SlideShare une entreprise Scribd logo
1  sur  1
Télécharger pour lire hors ligne
#CyberSecMonth
#ThinkB4UClick
?
When you’re completing a profile for an account,
only give information that is necessary and that
you are comfortable giving.
Use the privacy and security settings and
disable any features you don’t need.
If you’re unsure about it, reconsider creating the
profile with that company.
1. Be aware of what information
you are sharing
Posting when you’re emotional is not always a
good idea, what you post online stays there
forever. Even if you delete it afterwards, someone
could have saved or forwarded it.
Wait until you are calmer then think about it again,
do you really want to post that comment?
2. Think before you post
If you’re posting a photo, have you
considered if everyone in the photo is
happy for you to publish it? You may be
giving away information, like where you live.
And posting pictures from your amazing
holiday is telling burglars you are not at
home!
3. Consider the consequences
Before you take part in that fun game that is
doing the rounds on social media, consider
what they are asking you - your first pet’s
name, your mother’s maiden name?
These are the same questions that are used for
security, for example by the bank, so answering
them could be giving important information
to hackers.
4. Pause before you play
Following the news and asking family and
friends to let you know about scams that are in
circulation e.g. phishing scams, malicious
software (like Flubot) and fake websites can
help you stay safe online.
For other sources of information for your
country visit
https://cybersecuritymonth.eu/cyber-first-aid
Stay vigilant!
6. Stay tuned to cybersecurity news
Be aware that scammers use social networks,
websites and send messages to your phone to steal
your information, your money or your identity.
You can protect yourself by not giving any
personal information, money or account details
unless you can verify by another means of
communication who you are sharing them with.
5. Make sure you know who you
are communicating with
Going online helps you stay connected with family and friends, keeps you up to date
with news, gives you access to online learning and much more. But it is always a good
idea to keep security in mind and there are lots of things you can do to protect yourself.
Top Tips for Protecting
Yourself Online

Contenu connexe

Tendances

Internet Safety for 1950s Adults and Beginners
Internet Safety for 1950s Adults and BeginnersInternet Safety for 1950s Adults and Beginners
Internet Safety for 1950s Adults and BeginnersRajesh Soundararajan
 
How to Avoid Crypto Scams - Crypto JBro
How to Avoid Crypto Scams - Crypto JBroHow to Avoid Crypto Scams - Crypto JBro
How to Avoid Crypto Scams - Crypto JBroJared Broker
 
Slideshow - Lil Rat
Slideshow - Lil RatSlideshow - Lil Rat
Slideshow - Lil Ratmegg16
 
Junior secondary yr 7:8 aug 18 4.3 preview
Junior secondary yr 7:8 aug 18 4.3 previewJunior secondary yr 7:8 aug 18 4.3 preview
Junior secondary yr 7:8 aug 18 4.3 previewLeonie Smith
 
Introduction to Hacking
Introduction to HackingIntroduction to Hacking
Introduction to Hackingleet detected
 
Internet Security - Naga Rohit S [ IIT Guwahati ] - Coding Club & DefCon DC91...
Internet Security - Naga Rohit S [ IIT Guwahati ] - Coding Club & DefCon DC91...Internet Security - Naga Rohit S [ IIT Guwahati ] - Coding Club & DefCon DC91...
Internet Security - Naga Rohit S [ IIT Guwahati ] - Coding Club & DefCon DC91...Naga Rohit
 
Passwords for sale
Passwords for salePasswords for sale
Passwords for saleRamiro Cid
 
Internet Security
Internet SecurityInternet Security
Internet SecurityAvnish Jain
 
Email Security Awareness
Email Security AwarenessEmail Security Awareness
Email Security AwarenessDale Rapp
 
Don't ask, don't tell the virtues of privacy by design
Don't ask, don't tell   the virtues of privacy by designDon't ask, don't tell   the virtues of privacy by design
Don't ask, don't tell the virtues of privacy by designEleanor McHugh
 
Getting inside the cybercriminal's m ind
Getting inside the cybercriminal's m ind Getting inside the cybercriminal's m ind
Getting inside the cybercriminal's m ind Alin Adrian Florea
 
Cybersafety Checklist for Writers
Cybersafety Checklist for WritersCybersafety Checklist for Writers
Cybersafety Checklist for WritersShennandoah Diaz
 
