Aumenta la dimensione del carattere
Riduci la dimensione del carattere
Contrasto elevato
Scala di grigi
Sfondo chiaro
Reset

Digital Security 101 – Surfing the Internet Safely

|
Play Audio
|
Play Video
|
Download content: /

This training course assists older adults in safely and confidently navigating the digital world. Participants will acquire the skills to recognise online risks, protect their personal data, and adopt secure habits when using smartphones, the internet, and social media. The course also covers respectful online communication and basic tools to avoid scams, ensuring greater independence in everyday digital life.

Riconoscere i rischi online

Obiettivi di apprendimento

In questo corso imparerai:

 
 
Come identificare i rischi online comuni come truffe, notizie false e siti Web non sicuri;
 
Come proteggere i tuoi dati personali utilizzando password complesse, impostazioni sulla privacy e dispositivi sicuri;
 
Come utilizzare Internet in modo sicuro nelle situazioni quotidiane, tra cui lo shopping online, l'utilizzo del Wi-Fi pubblico e la comunicazione rispettosa.
         
Online scams and phishing
 

The internet offers numerous advantages, yet it is imperative to acknowledge the potential risks associated with its use, particularly in regard to fraudulent activities. One of the most prevalent methods employed is known as phishing. This phenomenon occurs when an individual poses as a representative of a trusted entity, such as a financial institution or a delivery service, with the intent of acquiring personal information.

It is possible that an electronic communication will be received that appears to be official, requesting that the recipient "confirm" their password or click on a link. The communication may appear to be urgent, for example by claiming that your account has been blocked or that you have won a prize, but this is merely a ruse to encourage hasty action. It has been established that such links frequently direct users to fraudulent websites that appear authentic but are designed for the purpose of harvesting personal information.

 
 

Another fraudulent scheme that has been identified is the false prize message. Claimants may be informed that they have won a gift card or smartphone, yet in order to claim the prize, they are required to pay a small fee or provide their credit card number. This is also a method of deception.

    In order to ensure the safety of individuals, it is imperative to exercise caution when engaging with electronic communications, particularly in situations where the authenticity of the sender is not fully verified. The provision of personal information or the activation of links can only be done with a high degree of confidence in the identity of the requester. It is imperative to note that legitimate banking institutions and services would never solicit passwords via email or text message. In cases where uncertainty persists, it is advisable to consult with a family member or to contact the company directly using a number that is considered reliable.
 
Fake news and misinformation

The internet is replete with information, but the veracity of that information is not guaranteed. In some cases, individuals disseminate false information, often referred to as 'fake news', without verifying its authenticity. This can result in a state of perplexity, trepidation, or even the formation of erroneous decisions. It is imperative for older adults to be able to discern reliable information.

The propagation of disinformation through social media and messaging applications such as WhatsApp has become a prevalent issue. It is possible to encounter a message that alleges a particular medicine to be dangerous, or that a famous person has died, despite there being no evidence to support these claims. It is important to note that such messages may appear authentic to the recipient, due to the employment of emotive language or the sender's familiarity. However, this does not guarantee the reliability of the information.

In order to ascertain the veracity of a statement, it is advisable to employ the following method. The identification of the individual responsible for the dissemination of this information is key. The question of reliability is paramount in determining the validity of information sources. In this regard, it is pertinent to ascertain whether the source in question is of a trustworthy nature. Such sources may include well-known news websites or government services. In the absence of such evidence, however, a degree of caution is advisable. It is imperative to exercise caution with regard to messages that lack a clear author or website, or those that explicitly urge the recipient to share them expeditiously. It is an established fact that news of a factual nature is not generally accompanied by pressure.

In cases where uncertainty persists, it is permissible to solicit assistance from a  trustworthy individual or to refer to authoritative news sources. It is imperative to verify information before disseminating it, as this practice not only safeguards individuals from the propagation of false information but also fosters a more respectful and informed online community.

