Story

Video 2.1
Source: eCampus Ontario
Length: 0:51


Prioritizing digital safety is essential for you as a learner, a professional, and an individual. When participating digitally, you need to understand your rights with respect to personal digital data and know how to protect your privacy and security and respect the privacy and security of others.

The following sections will help you and Lise develop the Digital Safety skills required to protect yourself online. You will learn about:

  • managing cyber risks to your digital privacy and security; and
  • strategies to protect yourself against cyber risks, including virus protection software, virtual private networks (V.P.Ns), and multi-factor authentication (M.F.A.).

Cyber Risk Management

When you are learning, working, or engaging in daily activities online, it is essential to identify and manage cyber risks. Cyber risks are virtual threats to your digital privacy and security (Norton, 2021). 

Digital privacy is your right to control how your digital information is collected, shared, and stored.

Digital security helps protect you from other people accessing, using, changing, or stealing your digital personal information or other data. 

Cyber risks to your digital privacy and security occur through the digital devices connected to or communicating with the internet. Digital devices store, collect, process, and share huge amounts of personal information, or data, about you.

digital illustration

Image 2.3
Source: iStock
Description: A person with medium-light skin using a laptop. There is a smartphone laying screen down on the desk next to the laptop as the person appears to be checking their smart watch. Only their hands and a portion of their torso are in-frame.


It’s important to take measures to protect the data on these devices from loss; theft; and threats, such as viruses and spyware (Office of the Privacy Commission of Canada, 2020). For example, your smartphone might hold messages, emails, phone calls, location data, health information, banking/financial accounts, images and videos of a private/personal nature (e.g., pictures of your family or your driver’s license), lists of tasks, contacts (friends, coworkers, family), your meetings, where and how you shop, which websites you visit, usernames and passwords, biometric information, and more. The list seems endless—and in some sense, it is because you are constantly creating new data via your smartphone (Robertson, 2022).

Check out this video about cybersecurity and how to protect yourself online!

Video 2.2
Source: NOVA PBS Official. (2014, September 15). How to Protect Your Data Online [Video]. YouTube. https://www.youtube.com/watch?v=sdpxddDzXfE 
Length: 3:52


 icon of a lit lightbulb in a circle

The following tips can help protect your digital privacy and security. Please note the hyperlinks in the image lead to the source listed below.

Digital Privacy Tips
(from https://tlp-lpa.ca/learning-online/privacy/)

screenshot

Image 2.4
Source: The Learning Portal. (n.d.). Online Privacy: Tips [Screenshot]. College Libraries Ontario. https://tlp-lpa.ca/learning-online/privacy/
Description: Tips for knowing your rights, managing your digital environment, taking a look at the terms of use, and keeping your cloud storage private. You can read a full description of these tips from the source page.


Digital Security Tips
(from https://tlp-lpa.ca/learning-online/security/)

screenshot

Image 2.5
Source: The Learning Portal. (n.d.). Online Security: Tips for Staying Secure [Screenshot]. College Libraries Ontario. https://tlp-lpa.ca/learning-online/security/ 
Description: Tips for staying secure online, which include: keeping your device updated; installing security software; locking your device with strong passwords; considering what you access on public networks; considering encryption services; and backing up your device. You can read a full description of these tips from the source page.


 icon of a magnifying glass

Have you ever heard of a digital footprint?

digital illustration

Image 2.6
Source: iStock
Description: A foot composed of hundreds of small icons used in computing and on the internet, such as speech bubbles, up and down thumbs, envelopes, printers, video icons, mouse pointers, globes, volume control icons, phones, documents, and more.


A digital footprint is the trail of data you create while using the internet. This data trail comes from the websites you visit, the emails you send, and the information you submit or download online. You build your footprint both actively and passively (Canadian Centre for Cyber Security, 2022).

  • Active digital footprint: Data left through intentional actions, such as posting on social media, filling out online forms, or agreeing to browser cookies.
  • Passive digital footprints: Data left unintentionally or unknowingly. This data is often collected by monitoring tied to your I.P. address. Websites and applications may install cookies on devices without disclosure, use location tracking, or log your activities.

Try It!

icon of an outline of a person using a computer


Your digital footprint is permanent, but it can be managed. Here are some tools to manage your digital footprint (Robertson, 2022):

  1. Use the Google search for your full name, username(s), and email address(es).
    1. Try variations of your name (spelling, short forms).
    2. Use search qualifiers (Boolean Operators) such as intext: John Doe (where John Doe is your first and last name) in the Google search field.
    3. Modify the above search to add things like your organization or place of employment, city, places where you volunteer, committees to which you are a member, etc.
    4. Try searching your name in Google Images.
    5. Try searching your cell/home/work phone number(s).
  2. You can complete the searches in other web search engines as well (e.g., DuckDuckGo, Bing, Yahoo, Qwant).
  3. Check out online identity information aggregation tools such as Info Tracer. This provides very detailed results.

