SlideShare una empresa de Scribd logo
1 de 1
Descargar para leer sin conexión
#CyberSecMonth
#ThinkB4UClick
?
When you’re completing a profile for an account,
only give information that is necessary and that
you are comfortable giving.
Use the privacy and security settings and
disable any features you don’t need.
If you’re unsure about it, reconsider creating the
profile with that company.
1. Be aware of what information
you are sharing
Posting when you’re emotional is not always a
good idea, what you post online stays there
forever. Even if you delete it afterwards, someone
could have saved or forwarded it.
Wait until you are calmer then think about it again,
do you really want to post that comment?
2. Think before you post
If you’re posting a photo, have you
considered if everyone in the photo is
happy for you to publish it? You may be
giving away information, like where you live.
And posting pictures from your amazing
holiday is telling burglars you are not at
home!
3. Consider the consequences
Before you take part in that fun game that is
doing the rounds on social media, consider
what they are asking you - your first pet’s
name, your mother’s maiden name?
These are the same questions that are used for
security, for example by the bank, so answering
them could be giving important information
to hackers.
4. Pause before you play
Following the news and asking family and
friends to let you know about scams that are in
circulation e.g. phishing scams, malicious
software (like Flubot) and fake websites can
help you stay safe online.
For other sources of information for your
country visit
https://cybersecuritymonth.eu/cyber-first-aid
Stay vigilant!
6. Stay tuned to cybersecurity news
Be aware that scammers use social networks,
websites and send messages to your phone to steal
your information, your money or your identity.
You can protect yourself by not giving any
personal information, money or account details
unless you can verify by another means of
communication who you are sharing them with.
5. Make sure you know who you
are communicating with
Going online helps you stay connected with family and friends, keeps you up to date
with news, gives you access to online learning and much more. But it is always a good
idea to keep security in mind and there are lots of things you can do to protect yourself.
Top Tips for Protecting
Yourself Online

Más contenido relacionado

La actualidad más candente

Slideshow - Lil Rat
Slideshow - Lil RatSlideshow - Lil Rat
Slideshow - Lil Rat
megg16
 

La actualidad más candente (20)

Internet Safety for 1950s Adults and Beginners
Internet Safety for 1950s Adults and BeginnersInternet Safety for 1950s Adults and Beginners
Internet Safety for 1950s Adults and Beginners
 
Email hacking
Email hackingEmail hacking
Email hacking
 
How to Avoid Crypto Scams - Crypto JBro
How to Avoid Crypto Scams - Crypto JBroHow to Avoid Crypto Scams - Crypto JBro
How to Avoid Crypto Scams - Crypto JBro
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Slideshow - Lil Rat
Slideshow - Lil RatSlideshow - Lil Rat
Slideshow - Lil Rat
 
Junior secondary yr 7:8 aug 18 4.3 preview
Junior secondary yr 7:8 aug 18 4.3 previewJunior secondary yr 7:8 aug 18 4.3 preview
Junior secondary yr 7:8 aug 18 4.3 preview
 
Internet fraud and identity theft
Internet fraud and identity theftInternet fraud and identity theft
Internet fraud and identity theft
 
Introduction to Hacking
Introduction to HackingIntroduction to Hacking
Introduction to Hacking
 
Internet Security - Naga Rohit S [ IIT Guwahati ] - Coding Club & DefCon DC91...
Internet Security - Naga Rohit S [ IIT Guwahati ] - Coding Club & DefCon DC91...Internet Security - Naga Rohit S [ IIT Guwahati ] - Coding Club & DefCon DC91...
Internet Security - Naga Rohit S [ IIT Guwahati ] - Coding Club & DefCon DC91...
 
Passwords for sale
Passwords for salePasswords for sale
Passwords for sale
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Email Security Awareness
Email Security AwarenessEmail Security Awareness
Email Security Awareness
 
Don't ask, don't tell the virtues of privacy by design
Don't ask, don't tell   the virtues of privacy by designDon't ask, don't tell   the virtues of privacy by design
Don't ask, don't tell the virtues of privacy by design
 
Webspoofing
WebspoofingWebspoofing
Webspoofing
 
Getting inside the cybercriminal's m ind
Getting inside the cybercriminal's m ind Getting inside the cybercriminal's m ind
Getting inside the cybercriminal's m ind
 
Cybersafety Checklist for Writers
Cybersafety Checklist for WritersCybersafety Checklist for Writers
Cybersafety Checklist for Writers
 
Internet Safety & Cyber chip presentation
Internet Safety & Cyber chip presentationInternet Safety & Cyber chip presentation
Internet Safety & Cyber chip presentation
 
Net 213 Policy Primer
Net 213 Policy PrimerNet 213 Policy Primer
Net 213 Policy Primer
 
How to incrementally improve Sanctions Screening with AI
How to incrementally improve Sanctions Screening with AIHow to incrementally improve Sanctions Screening with AI
How to incrementally improve Sanctions Screening with AI
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 

Similar a ECSM 2021 - Sfaturi pentru a te proteja în mediul online

Guide to facebook security
Guide to facebook securityGuide to facebook security
Guide to facebook security
Ernest Staats
 

Similar a ECSM 2021 - Sfaturi pentru a te proteja în mediul online (20)

Dos and don's on social media
Dos and don's on social mediaDos and don's on social media
Dos and don's on social media
 
Student book key unit3
Student book key unit3Student book key unit3
Student book key unit3
 
EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2
 
Heads up!
Heads up!Heads up!
Heads up!
 
