Simple Steps to Online Safety

Canadians are among the highest users of internet-enabled computer technology. To better protect Canadians, their families and community, home networks and mobile devices must be secure, and vulnerable audiences need to be taught how to use the internet safely, securely and responsibly. Read below for simple tips on this week's topics:
  • Public WiFi
  • Guard your Mobile Device
  • Think Before you Post
  • Identity Theft
  • Don't Take the Bait
WiFi Safety Security reminders for using WiFi

Think Before You Connect to WiFi Hot Spots:

  • Ensure that the network is legitimate
  • Beware the imposter Wi-Fi
  • Not all Wi-Fi is secure, avoid entering:
  • passwords, banking information, or personal information when unsure of the public Wi-Fi.

Learn more: 

Connecting to the secure network at Langara:

The "Langara" WiFi network is an open, puiblic network. For better security, use the eduroam network.

  • How to securely connect to eduroam:
    • You must have an active Computer User ID. Click here to learn how to activate your Computer User ID.
    • connect to the "Langara" network.

    • Open a browser and go to

    • Login to the portal using your Federated ID (Computer User ID +

    • Download and run the tool to automatically setup "eduroam" and "eduroam5GHz" network. 

    • Repeat for all your WiFi devices.
Guard your Mobile Device Tips for keeping your device safe

Secure your mobile device and personal information:

  • Don’t leave it unattended in public
  • Keep your device password protected
  • Limit Mobile App access to your information
  • Configure ‘Tracking’ and ‘Remote Wipe’
  • Know your device (e.g. IMEI#)

Learn more:

Think Before you Post Things to keep in mind when using Social Media

Sharing sensitive information: Sensitive information includes anything that can help a person steal your identity or find you, such as your full name, Social Security number, address, birthdate, phone number, or where you were born. 

Posting questionable content: Remember future employers may look at your social media accounts before hiring you. Questionable content can include pictures, videos, or opinions that may you seem unprofessional or mean and can damage your reputation or future prospects. 

Tracking your location: Many social media platforms allow you to check in and broadcast your location, or automatically adds your location to photos and posts. This allows people to track YOU, not just your photos.

Learn more:

Identity Theft Project you Personal Information

Protect your personal information. It’s valuable. 

To an identity thief, your personal information can provide instant access to your financial accounts, your credit record, and other assets.

Personal information includes:

  • Full name (if not common),
  • Home address, Email address
  • Passport number
  • Vehicle registration plate number
  • Driver's license number
  • Face, fingerprints, or handwriting
  • Credit card numbers
  • Digital identity
  • Date of birth
  • Birthplace
  • Genetic information
  • Telephone number
  • Answers to security questions
  • Login name, screen name, nickname, or handle

Learn more:

Don't Take the Bait Project yourself from Phishing

Email phishing scams can trick you into opening attachments or giving up personal information. They appear to be emails from organizations or companies you trust, but they're often the gateway to identity theft.

“We suspect an unauthorized transaction on your account. Please click the link below and confirm your identity.”

  • Never reply to or click on links in email or pop-ups that ask for personal information.
  • Legitimate companies don’t ask for this information via email. 
  • If you are directed to a website or told to call a phone number to update your information:
  • verify that the request is legitimate by calling the company directly, using contact information from your account statements. Or
  • open a new browser window and type the URL into the address field, watching that the actual URL of the site you visit doesn’t change and is still the one you intended to visit.
  • Forward spam that is phishing for information to the company, bank, or organization impersonated in the phishing email. Most organizations have information on their websites about where to report problems. 

Learn more: