SlideShare a Scribd company logo
1 of 32
DIGITAL SAFETY,
SECURITY AND HYGIENE
statista.com/statistics/617136/digital-population-worldwide/
https://www.upf.go.ug/wp-
content/uploads/2021/04/ANNUAL-CRIME-REPORT-
2020-1.pdf?x74136
google.com/myactivity
How many Devices logged are in with your Gmail account????
Digital safety or Cyber Hygiene?
Cyber hygiene are the practices and steps that
users of computers and Mobile devices take to
maintain system health and improve online
security.
• These practices are often part of a routine to
ensure the safety of identity and other details
that could be stolen or corrupted
SECTION
TITLE
Loss of data
Misplaced Data
Security breaches
Outdated Software
Older antivirus
COMMON DIGITAL/CYBER HYGIENE PROBLEMS
Malware
A malware is an intrusive software that is designed to damage and destroy
computers and computer systems. Malware is a contraction for “malicious
software.”
Examples of common malware includes viruses, worms, spyware, adware,
and ransomware
Viruses
• A computer virus, much like a flu virus, is designed to spread from host to
host and has the ability to replicate itself. ...
• In more technical terms, a computer virus is a type of malicious code or
program written to alter the way a computer operates and is designed to
spread from one computer to another
Hackers
• Computer hackers are unauthorized users who break into our computer
systems in order to steal, change or destroy information, often by installing
dangerous malware without your knowledge or consent.
• Their clever tactics and detailed technical knowledge help them access the
information you really don’t want them to have.
• Always use caution while surfing the web, and make sure your computer
programs are up to date to patch up any weak access points hackers may
try to get through.
Phishing
• Phishing is a type of social engineering attack often used to steal user data,
including login credentials and credit card numbers.
• Phishers are well versed in the art of fraud by sending fake emails that may
look reputable, but are crafted by somebody seeking your credit card info,
passwords, or social security number.
• Again, always be careful online, especially when receiving emails that
appear “phishy” or inauthentic.
Scams
• Congrats! You’ve just won an all-
expenses-paid trip to Canada! All you
have to do is send a Shs 500.000
deposit to reserve your room in a FIVE
STAR SUITE. Make sure to send your
deposit by FRIDAY or else your room
will be given to someone else.
• It’s your lucky day! Sounds amazing,
right? Well, you may know this is fake,
but unfortunately a lot of people,
including the elderly, fall for popular
scams similar to this all the time.
• Most email platforms have pre-installed anti-
spam protection so that spam emails will go
straight into the folder and never be seen. But
when it comes to phone calls, your knowledge
is your only protection
• When in doubt, don’t respond: Fraudulent text
messages, calls and voicemails are on the rise.
Just as with email, mobile requests for
personal data or immediate action are almost
always scams.
What do we need to do?
Create a common Digital Hygiene Policy
• Be vigilant >>think and assess before you click<<
• Always use strong passwords.
• Disable unwanted and idle services such as Bluetooth, WIFI as theses can offer an
easy way for a nearby unauthorized user to access your device.
• Connect with Care: Public wireless networks and hotspots are not secure, which
means that anyone could potentially see what you are doing on your laptop or
smartphone while you are connected to them. Limit what you do on public WiFi, and
avoid logging in to key accounts like email and financial services. Consider using a
virtual private network (VPN) or a personal/mobile hotspot if you need a more
secure connection
Keep track of where you are logged in
• Log out all accounts after use
• While you should always sign out of accounts when you are using public devices,
there is more to keeping track of where you are logged in. We sign up for new
accounts and subscriptions every day, and often, we forget about them.
• Keep track of where you sign up and, periodically, delete the accounts that you
don’t use. You don’t want your information in places that you don’t regularly
frequent. Stay safe by always knowing who has your information.
Using WhatsApp Web Securely
Protecting your identity- Incognito mode.
Personal information is like money – Value it. Protect it: Information about you, such as what you
search for online and where you shop and live, has value – just like money. Be thoughtful about who
gets that information and how it’s collected through apps and websites
Google 2 Step Authentication.
Software Updates:
Updating the software
you use, or perhaps
getting better versions
should be a part of
your regular hygienic
review
Hardware
Updates: Older
computers and
smartphones may
need to be updated to
maintain performance
and prevent issues.
Manage New
Installs: Every new
install should be done
properly and
documented to keep an
updated inventory of all
hardware and software
Limit Users: Only
those who need
admin-level access to
programs should
have access. Other
users should have
limited capabilities
• Back Up Data: All data
should be backed up to a
secondary source
Hard drive or cloud
storage(i.e. Onedrive,
google drive,
dropbox…)
Encryption and Decryption
Encrypting Software for Computers
• Mailvelope Gmail
• BitLocker
• VeraCrypt
• Crypto expert
• WinZip
• AX Crypt
Mac Devices/Apple
• Encrypto
• Mailvelope Gmail
• Hider 2
• Cisdem App Crypt
• GNU Privacy Guard
Encrypting Software for Mobile Gadgets
• Kyms (keep your media safe)
• Syncthing
• OpenKeychain
• FreeOTP Authenticator
• Silent Phone
• Cyph
• Cryptomator
• Confide
• Pryvate
Digital Security means developing a protective routine to keep your personal and financial
information secure when using your computer or mobile device. Using strong passwords and
changing them regularly, keeping software and operating systems up to date, wiping hard
drives, and using a comprehensive antivirus will help you stay ahead of the latest cyber threats.
Digital Security and Hygiene.pptx

