Welcome to Internet Navigation and Safety. Please ensure that you read each section carefully.
Estimated time to completion are below:
Internet Navigation Basics (45 minutes)
Internet Safety Fundamentals (35 minutes)
Protecting Your Personal and Company Information (30 minutes)
Review and Practice (45 minutes)
Total Estimated time: 2 hours 35 minutes
The internet is a vast system of interconnected networks, and navigating it efficiently is crucial for remote work. Knowing how to find and assess information quickly can save you time and help you be more productive in your work.
Using Web Browsers: Optimize Your Experience
Web browsers allow us to navigate the internet. Some common browsers include Google Chrome, Mozilla Firefox, and Microsoft Edge. They each offer tools that can optimize your browsing experience.
Browser Features You Should Use:
Bookmarks: Allows you to save important websites for quick access. If there are websites that you visit frequently, you should bookmark them so that you can access them more quickly in the future.
Tabs: Open multiple websites in one window to stay organized. In your remote job, you will likely have multiple tasks to do within your work shift. Having multiple tabs open in one browser window can help you keep track of your work and open tabs again more quickly.
Extensions: Enhance your browser with tools like ad blockers or password managers.
Incognito Mode: Browse without saving history or cookies, useful for privacy.
The most common browser is Google Chrome. The video below shares some tips and tricks on using the Google Chrome browser effectively. If you use a different browser, there are likely similar videos on YouTube that you can search and view.
Mastering Search Engines for Effective Results
Search engines like Google help you find information across the web. Have you ever "Googled" something the results that came back were just not quite what you were looking for? By using advanced search techniques, you can find the most relevant and reliable sources faster. These techniques give guidance on the way that you type in your search criteria into the search bar. Doing so will produce more accurate results. Here are a few advanced search tips for you to try:
Use quotation marks " " for exact phrases that you are looking for (example: Typing in "remote work tools" will produce results with that full phrase in them. Alternatively, just typing in remote work tools without the quotation marks will produce results about remote work tools, but not with the exact phrase).
Use minus sign (-) to exclude unwanted terms. (example: if you want to find results about remote jobs, but you don't want to include information about freelancing, you could type remote jobs -freelancing in the search bar).
Use site: if you only want to search within specific websites. (example: If you want to only search about remote work within the BBC News site, you would type site:bbc.com news remote work and then you will only see results about remote work from BBC News).
Activity: For more advanced search tips, watch the video below. As you watch, go ahead and try a few tips out in your own browser. You will be asked to report on this activity in this week's self-evaluation so be sure to make note of what you tried and how it went!
Internet security involves protecting your data from unauthorized access and threats. When you work remotely, it is not just your data that needs to be protected, but the data of the company you work for as well. Privacy ensures you, or your company's data is not misused. Internet security and privacy together form the foundations for safe internet usage. A few basic internet security best-practices include:
Using complicated passwords and changing them often.
Keeping your software up-to-date to avoid vulnerabilities.
Using two-factor authentication (2FA) for extra security.
Being extremely cautious and careful when sharing personal information online.
Common online threats include Phishing, Spam, Scams, Malware, and more. Phishing attacks aim to steal sensitive information by pretending to be legitimate. An example of Phishing is if someone emails you or sends you a WhatsApp message saying they are from a specific company or organization and asks you for personal information. Once they have access to this personal information, they can use it to login to other systems to gain access to more data. Spam and Scams work similarly to Phishing. Malware is actual software designed to damage your device or steal data.
There are a few things you can look for to recognize these threats and avoid them:
Look for suspicious email addresses or misspellings
Be wary of anything that is urgently requesting something or asking for personal details
Avoid clicking on links or downloading attachments from unknown sources
The video below shares more tips on phishing and how to avoid it.
Building Strong Passwords and Managing Them Effectively
In a remote work environment, strong password management is critical for maintaining data security and protecting sensitive company and personal information. Since remote workers often access company systems, cloud platforms, and communication tools from various locations and devices, using strong, unique passwords for each account is essential to prevent unauthorized access. A strong password should be at least 12 characters long and include a mix of upper and lowercase letters, numbers, and symbols to make it difficult for attackers to crack. Avoid using easily guessable information, such as names, birthdays, or common words. To enhance security, remote workers should utilize a password manager to store and generate complex passwords, reducing the need to remember multiple credentials. Regularly updating passwords, especially if there is any suspicion of a security breach, helps minimize risks. Additionally, enabling two-factor authentication (2FA) adds an extra layer of protection, requiring a second verification step, such as a one-time code sent to a mobile device. By following these best practices, remote employees can safeguard their accounts and contribute to a secure digital workplace.
