SlideShare une entreprise Scribd logo
1  sur  31
Télécharger pour lire hors ligne
© 2015 Quick Heal Technologies Ltd.
10CYBER SAFETY TIPS
WEBINAR
Every Internet User Must Follow
© 2015 Quick Heal Technologies Ltd.
Topics of Discussion:
1. Most common types threats on the
Internet.
2. 10 Internet security tips you must follow.
3. How Quick Heal keeps you safe against
all types of online dangers.
© 2015 Quick Heal Technologies Ltd.
Most common
types of threats on
the Internet.
#1.
© 2015 Quick Heal Technologies Ltd.
The common types of online
dangers that most people fall
prey to, include:
© 2015 Quick Heal Technologies Ltd.
Phishing Attacks
Phishing is defined as the fraudulent act of
acquiring private and sensitive information
such as usernames, passwords, credit/debit
card info, etc.
© 2015 Quick Heal Technologies Ltd.
Spyware
Spyware are malicious software that
secretly monitor user’s activities, and steal
sensitive information from the infected
computer.
© 2015 Quick Heal Technologies Ltd.
Keyloggers
A form of spyware, keyloggers capture and
record user keystrokes. The data captured is
then transmitted to a remote computer.
© 2015 Quick Heal Technologies Ltd.
Trojan Horse
A Trojan horse is a seemingly benign
program that when activated, causes harm
to a computer system.
© 2015 Quick Heal Technologies Ltd.
Drive-by Download
A drive-by download refers to a malicious
download to a computer or device that
occurs without the owner’s
consent/knowledge.
© 2015 Quick Heal Technologies Ltd.
10 simple Internet
security tips you
must follow.
#2.
© 2015 Quick Heal Technologies Ltd.
Use uppercase, lowercase,
special characters and
numbers in your passwords.
Tip 1
Be Smart with
Passwords.
© 2015 Quick Heal Technologies Ltd.
Use a Pin, Password, Pattern or
Face Lock.
Tip 2
Lock Your
Device.
© 2015 Quick Heal Technologies Ltd.
Use patched & up-to-date
browsers, software, and OS.
Tip 3
Apply Software
Updates.
© 2015 Quick Heal Technologies Ltd.
Avoid selecting ‘Keep me
Logged In’ or ‘Remember me’.
Tip 4
Always
Log Off.
© 2015 Quick Heal Technologies Ltd.
Download free software only
from verified publishers.
Tip 5
Beware of
Freeware.
© 2015 Quick Heal Technologies Ltd.
Your money and data are safe
with well-known online stores.
Tip 6
Shop from
Trusted Sites.
© 2015 Quick Heal Technologies Ltd.
Accept friend requests only
from people you know.
Tip 7
Know Your
Online Friends.
© 2015 Quick Heal Technologies Ltd.
Shop and bank only on sites
whose URL begins with ‘https’.
Tip 8
Use Secure
Websites.
© 2015 Quick Heal Technologies Ltd.
You’ll receive a passcode every
time you log in to your account.
Tip 9
Use 2-Step
Verification.
© 2015 Quick Heal Technologies Ltd.
It’ll protect your PC against
hackers and malware.
Tip 10
Use an
Antivirus.
© 2015 Quick Heal Technologies Ltd.
How Quick Heal keeps
you safe against all types
of online dangers.
#3.
© 2015 Quick Heal Technologies Ltd.
Quick Heal helps you keep your
PC and its data safe from all types of
Internet dangers, with its advanced
security features such as:
© 2015 Quick Heal Technologies Ltd.
Automatically blocks websites
that are designed to steal user
information by using social media
scams and phishing attacks.
Web Security
© 2015 Quick Heal Technologies Ltd.
Protects your PC from any malicious
file that may get downloaded from
the Internet without your knowledge.
Browser Sandbox
© 2015 Quick Heal Technologies Ltd.
Blocks emails designed for phishing
attacks, or dropping a malware on
the user’s machine.
Email Security
© 2015 Quick Heal Technologies Ltd.
Stops all types of malware and
viruses such as Adware, Spyware,
Trojan Horse, Worms, etc., from
infecting your machine.
Core Protection
© 2015 Quick Heal Technologies Ltd.
Detects and stops new and
unknown threats that can cause
heavy damage to your computer
and its data.
Advanced DNAScan
© 2015 Quick Heal Technologies Ltd.
Safe Banking
Creates a safe virtual environment to let you
bank, shop, and pay bills online securely.
Protects your sensitive data from being stolen by
spyware, keyloggers, and other malicious
programs.
© 2015 Quick Heal Technologies Ltd.
REMEMBER…
Cyber Safety begins with you.
© 2015 Quick Heal Technologies Ltd.
THANK YOU.
© 2015 Quick Heal Technologies Ltd.
Got any queries regarding this
webinar?
Write to us at:
CorporateCommunications@quickheal.co.in
Follow us on:
Facebook: www.facebook.com/quickhealav
Twitter: www.twitter.com/quickheal
Google Plus: bit.ly/QuickHealGooglePlus
YouTube: www.youtube.com/quickheal
SlideShare: http://www.slideshare.net/QuickHealPPTs
Visit us:
Website: www.quickheal.com
Official Blog: blogs.quickheal.com

