SlideShare a Scribd company logo
DIGITAL SAFETY,
SECURITY AND HYGIENE
statista.com/statistics/617136/digital-population-worldwide/
https://www.upf.go.ug/wp-
content/uploads/2021/04/ANNUAL-CRIME-REPORT-
2020-1.pdf?x74136
google.com/myactivity
How many Devices logged are in with your Gmail account????
Digital safety or Cyber Hygiene?
Cyber hygiene are the practices and steps that
users of computers and Mobile devices take to
maintain system health and improve online
security.
• These practices are often part of a routine to
ensure the safety of identity and other details
that could be stolen or corrupted
SECTION
TITLE
Loss of data
Misplaced Data
Security breaches
Outdated Software
Older antivirus
COMMON DIGITAL/CYBER HYGIENE PROBLEMS
Malware
A malware is an intrusive software that is designed to damage and destroy
computers and computer systems. Malware is a contraction for “malicious
software.”
Examples of common malware includes viruses, worms, spyware, adware,
and ransomware
Viruses
• A computer virus, much like a flu virus, is designed to spread from host to
host and has the ability to replicate itself. ...
• In more technical terms, a computer virus is a type of malicious code or
program written to alter the way a computer operates and is designed to
spread from one computer to another
Hackers
• Computer hackers are unauthorized users who break into our computer
systems in order to steal, change or destroy information, often by installing
dangerous malware without your knowledge or consent.
• Their clever tactics and detailed technical knowledge help them access the
information you really don’t want them to have.
• Always use caution while surfing the web, and make sure your computer
programs are up to date to patch up any weak access points hackers may
try to get through.
Phishing
• Phishing is a type of social engineering attack often used to steal user data,
including login credentials and credit card numbers.
• Phishers are well versed in the art of fraud by sending fake emails that may
look reputable, but are crafted by somebody seeking your credit card info,
passwords, or social security number.
• Again, always be careful online, especially when receiving emails that
appear “phishy” or inauthentic.
Scams
• Congrats! You’ve just won an all-
expenses-paid trip to Canada! All you
have to do is send a Shs 500.000
deposit to reserve your room in a FIVE
STAR SUITE. Make sure to send your
deposit by FRIDAY or else your room
will be given to someone else.
• It’s your lucky day! Sounds amazing,
right? Well, you may know this is fake,
but unfortunately a lot of people,
including the elderly, fall for popular
scams similar to this all the time.
• Most email platforms have pre-installed anti-
spam protection so that spam emails will go
straight into the folder and never be seen. But
when it comes to phone calls, your knowledge
is your only protection
• When in doubt, don’t respond: Fraudulent text
messages, calls and voicemails are on the rise.
Just as with email, mobile requests for
personal data or immediate action are almost
always scams.
What do we need to do?
Create a common Digital Hygiene Policy
• Be vigilant >>think and assess before you click<<
• Always use strong passwords.
• Disable unwanted and idle services such as Bluetooth, WIFI as theses can offer an
easy way for a nearby unauthorized user to access your device.
• Connect with Care: Public wireless networks and hotspots are not secure, which
means that anyone could potentially see what you are doing on your laptop or
smartphone while you are connected to them. Limit what you do on public WiFi, and
avoid logging in to key accounts like email and financial services. Consider using a
virtual private network (VPN) or a personal/mobile hotspot if you need a more
secure connection
Keep track of where you are logged in
• Log out all accounts after use
• While you should always sign out of accounts when you are using public devices,
there is more to keeping track of where you are logged in. We sign up for new
accounts and subscriptions every day, and often, we forget about them.
• Keep track of where you sign up and, periodically, delete the accounts that you
don’t use. You don’t want your information in places that you don’t regularly
frequent. Stay safe by always knowing who has your information.
Using WhatsApp Web Securely
Protecting your identity- Incognito mode.
Personal information is like money – Value it. Protect it: Information about you, such as what you
search for online and where you shop and live, has value – just like money. Be thoughtful about who
gets that information and how it’s collected through apps and websites
Google 2 Step Authentication.
Software Updates:
Updating the software
you use, or perhaps
getting better versions
should be a part of
your regular hygienic
review
Hardware
Updates: Older
computers and
smartphones may
need to be updated to
maintain performance
and prevent issues.
Manage New
Installs: Every new
install should be done
properly and
documented to keep an
updated inventory of all
hardware and software
Limit Users: Only
those who need
admin-level access to
programs should
have access. Other
users should have
limited capabilities
• Back Up Data: All data
should be backed up to a
secondary source
Hard drive or cloud
storage(i.e. Onedrive,
google drive,
dropbox…)
Encryption and Decryption
Encrypting Software for Computers
• Mailvelope Gmail
• BitLocker
• VeraCrypt
• Crypto expert
• WinZip
• AX Crypt
Mac Devices/Apple
• Encrypto
• Mailvelope Gmail
• Hider 2
• Cisdem App Crypt
• GNU Privacy Guard
Encrypting Software for Mobile Gadgets
• Kyms (keep your media safe)
• Syncthing
• OpenKeychain
• FreeOTP Authenticator
• Silent Phone
• Cyph
• Cryptomator
• Confide
• Pryvate
Digital Security means developing a protective routine to keep your personal and financial
information secure when using your computer or mobile device. Using strong passwords and
changing them regularly, keeping software and operating systems up to date, wiping hard
drives, and using a comprehensive antivirus will help you stay ahead of the latest cyber threats.
Digital Security and Hygiene.pptx

