Cyber security basics
Everyday cyber security blends technology habits—passwords, updates, backups, and multi-factor authentication—with social defenses against phishing, impersonation, and fraud.
Threat actors automate credential stuffing, SIM swaps, business-email compromise, and fake Canada Revenue Agency pages at scale; individuals are both targets and unwitting accomplices when devices join botnets.
Reporting to the Canadian Anti-Fraud Centre and local police helps pattern recognition, even when individual losses seem small.
This article supports public education menus with material suitable for libraries, schools, and senior-centre workshops.
It complements account security pages such as 2FA Settings in the simulated wallet without duplicating product UI.
Phishing, scams, and social engineering
CRA and banks rarely demand immediate e-Transfers, prepaid cards, or cryptocurrency. Urgency and secrecy are manipulation tactics—pause, verify on official numbers, and involve a trusted second person.
Deepfake audio and video increase pressure in “grandparent scams” and fake executive approvals; out-of-band verification matters.
SMS links can install malware or harvest MFA codes; prefer app-based TOTP or passkeys where available.
Romance and investment scams exploit isolation; community messengers should repeat slow-down messages.
Business-email compromise relies on lookalike domains; finance teams need callback procedures immune to in-thread replies.
Devices, accounts, and data care
Encrypt phones and laptops; enable remote wipe; separate work and personal profiles where feasible.
Patch operating systems and retire unsupported hardware that cannot receive fixes.
Back up photos and documents offline or to reputable cloud services with strong account recovery settings.
Minimize data hoarding; delete apps you no longer use; review permissions quarterly.
Kids’ devices need parental controls proportionate to risk; discuss stalkerware and peer coercion.
Workshops and lesson plans
Run a phishing email teardown: headers, domains, and tone.
Build a passphrase song mnemonic—length beats complexity alone.
Simulate SIM-swap customer service failures; what policy should telcos adopt?
Pair with Privacy Act for data handling promises institutions make.
Pair with Digital services and applications for institutional app security.
Cyber hygiene depth
Turns a minimal cyber stub into teachable multi-session content.
Centers fraud victims without victim-blaming language.
Links consumer security to national resilience narratives responsibly.
Encourages multilingual outreach for newcomer communities.
Highlights accessibility: screen-reader-friendly security guidance matters.
For product-specific instructions, follow current guidance from the Cyber Centre and your service providers.