SlideShare una empresa de Scribd logo
1 de 31
Descargar para leer sin conexión
© 2015 Quick Heal Technologies Ltd.
10CYBER SAFETY TIPS
WEBINAR
Every Internet User Must Follow
© 2015 Quick Heal Technologies Ltd.
Topics of Discussion:
1. Most common types threats on the
Internet.
2. 10 Internet security tips you must follow.
3. How Quick Heal keeps you safe against
all types of online dangers.
© 2015 Quick Heal Technologies Ltd.
Most common
types of threats on
the Internet.
#1.
© 2015 Quick Heal Technologies Ltd.
The common types of online
dangers that most people fall
prey to, include:
© 2015 Quick Heal Technologies Ltd.
Phishing Attacks
Phishing is defined as the fraudulent act of
acquiring private and sensitive information
such as usernames, passwords, credit/debit
card info, etc.
© 2015 Quick Heal Technologies Ltd.
Spyware
Spyware are malicious software that
secretly monitor user’s activities, and steal
sensitive information from the infected
computer.
© 2015 Quick Heal Technologies Ltd.
Keyloggers
A form of spyware, keyloggers capture and
record user keystrokes. The data captured is
then transmitted to a remote computer.
© 2015 Quick Heal Technologies Ltd.
Trojan Horse
A Trojan horse is a seemingly benign
program that when activated, causes harm
to a computer system.
© 2015 Quick Heal Technologies Ltd.
Drive-by Download
A drive-by download refers to a malicious
download to a computer or device that
occurs without the owner’s
consent/knowledge.
© 2015 Quick Heal Technologies Ltd.
10 simple Internet
security tips you
must follow.
#2.
© 2015 Quick Heal Technologies Ltd.
Use uppercase, lowercase,
special characters and
numbers in your passwords.
Tip 1
Be Smart with
Passwords.
© 2015 Quick Heal Technologies Ltd.
Use a Pin, Password, Pattern or
Face Lock.
Tip 2
Lock Your
Device.
© 2015 Quick Heal Technologies Ltd.
Use patched & up-to-date
browsers, software, and OS.
Tip 3
Apply Software
Updates.
© 2015 Quick Heal Technologies Ltd.
Avoid selecting ‘Keep me
Logged In’ or ‘Remember me’.
Tip 4
Always
Log Off.
© 2015 Quick Heal Technologies Ltd.
Download free software only
from verified publishers.
Tip 5
Beware of
Freeware.
© 2015 Quick Heal Technologies Ltd.
Your money and data are safe
with well-known online stores.
Tip 6
Shop from
Trusted Sites.
© 2015 Quick Heal Technologies Ltd.
Accept friend requests only
from people you know.
Tip 7
Know Your
Online Friends.
© 2015 Quick Heal Technologies Ltd.
Shop and bank only on sites
whose URL begins with ‘https’.
Tip 8
Use Secure
Websites.
© 2015 Quick Heal Technologies Ltd.
You’ll receive a passcode every
time you log in to your account.
Tip 9
Use 2-Step
Verification.
© 2015 Quick Heal Technologies Ltd.
It’ll protect your PC against
hackers and malware.
Tip 10
Use an
Antivirus.
© 2015 Quick Heal Technologies Ltd.
How Quick Heal keeps
you safe against all types
of online dangers.
#3.
© 2015 Quick Heal Technologies Ltd.
Quick Heal helps you keep your
PC and its data safe from all types of
Internet dangers, with its advanced
security features such as:
© 2015 Quick Heal Technologies Ltd.
Automatically blocks websites
that are designed to steal user
information by using social media
scams and phishing attacks.
Web Security
© 2015 Quick Heal Technologies Ltd.
Protects your PC from any malicious
file that may get downloaded from
the Internet without your knowledge.
Browser Sandbox
© 2015 Quick Heal Technologies Ltd.
Blocks emails designed for phishing
attacks, or dropping a malware on
the user’s machine.
Email Security
© 2015 Quick Heal Technologies Ltd.
Stops all types of malware and
viruses such as Adware, Spyware,
Trojan Horse, Worms, etc., from
infecting your machine.
Core Protection
© 2015 Quick Heal Technologies Ltd.
Detects and stops new and
unknown threats that can cause
heavy damage to your computer
and its data.
Advanced DNAScan
© 2015 Quick Heal Technologies Ltd.
Safe Banking
Creates a safe virtual environment to let you
bank, shop, and pay bills online securely.
Protects your sensitive data from being stolen by
spyware, keyloggers, and other malicious
programs.
© 2015 Quick Heal Technologies Ltd.
REMEMBER…
Cyber Safety begins with you.
© 2015 Quick Heal Technologies Ltd.
THANK YOU.
© 2015 Quick Heal Technologies Ltd.
Got any queries regarding this
webinar?
Write to us at:
CorporateCommunications@quickheal.co.in
Follow us on:
Facebook: www.facebook.com/quickhealav
Twitter: www.twitter.com/quickheal
Google Plus: bit.ly/QuickHealGooglePlus
YouTube: www.youtube.com/quickheal
SlideShare: http://www.slideshare.net/QuickHealPPTs
Visit us:
Website: www.quickheal.com
Official Blog: blogs.quickheal.com

