SlideShare a Scribd company logo
© 2015 Quick Heal Technologies Ltd.
10CYBER SAFETY TIPS
WEBINAR
Every Internet User Must Follow
© 2015 Quick Heal Technologies Ltd.
Topics of Discussion:
1. Most common types threats on the
Internet.
2. 10 Internet security tips you must follow.
3. How Quick Heal keeps you safe against
all types of online dangers.
© 2015 Quick Heal Technologies Ltd.
Most common
types of threats on
the Internet.
#1.
© 2015 Quick Heal Technologies Ltd.
The common types of online
dangers that most people fall
prey to, include:
© 2015 Quick Heal Technologies Ltd.
Phishing Attacks
Phishing is defined as the fraudulent act of
acquiring private and sensitive information
such as usernames, passwords, credit/debit
card info, etc.
© 2015 Quick Heal Technologies Ltd.
Spyware
Spyware are malicious software that
secretly monitor user’s activities, and steal
sensitive information from the infected
computer.
© 2015 Quick Heal Technologies Ltd.
Keyloggers
A form of spyware, keyloggers capture and
record user keystrokes. The data captured is
then transmitted to a remote computer.
© 2015 Quick Heal Technologies Ltd.
Trojan Horse
A Trojan horse is a seemingly benign
program that when activated, causes harm
to a computer system.
© 2015 Quick Heal Technologies Ltd.
Drive-by Download
A drive-by download refers to a malicious
download to a computer or device that
occurs without the owner’s
consent/knowledge.
© 2015 Quick Heal Technologies Ltd.
10 simple Internet
security tips you
must follow.
#2.
© 2015 Quick Heal Technologies Ltd.
Use uppercase, lowercase,
special characters and
numbers in your passwords.
Tip 1
Be Smart with
Passwords.
© 2015 Quick Heal Technologies Ltd.
Use a Pin, Password, Pattern or
Face Lock.
Tip 2
Lock Your
Device.
© 2015 Quick Heal Technologies Ltd.
Use patched & up-to-date
browsers, software, and OS.
Tip 3
Apply Software
Updates.
© 2015 Quick Heal Technologies Ltd.
Avoid selecting ‘Keep me
Logged In’ or ‘Remember me’.
Tip 4
Always
Log Off.
© 2015 Quick Heal Technologies Ltd.
Download free software only
from verified publishers.
Tip 5
Beware of
Freeware.
© 2015 Quick Heal Technologies Ltd.
Your money and data are safe
with well-known online stores.
Tip 6
Shop from
Trusted Sites.
© 2015 Quick Heal Technologies Ltd.
Accept friend requests only
from people you know.
Tip 7
Know Your
Online Friends.
© 2015 Quick Heal Technologies Ltd.
Shop and bank only on sites
whose URL begins with ‘https’.
Tip 8
Use Secure
Websites.
© 2015 Quick Heal Technologies Ltd.
You’ll receive a passcode every
time you log in to your account.
Tip 9
Use 2-Step
Verification.
© 2015 Quick Heal Technologies Ltd.
It’ll protect your PC against
hackers and malware.
Tip 10
Use an
Antivirus.
© 2015 Quick Heal Technologies Ltd.
How Quick Heal keeps
you safe against all types
of online dangers.
#3.
© 2015 Quick Heal Technologies Ltd.
Quick Heal helps you keep your
PC and its data safe from all types of
Internet dangers, with its advanced
security features such as:
© 2015 Quick Heal Technologies Ltd.
Automatically blocks websites
that are designed to steal user
information by using social media
scams and phishing attacks.
Web Security
© 2015 Quick Heal Technologies Ltd.
Protects your PC from any malicious
file that may get downloaded from
the Internet without your knowledge.
Browser Sandbox
© 2015 Quick Heal Technologies Ltd.
Blocks emails designed for phishing
attacks, or dropping a malware on
the user’s machine.
Email Security
© 2015 Quick Heal Technologies Ltd.
Stops all types of malware and
viruses such as Adware, Spyware,
Trojan Horse, Worms, etc., from
infecting your machine.
Core Protection
© 2015 Quick Heal Technologies Ltd.
Detects and stops new and
unknown threats that can cause
heavy damage to your computer
and its data.
Advanced DNAScan
© 2015 Quick Heal Technologies Ltd.
Safe Banking
Creates a safe virtual environment to let you
bank, shop, and pay bills online securely.
Protects your sensitive data from being stolen by
spyware, keyloggers, and other malicious
programs.
© 2015 Quick Heal Technologies Ltd.
REMEMBER…
Cyber Safety begins with you.
© 2015 Quick Heal Technologies Ltd.
THANK YOU.
© 2015 Quick Heal Technologies Ltd.
Got any queries regarding this
webinar?
Write to us at:
CorporateCommunications@quickheal.co.in
Follow us on:
Facebook: www.facebook.com/quickhealav
Twitter: www.twitter.com/quickheal
Google Plus: bit.ly/QuickHealGooglePlus
YouTube: www.youtube.com/quickheal
SlideShare: http://www.slideshare.net/QuickHealPPTs
Visit us:
Website: www.quickheal.com
Official Blog: blogs.quickheal.com