Internet safety guide
Internet safety guide Internet safety guide
Internet safety guide
 
The Social Safety Guide
The Social Safety GuideThe Social Safety Guide
The Social Safety Guide
 
Cyber crime alert - Copy.pptx
Cyber crime alert - Copy.pptxCyber crime alert - Copy.pptx
Cyber crime alert - Copy.pptx
 
Lesson 2 rules of netiquette
Lesson 2 rules of netiquetteLesson 2 rules of netiquette
Lesson 2 rules of netiquette
 
10.a guide-to-facebook-security
10.a guide-to-facebook-security10.a guide-to-facebook-security
10.a guide-to-facebook-security
 
Users guide
Users guideUsers guide
Users guide
 
Guide to facebook security
Guide to facebook securityGuide to facebook security
Guide to facebook security
 
Guide to facebook security
Guide to facebook securityGuide to facebook security
Guide to facebook security
 
DIgital Citizenship for Parents of Middle School Students
DIgital Citizenship for Parents of Middle School StudentsDIgital Citizenship for Parents of Middle School Students
DIgital Citizenship for Parents of Middle School Students
 
MindMake - Online Safety Talking to your Kids Parental Control
MindMake - Online Safety Talking to your Kids Parental ControlMindMake - Online Safety Talking to your Kids Parental Control
MindMake - Online Safety Talking to your Kids Parental Control
 
Social Media Safety Presentation
Social Media Safety PresentationSocial Media Safety Presentation
Social Media Safety Presentation
 
INTERNET SECUIRTY TIPS
INTERNET SECUIRTY TIPSINTERNET SECUIRTY TIPS
INTERNET SECUIRTY TIPS
 
Girls security abuse - social media - security tips.arise raabi - pdf
Girls security   abuse - social media - security tips.arise raabi - pdfGirls security   abuse - social media - security tips.arise raabi - pdf
Girls security abuse - social media - security tips.arise raabi - pdf
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Cyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threats
 

Más de One-IT

Más de One-IT (20)

Centralizator întrebări și răspunsuri Digitalizare IMM.doc
Centralizator întrebări și răspunsuri Digitalizare IMM.docCentralizator întrebări și răspunsuri Digitalizare IMM.doc
Centralizator întrebări și răspunsuri Digitalizare IMM.doc
 
Ghid final Digitalizare IMM
Ghid final Digitalizare IMMGhid final Digitalizare IMM
Ghid final Digitalizare IMM
 
Corrigendum-ul la Ghidul solicitantului POC 4.1.1. Bis.pdf
Corrigendum-ul la Ghidul solicitantului POC 4.1.1. Bis.pdfCorrigendum-ul la Ghidul solicitantului POC 4.1.1. Bis.pdf
Corrigendum-ul la Ghidul solicitantului POC 4.1.1. Bis.pdf
 
Ghidul solicitantului 4.1.1. BIS.pdf
Ghidul solicitantului 4.1.1. BIS.pdfGhidul solicitantului 4.1.1. BIS.pdf
Ghidul solicitantului 4.1.1. BIS.pdf
 
Ghidul Solicitantului varianta intermediară 4.1.1 BIS.docx
Ghidul Solicitantului varianta intermediară 4.1.1 BIS.docxGhidul Solicitantului varianta intermediară 4.1.1 BIS.docx
Ghidul Solicitantului varianta intermediară 4.1.1 BIS.docx
 
Ordonanța 19/2022 cu privire la rectificarea bugetului de stat pe anul 2022
Ordonanța 19/2022 cu privire la rectificarea bugetului de stat pe anul 2022Ordonanța 19/2022 cu privire la rectificarea bugetului de stat pe anul 2022
Ordonanța 19/2022 cu privire la rectificarea bugetului de stat pe anul 2022
 
Ordonanța de Urgență 113/2022 privind acțiunea POC 4.1.1. Bis.pdf
Ordonanța de Urgență 113/2022 privind acțiunea POC 4.1.1. Bis.pdfOrdonanța de Urgență 113/2022 privind acțiunea POC 4.1.1. Bis.pdf
Ordonanța de Urgență 113/2022 privind acțiunea POC 4.1.1. Bis.pdf
 
Ghid 4.1.1 BIS Industrie alimentară și construcții - Consultare Publică.docx
Ghid 4.1.1 BIS Industrie alimentară și construcții - Consultare Publică.docxGhid 4.1.1 BIS Industrie alimentară și construcții - Consultare Publică.docx
Ghid 4.1.1 BIS Industrie alimentară și construcții - Consultare Publică.docx
 
Procedura-femeia-antreprenor-2022.pdf
Procedura-femeia-antreprenor-2022.pdfProcedura-femeia-antreprenor-2022.pdf
Procedura-femeia-antreprenor-2022.pdf
 
Ghidul final al solicitantului Acțiunea 4.1.1 Investiții în activități produc...
Ghidul final al solicitantului Acțiunea 4.1.1 Investiții în activități produc...Ghidul final al solicitantului Acțiunea 4.1.1 Investiții în activități produc...
Ghidul final al solicitantului Acțiunea 4.1.1 Investiții în activități produc...
 
