SlideShare a Scribd company logo
1 of 1
Download to read offline
The more you use the Internet, the more important it is to be
sure that you are able to manage your security online. The
UK loses billions every year to e-criminals. The following are
some key points to note:
Anti-Virus/ Anti-Spyware
Everyone using the Internet, whether on their iPad,
smart phone or pc needs to have good anti-virus
and anti-spyware programmes or apps. Keep these
updated!. Believe it or not, it is possible to get
viruses on smart phones, tablet pcs and jail-broken
iPhones too! A good firewall will help too.
Fraping and Identity Theft
Fraping is when a friend or family member pretends to be you and uses your Facebook
account to posts funny updates! To prevent fraping, or someone hacking your identity,
always log off after using services like email, Pinterest, Amazon, Facebook, Twitter,
Foursquare etc. Also use hard to guess passwords, and never share these with
your friends.
Dodgy Files and Downloads
Never open emails with strange subject lines or from people you do not know. Similarly
never accept suspicious looking files sent/shared via Bluetooth, Dropbox, Messenger
programmes, Skype, email or similar services. Some malware also gets bundled with
software you download, so always read the fine print, before clicking ‘Agree’, and only
download programmes from trusted websites for example
Wireless Network Security
If you have a wireless network, password protect it, make it invisible, change the default
router password, and use ‘machine level’ filtering to limit access to your wireless
network to specific devices. These settings can be customised by logging onto your
router. Whilst not foolproof, these steps will reduce the possibility of misuse.
Update your Operating System and Software
Your pc or smart phone comes with an operating system. Over time, developers make
changes to this and will offer security and other updates, which you should always carry
out. Keep any apps/ programmes you install updated too! For updates to the Windows
operating system, see:
Copyright © 2012 WISE KIDS. Creative Commons License: CC BY-ND 3.0
http://www.tucows.com
http://windowsupdate.microsoft.com
e-Securitye-Security
http://creativecommons.org/licenses/by-nd/3.0/
www.wisekids.org.uk
Backup
Using a good external hard disk, or an online 'cloud-based' storage service (examples:
Dropbox: http://www.dropbox.com, SkyDrive: http://www.skydrive.com,
SpiderOak: http://www.spideroak.com), always backup your data – this could be
coursework, emails, photos, videos or any content which you have created.

More Related Content

What's hot

HELE 4 Lesson 2: Safe and Responsible Use of ICT
HELE 4 Lesson 2: Safe and Responsible Use of ICTHELE 4 Lesson 2: Safe and Responsible Use of ICT
HELE 4 Lesson 2: Safe and Responsible Use of ICTBenandro Palor
 
Internet threats and defence mechanism
Internet threats and defence mechanismInternet threats and defence mechanism
Internet threats and defence mechanismCAS
 
Spyware Adware1
Spyware Adware1Spyware Adware1
Spyware Adware1rubal_9
 
S P Y W A R E4 S I K
S P Y W A R E4 S I KS P Y W A R E4 S I K
S P Y W A R E4 S I Kazman21
 
Virus Spyware Quiz
Virus Spyware QuizVirus Spyware Quiz
Virus Spyware QuizPEC
 
Spyware powerpoint
Spyware powerpointSpyware powerpoint
Spyware powerpointgalaxy201
 
Internet Threats
Internet ThreatsInternet Threats
Internet ThreatsLeelet1121
 
Computer Malware
Computer MalwareComputer Malware
Computer Malwareaztechtchr
 
Computer based crime
Computer based crimeComputer based crime
Computer based crimeTaylor_Marie
 
computer virus ppt.pptx
computer virus ppt.pptxcomputer virus ppt.pptx
computer virus ppt.pptxAbiniyavk
 
Security Awareness 9 10 09 V4 Viruses
Security Awareness 9 10 09 V4 VirusesSecurity Awareness 9 10 09 V4 Viruses
Security Awareness 9 10 09 V4 VirusesCatherine MacAllister
 
