SlideShare una empresa de Scribd logo
1 de 11
Descargar para leer sin conexión
Courtesy of Hybrid IT Solutions
   www.hybriditworks.com
  Change your passwords 
frequently. 
  Always reset default passwords 
on your computer and peripheral 
devices (especially your wireless 
router!).  
  Don’t use your e‐mail 
passwords for any other 
accounts. 




                          Courtesy of Hybrid IT Solutions
                             www.hybriditworks.com
  Don’t ever share your account 
login information with anyone else; 
this includes your friends and family 
members.  
  Friends may not intend to cause 
you any damage, but simply 
forgetting to log out of your account 
while using a public computer is all 
it takes for a hacker to compromise 
your personal security. 




                         Courtesy of Hybrid IT Solutions
                            www.hybriditworks.com
  Always select “log off” 
when you are finished using 
a web‐based application, 
even if you are using your 
personal computer. 




                             Courtesy of Hybrid IT Solutions
                                www.hybriditworks.com
  Apply updates to all your 
devices. 
  These updates not only increase 
your software and hardware 
functionality, but oftentimes they 
are intended to fix security holes 
that have been discovered.  
  Anti‐virus updates are 
particularly critical. Your anti‐virus 
software provider needs to 
communicate the new virus 
definitions to your computer, 
which is done via a software 
update. 


                             Courtesy of Hybrid IT Solutions
                                www.hybriditworks.com
  Password protect your 
computer.  
  Always lock your computer 
when you walk away from it. 
  Set your computer to 
automatically lock after it has 
been unused for 15 minutes (in 
case you forget to log out). 




                         Courtesy of Hybrid IT Solutions
                            www.hybriditworks.com
  Do not enter your primary 
e‐mail address into web 
forms.  
  Create a secondary account 
that you only use for web 
forms. This will protect you 
from receiving spam and 
other unsolicited e‐mails. 




                      Courtesy of Hybrid IT Solutions
                         www.hybriditworks.com
  Never click on “free gift” links 
embedded in an e‐mail or when 
surfing the net.  
  No one is going to give you a free 
iPhone, iPod, or iPad.  
  These ads are designed for 
phishing, or worse, to infect your 
computer with spyware or other 
malware. 



                          Courtesy of Hybrid IT Solutions
                             www.hybriditworks.com
  Do not open attachments from 
unfamiliar people.  
  Ideally, you should avoid even 
viewing an e‐mail from an 
unknown sender.  
  If you are using MS Outlook, be 
sure to turn off your preview pane 
to ensure that you have control 
over the e‐mails you are choosing 
to view. 



                        Courtesy of Hybrid IT Solutions
                           www.hybriditworks.com
  Clear your Internet cache and 
temporary files frequently. 
  Spyware and malware can lurk 
in these folders and may be 
activated when you revisit the 
infected web site. 




                      Courtesy of Hybrid IT Solutions
                         www.hybriditworks.com
  Schedule full system anti‐virus and 
malware scans weekly.  
  Anti‐virus software isn’t foolproof 
and depending on your configuration, 
it may not be scanning every file that 
enters your system.  
  A regular full system scan will also 
give your anti‐virus software a second 
chance to combat newly defined 
viruses that may be discovered after 
the latest software update. 




                             Courtesy of Hybrid IT Solutions
                                www.hybriditworks.com

Más contenido relacionado

La actualidad más candente

P R I V A C Y!!!
P R I V A C Y!!!P R I V A C Y!!!
P R I V A C Y!!!
aimane
 
Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!
Joel May
 
Spyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasmeSpyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasme
Mangesh wadibhasme
 
4 a module virus and spyware
4 a module virus and spyware4 a module virus and spyware
4 a module virus and spyware
Rozell Sneede
 

La actualidad más candente (20)

Aiman
AimanAiman
Aiman
 
P R I V A C Y!!!
P R I V A C Y!!!P R I V A C Y!!!
P R I V A C Y!!!
 
spyware
spyware spyware
spyware
 
Internet PC Security by Khalil Jubran Mindspring Networks
Internet PC Security  by Khalil Jubran  Mindspring Networks  Internet PC Security  by Khalil Jubran  Mindspring Networks
Internet PC Security by Khalil Jubran Mindspring Networks
 
Spyware by Sahibe Alam
Spyware by Sahibe AlamSpyware by Sahibe Alam
Spyware by Sahibe Alam
 
Read this
Read thisRead this
Read this
 
Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!
 
Spyware
SpywareSpyware
Spyware
 
Computing and ethics
Computing and ethicsComputing and ethics
Computing and ethics
 
Spyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasmeSpyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasme
 
4 a module virus and spyware
4 a module virus and spyware4 a module virus and spyware
4 a module virus and spyware
 
INTERNET SAFETY FOR KIDS
INTERNET SAFETY FOR KIDSINTERNET SAFETY FOR KIDS
INTERNET SAFETY FOR KIDS
 
Spyware
SpywareSpyware
Spyware
 
Spyware Adware1
Spyware Adware1Spyware Adware1
Spyware Adware1
 
What Is Spyware?
What Is Spyware?What Is Spyware?
What Is Spyware?
 
