SlideShare a Scribd company logo
#CyberSecMonth
#ThinkB4UClick
?
When you’re completing a profile for an account,
only give information that is necessary and that
you are comfortable giving.
Use the privacy and security settings and
disable any features you don’t need.
If you’re unsure about it, reconsider creating the
profile with that company.
1. Be aware of what information
you are sharing
Posting when you’re emotional is not always a
good idea, what you post online stays there
forever. Even if you delete it afterwards, someone
could have saved or forwarded it.
Wait until you are calmer then think about it again,
do you really want to post that comment?
2. Think before you post
If you’re posting a photo, have you
considered if everyone in the photo is
happy for you to publish it? You may be
giving away information, like where you live.
And posting pictures from your amazing
holiday is telling burglars you are not at
home!
3. Consider the consequences
Before you take part in that fun game that is
doing the rounds on social media, consider
what they are asking you - your first pet’s
name, your mother’s maiden name?
These are the same questions that are used for
security, for example by the bank, so answering
them could be giving important information
to hackers.
4. Pause before you play
Following the news and asking family and
friends to let you know about scams that are in
circulation e.g. phishing scams, malicious
software (like Flubot) and fake websites can
help you stay safe online.
For other sources of information for your
country visit
https://cybersecuritymonth.eu/cyber-first-aid
Stay vigilant!
6. Stay tuned to cybersecurity news
Be aware that scammers use social networks,
websites and send messages to your phone to steal
your information, your money or your identity.
You can protect yourself by not giving any
personal information, money or account details
unless you can verify by another means of
communication who you are sharing them with.
5. Make sure you know who you
are communicating with
Going online helps you stay connected with family and friends, keeps you up to date
with news, gives you access to online learning and much more. But it is always a good
idea to keep security in mind and there are lots of things you can do to protect yourself.
Top Tips for Protecting
Yourself Online

More Related Content

What's hot

Internet Safety for 1950s Adults and Beginners
Internet Safety for 1950s Adults and BeginnersInternet Safety for 1950s Adults and Beginners
Internet Safety for 1950s Adults and Beginners
Rajesh Soundararajan
 
Email hacking
Email hackingEmail hacking
Email hacking
ShreyaBhoje
 
How to Avoid Crypto Scams - Crypto JBro
How to Avoid Crypto Scams - Crypto JBroHow to Avoid Crypto Scams - Crypto JBro
How to Avoid Crypto Scams - Crypto JBro
Jared Broker
 
Cybercrime
CybercrimeCybercrime
Slideshow - Lil Rat
Slideshow - Lil RatSlideshow - Lil Rat
Slideshow - Lil Ratmegg16
 
Junior secondary yr 7:8 aug 18 4.3 preview
Junior secondary yr 7:8 aug 18 4.3 previewJunior secondary yr 7:8 aug 18 4.3 preview
Junior secondary yr 7:8 aug 18 4.3 preview
Leonie Smith
 
Introduction to Hacking
Introduction to HackingIntroduction to Hacking
Introduction to Hacking
leet detected
 
Internet Security - Naga Rohit S [ IIT Guwahati ] - Coding Club & DefCon DC91...
Internet Security - Naga Rohit S [ IIT Guwahati ] - Coding Club & DefCon DC91...Internet Security - Naga Rohit S [ IIT Guwahati ] - Coding Club & DefCon DC91...
Internet Security - Naga Rohit S [ IIT Guwahati ] - Coding Club & DefCon DC91...
Naga Rohit
 
Passwords for sale
Passwords for salePasswords for sale
Passwords for sale
Ramiro Cid
 
Internet Security
Internet SecurityInternet Security
Internet Security
Avnish Jain
 
Email Security Awareness
Email Security AwarenessEmail Security Awareness
Email Security Awareness
Dale Rapp
 
Don't ask, don't tell the virtues of privacy by design
Don't ask, don't tell   the virtues of privacy by designDon't ask, don't tell   the virtues of privacy by design
Don't ask, don't tell the virtues of privacy by design
Eleanor McHugh
 
Getting inside the cybercriminal's m ind
Getting inside the cybercriminal's m ind Getting inside the cybercriminal's m ind
Getting inside the cybercriminal's m ind
Alin Adrian Florea
 
Cybersafety Checklist for Writers
Cybersafety Checklist for WritersCybersafety Checklist for Writers
Cybersafety Checklist for Writers
Shennandoah Diaz
 
