Category: Safety | Internet Security

Common Scams to Be Aware Of and Prepare For – Part 1

Common Scams to Be Aware Of and Prepare For

So many scams, too little time to stay ahead of them all. Cyber criminals are not nice people, but they certainly are creative; always thinking of new ways to scam you. Scammers are opportunists working in multiple areas at the same time. Their motivation is money. They will either access your personal information and sell it to others or easily steal your money outright.

You may not know about every scam that’s on the internet or offline in the real world. But there are common ways of how you can be aware of and prepared for all potential scams. That doesn’t mean you shouldn’t try to learn about old scams and new ones that are created.

Common Scams to Be on the Look Out For

In Part 1 of our scam awareness series, we look at common scams and new scams that are ever emerging.  Through this education on scams, you’ll notice a persistent theme of how you can be prepared. Even if a brand-new scheme designed to fool you rears it’s ugly head for the first time, there are consistent things you can do to protect yourself.

Most people become victims of scans through email and texts.  The first defense against malicious messages is to follow the SLAM Method.

SLAM stands for Sender, Links, Attachments, and Message. All of these elements should be scrutinized.  

Sender: Don’t accept message requests from outside of your known circle of friends or connections.  Don’t accept friend requests from anyone you don’t know.

Links:  Do not click on any links in social media posts, profiles or messages unless you can see the full URL and be certain that the site is legitimate.

Attachments: Never download or open attachments from social media posts, profiles or messages.

Message:  Look carefully at the body of any social media message or post that you are interacting with. If it feels off, contains misspellings, off grammar or even uncharacteristic emojis, you might be looking at a phishing attempt.  Be wary of messages that push you to take some urgent action or another.

Remember the SLAM Method throughout our scam educational series.  But we’ll also be looking at scams that also happen via direct communication with scammers.  Let’s begin!

Charity Scams

Types of charity scams include:

Crowd Sourcing Scams:  Don’t take for granted that all is legit. Scrutinize the validity of the crowding funding request.

Post Tragedy Scams:  When a tragedy strikes, scammers will sometimes spoof the website or create a site that closely resembles the site of a legitimate donation site.

Firefighter, Police and Military Scams:  These scammers will often use familiar or local organizations to build trust and take people off guard.   Some will directly target military veterans and their families.

Warning Signs of Charity Scams:

  1. Requests for cash, money wire, or gift card donations can be a red flag. Use a credit card instead.
  2. Non-tax deductible donations are a red flag that a charity may not be legitimate.
  3. Pressure Tactics: Real charities will never use a hard sell or pressure tactics to solicit a donation.
  4. Fake information: Charitable donation websites almost always end with .org and domains will always start with https:// not http:// without the “s”.

Beware of fake charities based related to common world issues, such as what happened during the pandemic. Scammers prey on the emotions of people who want to help those in need of disaster relief, such as during war or refugees fleeing their country for safety or a better life.  Charity and disaster fraud often increases during the holiday season.

Cybercriminals will also call people thanking them for a previous donation, a donation which may have not been made. Veteran fraud and disaster fraud are often the premise used for fake charity scams.

Marketplace Scams

There are two categories within marketplace scams.

Non-Payment Scam:   In a non-payment scam, cybercriminals will use a phony screenshot of a completed cash transfer to trick a victim into shipping an item.

Non-Delivery Scams:  Scammers trick victims into paying for goods and services that are never delivered.  They offer prices that are almost too good to be true.

Non-delivery scams advertise popular items and services at deeply discounted prices and ask for payment using gift cards or cash payment through a payment app.

Marketplace scams come in many forms so always be cautious.  These creative types of scams also happen when individuals are selling items online.

Prevention Tips:

  1. Know your marketplace:  When shopping online, do so on trusted sources with secure processing and payment policies that protect consumers.
  2. Use a credit card:  Credit card companies have systems and policies in place to protect against a fraud.
  3. Stay on the platform you are shopping on:  Scammers will try to bait their victims into leaving the marketplace platform for messaging and payment.

