions: Does your email ask permission before downloading?

Use Strong Passwords

A strong password is one of your best defenses against hackers. Weak passwords can be cracked in seconds, while strong, unique passwords could take years or decades to break. Use a different password for each account.

How It Works

🔤

Step 1: Create Complexity

Use uppercase, lowercase, numbers, and symbols mixed throughout your password.

📏

Step 2: Make It Long

The longer your password, the harder it is to crack. Aim for at least 12-16 characters.

🔐

Step 3: Keep It Unique

Use a different password for each account so if one is breached, others stay safe.

Video: How to Make Strong Passwords! (We Can Secure Our World) — CISA

Why It Matters

Weak passwords are one of the easiest ways for hackers to gain access to your accounts. Strong, unique passwords are your first line of defense against unauthorized access to your emails, banking, and personal data.

Password strength saves lives: A weak password can be cracked in seconds. A strong password with 12+ characters could take years or decades to break, making attackers move on to easier targets.

Creating & Managing Passwords

❌ Weak Passwords

  1. 123456 or password123
  2. Your name, birthday, or phone number
  3. Common words from the dictionary
  4. Sequential numbers or keyboard patterns
  5. The same password for multiple accounts
  6. Passwords shorter than 8 characters

✅ Strong Passwords

  1. At least 12-16 characters long
  2. Mix of uppercase and lowercase letters
  3. Include numbers and special symbols (!@#$%)
  4. No personal information (names, dates)
  5. Unique for each account
  6. Created randomly or from a passphrase

🔑 Password Managers

  1. Bitwarden: Free and open-source password manager
  2. LastPass: Popular with cloud synchronization
  3. 1Password: Premium option with strong security
  4. KeePass: Offline password storage for maximum control
  5. Browser Built-in: Chrome, Firefox, Safari have password managers
  6. Tip: Password managers create strong passwords for you automatically

Keep Devices Updated & Backed Up

Software updates fix security vulnerabilities that hackers use to attack your device. Regular backups protect your data if something goes wrong. Together, they keep you secure and prepared.

How It Works

🔧

Step 1: Updates Fix Security

Software updates patch vulnerabilities that hackers use to attack your device.

💾

Step 2: Backup Your Data

Regular backups create copies of your files in safe locations like cloud storage or external drives.

🛡️

Step 3: Stay Protected

If your device is compromised, you can restore your data without losing everything to ransomware.

Video: Get Cyber Safe | Update Your Device (A Jingle Bells Cyber Security Parody) — Communication security establishment

Why It Matters

Cyber attacks and ransomware can lock you out of your files and demand payment. Regular updates and backups ensure that even if the worst happens, your important data is safe and recoverable.

Protection through preparation: Hackers are constantly finding new ways to attack outdated software. Staying updated and backed up means you're always ready for whatever comes.

Updates & Backup Tips

🔄 Enable Auto-Updates

  1. Windows: Settings → System → About → Check for updates
  2. Mac: System Preferences → General → Software Update
  3. iPhone: Settings → General → Software Update
  4. Android: Settings → System → Advanced → System Update
  5. Apps: Set automatic updates in your app store
  6. Browsers: Most update automatically in the background

☁️ Cloud Backup Options

  1. Google Drive: Automatic backup for Google devices
  2. OneDrive: Built-in for Windows and Office files
  3. iCloud: Automatic backup for Apple devices
  4. Dropbox: Easy file synchronization across devices
  5. Backblaze: Unlimited cloud backup for computers
  6. Frequency: Back up at least once a month

💿 External Drive Backup

  1. Purchase an external hard drive (1-4TB recommended)
  2. Windows: Use File History or Backup and Restore
  3. Mac: Use Time Machine for automatic backups
  4. Connect drive monthly and backup manually
  5. Store the drive in a safe location (not on your desk)
  6. Test restoring files occasionally to ensure backups work

App & Website Permissions

Apps and websites often ask for permissions they don't actually need. Just because an app asks for access to your camera, microphone, location, or contacts doesn't mean you have to allow it. Take control of what information you share.

How It Works

🔔

Step 1: Permission Request

Apps ask for access to your location, camera, microphone, contacts, photos, and more.

Step 2: Ask Yourself

Does this app really need this permission? A calculator doesn't need your location. A flashlight doesn't need your contacts.

Step 3: Say No

You can deny permissions or change them later in your device settings. You control what apps can access.

Video: What Happens When You Click “Allow”? — Appsolute kids

Why It Matters

Your location, camera, microphone, and contacts reveal sensitive information about where you go, who you know, and what you do. Apps can use this data to track you, sell your information to advertisers, or share it with third parties.

You have control: Every permission you grant is data you're sharing. Denying unnecessary permissions is one of the easiest ways to protect your privacy.

Managing App Permissions by Device

iPhone/iOS

  1. Go to Settings
  2. Scroll down and tap Privacy
  3. Check Location, Camera, Microphone, Contacts, Photos, Calendar
  4. Toggle OFF any app that doesn't need that permission
  5. For location, change to "Only While Using" instead of "Always"
  6. Check settings monthly as apps request new permissions

Android

  1. Open Settings
  2. Go to Apps and notifications
  3. Tap Permissions
  4. Select each permission: Camera, Location, Microphone, Contacts
  5. Tap each permission and turn OFF apps that don't need it
  6. Set location to "Only while using the app"

Windows/Mac

  1. Windows: Settings → Privacy & security → App permissions
  2. Mac: System Preferences → Security & Privacy
  3. Review Camera, Microphone, and Screen Recording access
  4. Remove apps that don't need specific access
  5. Check browser extension permissions regularly
  6. Use privacy-focused browsers like Firefox or DuckDuckGo