More Related Content

Similar to Digital Security and Hygiene.pptx

Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber securityKaushal Solanki
 
Unveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity postureUnveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity postureLourdes Paloma Gimenez
 
BCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptxBCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptxKirti Verma
 
Data security best practices for risk awareness and mitigation
Data security best practices for risk awareness and mitigationData security best practices for risk awareness and mitigation
Data security best practices for risk awareness and mitigationNick Chandi
 
Executive Directors Chat:It's easy to stay safe online.pdf
Executive Directors Chat:It's easy to stay safe online.pdfExecutive Directors Chat:It's easy to stay safe online.pdf
Executive Directors Chat:It's easy to stay safe online.pdfTechSoup
 
It security,malware,phishing,information theft
It security,malware,phishing,information theftIt security,malware,phishing,information theft
It security,malware,phishing,information theftDeepak John
 
E business internet fraud
E business internet fraudE business internet fraud
E business internet fraudRadiant Minds
 
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your DataLaw Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your DataAccellis Technology Group
 
Cysec.pptx
Cysec.pptxCysec.pptx
Cysec.pptxjondon17
 
Users awarness programme for Online Privacy
Users awarness programme for Online PrivacyUsers awarness programme for Online Privacy
Users awarness programme for Online PrivacyKazi Sarwar Hossain
 
Cyber Security and Fraud Prevention Tools Tactics
Cyber Security and Fraud Prevention Tools TacticsCyber Security and Fraud Prevention Tools Tactics
Cyber Security and Fraud Prevention Tools TacticsBen Graybar
 
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdfitsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdfMansoorAhmed57263
 
IT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptOoXair
 
Cyber Security Seminar
Cyber Security SeminarCyber Security Seminar
Cyber Security SeminarJeremy Quadri
 
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptxCYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptxBarakaMuyengi
 

Similar to Digital Security and Hygiene.pptx (20)

Cyberattacks.pptx
Cyberattacks.pptxCyberattacks.pptx
Cyberattacks.pptx
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
Unveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity postureUnveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity posture
 
BCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptxBCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptx
 
Module 5: Safety
Module 5: SafetyModule 5: Safety
Module 5: Safety
 
Data security best practices for risk awareness and mitigation
Data security best practices for risk awareness and mitigationData security best practices for risk awareness and mitigation
Data security best practices for risk awareness and mitigation
 
Executive Directors Chat:It's easy to stay safe online.pdf
Executive Directors Chat:It's easy to stay safe online.pdfExecutive Directors Chat:It's easy to stay safe online.pdf
Executive Directors Chat:It's easy to stay safe online.pdf
 
It security,malware,phishing,information theft
It security,malware,phishing,information theftIt security,malware,phishing,information theft
It security,malware,phishing,information theft
 