 

Deceptive ads and social media scams

In the course of browsing websites or utilising social media platforms such as Facebook, it is possible to encounter advertisements or communications that appear to be of a dubious nature. Promises are made of considerable rewards, miraculous health cures, or special discounts. It has been observed that fraudulent communications are often presented as if they were messages from friends or companies. It has been established that such deceptions are frequently perpetrated online, with the objective of deceiving the unsuspecting victim into either clicking on a link or divulging personal information.

For instance, an advertisement may be encountered which claims that the recipient has won a prize, and that all that is required is to click on a link. Another possibility is that the communication is a fraudulent attempt at extortion, in which the recipient is asked to transfer funds by someone who is falsely claiming to be a family member. It has been demonstrated that those engaging in fraudulent activities frequently employ the tactic of creating an atmosphere of urgency, with the objective of exerting pressure on their targets. Examples of such tactics may include the use of messages that suggest an imminent deadline, such as "This offer ends in 5 minutes", or the use of threats, such as "Your account will be blocked". These are indicative of underlying issues.

It is important to note that fraudulent websites and profiles can appear authentic. It has been observed that the subjects often utilise replicas of logos and names belonging to reputable corporations. However, if the entity in question requests sensitive information, such as credit card numbers or passwords, it is imperative to exercise caution. It is evident that authentic commercial entities would not solicit such information via arbitrary communications or pop-up notifications.

The adage that "if something seems too good to be true, it probably is" is a well-founded one. It is important to note that feelings of guilt should not be entertained in the event of a suspicious message being ignored or deleted. In situations where uncertainty persists, it is advisable to consult with a trusted individual prior to taking any action. Prudence is a virtue that can safeguard financial assets, personal information, and a state of mental tranquillity.
 

Protecting Your Personal Data

Strong passwords and account access

Passwords represent the primary means of authentication for online accounts. These systems offer protection for a wide range of digital activities, including email, social media, and banking. In the contemporary era, it is imperative to employ robust passwords that are challenging to decipher by third parties, given the pervasive utilisation of the internet.

A strong password typically comprises a combination of letters, numerals, and symbols. It is imperative that the password does not consist of easily discernible information such as one's name, date of birth, or straightforward words such as "password" or "123456". Instead, the focus should be on the creation of a unique yet memorable piece. For instance, one may conceive of a phrase or a sentence and utilise the first letters of each word, incorporating numbers or symbols.

Furthermore, it is imperative to employ a distinct password for each account to mitigate the risk of unauthorised access. In the event of a password being stolen, there is the potential for all accounts to be compromised. The utilisation of diverse passwords has been demonstrated to enhance the security of personal information.

In order to facilitate the retention of passwords, it is recommended that they be committed to writing in a secure location, or alternatively, utilised within a password manager application. These applications are designed to store and protect users' passwords, thereby allowing them to access their accounts with a single, master password.

It is imperative to log out of all accounts upon completion of utilisation, particularly on shared or public devices. This straightforward measure can serve to prevent unauthorised access to personal information.

By acquiring the necessary skills to create and manage robust passwords, individuals can significantly enhance the protection of their digital lives and personal data.
 

Privacy settings on your smartphone and apps

In the context of smartphone usage and the utilisation of applications such as WhatsApp, Facebook, and Instagram, it is imperative to exercise caution and regulate the visibility of personal information. Privacy settings are configured to determine the visibility of personal details to third parties, thereby ensuring the security of user data.

The majority of smartphones and mobile applications offer straightforward methods of adjusting privacy settings, you can recognize it by the icon of a wheel. Among other options, users can select the visibility of their profile picture, status updates, or posts. The level of access can be tailored to specific groups, with the option to limit participation to friends or to oneself. This is a particularly salient benefit in terms of preventing unauthorised access to personal information by third parties.

 

In certain instances, mobile software applications request authorization to access specific functionalities of the device, such as geographical location, contact lists, or audio recording capabilities. Prior to consenting, it is advisable to consider whether the application truly requires this information. Permissions can be modified at a later stage in the settings menu of the device.

It is also recommended that users review their privacy settings on a regular basis, as apps are subject to frequent updates that may introduce new functionalities. It is recommended that individuals allocate a small amount of time on a monthly basis to review the data that is being shared, as this can contribute to a more effective protection of one's privacy than might be anticipated.

