SlideShare a Scribd company logo
Presentation by
RoyalQ.Blog
1
2
i. Mono-Economy/Income.
ii. Recession.
iii. Low Productivity.
iv. Critical Infrastructural deficit.
v. Insecurity.
vi. Unemployment (job satisfaction).
3
4
5
1. Making money:
Working for money - Salary, Wages,
Business.
2. Managing money:
Savings and Properties.
3. Multiplying money:
Money working for you - Investing
Financially.
6
1. Salary
2. Wages
3. Alms
4. Donations
5. Social welfare
6. Inheritance
7. Investments (Stocks/commodities)
8. Sole proprietor
9. Agriculture [Farming] 7
1. ICT
2. Internet & Website
3. Mobile App
4. eCommerce [eBookHawker.com]
5. Blogging [Human vs AI]
6. Digital Marketing [via Social media]
8
7. Product Review
8. Tutorials
9. Multimedia content
development
10.Blockchain Technology
11.Cryptocurrency (Trading)
Available on: eBookHawker.com
9
Adequate security measures of your information and data must be put in place when doing any form of business
online. Let me share with you some of my strategies:
1. Install and update Antivirus software regularly. Consider the following: MalwareBytes, Avast Internet Security and
SpyHunter.
2. For privacy, consider these software: CCleaner, Avast Secureline VPN, NordVPN, SurfShark and ExpressVPN.
3. Install keyscramblers that protect your computer system against keylogger. Some of the best keystroke encryption
software to protect against Keyloggers include: Zemana AntiLogger, GuardedID Premium, KeyScrambler
Premium, and NextGen AntiKeylogger.
4. Alternatively, to guard against keyloggers, you should use the On-Screen Keyboard when entering confidential
details such passwords, credit card numbers and PIN. In Windows OS, just type OSK to launch the On-Screen
Keyboard.
5. Use a private, secret and encrypted email. Do not share this email address with the public. Use it on secure online
business platforms only (especially for investments). Some secure email providers include: ProtonMail,
CounterMail, Hushmail, Tutanota, Runbox, Mailfence and Posteo.
6. Always surf the Internet using secure browsers such as Brave, Firefox, Iridium, Waterfox, Google Chrome,
Microsoft Edge and Opera.
7. Use a private and secret mobile phone number - strictly for online business. Do not make it public. 10
11
12

More Related Content

Similar to Session 1 online business overview

cyber security presentation (1).pdf
cyber security presentation (1).pdfcyber security presentation (1).pdf
cyber security presentation (1).pdf
w4tgrgdyryfh
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
amiinaaa
 

Similar to Session 1 online business overview (20)

Authshield integration with mails
Authshield integration with mailsAuthshield integration with mails
Authshield integration with mails
 
10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.
 
cyber security presentation (1).pdf
cyber security presentation (1).pdfcyber security presentation (1).pdf
cyber security presentation (1).pdf
 
FHSU CITI CS Training.pptx
FHSU CITI CS Training.pptxFHSU CITI CS Training.pptx
FHSU CITI CS Training.pptx
 
19BCP072_Presentation_Final.pdf
19BCP072_Presentation_Final.pdf19BCP072_Presentation_Final.pdf
19BCP072_Presentation_Final.pdf
 
Internet security
Internet securityInternet security
Internet security
 
BitGo Presents Multi-Sig Bitcoin Security at Inside Bitcoins NYC
BitGo Presents Multi-Sig Bitcoin Security at Inside Bitcoins NYCBitGo Presents Multi-Sig Bitcoin Security at Inside Bitcoins NYC
BitGo Presents Multi-Sig Bitcoin Security at Inside Bitcoins NYC
 
Cyber security awareness presentation nepal
Cyber security awareness presentation nepalCyber security awareness presentation nepal
Cyber security awareness presentation nepal
 
The ever increasing threat of cyber crime
The ever increasing threat of cyber crimeThe ever increasing threat of cyber crime
The ever increasing threat of cyber crime
 
A survey of ethical hacking process and security
A survey of ethical hacking process and securityA survey of ethical hacking process and security
A survey of ethical hacking process and security
 
Hamza
HamzaHamza
Hamza
 
KPMG-converted.pptx
KPMG-converted.pptxKPMG-converted.pptx
KPMG-converted.pptx
 
INSECURE Magazine - 35
INSECURE Magazine - 35INSECURE Magazine - 35
INSECURE Magazine - 35
 