Internet Safety & Cyber chip presentation
Internet Safety & Cyber chip presentationInternet Safety & Cyber chip presentation
Internet Safety & Cyber chip presentation
MitchFeigenbaum
 
Net 213 Policy Primer
Net 213 Policy PrimerNet 213 Policy Primer
Net 213 Policy Primer
cheahwey
 
How to incrementally improve Sanctions Screening with AI
How to incrementally improve Sanctions Screening with AIHow to incrementally improve Sanctions Screening with AI
How to incrementally improve Sanctions Screening with AI
BLECKWEN
 

What's hot (20)

Internet Safety for 1950s Adults and Beginners
Internet Safety for 1950s Adults and BeginnersInternet Safety for 1950s Adults and Beginners
Internet Safety for 1950s Adults and Beginners
 
Email hacking
Email hackingEmail hacking
Email hacking
 
How to Avoid Crypto Scams - Crypto JBro
How to Avoid Crypto Scams - Crypto JBroHow to Avoid Crypto Scams - Crypto JBro
How to Avoid Crypto Scams - Crypto JBro
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Slideshow - Lil Rat
Slideshow - Lil RatSlideshow - Lil Rat
Slideshow - Lil Rat
 
Junior secondary yr 7:8 aug 18 4.3 preview
Junior secondary yr 7:8 aug 18 4.3 previewJunior secondary yr 7:8 aug 18 4.3 preview
Junior secondary yr 7:8 aug 18 4.3 preview
 
Internet fraud and identity theft
Internet fraud and identity theftInternet fraud and identity theft
Internet fraud and identity theft
 
Introduction to Hacking
Introduction to HackingIntroduction to Hacking
Introduction to Hacking
 
Internet Security - Naga Rohit S [ IIT Guwahati ] - Coding Club & DefCon DC91...
Internet Security - Naga Rohit S [ IIT Guwahati ] - Coding Club & DefCon DC91...Internet Security - Naga Rohit S [ IIT Guwahati ] - Coding Club & DefCon DC91...
Internet Security - Naga Rohit S [ IIT Guwahati ] - Coding Club & DefCon DC91...
 
Passwords for sale
Passwords for salePasswords for sale
Passwords for sale
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Email Security Awareness
Email Security AwarenessEmail Security Awareness
Email Security Awareness
 
Don't ask, don't tell the virtues of privacy by design
Don't ask, don't tell   the virtues of privacy by designDon't ask, don't tell   the virtues of privacy by design
Don't ask, don't tell the virtues of privacy by design
 
Webspoofing
WebspoofingWebspoofing
Webspoofing
 
Getting inside the cybercriminal's m ind
Getting inside the cybercriminal's m ind Getting inside the cybercriminal's m ind
Getting inside the cybercriminal's m ind
 
Cybersafety Checklist for Writers
Cybersafety Checklist for WritersCybersafety Checklist for Writers
Cybersafety Checklist for Writers
 
Internet Safety & Cyber chip presentation
Internet Safety & Cyber chip presentationInternet Safety & Cyber chip presentation
Internet Safety & Cyber chip presentation
 
Net 213 Policy Primer
Net 213 Policy PrimerNet 213 Policy Primer
Net 213 Policy Primer
 
How to incrementally improve Sanctions Screening with AI
How to incrementally improve Sanctions Screening with AIHow to incrementally improve Sanctions Screening with AI
How to incrementally improve Sanctions Screening with AI
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 

Similar to ECSM 2021 - Sfaturi pentru a te proteja în mediul online

Dos and don's on social media
Dos and don's on social mediaDos and don's on social media
Dos and don's on social media
sanjeev kumar
 
Student book key unit3
Student book key unit3Student book key unit3
Student book key unit3
jesusmlaz
 
EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2
JayMarkBandoy1
 
Heads up!
Heads up!Heads up!
Internet safety guide
Internet safety guide Internet safety guide
Internet safety guide
Dee Tutino
 
The Social Safety Guide
The Social Safety GuideThe Social Safety Guide
The Social Safety Guide
Dee Tutino
 
Cyber crime alert - Copy.pptx
Cyber crime alert - Copy.pptxCyber crime alert - Copy.pptx
Cyber crime alert - Copy.pptx
TCPSM
 
Lesson 2 rules of netiquette
Lesson 2 rules of netiquetteLesson 2 rules of netiquette
Lesson 2 rules of netiquette
EmmanuelaSernicul
 