More Related Content

What's hot

10 Tips to Keep Criminals Out
10 Tips to Keep Criminals Out10 Tips to Keep Criminals Out
10 Tips to Keep Criminals OutNeil Kemp
 
"10 Tips To Keep Cybercriminals Out While Coronavirus Keeps You In" Infographic
"10 Tips To Keep Cybercriminals Out While Coronavirus Keeps You In" Infographic"10 Tips To Keep Cybercriminals Out While Coronavirus Keeps You In" Infographic
"10 Tips To Keep Cybercriminals Out While Coronavirus Keeps You In" InfographicDavid McHale
 
Five mobile security challenges facing the enterprise
Five mobile security challenges facing the enterpriseFive mobile security challenges facing the enterprise
Five mobile security challenges facing the enterpriseNowSecure
 
mcafee-10-steps-infographic-d2
mcafee-10-steps-infographic-d2mcafee-10-steps-infographic-d2
mcafee-10-steps-infographic-d2Monica Hamilton
 
Fitsec-remote work and cyber security
Fitsec-remote work and cyber securityFitsec-remote work and cyber security
Fitsec-remote work and cyber securityAnnaVihersalo
 
Internet Security at Work Presentation
Internet Security at Work PresentationInternet Security at Work Presentation
Internet Security at Work Presentationredbackacademy
 
A day in the life of a pentester
A day in the life of a pentesterA day in the life of a pentester
A day in the life of a pentesterCláudio André
 
Cyber-Leave-Behind-Brochure-Done (1)
Cyber-Leave-Behind-Brochure-Done (1)Cyber-Leave-Behind-Brochure-Done (1)
Cyber-Leave-Behind-Brochure-Done (1)Sam Norallah
 
Microsoft Final Internet Safety Poster
Microsoft Final Internet Safety PosterMicrosoft Final Internet Safety Poster
Microsoft Final Internet Safety PosterJack
 
What is CryptoLocker and How Can I Protect My Business From It?
What is CryptoLocker and How Can I Protect My Business From It?What is CryptoLocker and How Can I Protect My Business From It?
What is CryptoLocker and How Can I Protect My Business From It?SwiftTech Solutions, Inc.
 
Network basic security
Network basic  securityNetwork basic  security
Network basic securityMohamed Radji
 
Secure Your Mobile Apps
Secure Your Mobile AppsSecure Your Mobile Apps
Secure Your Mobile Appsprimomh
 
Adult Internet Safety
Adult Internet SafetyAdult Internet Safety
Adult Internet Safetyreidcollins42
 
Shifting left: Continuous testing for better app quality and security
Shifting left: Continuous testing for better app quality and securityShifting left: Continuous testing for better app quality and security
Shifting left: Continuous testing for better app quality and securityNowSecure
 
Cyber Security
Cyber SecurityCyber Security
Cyber Securityviimsikool
 

What's hot (20)

10 Tips to Keep Criminals Out
10 Tips to Keep Criminals Out10 Tips to Keep Criminals Out
10 Tips to Keep Criminals Out
 
"10 Tips To Keep Cybercriminals Out While Coronavirus Keeps You In" Infographic
"10 Tips To Keep Cybercriminals Out While Coronavirus Keeps You In" Infographic"10 Tips To Keep Cybercriminals Out While Coronavirus Keeps You In" Infographic
"10 Tips To Keep Cybercriminals Out While Coronavirus Keeps You In" Infographic
 
Five mobile security challenges facing the enterprise
Five mobile security challenges facing the enterpriseFive mobile security challenges facing the enterprise
Five mobile security challenges facing the enterprise
 
The Benefits of a Network Security Plan
The Benefits of a Network Security PlanThe Benefits of a Network Security Plan
The Benefits of a Network Security Plan
 
mcafee-10-steps-infographic-d2
mcafee-10-steps-infographic-d2mcafee-10-steps-infographic-d2
mcafee-10-steps-infographic-d2
 
Fitsec-remote work and cyber security
Fitsec-remote work and cyber securityFitsec-remote work and cyber security
Fitsec-remote work and cyber security
 
Internet Security at Work Presentation
Internet Security at Work PresentationInternet Security at Work Presentation
Internet Security at Work Presentation
 