More Related Content

Similar to Digital Security and Hygiene.pptx

Cyberattacks.pptx
Cyberattacks.pptxCyberattacks.pptx
Cyberattacks.pptx
SonakshiMundra
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Adeel Younas
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
Kaushal Solanki
 
Unveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity postureUnveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity posture
Lourdes Paloma Gimenez
 
BCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptxBCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptx
Kirti Verma
 
Module 5: Safety
Module 5: SafetyModule 5: Safety
Module 5: Safety
Karel Van Isacker
 
Data security best practices for risk awareness and mitigation
Data security best practices for risk awareness and mitigationData security best practices for risk awareness and mitigation
Data security best practices for risk awareness and mitigation
Nick Chandi
 
Executive Directors Chat:It's easy to stay safe online.pdf
Executive Directors Chat:It's easy to stay safe online.pdfExecutive Directors Chat:It's easy to stay safe online.pdf
Executive Directors Chat:It's easy to stay safe online.pdf
TechSoup
 
It security,malware,phishing,information theft
It security,malware,phishing,information theftIt security,malware,phishing,information theft
It security,malware,phishing,information theft
Deepak John
 
E business internet fraud
E business internet fraudE business internet fraud
E business internet fraudRadiant Minds
 
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your DataLaw Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
Accellis Technology Group
 
Cysec.pptx
Cysec.pptxCysec.pptx
Cysec.pptx
jondon17
 
Users awarness programme for Online Privacy
Users awarness programme for Online PrivacyUsers awarness programme for Online Privacy
Users awarness programme for Online Privacy
Kazi Sarwar Hossain
 
Information security
Information securityInformation security
Information security
Shanthamallachar D B
 
Cyber Security and Fraud Prevention Tools Tactics
Cyber Security and Fraud Prevention Tools TacticsCyber Security and Fraud Prevention Tools Tactics
Cyber Security and Fraud Prevention Tools TacticsBen Graybar
 
IT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.ppt
OoXair
 
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdfitsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
MansoorAhmed57263
 
Cyber Security Seminar
Cyber Security SeminarCyber Security Seminar
Cyber Security Seminar
Jeremy Quadri
 
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptxCYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
BarakaMuyengi
 

Similar to Digital Security and Hygiene.pptx (20)