When you take the time to access these tools, you will learn much more about the extent of your personal digital footprint. Take a critical stance toward the personal information about you that is out there and calculate your level of comfort with the associated risks.

Have you ever heard of OSINT?

digital illustration

Image 2.7
Source: Research. (2022, September 28). What is Open-Source Intelligence (OSINT)? AppCheck. https://appcheck-ng.com/what-is-open-source-intelligence-osint/ 
Description: An infographic with several columns. The first column includes several blocks with icons labeled as follows: press, podcasts, new sites, forums, blogs, trade sites, and social networks. The second column is labeled collection; the third column processing; and the fourth column analysis. As columns progress from left to right they get smaller. To the right of the columns is an icon of a computer monitor and P.C. tower.


OSINT (short for open source intelligence) is an intelligence gathering method used to collect and analyze publicly available information for investigative purposes. OSINT is used by governments, businesses, organizations, and individuals to gather information about security threats, market research, and competitive intelligence. Open source information can come from websites, libraries, public records, news media, social media platforms, and images/video (Gill, 2023).

When you researched your digital footprint in the activity above, you engaged in OSINT. OSINT is a growing field with application across many professions. Completing an OSINT training course or program can open up new opportunities for you in your current or future workplace. 


icon of a checklist on a page with a pen checking off items on the listActivity

Instructions

Let’s review some key terms! Match each cyber security term with its definition. Drag and drop the terms in the top onto the example below. The box will turn green when it is matched with the correct example.


icon of a silhouette outline of a head with a gear in place of the brain demonstrating reflection

Think about a digital device you use or have used in your life…

  • What private information does the device hold? 
  • Do you feel like this information is secure?
  • Do the benefits of using this device outweigh the cyber risks to your privacy and security?

Protecting Against Cyber Risks

There are many ways you can protect yourself against cyber risks, including virus protection software, virtual private networks (V.P.Ns), and multi-factor authentication (M.F.A.).

Virus Protection Software

Virus protection software protects your digital device (e.g., computer, laptop, or smartphone) and the information it holds from computer viruses. A computer virus is a type of malicious software, or malware, that spreads between digital devices and damages your data and software. Like the flu virus, a computer virus spreads from host to host and reproduces itself by attaching to the new host.

Computer viruses and other malware can be spread in many ways, including email, legitimate software, downloaded files, text messages, and social media networks. Installing and regularly updating virus protection software on your digital devices is critical to keeping your device and information safe. Some devices have built-in antivirus protection, but adding virus protection software can be an important layer of defence against cyber risks. 

What does antivirus protection software do on your digital device?

  • Regularly scans your device for viruses and other malware (e.g., Trojans, worms, spyware, ransomware) (Centennial College, n.d.).
  • Quarantines and removes viruses and other malware before they can infect your device.
  • Protects you from viruses, other malware, and phishing during online activities (Centennial College, n.d.).

Read about how to protect yourself (Get Cyber Safe, 2020) from computer viruses and other malware.

Open the tab to learn more about V.P.Ns.

A virtual private network (V.P.N.) is a service that protects your digital privacy and internet connection. A V.P.N. is like a tunnel with only two openings: one sender and one receiver. Data travels through the tunnel between the sender and receiver, but it can’t leave the tunnel except via one of the two openings. While in the tunnel, data cannot be added, modified, or removed by any third parties. This secure tunnel between sender and receiver is possible through something called encryption (Robertson, 2022). 


Encryption is the process of masking (or changing) data so that only the intended recipient can read it. To anyone else, the data is unreadable. V.P.Ns disguise your data so that it cannot be intercepted while in transit across the internet. V.P.Ns also change the I.P. address your device broadcasts, which helps protect your location as well. Essentially, a V.P.N. makes your computer anonymous (Robertson, 2022).


Most post-secondary institutions offer a free V.P.N. for their students, faculty, and staff. Your I.T. Services department can provide guidance and support about using V.P.Ns. 

Use the arrows in the bottom right corner to scroll through each slide to learn more about V.P.Ns.


icon of a magnifying glass

More About Public Wi-FI

Public Wi-Fi is a flexible, convenient option that allows you to access the internet from public places, often for free. Public Wi-Fi is now widely available at hotspots like libraries, coffee shops, retail stores, and hotels. Public Wi-Fi makes remote learning and work possible and can also reduce your mobile data usage and associated charges.

There are two types of public Wi-Fi:

  1. Secured public Wi-Fi requires a password or other information to log in.
  2. Unsecured public Wi-Fi does not require a password or login information.

Recognizing and protecting yourself from the cyber risks associated with using public Wi-Fi is important, especially unsecured public Wi-Fi.

Read about how to protect yourself while using public Wi-Fi (Cyber Safe Canada, 2021).