Contenu connexe

Tendances

10 Tips to Keep Criminals Out
10 Tips to Keep Criminals Out10 Tips to Keep Criminals Out
10 Tips to Keep Criminals OutNeil Kemp
 
"10 Tips To Keep Cybercriminals Out While Coronavirus Keeps You In" Infographic
"10 Tips To Keep Cybercriminals Out While Coronavirus Keeps You In" Infographic"10 Tips To Keep Cybercriminals Out While Coronavirus Keeps You In" Infographic
"10 Tips To Keep Cybercriminals Out While Coronavirus Keeps You In" InfographicDavid McHale
 
Five mobile security challenges facing the enterprise
Five mobile security challenges facing the enterpriseFive mobile security challenges facing the enterprise
Five mobile security challenges facing the enterpriseNowSecure
 
mcafee-10-steps-infographic-d2
mcafee-10-steps-infographic-d2mcafee-10-steps-infographic-d2
mcafee-10-steps-infographic-d2Monica Hamilton
 
Fitsec-remote work and cyber security
Fitsec-remote work and cyber securityFitsec-remote work and cyber security
Fitsec-remote work and cyber securityAnnaVihersalo
 
Internet Security at Work Presentation
Internet Security at Work PresentationInternet Security at Work Presentation
Internet Security at Work Presentationredbackacademy
 
A day in the life of a pentester
A day in the life of a pentesterA day in the life of a pentester
A day in the life of a pentesterCláudio André
 
Cyber-Leave-Behind-Brochure-Done (1)
Cyber-Leave-Behind-Brochure-Done (1)Cyber-Leave-Behind-Brochure-Done (1)
Cyber-Leave-Behind-Brochure-Done (1)Sam Norallah
 
Microsoft Final Internet Safety Poster
Microsoft Final Internet Safety PosterMicrosoft Final Internet Safety Poster
Microsoft Final Internet Safety PosterJack
 
What is CryptoLocker and How Can I Protect My Business From It?
What is CryptoLocker and How Can I Protect My Business From It?What is CryptoLocker and How Can I Protect My Business From It?
What is CryptoLocker and How Can I Protect My Business From It?SwiftTech Solutions, Inc.
 
Network basic security
Network basic  securityNetwork basic  security
Network basic securityMohamed Radji
 
Secure Your Mobile Apps
Secure Your Mobile AppsSecure Your Mobile Apps
Secure Your Mobile Appsprimomh
 
Adult Internet Safety
Adult Internet SafetyAdult Internet Safety
Adult Internet Safetyreidcollins42
 
Shifting left: Continuous testing for better app quality and security
Shifting left: Continuous testing for better app quality and securityShifting left: Continuous testing for better app quality and security
Shifting left: Continuous testing for better app quality and securityNowSecure
 
Cyber Security
Cyber SecurityCyber Security
Cyber Securityviimsikool
 

Tendances (20)

10 Tips to Keep Criminals Out
10 Tips to Keep Criminals Out10 Tips to Keep Criminals Out
10 Tips to Keep Criminals Out
 
"10 Tips To Keep Cybercriminals Out While Coronavirus Keeps You In" Infographic
"10 Tips To Keep Cybercriminals Out While Coronavirus Keeps You In" Infographic"10 Tips To Keep Cybercriminals Out While Coronavirus Keeps You In" Infographic
"10 Tips To Keep Cybercriminals Out While Coronavirus Keeps You In" Infographic
 