Internet Safety & Cyber chip presentation
Internet Safety & Cyber chip presentationInternet Safety & Cyber chip presentation
Internet Safety & Cyber chip presentationMitchFeigenbaum
 
Net 213 Policy Primer
Net 213 Policy PrimerNet 213 Policy Primer
Net 213 Policy Primercheahwey
 
How to incrementally improve Sanctions Screening with AI
How to incrementally improve Sanctions Screening with AIHow to incrementally improve Sanctions Screening with AI
How to incrementally improve Sanctions Screening with AIBLECKWEN
 

Tendances (20)

Internet Safety for 1950s Adults and Beginners
Internet Safety for 1950s Adults and BeginnersInternet Safety for 1950s Adults and Beginners
Internet Safety for 1950s Adults and Beginners
 
Email hacking
Email hackingEmail hacking
Email hacking
 
How to Avoid Crypto Scams - Crypto JBro
How to Avoid Crypto Scams - Crypto JBroHow to Avoid Crypto Scams - Crypto JBro
How to Avoid Crypto Scams - Crypto JBro
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Slideshow - Lil Rat
Slideshow - Lil RatSlideshow - Lil Rat
Slideshow - Lil Rat
 
Junior secondary yr 7:8 aug 18 4.3 preview
Junior secondary yr 7:8 aug 18 4.3 previewJunior secondary yr 7:8 aug 18 4.3 preview
Junior secondary yr 7:8 aug 18 4.3 preview
 
Internet fraud and identity theft
Internet fraud and identity theftInternet fraud and identity theft
Internet fraud and identity theft
 
Introduction to Hacking
Introduction to HackingIntroduction to Hacking
Introduction to Hacking
 
Internet Security - Naga Rohit S [ IIT Guwahati ] - Coding Club & DefCon DC91...
Internet Security - Naga Rohit S [ IIT Guwahati ] - Coding Club & DefCon DC91...Internet Security - Naga Rohit S [ IIT Guwahati ] - Coding Club & DefCon DC91...
Internet Security - Naga Rohit S [ IIT Guwahati ] - Coding Club & DefCon DC91...
 
Passwords for sale
Passwords for salePasswords for sale
Passwords for sale
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Email Security Awareness
Email Security AwarenessEmail Security Awareness
Email Security Awareness
 
Don't ask, don't tell the virtues of privacy by design
Don't ask, don't tell   the virtues of privacy by designDon't ask, don't tell   the virtues of privacy by design
Don't ask, don't tell the virtues of privacy by design
 
Webspoofing
WebspoofingWebspoofing
Webspoofing
 
Getting inside the cybercriminal's m ind
Getting inside the cybercriminal's m ind Getting inside the cybercriminal's m ind
Getting inside the cybercriminal's m ind
 
Cybersafety Checklist for Writers
Cybersafety Checklist for WritersCybersafety Checklist for Writers
Cybersafety Checklist for Writers
 
Internet Safety & Cyber chip presentation
Internet Safety & Cyber chip presentationInternet Safety & Cyber chip presentation
Internet Safety & Cyber chip presentation
 
Net 213 Policy Primer
Net 213 Policy PrimerNet 213 Policy Primer
Net 213 Policy Primer
 
How to incrementally improve Sanctions Screening with AI
How to incrementally improve Sanctions Screening with AIHow to incrementally improve Sanctions Screening with AI
How to incrementally improve Sanctions Screening with AI
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 

Similaire à ECSM 2021 - Sfaturi pentru a te proteja în mediul online

Dos and don's on social media
Dos and don's on social mediaDos and don's on social media
Dos and don's on social mediasanjeev kumar
 
Student book key unit3
Student book key unit3Student book key unit3
Student book key unit3jesusmlaz
 
EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2JayMarkBandoy1
 
Internet safety guide
Internet safety guide Internet safety guide
Internet safety guide Dee Tutino
 
The Social Safety Guide
The Social Safety GuideThe Social Safety Guide
The Social Safety GuideDee Tutino
 
Cyber crime alert - Copy.pptx
Cyber crime alert - Copy.pptxCyber crime alert - Copy.pptx
Cyber crime alert - Copy.pptxTCPSM
 
Lesson 2 rules of netiquette
Lesson 2 rules of netiquetteLesson 2 rules of netiquette
Lesson 2 rules of netiquetteEmmanuelaSernicul
 