Understanding and controlling your privacy settings ensures that only trusted people have access to your personal information. Many websites and apps allow you to adjust these settings on your own, however it is usually something you have to think about on your own. This concept is important to think about for your personal privacy, as well as the privacy of your employer.
Social Media: Adjust who can view your posts, profile, and friends list. Keep in mind that everything on the internet is visible to everyone, unless you adjust settings. This includes your employer, or potential employers. Adjust your privacy settings, and be sure to keep all of your posts professional.
Example: Joseph, a university student in Nairobi, loved sharing his daily life on social media. His posts—weekend outings, jokes, and school frustrations—were all public, but he never thought much about it.
Excited for a remote internship interview, Joseph was caught off guard when the recruiter casually mentioned his social life. Realizing his profile was public, he quickly adjusted his privacy settings and removed unprofessional posts.
A few months later, he applied for another job—this time, with a polished online presence. Joseph learned that social media is often an employer’s first impression, and managing privacy settings is key to protecting opportunities.
Online Accounts: Limit data sharing with third-parties. Many websites and apps request access to personal information, often beyond what is necessary. Without adjusting privacy settings, third parties can collect and share your data, including location, browsing habits, and even contact lists. This information can be used for targeted ads, sold to other companies, or even exploited by hackers. For example, Aisha, a student in Ghana, signed up for a free study app without checking its permissions. Later, she noticed strange emails and ads related to her private conversations. After reviewing the app’s settings, she realized it had access to her microphone and contacts. To protect your privacy, always review app permissions, limit data sharing to only what is necessary, and avoid linking accounts unless absolutely needed.
Websites: Opt out of cookies and personalized ads. Websites track users through cookies, which collect data about browsing habits to personalize ads and content. While this can enhance user experience, it also means companies can monitor and store your online activity. Without opting out, your data may be shared with advertisers or used to create detailed user profiles. For example, Daniel searched for affordable laptops online. Soon, he noticed ads for expensive models following him on every website. To reduce tracking, he adjusted his browser settings to block third-party cookies and opted out of personalized ads. By managing cookie settings and using privacy-focused browsers, you can limit data collection and protect your online privacy.
Safe Online Transactions and Protecting Financial Information
When shopping or banking online, ensure that the website is secure by checking for https in the URL. Use trusted payment methods for your country and avoid entering sensitive data over public Wi-Fi networks.
Example: David found a great deal on a new phone through an online store he had never used before. Excited, he quickly entered his payment details and placed the order. However, days passed, and the phone never arrived. When he checked the website again, it had disappeared. Looking back, he realized he had ignored some warning signs—the website URL started with "http" instead of "https," meaning it lacked proper security.
Determined not to make the same mistake, David became more cautious when shopping online. He only used websites with "https" in the address, chose trusted local payment methods, and avoided entering sensitive information while using public Wi-Fi. By following these steps, he ensured that his future online transactions were safe and secure.
Tips For Spotting Safe Websites and Using Public Wi-Fi
Look for https and a padlock in the address bar
Check the website's domain for legitimacy (.org, .net, .com, .ng are all common domains. If you see one that you don't recognize, it might not be legitimate).
Avoid clicking on pop-up ads or suspicious links
Avoid accessing personal accounts over unsecured networks
Self-Assessment
Reflect on your learning by answering the following questions. You will be asked to report on these questions in this week's self-evaluation.
What are the steps you would take if you encountered a phishing email?
How can you ensure your online transactions are secure?
How would you assess whether a website is trustworthy?
Activity:
Choose a popular job board or freelancing website in your country (e.g., a local job site or an international platform like Upwork).
Evaluate the website’s security by checking for https, a padlock icon in the address bar, and other credibility indicators (such as professional design, clear contact information, and user reviews).
Search for a remote job listing and assess whether the job post seems legitimate. Look for red flags such as vague job descriptions, unrealistic salary offers, or requests for upfront payment.
Write a short reflection (3–5 sentences) on what you found and how you determined if the website and job listing were trustworthy. You will submit this reflection in this week's self-evaluation.
You have reached the end of this module!