Home Care Aider
start
Disclaimer
The videos in the ESCAPE project were developed using a combination of digital and automated creative tools (AI). As a result, some visual elements may vary between videos.
In particular, the appearance of characters, including their uniforms, physical features, and overall presentation, may not accurately reflect the typical appearance of care or health workers in your home country or local context.
These variations are a technical result of the AI tools used in the production process and do not affect the educational content or objectives of the ESCAPE project.
Scenario 1:
A trusted routine
watch video
Completed
Congratulations, you have successfully completed
❌ Call the number on the letter himself to confirm if the request was real before advising User 3: Scammers answer these calls and will try to convince her that the request is real. Always contact the official institution using numbers from official documents.
Check the website’s URL to make sure it starts with ‘https://’ and doesn’t contain strange characters or spelling errors.: Phishing websites often use URLs that look almost real but contain extra letters, numbers, or symbols (e.g., "www.bank-secure-login.com" instead of "www.bank.com").
Close the pop-up message and tell User 2 to visit her bank’s official website instead of using links that appear on the screen: Fake login pages trick users into revealing passwords. Always go to the bank’s official website manually instead of clicking on pop-ups.
Help User 2 enter her banking details on the pop-up warning message so she can access her account quickly: This is a phishing scam. Entering details on a fake pop-up allows criminals to steal login credentials.
Advise User 3 to contact her bank directly using the official phone number printed on her bank statement: Scammers often impersonate official agencies. Clients should always verify financial requests by calling a trusted number from their bank statements or official documents.
❌ Tell User 3 that these letters are normal and that she shouldn’t worry too much: Dismissing concerns can lead to missed warning signs. Many elderly individuals are unaware of cyber scams and need guidance.
Correct Action
Correct Action
Correct Action
Incorrect Action
Incorrect Action
Incorrect Action
Incorrect Action
Next
Scenario 2:
The fallout
watch video
Test 2
Completed
Congratulations, you have successfully completed
❌ José’s clients were targeted because they were careless with their information: Cybercriminals often prey on vulnerable individuals, not because of carelessness, but because of their trust and lack of awareness.
The letter and pop-up message were part of the same cyberattack: While not confirmed, both incidents show signs of phishing tactics used to extract private information.
José helped expose the scam by reporting it to his supervisor: By sharing what happened with his supervisor, José helped the agency connect the incidents and take swift action to prevent further damage.
❌ It is always safe for a caregiver to help clients with online banking: Even with good intentions, assisting with sensitive tasks like banking can lead to unintended data breaches or fraud.
José could have avoided the incident by trusting his instincts: He hesitated before entering login information, sensing something was off. That instinct could have been a protective factor.
Banks can always recover stolen money if fraud is reported: If the victim voluntarily shared information, banks may hold them liable and not refund the money.
Correct Action
Correct Action
Correct Action
Incorrect Action
Incorrect Action
Incorrect Action
Incorrect Action
Next
Scenario 3:
A Fragile Recovery
watch video
Completed
Congratulations, you have successfully completed
The cyberattack damaged more than just finances—it impacted clients emotionally: User 3 became more fearful and less confident in her independence after the scam.
User 2 was able to prevent financial loss thanks to her bank’s quick action: The bank froze User 2’s account in time, though it caused inconvenience and stress.
Cybersecurity is only a technical issue and doesn’t involve emotional or social impacts: The emotional toll on User 3, and the disruption to her life, prove that cyberattacks have social and psychological effects.
❌ José was held legally responsible for the consequences of the scam: José was not legally liable, but the incident caused emotional strain and self-blame.
José took part in caregiver support initiatives after the incident: José joined a peer group to better prepare for future tech-related challenges in caregiving.
❌ All of José’s affected clients fully recovered their lost money: Only part of the stolen funds were recovered for User 3; full recovery was not possible.
