GS

Explore identity theft

Identity theft is a crime where cyber criminals steal your private information and pretend to be you online. They can buy items with your money, and then use your name if they get in trouble. It’s one of the fastest growing crimes in the world. 

Protect yourself

All digital devices have software that helps them run and stay protected. That software gets updated regularly. Have you ever been on a digital device and had a window pop up telling you it’s time to install a new update?  Software updates add new features and remove old features, but their most important job is …

Protect yourself Read More »

Why is Coding Important?

Codes protect information. Tons of companies need people with strong computer skills to help protect information against cyber-attacks. From banks and hospitals to aerospace, pharmaceutical, military, and engineering organizations, any business that has classified or private information needs help keeping it safe.  With computers controlling more and more—from powering up cities, flying planes, and running …

Why is Coding Important? Read More »

Create and crack a shift cipher code

Computers use codes as their language. It’s how computers communicate. And people who code computers, known as programmers, are always looking for ways to send coded information to protect private information, such as emails and bank accounts. It’s called encryption. Codes are a great way to change a message so it can’t easily be understood. …

Create and crack a shift cipher code Read More »

Keep Your Family Computers Safe

You can help keep your family computers safe. Here’s a checklist you and your family can go through together to be cyber savvy. ★★Make sure you have anti-virus software in place. ★★Turn on spam filters—this protects you from ads, scams, and unwanted emails that might carry viruses. ★★Ask your parents to use computer settings to …

Keep Your Family Computers Safe Read More »

What information you share

You can never really take back what you say or show online. If you send a message, post a photo, or share something online, it never really goes away. You may decide later that you want to delete it, but most information is stored on a server (sometimes called “the cloud”). That information stays in …

What information you share Read More »

How you share information

In real life, you wouldn’t give someone you don’t know private information, such as where you live or where you go to school. You should follow that rule online too. Just remember: if you wouldn’t do it in real life, you shouldn’t do it online either.

Password Checklist

Passwords are used to verify you are who you say you are. Explore what makes a good password. Don’t use a short password. Make sure your password has at least 12 characters. Use at least one number, one uppercase letter, one lowercase letter, and one special symbol. Don’t use numbers that are personal, such as …

Password Checklist Read More »