Post-secondary institutions typically offer both secured and unsecured Wi-Fi on campus. In addition, most post-secondary institutions offer eduroam, a secure global wireless network for post-secondary learners, researchers, faculty, and staff. You can log into eduroam from anywhere in the world using your home institution credentials. 

Learn some general information about eduroam (n.d.).


icon of a checklist on a page with a pen checking off items on the listActivity

digital illustration

Shayan is using his laptop and unsecured public Wi-Fi at his local community centre to work on an online course.

Image 2.13
Source: eCampus Ontario
Description: Shayan sitting at a desk using a laptop computer at a community centre. There is wall-mounted display screen in the background.


Instructions

How can Shayan protect himself while using public Wi-Fi to work on his online course? (Check all that apply.)


Multi-factor Authentication

When you log into your email, social media account, online learning platform, or other online accounts, you typically need to prove your identity. Authentication is how you prove your identity and is usually accomplished through a combination of three elements (Robertson, 2022):

  • Something you know (e.g., password or personal question).
  • Something you are (e.g., biometrics like facial recognition, fingerprinting, or iris scanning).
  • Something you have (e.g., smartphone, swipe/prox/chip card, dongle, or other hardware keys).

Of these three elements, something you know (e.g., username and password) is the most common method. Personal knowledge-based questions are often used as an alternate method of verification. Biometric identification is considered the most secure. Some authentication apps (e.g., Duo, Google Authenticator or Microsoft Authenticator) are increasing in popularity (Robertson, 2022).

Because cybercriminals are actively trying to guess your online account passwords in order to access or steal your digital information, multi-factor authentication has become common practice. Multi-factor authentication (M.F.A.) requires you to prove your identity in two or more ways to access your digital account, application, or information. M.F.A. usually asks you to enter your account password plus additional information, such as a one-time S.M.S. (text) code sent to your smartphone or your answer to a secret security question. You should always opt to enable M.F.A. if it is available, especially for accounts with sensitive information like email or bank accounts.

icon of a lit lightbulb in a circle

Tips

Even with M.F.A. set up, you must create and store strong passwords for your online accounts. Here are some tips to ensure strong passwords:

  • avoid personal information like family or pet names, addresses, or birthdays
  • avoid common words and patterns like “password” or “1234”
  • use at least 15 characters in your password
  • use a passphrase (mix of random words) instead of one word
  • use a different password for each account
  • use a trusted password management tool to remember your passwords
  • never share your passwords, even with friends and family.

Check out this video about how to create a strong password!

Video 2.3
Source: Communications Security Establishment. (2022, April 5). Get Cyber Safe | Create a strong password [Video]. YouTube. https://www.youtube.com/watch?v=YeUFL3GTFT0 
Length: 2:49


    Let’s see how Lise sets up her college email account with a strong password and Microsoft Authenticator! 

    Video 2.4
    Source: eCampus Ontario
    Length: 0:46


    icon of a silhouette outline of a head with a gear in place of the brain demonstrating reflection

    How safe are you online?

    Take the Government of Canada’s Get Cyber Safe Checkup to see how secure your digital information and accounts are.

    Now, think about your current post-secondary context…

    What actions do you need to take to enhance your digital safety as a learner?

    Does your post-secondary institution have a V.P.N. (virtual private network) that you should use for online activities?

    Does your post-secondary institution require M.F.A. (multi-factor authentication) to use its email and online learning management system (L.M.S.)?


    icon of a closed book with a computer mouse clicking on it

    Learn more about digital privacy and protecting yourself against cyber risks!


    Robertson, J. (2022). Digital privacy communication tools and technologies. In Digital Privacy: Leadership and Policy (L. Robertson, B. Muirhead, J. Robertson, L. Corrigan, & H. Leatham). Ontario Tech University. https://ecampusontario.pressbooks.pub/digitalprivacyleadershipandpolicy/chapter/digital-privacy-communication-tools-and-technologies/ 

    The Learning Portal. (n.d.). Online Privacy. College Libraries Ontario. https://tlp-lpa.ca/learning-online/privacy/ 

    The Learning Portal. (n.d.). Online Security. College Libraries Ontario. https://tlp-lpa.ca/learning-online/security/ 

    Centennial College. (n.d.). Cybersecurity Awareness. https://www.centennialcollege.ca/student-life/student-services/it-services/cybersecurity-awareness  

    Security.org. (2023). How secure is my password? https://www.security.org/how-secure-is-my-password/ 

    Get Cyber Safe. (2020, February 17). Multi-factor authentication: Three reasons why it’s essential for cyber security. Government of Canada. https://www.getcybersafe.gc.ca/en/blogs/multi-factor-authentication-three-reasons-why-its-essential-cyber-security 


    icon of a checklist on a page with a pen checking off items on the listActivity

    Instructions

    In each scenario below, decide what the learner can do to reduce their cyber risks.