SlideShare a Scribd company logo
1 of 11
10 tips to protect your computer
1. You are your own best security. Having a Internet security software, anti-
virus protection, spam guards, firewalls, and other protections won’t do a bit of
good if a computer user ignores warnings from the protection software.
2. Stay up-to-date with the latest anti-virus protection.
We make it our full-time job to make the Internet a safer
place. Having the latest security programs can protect
against varying degrees of cyber threats. Because cyber
criminals constantly improve their methods, it doesn’t help to
have a product from 3 years prior.
3. Keep all operating system and Internet
browsers updated. The makers of these programs
are also joining the fight against malware. Having the
most up-to-date programs will help keep the latest
threats away.
4. Don’t believe everything written in an e-mail. Cyber
criminals create infected e-mails meant to tug at heart-
strings, inflame passions about politics, and appeal to
people’s religions knowing that they will be passed on
and on. Joke e-mails are some of the worst offenders for
carrying malware.
5. Look before you leap. Phishing Web sites and spam
e-mails can fool even seasoned computer users into
giving up personal information. Any reputable company
will never ask for a password or a Social Security
number.
6. Use strong passwords. Microsoft offers a free test
to see if passwords will confound common cyber
criminals.
7. Keep your information private on Facebook. Even if
someone is not your friend, a cyber criminal has a way of
seeing what you’ve posted on social networking sites. A
good rule of thumb: Never say anything on a social site
you would never say out loud in public.
8. Teach children about cyber dangers. From an
early age, children should be taught about scams,
predators, and ways to be safe. It doesn’t have to be
a graphic conversation.
9. Don’t use a preview window. Preview windows
automatically open e-mails and subject a computer to
a virus before it can be stopped.
10. If it seems fishy, it probably is. Don’t worry
about being paranoid with suspicious e-mails and
Web sites. Ignore the site or the e-mail to stay safe.

More Related Content

What's hot

15 Tips to Protect Yourself from Cyber Attacks
15 Tips to Protect Yourself from Cyber Attacks15 Tips to Protect Yourself from Cyber Attacks
15 Tips to Protect Yourself from Cyber AttacksThe eCore Group
 
14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awarenessMichel Bitter
 
Dos and don's on social media
Dos and don's on social mediaDos and don's on social media
Dos and don's on social mediasanjeev kumar
 
Rules of Netiquette
 Rules of Netiquette Rules of Netiquette
Rules of NetiquetteRochelle Nato
 
WISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurityWISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurityWISE KIDS
 
The internet and safety
The internet and safetyThe internet and safety
The internet and safetyPatricia bb
 
Steps to Protect your Social Media Accounts
Steps to Protect your Social Media AccountsSteps to Protect your Social Media Accounts
Steps to Protect your Social Media Accountstechexpert2345
 
Internet Safety
Internet SafetyInternet Safety
Internet Safetytonyh1
 
Cybersecurity Awareness Infographics
Cybersecurity Awareness InfographicsCybersecurity Awareness Infographics
Cybersecurity Awareness InfographicsNetLockSmith
 
Cyber crime and security threads
Cyber crime and security threadsCyber crime and security threads
Cyber crime and security threadsVdidv
 
Lkw Security Part 1_MVPs Azra & Sanjay
Lkw Security Part 1_MVPs Azra & SanjayLkw Security Part 1_MVPs Azra & Sanjay
Lkw Security Part 1_MVPs Azra & SanjayQuek Lilian
 
Marleah
MarleahMarleah
Marleahmorag
 
Cyber Security and Cyber Awareness Tips manual 2020
Cyber Security and Cyber Awareness Tips manual 2020Cyber Security and Cyber Awareness Tips manual 2020
Cyber Security and Cyber Awareness Tips manual 2020Jay Nagar
 
Virus Spyware Quiz
Virus Spyware QuizVirus Spyware Quiz
Virus Spyware QuizPEC
 

What's hot (20)

Internet security
Internet securityInternet security
Internet security
 
15 Tips to Protect Yourself from Cyber Attacks
15 Tips to Protect Yourself from Cyber Attacks15 Tips to Protect Yourself from Cyber Attacks
15 Tips to Protect Yourself from Cyber Attacks
 
14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness
 
Dos and don's on social media
Dos and don's on social mediaDos and don's on social media
Dos and don's on social media
 
Rules of Netiquette
 Rules of Netiquette Rules of Netiquette
Rules of Netiquette
 
WISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurityWISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurity
 
The internet and safety
The internet and safetyThe internet and safety
The internet and safety
 