Internet Threats
Internet ThreatsInternet Threats
Internet ThreatsRonalyn_Cao
 
The Malware Menace
The Malware MenaceThe Malware Menace
The Malware MenaceTami Brass
 
OPSEC for OMBUDSMEN
OPSEC for OMBUDSMENOPSEC for OMBUDSMEN
OPSEC for OMBUDSMENNaval OPSEC
 

What's hot (19)

HELE 4 Lesson 2: Safe and Responsible Use of ICT
HELE 4 Lesson 2: Safe and Responsible Use of ICTHELE 4 Lesson 2: Safe and Responsible Use of ICT
HELE 4 Lesson 2: Safe and Responsible Use of ICT
 
Internet threats and defence mechanism
Internet threats and defence mechanismInternet threats and defence mechanism
Internet threats and defence mechanism
 
Presented to Compass
Presented to CompassPresented to Compass
Presented to Compass
 
Spyware Adware1
Spyware Adware1Spyware Adware1
Spyware Adware1
 
S P Y W A R E4 S I K
S P Y W A R E4 S I KS P Y W A R E4 S I K
S P Y W A R E4 S I K
 
Virus Spyware Quiz
Virus Spyware QuizVirus Spyware Quiz
Virus Spyware Quiz
 
Spyware powerpoint
Spyware powerpointSpyware powerpoint
Spyware powerpoint
 
Internet Threats
Internet ThreatsInternet Threats
Internet Threats
 
Computer Malware
Computer MalwareComputer Malware
Computer Malware
 
Computer based crime
Computer based crimeComputer based crime
Computer based crime
 
computer virus ppt.pptx
computer virus ppt.pptxcomputer virus ppt.pptx
computer virus ppt.pptx
 
Virus
VirusVirus
Virus
 
spyware
spyware spyware
spyware
 
Pc security and_safety
Pc security and_safetyPc security and_safety
Pc security and_safety
 
Security Awareness 9 10 09 V4 Viruses
Security Awareness 9 10 09 V4 VirusesSecurity Awareness 9 10 09 V4 Viruses
Security Awareness 9 10 09 V4 Viruses
 
Computer security
Computer securityComputer security
Computer security
 
Internet Threats
Internet ThreatsInternet Threats
Internet Threats
 
The Malware Menace
The Malware MenaceThe Malware Menace
The Malware Menace
 
OPSEC for OMBUDSMEN
OPSEC for OMBUDSMENOPSEC for OMBUDSMEN
OPSEC for OMBUDSMEN
 

Similar to WISE KIDS Leaflet: eSecurity

An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)Cyber Security Infotech
 
Giarritano concept paper 4
Giarritano concept paper 4Giarritano concept paper 4
Giarritano concept paper 4leahg118
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02amiinaaa
 
TheInternetDigitalSecurityfddreeere.pptx
TheInternetDigitalSecurityfddreeere.pptxTheInternetDigitalSecurityfddreeere.pptx
TheInternetDigitalSecurityfddreeere.pptxHAYDEECAYDA
 
10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.Khalil Jubran
 
Cybersecurity Awareness Month Tips
Cybersecurity Awareness Month TipsCybersecurity Awareness Month Tips
Cybersecurity Awareness Month TipsKevin Fream
 
Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual Jay Nagar
 
Dev Abhijet Gagan Chaitanya VII-A ....Salwan public school
Dev Abhijet Gagan Chaitanya VII-A  ....Salwan public schoolDev Abhijet Gagan Chaitanya VII-A  ....Salwan public school
Dev Abhijet Gagan Chaitanya VII-A ....Salwan public schoolDevku45
 
Document safer online for nonprofits guide
Document safer online for nonprofits guideDocument safer online for nonprofits guide
Document safer online for nonprofits guideNguyen Xuan Quang
 
How to Bulletproof Your Data Defenses Locally & In the Cloud
How to Bulletproof Your Data Defenses Locally & In the CloudHow to Bulletproof Your Data Defenses Locally & In the Cloud
How to Bulletproof Your Data Defenses Locally & In the CloudNordic Backup
 
Home and Business Computer Security 2014
Home and Business Computer Security 2014Home and Business Computer Security 2014
Home and Business Computer Security 2014B2BPlanner Ltd.
 
