SlideShare a Scribd company logo
You sure that's
SECURE?
A Cybersecurity Guide for
Staying Safe Online
Created by Washington
Trafficking Prevention
What IS
cybersecurity?
CYBERSECURITY
is a set of good habits and
skills we can use to stay
safer online.
Cybersecurity helps
protect your information,
identity, location, and
privacy.
Who*really*
needstoknow
yourlocation?
Who SHOULD you
share with?
RISKS OF
LOCATION SHARING
OVERSHARING your location
can put you at risk of data
theft, home invasion,
cyberstalking, and online
exploitation.
Most apps and social media have location tracking options to
connect your online activity with your location. Sometimes,
this can be helpful, like when using navigation or looking
for a nearby restaurant. However, most apps and social media
don’t need to access your location to work properly.
YES: NO:
Your parents,
siblings, or
other close
family or
household
members
Friends from
school,
coworkers,
online
friends or
followers
TIP: sharing your real-time
location with a trusted individual
like a parent or older sibling can
be a good security measure in case
of emergency!
CLICK HERE to learn how to do so
with Google Maps on iOS or Android!
GEOTAGGING:
Is it worth it?
GEOTAGGING is a way apps and social
media tag your posts and photos
with location data, including names
of places and physical coordinates
where you are.
RISKS OF
GEOTAGGING
Publicly broadcasting
your real time
location puts you at
risk for stalking,
privacy violation,
robbery, and
exploitation.
"Just checking in..."
Restaurants and businesses will
sometimes offer a small discount
for "checking in" on Facebook or
Instagram with a geotag.
Is that 10% off worth anyone who
checks your profile knowing where
you are?
ACTIVITY: CHECK YOUR LOCATION SETTINGS
Go through each app on your phone and check its location settings to
check when and how your location is being shared! Turn off location
sharing for apps that don't need it!
Learn how do to so on iOS or Android!
SHARING
SETTINGS
Most social media apps have privacy
settings you can change and customize to
fit your needs.
Is there any post or picture of yourself that you
would want everyone on planet Earth to see? If not,
then it’s probably a good idea to review the privacy
settings for all your social media accounts.
Setting your account to private or where only
friends can see what you post is the safest
option to keep what you share between friends
and family.
Learn how to change your privacy settings on
Twitter
Click
here!
TikTok
Click
here!
Facebook, Snapchat,
& Instagram
Click
here!
Are You Cyber-Secure?
1.Password Protect
Password protect all your devices. Update
passwords regularly and use 2-factor
authentication when possible!
2.Cover your webcam
If your laptop has a built-in camera, cover it
with a sticker or webcam cover.
3.Check location settings
Turn off location settings on apps that don't
need it and remove past geotags on posts.
4.Turn it off
Turn off WiFi and Bluetooth on your devices
when you are not using them.
5.Update!
Update software on phones, computers, and other
devices regularly.
6.Don't need it? Delete it!
Delete apps and deactivate accounts that you
haven't used in over 6 months.
7.Remove banking details
Don't store banking or payment card information
on any online accounts.
8.Avoid unsecure WiFi
When using public WiFi networks, only connect
to those that require a password.
9.Get rid of spam!
Set up your email to automatically delete or
filter out spam emails. Never click into them!
10.Check browser plug-ins
If you have installed plug-ins to your internet
browser, delete ones you don't use or that
request access to your information.
Thank you for reading this online
safety zine brought to you by
Washington Trafficking Prevention!
To learn more or find ways to get
involved, visit
www.traffickingprevention.org
Support our work!

More Related Content

What's hot

Safer internet day 2017
Safer internet day 2017Safer internet day 2017
Safer internet day 2017
Eugenia Adamopoulou
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
mcgeet
 
Internet safety presentation for parents 2018
Internet safety presentation for parents 2018Internet safety presentation for parents 2018
Internet safety presentation for parents 2018
KanelandSvihlik
 
Internet Safety Presentation for Parents
Internet Safety Presentation for ParentsInternet Safety Presentation for Parents
Internet Safety Presentation for Parents
Marian Merritt
 
Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and Teachers
Larry Magid
 
Cyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threats
mkinzie
 
Net Cetera | Provided by: FTC
Net Cetera | Provided by: FTCNet Cetera | Provided by: FTC
Net Cetera | Provided by: FTC
GiddingsComputerServices
 
Cyber safety tips
Cyber safety tipsCyber safety tips
Cyber safety tips
Arunmozhi Ramesh
 
Dangers of social media
Dangers of social mediaDangers of social media
Dangers of social media
TheMightyNuggets
 
Internet Safety for Kids and Parents
Internet Safety for Kids and Parents Internet Safety for Kids and Parents
Internet Safety for Kids and Parents
Rajesh Soundararajan
 
Online Safety for Parents
Online Safety for ParentsOnline Safety for Parents
Online Safety for Parents
Rodolfo Salazar
 
Cyber bullying presentation
Cyber bullying presentationCyber bullying presentation
Cyber bullying presentationjpl17
 
School presentation
School presentationSchool presentation
School presentation
Marian Merritt
 
Internet safety ppt
Internet safety pptInternet safety ppt
Internet safety ppt
mcmullan
 
Internet and Social Media Safety for Kids and Teens April 2014
Internet and Social Media Safety for Kids and Teens April 2014Internet and Social Media Safety for Kids and Teens April 2014
Internet and Social Media Safety for Kids and Teens April 2014
Resourceful Nonprofit
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
harriscountypubliclibrary
 
Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)Matt Forney
 
Media etiquette 2021
Media etiquette 2021Media etiquette 2021
Media etiquette 2021
Mark Kor
 
Team black
Team blackTeam black
Team black
hetvi naik
 

What's hot (20)

Safer internet day 2017
Safer internet day 2017Safer internet day 2017
Safer internet day 2017
 
Internet safety for kids
Internet safety for kidsInternet safety for kids
Internet safety for kids
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Internet safety presentation for parents 2018
Internet safety presentation for parents 2018Internet safety presentation for parents 2018
Internet safety presentation for parents 2018
 
Internet Safety Presentation for Parents
Internet Safety Presentation for ParentsInternet Safety Presentation for Parents
Internet Safety Presentation for Parents
 
Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and Teachers
 
Cyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threats
 
Net Cetera | Provided by: FTC
Net Cetera | Provided by: FTCNet Cetera | Provided by: FTC
Net Cetera | Provided by: FTC
 
Cyber safety tips
Cyber safety tipsCyber safety tips
Cyber safety tips
 
Dangers of social media
Dangers of social mediaDangers of social media
Dangers of social media
 
Internet Safety for Kids and Parents
Internet Safety for Kids and Parents Internet Safety for Kids and Parents
Internet Safety for Kids and Parents
 
Online Safety for Parents
Online Safety for ParentsOnline Safety for Parents
Online Safety for Parents
 
Cyber bullying presentation
Cyber bullying presentationCyber bullying presentation
Cyber bullying presentation
 
School presentation
School presentationSchool presentation
School presentation
 
Internet safety ppt
Internet safety pptInternet safety ppt
Internet safety ppt
 
Internet and Social Media Safety for Kids and Teens April 2014
Internet and Social Media Safety for Kids and Teens April 2014Internet and Social Media Safety for Kids and Teens April 2014
Internet and Social Media Safety for Kids and Teens April 2014
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)
 
Media etiquette 2021
Media etiquette 2021Media etiquette 2021
Media etiquette 2021
 
Team black
Team blackTeam black
Team black
 

Similar to You Sure That's Secure?

How to keep your digital identity safe
How to keep your digital identity safeHow to keep your digital identity safe
How to keep your digital identity safeTSageer
 
How to keep your digital identity safe
How to keep your digital identity safeHow to keep your digital identity safe
How to keep your digital identity safeTSageer
 
How to keep your digital identity safe
How to keep your digital identity safeHow to keep your digital identity safe
How to keep your digital identity safeTSageer
 
Smr week 23 opsec and safe social networking
Smr week 23   opsec and safe social networkingSmr week 23   opsec and safe social networking
Smr week 23 opsec and safe social networkingFort Rucker FRSA
 
Social & mobile security
Social & mobile securitySocial & mobile security
Social & mobile securityErnest Staats
 
