SlideShare a Scribd company logo
1 of 26
Download to read offline
© 2015 Quick Heal Technologies Ltd.
WEBINAR
6 Security Tips
for Using
Public Wi-Fi.
© 2015 Quick Heal Technologies Ltd.
Did You Know?
Hackers create
Wi-Fi hotspots
with fake names
(e.g. “Free Wi-Fi”)
to lure people.
© 2015 Quick Heal Technologies Ltd.
Topics of
• How Quick Heal reduces the risks of unsecured Wi-Fi networks.
• 6 tips for using such networks securely.
• Dangers of using unsecured Wi-Fi networks.
DISCUSSION:
© 2015 Quick Heal Technologies Ltd.
Dangers of using unsecured
Wi-Fi networks
© 2015 Quick Heal Technologies Ltd.
#1.
Your Login ID and Passwords
can be stolen.
© 2015 Quick Heal Technologies Ltd.
#2.
Your online activities can be
captured by an attacker.
© 2015 Quick Heal Technologies Ltd.
#3.
The hacker can control your
computer, its network and
data.
© 2015 Quick Heal Technologies Ltd.
#4.
The hacker can get inside
your company’s network.
© 2015 Quick Heal Technologies Ltd.
#5.
Your online accounts can be
hijacked and used illegally.
© 2015 Quick Heal Technologies Ltd.
#6.
You can be redirected to
infected or phishing websites.
© 2015 Quick Heal Technologies Ltd.
Tips to Follow While Using
Unsecured, Public Wi-Fi
© 2015 Quick Heal Technologies Ltd.
Use Virtual
Private
Network (VPN).
TIP #1.
© 2015 Quick Heal Technologies Ltd.
Only use secure
websites.
TIP #2.
© 2015 Quick Heal Technologies Ltd.
Apply 2-Factor
Authentication.
TIP #3.
© 2015 Quick Heal Technologies Ltd.
Turn Auto Wi-Fi
Connect OFF.
TIP #4.
© 2015 Quick Heal Technologies Ltd.
Use a
multilayered
AV Software.
TIP #5.
© 2015 Quick Heal Technologies Ltd.
Always
Log Out.
TIP #6.
© 2015 Quick Heal Technologies Ltd.
How Quick Heal helps
reduce the risks of
unsecured
Wi-Fi networks.
© 2015 Quick Heal Technologies Ltd.
Quick Heal cuts the dangers of
unsecured Wi-Fi networks
with these features:
© 2015 Quick Heal Technologies Ltd.
Automatically blocks phishing and infected
websites that are designed to steal your
personal information or infect your system
with malware.
Web
Security
© 2015 Quick Heal Technologies Ltd.
Secures all your financial transactions on
the Internet which might include online
baking, shopping, paying bills, etc.
Safe
Banking
© 2015 Quick Heal Technologies Ltd.
Proactively blocks spam and phishing
emails that try to trick you into visiting
bogus or infected websites.
Email
Security
© 2015 Quick Heal Technologies Ltd.
Detects and blocks worms, Trojans,
spyware and all other types of viruses
and malware.
Core
Protection
© 2015 Quick Heal Technologies Ltd.
Runs your Internet browsers in a virtual
environment. This blocks malicious files
(that may get automatically downloaded)
from affecting your real PC.
Browser
Sandbox
© 2015 Quick Heal Technologies Ltd.
Write to us at:
CorporateCommunications@quickheal.co.in
Follow us on:
Facebook: www.facebook.com/quickhealav
Twitter: www.twitter.com/quickheal
Google Plus: bit.ly/QuickHealGooglePlus
YouTube: www.youtube.com/quickheal
SlideShare: http://www.slideshare.net/QuickHealPPTs
Visit us:
Website: www.quickheal.com
Official Blog: blogs.quickheal.com
Got any queries regarding this
webinar?
© 2015 Quick Heal Technologies Ltd.
THANK YOU

More Related Content

What's hot

Internet security powerpoint
Internet security powerpointInternet security powerpoint
Internet security powerpoint
Arifa Ali
 

What's hot (20)