106 Threat defense and information security development trends
106 Threat defense and information security development trends106 Threat defense and information security development trends
106 Threat defense and information security development trends
 
ORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptx
ORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptxORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptx
ORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptx
 
ORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptx
ORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptxORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptx
ORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptx
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
 
Securing your digital identity with drupal
Securing your digital identity with drupalSecuring your digital identity with drupal
Securing your digital identity with drupal
 
Iron Bastion: How to Manage Your Clients' Data Responsibly
Iron Bastion: How to Manage Your Clients' Data ResponsiblyIron Bastion: How to Manage Your Clients' Data Responsibly
Iron Bastion: How to Manage Your Clients' Data Responsibly
 

Recently uploaded

zidauu _business communication.pptx /pdf
zidauu _business  communication.pptx /pdfzidauu _business  communication.pptx /pdf
zidauu _business communication.pptx /pdf
zukhrafshabbir
 
Constitution of Company Article of Association
Constitution of Company Article of AssociationConstitution of Company Article of Association
Constitution of Company Article of Association
seri bangash
 

Recently uploaded (20)

zidauu _business communication.pptx /pdf
zidauu _business  communication.pptx /pdfzidauu _business  communication.pptx /pdf
zidauu _business communication.pptx /pdf
 
Falcon Invoice Discounting Setup for Small Businesses
Falcon Invoice Discounting Setup for Small BusinessesFalcon Invoice Discounting Setup for Small Businesses
Falcon Invoice Discounting Setup for Small Businesses
 
Unveiling the Dynamic Gemini_ Personality Traits and Sign Dates.pptx
Unveiling the Dynamic Gemini_ Personality Traits and Sign Dates.pptxUnveiling the Dynamic Gemini_ Personality Traits and Sign Dates.pptx
Unveiling the Dynamic Gemini_ Personality Traits and Sign Dates.pptx
 
Cracking the Change Management Code Main New.pptx
Cracking the Change Management Code Main New.pptxCracking the Change Management Code Main New.pptx
Cracking the Change Management Code Main New.pptx
 
IPTV Subscription UK: Your Guide to Choosing the Best Service
IPTV Subscription UK: Your Guide to Choosing the Best ServiceIPTV Subscription UK: Your Guide to Choosing the Best Service
IPTV Subscription UK: Your Guide to Choosing the Best Service
 
Understanding UAE Labour Law: Key Points for Employers and Employees
Understanding UAE Labour Law: Key Points for Employers and EmployeesUnderstanding UAE Labour Law: Key Points for Employers and Employees
Understanding UAE Labour Law: Key Points for Employers and Employees
 
How Do Venture Capitalists Make Decisions?
How Do Venture Capitalists Make Decisions?How Do Venture Capitalists Make Decisions?
How Do Venture Capitalists Make Decisions?
 
PitchBook’s Guide to VC Funding for Startups
PitchBook’s Guide to VC Funding for StartupsPitchBook’s Guide to VC Funding for Startups
PitchBook’s Guide to VC Funding for Startups
 
Using Generative AI for Content Marketing
Using Generative AI for Content MarketingUsing Generative AI for Content Marketing
Using Generative AI for Content Marketing
 
Evolution and Growth of Supply chain.pdf
Evolution and Growth of Supply chain.pdfEvolution and Growth of Supply chain.pdf
Evolution and Growth of Supply chain.pdf
 
Constitution of Company Article of Association
Constitution of Company Article of AssociationConstitution of Company Article of Association
Constitution of Company Article of Association
 
India’s Recommended Women Surgeons to Watch in 2024.pdf
India’s Recommended Women Surgeons to Watch in 2024.pdfIndia’s Recommended Women Surgeons to Watch in 2024.pdf
India’s Recommended Women Surgeons to Watch in 2024.pdf
 
Hyundai capital 2024 1q Earnings release
Hyundai capital 2024 1q Earnings releaseHyundai capital 2024 1q Earnings release
Hyundai capital 2024 1q Earnings release
 
Special Purpose Vehicle (Purpose, Formation & examples)
Special Purpose Vehicle (Purpose, Formation & examples)Special Purpose Vehicle (Purpose, Formation & examples)
Special Purpose Vehicle (Purpose, Formation & examples)
 