10.a guide-to-facebook-security
10.a guide-to-facebook-security10.a guide-to-facebook-security
10.a guide-to-facebook-security
robert mota
 
Users guide
Users guideUsers guide
Users guide
Darren Thomas
 
Guide to facebook security
Guide to facebook securityGuide to facebook security
Guide to facebook security
guadalinfoyunquera
 
Guide to facebook security
Guide to facebook securityGuide to facebook security
Guide to facebook securityErnest Staats
 
DIgital Citizenship for Parents of Middle School Students
DIgital Citizenship for Parents of Middle School StudentsDIgital Citizenship for Parents of Middle School Students
DIgital Citizenship for Parents of Middle School Students
Leon Letkeman
 
MindMake - Online Safety Talking to your Kids Parental Control
MindMake - Online Safety Talking to your Kids Parental ControlMindMake - Online Safety Talking to your Kids Parental Control
MindMake - Online Safety Talking to your Kids Parental Control
MindMake - Parenting & Education
 
Social Media Safety Presentation
Social Media Safety PresentationSocial Media Safety Presentation
Social Media Safety Presentation
LJ Henshell
 
INTERNET SECUIRTY TIPS
INTERNET SECUIRTY TIPSINTERNET SECUIRTY TIPS
INTERNET SECUIRTY TIPS
Santosh Khadsare
 
Girls security abuse - social media - security tips.arise raabi - pdf
Girls security   abuse - social media - security tips.arise raabi - pdfGirls security   abuse - social media - security tips.arise raabi - pdf
Girls security abuse - social media - security tips.arise raabi - pdf
Arise Roby
 
Cyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threats
mkinzie
 

Similar to ECSM 2021 - Sfaturi pentru a te proteja în mediul online (20)

Dos and don's on social media
Dos and don's on social mediaDos and don's on social media
Dos and don's on social media
 
Student book key unit3
Student book key unit3Student book key unit3
Student book key unit3
 
EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2
 
Heads up!
Heads up!Heads up!
Heads up!
 
Internet safety guide
Internet safety guide Internet safety guide
Internet safety guide
 
The Social Safety Guide
The Social Safety GuideThe Social Safety Guide
The Social Safety Guide
 
Cyber crime alert - Copy.pptx
Cyber crime alert - Copy.pptxCyber crime alert - Copy.pptx
Cyber crime alert - Copy.pptx
 
Lesson 2 rules of netiquette
Lesson 2 rules of netiquetteLesson 2 rules of netiquette
Lesson 2 rules of netiquette
 
10.a guide-to-facebook-security
10.a guide-to-facebook-security10.a guide-to-facebook-security
10.a guide-to-facebook-security
 
Users guide
Users guideUsers guide
Users guide
 
Guide to facebook security
Guide to facebook securityGuide to facebook security
Guide to facebook security
 
Guide to facebook security
Guide to facebook securityGuide to facebook security
Guide to facebook security
 
DIgital Citizenship for Parents of Middle School Students
DIgital Citizenship for Parents of Middle School StudentsDIgital Citizenship for Parents of Middle School Students
DIgital Citizenship for Parents of Middle School Students
 
MindMake - Online Safety Talking to your Kids Parental Control
MindMake - Online Safety Talking to your Kids Parental ControlMindMake - Online Safety Talking to your Kids Parental Control
MindMake - Online Safety Talking to your Kids Parental Control
 
Social Media Safety Presentation
Social Media Safety PresentationSocial Media Safety Presentation
Social Media Safety Presentation
 
INTERNET SECUIRTY TIPS
INTERNET SECUIRTY TIPSINTERNET SECUIRTY TIPS
INTERNET SECUIRTY TIPS
 
Girls security abuse - social media - security tips.arise raabi - pdf
Girls security   abuse - social media - security tips.arise raabi - pdfGirls security   abuse - social media - security tips.arise raabi - pdf
Girls security abuse - social media - security tips.arise raabi - pdf
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Cyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threats
 

More from One-IT

Centralizator întrebări și răspunsuri Digitalizare IMM.doc
Centralizator întrebări și răspunsuri Digitalizare IMM.docCentralizator întrebări și răspunsuri Digitalizare IMM.doc
Centralizator întrebări și răspunsuri Digitalizare IMM.doc
One-IT
 
Ghid final Digitalizare IMM
Ghid final Digitalizare IMMGhid final Digitalizare IMM
Ghid final Digitalizare IMM
One-IT
 