Cyberattacks.pptx
Cyberattacks.pptxCyberattacks.pptx
Cyberattacks.pptx
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
Unveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity postureUnveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity posture
 
BCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptxBCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptx
 
Module 5: Safety
Module 5: SafetyModule 5: Safety
Module 5: Safety
 
Data security best practices for risk awareness and mitigation
Data security best practices for risk awareness and mitigationData security best practices for risk awareness and mitigation
Data security best practices for risk awareness and mitigation
 
Executive Directors Chat:It's easy to stay safe online.pdf
Executive Directors Chat:It's easy to stay safe online.pdfExecutive Directors Chat:It's easy to stay safe online.pdf
Executive Directors Chat:It's easy to stay safe online.pdf
 
It security,malware,phishing,information theft
It security,malware,phishing,information theftIt security,malware,phishing,information theft
It security,malware,phishing,information theft
 
E business internet fraud
E business internet fraudE business internet fraud
E business internet fraud
 
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your DataLaw Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
 
Cysec.pptx
Cysec.pptxCysec.pptx
Cysec.pptx
 
Users awarness programme for Online Privacy
Users awarness programme for Online PrivacyUsers awarness programme for Online Privacy
Users awarness programme for Online Privacy
 
Information security
Information securityInformation security
Information security
 
Cyber Security and Fraud Prevention Tools Tactics
Cyber Security and Fraud Prevention Tools TacticsCyber Security and Fraud Prevention Tools Tactics
Cyber Security and Fraud Prevention Tools Tactics
 
IT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.ppt
 
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdfitsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
 
3 steps security
3 steps security3 steps security
3 steps security
 
Cyber Security Seminar
Cyber Security SeminarCyber Security Seminar
Cyber Security Seminar
 
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptxCYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
 

More from Ultimate Multimedia Consult

Data Visualization using Word Clouds
Data Visualization using Word CloudsData Visualization using Word Clouds
Data Visualization using Word Clouds
Ultimate Multimedia Consult
 
12 top tools for improving productivity.pptx
12 top tools for improving productivity.pptx12 top tools for improving productivity.pptx
12 top tools for improving productivity.pptx
Ultimate Multimedia Consult
 
Crowdsourcing Information & Crowdsourcing tools
Crowdsourcing Information & Crowdsourcing toolsCrowdsourcing Information & Crowdsourcing tools
Crowdsourcing Information & Crowdsourcing tools
Ultimate Multimedia Consult
 
Website design basics .pptx
Website design basics .pptxWebsite design basics .pptx
Website design basics .pptx
Ultimate Multimedia Consult
 
Collaborative communication tools .pptx
Collaborative communication tools .pptxCollaborative communication tools .pptx
Collaborative communication tools .pptx
Ultimate Multimedia Consult
 
Creating visually appealing presentations.pptx
Creating visually appealing presentations.pptxCreating visually appealing presentations.pptx
Creating visually appealing presentations.pptx
Ultimate Multimedia Consult
 
Digital Photography.
Digital Photography.Digital Photography.
Digital Photography.
Ultimate Multimedia Consult
 
BEST PRACTICES FOR LIVE STREAMING
BEST PRACTICES FOR LIVE STREAMINGBEST PRACTICES FOR LIVE STREAMING
BEST PRACTICES FOR LIVE STREAMING
Ultimate Multimedia Consult
 
Search Engine Optmization final ppt (SEO).pptx
Search Engine Optmization final ppt (SEO).pptxSearch Engine Optmization final ppt (SEO).pptx
Search Engine Optmization final ppt (SEO).pptx
Ultimate Multimedia Consult
 
Data Visualization.pptx
Data Visualization.pptxData Visualization.pptx
Data Visualization.pptx
Ultimate Multimedia Consult
 
Creating and Optimizing Ads on YouTube.pptx
Creating and Optimizing Ads on YouTube.pptxCreating and Optimizing Ads on YouTube.pptx
Creating and Optimizing Ads on YouTube.pptx
Ultimate Multimedia Consult
 
