SlideShare a Scribd company logo
Protecting Your Identity Online 
BY JON LOYD 
WIZARDS COMPUTER REPAIR 
ANGIER NC 
HTTP: / /WWW.WIZARDSCOMPUTER.COM
Your smartphone 
and computer 
store passwords, 
emails and other 
personal 
information
Protect your phone 
and computer with 
antivirus software 
More Information: Antivirus Basics
Use the Windows firewall to block attacks from the internet
Use strong 
passwords 
Numbers: 1 – 9 
CApitAl LEttErs 
&_Symb@ls
Use two factor authentication 
where possible 
ID + Password + Something else 
Time sensitive codes 
Text messages 
SecurID USB dongles
Encryption 
protects your 
personal data 
in the event of 
physical theft 
Even weak 
encryption will 
deter most 
identity 
thieves
Lock your Credit 
Require additional information open new credit lines 
Experian cedit freeze 
Trans Union credit freeze 
Equifax credit freeze
Learn to spot scams 
and phishing attacks 
No one reputable will 
ask for your personal 
information via email
References 
 http://www.webroot.com/us/en/home/resources/ti 
ps/getting-started/beginners-how-can-i-protect-myself- 
from-identity-theft-online 
 https://www.experian.com/freeze/center.html 
 http://www.transunion.com/personal-credit/credit-disputes/ 
credit-freezes.page
Image references 
 http://www7.pcmag.com/media/images/445346-how-to-use-your-smartphone-for-two- 
factor-authentication.jpg?thumb=y&width=740&height=426 
 http://fc07.deviantart.net/fs71/i/2010/106/f/3/Avast_Antivirus_by_cr1t1cal.jpg 
 https://openclipart.org/image/300px/svg_to_png/169487/seguridad.png 
 http://upload.wikimedia.org/wikipedia/commons/9/98/SafeWalletLogo.png 
 http://upload.wikimedia.org/wikipedia/commons/8/8f/RSA_SecurID_SID800.jpg 
 http://4.bp.blogspot.com/- 
_RMfizJiuks/UQ6hxlAKQNI/AAAAAAAAQds/5jB8C9STQ-Q/s1600/teten-govt-security- 
cartoon.png 
 http://upload.wikimedia.org/wikipedia/commons/d/db/MoSYS_SGRAM.jpg 
 http://pixabay.com/p-1778/?no_redirect 
 https://openclipart.org/image/300px/svg_to_png/188461/gesloten_slot.png 
 https://c2.staticflickr.com/2/1373/1276202472_875ce2a422.jpg

More Related Content

What's hot

Online safety, security, and ethics
Online safety, security, and ethicsOnline safety, security, and ethics
Online safety, security, and ethics
Johnlery Guzman
 
CYBER ETHICS, CRIMES AND SAFTY
CYBER ETHICS, CRIMES AND SAFTYCYBER ETHICS, CRIMES AND SAFTY
CYBER ETHICS, CRIMES AND SAFTY
FaMulan2
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
zahid_ned
 
Internet Security Guidelines for Teachers and Students
Internet Security Guidelines for Teachers and Students    Internet Security Guidelines for Teachers and Students
Internet Security Guidelines for Teachers and Students
Antony Rappai
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
Uday Bhaskarwar
 
Cyber security
Cyber securityCyber security
Cyber security
Debaroy1995
 
End user security awareness
End user security awarenessEnd user security awareness
End user security awareness
Kanishk Raj
 
Seminar
SeminarSeminar
Seminar
Kavis Pandey
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
DigitalLifeAdvisor.com
 
negative implications of IT
negative implications of ITnegative implications of IT
negative implications of IT
MahdiRahmani15
 
Sip 140208055023-phpapp02
Sip 140208055023-phpapp02Sip 140208055023-phpapp02
Sip 140208055023-phpapp02
mark scott
 
internet security
internet securityinternet security
internet security
Cheryl Tanicala-Roldan
 
Alpha Tech Module7 8 glossary
Alpha Tech Module7 8 glossaryAlpha Tech Module7 8 glossary
Alpha Tech Module7 8 glossary
thinkict
 