Ghid actiunea 4.1.1 versiunea consolidata.docx
Ghid actiunea 4.1.1 versiunea consolidata.docxGhid actiunea 4.1.1 versiunea consolidata.docx
Ghid actiunea 4.1.1 versiunea consolidata.docx
 
Ghid actiunea 4.1.1 versiunea consolidata 18.02.2022
Ghid actiunea 4.1.1 versiunea consolidata 18.02.2022Ghid actiunea 4.1.1 versiunea consolidata 18.02.2022
Ghid actiunea 4.1.1 versiunea consolidata 18.02.2022
 
Cum te protejezi de tentativele de tip scam în business
Cum te protejezi de tentativele de tip scam în businessCum te protejezi de tentativele de tip scam în business
Cum te protejezi de tentativele de tip scam în business
 
ECSM 2021 - Cum previi atacurile de tip phishing
ECSM 2021 - Cum previi atacurile de tip phishingECSM 2021 - Cum previi atacurile de tip phishing
ECSM 2021 - Cum previi atacurile de tip phishing
 
ECSM 2021- Informații importante despre amprenta ta digitală
ECSM 2021- Informații importante despre amprenta ta digitalăECSM 2021- Informații importante despre amprenta ta digitală
ECSM 2021- Informații importante despre amprenta ta digitală
 
Ghidul digitalizarea IMM oipsi consultare publica
Ghidul digitalizarea IMM oipsi consultare publicaGhidul digitalizarea IMM oipsi consultare publica
Ghidul digitalizarea IMM oipsi consultare publica
 
Ghid poc imbunatatirea continutului digital si a infrastructurii TIC sistemic...
Ghid poc imbunatatirea continutului digital si a infrastructurii TIC sistemic...Ghid poc imbunatatirea continutului digital si a infrastructurii TIC sistemic...
Ghid poc imbunatatirea continutului digital si a infrastructurii TIC sistemic...
 
Poly Eagle eye Mini
Poly Eagle eye MiniPoly Eagle eye Mini
Poly Eagle eye Mini
 
Ghid cu contributie privata - Propunerea de ghid al solicitantului pentru acc...
Ghid cu contributie privata - Propunerea de ghid al solicitantului pentru acc...Ghid cu contributie privata - Propunerea de ghid al solicitantului pentru acc...
Ghid cu contributie privata - Propunerea de ghid al solicitantului pentru acc...
 
One-IT - prezentare GDPR-ul si Protectia datelor personale
One-IT - prezentare GDPR-ul si Protectia datelor personaleOne-IT - prezentare GDPR-ul si Protectia datelor personale
One-IT - prezentare GDPR-ul si Protectia datelor personale
 

Último

Último (20)

Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 

ECSM 2021 - Sfaturi pentru a te proteja în mediul online

  • 1. #CyberSecMonth #ThinkB4UClick ? When you’re completing a profile for an account, only give information that is necessary and that you are comfortable giving. Use the privacy and security settings and disable any features you don’t need. If you’re unsure about it, reconsider creating the profile with that company. 1. Be aware of what information you are sharing Posting when you’re emotional is not always a good idea, what you post online stays there forever. Even if you delete it afterwards, someone could have saved or forwarded it. Wait until you are calmer then think about it again, do you really want to post that comment? 2. Think before you post If you’re posting a photo, have you considered if everyone in the photo is happy for you to publish it? You may be giving away information, like where you live. And posting pictures from your amazing holiday is telling burglars you are not at home! 3. Consider the consequences Before you take part in that fun game that is doing the rounds on social media, consider what they are asking you - your first pet’s name, your mother’s maiden name? These are the same questions that are used for security, for example by the bank, so answering them could be giving important information to hackers. 4. Pause before you play Following the news and asking family and friends to let you know about scams that are in circulation e.g. phishing scams, malicious software (like Flubot) and fake websites can help you stay safe online. For other sources of information for your country visit https://cybersecuritymonth.eu/cyber-first-aid Stay vigilant! 6. Stay tuned to cybersecurity news Be aware that scammers use social networks, websites and send messages to your phone to steal your information, your money or your identity. You can protect yourself by not giving any personal information, money or account details unless you can verify by another means of communication who you are sharing them with. 5. Make sure you know who you are communicating with Going online helps you stay connected with family and friends, keeps you up to date with news, gives you access to online learning and much more. But it is always a good idea to keep security in mind and there are lots of things you can do to protect yourself. Top Tips for Protecting Yourself Online