A day in the life of a pentester
A day in the life of a pentesterA day in the life of a pentester
A day in the life of a pentester
 
Cyber-Leave-Behind-Brochure-Done (1)
Cyber-Leave-Behind-Brochure-Done (1)Cyber-Leave-Behind-Brochure-Done (1)
Cyber-Leave-Behind-Brochure-Done (1)
 
Computer Investigation on Employees
Computer Investigation on EmployeesComputer Investigation on Employees
Computer Investigation on Employees
 
Microsoft Final Internet Safety Poster
Microsoft Final Internet Safety PosterMicrosoft Final Internet Safety Poster
Microsoft Final Internet Safety Poster
 
Cyber security and crime
Cyber security and crimeCyber security and crime
Cyber security and crime
 
What is CryptoLocker and How Can I Protect My Business From It?
What is CryptoLocker and How Can I Protect My Business From It?What is CryptoLocker and How Can I Protect My Business From It?
What is CryptoLocker and How Can I Protect My Business From It?
 
Network basic security
Network basic  securityNetwork basic  security
Network basic security
 
Secure Your Mobile Apps
Secure Your Mobile AppsSecure Your Mobile Apps
Secure Your Mobile Apps
 
Case - How to protect your website
Case - How to protect your websiteCase - How to protect your website
Case - How to protect your website
 
Adult Internet Safety
Adult Internet SafetyAdult Internet Safety
Adult Internet Safety
 
Shifting left: Continuous testing for better app quality and security
Shifting left: Continuous testing for better app quality and securityShifting left: Continuous testing for better app quality and security
Shifting left: Continuous testing for better app quality and security
 
Hacker Tricks: How You Can Protect Yourself
Hacker Tricks: How You Can Protect YourselfHacker Tricks: How You Can Protect Yourself
Hacker Tricks: How You Can Protect Yourself
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 

Viewers also liked

Brain training unit 1 HU public
Brain training unit 1   HU publicBrain training unit 1   HU public
Brain training unit 1 HU publictbaker17
 
Brain gym starters
Brain gym startersBrain gym starters
Brain gym startersKathryn Hall
 
The brain __exercise_connection_-_power_point_presentation final
The brain __exercise_connection_-_power_point_presentation finalThe brain __exercise_connection_-_power_point_presentation final
The brain __exercise_connection_-_power_point_presentation finalCMoondog
 
Bancroft Exercise Effects on the Brain
Bancroft Exercise Effects on the BrainBancroft Exercise Effects on the Brain
Bancroft Exercise Effects on the BrainBancroft
 
Superbrain yoga
Superbrain yogaSuperbrain yoga
Superbrain yogaNila Shah
 
Right or Left!!!
Right or Left!!!Right or Left!!!
Right or Left!!!Happy Garg
 
Self-healing Materials
Self-healing MaterialsSelf-healing Materials
Self-healing MaterialsReset_co
 
A Simple Brain Exercise
A Simple Brain ExerciseA Simple Brain Exercise
A Simple Brain ExerciseJRNelson9
 
Self healing Materials
Self healing MaterialsSelf healing Materials
Self healing MaterialsSahil Gupta
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityDipesh Waghela
 

Viewers also liked (20)

Foundation Win
Foundation WinFoundation Win
Foundation Win
 
Brain training unit 1 HU public
Brain training unit 1   HU publicBrain training unit 1   HU public
Brain training unit 1 HU public
 
Brain gym starters
Brain gym startersBrain gym starters
Brain gym starters
 
The brain __exercise_connection_-_power_point_presentation final
The brain __exercise_connection_-_power_point_presentation finalThe brain __exercise_connection_-_power_point_presentation final
The brain __exercise_connection_-_power_point_presentation final
 
Miracle grow your brain
Miracle grow your brainMiracle grow your brain
Miracle grow your brain
 
Bancroft Exercise Effects on the Brain
Bancroft Exercise Effects on the BrainBancroft Exercise Effects on the Brain
Bancroft Exercise Effects on the Brain
 
Superbrain yoga
Superbrain yogaSuperbrain yoga
Superbrain yoga
 
Hypno Study
Hypno StudyHypno Study
Hypno Study
 
Are You a Left or a Right Brain
Are You a Left or a Right BrainAre You a Left or a Right Brain
Are You a Left or a Right Brain
 
Left and Right Brain Dominance
Left and Right Brain DominanceLeft and Right Brain Dominance
Left and Right Brain Dominance
 
Right or Left!!!
Right or Left!!!Right or Left!!!
Right or Left!!!
 