Más contenido relacionado

La actualidad más candente

mcafee-10-steps-infographic-d2
mcafee-10-steps-infographic-d2mcafee-10-steps-infographic-d2
mcafee-10-steps-infographic-d2
Monica Hamilton
 
Cyber-Leave-Behind-Brochure-Done (1)
Cyber-Leave-Behind-Brochure-Done (1)Cyber-Leave-Behind-Brochure-Done (1)
Cyber-Leave-Behind-Brochure-Done (1)
Sam Norallah
 
Microsoft Final Internet Safety Poster
Microsoft Final Internet Safety PosterMicrosoft Final Internet Safety Poster
Microsoft Final Internet Safety Poster
Jack
 
Network basic security
Network basic  securityNetwork basic  security
Network basic security
Mohamed Radji
 
Adult Internet Safety
Adult Internet SafetyAdult Internet Safety
Adult Internet Safety
reidcollins42
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
viimsikool
 

La actualidad más candente (20)

10 Tips to Keep Criminals Out
10 Tips to Keep Criminals Out10 Tips to Keep Criminals Out
10 Tips to Keep Criminals Out
 
"10 Tips To Keep Cybercriminals Out While Coronavirus Keeps You In" Infographic
"10 Tips To Keep Cybercriminals Out While Coronavirus Keeps You In" Infographic"10 Tips To Keep Cybercriminals Out While Coronavirus Keeps You In" Infographic
"10 Tips To Keep Cybercriminals Out While Coronavirus Keeps You In" Infographic
 
Five mobile security challenges facing the enterprise
Five mobile security challenges facing the enterpriseFive mobile security challenges facing the enterprise
Five mobile security challenges facing the enterprise
 
The Benefits of a Network Security Plan
The Benefits of a Network Security PlanThe Benefits of a Network Security Plan
The Benefits of a Network Security Plan
 
mcafee-10-steps-infographic-d2
mcafee-10-steps-infographic-d2mcafee-10-steps-infographic-d2
mcafee-10-steps-infographic-d2
 
Fitsec-remote work and cyber security
Fitsec-remote work and cyber securityFitsec-remote work and cyber security
Fitsec-remote work and cyber security
 
Internet Security at Work Presentation
Internet Security at Work PresentationInternet Security at Work Presentation
Internet Security at Work Presentation
 
A day in the life of a pentester
A day in the life of a pentesterA day in the life of a pentester
A day in the life of a pentester
 
Cyber-Leave-Behind-Brochure-Done (1)
Cyber-Leave-Behind-Brochure-Done (1)Cyber-Leave-Behind-Brochure-Done (1)
Cyber-Leave-Behind-Brochure-Done (1)
 
Computer Investigation on Employees
Computer Investigation on EmployeesComputer Investigation on Employees
Computer Investigation on Employees
 
Microsoft Final Internet Safety Poster
Microsoft Final Internet Safety PosterMicrosoft Final Internet Safety Poster
Microsoft Final Internet Safety Poster
 
Cyber security and crime
Cyber security and crimeCyber security and crime
Cyber security and crime
 
What is CryptoLocker and How Can I Protect My Business From It?
What is CryptoLocker and How Can I Protect My Business From It?What is CryptoLocker and How Can I Protect My Business From It?
What is CryptoLocker and How Can I Protect My Business From It?
 