Equinox Gold Corporate Deck May 24th 2024
Equinox Gold Corporate Deck May 24th 2024Equinox Gold Corporate Deck May 24th 2024
Equinox Gold Corporate Deck May 24th 2024
 
8 Questions B2B Commercial Teams Can Ask To Help Product Discovery
8 Questions B2B Commercial Teams Can Ask To Help Product Discovery8 Questions B2B Commercial Teams Can Ask To Help Product Discovery
8 Questions B2B Commercial Teams Can Ask To Help Product Discovery
 
Unleash Data Power with EnFuse Solutions' Comprehensive Data Management Servi...
Unleash Data Power with EnFuse Solutions' Comprehensive Data Management Servi...Unleash Data Power with EnFuse Solutions' Comprehensive Data Management Servi...
Unleash Data Power with EnFuse Solutions' Comprehensive Data Management Servi...
 
Salesforce in Life Sciences - Best Ways to Leverage The CRM for Clinical Trials
Salesforce in Life Sciences - Best Ways to Leverage The CRM for Clinical TrialsSalesforce in Life Sciences - Best Ways to Leverage The CRM for Clinical Trials
Salesforce in Life Sciences - Best Ways to Leverage The CRM for Clinical Trials
 
Revolutionizing Industries: The Power of Carbon Components
Revolutionizing Industries: The Power of Carbon ComponentsRevolutionizing Industries: The Power of Carbon Components
Revolutionizing Industries: The Power of Carbon Components
 
Unlock Your TikTok Potential: Free TikTok Likes with InstBlast
Unlock Your TikTok Potential: Free TikTok Likes with InstBlastUnlock Your TikTok Potential: Free TikTok Likes with InstBlast
Unlock Your TikTok Potential: Free TikTok Likes with InstBlast
 

Session 1 online business overview

  • 2. 2 i. Mono-Economy/Income. ii. Recession. iii. Low Productivity. iv. Critical Infrastructural deficit. v. Insecurity. vi. Unemployment (job satisfaction).
  • 3. 3
  • 4. 4
  • 5. 5
  • 6. 1. Making money: Working for money - Salary, Wages, Business. 2. Managing money: Savings and Properties. 3. Multiplying money: Money working for you - Investing Financially. 6
  • 7. 1. Salary 2. Wages 3. Alms 4. Donations 5. Social welfare 6. Inheritance 7. Investments (Stocks/commodities) 8. Sole proprietor 9. Agriculture [Farming] 7
  • 8. 1. ICT 2. Internet & Website 3. Mobile App 4. eCommerce [eBookHawker.com] 5. Blogging [Human vs AI] 6. Digital Marketing [via Social media] 8
  • 9. 7. Product Review 8. Tutorials 9. Multimedia content development 10.Blockchain Technology 11.Cryptocurrency (Trading) Available on: eBookHawker.com 9
  • 10. Adequate security measures of your information and data must be put in place when doing any form of business online. Let me share with you some of my strategies: 1. Install and update Antivirus software regularly. Consider the following: MalwareBytes, Avast Internet Security and SpyHunter. 2. For privacy, consider these software: CCleaner, Avast Secureline VPN, NordVPN, SurfShark and ExpressVPN. 3. Install keyscramblers that protect your computer system against keylogger. Some of the best keystroke encryption software to protect against Keyloggers include: Zemana AntiLogger, GuardedID Premium, KeyScrambler Premium, and NextGen AntiKeylogger. 4. Alternatively, to guard against keyloggers, you should use the On-Screen Keyboard when entering confidential details such passwords, credit card numbers and PIN. In Windows OS, just type OSK to launch the On-Screen Keyboard. 5. Use a private, secret and encrypted email. Do not share this email address with the public. Use it on secure online business platforms only (especially for investments). Some secure email providers include: ProtonMail, CounterMail, Hushmail, Tutanota, Runbox, Mailfence and Posteo. 6. Always surf the Internet using secure browsers such as Brave, Firefox, Iridium, Waterfox, Google Chrome, Microsoft Edge and Opera. 7. Use a private and secret mobile phone number - strictly for online business. Do not make it public. 10
  • 11. 11
  • 12. 12