Gift Card Scams

It may seem obvious to many that that any legitimate organization would ask to be paid in gift cards.  Still, it’s a common scan that pulls people in. Scammers create a sense of fear and urgency pressure their targets into acting quickly without thinking. Asking to keep the transaction a secret is a warning sign of a gift card scam.

Cyberthieves prefer gift card payments because they offer anonymity.  Unlike other forms of payment, transactions can be anonymous and are difficult to trace or reverse, unlike bank transfers.  Gift cards are also widely available and offer immediate access to funds once the victim buys a gift card at a local store and send the scammer the number and pin to redeem the funds.

What To Do If You Are Targeted

Any gift card payment request is likely a scam and should be ignored. If you receive a phone call, email, or text message requesting a gift card as payment, immediately hang up or delete the message.

Contact the company directly using a known number or email address instead. If you have an account with the organization, log into your account to see if there are any notices, such as an overdue payment.

Display Name Scams

Display name spoofing occurs when the cybercriminal manipulates the sender’s display name or makes the display name look like an email address.  Seeing a legitimate display name deceives you into believing that it’s from a trusted email source.

If a sender looks familiar, but the message makes unusual requests, it is best to contact the person or company directly through another method of contact.

Delivery Scams

Types include:

Pet Delivery Scams: These are fake ads where payment is required upfront.

  • Protect yourself asking to see the pet in person before you pay.

Fake Delivery Notifications:  Here, scammers mimic big name online shopping or shipping companies in their delivery scam messages. They claim there is a problem with the delivery of your package, or you need to confirm something has been delivered.

  • Be cautious of clicking on links or downloading attachments.  Never enter personal information when requested. Verify the tracking number and status of a delivery through the companies’ official website. 

Non-Delivery Scams:  An example of a non-delivery scam in this training involves making a purchase online, but never receiving the order or confirmation details of the purchase.  Only make purchases on reputable websites.

  • When you do make an order, follow up immediately if you don’t receive a confirmation of your order. Check the address on the website and phone number. 

If you are unable to make contact and your credit card was charged by a non-delivery scammer, you should call your credit card company and consider deactivating the card.

Transportation Scams

Scammers will make phone calls or send messages via text or email claiming that your flight has been delayed or cancelled. Messages will likely include links that offer a refund for the flight or an opportunity to rebook for a small fee.  Airlines will never ask for a fee to rebook. Contact your airline directly on their website or call them to enquire about the status of your flight.

Cyberthieves also set up fake websites or send messages offering deals on rental cars as well. Always verify the URL and company phone number before booking. In your unsure, going to directly to the official website is always better than clicking a link.

Learn the dangers of freight scams.  Be on the look out for gifts and rewards being offered by transportation companies. Tread carefully and do your research before jumping on a deal that may be a scam created to steal your information or your money.

Technical Support Scams

Technical support scams often involve cybercriminals pretending to work for well-known companies to fix non-existent issues. They manipulate victims to build trust and convince them to comply with their demands.

A scammer gaining remote access to your device remotely can install harmful software or access sensitive data, leading to significant privacy and financial risks.

Requests for payments to be made via gift cards or cryptocurrencies should always be treated as a scam.

Technical support scams often start with unsolicited pop-ups or phone calls warning of an issue with your device.  These tactics are designed to create urgency and trick victims into engaging with the scammer.  Malware may contain a fake phone number urging you to call to fix issues you are having with your device.

Pop-ups may happen when visiting infected websites.  Or, they can occur if your computer is infected by malware. To guard against these issues, install anti-malware software to both prevent and remove malware.

Even if you are certain that you may be dealing with a legitimate company who has called about your account, express your concern and state that you wish to call them back directly using a phone number posted on their companies official website.

Never give our personal information to anyone that calls you.  Legitimate companies will not call you and ask you for personal information.  Remember, that with much of our personal information being available on the dark web due to data breach, scammers can easily sound like they are legitimate when they state facts about your personal info.