Corrigendum-ul la Ghidul solicitantului POC 4.1.1. Bis.pdf
Corrigendum-ul la Ghidul solicitantului POC 4.1.1. Bis.pdfCorrigendum-ul la Ghidul solicitantului POC 4.1.1. Bis.pdf
Corrigendum-ul la Ghidul solicitantului POC 4.1.1. Bis.pdf
One-IT
 
Ghidul solicitantului 4.1.1. BIS.pdf
Ghidul solicitantului 4.1.1. BIS.pdfGhidul solicitantului 4.1.1. BIS.pdf
Ghidul solicitantului 4.1.1. BIS.pdf
One-IT
 
Ghidul Solicitantului varianta intermediară 4.1.1 BIS.docx
Ghidul Solicitantului varianta intermediară 4.1.1 BIS.docxGhidul Solicitantului varianta intermediară 4.1.1 BIS.docx
Ghidul Solicitantului varianta intermediară 4.1.1 BIS.docx
One-IT
 
Ordonanța 19/2022 cu privire la rectificarea bugetului de stat pe anul 2022
Ordonanța 19/2022 cu privire la rectificarea bugetului de stat pe anul 2022Ordonanța 19/2022 cu privire la rectificarea bugetului de stat pe anul 2022
Ordonanța 19/2022 cu privire la rectificarea bugetului de stat pe anul 2022
One-IT
 
Ordonanța de Urgență 113/2022 privind acțiunea POC 4.1.1. Bis.pdf
Ordonanța de Urgență 113/2022 privind acțiunea POC 4.1.1. Bis.pdfOrdonanța de Urgență 113/2022 privind acțiunea POC 4.1.1. Bis.pdf
Ordonanța de Urgență 113/2022 privind acțiunea POC 4.1.1. Bis.pdf
One-IT
 
Ghid 4.1.1 BIS Industrie alimentară și construcții - Consultare Publică.docx
Ghid 4.1.1 BIS Industrie alimentară și construcții - Consultare Publică.docxGhid 4.1.1 BIS Industrie alimentară și construcții - Consultare Publică.docx
Ghid 4.1.1 BIS Industrie alimentară și construcții - Consultare Publică.docx
One-IT
 
Procedura-femeia-antreprenor-2022.pdf
Procedura-femeia-antreprenor-2022.pdfProcedura-femeia-antreprenor-2022.pdf
Procedura-femeia-antreprenor-2022.pdf
One-IT
 
Ghidul final al solicitantului Acțiunea 4.1.1 Investiții în activități produc...
Ghidul final al solicitantului Acțiunea 4.1.1 Investiții în activități produc...Ghidul final al solicitantului Acțiunea 4.1.1 Investiții în activități produc...
Ghidul final al solicitantului Acțiunea 4.1.1 Investiții în activități produc...
One-IT
 
Ghid actiunea 4.1.1 versiunea consolidata.docx
Ghid actiunea 4.1.1 versiunea consolidata.docxGhid actiunea 4.1.1 versiunea consolidata.docx
Ghid actiunea 4.1.1 versiunea consolidata.docx
One-IT
 
Ghid actiunea 4.1.1 versiunea consolidata 18.02.2022
Ghid actiunea 4.1.1 versiunea consolidata 18.02.2022Ghid actiunea 4.1.1 versiunea consolidata 18.02.2022
Ghid actiunea 4.1.1 versiunea consolidata 18.02.2022
One-IT
 
Cum te protejezi de tentativele de tip scam în business
Cum te protejezi de tentativele de tip scam în businessCum te protejezi de tentativele de tip scam în business
Cum te protejezi de tentativele de tip scam în business
One-IT
 
ECSM 2021 - Cum previi atacurile de tip phishing
ECSM 2021 - Cum previi atacurile de tip phishingECSM 2021 - Cum previi atacurile de tip phishing
ECSM 2021 - Cum previi atacurile de tip phishing
One-IT
 
ECSM 2021- Informații importante despre amprenta ta digitală
ECSM 2021- Informații importante despre amprenta ta digitalăECSM 2021- Informații importante despre amprenta ta digitală
ECSM 2021- Informații importante despre amprenta ta digitală
One-IT
 
Ghidul digitalizarea IMM oipsi consultare publica
Ghidul digitalizarea IMM oipsi consultare publicaGhidul digitalizarea IMM oipsi consultare publica
Ghidul digitalizarea IMM oipsi consultare publica
One-IT
 