Brain gym
Brain gymBrain gym
Brain gym
 
Self-healing Materials
Self-healing MaterialsSelf-healing Materials
Self-healing Materials
 
Right Brain Presentation
Right Brain PresentationRight Brain Presentation
Right Brain Presentation
 
Presentation Neuro marketing
Presentation Neuro marketingPresentation Neuro marketing
Presentation Neuro marketing
 
A Simple Brain Exercise
A Simple Brain ExerciseA Simple Brain Exercise
A Simple Brain Exercise
 
Self healing Materials
Self healing MaterialsSelf healing Materials
Self healing Materials
 
Indian psychology
Indian psychologyIndian psychology
Indian psychology
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 

Similar to 10 Cyber Safety Tips Every Internet User Must Follow

5 common myths that stop people from using an antivirus copypasteads.com
5 common myths that stop people from using an antivirus copypasteads.com5 common myths that stop people from using an antivirus copypasteads.com
5 common myths that stop people from using an antivirus copypasteads.comjackpot201
 
Completing your Next Generation Threat Prevention - Check Point
Completing your Next Generation Threat Prevention - Check PointCompleting your Next Generation Threat Prevention - Check Point
Completing your Next Generation Threat Prevention - Check Pointaliciasyc
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101mateenzero
 
Internet secutity ppt by vaishnavi khandelwal
Internet secutity ppt by vaishnavi khandelwalInternet secutity ppt by vaishnavi khandelwal
Internet secutity ppt by vaishnavi khandelwalVaishnaviKhandelwal6
 
It security,malware,phishing,information theft
It security,malware,phishing,information theftIt security,malware,phishing,information theft
It security,malware,phishing,information theftDeepak John
 
Check your network security
Check your network securityCheck your network security
Check your network securityYour Virtual CTO
 
cyber security presentation (1).pdf
cyber security presentation (1).pdfcyber security presentation (1).pdf
cyber security presentation (1).pdfw4tgrgdyryfh
 
Executive Directors Chat:It's easy to stay safe online.pdf
Executive Directors Chat:It's easy to stay safe online.pdfExecutive Directors Chat:It's easy to stay safe online.pdf
Executive Directors Chat:It's easy to stay safe online.pdfTechSoup
 
Cyber security for small businesses
Cyber security for small businessesCyber security for small businesses
Cyber security for small businessesB2BPlanner Ltd.
 
Stop Account Takeover Attacks, Right in their Tracks
Stop Account Takeover Attacks, Right in their TracksStop Account Takeover Attacks, Right in their Tracks
Stop Account Takeover Attacks, Right in their TracksImperva
 
Cyber Security School Workshop
Cyber Security School WorkshopCyber Security School Workshop
Cyber Security School WorkshopRahul Nayan
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02amiinaaa
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hackinghcls
 

Similar to 10 Cyber Safety Tips Every Internet User Must Follow (20)

5 common myths that stop people from using an antivirus copypasteads.com
5 common myths that stop people from using an antivirus copypasteads.com5 common myths that stop people from using an antivirus copypasteads.com
5 common myths that stop people from using an antivirus copypasteads.com
 
Top 7 Mobile Banking Security Tips
Top 7 Mobile Banking Security TipsTop 7 Mobile Banking Security Tips
Top 7 Mobile Banking Security Tips
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Completing your Next Generation Threat Prevention - Check Point
Completing your Next Generation Threat Prevention - Check PointCompleting your Next Generation Threat Prevention - Check Point
Completing your Next Generation Threat Prevention - Check Point
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101
 
Secure End User
Secure End UserSecure End User
Secure End User
 
Internet secutity ppt by vaishnavi khandelwal
Internet secutity ppt by vaishnavi khandelwalInternet secutity ppt by vaishnavi khandelwal
Internet secutity ppt by vaishnavi khandelwal
 
It security,malware,phishing,information theft
It security,malware,phishing,information theftIt security,malware,phishing,information theft
It security,malware,phishing,information theft
 
Check your network security
Check your network securityCheck your network security
Check your network security
 
cyber security presentation (1).pdf
cyber security presentation (1).pdfcyber security presentation (1).pdf
cyber security presentation (1).pdf
 
Internet security
Internet securityInternet security
Internet security
 
Executive Directors Chat:It's easy to stay safe online.pdf
Executive Directors Chat:It's easy to stay safe online.pdfExecutive Directors Chat:It's easy to stay safe online.pdf
Executive Directors Chat:It's easy to stay safe online.pdf
 
Cyber security for small businesses
Cyber security for small businessesCyber security for small businesses
Cyber security for small businesses
 
Stop Account Takeover Attacks, Right in their Tracks
Stop Account Takeover Attacks, Right in their TracksStop Account Takeover Attacks, Right in their Tracks
Stop Account Takeover Attacks, Right in their Tracks
 
Cyber Security School Workshop
Cyber Security School WorkshopCyber Security School Workshop
Cyber Security School Workshop
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Cybersecurity Training
Cybersecurity TrainingCybersecurity Training
Cybersecurity Training
 
spyware
spywarespyware
spyware
 

More from Quick Heal Technologies Ltd.