Conclusion

Most scams come to us when we have our guard down. They prey on our emotions by using fear filled headlines or threats of potential loss of accounts or hard-earned dollars. It’s not uncommon to receive an email, phone call, or text that is related to something we have already done.

You may be expecting a package that you ordered a few days earlier. You may have booked a flight.  Maybe you happen to be needing of a product or service. That fact that relevant messages come to us are simply a coincidence. When you receive a text or email out of the blue, always ask the question; “Is this real? Or is it a scam?”

Some scams also encourage users to download malicious apps in order to receive a reward or discount. This does not prey on our fear, but entices a natural human desire for personal gain. Be cautious of all app downloads in every situation.

In one second you could infect your devices with malware to give away personal login information. However, it only takes a few seconds more to carefully review the message to verify it’s legit. When in doubt, go to Google and search for the company. Visit their website directly. Or, login to trusted websites directly at the source from a personal bookmark, not though an email link.

If an email or text message lines up with a legitimate notice about a login verification or purchase you just made, it’s still a good idea to only click the link after you’ve double checked that it’s not going you to a different site.  This can be done by hovering over the link to see the destination.

Continue to educate yourself on how to spot scams, while being mindful that exercising caution is your first best step to protecting yourself.   Be prepared by thinking twice before you click or react to any message or phone call. Take a breath and take the time to do a bit of research. I will save you a world of trouble.

Continue your education, read about Common Scams – Part 2.

Share This Article

Does Your Child Know How to Stay Safe in Open Water?

An illustration of a lifeguard on a beach speaking into a megaphone.

As a parent, you vigilantly watch your child at the pool. But what happens at the beach, lake, or river? The rules change dramatically outside the controlled pool environment, where currents, waves, and unexpected drop-offs can make the water far more dangerous than it looks.

For children ages 1 to 4, drowning is the leading cause of death in the United States. This risk underscores that the skills learned in a formal setting are a primary defense.

This knowledge is vital.

Article title and illustration of Water Safety.

Professional instruction provides a foundation that protects children everywhere. It’s about more than strokes; it’s about survival competence in unpredictable situations. This preparation supports safe aquatic experiences in any setting.

The Unpredictable World of Open Water

A swimming pool is a controlled, predictable environment. The water is clear, the depth is marked, and the edges are defined. Open water, by contrast, is full of variables that can challenge even a strong swimmer.

Oceans introduce powerful forces like waves, rip currents, and undertows. A child can be knocked off their feet by a wave or pulled rapidly away from shore by a current they cannot see, a danger highlighted by the National Oceanic and Atmospheric Administration. The power of the ocean is relentless.

Lakes and Ponds often have limited visibility, hiding hazards like submerged logs, rocks, or sudden drop-offs. Water temperatures can be deceptively cold, leading to muscle cramps or cold water shock.

Rivers and Streams add the element of moving current, which can sweep a child downstream. They may also have obstacles like branches, rocks, and uneven, slippery bottoms that make entering and exiting the water hazardous.

Understanding these risks is a first step. The next is proactive preparation. This isn’t about instilling fear, but about building competence. The controlled environment of a swimming pool is the right classroom for these lessons.

This is the core philosophy behind professional swim classes, such as those focused on building a fundamental water safety toolkit from the very first lesson. A quality program is built to do more than teach a child how to cross a pool; it’s about establishing competencies that last a lifetime. For instance, at our local swim school, certified instructors focus on real-world applications—practicing floating to conserve energy, learning to navigate without a clear line on the bottom, and knowing how to stay calm if a situation feels unfamiliar. As outlined by the American Red Cross, comprehensive lessons include these critical skills for various environments. This training provides the muscle memory and mental confidence that translates from the pool to any body of water.

For parents, enrolling in structured instruction is a strong strategy for ensuring your child doesn’t just know how to swim, but knows how to be safe. This foundational knowledge is a powerful layer of protection for a lifetime of aquatic enjoyment.

