SlideShare una empresa de Scribd logo
1 de 8
WEBSPIDERS INTERWEB PVT .LTD.
The Cloud Hosting Experts in Asia.
WAYS TO PROTECT YOUR
DATA FROM HACKING
Do not Claim your winnings or
log onto Internet banking via
email
 Cybercriminals and attackers often hide malware in links in either
emails or text messages. Clicking on these links can install malicious
software that compromises your computer and gives hackers access
to all of your data. These emails are often very
convincing, so it pays to be aware.
 Also, your bank will never email you and ask
you to click on a link to log into online banking
via email, so never trust such emails.
Make sure you do not
Procrastinate your backup
 Backups are time consuming, but putting off your backup until
tomorrow or the next day could have devastating
consequences.
 Ensure that backup is completed at least
once a day, if not more, using an automated
backup solution. Identify critical resources, ensure
that they are included in backup policies, and importantly, test
your backup and restore capabilities frequently to ensure that
they are working correctly before a disaster
strikes.
 Social media has changed the way we interact with each other, and many
people feel that there’s no such thing as too many friends on Facebook.
However, making friends with people you don’t know can be a dangerous
practice.
 Cybercriminals use social media to spread viruses, perpetrate fraud, distribute
spam and phishing messages, and even gather information that can be used
for identity theft.
Do not accept friend requests from
people you don’t know
 Wi-Fi hotspots are a free, convenient and ever more accessible way
of accessing the Internet in public places. However, it needs to be
remembered that these hotspots are free to access, which means
that they are not encrypted and are typically not secured. Sending
confidential information over these channels
leaves it open to theft and access by
unwanted eyes.
 If you are going to use an unknown network, it is advisable to use a
secured https connection or a Wi-Fi privacy application, which will
ensure that your connection over public Wi-Fi is secured, helping to
protect data.
Do not Send confidential data over free
Wi-Fi
 Passwords are surprisingly easy to crack, as most users will choose
an easy to remember password about
something that is close to them, like a
friend’s name. Many people also re-use
the same password on multiple sites and
write their passwords down.
 Make sure your password is strong by
using at least eight characters and a
combination of letters, numbers and symbols.
Avoiding these simple mistakes can go a long way in protecting your
data.
CHECK yourself- Are you using weak
passwords and the same password for
multiple sites?
Webspiders Interweb Pvt. Ltd.
304, Whispering Palms, Subhash Marg,
C-Scheme, Jaipur, India
Ph: +91-141-410-5555
+91-141-510-5555
Email : sales@wipl.in
You can Contact the team of WEB HOSTING
SUPERHEROES
Thank You.

Más contenido relacionado

La actualidad más candente

Internet safety v 4 slides and notes
Internet safety v 4  slides and notesInternet safety v 4  slides and notes
Internet safety v 4 slides and notes
Linda Barron
 
C:\fakepath\wg xcs emailsecurity 170 370 570
C:\fakepath\wg xcs emailsecurity 170 370 570C:\fakepath\wg xcs emailsecurity 170 370 570
C:\fakepath\wg xcs emailsecurity 170 370 570
Yustinus Simon
 

La actualidad más candente (20)

The internet and safety
The internet and safetyThe internet and safety
The internet and safety
 
Check your network security
Check your network securityCheck your network security
Check your network security
 
Protecting Yourself Online
Protecting Yourself OnlineProtecting Yourself Online
Protecting Yourself Online
 
Teaching Your Staff About Phishing
Teaching Your Staff About PhishingTeaching Your Staff About Phishing
Teaching Your Staff About Phishing
 
Security At Home
Security At HomeSecurity At Home
Security At Home
 
Account security
Account securityAccount security
Account security
 
Phishing awareness
Phishing awarenessPhishing awareness
Phishing awareness
 
Phishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You SafePhishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You Safe
 
