Your Week of Cyber Safety Tips


1. Make sure you use different passwords for each of your accounts.

2. Always log off if you leave your device and anyone is around—it only takes a moment for someone to steal or change your password.

3. Includes Numbers, Symbols, Capital Letters, and Lower-Case Letters: Use a mix of different types of characters to make the password harder to crack. i.e.; P@$$wOrd1!

4. Be very careful before clicking on a link asking you to log in, change your password or provide any other personal information. It might be a “phishing” scam where the information you enter goes to a hacker.

5. Remember to treat your password like a toothbrush. Don't share it with anybody and change it every three months.

Web Browsing 

1. Use Chrome and not Internet Explorer.

2. Save your favourite sites as Bookmarks (CTRL + D).

3. Use only secure sites and download content from trusted websites.

4. Use Google Search efficiently.

5. If you add a website to ‘Reading List’ on your iPad. It saves it for later viewing without need for WiFi connection.

Email Etiquette

1. Use a clear Subject title.

2. Use ‘Reply All’ sparingly.

3. Keep emails polite, short and sharp and don’t overuse exclamation marks!

4. Add the email address last to prevent accidental dispatch.

5. Default to face-to-face communication when possible.

Computer Ergonomics

1. Every 20 minutes, look away from the computer screen for 20 seconds at something 20 meters away.

2. Take a break from using a computer every 45 minutes and try not to use your mobile phone while taking a rest.

3. Maintain proper posture at your desk by using a comfortable chair and keeping a clean workstation.

4. Reduce screen glare when necessary and use headphones to limit distraction to others.

5. Try not to use technology at least one hour before bedtime.

Social Media

1. Usually employees of a school are prohibited from inviting students into their personal social networking sites or accept an invitation to the students’ social networking sites.

2. Those that you follow and content that you like reflects your character and professionalism.

3. Authorising applications needing access to your social media accounts and contacts may jeopardize your personal security and data.

4. Assume that everything you post on Social Media is permanent and therefore unable to be completely deleted from everywhere that it has travelled.

5. Share special moments on Social Media after the event and not during the experience.


Popular posts from this blog

Curriculum Theory By Ralph Tyler and it's implication for 21st Century Learning

Sphero or Ozobot? Ozobot or Sphero?

Drones in Australian Curriculum