Infographic:

Water Safety - Why pool skills are not enough for open water.

Skills Learned in Class That Apply Everywhere

So, what specific competencies from professional lessons become important tools in open water?

  1. Breath Control and Recovery
    A sudden wave at the beach or an unexpected submersion in a lake can be alarming. Professional lessons teach children how to hold their breath, control their exhalation, and recover to the surface without panicking. This skill is a first defense against inhaling water.
  1. Floating and Treading Water
    Exhaustion is a major cause of drowning in open water. The ability to roll onto their back and float or efficiently tread water allows a child to rest, conserve energy, call for help, and formulate a plan to get to safety. This is one of the most important skills for drowning prevention.
  1. Swimming in a Straight Line
    In a pool, a black line on the bottom provides guidance. In open water, there are no such markers. Lessons teach children to lift their heads to sight a landmark (like the shore) while maintaining an efficient stroke. This prevents them from swimming in circles and wasting energy when trying to return to safety.
  1. Safe Entries and Exits
    Jumping into a pool from the side is straightforward. Entering a lake from a slippery dock or a rocky beach is not. Quality instruction includes practicing cautious entries and exits, teaching children to always check depth and look for obstacles before getting in or out of any body of water.
  1. Recognizing and Responding to Hazards
    A core component of water safety is education. Good instructors teach students to identify potential dangers, such as avoiding areas where waves are breaking. They learn to understand what different currents might look like and know to get out of the water at the first sign of changing weather.

Confidence: The Invisible Life Jacket

A valuable gift from formal lessons is confidence. Panic is the enemy in any emergency. A child who has been trained to handle unexpected situations in a controlled setting is far less likely to panic in a real-world scenario. This practiced calm allows them to recall their training and use the skills that will keep them safe.

Addressing Common Parental Concerns

  • “My child is a good pool swimmer. Isn’t that enough?”
    Pool swimming is a strong foundation, but it’s not complete preparation. Open water requires additional skills like environmental awareness, energy conservation, and dealing with currents. Professional lessons bridge this gap.
  • “We always use life jackets on the boat.”
    Life jackets are absolutely necessary for boating. However, accidents can happen in the moments a jacket isn’t on. In these scenarios, innate water safety skills are what protect your child.
  • “I’m always right there watching them.”
    Parental supervision is a critical safety layer. A moment of distraction is all it takes. A child who is equipped with skills and confidence has a layer of protection from within.

Building a Foundation for Safety

A man teaching a boy how to swim.

The goal is not to avoid water, but to empower your child to enjoy it respectfully and safely. The ocean, lakes, and rivers offer family fun and connection with nature. By investing in professional instruction, you are providing them with an important life skill. This is a core part of drowning prevention strategies from the Centers for Disease Control and Prevention, which underscores the value of formal swimming lessons as a protective measure.

You are building their confidence from the inside out, ensuring that wherever their adventures take them, they carry the knowledge and ability to assess risks, respect the water, and protect themselves. This peace of mind is a significant reward for any parent.

Share This Article

Important Safety Signs for Schools

Group of students gather outside school during fire drill.

With the new school year less than a month away, parents are preparing to send their children off on a fresh adventure of learning, growth, and new friendships. Kids are undoubtedly excited, but parents can’t help but worry about their safety both on and off campus.

Schools remain among the safest places for children. Teachers are trained for multiple situations, and regular drills equip students with the knowledge of what to do and how to act in case of an emergency.

One important safety element is often overlooked: school safety signs. These visible signs guide students, staff, and visitors during emergencies. Let’s explore the key types that keep everyone safe while they head to class.

Why Schools Need Safety Signs

There’s an old saying that goes something like “schools are a second home to children.” That saying stems from the fact that children spend almost as much time at school as they do at home, if not more on occasion.

Because of this, schools must make students feel just as safe on campus as they do at home. Trained staff are always present, students and faculty regularly participate in emergency drills, and mandatory safety inspections ensure the facilities are free of hazards.

