The document provides information on internet safety tools and tips. It discusses the world wide web, domains, IP addresses, servers, routers and other basic internet concepts. It then lists tips for safe internet use including using strong passwords, enabling two-factor authentication, being wary of phishing attacks, installing anti-virus software, and being mindful of personal information shared online. The document also covers types of internet issues like malware, viruses, spyware and phishing. It defines cyber security threats and cyber bullying and provides prevention tips for students.
This document provides information and best practices for staying safe online. It discusses avoiding common scams like phishing, identity theft, file sharing risks, and using strong passwords. The key recommendations are to use up-to-date security software like antivirus and firewalls, only share information with known entities, and be wary of unsolicited messages asking for personal details. Backing up files and knowing how to respond if malware is suspected are also advised. The overall message is to be cautious online and protect personal information.
This document discusses various cyber threats and provides tips to protect against them. It begins by outlining groups that may want personal information, such as nation states, cyber criminals, and corporate spies. It then details common cyber threats like malware, viruses, worms, spyware, and social engineering. The document provides examples of these threats and discusses how to prevent identity theft, protect sensitive data, use social media securely, and identify phishing attempts. It concludes by offering advice on mobile, wireless, and internet security best practices.
Unveiling the dark web. The importance of your cybersecurity postureLourdes Paloma Gimenez
We live in the cyberspace but nobody talked us about cybersecurity. The web , deep web and the dark web. The different vectors of cyberattacks. Recommendations to stay protected.
Digital safety and cyber hygiene are important practices to maintain system health and security online. Common issues include loss of data, security breaches, and outdated software. To improve digital hygiene, some recommendations are to use strong passwords and disable unnecessary services, limit activities on public WiFi, log out of accounts after use, keep software and hardware updated, back up data, and use encryption. Developing good security habits can help protect personal information from online threats.
The document discusses the evolution of viruses from disruption to profit-seeking. Early viruses aimed to damage systems or gain notoriety, but today's viruses spread quietly to steal identities for money. The document provides tips to protect online identity, including keeping software updated, checking URLs, and verifying expected emails. Financial institutions do not use email for sensitive information.
Cybersecurity Awareness Posters - Set #2NetLockSmith
Posters for National Cyber Security Awareness Month. All are from government entities and free for use (Unmarked ones are from the Montana state government.)
This document provides best practices for online security and protecting personal information. It discusses the risks of sharing personal data online like passwords being cracked, social engineering, phishing emails, malware, and man-in-the-middle attacks. The document recommends using strong, unique passwords, two-factor authentication, privacy screens, firewalls, antivirus software, web filtering, encrypted backups, HTTPS browsing, and avoiding phishing. Following these practices can help better secure personal information in an increasingly connected digital world.
The document provides information on internet safety tools and tips. It discusses the world wide web, domains, IP addresses, servers, routers and other basic internet concepts. It then lists tips for safe internet use including using strong passwords, enabling two-factor authentication, being wary of phishing attacks, installing anti-virus software, and being mindful of personal information shared online. The document also covers types of internet issues like malware, viruses, spyware and phishing. It defines cyber security threats and cyber bullying and provides prevention tips for students.
This document provides information and best practices for staying safe online. It discusses avoiding common scams like phishing, identity theft, file sharing risks, and using strong passwords. The key recommendations are to use up-to-date security software like antivirus and firewalls, only share information with known entities, and be wary of unsolicited messages asking for personal details. Backing up files and knowing how to respond if malware is suspected are also advised. The overall message is to be cautious online and protect personal information.
This document discusses various cyber threats and provides tips to protect against them. It begins by outlining groups that may want personal information, such as nation states, cyber criminals, and corporate spies. It then details common cyber threats like malware, viruses, worms, spyware, and social engineering. The document provides examples of these threats and discusses how to prevent identity theft, protect sensitive data, use social media securely, and identify phishing attempts. It concludes by offering advice on mobile, wireless, and internet security best practices.
Unveiling the dark web. The importance of your cybersecurity postureLourdes Paloma Gimenez
We live in the cyberspace but nobody talked us about cybersecurity. The web , deep web and the dark web. The different vectors of cyberattacks. Recommendations to stay protected.
