SlideShare a Scribd company logo
1 of 8
Cyber Security Tricks
to
Avoid Being Hacked
 Keep all your Operating systems patched
and updated on regular basis.
 Enable 2FA on each and every account of
yours.
 Uninstall the applications which are not in
use.
 Use a Password Manager
 Use a passcode, PIN or a pattern lock on all
your digital device.
 Install a Security software on your device
and keep it updated on regular basis.
Thank You!

More Related Content

What's hot

Uncover threats and protect your organization
Uncover threats and protect your organizationUncover threats and protect your organization
Uncover threats and protect your organizationRapidSSLOnline.com
 
Spyware powerpoint
Spyware powerpointSpyware powerpoint
Spyware powerpointgalaxy201
 
REVE Antivirus Total Security
REVE Antivirus Total SecurityREVE Antivirus Total Security
REVE Antivirus Total SecurityAbhijeet Guha
 
My dog is a hacker and will steal your data!
My dog is a hacker and will steal your data!My dog is a hacker and will steal your data!
My dog is a hacker and will steal your data!rafa_el_souza
 
Security At The Speed of Innovation - Marudhamaran Gunasekaran
Security At The Speed of Innovation - Marudhamaran GunasekaranSecurity At The Speed of Innovation - Marudhamaran Gunasekaran
Security At The Speed of Innovation - Marudhamaran GunasekaranPiyush Rahate
 
11 signs you've been hacked -- and how to fight back
11 signs you've been hacked -- and how to fight back11 signs you've been hacked -- and how to fight back
11 signs you've been hacked -- and how to fight backnortonantivirusfreedownload
 
10 Essential Information Security Tips for Everyone
10 Essential Information Security Tips for Everyone10 Essential Information Security Tips for Everyone
10 Essential Information Security Tips for EveryoneAlex Grebeshkov
 
Panda Security2008
Panda Security2008Panda Security2008
Panda Security2008tswong
 
Basic tips and tricks for server management
Basic tips and tricks for server managementBasic tips and tricks for server management
Basic tips and tricks for server managementAccutech Services LLC
 
Transforming any apps into self-defending apps
Transforming any apps into self-defending apps Transforming any apps into self-defending apps
Transforming any apps into self-defending apps Blueboxer2014
 
Proactive Security That Works
Proactive Security That WorksProactive Security That Works
Proactive Security That WorksBrett L. Scott
 
7 Signs that Tell your Computer has been Hacked
7 Signs that Tell your Computer has been Hacked7 Signs that Tell your Computer has been Hacked
7 Signs that Tell your Computer has been HackedCyware
 
Pegasus Spyware - What You Need to Know
Pegasus Spyware - What You Need to KnowPegasus Spyware - What You Need to Know
Pegasus Spyware - What You Need to KnowSkycure
 
SPI Dynamics web application security 101
SPI Dynamics web application security 101 SPI Dynamics web application security 101
SPI Dynamics web application security 101 Wade Malone
 
Cybersecuity Tips for Small Businesses
Cybersecuity Tips for Small BusinessesCybersecuity Tips for Small Businesses
Cybersecuity Tips for Small Businessesfrancisdinha
 
Five mobile security challenges facing the enterprise
Five mobile security challenges facing the enterpriseFive mobile security challenges facing the enterprise
Five mobile security challenges facing the enterpriseNowSecure
 
Best business protection for windows
Best business protection for windowsBest business protection for windows
Best business protection for windowsF-Secure Corporation
 

What's hot (20)

Uncover threats and protect your organization
Uncover threats and protect your organizationUncover threats and protect your organization
Uncover threats and protect your organization
 
Spyware powerpoint
Spyware powerpointSpyware powerpoint
Spyware powerpoint
 
REVE Antivirus Total Security
REVE Antivirus Total SecurityREVE Antivirus Total Security
REVE Antivirus Total Security
 
The Benefits of a Network Security Plan
The Benefits of a Network Security PlanThe Benefits of a Network Security Plan
The Benefits of a Network Security Plan
 
My dog is a hacker and will steal your data!
My dog is a hacker and will steal your data!My dog is a hacker and will steal your data!
My dog is a hacker and will steal your data!
 
