Inspire Team

Online Safety World Cafe

by for .  
30 - 40
1

Goal

This activity aims to deepen learners’ understanding of key areas in online security, fostering collaborative learning through the World Cafe format. Learners will engage in small group discussions on Passwords, Communication, Secure Online Transactions, Device Updates & Backing Up Data, Responding to Hacking, and Online Safety. The activity concludes with group share backs and a collective discussion.

Materials

    Instructions

    1. Introduce the idea of online safety and the different things that help to keep us safe online. Ask learners what this term means to them.

      1. Based on their responses, share the following definition: Online safety, sometimes called internet safety or cybersecurity, means making sure you stay safe when you use the internet and do things online. It involves doing different things to keep yourself, your personal information, and your digital information safe while using the internet. This includes following good practices and using methods to make sure your online experience is secure and protected.

    2. As part of this activity, learners will get a chance to contribute their understanding and thoughts about good practices, tips, and suggestions for being safe online, related to 5 key areas.

    3. Explain that they’re going to do something called a World Cafe style activity. In this activity, each group starts by contributing their ideas to a particular topic. When the time is up, everyone in the group except 1 person moves on to the next topic. The person who remains stays with that topic, and shares with the new group that arrives what has been discussed so far. The new group then adds more onto what has already been discussed. This gets repeated until everyone has contributed to each topic area. Once the activity is done, the people who remained with the 1 topic will share back what was discussed at their table (or virtual break out room).

    4. Divide participants into small groups, assigning each group one of the key areas. Each group discusses and adds as many ideas, tips, and suggestions related to their assigned topic on a flip chart or virtual board.

      1. Key areas:

    • Creating and Managing Passwords

    • Communication (social media, emails, texts), Spam and Phishing

    • Secure Online Transactions and Public Networks (i.e. banking and shopping online, using public wi-fi networks, etc.)

    • Updating your devices and backing up your data

    • What to do if you think you have been hacked

    • General online safety

    1. Set a timer for 5 minutes

    1. Rotation: Once the timer has passed, ask the groups to move onto the next topic. If in person, have the groups move to a different table. If on a digital whiteboard, have them move onto another frame/sticky note and begin to generate their ideas for their new topic. Remind the person who has remained behind to bring their new group up to speed on what’s been discussed so far. The new group then adds onto it.

    2. Repeat until all groups have covered all topics, or as many topics as your timing allows.

    3. Group share back: Once complete, invite the people who remained behind to give a summary of what was discussed on their topics. Enable learners to add more, clarify, or share any other ideas that emerge as part of that discussion.

      1. Add in elements from Appendix A that the groups may have missed or that need great elaboration on.

    4. Move on to the debrief questions, using the debriefing questions provided below.


    Background

    Preparation

    • Prepare flip charts or virtual boards for each topic area.

    • Ensure markers or digital tools are available for writing.

    • Review the material in Appendix A to familiarize yourself with the content ahead of the session.

    • Highlight topics that you want to investigate further depending on the group and what you might anticipate their needs to be.

    Technology Considerations

    • In-Person: None

    • Virtual: This activity requires the use of breakout rooms and a digital whiteboard. Ensure both are available and set up in advance for the activity to run smoothly.


    Additional Context

    Some learners may share devices in their homes. It's important to emphasize the significance of safeguarding personal information even among family and friends. While they may be close, it's crucial to prioritize keeping personal information secure within the household. Sharing devices means our personal information might be visible to others, and even with the best intentions, it's natural for people to be curious. Therefore, it's essential to take measures to protect one's privacy, even in familiar environments.

    Tips for Localization

    Consider the access to the internet and public technology for the communities that the learners come from. You may need to include additional context if there are not places to access technology for the public, like a library.

    Debrief Questions

    1. Were there specific recommendations that you found particularly practical or useful? Anything you disagree with?

    2. Were there any surprising tips or suggestions shared by other groups that you hadn't considered before?

    3. What changes or improvements do you think you can make to enhance your online safety practices?



    APPENDIX A - Best Practices

    Creating and Managing Passwords

    • Use Strong Passwords: Create passwords with a mix of uppercase and lowercase letters, numbers, and special characters. Avoid easily guessable information like birthdays or common words.

    • Unique Passwords for Each Account: Use different passwords for various accounts to minimize the impact if one is compromised.

    • Enable Two-Factor Authentication (2FA): Add an extra layer of security by enabling 2FA whenever possible. You may also consider biometric authentication, if that’s something you’re comfortable with.

    • Regularly Update Passwords: Change passwords periodically to reduce the risk of unauthorized access.