Digital safety and cyber hygiene are important practices to maintain system health and security online. Common issues include loss of data, security breaches, and outdated software. To improve digital hygiene, some recommendations are to use strong passwords and disable unnecessary services, limit activities on public WiFi, log out of accounts after use, keep software and hardware updated, back up data, and use encryption. Developing good security habits can help protect personal information from online threats.
The document discusses the evolution of viruses from disruption to profit-seeking. Early viruses aimed to damage systems or gain notoriety, but today's viruses spread quietly to steal identities for money. The document provides tips to protect online identity, including keeping software updated, checking URLs, and verifying expected emails. Financial institutions do not use email for sensitive information.
Cybersecurity Awareness Posters - Set #2NetLockSmith
Posters for National Cyber Security Awareness Month. All are from government entities and free for use (Unmarked ones are from the Montana state government.)
This document provides best practices for online security and protecting personal information. It discusses the risks of sharing personal data online like passwords being cracked, social engineering, phishing emails, malware, and man-in-the-middle attacks. The document recommends using strong, unique passwords, two-factor authentication, privacy screens, firewalls, antivirus software, web filtering, encrypted backups, HTTPS browsing, and avoiding phishing. Following these practices can help better secure personal information in an increasingly connected digital world.
This document discusses the topic of computer ethics. It begins with an introduction to computer ethics and defines it as the set of principles that govern the use of computers. It then discusses some common issues with computer ethics like intellectual property and privacy concerns. It also discusses advantages and disadvantages of computer ethics. Next, it outlines ten commandments of computer ethics. It discusses concepts like information privacy, steps to protect systems from risks, and unethical computing practices such as cyberbullying, phishing, hacking, spamming and plagiarism. It concludes by listing references used to compile the document.
This document provides an overview of cyber security. It defines cyber security as protecting networks, devices, programs and data from damage, unauthorized access or attacks delivered over the internet. It discusses the importance of cyber security for protecting data from theft or misuse and safeguarding systems from viruses. Various cyber attacks are outlined such as malware attacks, phishing, password attacks, hacking, and denial of service attacks. Common security mistakes like poor password management and opening unknown email attachments are also summarized. The document concludes by emphasizing that awareness is key to staying safe and secure from cyber threats.
Cybersecurity Awareness for employees.pptxAbdullaFatiya3
This document provides an overview of cyber security topics including phishing, ransomware, business email compromise, and personal losses due to cyber crime. It discusses how these attacks occur and provides recommendations on how to protect yourself such as using strong and unique passwords, enabling two-factor authentication, keeping devices updated, being wary of scams, and protecting your digital footprint. The document also outlines specific steps an organization called Illumin8 IT has taken to enhance email security, data protection, and compliance.
This wonderful presentation, appropriate for teens and young adults, was created by Symantec's Rayane Hazimeh for the Dubai Techfest, 2013. We thank her for generously sharing her content with the SlideShare community.
Steps and Tips to Protect Yourself and your Private Information while Online....Abzetdin Adamov
This document provides tips for protecting private information online and maintaining cybersecurity. It discusses common cyber threats like viruses, worms, and trojans. It recommends using secure websites, strong passwords, antivirus software, and caution when sharing information online or on public networks. The document also provides safety tips for children online and warns about common ATM scams. Overall, the key message is that internet users need to practice cyber hygiene and be aware of threats to their private information and financial security.
This document provides an introduction to cyber crimes and cyber security. It defines computer crimes as crimes committed using electronic media or computers as tools or targets. Common cyber criminals include disgruntled employees, teenagers, and professional hackers. Cyber crimes include hacking, denial of service attacks, software piracy, and identity theft. The document also discusses cyber security best practices such as using antivirus software, firewalls, strong passwords, and backing up important files.
Rayane hazimeh building trust in the digital age teenagers and studentsRayanehaz
This document provides a summary of key topics related to building trust in the digital age. It discusses the evolution of the internet from the early 1990s to today. It highlights differences between digital natives and their parents in terms of internet usage and privacy expectations. It identifies common concerns around digital footprints, privacy, security, bullying, predators, and protecting oneself online. It provides tips on creating positive digital footprints, strengthening privacy and security, dealing with cyberbullying, and staying safe from online threats. The document aims to educate people on building trust online through safe internet practices.