Security At The Speed of Innovation - Marudhamaran Gunasekaran
Security At The Speed of Innovation - Marudhamaran GunasekaranSecurity At The Speed of Innovation - Marudhamaran Gunasekaran
Security At The Speed of Innovation - Marudhamaran Gunasekaran
 
11 signs you've been hacked -- and how to fight back
11 signs you've been hacked -- and how to fight back11 signs you've been hacked -- and how to fight back
11 signs you've been hacked -- and how to fight back
 
10 Essential Information Security Tips for Everyone
10 Essential Information Security Tips for Everyone10 Essential Information Security Tips for Everyone
10 Essential Information Security Tips for Everyone
 
Panda Security2008
Panda Security2008Panda Security2008
Panda Security2008
 
Basic tips and tricks for server management
Basic tips and tricks for server managementBasic tips and tricks for server management
Basic tips and tricks for server management
 
Transforming any apps into self-defending apps
Transforming any apps into self-defending apps Transforming any apps into self-defending apps
Transforming any apps into self-defending apps
 
Proactive Security That Works
Proactive Security That WorksProactive Security That Works
Proactive Security That Works
 
7 Signs that Tell your Computer has been Hacked
7 Signs that Tell your Computer has been Hacked7 Signs that Tell your Computer has been Hacked
7 Signs that Tell your Computer has been Hacked
 
D-Cipher
D-CipherD-Cipher
D-Cipher
 
Pegasus Spyware - What You Need to Know
Pegasus Spyware - What You Need to KnowPegasus Spyware - What You Need to Know
Pegasus Spyware - What You Need to Know
 
SPI Dynamics web application security 101
SPI Dynamics web application security 101 SPI Dynamics web application security 101
SPI Dynamics web application security 101
 
Cybersecuity Tips for Small Businesses
Cybersecuity Tips for Small BusinessesCybersecuity Tips for Small Businesses
Cybersecuity Tips for Small Businesses
 
Trojan horse
Trojan horseTrojan horse
Trojan horse
 
Five mobile security challenges facing the enterprise
Five mobile security challenges facing the enterpriseFive mobile security challenges facing the enterprise
Five mobile security challenges facing the enterprise
 
Best business protection for windows
Best business protection for windowsBest business protection for windows
Best business protection for windows
 

More from techexpert2345

Internet Etiquette Every Internet User Should Be aware About
Internet Etiquette Every Internet User Should Be aware AboutInternet Etiquette Every Internet User Should Be aware About
Internet Etiquette Every Internet User Should Be aware Abouttechexpert2345
 
How to Protect your Wi-Fi from Cyber Hackers
How to Protect your Wi-Fi from Cyber HackersHow to Protect your Wi-Fi from Cyber Hackers
How to Protect your Wi-Fi from Cyber Hackerstechexpert2345
 
How to Stand against Cyberbullying on Facebook
How to Stand against Cyberbullying on FacebookHow to Stand against Cyberbullying on Facebook
How to Stand against Cyberbullying on Facebooktechexpert2345
 
Common Sources of Computer Virus Infection
Common Sources of Computer Virus InfectionCommon Sources of Computer Virus Infection
Common Sources of Computer Virus Infectiontechexpert2345
 
Types of Cyber-Attacks
Types of Cyber-AttacksTypes of Cyber-Attacks
Types of Cyber-Attackstechexpert2345
 
Warning Signs of Malware Infection
Warning Signs of Malware InfectionWarning Signs of Malware Infection
Warning Signs of Malware Infectiontechexpert2345
 
5 Easy Steps to Protect your Social Media
5 Easy Steps to Protect your Social Media5 Easy Steps to Protect your Social Media
5 Easy Steps to Protect your Social Mediatechexpert2345
 
Tips for using a Public Wi-Fi
Tips for using a Public Wi-FiTips for using a Public Wi-Fi
Tips for using a Public Wi-Fitechexpert2345
 
Signs your PC has a Virus
Signs your PC has a VirusSigns your PC has a Virus
Signs your PC has a Virustechexpert2345
 
Ways to Speed up Your Draggy Android
Ways to Speed up Your Draggy AndroidWays to Speed up Your Draggy Android
Ways to Speed up Your Draggy Androidtechexpert2345
 
Steps to Protect your Social Media Accounts
Steps to Protect your Social Media AccountsSteps to Protect your Social Media Accounts
Steps to Protect your Social Media Accountstechexpert2345
 
Common sources of computer virus infection
Common sources of computer virus infectionCommon sources of computer virus infection
Common sources of computer virus infectiontechexpert2345
 
Do’s and Don’ts of Cybersecurity
Do’s and Don’ts of CybersecurityDo’s and Don’ts of Cybersecurity
Do’s and Don’ts of Cybersecuritytechexpert2345
 