In addition to the training, drills, and inspections, schools also incorporate safety signs that are crucial for anyone on the premises to find their way to a safe location. These signs may also provide instructions on how to face and control a certain situation.

However, having nothing but safety signs hanging from the ceiling or plastered on walls may be overwhelming and instill a feeling that something is bound. This is why safety signs need to be balanced with festive back-to-school signs that welcome students back to campus in a pleasant manner.

Most Important Safety Signs for Schools

When you think of school safety signs, a few familiar types probably come to mind right away. Fire safety signs, fire escape signs, and emergency exit signs are the most common ones. These are some of the most visible and crucial signs that help ensure everyone knows how to respond in urgent situations. However, schools use a wide variety of other safety signs that play equally important roles in keeping students, staff, and visitors protected every day.

From signs that guide behavior to those that warn of hazards or direct people to medical help, each type contributes to a safer and more secure campus environment. Let’s take a closer look at these different categories and understand how they work together to maintain safety at school.

Mandatory Signs

“Mandatory” school safety signs typically focus on actions students, staff, and visitors must take, rather than things they’re prohibited from doing. They communicate requirements in a positive, directive way. Examples include signs found in chemistry labs like “Safety Goggles Must Be Worn,” as well as others such as “Keep Quiet in the Library” or “Keep the Doors Closed.” The messages are clear and straightforward, reminding everyone to follow the rules to maintain safety and avoid issues.

Prohibition Signs

Prohibition signs are the exact opposite of “mandatory” signs in schools. Instead of telling people what they must do, they make it clear what is strictly forbidden on campus. These range from simple messages like “No Smoking” and “No Running” to more serious rules such as “No Firearms Allowed” or “No Alcohol on Campus.” Each sign marks a firm boundary that no one should cross.

Warning Signs

Pedestrian safety is always at the forefront for both parents and school administrators, but it makes up just one component of school warning signs. Warning signs on or near campus alert students, parents, staff, and visitors to potential hazards in the area. They can appear both inside and outside the school. Common examples include “High Voltage” signs near electrical posts, “Children Crossing” signs at the school entrance, and “Wet Floor” signs in hallways. Each is designed to prevent accidents and keep everyone safe in different parts of the school.

Fire Safety Signs

Fire safety signs guide people on how to a) prevent a fire from starting; and b) respond if one occurs. For example, they may warn against striking a match or using a lighter near flammable materials, or provide step-by-step instructions for operating a fire extinguisher or fire hose. Either way, these signs are crucial and can save lives in an emergency.

Fire Exit Signs

These directional signs work alongside the informative ones mentioned earlier. In the event of a fire, it’s essential for everyone to know how to evacuate the school in an orderly way. Fire exit signs are typically placed above doors leading out of the building, but they can also appear inside classrooms as maps showing the nearest exit. You might also find them near elevators, warning people not to use them during a fire.

First Aid Signs

First aid signs in schools are among the most important safety signs. They can be lifesaving, though their effectiveness greatly increases when paired with proper hands-on training. These signs may direct students and staff to the nearest first aid kit or, in critical situations, to a defibrillator. They can also be instructional graphics on how to perform life-saving procedures such as the Heimlich maneuver or CPR. Others guide people to the school’s medical room if someone needs attention from a nurse or other medical professional.

Conclusion

School safety signs might seem like a small detail in the bigger picture of campus security, but they play a vital role in preventing accidents, guiding people during emergencies, and reinforcing important safety rules. From mandatory and prohibition signs to fire exits, first aid points, and hazard warnings, each sign serves a specific purpose in keeping students, staff, and visitors safe.

As the new school year approaches, it’s worth ensuring these signs are visible, clear, and properly placed throughout the campus. Combined with training, drills, and a welcoming atmosphere, they help create a school environment where safety and learning go hand in hand.

Share This Article

Teaching Teens to Recognize and Avoid Online Impersonation Scams

female teen with walking with headphones and smiling at her smartphone.