    • Use a Password Manager: Consider using a reputable password manager to securely store and manage complex passwords. (Google Password Manager, Nordpass, Bitwarden).


    Communication (social media, emails, texts), Spam and Phishing

    • Verify Sender Information: Confirm the identity of senders before clicking on links or providing sensitive information. Is the email spelled correctly? Does it have a legitimate domain name (i.e. the part that comes after @ in an email address). Check profiles of individuals that request to friend or follow you (Is it a new profile? Is there very much information? Do other people you know follow this person? Are all of the posts recent?)

    • Be Skeptical of Unsolicited Messages: Exercise caution with unexpected emails, messages, or friend requests, especially if they contain suspicious links.

    • Avoid Clicking on Unknown Links: Refrain from clicking on links in emails or messages from unknown sources to prevent phishing attacks.

    • Check URLs and Email Addresses: Verify the legitimacy of websites and email addresses before interacting with them.

    • Educate Yourself on Common Phishing Tactics: Stay informed about common phishing tactics and be cautious of messages that create a sense of urgency.

    • Block and report suspicious emails or accounts.

    • Never share your location or personal information: Banks, the government, or reputable institutions would never request personal information through a text or email.



    Secure Online Transactions and Public Networks (i.e. banking and shopping online, using public wi-fi networks, etc.)

    • Use Secure Websites: Ensure websites use HTTPS for secure data transmission during online transactions.

    • Avoid Saving Payment Information: Refrain from saving credit card information on websites to minimize the risk of unauthorized access.

    • Use Trusted Payment Platforms: Opt for secure payment methods like PayPal, Apple Pay, or Google Pay for online transactions.

    • Avoid Public Wi-Fi for Sensitive Transactions: Use public Wi-Fi cautiously and avoid conducting sensitive transactions on unsecured networks.

    • Regularly Monitor Bank Statements: Keep a close eye on bank and credit card statements for any unauthorized transactions.


    Updating Your Devices and Backing Up Your Data

    • Enable Automatic Updates: Turn on automatic updates for operating systems and software to ensure the latest security patches are applied.

    • Back Up Data Regularly: Use cloud services or external devices like external hard drives to regularly back up important data to prevent loss in case of device issues.

    • Install Antivirus Software: Install reputable antivirus software to protect devices from malware and other security threats.

    • Secure External Storage: Never save your documents on public computers. Even if you delete them, they are easy to recover. Use a USB for this. If using USBs or external hard drives, password-protect or encrypt them for added security and make sure you store them in a safe location.

    • Test Data Restoration: Sometimes, practice trying to access your back up information to make sure that your backup methods have been working well, in case you need to bring it back after a backup.


    What to Do If You Think You Have Been Hacked

    • Contact Your Bank or Credit Card Company: Immediately contact your bank or credit card company to report any suspicious activity and secure your accounts.

    • Change All Passwords: Change passwords for all accounts to prevent further unauthorized access.

    • Notify Relevant Authorities: Report the incident to local authorities and relevant online platforms, such as social media or email providers. If you think your identity has been stolen, report it to authorities immediately.

    • Run Security Scans: Use reputable antivirus or antimalware tools to scan and clean your devices. Take your devices into a professional company if you’re not sure how to do this yourself.

    • Monitor Personal Information: Keep a close watch on personal information and consider identity theft protection services.


    General online safety

    • Be Mindful of Personal Information: Limit the sharing of personal information online and adjust privacy settings on social media platforms.

    • Regularly Review Privacy Settings: Periodically review and update privacy settings on online accounts and social media platforms.

    • Educate Yourself on Online Risks: Stay informed about common online risks, scams, and cyber threats.

    • Use a Virtual Private Network (VPN): Consider using a VPN to enhance online privacy, especially when using public Wi-Fi networks.

    • Use incognito or private browsing on shared devices: If you share devices at home or at public locations like the library, consider using the private browsing feature of the browser you are using.

    • Close unused accounts: Close your old, unused accounts and request that your data be deleted from relevant third party servers. This sometimes involves contacting companies to request that your information be deleted.

    • Regularly Update Security Software: Keep security software, including antivirus programs and firewalls, up to date for enhanced protection against online threats.

    • Be careful what you download: Viruses often come through downloads, so be extra careful what you decide to download. Check your downloads folder regularly and if you see anything suspicious, delete it immediately.

    • Empty your trash: Whether it’s on a computer or in your email, remember to empty your trash. Deleting something doesn’t make it disappear, it just puts it in the trash. Like the trash in your home, you have to regularly empty it.



    Comments (0) 

    Please Log in or Sign up for a FREE SessionLab account to continue.