SlideShare a Scribd company logo
1 of 11
Download to read offline
Cyber tips
T E E N A G E R S
For
PROTECT YOUR PERSONAL
INFORMATION
Full name
Address
Phone number
Date of birth
Don't share your personal information online, such as
your:
Only give this information to trusted sources.
CYBER TIPS
Use strong passwords
Create strong and unique passwords for all your online
accounts. Use a mix of upper and lowercase letters,
numbers, and symbols.
Don't use the same password for multiple accounts.
CYBER TIPS
Use privacy settings to keep your profiles private and only
accept friend requests from people you know in real life.
Be careful about what you post online as it can affect
your future.
Be cautious with social media
CYBER TIPS
Think before you click
Be wary of suspicious links or attachments in emails,
messages, or social media posts.
They could contain malware or viruses that could harm
your device or steal your personal information.
CYBER TIPS
Report cyberbullying
If you or someone you know is being cyberbullied,
report it to an adult, teacher, or trusted authority.
Don't respond or retaliate to the bully as it can
make the situation worse.
CYBER TIPS
Be careful with public Wi-Fi
Public Wi-Fi networks can be insecure and allow
hackers to intercept your data.
Avoid accessing sensitive information such as bank
accounts, credit card numbers, or personal data on
public Wi-Fi.
CYBER TIPS
Keep your software updated
Keep your computer, phone, and other devices
updated with the latest security updates and
antivirus software to protect against malware and
other online threats.
CYBER TIPS
Don't trust strangers online
Don't trust people you meet online, especially if they ask for
personal information or try to arrange a meeting.
Remember that people can hide their identity online.
CYBER TIPS
Talk to a trusted adult
If you're unsure about something online or if you encounter
something that makes you feel uncomfortable or unsafe, talk to a
trusted adult such as a parent, teacher, or guidance counselor.
They can help you stay safe and protect your online privacy.
CYBER TIPS
For more tips, visit
@Cybermaterial @Cybermaterial_

More Related Content

More from Cybermaterial

9 Email Security Tips
9 Email Security Tips9 Email Security Tips
9 Email Security Tips
Cybermaterial
 
CyberTips: Encryption
CyberTips: Encryption CyberTips: Encryption
CyberTips: Encryption
Cybermaterial
 
Cyber Tips for Executives.pdf
Cyber Tips for Executives.pdfCyber Tips for Executives.pdf
Cyber Tips for Executives.pdf
Cybermaterial
 
Basic cyberhygiene to prevent yourself from getting hacked
Basic cyberhygiene to prevent yourself from getting hackedBasic cyberhygiene to prevent yourself from getting hacked
Basic cyberhygiene to prevent yourself from getting hacked
Cybermaterial
 
Cyber Hygiene: How to protect your online privacy
Cyber Hygiene: How to protect your online privacyCyber Hygiene: How to protect your online privacy
Cyber Hygiene: How to protect your online privacy
Cybermaterial
 

More from Cybermaterial (16)

How to create aliases to protect your real email on Microsoft Outlook
How to create aliases to protect your real email on Microsoft OutlookHow to create aliases to protect your real email on Microsoft Outlook
How to create aliases to protect your real email on Microsoft Outlook
 
9 Email Security Tips
9 Email Security Tips9 Email Security Tips
9 Email Security Tips
 
How To Browse the Internet Safely with A VPN
How To Browse the Internet Safely with A VPNHow To Browse the Internet Safely with A VPN
How To Browse the Internet Safely with A VPN
 
How to set up full-disk encryption with BitLocker on Windows
How to set up full-disk encryption with BitLocker on WindowsHow to set up full-disk encryption with BitLocker on Windows
How to set up full-disk encryption with BitLocker on Windows
 
How to Buy Cyber Liability Insurance For You and Your Family
How to Buy Cyber Liability Insurance For You and Your FamilyHow to Buy Cyber Liability Insurance For You and Your Family
How to Buy Cyber Liability Insurance For You and Your Family
 
CyberTips: Encryption
CyberTips: Encryption CyberTips: Encryption
CyberTips: Encryption
 