Cyber crime awareness
Cyber crime awarenessCyber crime awareness
Cyber crime awareness
Arjun Chetry
 
Internet privacy presentation
Internet privacy presentationInternet privacy presentation
Internet privacy presentationMatthew Momney
 
Facebook mobile 11mar15
Facebook mobile 11mar15Facebook mobile 11mar15
Facebook mobile 11mar15
Naval OPSEC
 
Facebook Mobile Smart Card
Facebook Mobile Smart CardFacebook Mobile Smart Card
Facebook Mobile Smart Card
Alpha Company, AFNORTH Battalion SFRG
 
Net Cetera: Chatting with Kids About Being Online 2014
Net Cetera: Chatting with Kids About Being Online 2014Net Cetera: Chatting with Kids About Being Online 2014
Net Cetera: Chatting with Kids About Being Online 2014
- Mark - Fullbright
 
Online safety
Online safetyOnline safety
Online safetyelioar8
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
Lori Lee Mickelson
 
How to be safe on the internet. Group 2 of Tulip Made by the group two of se...
How to be safe on the internet. Group 2 of Tulip  Made by the group two of se...How to be safe on the internet. Group 2 of Tulip  Made by the group two of se...
How to be safe on the internet. Group 2 of Tulip Made by the group two of se...
XhanPlayz
 
Internet / Cyber Security
Internet / Cyber SecurityInternet / Cyber Security
Internet / Cyber Security
SrijanMukhopadhyay1
 
empowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationempowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentation
SheryldeVilla2
 
Pp e safe online p2 n
Pp e safe online p2 nPp e safe online p2 n
Pp e safe online p2 n
FatimaAmin26
 
Internet Safety & Cyberbullying Workshop for Parents
Internet Safety & Cyberbullying Workshop for ParentsInternet Safety & Cyberbullying Workshop for Parents
Internet Safety & Cyberbullying Workshop for Parentssafetyseminar
 
Cybersecurity Awareness Infographics
Cybersecurity Awareness InfographicsCybersecurity Awareness Infographics
Cybersecurity Awareness Infographics
NetLockSmith
 
15 Dangerous Apps
15 Dangerous Apps15 Dangerous Apps
15 Dangerous Apps
Amy Hollingsworth
 

Similar to You Sure That's Secure? (20)

How to keep your digital identity safe
How to keep your digital identity safeHow to keep your digital identity safe
How to keep your digital identity safe
 
How to keep your digital identity safe
How to keep your digital identity safeHow to keep your digital identity safe
How to keep your digital identity safe
 
How to keep your digital identity safe
How to keep your digital identity safeHow to keep your digital identity safe
How to keep your digital identity safe
 
Smr week 23 opsec and safe social networking
Smr week 23   opsec and safe social networkingSmr week 23   opsec and safe social networking
Smr week 23 opsec and safe social networking
 
Social & mobile security
Social & mobile securitySocial & mobile security
Social & mobile security
 
Cyber crime awareness
Cyber crime awarenessCyber crime awareness
Cyber crime awareness
 
Internet privacy presentation
Internet privacy presentationInternet privacy presentation
Internet privacy presentation
 
Facebook mobile 11mar15
Facebook mobile 11mar15Facebook mobile 11mar15
Facebook mobile 11mar15
 
Facebook Mobile Smart Card
Facebook Mobile Smart CardFacebook Mobile Smart Card
Facebook Mobile Smart Card
 
Net Cetera: Chatting with Kids About Being Online 2014
Net Cetera: Chatting with Kids About Being Online 2014Net Cetera: Chatting with Kids About Being Online 2014
Net Cetera: Chatting with Kids About Being Online 2014
 
Online safety
Online safetyOnline safety
Online safety
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 
How to be safe on the internet. Group 2 of Tulip Made by the group two of se...
How to be safe on the internet. Group 2 of Tulip  Made by the group two of se...How to be safe on the internet. Group 2 of Tulip  Made by the group two of se...
How to be safe on the internet. Group 2 of Tulip Made by the group two of se...
 
