Interactive Learning & Practice

The best way to learn is by doing. Practice these real-world scenarios and hands-on activities to build your confidence.

Scenario-Based Discussions

Think about what you would do in each situation. There are no wrong answers—this is about learning together.

Scenario 1: AI Voice Cloning Scenario

Situation: A call from "your grandson" asks for bail money.

Best Response: Verify identity with a code word and call the real family member. Highlight voice-cloning risks.

Scenario 2: Tech Support Pop-Up

Situation: A computer freezes and a pop-up instructs the user to call a number.

Best Response: Close the browser, restart the device, ignore the number, and call a known support line. Never grant remote access.

Scenario 3: Phishing Email

Situation: Show a fake email from a bank requesting password reset.

Best Response: Hover over links, check spelling and domain names, and use official contact information.

Hands-On Cybersecurity Activities

Practice these activities with a trusted family member or tech-savvy friend to strengthen your online security.

1

Password Workshop

Guide participants in creating strong passphrases and using a password manager.

2

2FA Setup

Demonstrate enabling two-factor authentication on email or social-media accounts.

3

Privacy Check-Up

Walk participants through privacy settings on a social-media platform, showing how to limit information sharing.

Quick Reference Handout

Keep this information handy near your computer or phone for easy reference:

Common scams and red flags (grandparent scams, phishing, tech-support scams, AI scams, sweepstakes scams)

Steps to take when approached by potential scammers: Stop, Think, Verify, Act. Hang up or close the window; call a known number; never send money or personal data; report the scam.

Important phone numbers and websites: FTC Report Fraud (reportfraud.ftc.gov), Adult Protective Services (1-800-677-1116), Identity Theft Recovery (IdentityTheft.gov), local police and bank contact numbers.

Reminders about good practices: Use strong passwords, enable 2FA, update devices, verify identities, maintain social-media privacy, and limit personal information.

💬 Question & Answer

No question is too simple! Criminals prey on uncertainty, so don't hesitate to ask for clarification or help.

If you've experienced a scam (or think you might have), sharing your story can help others recognize similar situations and stay safe.

Support Our Mission