Internet security powerpoint
Internet security powerpointInternet security powerpoint
Internet security powerpoint
 
CYBER SECURITY
CYBER SECURITY CYBER SECURITY
CYBER SECURITY
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber crime.pptx
Cyber crime.pptxCyber crime.pptx
Cyber crime.pptx
 
Different Types of Phishing Attacks
Different Types of Phishing AttacksDifferent Types of Phishing Attacks
Different Types of Phishing Attacks
 
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
 
Cyber Security Best Practices
Cyber Security Best PracticesCyber Security Best Practices
Cyber Security Best Practices
 
Cyber security
Cyber securityCyber security
Cyber security
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Introduction to Malware
Introduction to MalwareIntroduction to Malware
Introduction to Malware
 
Cybercrime & Security
Cybercrime & SecurityCybercrime & Security
Cybercrime & Security
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber Crime and Cyber Security
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber Security
 
Network security
Network securityNetwork security
Network security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For Mankind
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
 

Viewers also liked

API 101 - Understanding APIs.
API 101 - Understanding APIs.API 101 - Understanding APIs.
API 101 - Understanding APIs.
Kirsten Hunter
 
Database Design Slide 1
Database Design Slide 1Database Design Slide 1
Database Design Slide 1
ahfiki
 

Viewers also liked (20)

Audience for Career Counselling
Audience for Career CounsellingAudience for Career Counselling
Audience for Career Counselling
 
Facts about Facebook
Facts about FacebookFacts about Facebook
Facts about Facebook
 
India Philippines, a relationship of opportunities
India Philippines, a relationship of opportunitiesIndia Philippines, a relationship of opportunities
India Philippines, a relationship of opportunities
 
7 Common mistakes in Go and when to avoid them
7 Common mistakes in Go and when to avoid them7 Common mistakes in Go and when to avoid them
7 Common mistakes in Go and when to avoid them
 
Does your motivation need a kick start?
Does your motivation need a kick start?Does your motivation need a kick start?
Does your motivation need a kick start?
 
Api for dummies
Api for dummies  Api for dummies
Api for dummies
 
A World of Talent: What Perennial NBA Contenders Teach Us About Collaboration
A World of Talent: What Perennial NBA Contenders Teach Us About CollaborationA World of Talent: What Perennial NBA Contenders Teach Us About Collaboration
A World of Talent: What Perennial NBA Contenders Teach Us About Collaboration
 
Iphone vs android
Iphone vs androidIphone vs android
Iphone vs android
 
API 101 - Understanding APIs.
API 101 - Understanding APIs.API 101 - Understanding APIs.
API 101 - Understanding APIs.
 
GAFAnomics: Using APIs to gain unfair competitive advantage in the network ec...
GAFAnomics: Using APIs to gain unfair competitive advantage in the network ec...GAFAnomics: Using APIs to gain unfair competitive advantage in the network ec...
GAFAnomics: Using APIs to gain unfair competitive advantage in the network ec...
 
Distributed Database Management System
Distributed Database Management SystemDistributed Database Management System
Distributed Database Management System
 
What is the Internet of Things (IOT)
What is the Internet of Things (IOT)What is the Internet of Things (IOT)
What is the Internet of Things (IOT)
 
The 3 keys to language learning
The 3 keys to language learningThe 3 keys to language learning
The 3 keys to language learning
 
Android vs iOS
Android vs iOSAndroid vs iOS
Android vs iOS
 
Stretching: Is It Necessary?
Stretching: Is It Necessary?Stretching: Is It Necessary?
Stretching: Is It Necessary?
 
