SlideShare une entreprise Scribd logo
1  sur  26
Télécharger pour lire hors ligne
© 2015 Quick Heal Technologies Ltd.
WEBINAR
6 Security Tips
for Using
Public Wi-Fi.
© 2015 Quick Heal Technologies Ltd.
Did You Know?
Hackers create
Wi-Fi hotspots
with fake names
(e.g. “Free Wi-Fi”)
to lure people.
© 2015 Quick Heal Technologies Ltd.
Topics of
• How Quick Heal reduces the risks of unsecured Wi-Fi networks.
• 6 tips for using such networks securely.
• Dangers of using unsecured Wi-Fi networks.
DISCUSSION:
© 2015 Quick Heal Technologies Ltd.
Dangers of using unsecured
Wi-Fi networks
© 2015 Quick Heal Technologies Ltd.
#1.
Your Login ID and Passwords
can be stolen.
© 2015 Quick Heal Technologies Ltd.
#2.
Your online activities can be
captured by an attacker.
© 2015 Quick Heal Technologies Ltd.
#3.
The hacker can control your
computer, its network and
data.
© 2015 Quick Heal Technologies Ltd.
#4.
The hacker can get inside
your company’s network.
© 2015 Quick Heal Technologies Ltd.
#5.
Your online accounts can be
hijacked and used illegally.
© 2015 Quick Heal Technologies Ltd.
#6.
You can be redirected to
infected or phishing websites.
© 2015 Quick Heal Technologies Ltd.
Tips to Follow While Using
Unsecured, Public Wi-Fi
© 2015 Quick Heal Technologies Ltd.
Use Virtual
Private
Network (VPN).
TIP #1.
© 2015 Quick Heal Technologies Ltd.
Only use secure
websites.
TIP #2.
© 2015 Quick Heal Technologies Ltd.
Apply 2-Factor
Authentication.
TIP #3.
© 2015 Quick Heal Technologies Ltd.
Turn Auto Wi-Fi
Connect OFF.
TIP #4.
© 2015 Quick Heal Technologies Ltd.
Use a
multilayered
AV Software.
TIP #5.
© 2015 Quick Heal Technologies Ltd.
Always
Log Out.
TIP #6.
© 2015 Quick Heal Technologies Ltd.
How Quick Heal helps
reduce the risks of
unsecured
Wi-Fi networks.
© 2015 Quick Heal Technologies Ltd.
Quick Heal cuts the dangers of
unsecured Wi-Fi networks
with these features:
© 2015 Quick Heal Technologies Ltd.
Automatically blocks phishing and infected
websites that are designed to steal your
personal information or infect your system
with malware.
Web
Security
© 2015 Quick Heal Technologies Ltd.
Secures all your financial transactions on
the Internet which might include online
baking, shopping, paying bills, etc.
Safe
Banking
© 2015 Quick Heal Technologies Ltd.
Proactively blocks spam and phishing
emails that try to trick you into visiting
bogus or infected websites.
Email
Security
© 2015 Quick Heal Technologies Ltd.
Detects and blocks worms, Trojans,
spyware and all other types of viruses
and malware.
Core
Protection
© 2015 Quick Heal Technologies Ltd.
Runs your Internet browsers in a virtual
environment. This blocks malicious files
(that may get automatically downloaded)
from affecting your real PC.
Browser
Sandbox
© 2015 Quick Heal Technologies Ltd.
Write to us at:
CorporateCommunications@quickheal.co.in
Follow us on:
Facebook: www.facebook.com/quickhealav
Twitter: www.twitter.com/quickheal
Google Plus: bit.ly/QuickHealGooglePlus
YouTube: www.youtube.com/quickheal
SlideShare: http://www.slideshare.net/QuickHealPPTs
Visit us:
Website: www.quickheal.com
Official Blog: blogs.quickheal.com
Got any queries regarding this
webinar?
© 2015 Quick Heal Technologies Ltd.
THANK YOU

Contenu connexe

Tendances

Social engineering presentation
Social engineering presentationSocial engineering presentation
Social engineering presentation
pooja_doshi
 