Steps to Protect your Social Media Accounts
Steps to Protect your Social Media AccountsSteps to Protect your Social Media Accounts
Steps to Protect your Social Media Accounts
 
Cybersecurity Awareness
Cybersecurity AwarenessCybersecurity Awareness
Cybersecurity Awareness
 
Email Security Tips
Email Security TipsEmail Security Tips
Email Security Tips
 
Security awareness
Security awarenessSecurity awareness
Security awareness
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Cybersecurity Awareness Infographics
Cybersecurity Awareness InfographicsCybersecurity Awareness Infographics
Cybersecurity Awareness Infographics
 
Cyber crime and security threads
Cyber crime and security threadsCyber crime and security threads
Cyber crime and security threads
 
Lkw Security Part 1_MVPs Azra & Sanjay
Lkw Security Part 1_MVPs Azra & SanjayLkw Security Part 1_MVPs Azra & Sanjay
Lkw Security Part 1_MVPs Azra & Sanjay
 
Marleah
MarleahMarleah
Marleah
 
Cyber Security and Cyber Awareness Tips manual 2020
Cyber Security and Cyber Awareness Tips manual 2020Cyber Security and Cyber Awareness Tips manual 2020
Cyber Security and Cyber Awareness Tips manual 2020
 
Virus Spyware Quiz
Virus Spyware QuizVirus Spyware Quiz
Virus Spyware Quiz
 
Cyber security
Cyber securityCyber security
Cyber security
 
Safe Computing
Safe ComputingSafe Computing
Safe Computing
 

Viewers also liked

Fiesta Bowl Final Public
Fiesta  Bowl  Final  PublicFiesta  Bowl  Final  Public
Fiesta Bowl Final PublicBlogForArizona
 
Tema 3(i) el inicio de la crisis del antiguo régimen
Tema 3(i) el inicio de la crisis del antiguo régimenTema 3(i) el inicio de la crisis del antiguo régimen
Tema 3(i) el inicio de la crisis del antiguo régimenatorh
 
Fijación Salarios MÍnimos 2013. Guatemala
Fijación Salarios MÍnimos 2013. GuatemalaFijación Salarios MÍnimos 2013. Guatemala
Fijación Salarios MÍnimos 2013. GuatemalaPepe Vch
 
Ls pre semester training module
Ls pre semester training module Ls pre semester training module
Ls pre semester training module capsunm
 
Cuaderno completo ingles
Cuaderno completo inglesCuaderno completo ingles
Cuaderno completo inglesEli Diaz
 
El control del mediterrano. Ignacio Gil, Alejandro Garcia
El control del mediterrano. Ignacio Gil, Alejandro GarciaEl control del mediterrano. Ignacio Gil, Alejandro Garcia
El control del mediterrano. Ignacio Gil, Alejandro Garciaignacio_gil
 
SocEngine: Social Engine Platform for seniors
SocEngine: Social Engine Platform for seniorsSocEngine: Social Engine Platform for seniors
SocEngine: Social Engine Platform for seniorsAmina WADDIZ
 
Estrés laboral en trabajadores por turnos 1er. congreso paraguayo de medici...
Estrés laboral en trabajadores por turnos   1er. congreso paraguayo de medici...Estrés laboral en trabajadores por turnos   1er. congreso paraguayo de medici...
Estrés laboral en trabajadores por turnos 1er. congreso paraguayo de medici...Dr. Gustavo Piñeiro
 
¿El negocio multinivel es un fraude?
¿El negocio multinivel es un fraude?¿El negocio multinivel es un fraude?
¿El negocio multinivel es un fraude?jesus melendez
 
Gps es un sistema global de navegación por satélite
Gps es un sistema global de navegación por satéliteGps es un sistema global de navegación por satélite
Gps es un sistema global de navegación por satéliteJosep Venancio A
 
Refine ROI with Actionable Marketing Analytics
Refine ROI with Actionable Marketing AnalyticsRefine ROI with Actionable Marketing Analytics
Refine ROI with Actionable Marketing AnalyticsSteven Everett
 
Personal/Group Fitness Trainer Resume/CV
Personal/Group Fitness  Trainer Resume/CVPersonal/Group Fitness  Trainer Resume/CV
Personal/Group Fitness Trainer Resume/CVRony Santiago
 
Using iPads for Language Learning
Using iPads for Language LearningUsing iPads for Language Learning
Using iPads for Language Learningfaithmarcel
 
Problemas resueltos de topografía práctica jacinto peña
Problemas resueltos de topografía práctica   jacinto peñaProblemas resueltos de topografía práctica   jacinto peña
Problemas resueltos de topografía práctica jacinto peñaMiguel Rodríguez
 

