Tech Tip #107: Ways to Avoid Phishing

4 hrs ago 6

In these 169 tech-centric situations, you get an overview of pedagogy—the tech topics most important to your teaching—as well as practical strategies...

In these 169 tech-centric situations, you get an overview of pedagogy—the tech topics most important to your teaching—as well as practical strategies to address most classroom tech situations, how to scaffold these to learning, and where they provide the subtext to daily tech-infused education.

Today’s tip: Email Phishing

Category: Parents

Q:  I got an email that looks legitimate, but I’m not sure. How do I check?

A: You’re right to take a step back. Email has become the most popular method of hacking individual computers—because most people use email and usually aren’t as vigilant as they need to be.

‘Phishing’ is an attempt to steal your personal information by posing as a trusted source (a friend, your bank–like that). Why is it so popular with crooks? Because it works.

As an educator, you want to teach students how to protect themselves as soon as they start using open email networks. Here are six suggestions:

  1. Don’t open attachments.
  2. Don’t click links in emails.
  3. Check the email address of the sender. Does it match the name? Does it fit the sender?
  4. Check for misspellings and mis-phrasings.
  5. If you know the sender, does the email sound like their communication style?
  6. Hover over the link to see the address. If it doesn’t match the text or look legitimate, don’t click.
  7. Don’t hesitate to email the sender and ask if they sent you the email.

Got those? Here are a few more:

  1. Slow Down: Phishing often pushes you to act fast—“Your account’s locked, fix it now!” Take a second to think. If it’s urgent, contact the company directly using a number or site you already know.
  2. Don’t Share Sensitive Info: No legit company will ask for your password or full credit card number over email or text. If they do, it’s a scam.
  3. Use Two-Factor Authentication (2FA): Add an extra step (like a code sent to your phone) to logins. Even if they get your password, they can’t get in without the second piece.
  4. Keep Software Updated: Hackers exploit old systems. Update your phone, apps, and computer regularly to stay protected.
Basically: If something feels fishy, trust your gut and double-check—better safe than sorry!

Sign up for a new tip each week or buy the entire 169 Real-world Ways to Put Tech into Your Classroom.

What’s your favorite tech tip in your classroom? Share it in the comments below.


Copyright ©2025 askatechteacher.com – All rights reserved.

Here’s the sign-up link if the image above doesn’t work:

https://forms.aweber.com/form/07/1910174607.htm

“The content presented in this blog are the result of creative imagination and not intended for use, reproduction, or incorporation into any artificial intelligence training or machine learning systems without prior written consent from the author.”


Jacqui Murray has been teaching K-18 technology for 30 years. She is the editor/author of over a hundred tech ed resources including a K-12 technology curriculum, K-8 keyboard curriculum, K-8 Digital Citizenship curriculum. She is an adjunct professor in tech ed, Master Teacher, webmaster for four blogs, freelance journalist on tech ed topics, contributor to NEA Today, and author of the tech thrillers, To Hunt a Sub and Twenty-four Days. You can find her resources at Structured Learning.


View Entire Post

Read Entire Article