Network basic security
Network basic  securityNetwork basic  security
Network basic security
 
Secure Your Mobile Apps
Secure Your Mobile AppsSecure Your Mobile Apps
Secure Your Mobile Apps
 
Case - How to protect your website
Case - How to protect your websiteCase - How to protect your website
Case - How to protect your website
 
Adult Internet Safety
Adult Internet SafetyAdult Internet Safety
Adult Internet Safety
 
Shifting left: Continuous testing for better app quality and security
Shifting left: Continuous testing for better app quality and securityShifting left: Continuous testing for better app quality and security
Shifting left: Continuous testing for better app quality and security
 
Hacker Tricks: How You Can Protect Yourself
Hacker Tricks: How You Can Protect YourselfHacker Tricks: How You Can Protect Yourself
Hacker Tricks: How You Can Protect Yourself
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 

Destacado

Brain gym starters
Brain gym startersBrain gym starters
Brain gym starters
Kathryn Hall
 
The brain __exercise_connection_-_power_point_presentation final
The brain __exercise_connection_-_power_point_presentation finalThe brain __exercise_connection_-_power_point_presentation final
The brain __exercise_connection_-_power_point_presentation final
CMoondog
 
Bancroft Exercise Effects on the Brain
Bancroft Exercise Effects on the BrainBancroft Exercise Effects on the Brain
Bancroft Exercise Effects on the Brain
Bancroft
 
Right or Left!!!
Right or Left!!!Right or Left!!!
Right or Left!!!
Happy Garg
 

Destacado (20)

Foundation Win
Foundation WinFoundation Win
Foundation Win
 
Brain training unit 1 HU public
Brain training unit 1   HU publicBrain training unit 1   HU public
Brain training unit 1 HU public
 
Brain gym starters
Brain gym startersBrain gym starters
Brain gym starters
 
The brain __exercise_connection_-_power_point_presentation final
The brain __exercise_connection_-_power_point_presentation finalThe brain __exercise_connection_-_power_point_presentation final
The brain __exercise_connection_-_power_point_presentation final
 
Miracle grow your brain
Miracle grow your brainMiracle grow your brain
Miracle grow your brain
 
Bancroft Exercise Effects on the Brain
Bancroft Exercise Effects on the BrainBancroft Exercise Effects on the Brain
Bancroft Exercise Effects on the Brain
 
Superbrain yoga
Superbrain yogaSuperbrain yoga
Superbrain yoga
 
Hypno Study
Hypno StudyHypno Study
Hypno Study
 
Are You a Left or a Right Brain
Are You a Left or a Right BrainAre You a Left or a Right Brain
Are You a Left or a Right Brain
 
Left and Right Brain Dominance
Left and Right Brain DominanceLeft and Right Brain Dominance
Left and Right Brain Dominance
 
Right or Left!!!
Right or Left!!!Right or Left!!!
Right or Left!!!
 
Brain gym
Brain gymBrain gym
Brain gym
 
Self-healing Materials
Self-healing MaterialsSelf-healing Materials
Self-healing Materials
 
Right Brain Presentation
Right Brain PresentationRight Brain Presentation
Right Brain Presentation
 
Presentation Neuro marketing
Presentation Neuro marketingPresentation Neuro marketing
Presentation Neuro marketing
 
A Simple Brain Exercise
A Simple Brain ExerciseA Simple Brain Exercise
A Simple Brain Exercise
 
Self healing Materials
Self healing MaterialsSelf healing Materials
Self healing Materials
 
Indian psychology
Indian psychologyIndian psychology
Indian psychology
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 

