Digital Safety Teaching Resources
CyberSTAR
Digital safety is a broad term that describes a great many things at once. The CyberSTAR framework makes it easier for small organizations and individuals to understand, learn about and manage digital safety by organizing it around six thematic areas. These include Digital Risks, Digital Identity, Passwords, Devices, Data, and Conversations. Follow along to protect yourself from cybercriminals and data loss.
More info
Digital Risks
Digital risks have to do with the fact that people can be deceived online. Digital deception commonly takes the form of social engineering attacks, phishing, and malware. While these risks cannot be eliminated entirely, people and organizations can reduce risk greatly by practicing digital hygiene and exercising common sense.
More info
Digital Identity
A digital identity is all the information about a person or organization that exists online. Every time you go online or use an internet-connected digital device, you leave around vast amounts of data. This information can be used to target you with persuasive ads, spy on you, or conduct social engineering attacks.
More info
Conversations
Much of our personal and professional time online involves communicating with others via email, messengers, and audio or video calls. Malicious actors look for ways to access these conversations in order to steal sensitive information that can be used to defraud, blackmail, intimidate or impersonate someone. Securing your conversations starts with using safe and encrypted communication channels.
More info
Devices
Digital devices - such as personal computers, laptops, tablets and smartphones - help individuals and organizations communicate, use the internet, and create, keep, and share data. Losing such devices or having them compromised or stolen can have serious personal, professional, financial and reputational consequences. Knowing how to protect and secure your digital device is an essential part of digital safety.
More info
Data
From personal correspondence and photos to confidential corporate files, we create and access a lot of valuable and sensitive data. Losing such data can damage your reputation and have serious financial, legal and administrative costs. Keeping valuable and sensitive data from unapproved intentional or accidental unapproved access, theft and corruption is another essential element of digital security.
More info
Passwords
Individuals and organizations use passwords to protect important accounts, devices, networks, and data. Malicious actors are constantly devising new ways to guess or steal passwords. Creating strong passwords, managing them safely and enhancing them with two-factor authentication (2FA) are critical steps towards digital safety.
More info
General
This page contains various resources created to support CyberSTAR digital safety workshops and audit and remediation efforts. It also contains analytical materials that reflect lessons learnt and inform the continuous refinement of CyberSTAR methodology.
More info