Security terms & definitions
Security terms & definitionsSecurity terms & definitions
Security terms & definitions
Rozell Sneede
 
ESET_MOBILE_SECURITY_business--edition
ESET_MOBILE_SECURITY_business--editionESET_MOBILE_SECURITY_business--edition
ESET_MOBILE_SECURITY_business--edition
ESET Belgique & Luxembourg
 
Internet Security
Internet SecurityInternet Security
Internet Security
mjelson
 
Computer Project on Cyber Safety
Computer Project on Cyber SafetyComputer Project on Cyber Safety
Computer Project on Cyber Safety
Harsh Tekriwal
 
Security awareness
Security awarenessSecurity awareness
Security awareness
Josh Chandler
 
Students, the internet and COVID-19 by Ayush Chopra | MAY 2020 | Issue 1
Students, the internet and COVID-19 by Ayush Chopra | MAY 2020 | Issue 1Students, the internet and COVID-19 by Ayush Chopra | MAY 2020 | Issue 1
Students, the internet and COVID-19 by Ayush Chopra | MAY 2020 | Issue 1
Ayush Chopra
 

What's hot (19)

Online safety, security, and ethics
Online safety, security, and ethicsOnline safety, security, and ethics
Online safety, security, and ethics
 
CYBER ETHICS, CRIMES AND SAFTY
CYBER ETHICS, CRIMES AND SAFTYCYBER ETHICS, CRIMES AND SAFTY
CYBER ETHICS, CRIMES AND SAFTY
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Internet Security Guidelines for Teachers and Students
Internet Security Guidelines for Teachers and Students    Internet Security Guidelines for Teachers and Students
Internet Security Guidelines for Teachers and Students
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
End user security awareness
End user security awarenessEnd user security awareness
End user security awareness
 
Seminar
SeminarSeminar
Seminar
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
negative implications of IT
negative implications of ITnegative implications of IT
negative implications of IT
 
Sip 140208055023-phpapp02
Sip 140208055023-phpapp02Sip 140208055023-phpapp02
Sip 140208055023-phpapp02
 
internet security
internet securityinternet security
internet security
 
Alpha Tech Module7 8 glossary
Alpha Tech Module7 8 glossaryAlpha Tech Module7 8 glossary
Alpha Tech Module7 8 glossary
 
Security terms & definitions
Security terms & definitionsSecurity terms & definitions
Security terms & definitions
 
ESET_MOBILE_SECURITY_business--edition
ESET_MOBILE_SECURITY_business--editionESET_MOBILE_SECURITY_business--edition
ESET_MOBILE_SECURITY_business--edition
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Computer Project on Cyber Safety
Computer Project on Cyber SafetyComputer Project on Cyber Safety
Computer Project on Cyber Safety
 
Security awareness
Security awarenessSecurity awareness
Security awareness
 
Students, the internet and COVID-19 by Ayush Chopra | MAY 2020 | Issue 1
Students, the internet and COVID-19 by Ayush Chopra | MAY 2020 | Issue 1Students, the internet and COVID-19 by Ayush Chopra | MAY 2020 | Issue 1
Students, the internet and COVID-19 by Ayush Chopra | MAY 2020 | Issue 1
 

Viewers also liked

The Supply Chain of Talent
The Supply Chain of TalentThe Supply Chain of Talent
The Supply Chain of Talent
Todd Wheatland
 
Identity theft questionnaire
Identity theft questionnaireIdentity theft questionnaire
Identity theft questionnaire
ibrahim95
 
Identity Theft: Protect Yourself, your Business, your Clients
Identity Theft: Protect Yourself, your Business, your ClientsIdentity Theft: Protect Yourself, your Business, your Clients
Identity Theft: Protect Yourself, your Business, your Clients
Regina Brown
 
Sample of report of theft
Sample of report of theftSample of report of theft
Sample of report of theft
pjiahui
 
Reports
ReportsReports
Reports
anuragyadav94
 
12 report writing i
12 report writing i12 report writing i
12 report writing i
EDIN BROW, DCE, AMET
 
Data Privacy and Protection Presentation
Data Privacy and Protection PresentationData Privacy and Protection Presentation
Data Privacy and Protection Presentation
mlw32785
 