Similar a 10 Cyber Safety Tips Every Internet User Must Follow

Completing your Next Generation Threat Prevention - Check Point
Completing your Next Generation Threat Prevention - Check PointCompleting your Next Generation Threat Prevention - Check Point
Completing your Next Generation Threat Prevention - Check Point
aliciasyc
 
cyber security presentation (1).pdf
cyber security presentation (1).pdfcyber security presentation (1).pdf
cyber security presentation (1).pdf
w4tgrgdyryfh
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
amiinaaa
 

Similar a 10 Cyber Safety Tips Every Internet User Must Follow (20)

5 common myths that stop people from using an antivirus copypasteads.com
5 common myths that stop people from using an antivirus copypasteads.com5 common myths that stop people from using an antivirus copypasteads.com
5 common myths that stop people from using an antivirus copypasteads.com
 
Top 7 Mobile Banking Security Tips
Top 7 Mobile Banking Security TipsTop 7 Mobile Banking Security Tips
Top 7 Mobile Banking Security Tips
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Completing your Next Generation Threat Prevention - Check Point
Completing your Next Generation Threat Prevention - Check PointCompleting your Next Generation Threat Prevention - Check Point
Completing your Next Generation Threat Prevention - Check Point
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101
 
Secure End User
Secure End UserSecure End User
Secure End User
 
Internet secutity ppt by vaishnavi khandelwal
Internet secutity ppt by vaishnavi khandelwalInternet secutity ppt by vaishnavi khandelwal
Internet secutity ppt by vaishnavi khandelwal
 
It security,malware,phishing,information theft
It security,malware,phishing,information theftIt security,malware,phishing,information theft
It security,malware,phishing,information theft
 
Check your network security
Check your network securityCheck your network security
Check your network security
 
cyber security presentation (1).pdf
cyber security presentation (1).pdfcyber security presentation (1).pdf
cyber security presentation (1).pdf
 
Internet security
Internet securityInternet security
Internet security
 
Executive Directors Chat:It's easy to stay safe online.pdf
Executive Directors Chat:It's easy to stay safe online.pdfExecutive Directors Chat:It's easy to stay safe online.pdf
Executive Directors Chat:It's easy to stay safe online.pdf
 
Cyber security for small businesses
Cyber security for small businessesCyber security for small businesses
Cyber security for small businesses
 
Stop Account Takeover Attacks, Right in their Tracks
Stop Account Takeover Attacks, Right in their TracksStop Account Takeover Attacks, Right in their Tracks
Stop Account Takeover Attacks, Right in their Tracks
 
Cyber Security School Workshop
Cyber Security School WorkshopCyber Security School Workshop
Cyber Security School Workshop
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Cybersecurity Training
Cybersecurity TrainingCybersecurity Training
Cybersecurity Training
 
spyware
spywarespyware
spyware
 

Más de Quick Heal Technologies Ltd.

Más de Quick Heal Technologies Ltd. (20)

Digital Threat Landscape
Digital Threat LandscapeDigital Threat Landscape
Digital Threat Landscape
 
Cybersecurity in Banking Sector
Cybersecurity in Banking SectorCybersecurity in Banking Sector
Cybersecurity in Banking Sector
 
31 Internet Security Tips on CyberSecurity Month Ocotober
31 Internet Security Tips on CyberSecurity Month Ocotober31 Internet Security Tips on CyberSecurity Month Ocotober
31 Internet Security Tips on CyberSecurity Month Ocotober
 
How a Ransomware Infects your Computer [INFOGRAPHIC]
How a Ransomware Infects your Computer [INFOGRAPHIC]How a Ransomware Infects your Computer [INFOGRAPHIC]
How a Ransomware Infects your Computer [INFOGRAPHIC]
 
Next-Gen Security Solution: Gateway Protection
Next-Gen Security Solution: Gateway ProtectionNext-Gen Security Solution: Gateway Protection
Next-Gen Security Solution: Gateway Protection
 
Centralized Patch Management - Proven Security Approach for Ransomware Protec...
Centralized Patch Management - Proven Security Approach for Ransomware Protec...Centralized Patch Management - Proven Security Approach for Ransomware Protec...
Centralized Patch Management - Proven Security Approach for Ransomware Protec...
 
