SlideShare a Scribd company logo
1 of 20
Maintaining safety of data
and personal information
  in digital environments

              Created by Toni Watt 2011
 Xtranormal Video
 http://www.xtranormal.com/watch/12253
  005/suitz-movie?listid=22577182




Has this happened to you?
   How to effectively verify Internet
    ◦ Hoaxes
    ◦ Viruses
    ◦ Scams




Protect Yourself
   Urban Legend          Academically
   Folkloric              Correct
   Academically          True
    Inaccurate            Fact
   Fallacies             Reality
   Old Wives’ Tales      Actuality
   Rumors                Authentic
   Gossip                Legitimate




Fact or Fiction
Prey upon our fears and
          worries




Urban Legends
w
                          w
                          w
                          .
                          s
                          n
                          o
                          p
                          e
                          s
                          .
                          c
                          o
                          m




A reliable source to check your
suspicious email. www.snopes.com
 Free giveaways
 Appeals to help sick children
 Pointless petitions
 Warnings about products




Recognizing a Hoax in Email
 Does the email ask you to send it to a lot
  of other people?
 Does the email fail to provide confirmation
  sources?
 Is the language used overly emotive or
  highly technical?




Questions to ask yourself about
the nature of the email
Viruses
 Computer Performance
 Computer Crashes or restarts on its own
 Mysterious pop up messages
 Computer screen is black




How can I tell if I have a Virus?
   Never download software form senders
    you do not completely trust.
   Never download software with “fun” or
    “valuable” functions
   Look out for popup windows that claim to
    be antivirus software.
   Update your antivirus
    software, antispyware software and
    firewall regularly.
   Only use licensed software.


How do I reduce the Risk?
   Install antivirus software and keep it
    updated.

   Use caution when opening and installing
    files, including those contained in e-mail
    attachments, downloads, diskettes, CDs
    and DVDs. Ask yourself if you trust the
    source of the file before taking any action.




Take Virus Protection Seriously
To cheat or defraud




Scams
   Error! Click to Scan Disk
   Phishing
   Congratulations you are a Winner!
   Overseas Auction Checks
   Friends in Trouble
   Cashing in on Disasters
   Make Money Fast




What to avoid!
   Install a firewall or antivirus software
   Always open your personal pages such as
    bank pages by directly typing into the
    address bar
   Delete emails too good to be true
   Only use auction approved payment
    methods
   Only use recognized charity websites
   Anything offering big awards for little
    effort should be researched first

How to Protect Yourself from
Scammers
Protecting Yourself with Effective
Passwords
   Is my password easy to guess?
   Do I write my passwords down?
   Are my password automated?
   Is my password my child’s name?
   Do I use the same password for
    everything




Questions to Ask Yourself?
 It's at least eight characters
 It includes upper and lower case
  letters, as well as numbers and symbols
 It is changed frequently
 A new password is significantly different
  than the previous one




What to Consider With Your
Passwords
   Christensen, B., M. (2010). Hoax-slayer. Retrieved from http://hoax-
    slayer.com/#latest-email-hoaxes
   Dictionary Entry. (2011). Retrieved from http://www.dictionary.com
   Geek News Central (2011). Ten computer scams to avoid. Retrieved from
    http://www.geeknewscentral.com/2010/04/18/computer-scams-to-avoid/
   Internet Access (2011). Retrieved from
    http://www.cybernet1.com/computer_virus.htm
   Kidsandmedia. (2010). Protect your computer. Retrieved from
    http://www.kidsandmedia.co.uk/article/314
   Microsoft (2011). Retrieved from
    http://www.microsoft.com/canada/smallbiz/themes/techwise/5stepscrashfreec
    omputing.mspx
   Microsoft (2011). How to create effective passwords. Retrieved from
    http://www.microsoft.com/canada/smallbiz/themes/techwise/createeffectivepa
    sswords.mspx
   Mikkelson, B. & Mikkelson, D. (2011). Retrieved from http://www.snopes.com




Resources

More Related Content

Viewers also liked

Sağlık Malzemeleri(İlaç) Lojistiği - Tugay Günaydın
Sağlık Malzemeleri(İlaç) Lojistiği - Tugay GünaydınSağlık Malzemeleri(İlaç) Lojistiği - Tugay Günaydın
Sağlık Malzemeleri(İlaç) Lojistiği - Tugay GünaydınTugay Günaydın
 
Tibbi̇ malzeme yöneti̇mi̇
Tibbi̇ malzeme yöneti̇mi̇Tibbi̇ malzeme yöneti̇mi̇
Tibbi̇ malzeme yöneti̇mi̇Uzmankişi
 
Sağlıkta yeni nesil tedarik zinciri yönetimi
Sağlıkta yeni nesil tedarik zinciri yönetimiSağlıkta yeni nesil tedarik zinciri yönetimi
Sağlıkta yeni nesil tedarik zinciri yönetimiUtkan Uluçay, MSc., CDDP
 