7 Simple Tips to Take Care of your New Android Phone
7 Simple Tips to Take Care of your New Android Phone7 Simple Tips to Take Care of your New Android Phone
7 Simple Tips to Take Care of your New Android Phone
 
Messaging is Eating the World (by Edith Yeung)
Messaging is Eating the World (by Edith Yeung)Messaging is Eating the World (by Edith Yeung)
Messaging is Eating the World (by Edith Yeung)
 
Database Design Slide 1
Database Design Slide 1Database Design Slide 1
Database Design Slide 1
 
7 Small Business Productivity Tips
7 Small Business Productivity Tips7 Small Business Productivity Tips
7 Small Business Productivity Tips
 
Introduction to database
Introduction to databaseIntroduction to database
Introduction to database
 

Similar to 6 Security Tips for Using Public WiFi

InfraGard Albany Member Alliance Monthly Security Tips
InfraGard Albany Member Alliance Monthly Security TipsInfraGard Albany Member Alliance Monthly Security Tips
InfraGard Albany Member Alliance Monthly Security Tips
Liberteks
 
Cyber-Leave-Behind-Brochure-Done (1)
Cyber-Leave-Behind-Brochure-Done (1)Cyber-Leave-Behind-Brochure-Done (1)
Cyber-Leave-Behind-Brochure-Done (1)
Sam Norallah
 
Webinar: CYREN WebSecurity for Enterprise
Webinar: CYREN WebSecurity for EnterpriseWebinar: CYREN WebSecurity for Enterprise
Webinar: CYREN WebSecurity for Enterprise
Cyren, Inc
 

Similar to 6 Security Tips for Using Public WiFi (20)

5 common myths that stop people from using an antivirus copypasteads.com
5 common myths that stop people from using an antivirus copypasteads.com5 common myths that stop people from using an antivirus copypasteads.com
5 common myths that stop people from using an antivirus copypasteads.com
 
5 Common Myths that Stop People from Using an Antivirus
5 Common Myths that Stop People from Using an Antivirus5 Common Myths that Stop People from Using an Antivirus
5 Common Myths that Stop People from Using an Antivirus
 
10 Cyber Safety Tips Every Internet User Must Follow
10 Cyber Safety Tips Every Internet User Must Follow10 Cyber Safety Tips Every Internet User Must Follow
10 Cyber Safety Tips Every Internet User Must Follow
 
Top 7 Mobile Banking Security Tips
Top 7 Mobile Banking Security TipsTop 7 Mobile Banking Security Tips
Top 7 Mobile Banking Security Tips
 
How much should you reveal on social media
How much should you reveal on social mediaHow much should you reveal on social media
How much should you reveal on social media
 
30 Killer Internet Security Tips
30 Killer Internet Security Tips30 Killer Internet Security Tips
30 Killer Internet Security Tips
 
InfraGard Albany Member Alliance Monthly Security Tips
InfraGard Albany Member Alliance Monthly Security TipsInfraGard Albany Member Alliance Monthly Security Tips
InfraGard Albany Member Alliance Monthly Security Tips
 
Public Wi-Fi security 101
Public Wi-Fi security 101Public Wi-Fi security 101
Public Wi-Fi security 101
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101
 
Cyber Security Seminar
Cyber Security SeminarCyber Security Seminar
Cyber Security Seminar
 
Why are Software Updates so Important for your Security
Why are Software Updates so Important for your SecurityWhy are Software Updates so Important for your Security
Why are Software Updates so Important for your Security
 
Cyber-Leave-Behind-Brochure-Done (1)
Cyber-Leave-Behind-Brochure-Done (1)Cyber-Leave-Behind-Brochure-Done (1)
Cyber-Leave-Behind-Brochure-Done (1)
 
Cybersecurity Fundamentals for Bar Associations
Cybersecurity Fundamentals for Bar AssociationsCybersecurity Fundamentals for Bar Associations
Cybersecurity Fundamentals for Bar Associations
 
Why you need to secure mobile apps - now
Why you need to secure mobile apps - nowWhy you need to secure mobile apps - now
Why you need to secure mobile apps - now
 
WhiteHound - Patch your code in the cloud
WhiteHound - Patch your code in the cloudWhiteHound - Patch your code in the cloud
WhiteHound - Patch your code in the cloud
 
Cyber security for small businesses
Cyber security for small businessesCyber security for small businesses
Cyber security for small businesses
 
Secure End User
Secure End UserSecure End User
Secure End User
 
Secure Messaging Done Right
Secure Messaging Done RightSecure Messaging Done Right
Secure Messaging Done Right
 
Webinar: CYREN WebSecurity for Enterprise
Webinar: CYREN WebSecurity for EnterpriseWebinar: CYREN WebSecurity for Enterprise
Webinar: CYREN WebSecurity for Enterprise
 
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...
 