Five mobile security challenges facing the enterprise
Five mobile security challenges facing the enterpriseFive mobile security challenges facing the enterprise
Five mobile security challenges facing the enterprise
 
The Benefits of a Network Security Plan
The Benefits of a Network Security PlanThe Benefits of a Network Security Plan
The Benefits of a Network Security Plan
 
mcafee-10-steps-infographic-d2
mcafee-10-steps-infographic-d2mcafee-10-steps-infographic-d2
mcafee-10-steps-infographic-d2
 
Fitsec-remote work and cyber security
Fitsec-remote work and cyber securityFitsec-remote work and cyber security
Fitsec-remote work and cyber security
 
Internet Security at Work Presentation
Internet Security at Work PresentationInternet Security at Work Presentation
Internet Security at Work Presentation
 
A day in the life of a pentester
A day in the life of a pentesterA day in the life of a pentester
A day in the life of a pentester
 
Cyber-Leave-Behind-Brochure-Done (1)
Cyber-Leave-Behind-Brochure-Done (1)Cyber-Leave-Behind-Brochure-Done (1)
Cyber-Leave-Behind-Brochure-Done (1)
 
Computer Investigation on Employees
Computer Investigation on EmployeesComputer Investigation on Employees
Computer Investigation on Employees
 
Microsoft Final Internet Safety Poster
Microsoft Final Internet Safety PosterMicrosoft Final Internet Safety Poster
Microsoft Final Internet Safety Poster
 
Cyber security and crime
Cyber security and crimeCyber security and crime
Cyber security and crime
 
What is CryptoLocker and How Can I Protect My Business From It?
What is CryptoLocker and How Can I Protect My Business From It?What is CryptoLocker and How Can I Protect My Business From It?
What is CryptoLocker and How Can I Protect My Business From It?
 
Network basic security
Network basic  securityNetwork basic  security
Network basic security
 
Secure Your Mobile Apps
Secure Your Mobile AppsSecure Your Mobile Apps
Secure Your Mobile Apps
 
Case - How to protect your website
Case - How to protect your websiteCase - How to protect your website
Case - How to protect your website
 
Adult Internet Safety
Adult Internet SafetyAdult Internet Safety
Adult Internet Safety
 
Shifting left: Continuous testing for better app quality and security
Shifting left: Continuous testing for better app quality and securityShifting left: Continuous testing for better app quality and security
Shifting left: Continuous testing for better app quality and security
 
Hacker Tricks: How You Can Protect Yourself
Hacker Tricks: How You Can Protect YourselfHacker Tricks: How You Can Protect Yourself
Hacker Tricks: How You Can Protect Yourself
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 

En vedette

Brain training unit 1 HU public
Brain training unit 1   HU publicBrain training unit 1   HU public
Brain training unit 1 HU publictbaker17
 
Brain gym starters
Brain gym startersBrain gym starters
Brain gym startersKathryn Hall
 
The brain __exercise_connection_-_power_point_presentation final
The brain __exercise_connection_-_power_point_presentation finalThe brain __exercise_connection_-_power_point_presentation final
The brain __exercise_connection_-_power_point_presentation finalCMoondog
 
Bancroft Exercise Effects on the Brain
Bancroft Exercise Effects on the BrainBancroft Exercise Effects on the Brain
Bancroft Exercise Effects on the BrainBancroft
 
Superbrain yoga
Superbrain yogaSuperbrain yoga
Superbrain yogaNila Shah
 
Right or Left!!!
Right or Left!!!Right or Left!!!
Right or Left!!!Happy Garg
 
Self-healing Materials
Self-healing MaterialsSelf-healing Materials
Self-healing MaterialsReset_co
 
A Simple Brain Exercise
A Simple Brain ExerciseA Simple Brain Exercise
A Simple Brain ExerciseJRNelson9
 
Self healing Materials
Self healing MaterialsSelf healing Materials
Self healing MaterialsSahil Gupta
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityDipesh Waghela
 

En vedette (20)

Foundation Win
Foundation WinFoundation Win
Foundation Win
 
Brain training unit 1 HU public
Brain training unit 1   HU publicBrain training unit 1   HU public
Brain training unit 1 HU public
 
Brain gym starters
Brain gym startersBrain gym starters
Brain gym starters
 
The brain __exercise_connection_-_power_point_presentation final
The brain __exercise_connection_-_power_point_presentation finalThe brain __exercise_connection_-_power_point_presentation final
The brain __exercise_connection_-_power_point_presentation final
 