Tendances (20)

Social engineering presentation
Social engineering presentationSocial engineering presentation
Social engineering presentation
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
 
Phishing
PhishingPhishing
Phishing
 
Types of cyber attacks
Types of cyber attacksTypes of cyber attacks
Types of cyber attacks
 
Cyber security
Cyber securityCyber security
Cyber security
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
 
Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me"
 
Phishing
PhishingPhishing
Phishing
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Phishing Attacks
Phishing AttacksPhishing Attacks
Phishing Attacks
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Cybersecurity Employee Training
Cybersecurity Employee TrainingCybersecurity Employee Training
Cybersecurity Employee Training
 
Cyber security
Cyber securityCyber security
Cyber security
 
Information Security Awareness
Information Security Awareness Information Security Awareness
Information Security Awareness
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
 

En vedette

API 101 - Understanding APIs.
API 101 - Understanding APIs.API 101 - Understanding APIs.
API 101 - Understanding APIs.
Kirsten Hunter
 
Database Design Slide 1
Database Design Slide 1Database Design Slide 1
Database Design Slide 1
ahfiki
 

En vedette (20)

Audience for Career Counselling
Audience for Career CounsellingAudience for Career Counselling
Audience for Career Counselling
 
Facts about Facebook
Facts about FacebookFacts about Facebook
Facts about Facebook
 
India Philippines, a relationship of opportunities
India Philippines, a relationship of opportunitiesIndia Philippines, a relationship of opportunities
India Philippines, a relationship of opportunities
 
7 Common mistakes in Go and when to avoid them
7 Common mistakes in Go and when to avoid them7 Common mistakes in Go and when to avoid them
7 Common mistakes in Go and when to avoid them
 
Does your motivation need a kick start?
Does your motivation need a kick start?Does your motivation need a kick start?
Does your motivation need a kick start?
 
Api for dummies
Api for dummies  Api for dummies
Api for dummies
 
A World of Talent: What Perennial NBA Contenders Teach Us About Collaboration
A World of Talent: What Perennial NBA Contenders Teach Us About CollaborationA World of Talent: What Perennial NBA Contenders Teach Us About Collaboration
A World of Talent: What Perennial NBA Contenders Teach Us About Collaboration
 
Iphone vs android
Iphone vs androidIphone vs android
Iphone vs android
 
API 101 - Understanding APIs.
API 101 - Understanding APIs.API 101 - Understanding APIs.
API 101 - Understanding APIs.
 
GAFAnomics: Using APIs to gain unfair competitive advantage in the network ec...
GAFAnomics: Using APIs to gain unfair competitive advantage in the network ec...GAFAnomics: Using APIs to gain unfair competitive advantage in the network ec...
GAFAnomics: Using APIs to gain unfair competitive advantage in the network ec...
 
Distributed Database Management System
Distributed Database Management SystemDistributed Database Management System
Distributed Database Management System
 
What is the Internet of Things (IOT)
What is the Internet of Things (IOT)What is the Internet of Things (IOT)
What is the Internet of Things (IOT)
 
The 3 keys to language learning
The 3 keys to language learningThe 3 keys to language learning
The 3 keys to language learning
 
Android vs iOS
Android vs iOSAndroid vs iOS
Android vs iOS
 
Stretching: Is It Necessary?
Stretching: Is It Necessary?Stretching: Is It Necessary?
Stretching: Is It Necessary?
 
7 Simple Tips to Take Care of your New Android Phone
7 Simple Tips to Take Care of your New Android Phone7 Simple Tips to Take Care of your New Android Phone
7 Simple Tips to Take Care of your New Android Phone
 
Messaging is Eating the World (by Edith Yeung)
Messaging is Eating the World (by Edith Yeung)Messaging is Eating the World (by Edith Yeung)
Messaging is Eating the World (by Edith Yeung)
 
Database Design Slide 1
Database Design Slide 1Database Design Slide 1
Database Design Slide 1
 
7 Small Business Productivity Tips
7 Small Business Productivity Tips7 Small Business Productivity Tips
7 Small Business Productivity Tips
 
