SlideShare a Scribd company logo
1 of 7
Online Safety Five easy tips to secure your online existence.
Protect Your Banking 1 Always keep your credentials to yourself. Ensure you login only by visiting your Bank’s website.  Email is not a method used by Bank’s to request personal information from you. Avoid using publicly available computers for your online banking. Trust your instincts. If something looks wrong it probably is.  Always run and keep your antivirus and anti-spyware software up to date.
Be Socially Smart 2 Keep your statuses simple and never divulge your physical location. Monitor who can see your social networking information. Whether private or not. Choose strong passwords to prevent someone accessing your social networking account. Avoid divulging highly personal information such as your address – even in configuration or informational pages. If you click on a link, make sure the website address that opens is the same as the link you clicked on. Always remain anonymous when entering open or “free-for-all” chat rooms and similar gatherings.  Your Bank will never use a Social Networking site to request financial or personal information from you. If you use instant messaging applications, sign-on to those applications. Avoid websites claiming to sign-on or automate it for you as they may simply be mining your login details.
Passwords Are Your Keys. 3 Information about you should never be in your password. If your password can be looked-up in a dictionary it is too weak. Try to use combinations of LARge letters, Numb3rs and %characters% Don’t write passwords down.  Change passwords as regularly as is comfortable but at least within 6 months. If in doubt, change your passwords. No website/bank/store will send you email asking you to reply with your password or username. Do not reply to such requests.
Use Email Wisely. 4 Replying to spam or junk-mail simply makes it known you are reading it. Ignore and delete such on sight. Avoid sending confidential files, passwords, credit-card numbers or other confidential data in email. Be cautious when opening links from email messages. Make sure the link address is what actually opens in the browser. Ensure all emails are scanned for viruses and other possible malware, phishing or spyware threats. When you use reply-all, make sure everyone on the recipient list needs to know what you have to say.  Financial institutions do not use email to update your account details, change your password or notify you of account closure. Email messages urging you take action with lots of warnings, time-limits and grammar or spelling mistakes should be treated as possible threats.
Be Cautious When Travelling 5 Connections to public and/or public-service Wifi or other networks should be treated as non-secure. Ensure you have a firewall, and other protection software running. Shoulder Surfing is when someone watches you type your password or credentials on your laptop from behind, to the side or with zoom lenses. Always take care when entering this information in a public area. Any laptop that is used thoroughly off-site or is constantly mobile should have full disk encryption installed on it. A best-practice is to apply this rule to all laptops you own. Do not leave your laptop unattended. Apart from theft you may find key loggers or other spyware software very quickly installed. Keep removable storage, memory cards, memory sticks and other small data storage devices safe. If possible encrypt these too. Remember if you suspend instead of hibernate/turn-off your laptop you might not be activating required encryption or security protection on the laptop.
Glossary Phishing ... is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, accounts numbers or passwords by posing as legitimate websites or entities requesting this information. Shoulder Surfing ... is the process of obtaining security credentials or other data as it is being entered by watching or recording the physical entry of the data either behind, next-to or in view of the victim. Spyware ... is hidden software that obtains data, or other information from a persons computer without notification or without the user’s consent. Malware ... is software that is designed to infiltrate and destroy or damage either data or other components of a computer system. Social Engineering ... is the process of getting someone to divulge personal or secret information through use of lies, misguided trust, apparent authority or other forms of deception.

