Send the link below via email or IMCopy
Present to your audienceStart remote presentation
- Invited audience members will follow you as you navigate and present
- People invited to a presentation do not need a Prezi account
- This link expires 10 minutes after you close the presentation
- A maximum of 30 users can follow your presentation
- Learn more about this feature in our knowledge base article
Protecting yourself online
Transcript of Protecting yourself online
How Can You Protect Yourself and Your Information Online? The Consequences Identity Fraud People use personal information to pose as you. 1) Don't store personal information online.
2) Make sure your firewall is turned on. 3) Use security programs like Norton Anti-virus.
4) Don't click on unknown attachments. 5) Use passwords with at least eight characters.
Top 5 ways...
Internet Scams Sometimes scammers try to cash in on natural disasters.. EG:the Icelandic volcano eruption. Choose a password which no one else would guess. The Obvious Ways Phishing Don't post information about yourself Don't post your address publicly. Don't post your phone number publicly Don't use an unsecured wireless network. Hackers Bibliography Hacked Emails? Don't click on suspicious links from your friends. "10 Ways to Protect Yourself Online - SiliconValley.com." Home - SiliconValley.com. Web. 11 May 2010. <http://www.siliconvalley.com/ghostsinthebrowser/ci_7428024>.
"The Top Five Ways To Protect Yourself From Online Fraud." Free Articles Directory | Submit Articles - ArticlesBase.com. Web. 11 May 2010. <http://www.articlesbase.com/security-articles/the-top-five-ways-to-protect-yourself-from-online-fraud-959472.html>.
"How to Protect Yourself Online." U.S. Securities and Exchange Commission (Home Page). Web. 11 May 2010. <http://www.sec.gov/spotlight/katrina/protectyourselfonline.htm>. Can even attack car control systems Garthwaite, Josie. "Hacking the Car: Next-gen Vehicles at the Mercy of Cyber Attacks." Web log post. Earth2tech, 14 May 2010. Web. 15 May 2010. <http://earth2tech.com/2010/05/14/hacking-the-car-next-gen-vehicles-at-the-mercy-of-cyber-attacks/>.