Protecting Your organization from WannaCry Ransomware
Protecting Your organization from WannaCry RansomwareProtecting Your organization from WannaCry Ransomware
Protecting Your organization from WannaCry Ransomware
 
Seqrite Data Loss Prevention- Complete Protection from Data Theft and Data Loss
Seqrite Data Loss Prevention- Complete Protection from Data Theft and Data LossSeqrite Data Loss Prevention- Complete Protection from Data Theft and Data Loss
Seqrite Data Loss Prevention- Complete Protection from Data Theft and Data Loss
 
Is Antivirus (AV) Dead or Just Missing in Action
Is Antivirus (AV) Dead or Just Missing in Action Is Antivirus (AV) Dead or Just Missing in Action
Is Antivirus (AV) Dead or Just Missing in Action
 
Safeguard your enterprise against ransomware
Safeguard your enterprise against ransomwareSafeguard your enterprise against ransomware
Safeguard your enterprise against ransomware
 
Data Security in Healthcare
Data Security in HealthcareData Security in Healthcare
Data Security in Healthcare
 
GITEX 2016, Dubai
GITEX 2016, Dubai GITEX 2016, Dubai
GITEX 2016, Dubai
 
Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24
Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24
Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24
 
Maharashtra Cooperative Summit 2016
Maharashtra Cooperative Summit 2016Maharashtra Cooperative Summit 2016
Maharashtra Cooperative Summit 2016
 
Seqrite Hyderabad Meet 2016
Seqrite Hyderabad Meet 2016 Seqrite Hyderabad Meet 2016
Seqrite Hyderabad Meet 2016
 
Seqrite CXO Meet, Ahmedabad, India
Seqrite CXO Meet, Ahmedabad, IndiaSeqrite CXO Meet, Ahmedabad, India
Seqrite CXO Meet, Ahmedabad, India
 
Fonetastic ppt
Fonetastic pptFonetastic ppt
Fonetastic ppt
 
Seqrite Launch Event in Athens, Greece.
Seqrite Launch Event in Athens, Greece.Seqrite Launch Event in Athens, Greece.
Seqrite Launch Event in Athens, Greece.
 
BFSI Leadership Summit, Mumbai
BFSI Leadership Summit, MumbaiBFSI Leadership Summit, Mumbai
BFSI Leadership Summit, Mumbai
 
Jnana Sangama Day 1 - National convention for higher education
Jnana Sangama Day 1 - National convention for higher educationJnana Sangama Day 1 - National convention for higher education
Jnana Sangama Day 1 - National convention for higher education
 

Último

%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
masabamasaba
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
masabamasaba
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
VictorSzoltysek
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
Health
 

Último (20)

tonesoftg
tonesoftgtonesoftg
tonesoftg
 
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
 
Define the academic and professional writing..pdf
Define the academic and professional writing..pdfDefine the academic and professional writing..pdf
Define the academic and professional writing..pdf
 
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park %in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) SolutionIntroducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
 
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdfPayment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
 
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
 
%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
 
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
 
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park %in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
 
WSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go PlatformlessWSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go Platformless
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
 

