Internet Safety


Step 1. Verifying Someone’s Identity

(Anti-Catfishing)

You’re probably aware of just how easy it is for someone to lie about who they are online.

This practice is called “catfishing,” and it involves one person creating an elaborate fake identity to trick or manipulate someone else.

At best, catfishing is an embarrassing prank friends play on one another. At worst, it’s an attempt to steal someone’s identity, blackmail them, cyberbully them, stalk them, or even physically hurt them.

1. Search the Person’s Full Name on Google

If they show up in multiple places with multiple social media profiles, that’s a good indicator that someone is whom they claim to be.

2. Reverse Image Search Someone’s Profile Photo

Google has a reverse image search function that lets you upload an image to search online.

You have to go to images.google.com and click the camera icon in the search bar.

Then, you’ll get two options for searching an image — paste a URL or upload an image.

3. Block Them

When in doubt, block the stranger.

In fact, you can do this immediately to reduce the risk that someone is actually tricking you.

Step 2. Verifying a Link Is Safe

Hover the Cursor over the Link before Clicking

This is the simplest way to verify if a link is legitimate or not.

Hover your mouse cursor over the link (or image, in some cases) and look at the URL that pops up. It’s important to keep your cursor motionless at this point, otherwise the URL will disappear.


Step 3. Identifying an Online Scam

1. Money Is Involved

Any time an unsolicited message from any source mentions money, it’s best to ignore the message.

As a general rule, the institutions who have access to your personal information will rarely discuss it over email.

2. Fear and Threats

Fear is an incredible motivating factor in any context.

This is unfortunately true for scams as well.

Scammers will attempt to use harsh language and threats of penalties to get you to click links, reply with information, and more.

3. “We Need Your Information to Proceed”

If someone is asking you for personal information over email or social media, it’s a scam.


Step 4. Protecting Privacy

(Especially on Social Media)

In an era of smartphones and social media, there have never been more ways to contact someone.

There have also never been so many ways to find someone.

Frighteningly, few of these methods require your consent in order for someone to find you.

1. Social Networks Have Privacy Settings

Because of outcry against the way social networks collect user data, they now have privacy options that allow you to limit what others see online.

Some social networks call these “privacy settings,” and others may call them “security settings.”

Regardless, they allow you to block other users from seeing your email address, home address, phone number, date of birth, and more.

2. Deny and Turn Off Location Settings

One of the biggest dangers of social media is that it tells everyone where you are whenever you post something.

If students truly want to keep themselves safe, they need to turn off location services and modify their posts to not show their location.

Almost every social network offers these options.

If they don’t, it’s crucial that you stress to students just how dangerous these features are.

Step 5. Creating and Using Passwords

Passwords are the verification method of choice for anyone who has an account with any company or application.

Overall, passwords are a pretty strong way to keep accounts secured from outside users.

1. Use a Password You Can Remember, but No One Can Guess

In general, students should stay away from using names or ideas that they like. The strongest passwords will have absolutely nothing to do with them personally, which will make it all but impossible for hackers to guess.

2. Creating a New Password for Every Account

To truly stay secure, use a different password for every account you open.

3. Never Talk about Passwords

If a password is going to do its job, only one person can know it.