31 Internet Security Tips on CyberSecurity Month Ocotober
31 Internet Security Tips on CyberSecurity Month Ocotober31 Internet Security Tips on CyberSecurity Month Ocotober
31 Internet Security Tips on CyberSecurity Month OcotoberQuick Heal Technologies Ltd.
 
How a Ransomware Infects your Computer [INFOGRAPHIC]
How a Ransomware Infects your Computer [INFOGRAPHIC]How a Ransomware Infects your Computer [INFOGRAPHIC]
How a Ransomware Infects your Computer [INFOGRAPHIC]Quick Heal Technologies Ltd.
 
Centralized Patch Management - Proven Security Approach for Ransomware Protec...
Centralized Patch Management - Proven Security Approach for Ransomware Protec...Centralized Patch Management - Proven Security Approach for Ransomware Protec...
Centralized Patch Management - Proven Security Approach for Ransomware Protec...Quick Heal Technologies Ltd.
 
Protecting Your organization from WannaCry Ransomware
Protecting Your organization from WannaCry RansomwareProtecting Your organization from WannaCry Ransomware
Protecting Your organization from WannaCry RansomwareQuick Heal Technologies Ltd.
 
Seqrite Data Loss Prevention- Complete Protection from Data Theft and Data Loss
Seqrite Data Loss Prevention- Complete Protection from Data Theft and Data LossSeqrite Data Loss Prevention- Complete Protection from Data Theft and Data Loss
Seqrite Data Loss Prevention- Complete Protection from Data Theft and Data LossQuick Heal Technologies Ltd.
 
Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24
Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24
Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24Quick Heal Technologies Ltd.
 
Jnana Sangama Day 1 - National convention for higher education
Jnana Sangama Day 1 - National convention for higher educationJnana Sangama Day 1 - National convention for higher education
Jnana Sangama Day 1 - National convention for higher educationQuick Heal Technologies Ltd.
 

More from Quick Heal Technologies Ltd. (20)

Digital Threat Landscape
Digital Threat LandscapeDigital Threat Landscape
Digital Threat Landscape
 
Cybersecurity in Banking Sector
Cybersecurity in Banking SectorCybersecurity in Banking Sector
Cybersecurity in Banking Sector
 
31 Internet Security Tips on CyberSecurity Month Ocotober
31 Internet Security Tips on CyberSecurity Month Ocotober31 Internet Security Tips on CyberSecurity Month Ocotober
31 Internet Security Tips on CyberSecurity Month Ocotober
 
How a Ransomware Infects your Computer [INFOGRAPHIC]
How a Ransomware Infects your Computer [INFOGRAPHIC]How a Ransomware Infects your Computer [INFOGRAPHIC]
How a Ransomware Infects your Computer [INFOGRAPHIC]
 
Next-Gen Security Solution: Gateway Protection
Next-Gen Security Solution: Gateway ProtectionNext-Gen Security Solution: Gateway Protection
Next-Gen Security Solution: Gateway Protection
 
Centralized Patch Management - Proven Security Approach for Ransomware Protec...
Centralized Patch Management - Proven Security Approach for Ransomware Protec...Centralized Patch Management - Proven Security Approach for Ransomware Protec...
Centralized Patch Management - Proven Security Approach for Ransomware Protec...
 
Protecting Your organization from WannaCry Ransomware
Protecting Your organization from WannaCry RansomwareProtecting Your organization from WannaCry Ransomware
Protecting Your organization from WannaCry Ransomware
 
Seqrite Data Loss Prevention- Complete Protection from Data Theft and Data Loss
Seqrite Data Loss Prevention- Complete Protection from Data Theft and Data LossSeqrite Data Loss Prevention- Complete Protection from Data Theft and Data Loss
Seqrite Data Loss Prevention- Complete Protection from Data Theft and Data Loss
 
Is Antivirus (AV) Dead or Just Missing in Action
Is Antivirus (AV) Dead or Just Missing in Action Is Antivirus (AV) Dead or Just Missing in Action
Is Antivirus (AV) Dead or Just Missing in Action
 
Safeguard your enterprise against ransomware
Safeguard your enterprise against ransomwareSafeguard your enterprise against ransomware
Safeguard your enterprise against ransomware
 
Data Security in Healthcare
Data Security in HealthcareData Security in Healthcare
Data Security in Healthcare
 
GITEX 2016, Dubai
GITEX 2016, Dubai GITEX 2016, Dubai
GITEX 2016, Dubai
 
Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24
Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24
Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24
 