10.a guide-to-facebook-security
10.a guide-to-facebook-security10.a guide-to-facebook-security
10.a guide-to-facebook-securityrobert mota
 
Guide to facebook security
Guide to facebook securityGuide to facebook security
Guide to facebook securityErnest Staats
 
DIgital Citizenship for Parents of Middle School Students
DIgital Citizenship for Parents of Middle School StudentsDIgital Citizenship for Parents of Middle School Students
DIgital Citizenship for Parents of Middle School StudentsLeon Letkeman
 
MindMake - Online Safety Talking to your Kids Parental Control
MindMake - Online Safety Talking to your Kids Parental ControlMindMake - Online Safety Talking to your Kids Parental Control
MindMake - Online Safety Talking to your Kids Parental ControlMindMake - Parenting & Education
 
Social Media Safety Presentation
Social Media Safety PresentationSocial Media Safety Presentation
Social Media Safety PresentationLJ Henshell
 
Girls security abuse - social media - security tips.arise raabi - pdf
Girls security   abuse - social media - security tips.arise raabi - pdfGirls security   abuse - social media - security tips.arise raabi - pdf
Girls security abuse - social media - security tips.arise raabi - pdfArise Roby
 
Cyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threatsmkinzie
 

Similaire à ECSM 2021 - Sfaturi pentru a te proteja în mediul online (20)

Dos and don's on social media
Dos and don's on social mediaDos and don's on social media
Dos and don's on social media
 
Student book key unit3
Student book key unit3Student book key unit3
Student book key unit3
 
EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2
 
Heads up!
Heads up!Heads up!
Heads up!
 
Internet safety guide
Internet safety guide Internet safety guide
Internet safety guide
 
The Social Safety Guide
The Social Safety GuideThe Social Safety Guide
The Social Safety Guide
 
Cyber crime alert - Copy.pptx
Cyber crime alert - Copy.pptxCyber crime alert - Copy.pptx
Cyber crime alert - Copy.pptx
 
Lesson 2 rules of netiquette
Lesson 2 rules of netiquetteLesson 2 rules of netiquette
Lesson 2 rules of netiquette
 
10.a guide-to-facebook-security
10.a guide-to-facebook-security10.a guide-to-facebook-security
10.a guide-to-facebook-security
 
Users guide
Users guideUsers guide
Users guide
 
Guide to facebook security
Guide to facebook securityGuide to facebook security
Guide to facebook security
 
Guide to facebook security
Guide to facebook securityGuide to facebook security
Guide to facebook security
 
DIgital Citizenship for Parents of Middle School Students
DIgital Citizenship for Parents of Middle School StudentsDIgital Citizenship for Parents of Middle School Students
DIgital Citizenship for Parents of Middle School Students
 
MindMake - Online Safety Talking to your Kids Parental Control
MindMake - Online Safety Talking to your Kids Parental ControlMindMake - Online Safety Talking to your Kids Parental Control
MindMake - Online Safety Talking to your Kids Parental Control
 
Social Media Safety Presentation
Social Media Safety PresentationSocial Media Safety Presentation
Social Media Safety Presentation
 
INTERNET SECUIRTY TIPS
INTERNET SECUIRTY TIPSINTERNET SECUIRTY TIPS
INTERNET SECUIRTY TIPS
 
Girls security abuse - social media - security tips.arise raabi - pdf
Girls security   abuse - social media - security tips.arise raabi - pdfGirls security   abuse - social media - security tips.arise raabi - pdf
Girls security abuse - social media - security tips.arise raabi - pdf
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Cyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threats
 

Plus de One-IT

Centralizator întrebări și răspunsuri Digitalizare IMM.doc
Centralizator întrebări și răspunsuri Digitalizare IMM.docCentralizator întrebări și răspunsuri Digitalizare IMM.doc
Centralizator întrebări și răspunsuri Digitalizare IMM.docOne-IT
 
Ghid final Digitalizare IMM
Ghid final Digitalizare IMMGhid final Digitalizare IMM
Ghid final Digitalizare IMMOne-IT
 
Corrigendum-ul la Ghidul solicitantului POC 4.1.1. Bis.pdf
Corrigendum-ul la Ghidul solicitantului POC 4.1.1. Bis.pdfCorrigendum-ul la Ghidul solicitantului POC 4.1.1. Bis.pdf
Corrigendum-ul la Ghidul solicitantului POC 4.1.1. Bis.pdfOne-IT
 