More from Quick Heal Technologies Ltd.

More from Quick Heal Technologies Ltd. (20)

Digital Threat Landscape
Digital Threat LandscapeDigital Threat Landscape
Digital Threat Landscape
 
Cybersecurity in Banking Sector
Cybersecurity in Banking SectorCybersecurity in Banking Sector
Cybersecurity in Banking Sector
 
31 Internet Security Tips on CyberSecurity Month Ocotober
31 Internet Security Tips on CyberSecurity Month Ocotober31 Internet Security Tips on CyberSecurity Month Ocotober
31 Internet Security Tips on CyberSecurity Month Ocotober
 
How a Ransomware Infects your Computer [INFOGRAPHIC]
How a Ransomware Infects your Computer [INFOGRAPHIC]How a Ransomware Infects your Computer [INFOGRAPHIC]
How a Ransomware Infects your Computer [INFOGRAPHIC]
 
Next-Gen Security Solution: Gateway Protection
Next-Gen Security Solution: Gateway ProtectionNext-Gen Security Solution: Gateway Protection
Next-Gen Security Solution: Gateway Protection
 
Centralized Patch Management - Proven Security Approach for Ransomware Protec...
Centralized Patch Management - Proven Security Approach for Ransomware Protec...Centralized Patch Management - Proven Security Approach for Ransomware Protec...
Centralized Patch Management - Proven Security Approach for Ransomware Protec...
 
Protecting Your organization from WannaCry Ransomware
Protecting Your organization from WannaCry RansomwareProtecting Your organization from WannaCry Ransomware
Protecting Your organization from WannaCry Ransomware
 
Seqrite Data Loss Prevention- Complete Protection from Data Theft and Data Loss
Seqrite Data Loss Prevention- Complete Protection from Data Theft and Data LossSeqrite Data Loss Prevention- Complete Protection from Data Theft and Data Loss
Seqrite Data Loss Prevention- Complete Protection from Data Theft and Data Loss
 
Is Antivirus (AV) Dead or Just Missing in Action
Is Antivirus (AV) Dead or Just Missing in Action Is Antivirus (AV) Dead or Just Missing in Action
Is Antivirus (AV) Dead or Just Missing in Action
 
Safeguard your enterprise against ransomware
Safeguard your enterprise against ransomwareSafeguard your enterprise against ransomware
Safeguard your enterprise against ransomware
 
Data Security in Healthcare
Data Security in HealthcareData Security in Healthcare
Data Security in Healthcare
 
GITEX 2016, Dubai
GITEX 2016, Dubai GITEX 2016, Dubai
GITEX 2016, Dubai
 
Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24
Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24
Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24
 
Maharashtra Cooperative Summit 2016
Maharashtra Cooperative Summit 2016Maharashtra Cooperative Summit 2016
Maharashtra Cooperative Summit 2016
 
Seqrite Hyderabad Meet 2016
Seqrite Hyderabad Meet 2016 Seqrite Hyderabad Meet 2016
Seqrite Hyderabad Meet 2016
 
Seqrite CXO Meet, Ahmedabad, India
Seqrite CXO Meet, Ahmedabad, IndiaSeqrite CXO Meet, Ahmedabad, India
Seqrite CXO Meet, Ahmedabad, India
 
Fonetastic ppt
Fonetastic pptFonetastic ppt
Fonetastic ppt
 
Seqrite Launch Event in Athens, Greece.
Seqrite Launch Event in Athens, Greece.Seqrite Launch Event in Athens, Greece.
Seqrite Launch Event in Athens, Greece.
 