Introduction to database
Introduction to databaseIntroduction to database
Introduction to database
 

Similaire à 6 Security Tips for Using Public WiFi

InfraGard Albany Member Alliance Monthly Security Tips
InfraGard Albany Member Alliance Monthly Security TipsInfraGard Albany Member Alliance Monthly Security Tips
InfraGard Albany Member Alliance Monthly Security Tips
Liberteks
 
Cyber-Leave-Behind-Brochure-Done (1)
Cyber-Leave-Behind-Brochure-Done (1)Cyber-Leave-Behind-Brochure-Done (1)
Cyber-Leave-Behind-Brochure-Done (1)
Sam Norallah
 
Webinar: CYREN WebSecurity for Enterprise
Webinar: CYREN WebSecurity for EnterpriseWebinar: CYREN WebSecurity for Enterprise
Webinar: CYREN WebSecurity for Enterprise
Cyren, Inc
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
amiinaaa
 

Similaire à 6 Security Tips for Using Public WiFi (20)

5 common myths that stop people from using an antivirus copypasteads.com
5 common myths that stop people from using an antivirus copypasteads.com5 common myths that stop people from using an antivirus copypasteads.com
5 common myths that stop people from using an antivirus copypasteads.com
 
5 Common Myths that Stop People from Using an Antivirus
5 Common Myths that Stop People from Using an Antivirus5 Common Myths that Stop People from Using an Antivirus
5 Common Myths that Stop People from Using an Antivirus
 
10 Cyber Safety Tips Every Internet User Must Follow
10 Cyber Safety Tips Every Internet User Must Follow10 Cyber Safety Tips Every Internet User Must Follow
10 Cyber Safety Tips Every Internet User Must Follow
 
Top 7 Mobile Banking Security Tips
Top 7 Mobile Banking Security TipsTop 7 Mobile Banking Security Tips
Top 7 Mobile Banking Security Tips
 
How much should you reveal on social media
How much should you reveal on social mediaHow much should you reveal on social media
How much should you reveal on social media
 
30 Killer Internet Security Tips
30 Killer Internet Security Tips30 Killer Internet Security Tips
30 Killer Internet Security Tips
 
InfraGard Albany Member Alliance Monthly Security Tips
InfraGard Albany Member Alliance Monthly Security TipsInfraGard Albany Member Alliance Monthly Security Tips
InfraGard Albany Member Alliance Monthly Security Tips
 
Public Wi-Fi security 101
Public Wi-Fi security 101Public Wi-Fi security 101
Public Wi-Fi security 101
 
Cyber Security Seminar
Cyber Security SeminarCyber Security Seminar
Cyber Security Seminar
 
Why are Software Updates so Important for your Security
Why are Software Updates so Important for your SecurityWhy are Software Updates so Important for your Security
Why are Software Updates so Important for your Security
 
Cyber-Leave-Behind-Brochure-Done (1)
Cyber-Leave-Behind-Brochure-Done (1)Cyber-Leave-Behind-Brochure-Done (1)
Cyber-Leave-Behind-Brochure-Done (1)
 
Cybersecurity Fundamentals for Bar Associations
Cybersecurity Fundamentals for Bar AssociationsCybersecurity Fundamentals for Bar Associations
Cybersecurity Fundamentals for Bar Associations
 
Why you need to secure mobile apps - now
Why you need to secure mobile apps - nowWhy you need to secure mobile apps - now
Why you need to secure mobile apps - now
 
WhiteHound - Patch your code in the cloud
WhiteHound - Patch your code in the cloudWhiteHound - Patch your code in the cloud
WhiteHound - Patch your code in the cloud
 
Cyber security for small businesses
Cyber security for small businessesCyber security for small businesses
Cyber security for small businesses
 
Secure End User
Secure End UserSecure End User
Secure End User
 
Secure Messaging Done Right
Secure Messaging Done RightSecure Messaging Done Right
Secure Messaging Done Right
 
Webinar: CYREN WebSecurity for Enterprise
Webinar: CYREN WebSecurity for EnterpriseWebinar: CYREN WebSecurity for Enterprise
Webinar: CYREN WebSecurity for Enterprise
 
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
 

Plus de Quick Heal Technologies Ltd.