Viewers also liked (20)

Fiesta Bowl Final Public
Fiesta  Bowl  Final  PublicFiesta  Bowl  Final  Public
Fiesta Bowl Final Public
 
Tema 3(i) el inicio de la crisis del antiguo régimen
Tema 3(i) el inicio de la crisis del antiguo régimenTema 3(i) el inicio de la crisis del antiguo régimen
Tema 3(i) el inicio de la crisis del antiguo régimen
 
Fijación Salarios MÍnimos 2013. Guatemala
Fijación Salarios MÍnimos 2013. GuatemalaFijación Salarios MÍnimos 2013. Guatemala
Fijación Salarios MÍnimos 2013. Guatemala
 
Grupo 3
Grupo 3Grupo 3
Grupo 3
 
Memoria ARSIS 2016
Memoria ARSIS 2016Memoria ARSIS 2016
Memoria ARSIS 2016
 
Caanoo intro 2011_0428
Caanoo intro 2011_0428Caanoo intro 2011_0428
Caanoo intro 2011_0428
 
Ls pre semester training module
Ls pre semester training module Ls pre semester training module
Ls pre semester training module
 
Cuaderno completo ingles
Cuaderno completo inglesCuaderno completo ingles
Cuaderno completo ingles
 
El control del mediterrano. Ignacio Gil, Alejandro Garcia
El control del mediterrano. Ignacio Gil, Alejandro GarciaEl control del mediterrano. Ignacio Gil, Alejandro Garcia
El control del mediterrano. Ignacio Gil, Alejandro Garcia
 
RIA_jan2016
RIA_jan2016RIA_jan2016
RIA_jan2016
 
POLYEIDE
POLYEIDEPOLYEIDE
POLYEIDE
 
SocEngine: Social Engine Platform for seniors
SocEngine: Social Engine Platform for seniorsSocEngine: Social Engine Platform for seniors
SocEngine: Social Engine Platform for seniors
 
Estrés laboral en trabajadores por turnos 1er. congreso paraguayo de medici...
Estrés laboral en trabajadores por turnos   1er. congreso paraguayo de medici...Estrés laboral en trabajadores por turnos   1er. congreso paraguayo de medici...
Estrés laboral en trabajadores por turnos 1er. congreso paraguayo de medici...
 
¿El negocio multinivel es un fraude?
¿El negocio multinivel es un fraude?¿El negocio multinivel es un fraude?
¿El negocio multinivel es un fraude?
 
Gps es un sistema global de navegación por satélite
Gps es un sistema global de navegación por satéliteGps es un sistema global de navegación por satélite
Gps es un sistema global de navegación por satélite
 
Tech Trends in Public Libraries OLA Super Conference Toronto 4.2.2012
Tech Trends in Public Libraries OLA Super Conference Toronto 4.2.2012Tech Trends in Public Libraries OLA Super Conference Toronto 4.2.2012
Tech Trends in Public Libraries OLA Super Conference Toronto 4.2.2012
 
Refine ROI with Actionable Marketing Analytics
Refine ROI with Actionable Marketing AnalyticsRefine ROI with Actionable Marketing Analytics
Refine ROI with Actionable Marketing Analytics
 
Personal/Group Fitness Trainer Resume/CV
Personal/Group Fitness  Trainer Resume/CVPersonal/Group Fitness  Trainer Resume/CV
Personal/Group Fitness Trainer Resume/CV
 
Using iPads for Language Learning
Using iPads for Language LearningUsing iPads for Language Learning
Using iPads for Language Learning
 
Problemas resueltos de topografía práctica jacinto peña
Problemas resueltos de topografía práctica   jacinto peñaProblemas resueltos de topografía práctica   jacinto peña
Problemas resueltos de topografía práctica jacinto peña
 

Similar to Computer SOS

Lesson 2 rules of netiquette
Lesson 2 rules of netiquetteLesson 2 rules of netiquette
Lesson 2 rules of netiquetteEmmanuelaSernicul
 
EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2JayMarkBandoy1
 
Internet Safety.pptx
Internet Safety.pptxInternet Safety.pptx
Internet Safety.pptxAljunMisa
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Jesus Rances
 
How to Protect Your PC from Malware, Ransomware, Virus
How to Protect Your PC from Malware, Ransomware, VirusHow to Protect Your PC from Malware, Ransomware, Virus
How to Protect Your PC from Malware, Ransomware, VirusHabFg
 
Computer Security Guide to Pc Security
Computer Security Guide to Pc SecurityComputer Security Guide to Pc Security
Computer Security Guide to Pc SecurityMallTake
 
Rules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxRules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxNoelBuctot1
 
