Using Smartphones Effectively
This module discusses how to use your phone safely and securely through configuring a lock screen, recognizing scam messages and links, and avoiding dangerous apps.
Lesson Content
Password Protection and Lock Screen
Every phone should be password protected. This is done through the usage of a pin, password, fingerprint, or facial recognition.
What is a pin?
- A pattern of numbers used to unlock a phone or tablet.
- Can be four (4) or six (6) digits
What is a passcode?
- A pattern of letters and numbers to unlock a phone or tablet
Fingerprint
- Using your unique fingerprint, placing it on the home button of a phone, unlocks it.
Facial Recognition
- Like using a fingerprint, the camera of the phone or tablet scans your face to ensure it matches the owner.
Phishing and Scam Messages
Phishing is not only included in email. Many people will receive phishing text messages or even phone calls.
Avoid interacting with anyone you do not know online. Usually, they will text you first to start a conversation.
- Be cautious of links, do not automatically click them
- Take time to understand what the message is saying or asking for, avoid urgency
Avoiding Dangerous Apps
Most phones have a trusted “app store”. This could be the Apple App Store or the Google Play Store.
Only download apps from these trusted places.

Maggie Trowbridge
Digital Literacy Educator
Maggie focuses on helping older adults feel confident and capable in today’s digital world. She enjoys breaking down complex technology into simple, practical skills; whether that’s navigating smartphones, recognizing online scams, or using digital tools to stay connected with family and community. Her goal is to make technology feel less intimidating and more empowering, meeting learners with patience, clarity, and understanding.
Looking ahead, Maggie hopes to continue working at the intersection of cybersecurity and public service, building secure systems while staying committed to the people those systems are meant to protect and support.