SlideShare a Scribd company logo
1 of 14
Download to read offline
Tips to Stay
Safe Using
Windows®
10
The Internet is wild and wonderful
— and, by and large, it’s unregulated.
However, if you follow a handful of
simple, common-sense rules, you’ll
go a long way toward making your
Internet travels happier and safer.
Don’t install weird programs,
cute icons, or products that
promise to keep your
computer safe.
Unless the software comes
from a reputable manufacturer
whom you trust and you know
precisely why you need it, you
don’t want it.
Never open a file
attached to an e-mail
message until you
verify it was sent
intentionally.
Ask yourself whether the sender is
smart enough to avoid sending
you an infected file.
Don’t trust
e-mail.
Every single part of an e-mail message
can be faked, easily. Links inside e-mail
messages may not point where you
think they point.
Check your
accounts.
Log on to all your financial websites frequently
and check for questionable charges, and if
somebody changed your password, scream
bloody murder.
When placing an order
online, make sure that
you’re dealing with a
company you know.
Don’t click a link in an e-mail message
and expect to go to the company’s
website. Instead, type the URL
directly into your Internet browser.
Type your credit card
number only when using
a secure web page.
The easy way to tell
whether a web page is
secure is to look in the
lower-right corner of the
screen for a picture of
a lock.
Don’t send your credit
card number in an
ordinary e-mail message.
E-mail is just too easy to
intercept. And for heaven’s
sake, don’t give out any
personal information when
you’re chatting online.
Don’t
encourage
’em.
Don’t buy anything that’s offered
by way of spam (or any other e-mail
that you didn’t specifically request).
Simply delete the message.
Opt out of mailings only
if you know and trust
the company that’s
sending you messages.
Don’t opt out with a
company you don’t trust:
It may just be trying to
verify your e-mail address.
Never post your e-mail
address on a website or in
a newsgroup.
Spammers have spiders that
devour web pages by the
gazillion, gathering e-mail
addresses and other
information automatically.
Never trust a website that
you arrive at by“clicking
through”a hot link.
Be cautious about websites you
reach from other websites. If you
don’t personally type the URL in
the address bar, you may not be in
Kansas any more.
Cyberspace doesn’t provide the
same level of protection you’ve
come to expect in real life, but
these tips can help ensure that
you stay safe no matter where
your Internet journey takes you.
Learn more at dummies.com
Dynamic city with bus on the road © Ilya Terentyev/iStockphoto
For Dummies is a registered trademark of John Wiley & Sons, Inc. All other trademarks are the property of their respective owners

More Related Content

More from Wiley

5 Reasons to Earn Your CPA License WEL
5 Reasons to Earn Your CPA License WEL5 Reasons to Earn Your CPA License WEL
5 Reasons to Earn Your CPA License WEL
Wiley
 

More from Wiley (20)

Publisher as Strategic Partner for Societies October 2019
Publisher as Strategic Partner for Societies October 2019Publisher as Strategic Partner for Societies October 2019
Publisher as Strategic Partner for Societies October 2019
 
19 Inspiring Books by Jon Gordon
19 Inspiring Books by Jon Gordon19 Inspiring Books by Jon Gordon
19 Inspiring Books by Jon Gordon
 
3 Big Myths That Hold Women Back
3 Big Myths That Hold Women Back3 Big Myths That Hold Women Back
3 Big Myths That Hold Women Back
 
The 5 Types of Meetings Project Managers Need to Master-Slide Deck Number Thr...
The 5 Types of Meetings Project Managers Need to Master-Slide Deck Number Thr...The 5 Types of Meetings Project Managers Need to Master-Slide Deck Number Thr...
The 5 Types of Meetings Project Managers Need to Master-Slide Deck Number Thr...
 
The 5 Types of Meetings Project Managers Need to Master - Slide Deck Number T...
The 5 Types of Meetings Project Managers Need to Master - Slide Deck Number T...The 5 Types of Meetings Project Managers Need to Master - Slide Deck Number T...
The 5 Types of Meetings Project Managers Need to Master - Slide Deck Number T...
 
A Celebration of Women's History Month
A Celebration of Women's History MonthA Celebration of Women's History Month
A Celebration of Women's History Month
 
Leadership Is for Everyone
Leadership Is for EveryoneLeadership Is for Everyone
Leadership Is for Everyone
 
The Five Leadership Practices that Improve Sales Success
The Five Leadership Practices that Improve Sales SuccessThe Five Leadership Practices that Improve Sales Success
The Five Leadership Practices that Improve Sales Success
 
7 Steps to Develop Well-Designed Course Objectives
7 Steps to Develop Well-Designed Course Objectives7 Steps to Develop Well-Designed Course Objectives
7 Steps to Develop Well-Designed Course Objectives
 
Today's Students: 7 Powerful Facts
Today's Students: 7 Powerful FactsToday's Students: 7 Powerful Facts
Today's Students: 7 Powerful Facts
 
Should you get an MBA?
Should you get an MBA?Should you get an MBA?
Should you get an MBA?
 