Miracle grow your brain
Miracle grow your brainMiracle grow your brain
Miracle grow your brain
 
Bancroft Exercise Effects on the Brain
Bancroft Exercise Effects on the BrainBancroft Exercise Effects on the Brain
Bancroft Exercise Effects on the Brain
 
Superbrain yoga
Superbrain yogaSuperbrain yoga
Superbrain yoga
 
Hypno Study
Hypno StudyHypno Study
Hypno Study
 
Are You a Left or a Right Brain
Are You a Left or a Right BrainAre You a Left or a Right Brain
Are You a Left or a Right Brain
 
Left and Right Brain Dominance
Left and Right Brain DominanceLeft and Right Brain Dominance
Left and Right Brain Dominance
 
Right or Left!!!
Right or Left!!!Right or Left!!!
Right or Left!!!
 
Brain gym
Brain gymBrain gym
Brain gym
 
Self-healing Materials
Self-healing MaterialsSelf-healing Materials
Self-healing Materials
 
Right Brain Presentation
Right Brain PresentationRight Brain Presentation
Right Brain Presentation
 
Presentation Neuro marketing
Presentation Neuro marketingPresentation Neuro marketing
Presentation Neuro marketing
 
A Simple Brain Exercise
A Simple Brain ExerciseA Simple Brain Exercise
A Simple Brain Exercise
 
Self healing Materials
Self healing MaterialsSelf healing Materials
Self healing Materials
 
Indian psychology
Indian psychologyIndian psychology
Indian psychology
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 

Similaire à 10 Cyber Safety Tips Every Internet User Must Follow

5 common myths that stop people from using an antivirus copypasteads.com
5 common myths that stop people from using an antivirus copypasteads.com5 common myths that stop people from using an antivirus copypasteads.com
5 common myths that stop people from using an antivirus copypasteads.comjackpot201
 
Completing your Next Generation Threat Prevention - Check Point
Completing your Next Generation Threat Prevention - Check PointCompleting your Next Generation Threat Prevention - Check Point
Completing your Next Generation Threat Prevention - Check Pointaliciasyc
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101mateenzero
 
Internet secutity ppt by vaishnavi khandelwal
Internet secutity ppt by vaishnavi khandelwalInternet secutity ppt by vaishnavi khandelwal
Internet secutity ppt by vaishnavi khandelwalVaishnaviKhandelwal6
 
It security,malware,phishing,information theft
It security,malware,phishing,information theftIt security,malware,phishing,information theft
It security,malware,phishing,information theftDeepak John
 
Check your network security
Check your network securityCheck your network security
Check your network securityYour Virtual CTO
 
cyber security presentation (1).pdf
cyber security presentation (1).pdfcyber security presentation (1).pdf
cyber security presentation (1).pdfw4tgrgdyryfh
 
Executive Directors Chat:It's easy to stay safe online.pdf
Executive Directors Chat:It's easy to stay safe online.pdfExecutive Directors Chat:It's easy to stay safe online.pdf
Executive Directors Chat:It's easy to stay safe online.pdfTechSoup
 
Cyber security for small businesses
Cyber security for small businessesCyber security for small businesses
Cyber security for small businessesB2BPlanner Ltd.
 
Stop Account Takeover Attacks, Right in their Tracks
Stop Account Takeover Attacks, Right in their TracksStop Account Takeover Attacks, Right in their Tracks
Stop Account Takeover Attacks, Right in their TracksImperva
 
Cyber Security School Workshop
Cyber Security School WorkshopCyber Security School Workshop
Cyber Security School WorkshopRahul Nayan
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02amiinaaa
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hackinghcls
 

Similaire à 10 Cyber Safety Tips Every Internet User Must Follow (20)

5 common myths that stop people from using an antivirus copypasteads.com
5 common myths that stop people from using an antivirus copypasteads.com5 common myths that stop people from using an antivirus copypasteads.com
5 common myths that stop people from using an antivirus copypasteads.com
 
Top 7 Mobile Banking Security Tips
Top 7 Mobile Banking Security TipsTop 7 Mobile Banking Security Tips
Top 7 Mobile Banking Security Tips
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Completing your Next Generation Threat Prevention - Check Point
Completing your Next Generation Threat Prevention - Check PointCompleting your Next Generation Threat Prevention - Check Point
Completing your Next Generation Threat Prevention - Check Point
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101
 