Ghidul solicitantului 4.1.1. BIS.pdf
Ghidul solicitantului 4.1.1. BIS.pdfGhidul solicitantului 4.1.1. BIS.pdf
Ghidul solicitantului 4.1.1. BIS.pdfOne-IT
 
Ghidul Solicitantului varianta intermediară 4.1.1 BIS.docx
Ghidul Solicitantului varianta intermediară 4.1.1 BIS.docxGhidul Solicitantului varianta intermediară 4.1.1 BIS.docx
Ghidul Solicitantului varianta intermediară 4.1.1 BIS.docxOne-IT
 
Ordonanța 19/2022 cu privire la rectificarea bugetului de stat pe anul 2022
Ordonanța 19/2022 cu privire la rectificarea bugetului de stat pe anul 2022Ordonanța 19/2022 cu privire la rectificarea bugetului de stat pe anul 2022
Ordonanța 19/2022 cu privire la rectificarea bugetului de stat pe anul 2022One-IT
 
Ordonanța de Urgență 113/2022 privind acțiunea POC 4.1.1. Bis.pdf
Ordonanța de Urgență 113/2022 privind acțiunea POC 4.1.1. Bis.pdfOrdonanța de Urgență 113/2022 privind acțiunea POC 4.1.1. Bis.pdf
Ordonanța de Urgență 113/2022 privind acțiunea POC 4.1.1. Bis.pdfOne-IT
 
Ghid 4.1.1 BIS Industrie alimentară și construcții - Consultare Publică.docx
Ghid 4.1.1 BIS Industrie alimentară și construcții - Consultare Publică.docxGhid 4.1.1 BIS Industrie alimentară și construcții - Consultare Publică.docx
Ghid 4.1.1 BIS Industrie alimentară și construcții - Consultare Publică.docxOne-IT
 
Procedura-femeia-antreprenor-2022.pdf
Procedura-femeia-antreprenor-2022.pdfProcedura-femeia-antreprenor-2022.pdf
Procedura-femeia-antreprenor-2022.pdfOne-IT
 
Ghidul final al solicitantului Acțiunea 4.1.1 Investiții în activități produc...
Ghidul final al solicitantului Acțiunea 4.1.1 Investiții în activități produc...Ghidul final al solicitantului Acțiunea 4.1.1 Investiții în activități produc...
Ghidul final al solicitantului Acțiunea 4.1.1 Investiții în activități produc...One-IT
 
Ghid actiunea 4.1.1 versiunea consolidata.docx
Ghid actiunea 4.1.1 versiunea consolidata.docxGhid actiunea 4.1.1 versiunea consolidata.docx
Ghid actiunea 4.1.1 versiunea consolidata.docxOne-IT
 
Ghid actiunea 4.1.1 versiunea consolidata 18.02.2022
Ghid actiunea 4.1.1 versiunea consolidata 18.02.2022Ghid actiunea 4.1.1 versiunea consolidata 18.02.2022
Ghid actiunea 4.1.1 versiunea consolidata 18.02.2022One-IT
 
Cum te protejezi de tentativele de tip scam în business
Cum te protejezi de tentativele de tip scam în businessCum te protejezi de tentativele de tip scam în business
Cum te protejezi de tentativele de tip scam în businessOne-IT
 
ECSM 2021 - Cum previi atacurile de tip phishing
ECSM 2021 - Cum previi atacurile de tip phishingECSM 2021 - Cum previi atacurile de tip phishing
ECSM 2021 - Cum previi atacurile de tip phishingOne-IT
 
ECSM 2021- Informații importante despre amprenta ta digitală
ECSM 2021- Informații importante despre amprenta ta digitalăECSM 2021- Informații importante despre amprenta ta digitală
ECSM 2021- Informații importante despre amprenta ta digitalăOne-IT
 
Ghidul digitalizarea IMM oipsi consultare publica
Ghidul digitalizarea IMM oipsi consultare publicaGhidul digitalizarea IMM oipsi consultare publica
Ghidul digitalizarea IMM oipsi consultare publicaOne-IT
 