Maharashtra Cooperative Summit 2016
Maharashtra Cooperative Summit 2016Maharashtra Cooperative Summit 2016
Maharashtra Cooperative Summit 2016
 
Seqrite Hyderabad Meet 2016
Seqrite Hyderabad Meet 2016 Seqrite Hyderabad Meet 2016
Seqrite Hyderabad Meet 2016
 
Seqrite CXO Meet, Ahmedabad, India
Seqrite CXO Meet, Ahmedabad, IndiaSeqrite CXO Meet, Ahmedabad, India
Seqrite CXO Meet, Ahmedabad, India
 
Fonetastic ppt
Fonetastic pptFonetastic ppt
Fonetastic ppt
 
Seqrite Launch Event in Athens, Greece.
Seqrite Launch Event in Athens, Greece.Seqrite Launch Event in Athens, Greece.
Seqrite Launch Event in Athens, Greece.
 
BFSI Leadership Summit, Mumbai
BFSI Leadership Summit, MumbaiBFSI Leadership Summit, Mumbai
BFSI Leadership Summit, Mumbai
 
Jnana Sangama Day 1 - National convention for higher education
Jnana Sangama Day 1 - National convention for higher educationJnana Sangama Day 1 - National convention for higher education
Jnana Sangama Day 1 - National convention for higher education
 

Recently uploaded

Agnieszka Andrzejewska - BIM School Course in Kraków
Agnieszka Andrzejewska - BIM School Course in KrakówAgnieszka Andrzejewska - BIM School Course in Kraków
Agnieszka Andrzejewska - BIM School Course in Krakówbim.edu.pl
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2
 
Accelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with PlatformlessAccelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with PlatformlessWSO2
 
SOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBrokerSOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBrokerSOCRadar
 
iGaming Platform & Lottery Solutions by Skilrock
iGaming Platform & Lottery Solutions by SkilrockiGaming Platform & Lottery Solutions by Skilrock
iGaming Platform & Lottery Solutions by SkilrockSkilrock Technologies
 
Using IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New ZealandUsing IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New ZealandIES VE
 
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERRORTROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERRORTier1 app
 
Tree in the Forest - Managing Details in BDD Scenarios (live2test 2024)
Tree in the Forest - Managing Details in BDD Scenarios (live2test 2024)Tree in the Forest - Managing Details in BDD Scenarios (live2test 2024)
Tree in the Forest - Managing Details in BDD Scenarios (live2test 2024)Gáspár Nagy
 
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?XfilesPro
 
Crafting the Perfect Measurement Sheet with PLM Integration
Crafting the Perfect Measurement Sheet with PLM IntegrationCrafting the Perfect Measurement Sheet with PLM Integration
Crafting the Perfect Measurement Sheet with PLM IntegrationWave PLM
 
top nidhi software solution freedownload
top nidhi software solution freedownloadtop nidhi software solution freedownload
top nidhi software solution freedownloadvrstrong314
 
A Guideline to Gorgias to to Re:amaze Data Migration
A Guideline to Gorgias to to Re:amaze Data MigrationA Guideline to Gorgias to to Re:amaze Data Migration
A Guideline to Gorgias to to Re:amaze Data MigrationHelp Desk Migration
 
Benefits of Employee Monitoring Software
Benefits of  Employee Monitoring SoftwareBenefits of  Employee Monitoring Software
Benefits of Employee Monitoring SoftwareMera Monitor
 
GraphAware - Transforming policing with graph-based intelligence analysis
GraphAware - Transforming policing with graph-based intelligence analysisGraphAware - Transforming policing with graph-based intelligence analysis
GraphAware - Transforming policing with graph-based intelligence analysisNeo4j
 
Facemoji Keyboard released its 2023 State of Emoji report, outlining the most...
Facemoji Keyboard released its 2023 State of Emoji report, outlining the most...Facemoji Keyboard released its 2023 State of Emoji report, outlining the most...
Facemoji Keyboard released its 2023 State of Emoji report, outlining the most...rajkumar669520
 
StrimziCon 2024 - Transition to Apache Kafka on Kubernetes with Strimzi
StrimziCon 2024 - Transition to Apache Kafka on Kubernetes with StrimziStrimziCon 2024 - Transition to Apache Kafka on Kubernetes with Strimzi
StrimziCon 2024 - Transition to Apache Kafka on Kubernetes with Strimzisteffenkarlsson2
 
Breaking the Code : A Guide to WhatsApp Business API.pdf
Breaking the Code : A Guide to WhatsApp Business API.pdfBreaking the Code : A Guide to WhatsApp Business API.pdf
Breaking the Code : A Guide to WhatsApp Business API.pdfMeon Technology
 