How to Protect Yourself From Identity Theft
How to Protect Yourself From Identity TheftHow to Protect Yourself From Identity Theft
How to Protect Yourself From Identity Theft
Experian_US
 
Introduction to research design
Introduction to research designIntroduction to research design
Introduction to research design
Nursing Path
 
Sampling methods PPT
Sampling methods PPTSampling methods PPT
Sampling methods PPT
Vijay Mehta
 
Ppt on research design
Ppt on research designPpt on research design
Ppt on research design
Satakshi Kaushik
 
Sampling Methods in Qualitative and Quantitative Research
Sampling Methods in Qualitative and Quantitative ResearchSampling Methods in Qualitative and Quantitative Research
Sampling Methods in Qualitative and Quantitative Research
Sam Ladner
 
Research Design
Research DesignResearch Design
Research Design
gaurav22
 
Chapter 8-SAMPLE & SAMPLING TECHNIQUES
Chapter 8-SAMPLE & SAMPLING TECHNIQUESChapter 8-SAMPLE & SAMPLING TECHNIQUES
Chapter 8-SAMPLE & SAMPLING TECHNIQUES
Ludy Mae Nalzaro,BSM,BSN,MN
 
sampling ppt
sampling pptsampling ppt
sampling ppt
Swati Luthra
 
RESEARCH METHOD - SAMPLING
RESEARCH METHOD - SAMPLINGRESEARCH METHOD - SAMPLING
RESEARCH METHOD - SAMPLING
Hafizah Hajimia
 
Types of Research Designs RS Mehta
Types of Research Designs RS MehtaTypes of Research Designs RS Mehta
Types of Research Designs RS Mehta
BP KOIRALA INSTITUTE OF HELATH SCIENCS,, NEPAL
 

Viewers also liked (17)

The Supply Chain of Talent
The Supply Chain of TalentThe Supply Chain of Talent
The Supply Chain of Talent
 
Identity theft questionnaire
Identity theft questionnaireIdentity theft questionnaire
Identity theft questionnaire
 
Identity Theft: Protect Yourself, your Business, your Clients
Identity Theft: Protect Yourself, your Business, your ClientsIdentity Theft: Protect Yourself, your Business, your Clients
Identity Theft: Protect Yourself, your Business, your Clients
 
Sample of report of theft
Sample of report of theftSample of report of theft
Sample of report of theft
 
Reports
ReportsReports
Reports
 
12 report writing i
12 report writing i12 report writing i
12 report writing i
 
Data Privacy and Protection Presentation
Data Privacy and Protection PresentationData Privacy and Protection Presentation
Data Privacy and Protection Presentation
 
How to Protect Yourself From Identity Theft
How to Protect Yourself From Identity TheftHow to Protect Yourself From Identity Theft
How to Protect Yourself From Identity Theft
 
Introduction to research design
Introduction to research designIntroduction to research design
Introduction to research design
 
Sampling methods PPT
Sampling methods PPTSampling methods PPT
Sampling methods PPT
 
Ppt on research design
Ppt on research designPpt on research design
Ppt on research design
 
Sampling Methods in Qualitative and Quantitative Research
Sampling Methods in Qualitative and Quantitative ResearchSampling Methods in Qualitative and Quantitative Research
Sampling Methods in Qualitative and Quantitative Research
 
Research Design
Research DesignResearch Design
Research Design
 
Chapter 8-SAMPLE & SAMPLING TECHNIQUES
Chapter 8-SAMPLE & SAMPLING TECHNIQUESChapter 8-SAMPLE & SAMPLING TECHNIQUES
Chapter 8-SAMPLE & SAMPLING TECHNIQUES
 
sampling ppt
sampling pptsampling ppt
sampling ppt
 
RESEARCH METHOD - SAMPLING
RESEARCH METHOD - SAMPLINGRESEARCH METHOD - SAMPLING
RESEARCH METHOD - SAMPLING
 
Types of Research Designs RS Mehta
Types of Research Designs RS MehtaTypes of Research Designs RS Mehta
Types of Research Designs RS Mehta
 