BFSI Leadership Summit, Mumbai
BFSI Leadership Summit, MumbaiBFSI Leadership Summit, Mumbai
BFSI Leadership Summit, Mumbai
 
Jnana Sangama Day 1 - National convention for higher education
Jnana Sangama Day 1 - National convention for higher educationJnana Sangama Day 1 - National convention for higher education
Jnana Sangama Day 1 - National convention for higher education
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Recently uploaded (20)

JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 

6 Security Tips for Using Public WiFi

  • 1. © 2015 Quick Heal Technologies Ltd. WEBINAR 6 Security Tips for Using Public Wi-Fi.
  • 2. © 2015 Quick Heal Technologies Ltd. Did You Know? Hackers create Wi-Fi hotspots with fake names (e.g. “Free Wi-Fi”) to lure people.
  • 3. © 2015 Quick Heal Technologies Ltd. Topics of • How Quick Heal reduces the risks of unsecured Wi-Fi networks. • 6 tips for using such networks securely. • Dangers of using unsecured Wi-Fi networks. DISCUSSION:
  • 4. © 2015 Quick Heal Technologies Ltd. Dangers of using unsecured Wi-Fi networks
  • 5. © 2015 Quick Heal Technologies Ltd. #1. Your Login ID and Passwords can be stolen.
  • 6. © 2015 Quick Heal Technologies Ltd. #2. Your online activities can be captured by an attacker.
  • 7. © 2015 Quick Heal Technologies Ltd. #3. The hacker can control your computer, its network and data.
  • 8. © 2015 Quick Heal Technologies Ltd. #4. The hacker can get inside your company’s network.
  • 9. © 2015 Quick Heal Technologies Ltd. #5. Your online accounts can be hijacked and used illegally.
  • 10. © 2015 Quick Heal Technologies Ltd. #6. You can be redirected to infected or phishing websites.
  • 11. © 2015 Quick Heal Technologies Ltd. Tips to Follow While Using Unsecured, Public Wi-Fi
  • 12. © 2015 Quick Heal Technologies Ltd. Use Virtual Private Network (VPN). TIP #1.
  • 13. © 2015 Quick Heal Technologies Ltd. Only use secure websites. TIP #2.
  • 14. © 2015 Quick Heal Technologies Ltd. Apply 2-Factor Authentication. TIP #3.
  • 15. © 2015 Quick Heal Technologies Ltd. Turn Auto Wi-Fi Connect OFF. TIP #4.
  • 16. © 2015 Quick Heal Technologies Ltd. Use a multilayered AV Software. TIP #5.
  • 17. © 2015 Quick Heal Technologies Ltd. Always Log Out. TIP #6.
  • 18. © 2015 Quick Heal Technologies Ltd. How Quick Heal helps reduce the risks of unsecured Wi-Fi networks.
  • 19. © 2015 Quick Heal Technologies Ltd. Quick Heal cuts the dangers of unsecured Wi-Fi networks with these features:
  • 20. © 2015 Quick Heal Technologies Ltd. Automatically blocks phishing and infected websites that are designed to steal your personal information or infect your system with malware. Web Security
  • 21. © 2015 Quick Heal Technologies Ltd. Secures all your financial transactions on the Internet which might include online baking, shopping, paying bills, etc. Safe Banking
  • 22. © 2015 Quick Heal Technologies Ltd. Proactively blocks spam and phishing emails that try to trick you into visiting bogus or infected websites. Email Security
  • 23. © 2015 Quick Heal Technologies Ltd. Detects and blocks worms, Trojans, spyware and all other types of viruses and malware. Core Protection
  • 24. © 2015 Quick Heal Technologies Ltd. Runs your Internet browsers in a virtual environment. This blocks malicious files (that may get automatically downloaded) from affecting your real PC. Browser Sandbox
  • 25. © 2015 Quick Heal Technologies Ltd. Write to us at: CorporateCommunications@quickheal.co.in Follow us on: Facebook: www.facebook.com/quickhealav Twitter: www.twitter.com/quickheal Google Plus: bit.ly/QuickHealGooglePlus YouTube: www.youtube.com/quickheal SlideShare: http://www.slideshare.net/QuickHealPPTs Visit us: Website: www.quickheal.com Official Blog: blogs.quickheal.com Got any queries regarding this webinar?
  • 26. © 2015 Quick Heal Technologies Ltd. THANK YOU