Phis
PhisPhis
Phis
 
Internet safety v 4 slides and notes
Internet safety v 4  slides and notesInternet safety v 4  slides and notes
Internet safety v 4 slides and notes
 
Cyber security
Cyber securityCyber security
Cyber security
 
10 tips to prevent phishing attacks
10 tips to prevent phishing attacks10 tips to prevent phishing attacks
10 tips to prevent phishing attacks
 
TBEX - North America 2014 - 5 Tips to Keep Your Content and Users Safe
TBEX - North America 2014 - 5 Tips to Keep Your Content and Users SafeTBEX - North America 2014 - 5 Tips to Keep Your Content and Users Safe
TBEX - North America 2014 - 5 Tips to Keep Your Content and Users Safe
 
Tha security awareness training
Tha security awareness trainingTha security awareness training
Tha security awareness training
 
C:\fakepath\wg xcs emailsecurity 170 370 570
C:\fakepath\wg xcs emailsecurity 170 370 570C:\fakepath\wg xcs emailsecurity 170 370 570
C:\fakepath\wg xcs emailsecurity 170 370 570
 
XCS - Watchguard
XCS - WatchguardXCS - Watchguard
XCS - Watchguard
 
Phishing
PhishingPhishing
Phishing
 
Domain 5 of the CEH: Web Application Hacking
Domain 5 of the CEH: Web Application HackingDomain 5 of the CEH: Web Application Hacking
Domain 5 of the CEH: Web Application Hacking
 
Domain 4 of CEH V11: Network and Perimeter Hacking
Domain 4 of CEH V11: Network and Perimeter HackingDomain 4 of CEH V11: Network and Perimeter Hacking
Domain 4 of CEH V11: Network and Perimeter Hacking
 
Irm 13-phishing
Irm 13-phishingIrm 13-phishing
Irm 13-phishing
 

Destacado (8)

Benefits of Telecommuting
Benefits of TelecommutingBenefits of Telecommuting
Benefits of Telecommuting
 
Pathway2 work presentation- plan to become a successful work programme provider
Pathway2 work presentation- plan to become a successful work programme providerPathway2 work presentation- plan to become a successful work programme provider
Pathway2 work presentation- plan to become a successful work programme provider
 
Telecommuting
TelecommutingTelecommuting
Telecommuting
 
Telecommuting
TelecommutingTelecommuting
Telecommuting
 
Telecommuting
TelecommutingTelecommuting
Telecommuting
 
Von Neumann Architecture
Von Neumann ArchitectureVon Neumann Architecture
Von Neumann Architecture
 
Definition
DefinitionDefinition
Definition
 
World wide web
World wide webWorld wide web
World wide web
 

Similar a Ways to protect your data from hacking

need help with a term paper 8 pages Write a term paper that discusse.pdf
need help with a term paper 8 pages Write a term paper that discusse.pdfneed help with a term paper 8 pages Write a term paper that discusse.pdf
need help with a term paper 8 pages Write a term paper that discusse.pdf
anjandavid
 
5 a module online privacy
5 a module online privacy5 a module online privacy
5 a module online privacy
Rozell Sneede
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
amiinaaa
 

Similar a Ways to protect your data from hacking (20)

Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptx
 
Cybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppCybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureApp
 
Network Security
Network SecurityNetwork Security
Network Security
 
A Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the InternetA Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the Internet
 
10 most important cyber security tips for your users
10 most important cyber security tips for your users10 most important cyber security tips for your users
10 most important cyber security tips for your users
 
Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2
 
need help with a term paper 8 pages Write a term paper that discusse.pdf
need help with a term paper 8 pages Write a term paper that discusse.pdfneed help with a term paper 8 pages Write a term paper that discusse.pdf
need help with a term paper 8 pages Write a term paper that discusse.pdf
 
5 a module online privacy
5 a module online privacy5 a module online privacy
5 a module online privacy
 