Similar to Protecting Your Identity Online

Internet Security.pptx
Internet Security.pptxInternet Security.pptx
Internet Security.pptx
havaneb872
 
Matt Luallen Explains What, How and Responding to Identity Theft
Matt Luallen Explains What, How and Responding to Identity TheftMatt Luallen Explains What, How and Responding to Identity Theft
Matt Luallen Explains What, How and Responding to Identity Theft
guest3151b0
 
Identity theft
Identity theftIdentity theft
Identity theft
bhabagrahi dash
 
Lock It Down, Keep It Safe
Lock It Down, Keep It SafeLock It Down, Keep It Safe
Lock It Down, Keep It Safe
aaberra
 
Identity theft in the internet
Identity theft in the internetIdentity theft in the internet
Identity theft in the internet
mohmd-kutbi
 
Cyber Crime Awareness : Staying Safe in the Digital Age
Cyber Crime Awareness : Staying Safe in the Digital AgeCyber Crime Awareness : Staying Safe in the Digital Age
Cyber Crime Awareness : Staying Safe in the Digital Age
Ayushi Yadav
 
The Net is Dangerous
The Net is DangerousThe Net is Dangerous
The Net is Dangerous
Gihan Dias
 
Internet security
Internet securityInternet security
Internet security
Mohamed El-malki
 
Internet secutity ppt by vaishnavi khandelwal
Internet secutity ppt by vaishnavi khandelwalInternet secutity ppt by vaishnavi khandelwal
Internet secutity ppt by vaishnavi khandelwal
VaishnaviKhandelwal6
 
Online Fraud and Identity Theft: Transact Safely - Symantec Corp.
Online Fraud and Identity Theft: Transact Safely - Symantec Corp. Online Fraud and Identity Theft: Transact Safely - Symantec Corp.
Online Fraud and Identity Theft: Transact Safely - Symantec Corp.
mariotoronto
 
HHW OF IT PRESENTATION ON INTERNET SECURITY BY AASTHA SHARMA 10TH KEATS^.pptx
HHW OF IT PRESENTATION ON INTERNET SECURITY BY AASTHA SHARMA 10TH KEATS^.pptxHHW OF IT PRESENTATION ON INTERNET SECURITY BY AASTHA SHARMA 10TH KEATS^.pptx
HHW OF IT PRESENTATION ON INTERNET SECURITY BY AASTHA SHARMA 10TH KEATS^.pptx
HemantSharma134028
 
Cyber crime and security threads
Cyber crime and security threadsCyber crime and security threads
Cyber crime and security threads
Vdidv
 
Home and Business Computer Security 2014
Home and Business Computer Security 2014Home and Business Computer Security 2014
Home and Business Computer Security 2014
B2BPlanner Ltd.
 
W A2 Group P P
W A2  Group  P PW A2  Group  P P
W A2 Group P P
tawnygsu
 
Cyber Crime & Security.pdf
Cyber Crime & Security.pdfCyber Crime & Security.pdf
Cyber Crime & Security.pdf
MohanPandey31
 
Ict lec#9
Ict lec#9Ict lec#9
Ict lec#9
amberkhan59
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101
mateenzero
 
A Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the InternetA Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the Internet
- Mark - Fullbright
 
cybersafety_basics.pptx
cybersafety_basics.pptxcybersafety_basics.pptx
cybersafety_basics.pptx
PraveenKumar313855
 
Presentation for class
Presentation for classPresentation for class
Presentation for class
Jeannine Hamilton
 

Similar to Protecting Your Identity Online (20)

Internet Security.pptx
Internet Security.pptxInternet Security.pptx
Internet Security.pptx
 
Matt Luallen Explains What, How and Responding to Identity Theft
Matt Luallen Explains What, How and Responding to Identity TheftMatt Luallen Explains What, How and Responding to Identity Theft
Matt Luallen Explains What, How and Responding to Identity Theft
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Lock It Down, Keep It Safe
Lock It Down, Keep It SafeLock It Down, Keep It Safe
Lock It Down, Keep It Safe
 
Identity theft in the internet
Identity theft in the internetIdentity theft in the internet
Identity theft in the internet
 