10 Cyber Safety Tips Every Internet User Must Follow

  • 1. © 2015 Quick Heal Technologies Ltd. 10CYBER SAFETY TIPS WEBINAR Every Internet User Must Follow
  • 2. © 2015 Quick Heal Technologies Ltd. Topics of Discussion: 1. Most common types threats on the Internet. 2. 10 Internet security tips you must follow. 3. How Quick Heal keeps you safe against all types of online dangers.
  • 3. © 2015 Quick Heal Technologies Ltd. Most common types of threats on the Internet. #1.
  • 4. © 2015 Quick Heal Technologies Ltd. The common types of online dangers that most people fall prey to, include:
  • 5. © 2015 Quick Heal Technologies Ltd. Phishing Attacks Phishing is defined as the fraudulent act of acquiring private and sensitive information such as usernames, passwords, credit/debit card info, etc.
  • 6. © 2015 Quick Heal Technologies Ltd. Spyware Spyware are malicious software that secretly monitor user’s activities, and steal sensitive information from the infected computer.
  • 7. © 2015 Quick Heal Technologies Ltd. Keyloggers A form of spyware, keyloggers capture and record user keystrokes. The data captured is then transmitted to a remote computer.
  • 8. © 2015 Quick Heal Technologies Ltd. Trojan Horse A Trojan horse is a seemingly benign program that when activated, causes harm to a computer system.
  • 9. © 2015 Quick Heal Technologies Ltd. Drive-by Download A drive-by download refers to a malicious download to a computer or device that occurs without the owner’s consent/knowledge.
  • 10. © 2015 Quick Heal Technologies Ltd. 10 simple Internet security tips you must follow. #2.
  • 11. © 2015 Quick Heal Technologies Ltd. Use uppercase, lowercase, special characters and numbers in your passwords. Tip 1 Be Smart with Passwords.
  • 12. © 2015 Quick Heal Technologies Ltd. Use a Pin, Password, Pattern or Face Lock. Tip 2 Lock Your Device.
  • 13. © 2015 Quick Heal Technologies Ltd. Use patched & up-to-date browsers, software, and OS. Tip 3 Apply Software Updates.
  • 14. © 2015 Quick Heal Technologies Ltd. Avoid selecting ‘Keep me Logged In’ or ‘Remember me’. Tip 4 Always Log Off.
  • 15. © 2015 Quick Heal Technologies Ltd. Download free software only from verified publishers. Tip 5 Beware of Freeware.
  • 16. © 2015 Quick Heal Technologies Ltd. Your money and data are safe with well-known online stores. Tip 6 Shop from Trusted Sites.
  • 17. © 2015 Quick Heal Technologies Ltd. Accept friend requests only from people you know. Tip 7 Know Your Online Friends.
  • 18. © 2015 Quick Heal Technologies Ltd. Shop and bank only on sites whose URL begins with ‘https’. Tip 8 Use Secure Websites.
  • 19. © 2015 Quick Heal Technologies Ltd. You’ll receive a passcode every time you log in to your account. Tip 9 Use 2-Step Verification.
  • 20. © 2015 Quick Heal Technologies Ltd. It’ll protect your PC against hackers and malware. Tip 10 Use an Antivirus.
  • 21. © 2015 Quick Heal Technologies Ltd. How Quick Heal keeps you safe against all types of online dangers. #3.
  • 22. © 2015 Quick Heal Technologies Ltd. Quick Heal helps you keep your PC and its data safe from all types of Internet dangers, with its advanced security features such as:
  • 23. © 2015 Quick Heal Technologies Ltd. Automatically blocks websites that are designed to steal user information by using social media scams and phishing attacks. Web Security
  • 24. © 2015 Quick Heal Technologies Ltd. Protects your PC from any malicious file that may get downloaded from the Internet without your knowledge. Browser Sandbox
  • 25. © 2015 Quick Heal Technologies Ltd. Blocks emails designed for phishing attacks, or dropping a malware on the user’s machine. Email Security
  • 26. © 2015 Quick Heal Technologies Ltd. Stops all types of malware and viruses such as Adware, Spyware, Trojan Horse, Worms, etc., from infecting your machine. Core Protection
  • 27. © 2015 Quick Heal Technologies Ltd. Detects and stops new and unknown threats that can cause heavy damage to your computer and its data. Advanced DNAScan
  • 28. © 2015 Quick Heal Technologies Ltd. Safe Banking Creates a safe virtual environment to let you bank, shop, and pay bills online securely. Protects your sensitive data from being stolen by spyware, keyloggers, and other malicious programs.
  • 29. © 2015 Quick Heal Technologies Ltd. REMEMBER… Cyber Safety begins with you.
  • 30. © 2015 Quick Heal Technologies Ltd. THANK YOU.
  • 31. © 2015 Quick Heal Technologies Ltd. Got any queries regarding this webinar? Write to us at: CorporateCommunications@quickheal.co.in Follow us on: Facebook: www.facebook.com/quickhealav Twitter: www.twitter.com/quickheal Google Plus: bit.ly/QuickHealGooglePlus YouTube: www.youtube.com/quickheal SlideShare: http://www.slideshare.net/QuickHealPPTs Visit us: Website: www.quickheal.com Official Blog: blogs.quickheal.com