This document discusses various types of cyber crimes including crimes against persons, property, and government. Crimes against persons include cyber harassment and spreading of viruses. Crimes against property involve computer vandalism and theft of data. Crimes against government include hacking into government websites. The document also provides tips for staying secure such as using strong passwords, updating software, using privacy settings on social media, and being wary of phishing attempts.
This document discusses cyber safety and security. It defines cyber safety as the safe and responsible use of the internet to protect personal information and not threaten others. It describes potential dangers of browsing the web like identity theft, and provides solutions like anonymous or private browsing. These methods allow browsing without revealing personal details. The document also discusses maintaining confidentiality of information and provides practices to ensure privacy such as using firewalls and browsing privately. It defines various cyber crimes and security threats like cyber bullying, stalking, spreading rumors online, and provides guidance on reporting cyber crimes.
The saying goes, there are only two kinds of companies those that have been hacked and know it, and those that have been hacked, but don't know it. Perhaps that's an exaggeration, but the truth is that your employees may inadvertently invite cyber criminals into your company's computer systems. Here are some steps to help mitigate that risk.
It’s an online world. Most adults, and even teens, need to have online accounts for banking, shopping, communications, entertainment and social networks. Even many children have online lives. With all this online activity, how we keep ourselves and our families safe? How can we protect our private information? In this session we will discuss the advantages and dangers of our online lives. We will review practical tips for avoiding common mistakes. We will look at passwords, website safety, email and phishing, social networks and mobile devices. You can decrease the risks in our online world!
The document provides recommendations for building a culture of security within an organization. It discusses 10 key areas of focus: social engineering, phishing and spear phishing, internet browsing, social networking, bring your own devices, passwords, encryption, data retention, Wi-Fi security, and insider threats. For each area, it provides tips to train employees such as being wary of urgent requests, using strong and unique passwords, only accessing approved networks, and reporting suspicious insider behavior. The overall recommendations are aimed at establishing security best practices for employees across how they manage credentials, share data, and connect both inside and outside the workplace.
Ethics and safety measures in computing.pptxAarush59
Computer safety measures and ethics are important topics. Safety measures protect both computers and users by controlling hazards and extending the lifespan of computer systems. Ethics issues include privacy, accuracy, property, and access. Unethical internet practices involve misusing company time, abusive behavior, theft, lying, and violating policies. Plagiarism, cyberbullying, hacking, phishing, spamming, and piracy are additional concerns that compromise privacy, security, or ownership rights. Implementing strong passwords, firewalls, and other precautions can help prevent many ethical issues.
Phishing attack, with SSL Encryption and HTTPS WorkingSachin Saini
This presentation contains Introduction of Phishing attack, its types and Various techniques, their impact with real live example, after that its Avoidance, Prevention and Solution. Also it contains brief introduction of SSL and HTTPS with their working.
This document is a summary of a webinar on cyber security and digital safety. It discusses various types of hackers, defines cyber crimes, and covers topics like social media security, mental health and cyber security, and how to protect websites from hacking. It provides scopes in the cyber security field and lists some dedicated cyber security companies in Nepal. The webinar aims to educate normal users on filing the cyber space safely.
This document discusses online safety, security, ethics and etiquette. It outlines learning competencies around applying appropriate online safety standards, discerning deceptive information, and understanding implications of sharing information publicly. Topics covered include online safety measures, types of online threats like phishing and malware, maintaining privacy, and principles of netiquette and computer ethics. Students will learn to identify different types of online threats, protect their personal information, and behave appropriately online.
This document discusses the topic of computer ethics. It begins with an introduction to computer ethics and defines it as the set of principles that govern the use of computers. It then discusses some common issues with computer ethics like intellectual property and privacy concerns. It also discusses advantages and disadvantages of computer ethics. Next, it outlines ten commandments of computer ethics. It discusses concepts like information privacy, steps to protect systems from risks, and unethical computing practices such as cyberbullying, phishing, hacking, spamming and plagiarism. It concludes by listing references used to compile the document.