Ghid poc imbunatatirea continutului digital si a infrastructurii TIC sistemic...
Ghid poc imbunatatirea continutului digital si a infrastructurii TIC sistemic...Ghid poc imbunatatirea continutului digital si a infrastructurii TIC sistemic...
Ghid poc imbunatatirea continutului digital si a infrastructurii TIC sistemic...
One-IT
 
Poly Eagle eye Mini
Poly Eagle eye MiniPoly Eagle eye Mini
Poly Eagle eye Mini
One-IT
 
Ghid cu contributie privata - Propunerea de ghid al solicitantului pentru acc...
Ghid cu contributie privata - Propunerea de ghid al solicitantului pentru acc...Ghid cu contributie privata - Propunerea de ghid al solicitantului pentru acc...
Ghid cu contributie privata - Propunerea de ghid al solicitantului pentru acc...
One-IT
 
One-IT - prezentare GDPR-ul si Protectia datelor personale
One-IT - prezentare GDPR-ul si Protectia datelor personaleOne-IT - prezentare GDPR-ul si Protectia datelor personale
One-IT - prezentare GDPR-ul si Protectia datelor personale
One-IT
 

More from One-IT (20)

Centralizator întrebări și răspunsuri Digitalizare IMM.doc
Centralizator întrebări și răspunsuri Digitalizare IMM.docCentralizator întrebări și răspunsuri Digitalizare IMM.doc
Centralizator întrebări și răspunsuri Digitalizare IMM.doc
 
Ghid final Digitalizare IMM
Ghid final Digitalizare IMMGhid final Digitalizare IMM
Ghid final Digitalizare IMM
 
Corrigendum-ul la Ghidul solicitantului POC 4.1.1. Bis.pdf
Corrigendum-ul la Ghidul solicitantului POC 4.1.1. Bis.pdfCorrigendum-ul la Ghidul solicitantului POC 4.1.1. Bis.pdf
Corrigendum-ul la Ghidul solicitantului POC 4.1.1. Bis.pdf
 
Ghidul solicitantului 4.1.1. BIS.pdf
Ghidul solicitantului 4.1.1. BIS.pdfGhidul solicitantului 4.1.1. BIS.pdf
Ghidul solicitantului 4.1.1. BIS.pdf
 
Ghidul Solicitantului varianta intermediară 4.1.1 BIS.docx
Ghidul Solicitantului varianta intermediară 4.1.1 BIS.docxGhidul Solicitantului varianta intermediară 4.1.1 BIS.docx
Ghidul Solicitantului varianta intermediară 4.1.1 BIS.docx
 
Ordonanța 19/2022 cu privire la rectificarea bugetului de stat pe anul 2022
Ordonanța 19/2022 cu privire la rectificarea bugetului de stat pe anul 2022Ordonanța 19/2022 cu privire la rectificarea bugetului de stat pe anul 2022
Ordonanța 19/2022 cu privire la rectificarea bugetului de stat pe anul 2022
 
Ordonanța de Urgență 113/2022 privind acțiunea POC 4.1.1. Bis.pdf
Ordonanța de Urgență 113/2022 privind acțiunea POC 4.1.1. Bis.pdfOrdonanța de Urgență 113/2022 privind acțiunea POC 4.1.1. Bis.pdf
Ordonanța de Urgență 113/2022 privind acțiunea POC 4.1.1. Bis.pdf
 
Ghid 4.1.1 BIS Industrie alimentară și construcții - Consultare Publică.docx
Ghid 4.1.1 BIS Industrie alimentară și construcții - Consultare Publică.docxGhid 4.1.1 BIS Industrie alimentară și construcții - Consultare Publică.docx
Ghid 4.1.1 BIS Industrie alimentară și construcții - Consultare Publică.docx
 
Procedura-femeia-antreprenor-2022.pdf
Procedura-femeia-antreprenor-2022.pdfProcedura-femeia-antreprenor-2022.pdf
Procedura-femeia-antreprenor-2022.pdf
 
Ghidul final al solicitantului Acțiunea 4.1.1 Investiții în activități produc...
Ghidul final al solicitantului Acțiunea 4.1.1 Investiții în activități produc...Ghidul final al solicitantului Acțiunea 4.1.1 Investiții în activități produc...
Ghidul final al solicitantului Acțiunea 4.1.1 Investiții în activități produc...
 