Q3 G11 Empowerment Technologies Module 2.pdf
Q3 G11 Empowerment Technologies Module 2.pdfQ3 G11 Empowerment Technologies Module 2.pdf
Q3 G11 Empowerment Technologies Module 2.pdfBryanSmile
 
Digital safety[1]
Digital safety[1]Digital safety[1]
Digital safety[1]sheenau
 
Empowerment Technology Lesson 2
Empowerment Technology Lesson 2Empowerment Technology Lesson 2
Empowerment Technology Lesson 2alicelagajino
 
cyber safety.pdf
cyber safety.pdfcyber safety.pdf
cyber safety.pdfMILANOP1
 
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2JeffUrgelles
 

Similar to Computer SOS (20)

Lesson 2 rules of netiquette
Lesson 2 rules of netiquetteLesson 2 rules of netiquette
Lesson 2 rules of netiquette
 
EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2
 
Internet Safety.pptx
Internet Safety.pptxInternet Safety.pptx
Internet Safety.pptx
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
How to Protect Your PC from Malware, Ransomware, Virus
How to Protect Your PC from Malware, Ransomware, VirusHow to Protect Your PC from Malware, Ransomware, Virus
How to Protect Your PC from Malware, Ransomware, Virus
 
Guide to pc_security
Guide to pc_securityGuide to pc_security
Guide to pc_security
 
Computer Security Guide to Pc Security
Computer Security Guide to Pc SecurityComputer Security Guide to Pc Security
Computer Security Guide to Pc Security
 
itEraLesson3. .pptx
itEraLesson3.                       .pptxitEraLesson3.                       .pptx
itEraLesson3. .pptx
 
Rules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxRules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptx
 
Q3 G11 Empowerment Technologies Module 2.pdf
Q3 G11 Empowerment Technologies Module 2.pdfQ3 G11 Empowerment Technologies Module 2.pdf
Q3 G11 Empowerment Technologies Module 2.pdf
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Digital safety[1]
Digital safety[1]Digital safety[1]
Digital safety[1]
 
Emp tech las-week-2
Emp tech las-week-2Emp tech las-week-2
Emp tech las-week-2
 
Empowerment Technology Lesson 2
Empowerment Technology Lesson 2Empowerment Technology Lesson 2
Empowerment Technology Lesson 2
 
Internetsecurity
InternetsecurityInternetsecurity
Internetsecurity
 
cyber safety.pdf
cyber safety.pdfcyber safety.pdf
cyber safety.pdf
 
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
 
Users guide
Users guideUsers guide
Users guide
 
Securitytips
SecuritytipsSecuritytips
Securitytips
 

Recently uploaded

My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 

Recently uploaded (20)

My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 

Computer SOS

  • 1. 10 tips to protect your computer
  • 2. 1. You are your own best security. Having a Internet security software, anti- virus protection, spam guards, firewalls, and other protections won’t do a bit of good if a computer user ignores warnings from the protection software.
  • 3. 2. Stay up-to-date with the latest anti-virus protection. We make it our full-time job to make the Internet a safer place. Having the latest security programs can protect against varying degrees of cyber threats. Because cyber criminals constantly improve their methods, it doesn’t help to have a product from 3 years prior.
  • 4. 3. Keep all operating system and Internet browsers updated. The makers of these programs are also joining the fight against malware. Having the most up-to-date programs will help keep the latest threats away.
  • 5. 4. Don’t believe everything written in an e-mail. Cyber criminals create infected e-mails meant to tug at heart- strings, inflame passions about politics, and appeal to people’s religions knowing that they will be passed on and on. Joke e-mails are some of the worst offenders for carrying malware.
  • 6. 5. Look before you leap. Phishing Web sites and spam e-mails can fool even seasoned computer users into giving up personal information. Any reputable company will never ask for a password or a Social Security number.
  • 7. 6. Use strong passwords. Microsoft offers a free test to see if passwords will confound common cyber criminals.
  • 8. 7. Keep your information private on Facebook. Even if someone is not your friend, a cyber criminal has a way of seeing what you’ve posted on social networking sites. A good rule of thumb: Never say anything on a social site you would never say out loud in public.
  • 9. 8. Teach children about cyber dangers. From an early age, children should be taught about scams, predators, and ways to be safe. It doesn’t have to be a graphic conversation.
  • 10. 9. Don’t use a preview window. Preview windows automatically open e-mails and subject a computer to a virus before it can be stopped.
  • 11. 10. If it seems fishy, it probably is. Don’t worry about being paranoid with suspicious e-mails and Web sites. Ignore the site or the e-mail to stay safe.