Valuing International Collaboration in Research
Valuing International Collaboration in ResearchValuing International Collaboration in Research
Valuing International Collaboration in Research
 
Leadership Makes a Difference
Leadership Makes a DifferenceLeadership Makes a Difference
Leadership Makes a Difference
 
5 Reasons to Earn Your CPA License WEL
5 Reasons to Earn Your CPA License WEL5 Reasons to Earn Your CPA License WEL
5 Reasons to Earn Your CPA License WEL
 
An Educator's Guide to Cheating
An Educator's Guide to CheatingAn Educator's Guide to Cheating
An Educator's Guide to Cheating
 
Mine the Gap: Using Handouts With Gaps
Mine the Gap: Using Handouts With GapsMine the Gap: Using Handouts With Gaps
Mine the Gap: Using Handouts With Gaps
 
Get Your Students Motivated: Tips for the Classroom
Get Your Students Motivated: Tips for the ClassroomGet Your Students Motivated: Tips for the Classroom
Get Your Students Motivated: Tips for the Classroom
 
Level I CFA Exam 2017 Curriculum Updates
Level I CFA Exam 2017 Curriculum UpdatesLevel I CFA Exam 2017 Curriculum Updates
Level I CFA Exam 2017 Curriculum Updates
 
6 Steps to Hire Someone with Soft Skills
6 Steps to Hire Someone with Soft Skills6 Steps to Hire Someone with Soft Skills
6 Steps to Hire Someone with Soft Skills
 
Architectural Daylighting Strategies
Architectural Daylighting StrategiesArchitectural Daylighting Strategies
Architectural Daylighting Strategies
 

Recently uploaded

TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
Muhammad Subhan
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
FIDO Alliance
 

Recently uploaded (20)

Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdf
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development Companies
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
 
How to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in PakistanHow to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in Pakistan
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptx
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps Productivity
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
Navigating the Large Language Model choices_Ravi Daparthi
Navigating the Large Language Model choices_Ravi DaparthiNavigating the Large Language Model choices_Ravi Daparthi
Navigating the Large Language Model choices_Ravi Daparthi
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 

Tips to Stay Safe using Windows 10

  • 1. Tips to Stay Safe Using Windows® 10
  • 2. The Internet is wild and wonderful — and, by and large, it’s unregulated. However, if you follow a handful of simple, common-sense rules, you’ll go a long way toward making your Internet travels happier and safer.
  • 3. Don’t install weird programs, cute icons, or products that promise to keep your computer safe. Unless the software comes from a reputable manufacturer whom you trust and you know precisely why you need it, you don’t want it.
  • 4. Never open a file attached to an e-mail message until you verify it was sent intentionally. Ask yourself whether the sender is smart enough to avoid sending you an infected file.
  • 5. Don’t trust e-mail. Every single part of an e-mail message can be faked, easily. Links inside e-mail messages may not point where you think they point.
  • 6. Check your accounts. Log on to all your financial websites frequently and check for questionable charges, and if somebody changed your password, scream bloody murder.
  • 7. When placing an order online, make sure that you’re dealing with a company you know. Don’t click a link in an e-mail message and expect to go to the company’s website. Instead, type the URL directly into your Internet browser.
  • 8. Type your credit card number only when using a secure web page. The easy way to tell whether a web page is secure is to look in the lower-right corner of the screen for a picture of a lock.
  • 9. Don’t send your credit card number in an ordinary e-mail message. E-mail is just too easy to intercept. And for heaven’s sake, don’t give out any personal information when you’re chatting online.
  • 10. Don’t encourage ’em. Don’t buy anything that’s offered by way of spam (or any other e-mail that you didn’t specifically request). Simply delete the message.
  • 11. Opt out of mailings only if you know and trust the company that’s sending you messages. Don’t opt out with a company you don’t trust: It may just be trying to verify your e-mail address.
  • 12. Never post your e-mail address on a website or in a newsgroup. Spammers have spiders that devour web pages by the gazillion, gathering e-mail addresses and other information automatically.
  • 13. Never trust a website that you arrive at by“clicking through”a hot link. Be cautious about websites you reach from other websites. If you don’t personally type the URL in the address bar, you may not be in Kansas any more.
  • 14. Cyberspace doesn’t provide the same level of protection you’ve come to expect in real life, but these tips can help ensure that you stay safe no matter where your Internet journey takes you. Learn more at dummies.com Dynamic city with bus on the road © Ilya Terentyev/iStockphoto For Dummies is a registered trademark of John Wiley & Sons, Inc. All other trademarks are the property of their respective owners