Computer Security Basics for UW-Madison Emeritus Faculty and Staff
Computer Security Basics for UW-Madison Emeritus Faculty and StaffComputer Security Basics for UW-Madison Emeritus Faculty and Staff
Computer Security Basics for UW-Madison Emeritus Faculty and StaffNicholas Davis
 
How to Keep Your Phone Safe from Hackers (1).pptx
How to Keep Your Phone Safe from Hackers (1).pptxHow to Keep Your Phone Safe from Hackers (1).pptx
How to Keep Your Phone Safe from Hackers (1).pptx4Freedom Mobile
 
Cyber pledge infoMagnum
Cyber pledge infoMagnumCyber pledge infoMagnum
Cyber pledge infoMagnumARUN REDDY M
 
CyberSecThreats_R_U_atRisk_Watson
CyberSecThreats_R_U_atRisk_WatsonCyberSecThreats_R_U_atRisk_Watson
CyberSecThreats_R_U_atRisk_WatsonPatricia M Watson
 

Similar to WISE KIDS Leaflet: eSecurity (20)

An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)
 
Giarritano concept paper 4
Giarritano concept paper 4Giarritano concept paper 4
Giarritano concept paper 4
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
 
TheInternetDigitalSecurityfddreeere.pptx
TheInternetDigitalSecurityfddreeere.pptxTheInternetDigitalSecurityfddreeere.pptx
TheInternetDigitalSecurityfddreeere.pptx
 
10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.
 
Cybersecurity Awareness Month Tips
Cybersecurity Awareness Month TipsCybersecurity Awareness Month Tips
Cybersecurity Awareness Month Tips
 
M
MM
M
 
Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual
 
Dev Abhijet Gagan Chaitanya VII-A ....Salwan public school
Dev Abhijet Gagan Chaitanya VII-A  ....Salwan public schoolDev Abhijet Gagan Chaitanya VII-A  ....Salwan public school
Dev Abhijet Gagan Chaitanya VII-A ....Salwan public school
 
Document safer online for nonprofits guide
Document safer online for nonprofits guideDocument safer online for nonprofits guide
Document safer online for nonprofits guide
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
How to Bulletproof Your Data Defenses Locally & In the Cloud
How to Bulletproof Your Data Defenses Locally & In the CloudHow to Bulletproof Your Data Defenses Locally & In the Cloud
How to Bulletproof Your Data Defenses Locally & In the Cloud
 
Safe Computing
Safe ComputingSafe Computing
Safe Computing
 
Module 5: Safety
Module 5: SafetyModule 5: Safety
Module 5: Safety
 
Home and Business Computer Security 2014
Home and Business Computer Security 2014Home and Business Computer Security 2014
Home and Business Computer Security 2014
 
Computer Security Basics for UW-Madison Emeritus Faculty and Staff
Computer Security Basics for UW-Madison Emeritus Faculty and StaffComputer Security Basics for UW-Madison Emeritus Faculty and Staff
Computer Security Basics for UW-Madison Emeritus Faculty and Staff
 
Secure End User
Secure End UserSecure End User
Secure End User
 
How to Keep Your Phone Safe from Hackers (1).pptx
How to Keep Your Phone Safe from Hackers (1).pptxHow to Keep Your Phone Safe from Hackers (1).pptx
How to Keep Your Phone Safe from Hackers (1).pptx
 
Cyber pledge infoMagnum
Cyber pledge infoMagnumCyber pledge infoMagnum
Cyber pledge infoMagnum
 
