SlideShare a Scribd company logo
Protecting Yourself Online Gary Wagnon 800biz.com Paul Davidson – Davidson Business Technologies
Protecting Yourself Online ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Small Business Security ,[object Object],[object Object]
Computer Basics ,[object Object],[object Object],[object Object],[object Object]
Passwords ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What is Spyware & Adware ,[object Object],[object Object],[object Object]
Printer Security ,[object Object],[object Object],[object Object]
Email Spoofing & Phishing ,[object Object],[object Object],[object Object]
Email Phishing ,[object Object]
Email Phishing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Email Attachments ,[object Object],[object Object],[object Object]
Stranded in London Email ,[object Object],[object Object]
Email from Bank or PayPal ,[object Object],[object Object]
E-Card Scam
PayPal Scam
Charles Schwab Scam
Email Phishing Appears to come from the US Postal Service –  But the attached ZIP file is most likely a virus.
Scams ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Scams ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Scams ,[object Object]
Public WiFi ,[object Object],[object Object]
6 Steps to Safer WiFi Use ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
Facebook Security
Facebook Security Settings
Facebook ,[object Object],[object Object]
Facebook Scam
Mobile Devices ,[object Object],[object Object]
Mobile Devices ,[object Object],[object Object]
Shortened URLs ,[object Object],[object Object],[object Object],[object Object]
Skype ,[object Object],[object Object],[object Object]
Spokeo.com ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
To remove yourself – click Privacy and follow the instructions.
Resources ,[object Object],[object Object],[object Object],[object Object],[object Object]

More Related Content

What's hot

Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
Dmitriy Scherbina
 
Computer & internet Security
Computer & internet SecurityComputer & internet Security
Computer & internet Security
Gerard Lamusse
 
Social engineering and Phishing
Social engineering and PhishingSocial engineering and Phishing
Social engineering and Phishingthecorrosiveone
 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
Niti Arora
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness Training
Jen Ruhman
 
IT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.ppt
OoXair
 
6.04 protecting yourself from fraud
6.04 protecting yourself from fraud6.04 protecting yourself from fraud
6.04 protecting yourself from fraud
Jamie Norton, MEd
 
Basic Security Training for End Users
Basic Security Training for End UsersBasic Security Training for End Users
Basic Security Training for End Users
Community IT Innovators
 
Cyber security
Cyber securityCyber security
Cyber security
Rishav Sadhu
 
Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri
Moumita Chatterjee
 
14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness
Michel Bitter
 
Phishing
PhishingPhishing
Phishing
oitaoming
 
Dos & Ddos Attack. Man in The Middle Attack
Dos & Ddos Attack. Man in The Middle AttackDos & Ddos Attack. Man in The Middle Attack
Dos & Ddos Attack. Man in The Middle Attack
marada0033
 
Cybersecurity Awareness
Cybersecurity AwarenessCybersecurity Awareness
Cybersecurity Awareness
JoshuaWisniewski3
 
Social media privacy and safety
Social media privacy and safetySocial media privacy and safety
Social media privacy and safety
Sarah K Miller
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
Innocent Korie
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
sweetpeace1
 
Cyber attack
Cyber attackCyber attack
Cyber attack
Manjushree Mashal
 
Social Media Safety Presentation
Social Media Safety PresentationSocial Media Safety Presentation
Social Media Safety Presentation
LJ Henshell
 

What's hot (20)

Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Computer & internet Security
Computer & internet SecurityComputer & internet Security
Computer & internet Security
 
Social engineering and Phishing
Social engineering and PhishingSocial engineering and Phishing
Social engineering and Phishing
 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness Training
 
IT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.ppt
 
6.04 protecting yourself from fraud
6.04 protecting yourself from fraud6.04 protecting yourself from fraud
6.04 protecting yourself from fraud
 
Basic Security Training for End Users
Basic Security Training for End UsersBasic Security Training for End Users
Basic Security Training for End Users
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri
 
14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness
 
Phishing
PhishingPhishing
Phishing
 
Dos & Ddos Attack. Man in The Middle Attack
Dos & Ddos Attack. Man in The Middle AttackDos & Ddos Attack. Man in The Middle Attack
Dos & Ddos Attack. Man in The Middle Attack
 
Cybersecurity Awareness
Cybersecurity AwarenessCybersecurity Awareness
Cybersecurity Awareness
 
Social media privacy and safety
Social media privacy and safetySocial media privacy and safety
Social media privacy and safety
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
 
Security Awareness Training by Fortinet
Security Awareness Training by FortinetSecurity Awareness Training by Fortinet
Security Awareness Training by Fortinet
 
Cyber attack
Cyber attackCyber attack
Cyber attack
 
Social Media Safety Presentation
Social Media Safety PresentationSocial Media Safety Presentation
Social Media Safety Presentation
 

Similar to Protecting Yourself Online

The Net is Dangerous
The Net is DangerousThe Net is Dangerous
The Net is Dangerous
Gihan Dias
 
Home and Business Computer Security 2014
Home and Business Computer Security 2014Home and Business Computer Security 2014
Home and Business Computer Security 2014
B2BPlanner Ltd.
 
A Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the InternetA Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the Internet
- Mark - Fullbright
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
Bushra22
 
IDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOUIDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOU
Billy Warero
 
Cyber security tips in Banking in Nepal
Cyber security tips in Banking in NepalCyber security tips in Banking in Nepal
Cyber security tips in Banking in Nepal
Resham Acharya
 
Cyber security for small businesses
Cyber security for small businessesCyber security for small businesses
Cyber security for small businesses
B2BPlanner Ltd.
 
