 ANYTHING YOU POST ON THE INTERNET IT
WILL BE THERE FOR A LONG TIME
 73%OF TEEN AND 68% OF YOUNG ADULTS
USE SOCIAL NETWORKS
 AND THE HALF OF THEM POST PERSONAL
INFORMATION ON THEN
 IF YOU DO THAT, THE HACKERS OR PEOPLE
CAN ATTACK YOU
 IN THE ERA OF SMARTPHONES
CIBERSAFETY SHOULD EXTEND TO YOUR
SMARTPHONE TOO
 DONT ACCEPT INCOMING CALLS OF TEXT
FROM UNKNOWN PEOPLE
 NO MATTER HOW SECURE YOU ARE, YOU
CAN STILL GET HACKED
1. CHANGE YOUR PASSWORD AND MAKE IT
IMPREDICTIBLE.
2. DO THE TWO STEPS VERIFICATION
3. CHECK YOUR BOX AND NOTIFY YOUR
CONTACTS
4. SEARCH VIRUS
5. BACK UP YOUR FILES
 YOU MUST HAVE ACTUALIZED YOUR
OPERATING SISTEM AND APPLICATIONS
WITH THE NEWEST SECUITY SISTEM
 TIP 6: DONT DOWNLOAD ANITHING FROM A
SUSPICIUS PAGE
 IF YOU DOWNLOAD SOMETHING FROM A
SUSPICIUS PAGE, IT CAN HAVE VIRUS
 TIP 7: ACCEPT ONLY KNOWN CONTACTS
 BECAUSE IF YOU ACCEPT ALL THE
CONTACTS YOU HAVE, ITS POSSIBLE THAT
ONE OF THEM CAN BE DANGEROUS
 IF A HACKER ATTACK YOU, IT WILL BE MORE
DIFFICULT TO DO IT IF YOU HAVE A STRONG
PASSWORD

Internet more secure

  • 3.
     ANYTHING YOUPOST ON THE INTERNET IT WILL BE THERE FOR A LONG TIME
  • 5.
     73%OF TEENAND 68% OF YOUNG ADULTS USE SOCIAL NETWORKS  AND THE HALF OF THEM POST PERSONAL INFORMATION ON THEN  IF YOU DO THAT, THE HACKERS OR PEOPLE CAN ATTACK YOU
  • 7.
     IN THEERA OF SMARTPHONES CIBERSAFETY SHOULD EXTEND TO YOUR SMARTPHONE TOO  DONT ACCEPT INCOMING CALLS OF TEXT FROM UNKNOWN PEOPLE
  • 9.
     NO MATTERHOW SECURE YOU ARE, YOU CAN STILL GET HACKED 1. CHANGE YOUR PASSWORD AND MAKE IT IMPREDICTIBLE. 2. DO THE TWO STEPS VERIFICATION 3. CHECK YOUR BOX AND NOTIFY YOUR CONTACTS 4. SEARCH VIRUS 5. BACK UP YOUR FILES
  • 11.
     YOU MUSTHAVE ACTUALIZED YOUR OPERATING SISTEM AND APPLICATIONS WITH THE NEWEST SECUITY SISTEM
  • 12.
     TIP 6:DONT DOWNLOAD ANITHING FROM A SUSPICIUS PAGE
  • 13.
     IF YOUDOWNLOAD SOMETHING FROM A SUSPICIUS PAGE, IT CAN HAVE VIRUS
  • 14.
     TIP 7:ACCEPT ONLY KNOWN CONTACTS
  • 15.
     BECAUSE IFYOU ACCEPT ALL THE CONTACTS YOU HAVE, ITS POSSIBLE THAT ONE OF THEM CAN BE DANGEROUS
  • 17.
     IF AHACKER ATTACK YOU, IT WILL BE MORE DIFFICULT TO DO IT IF YOU HAVE A STRONG PASSWORD