CyberSecThreats_R_U_atRisk_Watson
CyberSecThreats_R_U_atRisk_WatsonCyberSecThreats_R_U_atRisk_Watson
CyberSecThreats_R_U_atRisk_Watson
 

More from WISE KIDS

WISE KIDS Leaflet: Online Content True, False, Inappropriate and Illegal (in ...
WISE KIDS Leaflet: Online Content True, False, Inappropriate and Illegal (in ...WISE KIDS Leaflet: Online Content True, False, Inappropriate and Illegal (in ...
WISE KIDS Leaflet: Online Content True, False, Inappropriate and Illegal (in ...WISE KIDS
 
WISE KIDS Leaflet: Online Content True, False, Inappropriate and Illegal
WISE KIDS Leaflet: Online Content True, False, Inappropriate and IllegalWISE KIDS Leaflet: Online Content True, False, Inappropriate and Illegal
WISE KIDS Leaflet: Online Content True, False, Inappropriate and IllegalWISE KIDS
 
WISE KIDS Leaflet: Public on the Internet - Gaming, Forums, YouTube, Blogs an...
WISE KIDS Leaflet: Public on the Internet - Gaming, Forums, YouTube, Blogs an...WISE KIDS Leaflet: Public on the Internet - Gaming, Forums, YouTube, Blogs an...
WISE KIDS Leaflet: Public on the Internet - Gaming, Forums, YouTube, Blogs an...WISE KIDS
 
WISE KIDS Leaflet: Public on the Internet - Gaming, Forums, YouTube, Blogs an...
WISE KIDS Leaflet: Public on the Internet - Gaming, Forums, YouTube, Blogs an...WISE KIDS Leaflet: Public on the Internet - Gaming, Forums, YouTube, Blogs an...
WISE KIDS Leaflet: Public on the Internet - Gaming, Forums, YouTube, Blogs an...WISE KIDS
 
WISE KIDS Leaflet: Smart Phones, Social Networks, Messenger, Chat and Locatio...
WISE KIDS Leaflet: Smart Phones, Social Networks, Messenger, Chat and Locatio...WISE KIDS Leaflet: Smart Phones, Social Networks, Messenger, Chat and Locatio...
WISE KIDS Leaflet: Smart Phones, Social Networks, Messenger, Chat and Locatio...WISE KIDS
 
WISE KIDS Leaflet: Smart Phones, Social Networks, Messenger, Chat and Locatio...
WISE KIDS Leaflet: Smart Phones, Social Networks, Messenger, Chat and Locatio...WISE KIDS Leaflet: Smart Phones, Social Networks, Messenger, Chat and Locatio...
WISE KIDS Leaflet: Smart Phones, Social Networks, Messenger, Chat and Locatio...WISE KIDS
 
WISE KIDS Leaflet: Junk Mail and Misleading Advertisements (in Welsh)
WISE KIDS Leaflet: Junk Mail and Misleading Advertisements (in Welsh)WISE KIDS Leaflet: Junk Mail and Misleading Advertisements (in Welsh)
WISE KIDS Leaflet: Junk Mail and Misleading Advertisements (in Welsh)WISE KIDS
 
WISE KIDS Leaflet: Junk Mail and Misleading Advertisements
WISE KIDS Leaflet: Junk Mail and Misleading AdvertisementsWISE KIDS Leaflet: Junk Mail and Misleading Advertisements
WISE KIDS Leaflet: Junk Mail and Misleading AdvertisementsWISE KIDS
 
WISE KIDS Leaflet: eSecurity (in Welsh)
WISE KIDS Leaflet: eSecurity (in Welsh)WISE KIDS Leaflet: eSecurity (in Welsh)
WISE KIDS Leaflet: eSecurity (in Welsh)WISE KIDS
 
WISE KIDS Leaflet: Cyberbullying and Sexting (in Welsh)
WISE KIDS Leaflet: Cyberbullying and Sexting (in Welsh)WISE KIDS Leaflet: Cyberbullying and Sexting (in Welsh)
WISE KIDS Leaflet: Cyberbullying and Sexting (in Welsh)WISE KIDS
 