Ghid poc imbunatatirea continutului digital si a infrastructurii TIC sistemic...
Ghid poc imbunatatirea continutului digital si a infrastructurii TIC sistemic...Ghid poc imbunatatirea continutului digital si a infrastructurii TIC sistemic...
Ghid poc imbunatatirea continutului digital si a infrastructurii TIC sistemic...One-IT
 
Poly Eagle eye Mini
Poly Eagle eye MiniPoly Eagle eye Mini
Poly Eagle eye MiniOne-IT
 
Ghid cu contributie privata - Propunerea de ghid al solicitantului pentru acc...
Ghid cu contributie privata - Propunerea de ghid al solicitantului pentru acc...Ghid cu contributie privata - Propunerea de ghid al solicitantului pentru acc...
Ghid cu contributie privata - Propunerea de ghid al solicitantului pentru acc...One-IT
 
One-IT - prezentare GDPR-ul si Protectia datelor personale
One-IT - prezentare GDPR-ul si Protectia datelor personaleOne-IT - prezentare GDPR-ul si Protectia datelor personale
One-IT - prezentare GDPR-ul si Protectia datelor personaleOne-IT
 

Plus de One-IT (20)

Centralizator întrebări și răspunsuri Digitalizare IMM.doc
Centralizator întrebări și răspunsuri Digitalizare IMM.docCentralizator întrebări și răspunsuri Digitalizare IMM.doc
Centralizator întrebări și răspunsuri Digitalizare IMM.doc
 
Ghid final Digitalizare IMM
Ghid final Digitalizare IMMGhid final Digitalizare IMM
Ghid final Digitalizare IMM
 
Corrigendum-ul la Ghidul solicitantului POC 4.1.1. Bis.pdf
Corrigendum-ul la Ghidul solicitantului POC 4.1.1. Bis.pdfCorrigendum-ul la Ghidul solicitantului POC 4.1.1. Bis.pdf
Corrigendum-ul la Ghidul solicitantului POC 4.1.1. Bis.pdf
 
Ghidul solicitantului 4.1.1. BIS.pdf
Ghidul solicitantului 4.1.1. BIS.pdfGhidul solicitantului 4.1.1. BIS.pdf
Ghidul solicitantului 4.1.1. BIS.pdf
 
Ghidul Solicitantului varianta intermediară 4.1.1 BIS.docx
Ghidul Solicitantului varianta intermediară 4.1.1 BIS.docxGhidul Solicitantului varianta intermediară 4.1.1 BIS.docx
Ghidul Solicitantului varianta intermediară 4.1.1 BIS.docx
 
Ordonanța 19/2022 cu privire la rectificarea bugetului de stat pe anul 2022
Ordonanța 19/2022 cu privire la rectificarea bugetului de stat pe anul 2022Ordonanța 19/2022 cu privire la rectificarea bugetului de stat pe anul 2022
Ordonanța 19/2022 cu privire la rectificarea bugetului de stat pe anul 2022
 
Ordonanța de Urgență 113/2022 privind acțiunea POC 4.1.1. Bis.pdf
Ordonanța de Urgență 113/2022 privind acțiunea POC 4.1.1. Bis.pdfOrdonanța de Urgență 113/2022 privind acțiunea POC 4.1.1. Bis.pdf
Ordonanța de Urgență 113/2022 privind acțiunea POC 4.1.1. Bis.pdf
 
Ghid 4.1.1 BIS Industrie alimentară și construcții - Consultare Publică.docx
Ghid 4.1.1 BIS Industrie alimentară și construcții - Consultare Publică.docxGhid 4.1.1 BIS Industrie alimentară și construcții - Consultare Publică.docx
Ghid 4.1.1 BIS Industrie alimentară și construcții - Consultare Publică.docx
 
Procedura-femeia-antreprenor-2022.pdf
Procedura-femeia-antreprenor-2022.pdfProcedura-femeia-antreprenor-2022.pdf
Procedura-femeia-antreprenor-2022.pdf
 
Ghidul final al solicitantului Acțiunea 4.1.1 Investiții în activități produc...
Ghidul final al solicitantului Acțiunea 4.1.1 Investiții în activități produc...Ghidul final al solicitantului Acțiunea 4.1.1 Investiții în activități produc...
Ghidul final al solicitantului Acțiunea 4.1.1 Investiții în activități produc...
 