Internet Safety.pptx
Internet Safety.pptxInternet Safety.pptx
Internet Safety.pptx
 
EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
 
Security-Awareness-Training.pptx
Security-Awareness-Training.pptxSecurity-Awareness-Training.pptx
Security-Awareness-Training.pptx
 
The Net is Dangerous
The Net is DangerousThe Net is Dangerous
The Net is Dangerous
 
Safe Computing
Safe ComputingSafe Computing
Safe Computing
 
Identity Theft - by LINKS Technology
Identity Theft - by LINKS TechnologyIdentity Theft - by LINKS Technology
Identity Theft - by LINKS Technology
 
Lesson 2 rules of netiquette
Lesson 2 rules of netiquetteLesson 2 rules of netiquette
Lesson 2 rules of netiquette
 
TheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxTheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptx
 
S_A_T.pptx
S_A_T.pptxS_A_T.pptx
S_A_T.pptx
 
Guide to pc_security
Guide to pc_securityGuide to pc_security
Guide to pc_security
 
7 Small Business Security Tips
7 Small Business Security Tips7 Small Business Security Tips
7 Small Business Security Tips
 

Último

Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
UK Journal
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Peter Udo Diehl
 

Último (20)

Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
 
PLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsPLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. Startups
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
 
Optimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityOptimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through Observability
 
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone KomSalesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & Ireland
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxUnpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
 
Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024
 
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeFree and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoft
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 

Ways to protect your data from hacking

  • 1. WEBSPIDERS INTERWEB PVT .LTD. The Cloud Hosting Experts in Asia. WAYS TO PROTECT YOUR DATA FROM HACKING
  • 2. Do not Claim your winnings or log onto Internet banking via email  Cybercriminals and attackers often hide malware in links in either emails or text messages. Clicking on these links can install malicious software that compromises your computer and gives hackers access to all of your data. These emails are often very convincing, so it pays to be aware.  Also, your bank will never email you and ask you to click on a link to log into online banking via email, so never trust such emails.
  • 3. Make sure you do not Procrastinate your backup  Backups are time consuming, but putting off your backup until tomorrow or the next day could have devastating consequences.  Ensure that backup is completed at least once a day, if not more, using an automated backup solution. Identify critical resources, ensure that they are included in backup policies, and importantly, test your backup and restore capabilities frequently to ensure that they are working correctly before a disaster strikes.
  • 4.  Social media has changed the way we interact with each other, and many people feel that there’s no such thing as too many friends on Facebook. However, making friends with people you don’t know can be a dangerous practice.  Cybercriminals use social media to spread viruses, perpetrate fraud, distribute spam and phishing messages, and even gather information that can be used for identity theft. Do not accept friend requests from people you don’t know
  • 5.  Wi-Fi hotspots are a free, convenient and ever more accessible way of accessing the Internet in public places. However, it needs to be remembered that these hotspots are free to access, which means that they are not encrypted and are typically not secured. Sending confidential information over these channels leaves it open to theft and access by unwanted eyes.  If you are going to use an unknown network, it is advisable to use a secured https connection or a Wi-Fi privacy application, which will ensure that your connection over public Wi-Fi is secured, helping to protect data. Do not Send confidential data over free Wi-Fi
  • 6.  Passwords are surprisingly easy to crack, as most users will choose an easy to remember password about something that is close to them, like a friend’s name. Many people also re-use the same password on multiple sites and write their passwords down.  Make sure your password is strong by using at least eight characters and a combination of letters, numbers and symbols. Avoiding these simple mistakes can go a long way in protecting your data. CHECK yourself- Are you using weak passwords and the same password for multiple sites?
  • 7. Webspiders Interweb Pvt. Ltd. 304, Whispering Palms, Subhash Marg, C-Scheme, Jaipur, India Ph: +91-141-410-5555 +91-141-510-5555 Email : sales@wipl.in You can Contact the team of WEB HOSTING SUPERHEROES