Hastane ve Sağlık Kuruluşlarında Medikal Cihaz Yönetimi
Hastane ve Sağlık Kuruluşlarında Medikal Cihaz YönetimiHastane ve Sağlık Kuruluşlarında Medikal Cihaz Yönetimi
Hastane ve Sağlık Kuruluşlarında Medikal Cihaz YönetimiErkan Tosun
 

Viewers also liked (8)

İyi eczacilik uygulamalari kilavuzu
İyi eczacilik uygulamalari kilavuzuİyi eczacilik uygulamalari kilavuzu
İyi eczacilik uygulamalari kilavuzu
 
Dermokozmetik markaları
Dermokozmetik markalarıDermokozmetik markaları
Dermokozmetik markaları
 
Sağlık Malzemeleri(İlaç) Lojistiği - Tugay Günaydın
Sağlık Malzemeleri(İlaç) Lojistiği - Tugay GünaydınSağlık Malzemeleri(İlaç) Lojistiği - Tugay Günaydın
Sağlık Malzemeleri(İlaç) Lojistiği - Tugay Günaydın
 
Tibbi̇ malzeme yöneti̇mi̇
Tibbi̇ malzeme yöneti̇mi̇Tibbi̇ malzeme yöneti̇mi̇
Tibbi̇ malzeme yöneti̇mi̇
 
Sağlıkta yeni nesil tedarik zinciri yönetimi
Sağlıkta yeni nesil tedarik zinciri yönetimiSağlıkta yeni nesil tedarik zinciri yönetimi
Sağlıkta yeni nesil tedarik zinciri yönetimi
 
Hastane ve Sağlık Kuruluşlarında Medikal Cihaz Yönetimi
Hastane ve Sağlık Kuruluşlarında Medikal Cihaz YönetimiHastane ve Sağlık Kuruluşlarında Medikal Cihaz Yönetimi
Hastane ve Sağlık Kuruluşlarında Medikal Cihaz Yönetimi
 
PTMS Eczane Projeleri
PTMS Eczane ProjeleriPTMS Eczane Projeleri
PTMS Eczane Projeleri
 
La salle!
La salle!La salle!
La salle!
 

Similar to Maintaining safety of data and personal information in [autosaved]

CYBERSPACE SAFETY TIPS FOR SMEs.ppt
CYBERSPACE SAFETY TIPS FOR SMEs.pptCYBERSPACE SAFETY TIPS FOR SMEs.ppt
CYBERSPACE SAFETY TIPS FOR SMEs.pptJOHN BABATUNDE LEE
 
Security Awareness 9 10 09 V4 Viruses
Security Awareness 9 10 09 V4 VirusesSecurity Awareness 9 10 09 V4 Viruses
Security Awareness 9 10 09 V4 VirusesCatherine MacAllister
 
Security Awareness 9 10 09 V4 Virus Trojan
Security Awareness 9 10 09 V4 Virus TrojanSecurity Awareness 9 10 09 V4 Virus Trojan
Security Awareness 9 10 09 V4 Virus TrojanMegan Bell
 
The internet and safety
The internet and safetyThe internet and safety
The internet and safetyPatricia bb
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayanehaz
 
Internet safety slides
Internet safety slidesInternet safety slides
Internet safety slidesEric Castro
 
CYBERCRIME: AN OVERVIEW
CYBERCRIME: AN OVERVIEWCYBERCRIME: AN OVERVIEW
CYBERCRIME: AN OVERVIEWBilly Warero
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pestspeterhitch
 
Online safety 101
Online safety 101Online safety 101
Online safety 101Greg Bold
 
Online Security and Safety
Online Security and SafetyOnline Security and Safety
Online Security and SafetyConor O'Neill
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayane Hazimeh
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayane Hazimeh
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital AgeMarian Merritt
 
Microsoft (Projects)
Microsoft (Projects)Microsoft (Projects)
Microsoft (Projects)Vinayak Hegde
 
Internet Safety Guide For Parents & Teachers
Internet Safety Guide For Parents & TeachersInternet Safety Guide For Parents & Teachers
Internet Safety Guide For Parents & TeachersJVGAJJAR
 
Infosec 4 The Home
Infosec 4 The HomeInfosec 4 The Home
Infosec 4 The Homejaysonstreet
 
How To Protect Yourself From Identity Theft
How To Protect Yourself From Identity TheftHow To Protect Yourself From Identity Theft
How To Protect Yourself From Identity Theftmkinzie
 

Similar to Maintaining safety of data and personal information in [autosaved] (20)

Netiquette
NetiquetteNetiquette
Netiquette
 
CYBERSPACE SAFETY TIPS FOR SMEs.ppt
CYBERSPACE SAFETY TIPS FOR SMEs.pptCYBERSPACE SAFETY TIPS FOR SMEs.ppt
CYBERSPACE SAFETY TIPS FOR SMEs.ppt
 
Security Awareness 9 10 09 V4 Viruses
Security Awareness 9 10 09 V4 VirusesSecurity Awareness 9 10 09 V4 Viruses
Security Awareness 9 10 09 V4 Viruses
 
Security Awareness 9 10 09 V4 Virus Trojan
Security Awareness 9 10 09 V4 Virus TrojanSecurity Awareness 9 10 09 V4 Virus Trojan
Security Awareness 9 10 09 V4 Virus Trojan
 