Safe Computing
Safe ComputingSafe Computing
Safe Computing
 
How to remove pro search.me
How to remove pro search.meHow to remove pro search.me
How to remove pro search.me
 
Introduction to Malware
Introduction to MalwareIntroduction to Malware
Introduction to Malware
 
How to Delete plus network.com
How to Delete plus network.comHow to Delete plus network.com
How to Delete plus network.com
 
Spyware and key loggers
Spyware and key loggersSpyware and key loggers
Spyware and key loggers
 

Destacado

Ict Phishing (Present)
Ict   Phishing (Present)Ict   Phishing (Present)
Ict Phishing (Present)
aleeya91
 
ICT-phishing
ICT-phishingICT-phishing
ICT-phishing
MH BS
 
Wireless LAN security
Wireless LAN securityWireless LAN security
Wireless LAN security
Rajan Kumar
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
Amandeep Kaur
 
PHISHING PROJECT REPORT
PHISHING PROJECT REPORTPHISHING PROJECT REPORT
PHISHING PROJECT REPORT
vineetkathan
 

Destacado (17)

Fitsum R. Lakew Wireless Network Security Threat
Fitsum  R.  Lakew  Wireless  Network  Security  ThreatFitsum  R.  Lakew  Wireless  Network  Security  Threat
Fitsum R. Lakew Wireless Network Security Threat
 
Wireless Sensors and Control Networks
Wireless Sensors and Control NetworksWireless Sensors and Control Networks
Wireless Sensors and Control Networks
 
Wireless Security
Wireless SecurityWireless Security
Wireless Security
 
Wireless Network Security
Wireless Network SecurityWireless Network Security
Wireless Network Security
 
Ict Phishing (Present)
Ict   Phishing (Present)Ict   Phishing (Present)
Ict Phishing (Present)
 
10 Advantages of Having a Monitored Security System
10 Advantages of Having a Monitored Security System10 Advantages of Having a Monitored Security System
10 Advantages of Having a Monitored Security System
 
ICT-phishing
ICT-phishingICT-phishing
ICT-phishing
 
Anti phishing
Anti phishingAnti phishing
Anti phishing
 
Dell Networking Wired, Wireless and Security Solutions Lab
Dell Networking Wired, Wireless and Security Solutions LabDell Networking Wired, Wireless and Security Solutions Lab
Dell Networking Wired, Wireless and Security Solutions Lab
 
Ch06 Wireless Network Security
Ch06 Wireless Network SecurityCh06 Wireless Network Security
Ch06 Wireless Network Security
 
Wireless LAN security
Wireless LAN securityWireless LAN security
Wireless LAN security
 
Wireless security presentation
Wireless security presentationWireless security presentation
Wireless security presentation
 
Network security
Network security Network security
Network security
 
Firewall
Firewall Firewall
Firewall
 
Network Security
Network SecurityNetwork Security
Network Security
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
PHISHING PROJECT REPORT
PHISHING PROJECT REPORTPHISHING PROJECT REPORT
PHISHING PROJECT REPORT
 

Similar a 10 ways to_increase_your_computer_security

Giarritano concept paper 4
Giarritano concept paper 4Giarritano concept paper 4
Giarritano concept paper 4
leahg118
 
Safe computing (Tips & Tricks)
Safe computing (Tips & Tricks)Safe computing (Tips & Tricks)
Safe computing (Tips & Tricks)
Satyendra Arora
 

Similar a 10 ways to_increase_your_computer_security (20)

How To Protect Your Home PC
How To Protect Your Home PCHow To Protect Your Home PC
How To Protect Your Home PC
 
CYBERSPACE SAFETY TIPS FOR SMEs.ppt
CYBERSPACE SAFETY TIPS FOR SMEs.pptCYBERSPACE SAFETY TIPS FOR SMEs.ppt
CYBERSPACE SAFETY TIPS FOR SMEs.ppt
 
Computers.ppt
Computers.pptComputers.ppt
Computers.ppt
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Internet security
Internet securityInternet security
Internet security
 
Giarritano concept paper 4
Giarritano concept paper 4Giarritano concept paper 4
Giarritano concept paper 4
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
IT security awareness
IT security awarenessIT security awareness
IT security awareness
 
Defensive measure of virus
Defensive  measure of virusDefensive  measure of virus
Defensive measure of virus
 
Keeping Your Children, your information and your equiptment safe
Keeping Your Children, your information and your equiptment safeKeeping Your Children, your information and your equiptment safe
Keeping Your Children, your information and your equiptment safe
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Cyber security
Cyber securityCyber security
Cyber security
 
Staying Safe on the Computer and Online
Staying Safe on the Computer and OnlineStaying Safe on the Computer and Online
Staying Safe on the Computer and Online
 
Safety Plano Library June 4 Main
Safety   Plano Library June 4 MainSafety   Plano Library June 4 Main
Safety Plano Library June 4 Main
 
User security awareness
User security awarenessUser security awareness
User security awareness
 
An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)
 
UserSecurityAwarenessUniversityTemplate.ppt
UserSecurityAwarenessUniversityTemplate.pptUserSecurityAwarenessUniversityTemplate.ppt
UserSecurityAwarenessUniversityTemplate.ppt
 
End User Security Awareness - Information Security
End User Security Awareness - Information SecurityEnd User Security Awareness - Information Security
End User Security Awareness - Information Security
 
Information security for health practitioners
Information security for health practitionersInformation security for health practitioners
Information security for health practitioners
 
Safe computing (Tips & Tricks)
Safe computing (Tips & Tricks)Safe computing (Tips & Tricks)
Safe computing (Tips & Tricks)
 

Último

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Último (20)

What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 

10 ways to_increase_your_computer_security