E business internet fraud
E business internet fraudE business internet fraud
E business internet fraud
 
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your DataLaw Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
 
Cysec.pptx
Cysec.pptxCysec.pptx
Cysec.pptx
 
Users awarness programme for Online Privacy
Users awarness programme for Online PrivacyUsers awarness programme for Online Privacy
Users awarness programme for Online Privacy
 
Information security
Information securityInformation security
Information security
 
Cyber Security and Fraud Prevention Tools Tactics
Cyber Security and Fraud Prevention Tools TacticsCyber Security and Fraud Prevention Tools Tactics
Cyber Security and Fraud Prevention Tools Tactics
 
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdfitsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
 
IT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.ppt
 
3 steps security
3 steps security3 steps security
3 steps security
 
Cyber Security Seminar
Cyber Security SeminarCyber Security Seminar
Cyber Security Seminar
 
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptxCYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
 

More from Ultimate Multimedia Consult (13)

Data Visualization using Word Clouds
Data Visualization using Word CloudsData Visualization using Word Clouds
Data Visualization using Word Clouds
 
12 top tools for improving productivity.pptx
12 top tools for improving productivity.pptx12 top tools for improving productivity.pptx
12 top tools for improving productivity.pptx
 
Crowdsourcing Information & Crowdsourcing tools
Crowdsourcing Information & Crowdsourcing toolsCrowdsourcing Information & Crowdsourcing tools
Crowdsourcing Information & Crowdsourcing tools
 
Website design basics .pptx
Website design basics .pptxWebsite design basics .pptx
Website design basics .pptx
 
Collaborative communication tools .pptx
Collaborative communication tools .pptxCollaborative communication tools .pptx
Collaborative communication tools .pptx
 
Creating visually appealing presentations.pptx
Creating visually appealing presentations.pptxCreating visually appealing presentations.pptx
Creating visually appealing presentations.pptx
 
Digital Photography.
Digital Photography.Digital Photography.
Digital Photography.
 
BEST PRACTICES FOR LIVE STREAMING
BEST PRACTICES FOR LIVE STREAMINGBEST PRACTICES FOR LIVE STREAMING
BEST PRACTICES FOR LIVE STREAMING
 
Search Engine Optmization final ppt (SEO).pptx
Search Engine Optmization final ppt (SEO).pptxSearch Engine Optmization final ppt (SEO).pptx
Search Engine Optmization final ppt (SEO).pptx
 
Data Visualization.pptx
Data Visualization.pptxData Visualization.pptx
Data Visualization.pptx
 
Creating and Optimizing Ads on YouTube.pptx
Creating and Optimizing Ads on YouTube.pptxCreating and Optimizing Ads on YouTube.pptx
Creating and Optimizing Ads on YouTube.pptx
 
Educational Interactive Content
Educational Interactive Content Educational Interactive Content
Educational Interactive Content
 
BASIC MAPPING SKILLS by Allan.pptx
BASIC MAPPING SKILLS by Allan.pptxBASIC MAPPING SKILLS by Allan.pptx
BASIC MAPPING SKILLS by Allan.pptx
 

Recently uploaded

Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 

Recently uploaded (20)

Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 

Digital Security and Hygiene.pptx

  • 2.
  • 6. How many Devices logged are in with your Gmail account????
  • 7. Digital safety or Cyber Hygiene?
  • 8. Cyber hygiene are the practices and steps that users of computers and Mobile devices take to maintain system health and improve online security. • These practices are often part of a routine to ensure the safety of identity and other details that could be stolen or corrupted
  • 9. SECTION TITLE Loss of data Misplaced Data Security breaches Outdated Software Older antivirus COMMON DIGITAL/CYBER HYGIENE PROBLEMS
  • 10. Malware A malware is an intrusive software that is designed to damage and destroy computers and computer systems. Malware is a contraction for “malicious software.” Examples of common malware includes viruses, worms, spyware, adware, and ransomware
  • 11. Viruses • A computer virus, much like a flu virus, is designed to spread from host to host and has the ability to replicate itself. ... • In more technical terms, a computer virus is a type of malicious code or program written to alter the way a computer operates and is designed to spread from one computer to another
  • 12. Hackers • Computer hackers are unauthorized users who break into our computer systems in order to steal, change or destroy information, often by installing dangerous malware without your knowledge or consent. • Their clever tactics and detailed technical knowledge help them access the information you really don’t want them to have. • Always use caution while surfing the web, and make sure your computer programs are up to date to patch up any weak access points hackers may try to get through.
  • 13.
  • 14. Phishing • Phishing is a type of social engineering attack often used to steal user data, including login credentials and credit card numbers. • Phishers are well versed in the art of fraud by sending fake emails that may look reputable, but are crafted by somebody seeking your credit card info, passwords, or social security number. • Again, always be careful online, especially when receiving emails that appear “phishy” or inauthentic.
  • 15.
  • 16.
  • 17.
  • 18. Scams • Congrats! You’ve just won an all- expenses-paid trip to Canada! All you have to do is send a Shs 500.000 deposit to reserve your room in a FIVE STAR SUITE. Make sure to send your deposit by FRIDAY or else your room will be given to someone else. • It’s your lucky day! Sounds amazing, right? Well, you may know this is fake, but unfortunately a lot of people, including the elderly, fall for popular scams similar to this all the time. • Most email platforms have pre-installed anti- spam protection so that spam emails will go straight into the folder and never be seen. But when it comes to phone calls, your knowledge is your only protection • When in doubt, don’t respond: Fraudulent text messages, calls and voicemails are on the rise. Just as with email, mobile requests for personal data or immediate action are almost always scams.
  • 19. What do we need to do?
  • 20. Create a common Digital Hygiene Policy • Be vigilant >>think and assess before you click<< • Always use strong passwords. • Disable unwanted and idle services such as Bluetooth, WIFI as theses can offer an easy way for a nearby unauthorized user to access your device. • Connect with Care: Public wireless networks and hotspots are not secure, which means that anyone could potentially see what you are doing on your laptop or smartphone while you are connected to them. Limit what you do on public WiFi, and avoid logging in to key accounts like email and financial services. Consider using a virtual private network (VPN) or a personal/mobile hotspot if you need a more secure connection
  • 21.
  • 22. Keep track of where you are logged in • Log out all accounts after use • While you should always sign out of accounts when you are using public devices, there is more to keeping track of where you are logged in. We sign up for new accounts and subscriptions every day, and often, we forget about them. • Keep track of where you sign up and, periodically, delete the accounts that you don’t use. You don’t want your information in places that you don’t regularly frequent. Stay safe by always knowing who has your information.
  • 23. Using WhatsApp Web Securely
  • 24.
  • 25. Protecting your identity- Incognito mode. Personal information is like money – Value it. Protect it: Information about you, such as what you search for online and where you shop and live, has value – just like money. Be thoughtful about who gets that information and how it’s collected through apps and websites
  • 26. Google 2 Step Authentication.
  • 27. Software Updates: Updating the software you use, or perhaps getting better versions should be a part of your regular hygienic review Hardware Updates: Older computers and smartphones may need to be updated to maintain performance and prevent issues. Manage New Installs: Every new install should be done properly and documented to keep an updated inventory of all hardware and software Limit Users: Only those who need admin-level access to programs should have access. Other users should have limited capabilities • Back Up Data: All data should be backed up to a secondary source Hard drive or cloud storage(i.e. Onedrive, google drive, dropbox…)
  • 29. Encrypting Software for Computers • Mailvelope Gmail • BitLocker • VeraCrypt • Crypto expert • WinZip • AX Crypt Mac Devices/Apple • Encrypto • Mailvelope Gmail • Hider 2 • Cisdem App Crypt • GNU Privacy Guard
  • 30. Encrypting Software for Mobile Gadgets • Kyms (keep your media safe) • Syncthing • OpenKeychain • FreeOTP Authenticator • Silent Phone • Cyph • Cryptomator • Confide • Pryvate
  • 31. Digital Security means developing a protective routine to keep your personal and financial information secure when using your computer or mobile device. Using strong passwords and changing them regularly, keeping software and operating systems up to date, wiping hard drives, and using a comprehensive antivirus will help you stay ahead of the latest cyber threats.