This document provides an overview of cyber security. It defines cyber security as protecting networks, devices, programs and data from damage, unauthorized access or attacks delivered over the internet. It discusses the importance of cyber security for protecting data from theft or misuse and safeguarding systems from viruses. Various cyber attacks are outlined such as malware attacks, phishing, password attacks, hacking, and denial of service attacks. Common security mistakes like poor password management and opening unknown email attachments are also summarized. The document concludes by emphasizing that awareness is key to staying safe and secure from cyber threats.
Cybersecurity Awareness for employees.pptxAbdullaFatiya3
This document provides an overview of cyber security topics including phishing, ransomware, business email compromise, and personal losses due to cyber crime. It discusses how these attacks occur and provides recommendations on how to protect yourself such as using strong and unique passwords, enabling two-factor authentication, keeping devices updated, being wary of scams, and protecting your digital footprint. The document also outlines specific steps an organization called Illumin8 IT has taken to enhance email security, data protection, and compliance.
This wonderful presentation, appropriate for teens and young adults, was created by Symantec's Rayane Hazimeh for the Dubai Techfest, 2013. We thank her for generously sharing her content with the SlideShare community.
Steps and Tips to Protect Yourself and your Private Information while Online....Abzetdin Adamov
This document provides tips for protecting private information online and maintaining cybersecurity. It discusses common cyber threats like viruses, worms, and trojans. It recommends using secure websites, strong passwords, antivirus software, and caution when sharing information online or on public networks. The document also provides safety tips for children online and warns about common ATM scams. Overall, the key message is that internet users need to practice cyber hygiene and be aware of threats to their private information and financial security.
This document provides an introduction to cyber crimes and cyber security. It defines computer crimes as crimes committed using electronic media or computers as tools or targets. Common cyber criminals include disgruntled employees, teenagers, and professional hackers. Cyber crimes include hacking, denial of service attacks, software piracy, and identity theft. The document also discusses cyber security best practices such as using antivirus software, firewalls, strong passwords, and backing up important files.
Rayane hazimeh building trust in the digital age teenagers and studentsRayanehaz
This document provides a summary of key topics related to building trust in the digital age. It discusses the evolution of the internet from the early 1990s to today. It highlights differences between digital natives and their parents in terms of internet usage and privacy expectations. It identifies common concerns around digital footprints, privacy, security, bullying, predators, and protecting oneself online. It provides tips on creating positive digital footprints, strengthening privacy and security, dealing with cyberbullying, and staying safe from online threats. The document aims to educate people on building trust online through safe internet practices.
This document discusses various types of cyber crimes including crimes against persons, property, and government. Crimes against persons include cyber harassment and spreading of viruses. Crimes against property involve computer vandalism and theft of data. Crimes against government include hacking into government websites. The document also provides tips for staying secure such as using strong passwords, updating software, using privacy settings on social media, and being wary of phishing attempts.
This document discusses cyber safety and security. It defines cyber safety as the safe and responsible use of the internet to protect personal information and not threaten others. It describes potential dangers of browsing the web like identity theft, and provides solutions like anonymous or private browsing. These methods allow browsing without revealing personal details. The document also discusses maintaining confidentiality of information and provides practices to ensure privacy such as using firewalls and browsing privately. It defines various cyber crimes and security threats like cyber bullying, stalking, spreading rumors online, and provides guidance on reporting cyber crimes.
The saying goes, there are only two kinds of companies those that have been hacked and know it, and those that have been hacked, but don't know it. Perhaps that's an exaggeration, but the truth is that your employees may inadvertently invite cyber criminals into your company's computer systems. Here are some steps to help mitigate that risk.
It’s an online world. Most adults, and even teens, need to have online accounts for banking, shopping, communications, entertainment and social networks. Even many children have online lives. With all this online activity, how we keep ourselves and our families safe? How can we protect our private information? In this session we will discuss the advantages and dangers of our online lives. We will review practical tips for avoiding common mistakes. We will look at passwords, website safety, email and phishing, social networks and mobile devices. You can decrease the risks in our online world!