JustNaik Solution Deck (stage bus sector)
JustNaik Solution Deck (stage bus sector)JustNaik Solution Deck (stage bus sector)
JustNaik Solution Deck (stage bus sector)Max Lee
 
10 Essential Software Testing Tools You Need to Know About.pdf
10 Essential Software Testing Tools You Need to Know About.pdf10 Essential Software Testing Tools You Need to Know About.pdf
10 Essential Software Testing Tools You Need to Know About.pdfkalichargn70th171
 

Recently uploaded (20)

Agnieszka Andrzejewska - BIM School Course in Kraków
Agnieszka Andrzejewska - BIM School Course in KrakówAgnieszka Andrzejewska - BIM School Course in Kraków
Agnieszka Andrzejewska - BIM School Course in Kraków
 
Top Mobile App Development Companies 2024
Top Mobile App Development Companies 2024Top Mobile App Development Companies 2024
Top Mobile App Development Companies 2024
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
 
Accelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with PlatformlessAccelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with Platformless
 
SOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBrokerSOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBroker
 
iGaming Platform & Lottery Solutions by Skilrock
iGaming Platform & Lottery Solutions by SkilrockiGaming Platform & Lottery Solutions by Skilrock
iGaming Platform & Lottery Solutions by Skilrock
 
Using IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New ZealandUsing IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New Zealand
 
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERRORTROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
 
Tree in the Forest - Managing Details in BDD Scenarios (live2test 2024)
Tree in the Forest - Managing Details in BDD Scenarios (live2test 2024)Tree in the Forest - Managing Details in BDD Scenarios (live2test 2024)
Tree in the Forest - Managing Details in BDD Scenarios (live2test 2024)
 
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
 
Crafting the Perfect Measurement Sheet with PLM Integration
Crafting the Perfect Measurement Sheet with PLM IntegrationCrafting the Perfect Measurement Sheet with PLM Integration
Crafting the Perfect Measurement Sheet with PLM Integration
 
top nidhi software solution freedownload
top nidhi software solution freedownloadtop nidhi software solution freedownload
top nidhi software solution freedownload
 
A Guideline to Gorgias to to Re:amaze Data Migration
A Guideline to Gorgias to to Re:amaze Data MigrationA Guideline to Gorgias to to Re:amaze Data Migration
A Guideline to Gorgias to to Re:amaze Data Migration
 
Benefits of Employee Monitoring Software
Benefits of  Employee Monitoring SoftwareBenefits of  Employee Monitoring Software
Benefits of Employee Monitoring Software
 
GraphAware - Transforming policing with graph-based intelligence analysis
GraphAware - Transforming policing with graph-based intelligence analysisGraphAware - Transforming policing with graph-based intelligence analysis
GraphAware - Transforming policing with graph-based intelligence analysis
 
Facemoji Keyboard released its 2023 State of Emoji report, outlining the most...
Facemoji Keyboard released its 2023 State of Emoji report, outlining the most...Facemoji Keyboard released its 2023 State of Emoji report, outlining the most...
Facemoji Keyboard released its 2023 State of Emoji report, outlining the most...
 
StrimziCon 2024 - Transition to Apache Kafka on Kubernetes with Strimzi
StrimziCon 2024 - Transition to Apache Kafka on Kubernetes with StrimziStrimziCon 2024 - Transition to Apache Kafka on Kubernetes with Strimzi
StrimziCon 2024 - Transition to Apache Kafka on Kubernetes with Strimzi
 
Breaking the Code : A Guide to WhatsApp Business API.pdf
Breaking the Code : A Guide to WhatsApp Business API.pdfBreaking the Code : A Guide to WhatsApp Business API.pdf
Breaking the Code : A Guide to WhatsApp Business API.pdf
 
JustNaik Solution Deck (stage bus sector)
JustNaik Solution Deck (stage bus sector)JustNaik Solution Deck (stage bus sector)
JustNaik Solution Deck (stage bus sector)
 
10 Essential Software Testing Tools You Need to Know About.pdf
10 Essential Software Testing Tools You Need to Know About.pdf10 Essential Software Testing Tools You Need to Know About.pdf
10 Essential Software Testing Tools You Need to Know About.pdf
 