More Related Content

More from yamen

Creative Commons
Creative CommonsCreative Commons
Creative Commonsyamen
 
Wikies for Cities
Wikies for CitiesWikies for Cities
Wikies for Citiesyamen
 
OpenGov Sayada
OpenGov SayadaOpenGov Sayada
OpenGov Sayadayamen
 
Application de l' OpenGov par les associations
Application de l' OpenGov par les associationsApplication de l' OpenGov par les associations
Application de l' OpenGov par les associationsyamen
 
Wikimedia Commons
Wikimedia CommonsWikimedia Commons
Wikimedia Commonsyamen
 
Opengov application par les associations
Opengov application par les associationsOpengov application par les associations
Opengov application par les associationsyamen
 
Wikipédia: Le Projet Tunisie
Wikipédia: Le Projet TunisieWikipédia: Le Projet Tunisie
Wikipédia: Le Projet Tunisieyamen
 
Présentation de la BTS
Présentation de la BTSPrésentation de la BTS
Présentation de la BTSyamen
 
Le Coaching Au Service De L’Entrepreneuriat
Le Coaching Au Service De L’EntrepreneuriatLe Coaching Au Service De L’Entrepreneuriat
Le Coaching Au Service De L’Entrepreneuriatyamen
 
Le Coaching C'est Quoi
Le Coaching C'est QuoiLe Coaching C'est Quoi
Le Coaching C'est Quoiyamen
 
Comment s'imaginer CREATEUR D'ENTREPRISE
Comment s'imaginer CREATEUR D'ENTREPRISEComment s'imaginer CREATEUR D'ENTREPRISE
Comment s'imaginer CREATEUR D'ENTREPRISEyamen
 
L'ECONOMIE TUNISIENNE ET LA PROMOTION DE LA CREATION D'ENTREPRISES CONJONCTUR...
L'ECONOMIE TUNISIENNE ET LA PROMOTION DE LA CREATION D'ENTREPRISES CONJONCTUR...L'ECONOMIE TUNISIENNE ET LA PROMOTION DE LA CREATION D'ENTREPRISES CONJONCTUR...
L'ECONOMIE TUNISIENNE ET LA PROMOTION DE LA CREATION D'ENTREPRISES CONJONCTUR...yamen
 
Présentation du Centre Daffaires De Tunis
Présentation du Centre Daffaires De TunisPrésentation du Centre Daffaires De Tunis
Présentation du Centre Daffaires De Tunisyamen
 

More from yamen (13)

Creative Commons
Creative CommonsCreative Commons
Creative Commons
 
Wikies for Cities
Wikies for CitiesWikies for Cities
Wikies for Cities
 
OpenGov Sayada
OpenGov SayadaOpenGov Sayada
OpenGov Sayada
 
Application de l' OpenGov par les associations
Application de l' OpenGov par les associationsApplication de l' OpenGov par les associations
Application de l' OpenGov par les associations
 
Wikimedia Commons
Wikimedia CommonsWikimedia Commons
Wikimedia Commons
 
Opengov application par les associations
Opengov application par les associationsOpengov application par les associations
Opengov application par les associations
 
Wikipédia: Le Projet Tunisie
Wikipédia: Le Projet TunisieWikipédia: Le Projet Tunisie
Wikipédia: Le Projet Tunisie
 
Présentation de la BTS
Présentation de la BTSPrésentation de la BTS
Présentation de la BTS
 
Le Coaching Au Service De L’Entrepreneuriat
Le Coaching Au Service De L’EntrepreneuriatLe Coaching Au Service De L’Entrepreneuriat
Le Coaching Au Service De L’Entrepreneuriat
 
Le Coaching C'est Quoi
Le Coaching C'est QuoiLe Coaching C'est Quoi
Le Coaching C'est Quoi
 
Comment s'imaginer CREATEUR D'ENTREPRISE
Comment s'imaginer CREATEUR D'ENTREPRISEComment s'imaginer CREATEUR D'ENTREPRISE
Comment s'imaginer CREATEUR D'ENTREPRISE
 
L'ECONOMIE TUNISIENNE ET LA PROMOTION DE LA CREATION D'ENTREPRISES CONJONCTUR...
L'ECONOMIE TUNISIENNE ET LA PROMOTION DE LA CREATION D'ENTREPRISES CONJONCTUR...L'ECONOMIE TUNISIENNE ET LA PROMOTION DE LA CREATION D'ENTREPRISES CONJONCTUR...
L'ECONOMIE TUNISIENNE ET LA PROMOTION DE LA CREATION D'ENTREPRISES CONJONCTUR...
 
