SlideShare una empresa de Scribd logo
1 de 7
5 SIMPLE ONLINE SECURITY TIPS
Even though cyber attacks and cybercriminals
are getting more sophisticated, the majority of
the online hacks can be prevented by following
simple security measures.
www.identacor.com
TIP NO. 1: Employ fake data.
Instead of using real data such
as maiden name, school or a
favorite book use made up and
non-existent information when
setting up answer to a security
question.
TIP NO. 1: Be your guide, skip
personal info.
Do consider before you share
anything online. Your Facebook
feed, Foursquare check-ins and
Instagram selfies – everything is
vulnerable. Therefore, do not
share unnecessary details, not
even on social media.
TIP NO. 3: Unique passwords for
all accounts.
Never use a common password.
Hackers get access to credentials
for an account (easiest) and use
that to get into everything else. To
relieve the hassle of remembering
multiple passwords, you can use a
Password manager such as
Identacor.
TIP NO. 4: Avoid Phishing scams.
Beware of shorten links. It is
difficult to recognize phishing
URL due to the growing
popularity of customized shorten
links on social media but remain
vigilant when opening up a link.
TIP NO. 5: Hide your Password.
Never write your password on a
paper or share it with a friend.
Even at public places – schools,
conferences and restaurants –
cover your password and make
sure it is not in a clear view.
Thank you!
@Identacor

Más contenido relacionado

Destacado

Privacy is Personal Security, Digital Privacy is Digital Self Defense 11-18-2015
Privacy is Personal Security, Digital Privacy is Digital Self Defense 11-18-2015Privacy is Personal Security, Digital Privacy is Digital Self Defense 11-18-2015
Privacy is Personal Security, Digital Privacy is Digital Self Defense 11-18-2015
Gohsuke Takama
 
OPSEC for hackers (bahasa indonesia)
OPSEC for hackers (bahasa indonesia)OPSEC for hackers (bahasa indonesia)
OPSEC for hackers (bahasa indonesia)
grugq
 
Hackers The Anarchists Of Our Time
Hackers The Anarchists Of Our TimeHackers The Anarchists Of Our Time
Hackers The Anarchists Of Our Time
Utkarsh Sengar
 

Destacado (12)

Hackers and Harm Reduction / 29c3 / CCC
Hackers and Harm Reduction /  29c3 / CCCHackers and Harm Reduction /  29c3 / CCC
Hackers and Harm Reduction / 29c3 / CCC
 
Teenage Girls: Who are they?
Teenage Girls: Who are they?Teenage Girls: Who are they?
Teenage Girls: Who are they?
 
Privacy is Personal Security, Digital Privacy is Digital Self Defense 11-18-2015
Privacy is Personal Security, Digital Privacy is Digital Self Defense 11-18-2015Privacy is Personal Security, Digital Privacy is Digital Self Defense 11-18-2015
Privacy is Personal Security, Digital Privacy is Digital Self Defense 11-18-2015
 
What teenage girls are to follow
What teenage girls are to followWhat teenage girls are to follow
What teenage girls are to follow
 
OPSEC for hackers (bahasa indonesia)
OPSEC for hackers (bahasa indonesia)OPSEC for hackers (bahasa indonesia)
OPSEC for hackers (bahasa indonesia)
 
The parable of the ten teenage girls
The parable of the ten teenage girlsThe parable of the ten teenage girls
The parable of the ten teenage girls
 
Hackers The Anarchists Of Our Time
Hackers The Anarchists Of Our TimeHackers The Anarchists Of Our Time
Hackers The Anarchists Of Our Time
 
Infra
InfraInfra
Infra
 
The Teenage Girl as Consumer and Communicator
The Teenage Girl as Consumer and CommunicatorThe Teenage Girl as Consumer and Communicator
The Teenage Girl as Consumer and Communicator
 
Online safety and malwares
Online safety and malwaresOnline safety and malwares
Online safety and malwares
 
Online Security for Kids
Online Security for KidsOnline Security for Kids
Online Security for Kids
 
How do bitcoin transactions work?
How do bitcoin transactions work?How do bitcoin transactions work?
How do bitcoin transactions work?
 

Último

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Último (20)

Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 

5 Simple Online Security Tips

  • 1. 5 SIMPLE ONLINE SECURITY TIPS Even though cyber attacks and cybercriminals are getting more sophisticated, the majority of the online hacks can be prevented by following simple security measures. www.identacor.com
  • 2. TIP NO. 1: Employ fake data. Instead of using real data such as maiden name, school or a favorite book use made up and non-existent information when setting up answer to a security question.
  • 3. TIP NO. 1: Be your guide, skip personal info. Do consider before you share anything online. Your Facebook feed, Foursquare check-ins and Instagram selfies – everything is vulnerable. Therefore, do not share unnecessary details, not even on social media.
  • 4. TIP NO. 3: Unique passwords for all accounts. Never use a common password. Hackers get access to credentials for an account (easiest) and use that to get into everything else. To relieve the hassle of remembering multiple passwords, you can use a Password manager such as Identacor.
  • 5. TIP NO. 4: Avoid Phishing scams. Beware of shorten links. It is difficult to recognize phishing URL due to the growing popularity of customized shorten links on social media but remain vigilant when opening up a link.
  • 6. TIP NO. 5: Hide your Password. Never write your password on a paper or share it with a friend. Even at public places – schools, conferences and restaurants – cover your password and make sure it is not in a clear view.