The document provides recommendations for building a culture of security within an organization. It discusses 10 key areas of focus: social engineering, phishing and spear phishing, internet browsing, social networking, bring your own devices, passwords, encryption, data retention, Wi-Fi security, and insider threats. For each area, it provides tips to train employees such as being wary of urgent requests, using strong and unique passwords, only accessing approved networks, and reporting suspicious insider behavior. The overall recommendations are aimed at establishing security best practices for employees across how they manage credentials, share data, and connect both inside and outside the workplace.
Ethics and safety measures in computing.pptxAarush59
Computer safety measures and ethics are important topics. Safety measures protect both computers and users by controlling hazards and extending the lifespan of computer systems. Ethics issues include privacy, accuracy, property, and access. Unethical internet practices involve misusing company time, abusive behavior, theft, lying, and violating policies. Plagiarism, cyberbullying, hacking, phishing, spamming, and piracy are additional concerns that compromise privacy, security, or ownership rights. Implementing strong passwords, firewalls, and other precautions can help prevent many ethical issues.
Phishing attack, with SSL Encryption and HTTPS WorkingSachin Saini
This presentation contains Introduction of Phishing attack, its types and Various techniques, their impact with real live example, after that its Avoidance, Prevention and Solution. Also it contains brief introduction of SSL and HTTPS with their working.
This document is a summary of a webinar on cyber security and digital safety. It discusses various types of hackers, defines cyber crimes, and covers topics like social media security, mental health and cyber security, and how to protect websites from hacking. It provides scopes in the cyber security field and lists some dedicated cyber security companies in Nepal. The webinar aims to educate normal users on filing the cyber space safely.
This document discusses online safety, security, ethics and etiquette. It outlines learning competencies around applying appropriate online safety standards, discerning deceptive information, and understanding implications of sharing information publicly. Topics covered include online safety measures, types of online threats like phishing and malware, maintaining privacy, and principles of netiquette and computer ethics. Students will learn to identify different types of online threats, protect their personal information, and behave appropriately online.
Main Java[All of the Base Concepts}.docxadhitya5119
This is part 1 of my Java Learning Journey. This Contains Custom methods, classes, constructors, packages, multithreading , try- catch block, finally block and more.
How to Make a Field Mandatory in Odoo 17Celine George
In Odoo, making a field required can be done through both Python code and XML views. When you set the required attribute to True in Python code, it makes the field required across all views where it's used. Conversely, when you set the required attribute in XML views, it makes the field required only in the context of that particular view.
A workshop hosted by the South African Journal of Science aimed at postgraduate students and early career researchers with little or no experience in writing and publishing journal articles.
How to Add Chatter in the odoo 17 ERP ModuleCeline George
In Odoo, the chatter is like a chat tool that helps you work together on records. You can leave notes and track things, making it easier to talk with your team and partners. Inside chatter, all communication history, activity, and changes will be displayed.
Executive Directors Chat Leveraging AI for Diversity, Equity, and InclusionTechSoup
Let’s explore the intersection of technology and equity in the final session of our DEI series. Discover how AI tools, like ChatGPT, can be used to support and enhance your nonprofit's DEI initiatives. Participants will gain insights into practical AI applications and get tips for leveraging technology to advance their DEI goals.
A review of the growth of the Israel Genealogy Research Association Database Collection for the last 12 months. Our collection is now passed the 3 million mark and still growing. See which archives have contributed the most. See the different types of records we have, and which years have had records added. You can also see what we have for the future.
How to Setup Warehouse & Location in Odoo 17 InventoryCeline George
In this slide, we'll explore how to set up warehouses and locations in Odoo 17 Inventory. This will help us manage our stock effectively, track inventory levels, and streamline warehouse operations.
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...PECB
Denis is a dynamic and results-driven Chief Information Officer (CIO) with a distinguished career spanning information systems analysis and technical project management. With a proven track record of spearheading the design and delivery of cutting-edge Information Management solutions, he has consistently elevated business operations, streamlined reporting functions, and maximized process efficiency.