Ghid actiunea 4.1.1 versiunea consolidata.docx
Ghid actiunea 4.1.1 versiunea consolidata.docxGhid actiunea 4.1.1 versiunea consolidata.docx
Ghid actiunea 4.1.1 versiunea consolidata.docx
 
Ghid actiunea 4.1.1 versiunea consolidata 18.02.2022
Ghid actiunea 4.1.1 versiunea consolidata 18.02.2022Ghid actiunea 4.1.1 versiunea consolidata 18.02.2022
Ghid actiunea 4.1.1 versiunea consolidata 18.02.2022
 
Cum te protejezi de tentativele de tip scam în business
Cum te protejezi de tentativele de tip scam în businessCum te protejezi de tentativele de tip scam în business
Cum te protejezi de tentativele de tip scam în business
 
ECSM 2021 - Cum previi atacurile de tip phishing
ECSM 2021 - Cum previi atacurile de tip phishingECSM 2021 - Cum previi atacurile de tip phishing
ECSM 2021 - Cum previi atacurile de tip phishing
 
ECSM 2021- Informații importante despre amprenta ta digitală
ECSM 2021- Informații importante despre amprenta ta digitalăECSM 2021- Informații importante despre amprenta ta digitală
ECSM 2021- Informații importante despre amprenta ta digitală
 
Ghidul digitalizarea IMM oipsi consultare publica
Ghidul digitalizarea IMM oipsi consultare publicaGhidul digitalizarea IMM oipsi consultare publica
Ghidul digitalizarea IMM oipsi consultare publica
 
Ghid poc imbunatatirea continutului digital si a infrastructurii TIC sistemic...
Ghid poc imbunatatirea continutului digital si a infrastructurii TIC sistemic...Ghid poc imbunatatirea continutului digital si a infrastructurii TIC sistemic...
Ghid poc imbunatatirea continutului digital si a infrastructurii TIC sistemic...
 
Poly Eagle eye Mini
Poly Eagle eye MiniPoly Eagle eye Mini
Poly Eagle eye Mini
 
Ghid cu contributie privata - Propunerea de ghid al solicitantului pentru acc...
Ghid cu contributie privata - Propunerea de ghid al solicitantului pentru acc...Ghid cu contributie privata - Propunerea de ghid al solicitantului pentru acc...
Ghid cu contributie privata - Propunerea de ghid al solicitantului pentru acc...
 
One-IT - prezentare GDPR-ul si Protectia datelor personale
One-IT - prezentare GDPR-ul si Protectia datelor personaleOne-IT - prezentare GDPR-ul si Protectia datelor personale
One-IT - prezentare GDPR-ul si Protectia datelor personale
 

Recently uploaded

20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 

Recently uploaded (20)

20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 

ECSM 2021 - Sfaturi pentru a te proteja în mediul online

  • 1. #CyberSecMonth #ThinkB4UClick ? When you’re completing a profile for an account, only give information that is necessary and that you are comfortable giving. Use the privacy and security settings and disable any features you don’t need. If you’re unsure about it, reconsider creating the profile with that company. 1. Be aware of what information you are sharing Posting when you’re emotional is not always a good idea, what you post online stays there forever. Even if you delete it afterwards, someone could have saved or forwarded it. Wait until you are calmer then think about it again, do you really want to post that comment? 2. Think before you post If you’re posting a photo, have you considered if everyone in the photo is happy for you to publish it? You may be giving away information, like where you live. And posting pictures from your amazing holiday is telling burglars you are not at home! 3. Consider the consequences Before you take part in that fun game that is doing the rounds on social media, consider what they are asking you - your first pet’s name, your mother’s maiden name? These are the same questions that are used for security, for example by the bank, so answering them could be giving important information to hackers. 4. Pause before you play Following the news and asking family and friends to let you know about scams that are in circulation e.g. phishing scams, malicious software (like Flubot) and fake websites can help you stay safe online. For other sources of information for your country visit https://cybersecuritymonth.eu/cyber-first-aid Stay vigilant! 6. Stay tuned to cybersecurity news Be aware that scammers use social networks, websites and send messages to your phone to steal your information, your money or your identity. You can protect yourself by not giving any personal information, money or account details unless you can verify by another means of communication who you are sharing them with. 5. Make sure you know who you are communicating with Going online helps you stay connected with family and friends, keeps you up to date with news, gives you access to online learning and much more. But it is always a good idea to keep security in mind and there are lots of things you can do to protect yourself. Top Tips for Protecting Yourself Online