10 Cyber Safety Tips Every Internet User Must Follow

  • 1. © 2015 Quick Heal Technologies Ltd. 10CYBER SAFETY TIPS WEBINAR Every Internet User Must Follow
  • 2. © 2015 Quick Heal Technologies Ltd. Topics of Discussion: 1. Most common types threats on the Internet. 2. 10 Internet security tips you must follow. 3. How Quick Heal keeps you safe against all types of online dangers.
  • 3. © 2015 Quick Heal Technologies Ltd. Most common types of threats on the Internet. #1.
  • 4. © 2015 Quick Heal Technologies Ltd. The common types of online dangers that most people fall prey to, include:
  • 5. © 2015 Quick Heal Technologies Ltd. Phishing Attacks Phishing is defined as the fraudulent act of acquiring private and sensitive information such as usernames, passwords, credit/debit card info, etc.
  • 6. © 2015 Quick Heal Technologies Ltd. Spyware Spyware are malicious software that secretly monitor user’s activities, and steal sensitive information from the infected computer.
  • 7. © 2015 Quick Heal Technologies Ltd. Keyloggers A form of spyware, keyloggers capture and record user keystrokes. The data captured is then transmitted to a remote computer.
  • 8. © 2015 Quick Heal Technologies Ltd. Trojan Horse A Trojan horse is a seemingly benign program that when activated, causes harm to a computer system.
  • 9. © 2015 Quick Heal Technologies Ltd. Drive-by Download A drive-by download refers to a malicious download to a computer or device that occurs without the owner’s consent/knowledge.
  • 10. © 2015 Quick Heal Technologies Ltd. 10 simple Internet security tips you must follow. #2.
  • 11. © 2015 Quick Heal Technologies Ltd. Use uppercase, lowercase, special characters and numbers in your passwords. Tip 1 Be Smart with Passwords.
  • 12. © 2015 Quick Heal Technologies Ltd. Use a Pin, Password, Pattern or Face Lock. Tip 2 Lock Your Device.
  • 13. © 2015 Quick Heal Technologies Ltd. Use patched & up-to-date browsers, software, and OS. Tip 3 Apply Software Updates.
  • 14. © 2015 Quick Heal Technologies Ltd. Avoid selecting ‘Keep me Logged In’ or ‘Remember me’. Tip 4 Always Log Off.
  • 15. © 2015 Quick Heal Technologies Ltd. Download free software only from verified publishers. Tip 5 Beware of Freeware.
  • 16. © 2015 Quick Heal Technologies Ltd. Your money and data are safe with well-known online stores. Tip 6 Shop from Trusted Sites.
  • 17. © 2015 Quick Heal Technologies Ltd. Accept friend requests only from people you know. Tip 7 Know Your Online Friends.
  • 18. © 2015 Quick Heal Technologies Ltd. Shop and bank only on sites whose URL begins with ‘https’. Tip 8 Use Secure Websites.
  • 19. © 2015 Quick Heal Technologies Ltd. You’ll receive a passcode every time you log in to your account. Tip 9 Use 2-Step Verification.
  • 20. © 2015 Quick Heal Technologies Ltd. It’ll protect your PC against hackers and malware. Tip 10 Use an Antivirus.
  • 21. © 2015 Quick Heal Technologies Ltd. How Quick Heal keeps you safe against all types of online dangers. #3.
  • 22. © 2015 Quick Heal Technologies Ltd. Quick Heal helps you keep your PC and its data safe from all types of Internet dangers, with its advanced security features such as:
  • 23. © 2015 Quick Heal Technologies Ltd. Automatically blocks websites that are designed to steal user information by using social media scams and phishing attacks. Web Security
  • 24. © 2015 Quick Heal Technologies Ltd. Protects your PC from any malicious file that may get downloaded from the Internet without your knowledge. Browser Sandbox
  • 25. © 2015 Quick Heal Technologies Ltd. Blocks emails designed for phishing attacks, or dropping a malware on the user’s machine. Email Security
  • 26. © 2015 Quick Heal Technologies Ltd. Stops all types of malware and viruses such as Adware, Spyware, Trojan Horse, Worms, etc., from infecting your machine. Core Protection
  • 27. © 2015 Quick Heal Technologies Ltd. Detects and stops new and unknown threats that can cause heavy damage to your computer and its data. Advanced DNAScan
  • 28. © 2015 Quick Heal Technologies Ltd. Safe Banking Creates a safe virtual environment to let you bank, shop, and pay bills online securely. Protects your sensitive data from being stolen by spyware, keyloggers, and other malicious programs.
  • 29. © 2015 Quick Heal Technologies Ltd. REMEMBER… Cyber Safety begins with you.
  • 30. © 2015 Quick Heal Technologies Ltd. THANK YOU.
  • 31. © 2015 Quick Heal Technologies Ltd. Got any queries regarding this webinar? Write to us at: CorporateCommunications@quickheal.co.in Follow us on: Facebook: www.facebook.com/quickhealav Twitter: www.twitter.com/quickheal Google Plus: bit.ly/QuickHealGooglePlus YouTube: www.youtube.com/quickheal SlideShare: http://www.slideshare.net/QuickHealPPTs Visit us: Website: www.quickheal.com Official Blog: blogs.quickheal.com