Secure End User
Secure End UserSecure End User
Secure End User
 
Internet secutity ppt by vaishnavi khandelwal
Internet secutity ppt by vaishnavi khandelwalInternet secutity ppt by vaishnavi khandelwal
Internet secutity ppt by vaishnavi khandelwal
 
It security,malware,phishing,information theft
It security,malware,phishing,information theftIt security,malware,phishing,information theft
It security,malware,phishing,information theft
 
Check your network security
Check your network securityCheck your network security
Check your network security
 
cyber security presentation (1).pdf
cyber security presentation (1).pdfcyber security presentation (1).pdf
cyber security presentation (1).pdf
 
Internet security
Internet securityInternet security
Internet security
 
Executive Directors Chat:It's easy to stay safe online.pdf
Executive Directors Chat:It's easy to stay safe online.pdfExecutive Directors Chat:It's easy to stay safe online.pdf
Executive Directors Chat:It's easy to stay safe online.pdf
 
Cyber security for small businesses
Cyber security for small businessesCyber security for small businesses
Cyber security for small businesses
 
Stop Account Takeover Attacks, Right in their Tracks
Stop Account Takeover Attacks, Right in their TracksStop Account Takeover Attacks, Right in their Tracks
Stop Account Takeover Attacks, Right in their Tracks
 
Cyber Security School Workshop
Cyber Security School WorkshopCyber Security School Workshop
Cyber Security School Workshop
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Cybersecurity Training
Cybersecurity TrainingCybersecurity Training
Cybersecurity Training
 
spyware
spywarespyware
spyware
 

Plus de Quick Heal Technologies Ltd.

31 Internet Security Tips on CyberSecurity Month Ocotober
31 Internet Security Tips on CyberSecurity Month Ocotober31 Internet Security Tips on CyberSecurity Month Ocotober
31 Internet Security Tips on CyberSecurity Month OcotoberQuick Heal Technologies Ltd.
 
How a Ransomware Infects your Computer [INFOGRAPHIC]
How a Ransomware Infects your Computer [INFOGRAPHIC]How a Ransomware Infects your Computer [INFOGRAPHIC]
How a Ransomware Infects your Computer [INFOGRAPHIC]Quick Heal Technologies Ltd.
 
Centralized Patch Management - Proven Security Approach for Ransomware Protec...
Centralized Patch Management - Proven Security Approach for Ransomware Protec...Centralized Patch Management - Proven Security Approach for Ransomware Protec...
Centralized Patch Management - Proven Security Approach for Ransomware Protec...Quick Heal Technologies Ltd.
 
Protecting Your organization from WannaCry Ransomware
Protecting Your organization from WannaCry RansomwareProtecting Your organization from WannaCry Ransomware
Protecting Your organization from WannaCry RansomwareQuick Heal Technologies Ltd.
 
Seqrite Data Loss Prevention- Complete Protection from Data Theft and Data Loss
Seqrite Data Loss Prevention- Complete Protection from Data Theft and Data LossSeqrite Data Loss Prevention- Complete Protection from Data Theft and Data Loss
Seqrite Data Loss Prevention- Complete Protection from Data Theft and Data LossQuick Heal Technologies Ltd.
 
Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24
Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24
Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24Quick Heal Technologies Ltd.
 
Jnana Sangama Day 1 - National convention for higher education
Jnana Sangama Day 1 - National convention for higher educationJnana Sangama Day 1 - National convention for higher education
Jnana Sangama Day 1 - National convention for higher educationQuick Heal Technologies Ltd.
 

Plus de Quick Heal Technologies Ltd. (20)

Digital Threat Landscape
Digital Threat LandscapeDigital Threat Landscape
Digital Threat Landscape
 
Cybersecurity in Banking Sector
Cybersecurity in Banking SectorCybersecurity in Banking Sector
Cybersecurity in Banking Sector
 
31 Internet Security Tips on CyberSecurity Month Ocotober
31 Internet Security Tips on CyberSecurity Month Ocotober31 Internet Security Tips on CyberSecurity Month Ocotober
31 Internet Security Tips on CyberSecurity Month Ocotober
 
How a Ransomware Infects your Computer [INFOGRAPHIC]
How a Ransomware Infects your Computer [INFOGRAPHIC]How a Ransomware Infects your Computer [INFOGRAPHIC]
How a Ransomware Infects your Computer [INFOGRAPHIC]
 
Next-Gen Security Solution: Gateway Protection
Next-Gen Security Solution: Gateway ProtectionNext-Gen Security Solution: Gateway Protection
Next-Gen Security Solution: Gateway Protection
 
Centralized Patch Management - Proven Security Approach for Ransomware Protec...
Centralized Patch Management - Proven Security Approach for Ransomware Protec...Centralized Patch Management - Proven Security Approach for Ransomware Protec...
Centralized Patch Management - Proven Security Approach for Ransomware Protec...
 