Certified as an ISO/IEC 27001: Information Security Management Systems (ISMS) Lead Implementer, Data Protection Officer, and Cyber Risks Analyst, Denis brings a heightened focus on data security, privacy, and cyber resilience to every endeavor.
His expertise extends across a diverse spectrum of reporting, database, and web development applications, underpinned by an exceptional grasp of data storage and virtualization technologies. His proficiency in application testing, database administration, and data cleansing ensures seamless execution of complex projects.
What sets Denis apart is his comprehensive understanding of Business and Systems Analysis technologies, honed through involvement in all phases of the Software Development Lifecycle (SDLC). From meticulous requirements gathering to precise analysis, innovative design, rigorous development, thorough testing, and successful implementation, he has consistently delivered exceptional results.
Throughout his career, he has taken on multifaceted roles, from leading technical project management teams to owning solutions that drive operational excellence. His conscientious and proactive approach is unwavering, whether he is working independently or collaboratively within a team. His ability to connect with colleagues on a personal level underscores his commitment to fostering a harmonious and productive workplace environment.
Date: May 29, 2024
Tags: Information Security, ISO/IEC 27001, ISO/IEC 42001, Artificial Intelligence, GDPR
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: ISO/IEC 27001 Information Security Management System - EN | PECB
ISO/IEC 42001 Artificial Intelligence Management System - EN | PECB
General Data Protection Regulation (GDPR) - Training Courses - EN | PECB
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
Slideshare: http://www.slideshare.net/PECBCERTIFICATION
How to Manage Your Lost Opportunities in Odoo 17 CRMCeline George
Odoo 17 CRM allows us to track why we lose sales opportunities with "Lost Reasons." This helps analyze our sales process and identify areas for improvement. Here's how to configure lost reasons in Odoo 17 CRM
This presentation includes basic of PCOS their pathology and treatment and also Ayurveda correlation of PCOS and Ayurvedic line of treatment mentioned in classics.
2. What is Cybersecurity?
Cyber security is the practice of defending
computers, servers, mobile devices,
electronic systems, networks, and data from
malicious attacks.
4. Threat: Malware
• Software designed to cause disruption to a
computer.
• Examples:
• Worm/virus
• Botnet
• Banking Trojan
• Ransomware
5. Who is Targeted?
• It is estimated that ransomware
damages will cost more than $20 billion
globally in 2020
• Encrypts/locks files
• Holds files for ransom
• Typically obtained via:
– Spam & phishing emails
– Unpatched security vulnerabilities
Ransomware
7. Best Practices: Malware
• Learn to identify phishing emails
• Exercise caution with links
• Do not download or click suspicious links or
files
• Keep software up-to-date
• Back up files regularly
8. Threat: Spear Phishing
• Spear-phishing is a targeted attempt to steal
sensitive information such as account credentials
or financial information from a specific victim,
often for malicious reasons.
• Common cause of data breaches
• Targeted emails
• Sent to small groups or individuals
• Use social engineering tactics
• 93 percent of incidents/breaches
10. Best Practices: Spear Phishing
• Check the sender
• Look out for warning signs
• Think before you click or take action
• Never hand over sensitive info
12. Best Practices: Malicious Links
• Always check the destination
See It In Action!
https://www.example.com/totally-legit.html
(http://www.example.com.some-other-site.co.uk/downloads/file.php)
14. Best Practices: Password Security
9@kj*YbM25nGnl
Yes
• Effective passwords are:
• Long
• Complex
• Unique
• Rotating
• Enable MFA where possible
p@ssw0rd12
No
15. Threat: Browsing in Public
• Unsecured networks
• “Man in the Middle”
• Visual hacking
• 44% of stolen devices were left in a public
place
16. Best Practices: Browsing in Public
• Avoid public wireless networks
• Use reputable VPN
• Be mindful of surroundings
• Precautionary apps
• “Find my phone”
• “Remote wipe”
17. Best Practices: Data Compromise
• Storing sensitive information:
• Yes to encrypted devices
• No to removable media (flash drives)
• Sharing:
• Who is authorized?
• Check email CC’s
• Secured network?
• Destruction:
• Recycle bin is not enough!