The internet and safety
The internet and safetyThe internet and safety
The internet and safety
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Internet safety slides
Internet safety slidesInternet safety slides
Internet safety slides
 
CYBERCRIME: AN OVERVIEW
CYBERCRIME: AN OVERVIEWCYBERCRIME: AN OVERVIEW
CYBERCRIME: AN OVERVIEW
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pests
 
Online safety 101
Online safety 101Online safety 101
Online safety 101
 
Online Security and Safety
Online Security and SafetyOnline Security and Safety
Online Security and Safety
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital Age
 
Microsoft (Projects)
Microsoft (Projects)Microsoft (Projects)
Microsoft (Projects)
 
Internet Safety Guide For Parents & Teachers
Internet Safety Guide For Parents & TeachersInternet Safety Guide For Parents & Teachers
Internet Safety Guide For Parents & Teachers
 
Infosec 4 The Home
Infosec 4 The HomeInfosec 4 The Home
Infosec 4 The Home
 
Securityguide
SecurityguideSecurityguide
Securityguide
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
How To Protect Yourself From Identity Theft
How To Protect Yourself From Identity TheftHow To Protect Yourself From Identity Theft
How To Protect Yourself From Identity Theft
 

Recently uploaded

Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 

Recently uploaded (20)

Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 

Maintaining safety of data and personal information in [autosaved]

  • 1. Maintaining safety of data and personal information in digital environments Created by Toni Watt 2011
  • 2.  Xtranormal Video  http://www.xtranormal.com/watch/12253 005/suitz-movie?listid=22577182 Has this happened to you?
  • 3. How to effectively verify Internet ◦ Hoaxes ◦ Viruses ◦ Scams Protect Yourself
  • 4. Urban Legend  Academically  Folkloric Correct  Academically  True Inaccurate  Fact  Fallacies  Reality  Old Wives’ Tales  Actuality  Rumors  Authentic  Gossip  Legitimate Fact or Fiction
  • 5. Prey upon our fears and worries Urban Legends
  • 6. w w w . s n o p e s . c o m A reliable source to check your suspicious email. www.snopes.com
  • 7.  Free giveaways  Appeals to help sick children  Pointless petitions  Warnings about products Recognizing a Hoax in Email
  • 8.  Does the email ask you to send it to a lot of other people?  Does the email fail to provide confirmation sources?  Is the language used overly emotive or highly technical? Questions to ask yourself about the nature of the email
  • 10.  Computer Performance  Computer Crashes or restarts on its own  Mysterious pop up messages  Computer screen is black How can I tell if I have a Virus?
  • 11. Never download software form senders you do not completely trust.  Never download software with “fun” or “valuable” functions  Look out for popup windows that claim to be antivirus software.  Update your antivirus software, antispyware software and firewall regularly.  Only use licensed software. How do I reduce the Risk?
  • 12. Install antivirus software and keep it updated.  Use caution when opening and installing files, including those contained in e-mail attachments, downloads, diskettes, CDs and DVDs. Ask yourself if you trust the source of the file before taking any action. Take Virus Protection Seriously
  • 13. To cheat or defraud Scams
  • 14. Error! Click to Scan Disk  Phishing  Congratulations you are a Winner!  Overseas Auction Checks  Friends in Trouble  Cashing in on Disasters  Make Money Fast What to avoid!
  • 15. Install a firewall or antivirus software  Always open your personal pages such as bank pages by directly typing into the address bar  Delete emails too good to be true  Only use auction approved payment methods  Only use recognized charity websites  Anything offering big awards for little effort should be researched first How to Protect Yourself from Scammers
  • 16. Protecting Yourself with Effective Passwords
  • 17. Is my password easy to guess?  Do I write my passwords down?  Are my password automated?  Is my password my child’s name?  Do I use the same password for everything Questions to Ask Yourself?
  • 18.  It's at least eight characters  It includes upper and lower case letters, as well as numbers and symbols  It is changed frequently  A new password is significantly different than the previous one What to Consider With Your Passwords
  • 19.
  • 20. Christensen, B., M. (2010). Hoax-slayer. Retrieved from http://hoax- slayer.com/#latest-email-hoaxes  Dictionary Entry. (2011). Retrieved from http://www.dictionary.com  Geek News Central (2011). Ten computer scams to avoid. Retrieved from http://www.geeknewscentral.com/2010/04/18/computer-scams-to-avoid/  Internet Access (2011). Retrieved from http://www.cybernet1.com/computer_virus.htm  Kidsandmedia. (2010). Protect your computer. Retrieved from http://www.kidsandmedia.co.uk/article/314  Microsoft (2011). Retrieved from http://www.microsoft.com/canada/smallbiz/themes/techwise/5stepscrashfreec omputing.mspx  Microsoft (2011). How to create effective passwords. Retrieved from http://www.microsoft.com/canada/smallbiz/themes/techwise/createeffectivepa sswords.mspx  Mikkelson, B. & Mikkelson, D. (2011). Retrieved from http://www.snopes.com Resources

Editor's Notes

  1. Scams