Educational Interactive Content
Educational Interactive Content Educational Interactive Content
Educational Interactive Content
Ultimate Multimedia Consult
 
BASIC MAPPING SKILLS by Allan.pptx
BASIC MAPPING SKILLS by Allan.pptxBASIC MAPPING SKILLS by Allan.pptx
BASIC MAPPING SKILLS by Allan.pptx
Ultimate Multimedia Consult
 

More from Ultimate Multimedia Consult (13)

Data Visualization using Word Clouds
Data Visualization using Word CloudsData Visualization using Word Clouds
Data Visualization using Word Clouds
 
12 top tools for improving productivity.pptx
12 top tools for improving productivity.pptx12 top tools for improving productivity.pptx
12 top tools for improving productivity.pptx
 
Crowdsourcing Information & Crowdsourcing tools
Crowdsourcing Information & Crowdsourcing toolsCrowdsourcing Information & Crowdsourcing tools
Crowdsourcing Information & Crowdsourcing tools
 
Website design basics .pptx
Website design basics .pptxWebsite design basics .pptx
Website design basics .pptx
 
Collaborative communication tools .pptx
Collaborative communication tools .pptxCollaborative communication tools .pptx
Collaborative communication tools .pptx
 
Creating visually appealing presentations.pptx
Creating visually appealing presentations.pptxCreating visually appealing presentations.pptx
Creating visually appealing presentations.pptx
 
Digital Photography.
Digital Photography.Digital Photography.
Digital Photography.
 
BEST PRACTICES FOR LIVE STREAMING
BEST PRACTICES FOR LIVE STREAMINGBEST PRACTICES FOR LIVE STREAMING
BEST PRACTICES FOR LIVE STREAMING
 
Search Engine Optmization final ppt (SEO).pptx
Search Engine Optmization final ppt (SEO).pptxSearch Engine Optmization final ppt (SEO).pptx
Search Engine Optmization final ppt (SEO).pptx
 
Data Visualization.pptx
Data Visualization.pptxData Visualization.pptx
Data Visualization.pptx
 
Creating and Optimizing Ads on YouTube.pptx
Creating and Optimizing Ads on YouTube.pptxCreating and Optimizing Ads on YouTube.pptx
Creating and Optimizing Ads on YouTube.pptx
 
Educational Interactive Content
Educational Interactive Content Educational Interactive Content
Educational Interactive Content
 
BASIC MAPPING SKILLS by Allan.pptx
BASIC MAPPING SKILLS by Allan.pptxBASIC MAPPING SKILLS by Allan.pptx
BASIC MAPPING SKILLS by Allan.pptx
 

Recently uploaded

Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 

Recently uploaded (20)

Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 

Digital Security and Hygiene.pptx

  • 2.
  • 6. How many Devices logged are in with your Gmail account????
  • 7. Digital safety or Cyber Hygiene?
  • 8. Cyber hygiene are the practices and steps that users of computers and Mobile devices take to maintain system health and improve online security. • These practices are often part of a routine to ensure the safety of identity and other details that could be stolen or corrupted
  • 9. SECTION TITLE Loss of data Misplaced Data Security breaches Outdated Software Older antivirus COMMON DIGITAL/CYBER HYGIENE PROBLEMS
  • 10. Malware A malware is an intrusive software that is designed to damage and destroy computers and computer systems. Malware is a contraction for “malicious software.” Examples of common malware includes viruses, worms, spyware, adware, and ransomware
  • 11. Viruses • A computer virus, much like a flu virus, is designed to spread from host to host and has the ability to replicate itself. ... • In more technical terms, a computer virus is a type of malicious code or program written to alter the way a computer operates and is designed to spread from one computer to another
  • 12. Hackers • Computer hackers are unauthorized users who break into our computer systems in order to steal, change or destroy information, often by installing dangerous malware without your knowledge or consent. • Their clever tactics and detailed technical knowledge help them access the information you really don’t want them to have. • Always use caution while surfing the web, and make sure your computer programs are up to date to patch up any weak access points hackers may try to get through.
  • 13.
  • 14. Phishing • Phishing is a type of social engineering attack often used to steal user data, including login credentials and credit card numbers. • Phishers are well versed in the art of fraud by sending fake emails that may look reputable, but are crafted by somebody seeking your credit card info, passwords, or social security number. • Again, always be careful online, especially when receiving emails that appear “phishy” or inauthentic.
  • 15.
  • 16.
  • 17.
  • 18. Scams • Congrats! You’ve just won an all- expenses-paid trip to Canada! All you have to do is send a Shs 500.000 deposit to reserve your room in a FIVE STAR SUITE. Make sure to send your deposit by FRIDAY or else your room will be given to someone else. • It’s your lucky day! Sounds amazing, right? Well, you may know this is fake, but unfortunately a lot of people, including the elderly, fall for popular scams similar to this all the time. • Most email platforms have pre-installed anti- spam protection so that spam emails will go straight into the folder and never be seen. But when it comes to phone calls, your knowledge is your only protection • When in doubt, don’t respond: Fraudulent text messages, calls and voicemails are on the rise. Just as with email, mobile requests for personal data or immediate action are almost always scams.
  • 19. What do we need to do?
  • 20. Create a common Digital Hygiene Policy • Be vigilant >>think and assess before you click<< • Always use strong passwords. • Disable unwanted and idle services such as Bluetooth, WIFI as theses can offer an easy way for a nearby unauthorized user to access your device. • Connect with Care: Public wireless networks and hotspots are not secure, which means that anyone could potentially see what you are doing on your laptop or smartphone while you are connected to them. Limit what you do on public WiFi, and avoid logging in to key accounts like email and financial services. Consider using a virtual private network (VPN) or a personal/mobile hotspot if you need a more secure connection
  • 21.
  • 22. Keep track of where you are logged in • Log out all accounts after use • While you should always sign out of accounts when you are using public devices, there is more to keeping track of where you are logged in. We sign up for new accounts and subscriptions every day, and often, we forget about them. • Keep track of where you sign up and, periodically, delete the accounts that you don’t use. You don’t want your information in places that you don’t regularly frequent. Stay safe by always knowing who has your information.
  • 23. Using WhatsApp Web Securely
  • 24.
  • 25. Protecting your identity- Incognito mode. Personal information is like money – Value it. Protect it: Information about you, such as what you search for online and where you shop and live, has value – just like money. Be thoughtful about who gets that information and how it’s collected through apps and websites
  • 26. Google 2 Step Authentication.
  • 27. Software Updates: Updating the software you use, or perhaps getting better versions should be a part of your regular hygienic review Hardware Updates: Older computers and smartphones may need to be updated to maintain performance and prevent issues. Manage New Installs: Every new install should be done properly and documented to keep an updated inventory of all hardware and software Limit Users: Only those who need admin-level access to programs should have access. Other users should have limited capabilities • Back Up Data: All data should be backed up to a secondary source Hard drive or cloud storage(i.e. Onedrive, google drive, dropbox…)
  • 29. Encrypting Software for Computers • Mailvelope Gmail • BitLocker • VeraCrypt • Crypto expert • WinZip • AX Crypt Mac Devices/Apple • Encrypto • Mailvelope Gmail • Hider 2 • Cisdem App Crypt • GNU Privacy Guard
  • 30. Encrypting Software for Mobile Gadgets • Kyms (keep your media safe) • Syncthing • OpenKeychain • FreeOTP Authenticator • Silent Phone • Cyph • Cryptomator • Confide • Pryvate
  • 31. Digital Security means developing a protective routine to keep your personal and financial information secure when using your computer or mobile device. Using strong passwords and changing them regularly, keeping software and operating systems up to date, wiping hard drives, and using a comprehensive antivirus will help you stay ahead of the latest cyber threats.