SlideShare une entreprise Scribd logo
1  sur  11
TOP 10 INTERNET
SAFETY RULES AND
WHAT NOT TO DO
ONLINE
1. KEEP PERSONAL INFORMATION
PROFESSIONAL AND LIMITED
• Potential employers or costumers don’t need to know your personal
relationship status or your home address.
• They do need to know about your expertise and professional background,
and how to get in touch with you.
• You wouldn’t hand purely personal information out to strangers
individually- don’t hand it out to millions of people online.
2. KEEP YOUR PRIVACY SETTINGS ON
• bout you, and so do hackers.
• Both can learn aa lot from your browsing and soMarketers love to know all
cial media usage. But you can take charge of your information.
• As noted by lifehacker, both web browsers and mobile operating systems
have settings available to protect your privacy online.
3.PRACTICE SAFE BROWSING
.You wouldn’t choose to walk through a dangerous neighborhood- don’t visit
dangerous neighborhood online.
• Cybercriminals use lurid content as bait.
• They know people are sometimes tempted by dubious content and may left
their guard down when searching for it
4. MAKE SURE YOUR INTERNET
CONNECTION IS SECURE. USE A SECURE
VPN CONNECTION
• When you go online in a public place, for example by using a public WIFI
connection PCMag notes you have no direct control over its security.
• Corporate cybersecurity experts worry about “endpoints “ – the places
where a private network connects to the outside world.
• Your vulnerable endpoint is your local internet connection.
5. BE CAREFUL WHAT YOU DOWNLOAD
• A top goal of cybercriminals is to trick you into downloading malware-
programs or apps that carry malware or try to steal information.
• This malware can be disguised as an app: anything from a popular game to
something that checks traffic or the weather.
• As PCWorld advises, don’t download apps that look suspicious or come from
a site you don’t trust.
6. CHOOSE STRONG PASWORDS
• Password are one of the biggest weak sports in the whole internet security
structure but there’s currently no way around them.
• And the problem with passwords is that people tend to choose easy ones to
remember (such as “password” and 123456), which are also easy for cyber
thieves to guess.
• Select strong passwords that are harder for cybercriminals.
7. MAKE ONLINE PURCHASES FROM
SECURE SITES
• Any time you make a purchase online, you need to provide credit card or
bank account information- just what cybercriminals are most eager to get
their hands on.
• Only supply this information to sites that provide secure, enscryted
connections.
• As bosten University notes, you can
8. BE CAREFUL WHAT YOU POST
• The internet does not have a delete key, as that young candidate in New
Hampshire found out.
• any comment or image you post online may stay online forever because
removing the original (say, from Twitter ) does not remove any copies that
other people made.
• There is no way for you to “take back” a remark you wish you had’nt made,
or get rid of that embrassing selfie you took at a party.
9.BE CAREFUL WHO YOU MEET ONLINE
• People you meet online are not always who they claim to be. Indeed, they
may not even be real
• As InfoWorld reports, fake social media profiles are a popular way for
hackers to cozy up to unwary Web user and pick their cyber pockets.
• Be as cautious and sensible in your online social life as you are in your in-
person social life .
10.KEEP YOUR ANTIVIRUS PROGRAM UP
TO DATE
• Internet security software cannot protect against every threat, but it will
detect and remove most malware- though you should make sure it’s to date.
• Be sure to stay current with your operating systems updates and updates
to appliacations you use.
• They provide a vital layer of security.

Contenu connexe

Similaire à TOP 10 INTERNET SAFETY RULES AND WHAT NOT.pptx

Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital AgeMarian Merritt
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayane Hazimeh
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayane Hazimeh
 
Introduction to Cybersecurity - Secondary School_0.pptx
Introduction to Cybersecurity - Secondary School_0.pptxIntroduction to Cybersecurity - Secondary School_0.pptx
Introduction to Cybersecurity - Secondary School_0.pptxShubhamGupta833557
 
empowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationempowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationSheryldeVilla2
 
Cybercrime and the Developer: How to Start Defending Against the Darker Side...
 Cybercrime and the Developer: How to Start Defending Against the Darker Side... Cybercrime and the Developer: How to Start Defending Against the Darker Side...
Cybercrime and the Developer: How to Start Defending Against the Darker Side...Steve Poole
 
Jax london2016 cybercrime-and-the-developer
Jax london2016 cybercrime-and-the-developerJax london2016 cybercrime-and-the-developer
Jax london2016 cybercrime-and-the-developerSteve Poole
 
Mobile Security for the Modern Tech Mogul
Mobile Security for the Modern Tech MogulMobile Security for the Modern Tech Mogul
Mobile Security for the Modern Tech MogulAndrew Schwabe
 
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptxCYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptxBarakaMuyengi
 
Chp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxChp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxHarishParthasarathy4
 
Cybercrime and the Developer Java2Days 2016 Sofia
Cybercrime and the Developer Java2Days 2016 SofiaCybercrime and the Developer Java2Days 2016 Sofia
Cybercrime and the Developer Java2Days 2016 SofiaSteve Poole
 
