Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
Staying Safe Online
<ul><li>Who are we ? </li></ul><ul><li>What do we do ? </li></ul><ul><li>Why are we here ? </li></ul>
Who are you in cyberspace? <ul><li>What is Digital Security?  </li></ul><ul><ul><li>Security of your digital identity   </...
First line of defence  <ul><li>Passwords  </li></ul><ul><li>Device security  </li></ul><ul><li>Browser security  </li></ul...
Secure Email & Chat <ul><li>Avoid automatic sign in/remember me on computers  </li></ul><ul><li>Browsing through HTTPS </l...
Secure use of Social Media <ul><li>Social media is your social space  </li></ul><ul><li>Think before you upload </li></ul>...
Secure use of mobile <ul><li>Setting up passwords </li></ul><ul><li>Transfering data regularly to a secure location </li><...
TakeBackTheTech <ul><li>What constitutes harassment? </li></ul><ul><ul><ul><li>Infringing on someone’s social space </li><...
TakeBackTheTech Toolkit <ul><li>Portable Apps </li></ul>
Policies  <ul><li>Legislations & Policies & why should you care </li></ul><ul><li>Lack of Cyber crime legislation, Data Pr...
Upcoming SlideShare
Loading in …5
×

Bolo bhi-nust-stay-safe-online-

1,200 views

Published on

Tips and tricks on how to stay safe online

Published in: Technology, Business
  • Login to see the comments

  • Be the first to like this

Bolo bhi-nust-stay-safe-online-

  1. 1. Staying Safe Online
  2. 2. <ul><li>Who are we ? </li></ul><ul><li>What do we do ? </li></ul><ul><li>Why are we here ? </li></ul>
  3. 3. Who are you in cyberspace? <ul><li>What is Digital Security? </li></ul><ul><ul><li>Security of your digital identity </li></ul></ul><ul><li>What is your digital identity? </li></ul>
  4. 4. First line of defence <ul><li>Passwords </li></ul><ul><li>Device security </li></ul><ul><li>Browser security </li></ul><ul><li>Connection security </li></ul><ul><li>Content security </li></ul>
  5. 5. Secure Email & Chat <ul><li>Avoid automatic sign in/remember me on computers </li></ul><ul><li>Browsing through HTTPS </li></ul><ul><li>Avoid saving chat history </li></ul><ul><li>Can webcam turn dangerous? </li></ul><ul><li>Backing up emails </li></ul>
  6. 6. Secure use of Social Media <ul><li>Social media is your social space </li></ul><ul><li>Think before you upload </li></ul><ul><li>Grandma Test </li></ul><ul><li>What goes up, stays up FOREVER </li></ul>
  7. 7. Secure use of mobile <ul><li>Setting up passwords </li></ul><ul><li>Transfering data regularly to a secure location </li></ul><ul><li>Deleting all personal information (files, pictures, videos, contacts) before selling off the cellphone </li></ul>
  8. 8. TakeBackTheTech <ul><li>What constitutes harassment? </li></ul><ul><ul><ul><li>Infringing on someone’s social space </li></ul></ul></ul><ul><ul><ul><li>Abusive behavior </li></ul></ul></ul><ul><ul><ul><li>Cyber Stalking </li></ul></ul></ul><ul><ul><ul><li>Cyber Bullying </li></ul></ul></ul><ul><ul><ul><li>Unsolicited Attention </li></ul></ul></ul><ul><li>What to do? </li></ul>
  9. 9. TakeBackTheTech Toolkit <ul><li>Portable Apps </li></ul>
  10. 10. Policies <ul><li>Legislations & Policies & why should you care </li></ul><ul><li>Lack of Cyber crime legislation, Data Protection legislation, Privacy Legislation </li></ul><ul><li>What does this mean for businesses & individuals </li></ul><ul><li>What can you do? How can you get involved? </li></ul>

×