Correct Action
Correct Action
Correct Action
Incorrect Action
Incorrect Action
Incorrect Action
Incorrect Action
Next
Completed
Congratulations, you have successfully completed
Home Care Aider
Bhupender Singh
Created on August 18, 2025
Start designing with a free template
Discover more than 1500 professional designs like these:
View
Math Mission
View
Secret Code
View
Museum Escape Room
View
Simple corporate escape room
View
Chaotic Kitchen Escape Room
View
Vibrant Breakout
View
Reboot Protocol
Explore all templates
Transcript
Home Care Aider
start
Disclaimer
The videos in the ESCAPE project were developed using a combination of digital and automated creative tools (AI). As a result, some visual elements may vary between videos. In particular, the appearance of characters, including their uniforms, physical features, and overall presentation, may not accurately reflect the typical appearance of care or health workers in your home country or local context. These variations are a technical result of the AI tools used in the production process and do not affect the educational content or objectives of the ESCAPE project.
Scenario 1:
A trusted routine
watch video
Completed
Congratulations, you have successfully completed
❌ Call the number on the letter himself to confirm if the request was real before advising User 3: Scammers answer these calls and will try to convince her that the request is real. Always contact the official institution using numbers from official documents.
Check the website’s URL to make sure it starts with ‘https://’ and doesn’t contain strange characters or spelling errors.: Phishing websites often use URLs that look almost real but contain extra letters, numbers, or symbols (e.g., "www.bank-secure-login.com" instead of "www.bank.com").
Close the pop-up message and tell User 2 to visit her bank’s official website instead of using links that appear on the screen: Fake login pages trick users into revealing passwords. Always go to the bank’s official website manually instead of clicking on pop-ups.
Help User 2 enter her banking details on the pop-up warning message so she can access her account quickly: This is a phishing scam. Entering details on a fake pop-up allows criminals to steal login credentials.
Advise User 3 to contact her bank directly using the official phone number printed on her bank statement: Scammers often impersonate official agencies. Clients should always verify financial requests by calling a trusted number from their bank statements or official documents.
❌ Tell User 3 that these letters are normal and that she shouldn’t worry too much: Dismissing concerns can lead to missed warning signs. Many elderly individuals are unaware of cyber scams and need guidance.
Correct Action
Correct Action
Correct Action
Incorrect Action
Incorrect Action
Incorrect Action
Incorrect Action
Next
Scenario 2:
The fallout
watch video
Test 2
Completed
Congratulations, you have successfully completed
❌ José’s clients were targeted because they were careless with their information: Cybercriminals often prey on vulnerable individuals, not because of carelessness, but because of their trust and lack of awareness.
The letter and pop-up message were part of the same cyberattack: While not confirmed, both incidents show signs of phishing tactics used to extract private information.
José helped expose the scam by reporting it to his supervisor: By sharing what happened with his supervisor, José helped the agency connect the incidents and take swift action to prevent further damage.
❌ It is always safe for a caregiver to help clients with online banking: Even with good intentions, assisting with sensitive tasks like banking can lead to unintended data breaches or fraud.
José could have avoided the incident by trusting his instincts: He hesitated before entering login information, sensing something was off. That instinct could have been a protective factor.
Banks can always recover stolen money if fraud is reported: If the victim voluntarily shared information, banks may hold them liable and not refund the money.
Correct Action
Correct Action
Correct Action
Incorrect Action
Incorrect Action
Incorrect Action
Incorrect Action
Next
Scenario 3:
A Fragile Recovery
watch video
Completed
Congratulations, you have successfully completed
The cyberattack damaged more than just finances—it impacted clients emotionally: User 3 became more fearful and less confident in her independence after the scam.
User 2 was able to prevent financial loss thanks to her bank’s quick action: The bank froze User 2’s account in time, though it caused inconvenience and stress.
Cybersecurity is only a technical issue and doesn’t involve emotional or social impacts: The emotional toll on User 3, and the disruption to her life, prove that cyberattacks have social and psychological effects.
❌ José was held legally responsible for the consequences of the scam: José was not legally liable, but the incident caused emotional strain and self-blame.
José took part in caregiver support initiatives after the incident: José joined a peer group to better prepare for future tech-related challenges in caregiving.
❌ All of José’s affected clients fully recovered their lost money: Only part of the stolen funds were recovered for User 3; full recovery was not possible.
Correct Action
Correct Action
Correct Action
Incorrect Action
Incorrect Action
Incorrect Action
Incorrect Action
Next
Completed
Congratulations, you have successfully completed