The Internet has given teens incredible opportunities for communication, learning, and self-expression. They can easily connect with friends and explore new ideas. It’s also given fraudsters and cybercrooks new opportunities to exploit teenagers with one of the oldest tricks in the book – impersonation.

Impersonation scams most often begin when the impersonators pretend to be a celebrity, friend, or relative. The individual sends the teenager a message, friend request, or gets the teenager involved somehow that feels comfortable. The teenager relaxes, and soon they may be sharing personal details, sending money, or even clicking on infected website links.

As parents, teachers, and guardians, it’s important to be aware of these risks and educate teens on how to identify them early.

Why Teenagers Are Vulnerable

Teenagers are easy prey for impersonation scams because of the following reasons:

  • Social media trust – Teenagers tend to accept a friend request or message from someone they believe they know without verifying if the account is real.
  • Emotional involvement and curiosity – Impersonators may make accounts seem intriguing, flattering, or urgent.
  • Less experience identifying scams – Adolescents may not yet have the life experience to know red flags like conflicting information, poor grammar, or requests for money.

How Impersonation Scams Work

A scammer will copy a person’s profile picture and name and create an almost identical account. They will then attempt to contact the victim’s friends list or followers. The messages usually:

  • Ask for help in an “emergency” (e.g., being stuck somewhere or needing money quickly).
  • Offer special deals, contests, or access to premium material.
  • Send dodgy-looking links claiming to be images, videos, or documents.

Some sophisticated scams even use AI programs to develop voice clones or create realistic videos of the person they’re impersonating. This makes it even harder to detect the fraud.

Red Flags of a False Profile

Instruct teens to take a moment before they accept new friend invitations or open messages. Common red flags include:

  • Duplicate accounts – They are already following the “real” individual, but a second, almost identical account appears.
  • Unusual language patterns – Words that don’t match the person’s normal style of communication.
  • Urgent or emotional pleas – Sudden requests for money, help, or personal data.
  • No common contacts – A sign that the account may not be genuine.
  • Suspicious linksURLs that seem off or unexpected.

How Teens Can Protect Themselves

  1. Confirm identities before reacting.
     If an unusual message comes from a friend, verify by calling them via another method (phone, video call, or main account).
  2. Keep profiles private.
     Limiting posts, pictures, and contact details minimizes the chances of scammers gathering material to hijack accounts.
  3. Don’t overshare personal information.
     Birthdates, addresses, school names, and even pet names can be exploited for scams or password guessing.
  4. Block and report suspicious accounts.
     Most platforms have easy reporting tools and it’s better to report than regret.

The Parent and Educator Role

Parents and educators need to keep online safety a regular part of conversations, just like seatbelt use or healthy eating. This means:

  • Talking to teens about their latest online interactions.
  • Encouraging them to share suspicious messages without fear of punishment.
  • Showing real-life examples of scams.
  • Making it clear that anyone, even tech-savvy adults can be tricked.

When teens feel supported instead of judged, they’re more likely to come forward when something doesn’t feel right.

Adding a Layer of Technical Protection

While education is the best defense, certain tools can add extra protection.

Two-factor authentication and strong, unique passwords are essential. Teens (and adults) might also choose to browse with privacy tools that hide their IP addresses. In some cases, parents who want to create a safer online environment opt to buy http proxy services from reputable providers. For example, Proxy Cheap offers solutions that route internet traffic securely and make it harder for bad actors to track or target users directly.

Of course, proxies are not a cure-all they work best as part of a broader safety plan that includes awareness, good habits, and secure account settings.

Taking Action if a Teen Is a Victim

If a teen becomes the target of an impersonation scam, quick steps can reduce the damage:

  1. Stop all communication immediately and block the impersonator.
  2. Report the scam to the platform where it occurred.
  3. Change passwords for any potentially compromised accounts.
  4. Alert friends and contacts to avoid suspicious messages.
  5. If money or sensitive data is involved, contact local law enforcement or a cybercrime unit.