Rules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxRules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxNoelBuctot1
 
Internet Security
Internet SecurityInternet Security
Internet Securitymjelson
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessArjith K Raj
 
Identity theft in internet
Identity theft in internetIdentity theft in internet
Identity theft in internetomarjohni
 
10 most important cyber security tips for your users
10 most important cyber security tips for your users10 most important cyber security tips for your users
10 most important cyber security tips for your usersSimpliv LLC
 

Similaire à TOP 10 INTERNET SAFETY RULES AND WHAT NOT.pptx (20)

Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital Age
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Introduction to Cybersecurity - Secondary School_0.pptx
Introduction to Cybersecurity - Secondary School_0.pptxIntroduction to Cybersecurity - Secondary School_0.pptx
Introduction to Cybersecurity - Secondary School_0.pptx
 
empowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationempowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentation
 
Cybercrime and the Developer: How to Start Defending Against the Darker Side...
 Cybercrime and the Developer: How to Start Defending Against the Darker Side... Cybercrime and the Developer: How to Start Defending Against the Darker Side...
Cybercrime and the Developer: How to Start Defending Against the Darker Side...
 
Jax london2016 cybercrime-and-the-developer
Jax london2016 cybercrime-and-the-developerJax london2016 cybercrime-and-the-developer
Jax london2016 cybercrime-and-the-developer
 
Mobile Security for the Modern Tech Mogul
Mobile Security for the Modern Tech MogulMobile Security for the Modern Tech Mogul
Mobile Security for the Modern Tech Mogul
 
Judy Taylour's Digital Privacy Day 2014 Presentation
Judy Taylour's Digital Privacy Day 2014 PresentationJudy Taylour's Digital Privacy Day 2014 Presentation
Judy Taylour's Digital Privacy Day 2014 Presentation
 
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptxCYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
 
Chp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxChp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptx
 
Dos and Don'ts of Internet Security
Dos and Don'ts of Internet SecurityDos and Don'ts of Internet Security
Dos and Don'ts of Internet Security
 
Cybercrime and the Developer Java2Days 2016 Sofia
Cybercrime and the Developer Java2Days 2016 SofiaCybercrime and the Developer Java2Days 2016 Sofia
Cybercrime and the Developer Java2Days 2016 Sofia
 
Rules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxRules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptx
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Digital Security and Hygiene.pptx
Digital Security and Hygiene.pptxDigital Security and Hygiene.pptx
Digital Security and Hygiene.pptx
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
Staying safe-on-internet
Staying safe-on-internetStaying safe-on-internet
Staying safe-on-internet
 
Identity theft in internet
Identity theft in internetIdentity theft in internet
Identity theft in internet
 
10 most important cyber security tips for your users
10 most important cyber security tips for your users10 most important cyber security tips for your users
10 most important cyber security tips for your users
 

Plus de RoNTertainmentTV

Plus de RoNTertainmentTV (20)

EARLY-REGISTRATION-TARPAPEL.pptx
EARLY-REGISTRATION-TARPAPEL.pptxEARLY-REGISTRATION-TARPAPEL.pptx
EARLY-REGISTRATION-TARPAPEL.pptx
 
Lesson4.1.pptx
Lesson4.1.pptxLesson4.1.pptx
Lesson4.1.pptx
 
Lesson2.pptx
Lesson2.pptxLesson2.pptx
Lesson2.pptx
 
Lesson1.pptx
Lesson1.pptxLesson1.pptx
Lesson1.pptx
 
MEDIA LITERACY-DLL 4.docx
MEDIA LITERACY-DLL 4.docxMEDIA LITERACY-DLL 4.docx
MEDIA LITERACY-DLL 4.docx
 
2.-MEDIA-DLL copy.docx
2.-MEDIA-DLL copy.docx2.-MEDIA-DLL copy.docx
2.-MEDIA-DLL copy.docx
 
1.-MEDIA-DLL week1.docx
1.-MEDIA-DLL week1.docx1.-MEDIA-DLL week1.docx
1.-MEDIA-DLL week1.docx
 
Daily Lesson Log in MIL Week 5.docx
Daily Lesson Log in MIL Week 5.docxDaily Lesson Log in MIL Week 5.docx
Daily Lesson Log in MIL Week 5.docx
 
Daily Lesson Log in MIL.docx
Daily Lesson Log in MIL.docxDaily Lesson Log in MIL.docx
Daily Lesson Log in MIL.docx
 
Workplace Emergency Categories.pptx
Workplace Emergency Categories.pptxWorkplace Emergency Categories.pptx
Workplace Emergency Categories.pptx
 
Use of Personal Protective Equipment (PPE).pptx
Use of Personal Protective Equipment (PPE).pptxUse of Personal Protective Equipment (PPE).pptx
Use of Personal Protective Equipment (PPE).pptx
 