Présentation du Centre Daffaires De Tunis
Présentation du Centre Daffaires De TunisPrésentation du Centre Daffaires De Tunis
Présentation du Centre Daffaires De Tunis
 

Recently uploaded

A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...apidays
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 

Recently uploaded (20)

A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 

Online Safety

  • 1. Online Safety Five easy tips to secure your online existence.
  • 2. Protect Your Banking 1 Always keep your credentials to yourself. Ensure you login only by visiting your Bank’s website. Email is not a method used by Bank’s to request personal information from you. Avoid using publicly available computers for your online banking. Trust your instincts. If something looks wrong it probably is. Always run and keep your antivirus and anti-spyware software up to date.
  • 3. Be Socially Smart 2 Keep your statuses simple and never divulge your physical location. Monitor who can see your social networking information. Whether private or not. Choose strong passwords to prevent someone accessing your social networking account. Avoid divulging highly personal information such as your address – even in configuration or informational pages. If you click on a link, make sure the website address that opens is the same as the link you clicked on. Always remain anonymous when entering open or “free-for-all” chat rooms and similar gatherings. Your Bank will never use a Social Networking site to request financial or personal information from you. If you use instant messaging applications, sign-on to those applications. Avoid websites claiming to sign-on or automate it for you as they may simply be mining your login details.
  • 4. Passwords Are Your Keys. 3 Information about you should never be in your password. If your password can be looked-up in a dictionary it is too weak. Try to use combinations of LARge letters, Numb3rs and %characters% Don’t write passwords down. Change passwords as regularly as is comfortable but at least within 6 months. If in doubt, change your passwords. No website/bank/store will send you email asking you to reply with your password or username. Do not reply to such requests.
  • 5. Use Email Wisely. 4 Replying to spam or junk-mail simply makes it known you are reading it. Ignore and delete such on sight. Avoid sending confidential files, passwords, credit-card numbers or other confidential data in email. Be cautious when opening links from email messages. Make sure the link address is what actually opens in the browser. Ensure all emails are scanned for viruses and other possible malware, phishing or spyware threats. When you use reply-all, make sure everyone on the recipient list needs to know what you have to say. Financial institutions do not use email to update your account details, change your password or notify you of account closure. Email messages urging you take action with lots of warnings, time-limits and grammar or spelling mistakes should be treated as possible threats.
  • 6. Be Cautious When Travelling 5 Connections to public and/or public-service Wifi or other networks should be treated as non-secure. Ensure you have a firewall, and other protection software running. Shoulder Surfing is when someone watches you type your password or credentials on your laptop from behind, to the side or with zoom lenses. Always take care when entering this information in a public area. Any laptop that is used thoroughly off-site or is constantly mobile should have full disk encryption installed on it. A best-practice is to apply this rule to all laptops you own. Do not leave your laptop unattended. Apart from theft you may find key loggers or other spyware software very quickly installed. Keep removable storage, memory cards, memory sticks and other small data storage devices safe. If possible encrypt these too. Remember if you suspend instead of hibernate/turn-off your laptop you might not be activating required encryption or security protection on the laptop.
  • 7. Glossary Phishing ... is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, accounts numbers or passwords by posing as legitimate websites or entities requesting this information. Shoulder Surfing ... is the process of obtaining security credentials or other data as it is being entered by watching or recording the physical entry of the data either behind, next-to or in view of the victim. Spyware ... is hidden software that obtains data, or other information from a persons computer without notification or without the user’s consent. Malware ... is software that is designed to infiltrate and destroy or damage either data or other components of a computer system. Social Engineering ... is the process of getting someone to divulge personal or secret information through use of lies, misguided trust, apparent authority or other forms of deception.