Protecting Your organization from WannaCry Ransomware
Protecting Your organization from WannaCry RansomwareProtecting Your organization from WannaCry Ransomware
Protecting Your organization from WannaCry Ransomware
 
Seqrite Data Loss Prevention- Complete Protection from Data Theft and Data Loss
Seqrite Data Loss Prevention- Complete Protection from Data Theft and Data LossSeqrite Data Loss Prevention- Complete Protection from Data Theft and Data Loss
Seqrite Data Loss Prevention- Complete Protection from Data Theft and Data Loss
 
Is Antivirus (AV) Dead or Just Missing in Action
Is Antivirus (AV) Dead or Just Missing in Action Is Antivirus (AV) Dead or Just Missing in Action
Is Antivirus (AV) Dead or Just Missing in Action
 
Safeguard your enterprise against ransomware
Safeguard your enterprise against ransomwareSafeguard your enterprise against ransomware
Safeguard your enterprise against ransomware
 
Data Security in Healthcare
Data Security in HealthcareData Security in Healthcare
Data Security in Healthcare
 
GITEX 2016, Dubai
GITEX 2016, Dubai GITEX 2016, Dubai
GITEX 2016, Dubai
 
Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24
Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24
Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24
 
Maharashtra Cooperative Summit 2016
Maharashtra Cooperative Summit 2016Maharashtra Cooperative Summit 2016
Maharashtra Cooperative Summit 2016
 
Seqrite Hyderabad Meet 2016
Seqrite Hyderabad Meet 2016 Seqrite Hyderabad Meet 2016
Seqrite Hyderabad Meet 2016
 
Seqrite CXO Meet, Ahmedabad, India
Seqrite CXO Meet, Ahmedabad, IndiaSeqrite CXO Meet, Ahmedabad, India
Seqrite CXO Meet, Ahmedabad, India
 
Fonetastic ppt
Fonetastic pptFonetastic ppt
Fonetastic ppt
 
Seqrite Launch Event in Athens, Greece.
Seqrite Launch Event in Athens, Greece.Seqrite Launch Event in Athens, Greece.
Seqrite Launch Event in Athens, Greece.
 
BFSI Leadership Summit, Mumbai
BFSI Leadership Summit, MumbaiBFSI Leadership Summit, Mumbai
BFSI Leadership Summit, Mumbai
 
Jnana Sangama Day 1 - National convention for higher education
Jnana Sangama Day 1 - National convention for higher educationJnana Sangama Day 1 - National convention for higher education
Jnana Sangama Day 1 - National convention for higher education
 

Dernier

Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Steffen Staab
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfkalichargn70th171
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsJhone kinadey
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...OnePlan Solutions
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdfWave PLM
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AIABDERRAOUF MEHENNI
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...harshavardhanraghave
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️anilsa9823
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionSolGuruz
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerThousandEyes
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsAndolasoft Inc
 

Dernier (20)

Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with Precision
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.js
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 