Examples of TYpes of Hazards.pptx
Examples of TYpes of Hazards.pptxExamples of TYpes of Hazards.pptx
Examples of TYpes of Hazards.pptx
 
CLASSIFICATION OF MARKET STRUCTURES.pptx
CLASSIFICATION OF MARKET STRUCTURES.pptxCLASSIFICATION OF MARKET STRUCTURES.pptx
CLASSIFICATION OF MARKET STRUCTURES.pptx
 
MARKET STRUCTURES.pptx
MARKET STRUCTURES.pptxMARKET STRUCTURES.pptx
MARKET STRUCTURES.pptx
 
Infographics.pptx
Infographics.pptxInfographics.pptx
Infographics.pptx
 
TOWS ANALYSIS.pptx
TOWS ANALYSIS.pptxTOWS ANALYSIS.pptx
TOWS ANALYSIS.pptx
 
MANUFACTURING.pptx
MANUFACTURING.pptxMANUFACTURING.pptx
MANUFACTURING.pptx
 
Business and Industry.pptx
Business and Industry.pptxBusiness and Industry.pptx
Business and Industry.pptx
 
AGRIBUSINESS.pptx
AGRIBUSINESS.pptxAGRIBUSINESS.pptx
AGRIBUSINESS.pptx
 
Cleaning and Sanitizing.pptx
Cleaning and Sanitizing.pptxCleaning and Sanitizing.pptx
Cleaning and Sanitizing.pptx
 

Dernier

Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 

Dernier (20)

Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 

TOP 10 INTERNET SAFETY RULES AND WHAT NOT.pptx

  • 1. TOP 10 INTERNET SAFETY RULES AND WHAT NOT TO DO ONLINE
  • 2. 1. KEEP PERSONAL INFORMATION PROFESSIONAL AND LIMITED • Potential employers or costumers don’t need to know your personal relationship status or your home address. • They do need to know about your expertise and professional background, and how to get in touch with you. • You wouldn’t hand purely personal information out to strangers individually- don’t hand it out to millions of people online.
  • 3. 2. KEEP YOUR PRIVACY SETTINGS ON • bout you, and so do hackers. • Both can learn aa lot from your browsing and soMarketers love to know all cial media usage. But you can take charge of your information. • As noted by lifehacker, both web browsers and mobile operating systems have settings available to protect your privacy online.
  • 4. 3.PRACTICE SAFE BROWSING .You wouldn’t choose to walk through a dangerous neighborhood- don’t visit dangerous neighborhood online. • Cybercriminals use lurid content as bait. • They know people are sometimes tempted by dubious content and may left their guard down when searching for it
  • 5. 4. MAKE SURE YOUR INTERNET CONNECTION IS SECURE. USE A SECURE VPN CONNECTION • When you go online in a public place, for example by using a public WIFI connection PCMag notes you have no direct control over its security. • Corporate cybersecurity experts worry about “endpoints “ – the places where a private network connects to the outside world. • Your vulnerable endpoint is your local internet connection.
  • 6. 5. BE CAREFUL WHAT YOU DOWNLOAD • A top goal of cybercriminals is to trick you into downloading malware- programs or apps that carry malware or try to steal information. • This malware can be disguised as an app: anything from a popular game to something that checks traffic or the weather. • As PCWorld advises, don’t download apps that look suspicious or come from a site you don’t trust.
  • 7. 6. CHOOSE STRONG PASWORDS • Password are one of the biggest weak sports in the whole internet security structure but there’s currently no way around them. • And the problem with passwords is that people tend to choose easy ones to remember (such as “password” and 123456), which are also easy for cyber thieves to guess. • Select strong passwords that are harder for cybercriminals.
  • 8. 7. MAKE ONLINE PURCHASES FROM SECURE SITES • Any time you make a purchase online, you need to provide credit card or bank account information- just what cybercriminals are most eager to get their hands on. • Only supply this information to sites that provide secure, enscryted connections. • As bosten University notes, you can
  • 9. 8. BE CAREFUL WHAT YOU POST • The internet does not have a delete key, as that young candidate in New Hampshire found out. • any comment or image you post online may stay online forever because removing the original (say, from Twitter ) does not remove any copies that other people made. • There is no way for you to “take back” a remark you wish you had’nt made, or get rid of that embrassing selfie you took at a party.
  • 10. 9.BE CAREFUL WHO YOU MEET ONLINE • People you meet online are not always who they claim to be. Indeed, they may not even be real • As InfoWorld reports, fake social media profiles are a popular way for hackers to cozy up to unwary Web user and pick their cyber pockets. • Be as cautious and sensible in your online social life as you are in your in- person social life .
  • 11. 10.KEEP YOUR ANTIVIRUS PROGRAM UP TO DATE • Internet security software cannot protect against every threat, but it will detect and remove most malware- though you should make sure it’s to date. • Be sure to stay current with your operating systems updates and updates to appliacations you use. • They provide a vital layer of security.