7 Small Business Security Tips
7 Small Business Security Tips7 Small Business Security Tips
7 Small Business Security Tips
Infusionsoft
 
How to protect your digital footprint
How to protect your digital footprintHow to protect your digital footprint
How to protect your digital footprint
Cybermaterial
 
How to Protect Your PC from Malware, Ransomware, Virus
How to Protect Your PC from Malware, Ransomware, VirusHow to Protect Your PC from Malware, Ransomware, Virus
How to Protect Your PC from Malware, Ransomware, Virus
HabFg
 
Guide to pc_security
Guide to pc_securityGuide to pc_security
Guide to pc_security
Flora Runyenje
 
Safe Computing
Safe ComputingSafe Computing
Five habits that might be a cyber security risk
Five habits that might be a cyber security riskFive habits that might be a cyber security risk
Five habits that might be a cyber security risk
K. A. M Lutfullah
 
Living in the IT Era - Lesson 6.pptx
Living in the IT Era - Lesson 6.pptxLiving in the IT Era - Lesson 6.pptx
Living in the IT Era - Lesson 6.pptx
Froilan Cantillo
 
Computer Security Guide to Pc Security
Computer Security Guide to Pc SecurityComputer Security Guide to Pc Security
Computer Security Guide to Pc Security
MallTake
 
Data security
 Data security  Data security
Data security
Laura Breese
 
091005 Internet Security
091005 Internet Security091005 Internet Security
091005 Internet Security
dkp205
 
Computer Security for Lawyers
Computer Security for LawyersComputer Security for Lawyers
Computer Security for LawyersMark Lanterman
 

Similar to Protecting Yourself Online (20)

The Net is Dangerous
The Net is DangerousThe Net is Dangerous
The Net is Dangerous
 
Home and Business Computer Security 2014
Home and Business Computer Security 2014Home and Business Computer Security 2014
Home and Business Computer Security 2014
 
A Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the InternetA Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the Internet
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
IDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOUIDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOU
 
Cyber security tips in Banking in Nepal
Cyber security tips in Banking in NepalCyber security tips in Banking in Nepal
Cyber security tips in Banking in Nepal
 
Cyber security for small businesses
Cyber security for small businessesCyber security for small businesses
Cyber security for small businesses
 
7 Small Business Security Tips
7 Small Business Security Tips7 Small Business Security Tips
7 Small Business Security Tips
 
How to protect your digital footprint
How to protect your digital footprintHow to protect your digital footprint
How to protect your digital footprint
 
Pad 750 podcast
Pad 750 podcastPad 750 podcast
Pad 750 podcast
 
How to Protect Your PC from Malware, Ransomware, Virus
How to Protect Your PC from Malware, Ransomware, VirusHow to Protect Your PC from Malware, Ransomware, Virus
How to Protect Your PC from Malware, Ransomware, Virus
 
Guide to pc_security
Guide to pc_securityGuide to pc_security
Guide to pc_security
 
Safe Computing
Safe ComputingSafe Computing
Safe Computing
 
Five habits that might be a cyber security risk
Five habits that might be a cyber security riskFive habits that might be a cyber security risk
Five habits that might be a cyber security risk
 
Living in the IT Era - Lesson 6.pptx
Living in the IT Era - Lesson 6.pptxLiving in the IT Era - Lesson 6.pptx
Living in the IT Era - Lesson 6.pptx
 
Computer Security Guide to Pc Security
Computer Security Guide to Pc SecurityComputer Security Guide to Pc Security
Computer Security Guide to Pc Security
 
Data security
 Data security  Data security
Data security
 
091005 Internet Security
091005 Internet Security091005 Internet Security
091005 Internet Security
 
Computer Security for Lawyers
Computer Security for LawyersComputer Security for Lawyers
Computer Security for Lawyers
 
Presentation for class
Presentation for classPresentation for class
Presentation for class
 

More from Gary Wagnon

Facebook targeted marketing
Facebook targeted marketingFacebook targeted marketing
Facebook targeted marketing
Gary Wagnon
 
Ninja Marketing Dojo - Wedding Network Presentation
Ninja Marketing Dojo - Wedding Network PresentationNinja Marketing Dojo - Wedding Network Presentation
Ninja Marketing Dojo - Wedding Network Presentation
Gary Wagnon
 
Nmd feeding humjmingbird
Nmd feeding humjmingbirdNmd feeding humjmingbird
Nmd feeding humjmingbirdGary Wagnon
 
Ninja Marketing Dojo Tips
Ninja Marketing Dojo TipsNinja Marketing Dojo Tips
Ninja Marketing Dojo Tips
Gary Wagnon
 
Time Saving Tips
Time Saving TipsTime Saving Tips
Time Saving Tips
Gary Wagnon
 

More from Gary Wagnon (6)

Facebook targeted marketing
Facebook targeted marketingFacebook targeted marketing
Facebook targeted marketing
 
Ninja Marketing Dojo - Wedding Network Presentation
Ninja Marketing Dojo - Wedding Network PresentationNinja Marketing Dojo - Wedding Network Presentation
Ninja Marketing Dojo - Wedding Network Presentation
 
Nmd feeding humjmingbird
Nmd feeding humjmingbirdNmd feeding humjmingbird
Nmd feeding humjmingbird
 
Email marketing
Email marketingEmail marketing
Email marketing
 
Ninja Marketing Dojo Tips
Ninja Marketing Dojo TipsNinja Marketing Dojo Tips
Ninja Marketing Dojo Tips
 
Time Saving Tips
Time Saving TipsTime Saving Tips
Time Saving Tips
 

Protecting Yourself Online