Building a Lifelong Skillset

Helping teens spot and avoid impersonation scams isn’t just about protecting them today it’s about preparing them for a lifetime of safer online habits. As technology advances, scams will evolve, but the same skills  critical thinking, verification, and caution will remain vital defenses.

By keeping communication open, teaching practical safety strategies, and combining them with technical safeguards, parents can help teens navigate the digital world with confidence and without falling prey to someone pretending to be someone they’re not.

Share This Article

Why Teachers Should Double-Check PDFs Before Sending to Parents

PDF security displayed over laptop screen.

As a teacher, you’ve likely sent hundreds of PDFs home to parents—newsletters, permission slips, grade summaries, class updates, and more. It’s an easy and efficient way to communicate. But have you ever stopped to ask: what else might be hidden inside that file?

Many educators don’t realize that a PDF can contain more than just the content they see on the page. Metadata, hidden comments, tracked changes, or even old drafts can all be embedded—sometimes without you ever knowing. When shared with parents or guardians, this unintended information can raise privacy concerns and undermine trust.

How to Check PDF’s Before Sending

Instead of relying only on visual checks, consider using a specialized PDF sanitizer or cleaner that can detect and strip out hidden data. One such online tool is PDFized, which helps educators and professionals remove hidden metadata, annotations, and personally identifiable information with ease.

Now, let’s explore why it’s so important to take a closer look before hitting “send.”

1.  Hidden Metadata Can Leak Private Information

Most PDFs contain metadata—information like the author’s name, the creation date, file path, and software used. On the surface, this may seem harmless. But in a school setting, especially when dealing with student data or teacher comments, it could reveal more than intended.

For example:

  • A document title might include a student’s full name.
  • Metadata might contain the name of a document version that references sensitive situations or student behavior notes.
  • File paths might indicate where the document is stored on a school network or personal device.

2.  Annotations and Comments May Still Be Embedded

Many teachers use comment or highlight tools while editing student documents or creating instructional PDFs. Even if you think those notes are deleted, some PDF readers simply “hide” them rather than remove them entirely.

This means:

  • A document you thought was polished may still contain grading notes or private reminders.
  • Comments about specific students or situations may accidentally be included and visible to others with the right software.

Double-checking with a tool that reveals hidden annotations can prevent these oversights.

Tip:  Right-clicking in Adobe Acrobat and selecting “Comments” or checking the “Layers” panel can help reveal unseen content.

3.  Tracked Changes Might Still Be Accessible

Have you ever exported a Word document to PDF without first accepting all changes? In some cases, that tracked history may still be embedded in the resulting file—even if it’s not visible on the first read.

This can unintentionally disclose:

  • Drafts of letters or evaluations
  • Revisions containing sensitive phrasing
  • Internal feedback between staff members

While not all PDF creators embed this data, it’s worth assuming that if the original file had tracked changes, some version history might remain.

4.  Personal Identifiers in File Names or Embedded Fields

Let’s say you save a file as “Report_for_Ethan_Jan2025.pdf” and email it to a group of parents by accident. Or you forget that a form you reused still has autofill fields tied to a previous student. These might not be visible in the PDF preview but can be revealed with a few clicks.

It’s a simple mistake—but one that can violate school privacy policies or FERPA regulations.

5.  Security Risks from Unvetted PDFs

Finally, while most teachers create their own PDFs, some may download or adapt templates from online sources. These can sometimes include embedded links or scripts that pose security risks—not just to parents, but to the school’s network.

Before sharing any file you didn’t create from scratch, always check:

  • Are there any embedded hyperlinks or scripts?
  • Does the PDF ask for access to external content?
  • Is the source site reputable and education-focused?

When in doubt, open downloaded PDFs in a secure reader and scan with antivirus tools.

Final Thoughts

PDFs are easy to create but they carry layers of information beneath. As educators, it’s our responsibility to protect student privacy, model digital responsibility, and build trust with families.

So before you send that next class newsletter or student report—take a few extra seconds to double-check. It’s a small step that can make a big difference.

Share This Article