Cyber Crime Awareness : Staying Safe in the Digital Age
Cyber Crime Awareness : Staying Safe in the Digital AgeCyber Crime Awareness : Staying Safe in the Digital Age
Cyber Crime Awareness : Staying Safe in the Digital Age
 
The Net is Dangerous
The Net is DangerousThe Net is Dangerous
The Net is Dangerous
 
Internet security
Internet securityInternet security
Internet security
 
Internet secutity ppt by vaishnavi khandelwal
Internet secutity ppt by vaishnavi khandelwalInternet secutity ppt by vaishnavi khandelwal
Internet secutity ppt by vaishnavi khandelwal
 
Online Fraud and Identity Theft: Transact Safely - Symantec Corp.
Online Fraud and Identity Theft: Transact Safely - Symantec Corp. Online Fraud and Identity Theft: Transact Safely - Symantec Corp.
Online Fraud and Identity Theft: Transact Safely - Symantec Corp.
 
HHW OF IT PRESENTATION ON INTERNET SECURITY BY AASTHA SHARMA 10TH KEATS^.pptx
HHW OF IT PRESENTATION ON INTERNET SECURITY BY AASTHA SHARMA 10TH KEATS^.pptxHHW OF IT PRESENTATION ON INTERNET SECURITY BY AASTHA SHARMA 10TH KEATS^.pptx
HHW OF IT PRESENTATION ON INTERNET SECURITY BY AASTHA SHARMA 10TH KEATS^.pptx
 
Cyber crime and security threads
Cyber crime and security threadsCyber crime and security threads
Cyber crime and security threads
 
Home and Business Computer Security 2014
Home and Business Computer Security 2014Home and Business Computer Security 2014
Home and Business Computer Security 2014
 
W A2 Group P P
W A2  Group  P PW A2  Group  P P
W A2 Group P P
 
Cyber Crime & Security.pdf
Cyber Crime & Security.pdfCyber Crime & Security.pdf
Cyber Crime & Security.pdf
 
Ict lec#9
Ict lec#9Ict lec#9
Ict lec#9
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101
 
A Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the InternetA Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the Internet
 
cybersafety_basics.pptx
cybersafety_basics.pptxcybersafety_basics.pptx
cybersafety_basics.pptx
 
Presentation for class
Presentation for classPresentation for class
Presentation for class
 

Recently uploaded

Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Precisely
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
Miro Wengner
 
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Pitangent Analytics & Technology Solutions Pvt. Ltd
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
saastr
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
DianaGray10
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
DianaGray10
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
Ajin Abraham
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
Safe Software
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
Neo4j
 
Principle of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptxPrinciple of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptx
BibashShahi
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
Ivo Velitchkov
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 

Recently uploaded (20)

Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
 
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
 
Principle of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptxPrinciple of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptx
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 

Protecting Your Identity Online

  • 1. Protecting Your Identity Online BY JON LOYD WIZARDS COMPUTER REPAIR ANGIER NC HTTP: / /WWW.WIZARDSCOMPUTER.COM
  • 2. Your smartphone and computer store passwords, emails and other personal information
  • 3. Protect your phone and computer with antivirus software More Information: Antivirus Basics
  • 4. Use the Windows firewall to block attacks from the internet
  • 5. Use strong passwords Numbers: 1 – 9 CApitAl LEttErs &_Symb@ls
  • 6. Use two factor authentication where possible ID + Password + Something else Time sensitive codes Text messages SecurID USB dongles
  • 7. Encryption protects your personal data in the event of physical theft Even weak encryption will deter most identity thieves
  • 8. Lock your Credit Require additional information open new credit lines Experian cedit freeze Trans Union credit freeze Equifax credit freeze
  • 9. Learn to spot scams and phishing attacks No one reputable will ask for your personal information via email
  • 10. References  http://www.webroot.com/us/en/home/resources/ti ps/getting-started/beginners-how-can-i-protect-myself- from-identity-theft-online  https://www.experian.com/freeze/center.html  http://www.transunion.com/personal-credit/credit-disputes/ credit-freezes.page
  • 11. Image references  http://www7.pcmag.com/media/images/445346-how-to-use-your-smartphone-for-two- factor-authentication.jpg?thumb=y&width=740&height=426  http://fc07.deviantart.net/fs71/i/2010/106/f/3/Avast_Antivirus_by_cr1t1cal.jpg  https://openclipart.org/image/300px/svg_to_png/169487/seguridad.png  http://upload.wikimedia.org/wikipedia/commons/9/98/SafeWalletLogo.png  http://upload.wikimedia.org/wikipedia/commons/8/8f/RSA_SecurID_SID800.jpg  http://4.bp.blogspot.com/- _RMfizJiuks/UQ6hxlAKQNI/AAAAAAAAQds/5jB8C9STQ-Q/s1600/teten-govt-security- cartoon.png  http://upload.wikimedia.org/wikipedia/commons/d/db/MoSYS_SGRAM.jpg  http://pixabay.com/p-1778/?no_redirect  https://openclipart.org/image/300px/svg_to_png/188461/gesloten_slot.png  https://c2.staticflickr.com/2/1373/1276202472_875ce2a422.jpg