Internet etiquette- Every Internet user should be aware about
Internet etiquette- Every Internet user should be aware aboutInternet etiquette- Every Internet user should be aware about
Internet etiquette- Every Internet user should be aware abouttechexpert2345
 
Tips to make your computer happy
Tips to make your computer happyTips to make your computer happy
Tips to make your computer happytechexpert2345
 
REVE ANTIVIRUS Introducing REVE AV Dashboard
REVE ANTIVIRUS Introducing REVE AV DashboardREVE ANTIVIRUS Introducing REVE AV Dashboard
REVE ANTIVIRUS Introducing REVE AV Dashboardtechexpert2345
 
REVE ANTIVIRUS PARTNER & START SELLING
REVE ANTIVIRUS PARTNER & START SELLINGREVE ANTIVIRUS PARTNER & START SELLING
REVE ANTIVIRUS PARTNER & START SELLINGtechexpert2345
 
7 signs your computer has virus
7 signs your computer has virus7 signs your computer has virus
7 signs your computer has virustechexpert2345
 

More from techexpert2345 (20)

Internet Etiquette Every Internet User Should Be aware About
Internet Etiquette Every Internet User Should Be aware AboutInternet Etiquette Every Internet User Should Be aware About
Internet Etiquette Every Internet User Should Be aware About
 
How to Protect your Wi-Fi from Cyber Hackers
How to Protect your Wi-Fi from Cyber HackersHow to Protect your Wi-Fi from Cyber Hackers
How to Protect your Wi-Fi from Cyber Hackers
 
How to Stand against Cyberbullying on Facebook
How to Stand against Cyberbullying on FacebookHow to Stand against Cyberbullying on Facebook
How to Stand against Cyberbullying on Facebook
 
Email Security Tips
Email Security TipsEmail Security Tips
Email Security Tips
 
Common Sources of Computer Virus Infection
Common Sources of Computer Virus InfectionCommon Sources of Computer Virus Infection
Common Sources of Computer Virus Infection
 
Types of Cyber-Attacks
Types of Cyber-AttacksTypes of Cyber-Attacks
Types of Cyber-Attacks
 
Warning Signs of Malware Infection
Warning Signs of Malware InfectionWarning Signs of Malware Infection
Warning Signs of Malware Infection
 
5 Easy Steps to Protect your Social Media
5 Easy Steps to Protect your Social Media5 Easy Steps to Protect your Social Media
5 Easy Steps to Protect your Social Media
 
Tips for using a Public Wi-Fi
Tips for using a Public Wi-FiTips for using a Public Wi-Fi
Tips for using a Public Wi-Fi
 
Signs your PC has a Virus
Signs your PC has a VirusSigns your PC has a Virus
Signs your PC has a Virus
 
Ways to Speed up Your Draggy Android
Ways to Speed up Your Draggy AndroidWays to Speed up Your Draggy Android
Ways to Speed up Your Draggy Android
 
Steps to Protect your Social Media Accounts
Steps to Protect your Social Media AccountsSteps to Protect your Social Media Accounts
Steps to Protect your Social Media Accounts
 
Common sources of computer virus infection
Common sources of computer virus infectionCommon sources of computer virus infection
Common sources of computer virus infection
 
Do’s and Don’ts of Cybersecurity
Do’s and Don’ts of CybersecurityDo’s and Don’ts of Cybersecurity
Do’s and Don’ts of Cybersecurity
 
Malvertising
MalvertisingMalvertising
Malvertising
 
Internet etiquette- Every Internet user should be aware about
Internet etiquette- Every Internet user should be aware aboutInternet etiquette- Every Internet user should be aware about
Internet etiquette- Every Internet user should be aware about
 
Tips to make your computer happy
Tips to make your computer happyTips to make your computer happy
Tips to make your computer happy
 
REVE ANTIVIRUS Introducing REVE AV Dashboard
REVE ANTIVIRUS Introducing REVE AV DashboardREVE ANTIVIRUS Introducing REVE AV Dashboard
REVE ANTIVIRUS Introducing REVE AV Dashboard
 
REVE ANTIVIRUS PARTNER & START SELLING
REVE ANTIVIRUS PARTNER & START SELLINGREVE ANTIVIRUS PARTNER & START SELLING
REVE ANTIVIRUS PARTNER & START SELLING
 
7 signs your computer has virus
7 signs your computer has virus7 signs your computer has virus
7 signs your computer has virus
 

Recently uploaded

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 

Recently uploaded (20)

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 

Cyber Security Tricks One Should Know