Internet / Cyber Security
Internet / Cyber SecurityInternet / Cyber Security
Internet / Cyber Security
 
empowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationempowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentation
 
Pp e safe online p2 n
Pp e safe online p2 nPp e safe online p2 n
Pp e safe online p2 n
 
Internet Safety & Cyberbullying Workshop for Parents
Internet Safety & Cyberbullying Workshop for ParentsInternet Safety & Cyberbullying Workshop for Parents
Internet Safety & Cyberbullying Workshop for Parents
 
Cybersecurity Awareness Infographics
Cybersecurity Awareness InfographicsCybersecurity Awareness Infographics
Cybersecurity Awareness Infographics
 
15 Dangerous Apps
15 Dangerous Apps15 Dangerous Apps
15 Dangerous Apps
 

Recently uploaded

Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
taiba qazi
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
Wasim Ak
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
RitikBhardwaj56
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
Celine George
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
Celine George
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
chanes7
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
chanes7
 

Recently uploaded (20)

Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
 

You Sure That's Secure?

  • 1. You sure that's SECURE? A Cybersecurity Guide for Staying Safe Online Created by Washington Trafficking Prevention
  • 2. What IS cybersecurity? CYBERSECURITY is a set of good habits and skills we can use to stay safer online. Cybersecurity helps protect your information, identity, location, and privacy.
  • 3. Who*really* needstoknow yourlocation? Who SHOULD you share with? RISKS OF LOCATION SHARING OVERSHARING your location can put you at risk of data theft, home invasion, cyberstalking, and online exploitation. Most apps and social media have location tracking options to connect your online activity with your location. Sometimes, this can be helpful, like when using navigation or looking for a nearby restaurant. However, most apps and social media don’t need to access your location to work properly. YES: NO: Your parents, siblings, or other close family or household members Friends from school, coworkers, online friends or followers TIP: sharing your real-time location with a trusted individual like a parent or older sibling can be a good security measure in case of emergency! CLICK HERE to learn how to do so with Google Maps on iOS or Android!
  • 4. GEOTAGGING: Is it worth it? GEOTAGGING is a way apps and social media tag your posts and photos with location data, including names of places and physical coordinates where you are. RISKS OF GEOTAGGING Publicly broadcasting your real time location puts you at risk for stalking, privacy violation, robbery, and exploitation. "Just checking in..." Restaurants and businesses will sometimes offer a small discount for "checking in" on Facebook or Instagram with a geotag. Is that 10% off worth anyone who checks your profile knowing where you are? ACTIVITY: CHECK YOUR LOCATION SETTINGS Go through each app on your phone and check its location settings to check when and how your location is being shared! Turn off location sharing for apps that don't need it! Learn how do to so on iOS or Android!
  • 5. SHARING SETTINGS Most social media apps have privacy settings you can change and customize to fit your needs. Is there any post or picture of yourself that you would want everyone on planet Earth to see? If not, then it’s probably a good idea to review the privacy settings for all your social media accounts. Setting your account to private or where only friends can see what you post is the safest option to keep what you share between friends and family. Learn how to change your privacy settings on Twitter Click here! TikTok Click here! Facebook, Snapchat, & Instagram Click here!
  • 6. Are You Cyber-Secure? 1.Password Protect Password protect all your devices. Update passwords regularly and use 2-factor authentication when possible! 2.Cover your webcam If your laptop has a built-in camera, cover it with a sticker or webcam cover. 3.Check location settings Turn off location settings on apps that don't need it and remove past geotags on posts. 4.Turn it off Turn off WiFi and Bluetooth on your devices when you are not using them. 5.Update! Update software on phones, computers, and other devices regularly.
  • 7. 6.Don't need it? Delete it! Delete apps and deactivate accounts that you haven't used in over 6 months. 7.Remove banking details Don't store banking or payment card information on any online accounts. 8.Avoid unsecure WiFi When using public WiFi networks, only connect to those that require a password. 9.Get rid of spam! Set up your email to automatically delete or filter out spam emails. Never click into them! 10.Check browser plug-ins If you have installed plug-ins to your internet browser, delete ones you don't use or that request access to your information.
  • 8. Thank you for reading this online safety zine brought to you by Washington Trafficking Prevention! To learn more or find ways to get involved, visit www.traffickingprevention.org Support our work!