Editor's Notes

  1. Many people work hard to secure their computers but often forget that their smart phones are much more prime targets for identity theft. They are small and easy to steal. Unlike a computer, a phone is designed to be out of sight when not in use and most people won’t miss their phones for at least a few minutes after they leave it somewhere, a few minutes is long enough for an identity thief to pocket the phone and walk away with it. Consider that a phone has even more personal information on it than a computer and it becomes a recipe for disaster.
  2. Viruses do more than just delete you data; they can also steal you identifying information from you as well. Think about the Cryptolocker virus for a minute. What if instead of encrypting your personal financial files it copied them to a remote server? The criminals responsible have the ability to decrypt your information at their leisure and the real goal of any virus could just be identity theft or keylogging to get your passwords. It is important to protect your computer and your phone with antivirus software.
  3. Even if you have antivirus software, a firewall is a necessity for locking away all the paths that hackers and viruses use to gain access to your computer remotely. An antivirus can help prevent damage from unintentional user mistakes such as downloading an infected file but a firewall locks off and monitors all the logical ports of an internet connection that users don’t monitor.
  4. Strong passwords include three characteristics that most typical passwords lack: Numbers, capital letters and symbols. By mixing in these three items sporadically in your passwords they increase the number of possible combinations and make them harder for identity thieves to guess at with software. Don’t forget about length. Longer passwords are harder to crack. Consider the time it takes to guess the following passwords: sparkjil -52 seconds, sparkjilt – 22 minutes, spark1234 – 7 hours, sParK1234 – 39 days. Considering the exponential increases in password strength just by adding a character make sure your passwords are 10 – 15 characters in length and include numbers, symbols and various capital letters.
  5. Two factor authentications includes a login name, password and a second secret item that verifies the identity of the user logging in. two factor authentication can be entering a birthdate, entering a code sent to a phone, or entering a time sensitive code generated by a USB dongle shaped device. These ensure that the person logging in in is actually the person who is supposed to have those credentials. For the record, most banks will use two factor authentications. Gmail, Yahoo, and Outlook.com can all be configured to use two factor authentications.
  6. Encryption can be used to protect your computer or smartphone in the event that they are stolen. Encryption scrambles the contents of your electronic devices so that they cannot be read without a special key that you have such as a pin code. If your device is stolen but you have a password on it and identity thief can just take the hard drive out of your computer or hook you phone up to a computer and read the personal data off it manually. The advantage of encryption is that the data that gets read in this manner is scrambled and unreadable. Even weak encryption can deter most identity thieves.
  7. Freezing your credit forces lenders to ask for additional information when you are applying for more credit. This prevents identity thieves from opening new card in your name without authorization. Freezing credit has no effect on your current credit lines so you can still use all your current cards normally.
  8. The first tool of most identity thieves is social engineering. This means that they simply ask you for your personal information while pretending to be someone else, and you freely hand it over to them. Most of the time this is not done in person, but by sending emails claiming to be from your bank and asking you to verify your account. Also, by creating fake versions of popular websites to gain you login information. Remember that most reputable businesses would never ask for your information via email, never follow a link in an email that you didn’t expect to receive and be suspicious of sudden changes to websites that ask for your personal information.