WISE KIDS Leaflet: Cyberbullying
WISE KIDS Leaflet: CyberbullyingWISE KIDS Leaflet: Cyberbullying
WISE KIDS Leaflet: CyberbullyingWISE KIDS
 
WISE KIDS Leaflet: Copyright (In Welsh)
WISE KIDS Leaflet: Copyright (In Welsh)WISE KIDS Leaflet: Copyright (In Welsh)
WISE KIDS Leaflet: Copyright (In Welsh)WISE KIDS
 
WISE KIDS Leaflet: Copyright Matters
WISE KIDS Leaflet: Copyright MattersWISE KIDS Leaflet: Copyright Matters
WISE KIDS Leaflet: Copyright MattersWISE KIDS
 
Internet Literacy and Safety
Internet Literacy and SafetyInternet Literacy and Safety
Internet Literacy and SafetyWISE KIDS
 

More from WISE KIDS (14)

WISE KIDS Leaflet: Online Content True, False, Inappropriate and Illegal (in ...
WISE KIDS Leaflet: Online Content True, False, Inappropriate and Illegal (in ...WISE KIDS Leaflet: Online Content True, False, Inappropriate and Illegal (in ...
WISE KIDS Leaflet: Online Content True, False, Inappropriate and Illegal (in ...
 
WISE KIDS Leaflet: Online Content True, False, Inappropriate and Illegal
WISE KIDS Leaflet: Online Content True, False, Inappropriate and IllegalWISE KIDS Leaflet: Online Content True, False, Inappropriate and Illegal
WISE KIDS Leaflet: Online Content True, False, Inappropriate and Illegal
 
WISE KIDS Leaflet: Public on the Internet - Gaming, Forums, YouTube, Blogs an...
WISE KIDS Leaflet: Public on the Internet - Gaming, Forums, YouTube, Blogs an...WISE KIDS Leaflet: Public on the Internet - Gaming, Forums, YouTube, Blogs an...
WISE KIDS Leaflet: Public on the Internet - Gaming, Forums, YouTube, Blogs an...
 
WISE KIDS Leaflet: Public on the Internet - Gaming, Forums, YouTube, Blogs an...
WISE KIDS Leaflet: Public on the Internet - Gaming, Forums, YouTube, Blogs an...WISE KIDS Leaflet: Public on the Internet - Gaming, Forums, YouTube, Blogs an...
WISE KIDS Leaflet: Public on the Internet - Gaming, Forums, YouTube, Blogs an...
 
WISE KIDS Leaflet: Smart Phones, Social Networks, Messenger, Chat and Locatio...
WISE KIDS Leaflet: Smart Phones, Social Networks, Messenger, Chat and Locatio...WISE KIDS Leaflet: Smart Phones, Social Networks, Messenger, Chat and Locatio...
WISE KIDS Leaflet: Smart Phones, Social Networks, Messenger, Chat and Locatio...
 
WISE KIDS Leaflet: Smart Phones, Social Networks, Messenger, Chat and Locatio...
WISE KIDS Leaflet: Smart Phones, Social Networks, Messenger, Chat and Locatio...WISE KIDS Leaflet: Smart Phones, Social Networks, Messenger, Chat and Locatio...
WISE KIDS Leaflet: Smart Phones, Social Networks, Messenger, Chat and Locatio...
 