10 Cyber Safety Tips Every Internet User Must Follow

  • 1. © 2015 Quick Heal Technologies Ltd. 10CYBER SAFETY TIPS WEBINAR Every Internet User Must Follow
  • 2. © 2015 Quick Heal Technologies Ltd. Topics of Discussion: 1. Most common types threats on the Internet. 2. 10 Internet security tips you must follow. 3. How Quick Heal keeps you safe against all types of online dangers.
  • 3. © 2015 Quick Heal Technologies Ltd. Most common types of threats on the Internet. #1.
  • 4. © 2015 Quick Heal Technologies Ltd. The common types of online dangers that most people fall prey to, include:
  • 5. © 2015 Quick Heal Technologies Ltd. Phishing Attacks Phishing is defined as the fraudulent act of acquiring private and sensitive information such as usernames, passwords, credit/debit card info, etc.
  • 6. © 2015 Quick Heal Technologies Ltd. Spyware Spyware are malicious software that secretly monitor user’s activities, and steal sensitive information from the infected computer.
  • 7. © 2015 Quick Heal Technologies Ltd. Keyloggers A form of spyware, keyloggers capture and record user keystrokes. The data captured is then transmitted to a remote computer.
  • 8. © 2015 Quick Heal Technologies Ltd. Trojan Horse A Trojan horse is a seemingly benign program that when activated, causes harm to a computer system.
  • 9. © 2015 Quick Heal Technologies Ltd. Drive-by Download A drive-by download refers to a malicious download to a computer or device that occurs without the owner’s consent/knowledge.
  • 10. © 2015 Quick Heal Technologies Ltd. 10 simple Internet security tips you must follow. #2.
  • 11. © 2015 Quick Heal Technologies Ltd. Use uppercase, lowercase, special characters and numbers in your passwords. Tip 1 Be Smart with Passwords.
  • 12. © 2015 Quick Heal Technologies Ltd. Use a Pin, Password, Pattern or Face Lock. Tip 2 Lock Your Device.
  • 13. © 2015 Quick Heal Technologies Ltd. Use patched & up-to-date browsers, software, and OS. Tip 3 Apply Software Updates.
  • 14. © 2015 Quick Heal Technologies Ltd. Avoid selecting ‘Keep me Logged In’ or ‘Remember me’. Tip 4 Always Log Off.
  • 15. © 2015 Quick Heal Technologies Ltd. Download free software only from verified publishers. Tip 5 Beware of Freeware.
  • 16. © 2015 Quick Heal Technologies Ltd. Your money and data are safe with well-known online stores. Tip 6 Shop from Trusted Sites.
  • 17. © 2015 Quick Heal Technologies Ltd. Accept friend requests only from people you know. Tip 7 Know Your Online Friends.
  • 18. © 2015 Quick Heal Technologies Ltd. Shop and bank only on sites whose URL begins with ‘https’. Tip 8 Use Secure Websites.
  • 19. © 2015 Quick Heal Technologies Ltd. You’ll receive a passcode every time you log in to your account. Tip 9 Use 2-Step Verification.
  • 20. © 2015 Quick Heal Technologies Ltd. It’ll protect your PC against hackers and malware. Tip 10 Use an Antivirus.
  • 21. © 2015 Quick Heal Technologies Ltd. How Quick Heal keeps you safe against all types of online dangers. #3.
  • 22. © 2015 Quick Heal Technologies Ltd. Quick Heal helps you keep your PC and its data safe from all types of Internet dangers, with its advanced security features such as:
  • 23. © 2015 Quick Heal Technologies Ltd. Automatically blocks websites that are designed to steal user information by using social media scams and phishing attacks. Web Security
  • 24. © 2015 Quick Heal Technologies Ltd. Protects your PC from any malicious file that may get downloaded from the Internet without your knowledge. Browser Sandbox
  • 25. © 2015 Quick Heal Technologies Ltd. Blocks emails designed for phishing attacks, or dropping a malware on the user’s machine. Email Security
  • 26. © 2015 Quick Heal Technologies Ltd. Stops all types of malware and viruses such as Adware, Spyware, Trojan Horse, Worms, etc., from infecting your machine. Core Protection
  • 27. © 2015 Quick Heal Technologies Ltd. Detects and stops new and unknown threats that can cause heavy damage to your computer and its data. Advanced DNAScan
  • 28. © 2015 Quick Heal Technologies Ltd. Safe Banking Creates a safe virtual environment to let you bank, shop, and pay bills online securely. Protects your sensitive data from being stolen by spyware, keyloggers, and other malicious programs.
  • 29. © 2015 Quick Heal Technologies Ltd. REMEMBER… Cyber Safety begins with you.
  • 30. © 2015 Quick Heal Technologies Ltd. THANK YOU.
  • 31. © 2015 Quick Heal Technologies Ltd. Got any queries regarding this webinar? Write to us at: CorporateCommunications@quickheal.co.in Follow us on: Facebook: www.facebook.com/quickhealav Twitter: www.twitter.com/quickheal Google Plus: bit.ly/QuickHealGooglePlus YouTube: www.youtube.com/quickheal SlideShare: http://www.slideshare.net/QuickHealPPTs Visit us: Website: www.quickheal.com Official Blog: blogs.quickheal.com