18. Cybersecurity Basics Checklist
• Keep all your software up-to-date
• Install a reliable antivirus solution
• Enhance your security with a product that can block attacks antivirus
can’t detect
• Use strong passwords and change them often
• Activate and use two step verification where available
• Avoid oversharing information on social media
• Back up your data. Do it often. Back up in several places
19. Cybersecurity Basics Checklist
• Never open emails from unknown senders
• Never download or open attachments sent by unknown senders
• Keep your financial information safe and don’t share it with anyone
• Avoid untrusted websites and don’t click on suspicious banners or
links
• Adjust the privacy and security settings in your browser and apps
20. Use Strong
Passwords
Use a VPN
When
Necessary
Think Before
You Click
Update Your
Home Router
Update Your
Devices
Use Two-
Factor
Authentication
21.
22. You post a picture of you and your best friend to your favorite social
media platform. She doesn’t feel comfortable with the image, so you
agree to take it down. Will this ensure that no one else sees the picture?
Answer: No. Once an image (or any information) is posted on the internet, it
is virtually impossible to remove it from circulation. Taking it off of your social
media page will help, but there is no guarantee that others have not already
seen it and/or downloaded it to their own machines.
23. You receive an email from an online shopping site claiming that
you were incorrectly charged for your last purchase and are due a
refund. The email asks you to click a link where you will submit
the necessary information. What should you do?
Answer: Do NOT click the link! Check the sender’s address and search the
document for spelling/grammar mistakes. If you notice anything suspicious, the
email is likely a scam. Even if it seems legitimate, navigate to the site yourself rather
than clicking any links.
24. Answer: It depends. In general, it is never safe to transmit PII (Personally Identifiable Information),
especially financial information, over a public network. If you find yourself in a situation where
you may need to do so, first consider all your options, including using your mobile data or a VPN
(Virtual Private Network) to help protect your browsing.
You’ve just settled into your new hotel room when you realize you
need to transfer some funds from your savings account to your
checking account. In order to do this, you will need to connect your
laptop to the hotel’s public Wi-Fi and log in to your online bank.
Should you risk it?
25. You have a long commute. Thankfully, your train just installed public Wi-Fi. Now you can
listen to your favorite music or podcast. However, when you check for social media
updates around lunch, you find that your account has been hacked. What steps could you
take to prevent your mobile device or laptop data from being compromised in the future?
Answer(s):
• Turn off Wi-Fi and Bluetooth when not using them. These technologies leave you open to remote attacks.
• Make sure the network is legitimate. Hackers love to create fake networks that mimic real ones, enticing
unsuspecting users to log on.
• Don’t connect. Though perhaps drastic, one near-certain way to circumvent the dangers of public Wi-Fi is
simply to avoid using it whenever possible.
26. Passwords often have complex requirements, and most online citizens will
need to remember numerous different passwords to access their internet
services. What is a way to help you keep track of all these different passwords?
Answer(s):
• Use a password manager. These are apps, devices, or cloud services that store your
passwords in an encrypted vault that can only be unlocked with a single master
password.
• Use a “password pattern.” This is simply a pattern (recognizable only to you) that you
can use to help remember your passwords.
27. Which of the following are strong password practices? (Choose all that apply.)
1. Passwords should contain a mixture of upper and lower case letters, numbers, and special characters.
2. Passwords should have personal meaning to you (e.g. a relative’s birthday) so that you can remember
them more easily.
3. You should immediately change your password in the case of a known data breach.
4. You should store your passwords on paper or in a text document, giving you a backup in the event that
you forget them.
Answer: 1 & 3. While it is helpful for passwords to have some level of personal relevance, anything
concrete or publicly-available (high schools, birthdates, pets’ names, etc.) can be easily researched and
guessed by an attacker. Storing your passwords physically or in a text-document is also ill-advised, as
someone could gain access to the copy.
Editor's Notes
Targeted attempt to steal sensitive info data spill info leakage data leak
Malware. This stands for “malicious software,” harmful software that seeks to damage or exploit the machines that run it
A scammer creates a fake email and sends it to thousands of people, hoping some of them will click on a link and give up their personal information.