In the event of uncertainty regarding a setting or a permission request, it is imperative to seek assistance without hesitation. It is important to note that a range of individuals and groups can provide assistance in comprehending and navigating these settings, including family members, friends, and local digital literacy groups.

The ability to utilise privacy settings effectively is pivotal in maintaining autonomy over personal information and ensuring a secure online experience.

 

Updates and antivirus software

Ensuring the security of devices is of paramount importance, and the adoption of two fundamental habits can significantly contribute to this endeavour: the regular updating of software and the utilisation of antivirus programs. Updates are defined as new versions of the software that is utilised on mobile devices, such as phones and tablets, or personal computers. It is often the case that security issues, which could potentially allow hackers to gain access to a device or to steal information, are addressed by them.

In the event that a device prompts the user to install an update, it is advisable to comply with this request in a timely manner. It is important to note that updates may also improve the functionality of the device, thereby facilitating its use. In some cases, updates are executed automatically; however, in the absence of such functionality, it is possible to initiate the process manually via the settings menu.

 

Antivirus software can be considered as a protective measure that safeguards devices against various forms of cyber-attacks, including viruses, malware, and other malicious software. The installation of such programs can result in a reduction in device speed, the theft of data, or the introduction of damage. While most smartphones and personal computers are equipped with integrated antivirus software, users have the option of installing third-party antivirus applications to enhance their protection.

It is imperative to ensure that antivirus software is updated on a regular basis, in a manner analogous to the updating of system software. This approach enables the system to recognise and neutralise the most recent threats. It is imperative to exercise caution when downloading antivirus programs from unverified sources, as they may be fraudulent or hazardous.

It is imperative that individuals take proactive measures to ensure the security of their personal data. This involves the regular updating of devices and the utilisation of antivirus software, which are fundamental steps in safeguarding personal information. By implementing these measures, individuals can enjoy the internet without the concern of data breaches or other security threats.

 

Safe Everyday Internet Use

Using public Wi-Fi safely

The utilisation of public Wi-Fi has become a common practice, particularly for individuals who are in transit and wish to access their electronic communications or browse the internet. However, it should be noted that public Wi-Fi networks, such as those found in cafés, airports, or hotels, are often less secure than home networks. Given the large number of individuals who are connected to these networks, there is a possibility that hackers may attempt to intercept the information that is sent and received.

In the context of utilising public Wi-Fi networks, it is imperative to exercise caution and refrain from accessing sensitive information such as bank account details, passwords, or private correspondence. In circumstances where feasible, endeavour to utilise mobile data for the purposes of these activities.

In the event of utilising public Wi-Fi for significant tasks, it is advisable to seek out networks that necessitate the entry of a password, as these have been found to be more secure than open networks. Furthermore, it is advisable to exercise caution when engaging with networks that bear names that are deceptive or confusing, as these may be fraudulent networks established by individuals with malicious intent.

   

A further valuable recommendation is to deactivate file sharing and Bluetooth functionality on one's device when utilising public Wi-Fi networks. This precautionary measure is designed to minimise the probability of unauthorised individuals gaining access to personal files or devices.

It is recommended that, whenever feasible, one uses websites that initiate with "https://" in preference to "http://", since the "s" in the latter denotes an encrypted connection that is regarded as being more secure.

It is imperative to ensure that disconnection from public Wi-Fi networks is performed upon completion of the intended usage. Adopting these precautionary measures can assist in safeguarding personal information and ensuring a secure and worry-free internet experience.

 

Shopping online with confidence

The advent of online shopping has undoubtedly brought with it a considerable degree of convenience for consumers, particularly in relation to the ability to procure groceries, garments, and gifts from the comfort of one's own home. However, it is imperative to exercise caution when shopping online to avoid potential scams and to safeguard the confidentiality of personal information.

When selecting a website from which to purchase items, it is advisable to seek out well-known and trusted stores. It is imperative to ascertain that the website address commences with "https://", denoting its secure nature. It is advisable to exercise caution if the website appears unusual, has an excessive number of pop-up advertisements, or requests an excessive amount of personal information.