Plus de Quick Heal Technologies Ltd. (20)

Digital Threat Landscape
Digital Threat LandscapeDigital Threat Landscape
Digital Threat Landscape
 
Cybersecurity in Banking Sector
Cybersecurity in Banking SectorCybersecurity in Banking Sector
Cybersecurity in Banking Sector
 
31 Internet Security Tips on CyberSecurity Month Ocotober
31 Internet Security Tips on CyberSecurity Month Ocotober31 Internet Security Tips on CyberSecurity Month Ocotober
31 Internet Security Tips on CyberSecurity Month Ocotober
 
How a Ransomware Infects your Computer [INFOGRAPHIC]
How a Ransomware Infects your Computer [INFOGRAPHIC]How a Ransomware Infects your Computer [INFOGRAPHIC]
How a Ransomware Infects your Computer [INFOGRAPHIC]
 
Next-Gen Security Solution: Gateway Protection
Next-Gen Security Solution: Gateway ProtectionNext-Gen Security Solution: Gateway Protection
Next-Gen Security Solution: Gateway Protection
 
Centralized Patch Management - Proven Security Approach for Ransomware Protec...
Centralized Patch Management - Proven Security Approach for Ransomware Protec...Centralized Patch Management - Proven Security Approach for Ransomware Protec...
Centralized Patch Management - Proven Security Approach for Ransomware Protec...
 
Protecting Your organization from WannaCry Ransomware
Protecting Your organization from WannaCry RansomwareProtecting Your organization from WannaCry Ransomware
Protecting Your organization from WannaCry Ransomware
 
Seqrite Data Loss Prevention- Complete Protection from Data Theft and Data Loss
Seqrite Data Loss Prevention- Complete Protection from Data Theft and Data LossSeqrite Data Loss Prevention- Complete Protection from Data Theft and Data Loss
Seqrite Data Loss Prevention- Complete Protection from Data Theft and Data Loss
 
Is Antivirus (AV) Dead or Just Missing in Action
Is Antivirus (AV) Dead or Just Missing in Action Is Antivirus (AV) Dead or Just Missing in Action
Is Antivirus (AV) Dead or Just Missing in Action
 
Safeguard your enterprise against ransomware
Safeguard your enterprise against ransomwareSafeguard your enterprise against ransomware
Safeguard your enterprise against ransomware
 
Data Security in Healthcare
Data Security in HealthcareData Security in Healthcare
Data Security in Healthcare
 
GITEX 2016, Dubai
GITEX 2016, Dubai GITEX 2016, Dubai
GITEX 2016, Dubai
 
Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24
Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24
Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24
 
Maharashtra Cooperative Summit 2016
Maharashtra Cooperative Summit 2016Maharashtra Cooperative Summit 2016
Maharashtra Cooperative Summit 2016
 
Seqrite Hyderabad Meet 2016
Seqrite Hyderabad Meet 2016 Seqrite Hyderabad Meet 2016
Seqrite Hyderabad Meet 2016
 
Seqrite CXO Meet, Ahmedabad, India
Seqrite CXO Meet, Ahmedabad, IndiaSeqrite CXO Meet, Ahmedabad, India
Seqrite CXO Meet, Ahmedabad, India
 
Fonetastic ppt
Fonetastic pptFonetastic ppt
Fonetastic ppt
 
Seqrite Launch Event in Athens, Greece.
Seqrite Launch Event in Athens, Greece.Seqrite Launch Event in Athens, Greece.
Seqrite Launch Event in Athens, Greece.
 
