Introducing
Your new presentation assistant.
Refine, enhance, and tailor your content, source relevant images, and edit visuals quicker than ever before.
Trending searches
JOSHUA WONG JIN KAI
LIM KA ZU
HACKING & ITS DANGER
To delete, corrupt, copy and edit files.
Sensitive Data could be sold to competitors.
Identity theft – to steal users identity.
To cause disruption and stop production.
Use of firewalls
sometimes part of the operating system.
Use of strong passwords which are frequently changed.
Use of protection software to detect and block possible hacking attempts.