Prior to making a purchase, it is advisable to consult reviews from other customers in order to ascertain the reliability of the store. It is advisable to exercise caution with regard to offers that appear excessively advantageous, as there is a high probability that they will not meet expectations.

In the event of online transactions, it is recommended that secure payment methods such as credit cards or trusted payment services such as PayPal be utilised. It is advisable to refrain from utilising wire transfer or prepaid card methods of currency exchange, as these are more difficult to trace in the event of an issue arising.

It is imperative to ensure that devices are updated regularly and that strong passwords are employed when engaging with shopping websites. Following the completion of a purchase, it is imperative that receipts are retained and that bank statements are examined on a regular basis in order to identify any unusual charges.

In the event of uncertainty regarding a website or a purchase, it is advisable to solicit the counsel of a family member or friend. Adopting these simple steps will allow consumers to enjoy shopping online in a safe and secure manner.

 

 

Online behaviour and netiquette

The utilisation of the internet is not limited to mere browsing; it also facilitates communication with others, be it through email, social media, or messaging applications such as WhatsApp. Adopting good online behaviour, otherwise referred to as netiquette, is instrumental in ensuring interactions remain respectful and secure.

In composing messages, it is imperative to adhere to the principles of courtesy and clarity. It is imperative to refrain from the utilisation of capital letters, as this may result in a perceived increase in vocal intensity. Prior to sending a message, it is imperative to consider the potential for misinterpretation or offence. It is important to be aware that online communication can be perceived differently from verbal communication; the tone of voice and facial expressions are not visible to the audience. Therefore, it is crucial to exercise caution and consider the impact of one's words.

It is imperative to respect the privacy of others. Exercise caution and refrain from disseminating their personal images or confidential information without explicit consent. In the event of receiving a message that is deemed to be of a questionable nature, it is advisable to refrain from responding and instead consider taking action such as blocking or reporting the contact.

It is imperative to exercise caution when accepting friend requests or messages from unknown individuals. It is important to recognise that one may opt to decline or disregard such advances if they do not feel at ease. In order to safeguard the privacy of personal information, exercise discretion and refrain from disclosing excessive details about oneself in digital spaces.

It is imperative to bear in mind that any information disclosed on the internet is permanent. Exercise caution when sharing personal details or photographs, ensuring that such information is not made accessible to a wider audience.

Adopting a positive online presence is conducive to the creation of a safer and more positive environment for oneself and others. Furthermore, it has been demonstrated that this measure can contribute to the mitigation of the risk of misunderstandings, scams and conflicts.

Summing up

Summing up
  Recognizing online risks helps prevent scams and fraud
Understanding phishing, fake news, and deceptive ads empowers you to avoid common tricks used by cybercriminals.
  Protecting your personal data is essential to staying safe online
Using strong passwords, managing app permissions, and keeping your device updated reduces the risk of identity theft or data leaks.
  Safe habits make every day internet use more secure
Knowing how to shop online, use public Wi-Fi carefully, and recognize secure websites allows you to enjoy digital services with peace of mind.
  Respectful online behaviour (netiquette) builds a safer digital community
Being polite, protecting your privacy, and thinking before sharing helps you communicate better and stay safe on the internet.

 

Keywords:

Digital safety, Personal data, Online scams, Privacy, Internet use

Objectives / Learning outcomes:

In this course, you will learn:
●    How to identify common online risks such as scams, fake news, and unsafe websites.
●    How to protect your personal data using strong passwords, privacy settings, and secure devices.
●    How to use the internet safely in everyday situations, including shopping online, using public Wi-Fi, and communicating respectfully.
 

Bibliography:

European Union Agency for Cybersecurity. Cybersecurity tips for citizens. ENISA. https://www.enisa.europa.eu
GDPR.eu. What is personal data under the GDPR? https://gdpr.eu
European Commission. Better internet for older people. https://digital-strategy.ec.europa.eu
Get Safe Online. Safe online shopping and Wi-Fi tips. https://www.getsafeonline.org