Ghid actiunea 4.1.1 versiunea consolidata.docx
Ghid actiunea 4.1.1 versiunea consolidata.docxGhid actiunea 4.1.1 versiunea consolidata.docx
Ghid actiunea 4.1.1 versiunea consolidata.docx
 
Ghid actiunea 4.1.1 versiunea consolidata 18.02.2022
Ghid actiunea 4.1.1 versiunea consolidata 18.02.2022Ghid actiunea 4.1.1 versiunea consolidata 18.02.2022
Ghid actiunea 4.1.1 versiunea consolidata 18.02.2022
 
Cum te protejezi de tentativele de tip scam în business
Cum te protejezi de tentativele de tip scam în businessCum te protejezi de tentativele de tip scam în business
Cum te protejezi de tentativele de tip scam în business
 
ECSM 2021 - Cum previi atacurile de tip phishing
ECSM 2021 - Cum previi atacurile de tip phishingECSM 2021 - Cum previi atacurile de tip phishing
ECSM 2021 - Cum previi atacurile de tip phishing
 
ECSM 2021- Informații importante despre amprenta ta digitală
ECSM 2021- Informații importante despre amprenta ta digitalăECSM 2021- Informații importante despre amprenta ta digitală
ECSM 2021- Informații importante despre amprenta ta digitală
 
Ghidul digitalizarea IMM oipsi consultare publica
Ghidul digitalizarea IMM oipsi consultare publicaGhidul digitalizarea IMM oipsi consultare publica
Ghidul digitalizarea IMM oipsi consultare publica
 
Ghid poc imbunatatirea continutului digital si a infrastructurii TIC sistemic...
Ghid poc imbunatatirea continutului digital si a infrastructurii TIC sistemic...Ghid poc imbunatatirea continutului digital si a infrastructurii TIC sistemic...
Ghid poc imbunatatirea continutului digital si a infrastructurii TIC sistemic...
 
Poly Eagle eye Mini
Poly Eagle eye MiniPoly Eagle eye Mini
Poly Eagle eye Mini
 
Ghid cu contributie privata - Propunerea de ghid al solicitantului pentru acc...
Ghid cu contributie privata - Propunerea de ghid al solicitantului pentru acc...Ghid cu contributie privata - Propunerea de ghid al solicitantului pentru acc...
Ghid cu contributie privata - Propunerea de ghid al solicitantului pentru acc...
 
One-IT - prezentare GDPR-ul si Protectia datelor personale
One-IT - prezentare GDPR-ul si Protectia datelor personaleOne-IT - prezentare GDPR-ul si Protectia datelor personale
One-IT - prezentare GDPR-ul si Protectia datelor personale
 

Dernier

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 

Dernier (20)

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 

ECSM 2021 - Sfaturi pentru a te proteja în mediul online

  • 1. #CyberSecMonth #ThinkB4UClick ? When you’re completing a profile for an account, only give information that is necessary and that you are comfortable giving. Use the privacy and security settings and disable any features you don’t need. If you’re unsure about it, reconsider creating the profile with that company. 1. Be aware of what information you are sharing Posting when you’re emotional is not always a good idea, what you post online stays there forever. Even if you delete it afterwards, someone could have saved or forwarded it. Wait until you are calmer then think about it again, do you really want to post that comment? 2. Think before you post If you’re posting a photo, have you considered if everyone in the photo is happy for you to publish it? You may be giving away information, like where you live. And posting pictures from your amazing holiday is telling burglars you are not at home! 3. Consider the consequences Before you take part in that fun game that is doing the rounds on social media, consider what they are asking you - your first pet’s name, your mother’s maiden name? These are the same questions that are used for security, for example by the bank, so answering them could be giving important information to hackers. 4. Pause before you play Following the news and asking family and friends to let you know about scams that are in circulation e.g. phishing scams, malicious software (like Flubot) and fake websites can help you stay safe online. For other sources of information for your country visit https://cybersecuritymonth.eu/cyber-first-aid Stay vigilant! 6. Stay tuned to cybersecurity news Be aware that scammers use social networks, websites and send messages to your phone to steal your information, your money or your identity. You can protect yourself by not giving any personal information, money or account details unless you can verify by another means of communication who you are sharing them with. 5. Make sure you know who you are communicating with Going online helps you stay connected with family and friends, keeps you up to date with news, gives you access to online learning and much more. But it is always a good idea to keep security in mind and there are lots of things you can do to protect yourself. Top Tips for Protecting Yourself Online