Cyber Tips for Executives.pdf
Cyber Tips for Executives.pdfCyber Tips for Executives.pdf
Cyber Tips for Executives.pdf
 
10 steps to clean up your digital footprint
10 steps to clean up your digital footprint	10 steps to clean up your digital footprint
10 steps to clean up your digital footprint
 
How to protect your digital footprint
How to protect your digital footprintHow to protect your digital footprint
How to protect your digital footprint
 
How to file a complaint with the FTC
How to file a complaint with the FTCHow to file a complaint with the FTC
How to file a complaint with the FTC
 
Basic cyberhygiene to prevent yourself from getting hacked
Basic cyberhygiene to prevent yourself from getting hackedBasic cyberhygiene to prevent yourself from getting hacked
Basic cyberhygiene to prevent yourself from getting hacked
 
Cyber Tips: How to protect your biometric data?
Cyber Tips: How to protect your biometric data?Cyber Tips: How to protect your biometric data?
Cyber Tips: How to protect your biometric data?
 
CyberHygiene: How can non-profit organizations protect themselves from cyber ...
CyberHygiene: How can non-profit organizations protect themselves from cyber ...CyberHygiene: How can non-profit organizations protect themselves from cyber ...
CyberHygiene: How can non-profit organizations protect themselves from cyber ...
 
Cyber Hygiene: How to protect your online privacy
Cyber Hygiene: How to protect your online privacyCyber Hygiene: How to protect your online privacy
Cyber Hygiene: How to protect your online privacy
 
Cyber Hygiene: How to protect your health data?
Cyber Hygiene: How to protect your health data?Cyber Hygiene: How to protect your health data?
Cyber Hygiene: How to protect your health data?
 
Cyber Hygiene: Tips to protect your Smart Devices
Cyber Hygiene: Tips to protect your Smart DevicesCyber Hygiene: Tips to protect your Smart Devices
Cyber Hygiene: Tips to protect your Smart Devices
 

Recently uploaded

Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
FIDO Alliance
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc
 

Recently uploaded (20)

WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps Productivity
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxCyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
 
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
 
Syngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdfSyngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdf
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 

CyberTips For Teenagers

  • 1. Cyber tips T E E N A G E R S For
  • 2. PROTECT YOUR PERSONAL INFORMATION Full name Address Phone number Date of birth Don't share your personal information online, such as your: Only give this information to trusted sources. CYBER TIPS
  • 3. Use strong passwords Create strong and unique passwords for all your online accounts. Use a mix of upper and lowercase letters, numbers, and symbols. Don't use the same password for multiple accounts. CYBER TIPS
  • 4. Use privacy settings to keep your profiles private and only accept friend requests from people you know in real life. Be careful about what you post online as it can affect your future. Be cautious with social media CYBER TIPS
  • 5. Think before you click Be wary of suspicious links or attachments in emails, messages, or social media posts. They could contain malware or viruses that could harm your device or steal your personal information. CYBER TIPS
  • 6. Report cyberbullying If you or someone you know is being cyberbullied, report it to an adult, teacher, or trusted authority. Don't respond or retaliate to the bully as it can make the situation worse. CYBER TIPS
  • 7. Be careful with public Wi-Fi Public Wi-Fi networks can be insecure and allow hackers to intercept your data. Avoid accessing sensitive information such as bank accounts, credit card numbers, or personal data on public Wi-Fi. CYBER TIPS
  • 8. Keep your software updated Keep your computer, phone, and other devices updated with the latest security updates and antivirus software to protect against malware and other online threats. CYBER TIPS
  • 9. Don't trust strangers online Don't trust people you meet online, especially if they ask for personal information or try to arrange a meeting. Remember that people can hide their identity online. CYBER TIPS
  • 10. Talk to a trusted adult If you're unsure about something online or if you encounter something that makes you feel uncomfortable or unsafe, talk to a trusted adult such as a parent, teacher, or guidance counselor. They can help you stay safe and protect your online privacy. CYBER TIPS
  • 11. For more tips, visit @Cybermaterial @Cybermaterial_