WISE KIDS Leaflet: Junk Mail and Misleading Advertisements (in Welsh)
WISE KIDS Leaflet: Junk Mail and Misleading Advertisements (in Welsh)WISE KIDS Leaflet: Junk Mail and Misleading Advertisements (in Welsh)
WISE KIDS Leaflet: Junk Mail and Misleading Advertisements (in Welsh)
 
WISE KIDS Leaflet: Junk Mail and Misleading Advertisements
WISE KIDS Leaflet: Junk Mail and Misleading AdvertisementsWISE KIDS Leaflet: Junk Mail and Misleading Advertisements
WISE KIDS Leaflet: Junk Mail and Misleading Advertisements
 
WISE KIDS Leaflet: eSecurity (in Welsh)
WISE KIDS Leaflet: eSecurity (in Welsh)WISE KIDS Leaflet: eSecurity (in Welsh)
WISE KIDS Leaflet: eSecurity (in Welsh)
 
WISE KIDS Leaflet: Cyberbullying and Sexting (in Welsh)
WISE KIDS Leaflet: Cyberbullying and Sexting (in Welsh)WISE KIDS Leaflet: Cyberbullying and Sexting (in Welsh)
WISE KIDS Leaflet: Cyberbullying and Sexting (in Welsh)
 
WISE KIDS Leaflet: Cyberbullying
WISE KIDS Leaflet: CyberbullyingWISE KIDS Leaflet: Cyberbullying
WISE KIDS Leaflet: Cyberbullying
 
WISE KIDS Leaflet: Copyright (In Welsh)
WISE KIDS Leaflet: Copyright (In Welsh)WISE KIDS Leaflet: Copyright (In Welsh)
WISE KIDS Leaflet: Copyright (In Welsh)
 
WISE KIDS Leaflet: Copyright Matters
WISE KIDS Leaflet: Copyright MattersWISE KIDS Leaflet: Copyright Matters
WISE KIDS Leaflet: Copyright Matters
 
Internet Literacy and Safety
Internet Literacy and SafetyInternet Literacy and Safety
Internet Literacy and Safety
 

Recently uploaded

MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptxPoojaSen20
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersChitralekhaTherkar
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 

Recently uploaded (20)

MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptx
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of Powders
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 

WISE KIDS Leaflet: eSecurity

  • 1. The more you use the Internet, the more important it is to be sure that you are able to manage your security online. The UK loses billions every year to e-criminals. The following are some key points to note: Anti-Virus/ Anti-Spyware Everyone using the Internet, whether on their iPad, smart phone or pc needs to have good anti-virus and anti-spyware programmes or apps. Keep these updated!. Believe it or not, it is possible to get viruses on smart phones, tablet pcs and jail-broken iPhones too! A good firewall will help too. Fraping and Identity Theft Fraping is when a friend or family member pretends to be you and uses your Facebook account to posts funny updates! To prevent fraping, or someone hacking your identity, always log off after using services like email, Pinterest, Amazon, Facebook, Twitter, Foursquare etc. Also use hard to guess passwords, and never share these with your friends. Dodgy Files and Downloads Never open emails with strange subject lines or from people you do not know. Similarly never accept suspicious looking files sent/shared via Bluetooth, Dropbox, Messenger programmes, Skype, email or similar services. Some malware also gets bundled with software you download, so always read the fine print, before clicking ‘Agree’, and only download programmes from trusted websites for example Wireless Network Security If you have a wireless network, password protect it, make it invisible, change the default router password, and use ‘machine level’ filtering to limit access to your wireless network to specific devices. These settings can be customised by logging onto your router. Whilst not foolproof, these steps will reduce the possibility of misuse. Update your Operating System and Software Your pc or smart phone comes with an operating system. Over time, developers make changes to this and will offer security and other updates, which you should always carry out. Keep any apps/ programmes you install updated too! For updates to the Windows operating system, see: Copyright © 2012 WISE KIDS. Creative Commons License: CC BY-ND 3.0 http://www.tucows.com http://windowsupdate.microsoft.com e-Securitye-Security http://creativecommons.org/licenses/by-nd/3.0/ www.wisekids.org.uk Backup Using a good external hard disk, or an online 'cloud-based' storage service (examples: Dropbox: http://www.dropbox.com, SkyDrive: http://www.skydrive.com, SpiderOak: http://www.spideroak.com), always backup your data – this could be coursework, emails, photos, videos or any content which you have created.