BFSI Leadership Summit, Mumbai
BFSI Leadership Summit, MumbaiBFSI Leadership Summit, Mumbai
BFSI Leadership Summit, Mumbai
 
Jnana Sangama Day 1 - National convention for higher education
Jnana Sangama Day 1 - National convention for higher educationJnana Sangama Day 1 - National convention for higher education
Jnana Sangama Day 1 - National convention for higher education
 

Dernier

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 

Dernier (20)

ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 

6 Security Tips for Using Public WiFi

  • 1. © 2015 Quick Heal Technologies Ltd. WEBINAR 6 Security Tips for Using Public Wi-Fi.
  • 2. © 2015 Quick Heal Technologies Ltd. Did You Know? Hackers create Wi-Fi hotspots with fake names (e.g. “Free Wi-Fi”) to lure people.
  • 3. © 2015 Quick Heal Technologies Ltd. Topics of • How Quick Heal reduces the risks of unsecured Wi-Fi networks. • 6 tips for using such networks securely. • Dangers of using unsecured Wi-Fi networks. DISCUSSION:
  • 4. © 2015 Quick Heal Technologies Ltd. Dangers of using unsecured Wi-Fi networks
  • 5. © 2015 Quick Heal Technologies Ltd. #1. Your Login ID and Passwords can be stolen.
  • 6. © 2015 Quick Heal Technologies Ltd. #2. Your online activities can be captured by an attacker.
  • 7. © 2015 Quick Heal Technologies Ltd. #3. The hacker can control your computer, its network and data.
  • 8. © 2015 Quick Heal Technologies Ltd. #4. The hacker can get inside your company’s network.
  • 9. © 2015 Quick Heal Technologies Ltd. #5. Your online accounts can be hijacked and used illegally.
  • 10. © 2015 Quick Heal Technologies Ltd. #6. You can be redirected to infected or phishing websites.
  • 11. © 2015 Quick Heal Technologies Ltd. Tips to Follow While Using Unsecured, Public Wi-Fi
  • 12. © 2015 Quick Heal Technologies Ltd. Use Virtual Private Network (VPN). TIP #1.
  • 13. © 2015 Quick Heal Technologies Ltd. Only use secure websites. TIP #2.
  • 14. © 2015 Quick Heal Technologies Ltd. Apply 2-Factor Authentication. TIP #3.
  • 15. © 2015 Quick Heal Technologies Ltd. Turn Auto Wi-Fi Connect OFF. TIP #4.
  • 16. © 2015 Quick Heal Technologies Ltd. Use a multilayered AV Software. TIP #5.
  • 17. © 2015 Quick Heal Technologies Ltd. Always Log Out. TIP #6.
  • 18. © 2015 Quick Heal Technologies Ltd. How Quick Heal helps reduce the risks of unsecured Wi-Fi networks.
  • 19. © 2015 Quick Heal Technologies Ltd. Quick Heal cuts the dangers of unsecured Wi-Fi networks with these features:
  • 20. © 2015 Quick Heal Technologies Ltd. Automatically blocks phishing and infected websites that are designed to steal your personal information or infect your system with malware. Web Security
  • 21. © 2015 Quick Heal Technologies Ltd. Secures all your financial transactions on the Internet which might include online baking, shopping, paying bills, etc. Safe Banking
  • 22. © 2015 Quick Heal Technologies Ltd. Proactively blocks spam and phishing emails that try to trick you into visiting bogus or infected websites. Email Security
  • 23. © 2015 Quick Heal Technologies Ltd. Detects and blocks worms, Trojans, spyware and all other types of viruses and malware. Core Protection
  • 24. © 2015 Quick Heal Technologies Ltd. Runs your Internet browsers in a virtual environment. This blocks malicious files (that may get automatically downloaded) from affecting your real PC. Browser Sandbox
  • 25. © 2015 Quick Heal Technologies Ltd. Write to us at: CorporateCommunications@quickheal.co.in Follow us on: Facebook: www.facebook.com/quickhealav Twitter: www.twitter.com/quickheal Google Plus: bit.ly/QuickHealGooglePlus YouTube: www.youtube.com/quickheal SlideShare: http://www.slideshare.net/QuickHealPPTs Visit us: Website: www.quickheal.com Official Blog: blogs.quickheal.com Got any queries regarding this webinar?
  • 26. © 2015 Quick Heal Technologies Ltd. THANK YOU