Are you concerned about your online security? Do you know how to protect your digital presence? Seniors have specific challenges in cybersecurity. This vital training session teaches how to master passwords and best security practices. In our ever-evolving digital age, safeguarding your online accounts with strong and secure passwords is paramount.
You can empower yourself with the knowledge and techniques to create and manage passwords effectively, ensuring a robust defense against potential cyber threats. Your digital safety matters, and we're here to help you confidently navigate online.
Focusing on simplicity and practicality, E-men will guide you through mastering passwords and online security practices to gain peace of mind. He understands the unique challenges of helping a diverse group of seniors with technology. He encourages and promotes a patient, flexible, hands-on, practical approach rather than a lecture-style presentation. Prepare your questions and join us!
We're diving into mastering online passwords and online security. Who here has received an email or message from a well-intentioned prince or princess, with poor American English, spelling, grammar, and capitalization, in a faraway land promising you a fortune, claiming you've won a lottery you did not know you entered or an inheritance from a long-lost relative you did not think you had in some faraway country? I have! Have you, too? I'm still awaiting my millions, but I'm not holding my breath because I noticed fear and/or greed emotions in the writing. Please notice & remember: Poor English, Fear, Greed.
Today, we are learning about fundamental safety in the digital world using passwords! Most digital interactions these days require a user account and login. A login has two elements:
Username: is the name you choose for you.
Password: is the alphanumeric key needed to get you into your account. Passwords are like a toothbrush or underwear! Don't let anyone else use it; never share it, and change it often.
Let us change our mood out of fear & greed a little. What have you experienced online, funny, memorable, or unique concerning your passwords or online security? It could be a hilarious autocorrect moment or an unforgettable email mishap. Enjoying ourselves online matters; don't be shy; we're here to share, learn, and have a good time!
Now, it's time to get into the basics of online security. Let's imagine the internet as a busy bursting street with many using it. It's a fast-moving, unlimited, interacting pipeline of people with a few interesting characters or bad actors. Our task is to use and enjoy the interactions, remain safe, and not get run over by anyone or anything! Sound good?
Passwords are keys to your digital life. We want a password to be strong, reliable, difficult to crack, and always with us, just like the locks on our front doors. Who here uses your pet's name as a password? Or a loved one's birthday, anniversary, or easily guessed like "1234", "password," etc.? You're not alone; these are common fails! Let's learn how to create strong, memorable passwords together.
Please pair up with another and choose a robust and easy-to-remember password. It could be related to hobbies, favorite quotes, or an acronym. It must include letters, numbers, and special characters! Share it with your partner and explain why you chose it. As an example, "Banana$unshine>6172" is a strong password. Ready, set, go!
Let's talk about staying safe online. Think of it as learning to recognize that busy digital street's 'tricky' characters. Common types of cyber attacks are:
Malware: software designed to disrupt, damage, or gain unauthorized access.
Phishing: sending emails or other messages to induce individuals to reveal personal information, such as passwords and credit card numbers.
Spoofing: scammers pretending to be someone else to steal data or money or to spread malware
Denial-of-Service (DoS): interrupting authorized user's access, typically carrying a malicious intent.
Identity-Based Attacks: scammers pretending to be someone else to steal data or money or to spread malware
And more...
Please open your email account and see if you can spot a phishing email. The Junk or Spam folder is an excellent place to start. Raise your hand when you see something odd. Let's see who's got a keen eye! Key: When in doubt, do NOT interact with the email; delete it and never do as the email asks!
To make our lives easier, we are offered tools like password managers. These are like our trusty personal assistants who keep our keys safe. Let me quickly show you how easy it is to use one. It's like having a super-powered memory!
Open your favorite browser, e.g., Chrome or Safari. Go to a URL or webpage you use often. Select the "Username" field and notice what the browser does. Repeat for the "Password" field.
What is two-factor authentication?
We're almost done. Let's hear from you before we wrap up. Any questions or thoughts about what we've discussed today?
Alright, let's sum up what we've covered today.
Online security is like protecting our homes. We do what we can with confidence and without fear or greed.
Strong passwords are our first line of defense. Structure, use, never share, and keep them simple (for you), consistent, and up-to-date.
The digital world is vast. With knowledge, we will navigate it safely. Never "try it" when you didn't ask for it or expect it: NO FEAR, NO GREED! When in doubt, IGNORE IT!
Ask participants to change at least one of their weak passwords using the techniques discussed in class.
Encourage them to practice recognizing phishing emails by forwarding any suspicious ones to you for analysis.
Password Dos:
Create strong, unique passwords for each account.
Use upper- and lower-case letters, numbers, and special characters.
Make passwords at least 12 characters long.
Password Don'ts:
Avoid using easily guessable information (e.g., birthdays, names) in passwords.
Don't use common passwords like "123456" or "password."
Never share your passwords with anyone, even if they claim to be from tech support when they initiated the contact!
Thank you for your attention. This content is copyrighted and produced by www.EHTechBits.com. We hope you find this information engaging, informative, and actionable. We encourage you to explore the world of passwords and cyber security to experience the benefits and safety firsthand.
If you have questions or need personalized guidance, please use the Schedule Appt. button below to reach us and request a Free 30-minute Intro and Discovery Phone Appointment. We offer one-on-one training and mentoring tailored specifically for you.