SlideShare ist ein Scribd-Unternehmen logo
1 von 1
Downloaden Sie, um offline zu lesen
The more you use the Internet, the more important it is to be
sure that you are able to manage your security online. The
UK loses billions every year to e-criminals. The following are
some key points to note:
Anti-Virus/ Anti-Spyware
Everyone using the Internet, whether on their iPad,
smart phone or pc needs to have good anti-virus
and anti-spyware programmes or apps. Keep these
updated!. Believe it or not, it is possible to get
viruses on smart phones, tablet pcs and jail-broken
iPhones too! A good firewall will help too.
Fraping and Identity Theft
Fraping is when a friend or family member pretends to be you and uses your Facebook
account to posts funny updates! To prevent fraping, or someone hacking your identity,
always log off after using services like email, Pinterest, Amazon, Facebook, Twitter,
Foursquare etc. Also use hard to guess passwords, and never share these with
your friends.
Dodgy Files and Downloads
Never open emails with strange subject lines or from people you do not know. Similarly
never accept suspicious looking files sent/shared via Bluetooth, Dropbox, Messenger
programmes, Skype, email or similar services. Some malware also gets bundled with
software you download, so always read the fine print, before clicking ‘Agree’, and only
download programmes from trusted websites for example
Wireless Network Security
If you have a wireless network, password protect it, make it invisible, change the default
router password, and use ‘machine level’ filtering to limit access to your wireless
network to specific devices. These settings can be customised by logging onto your
router. Whilst not foolproof, these steps will reduce the possibility of misuse.
Update your Operating System and Software
Your pc or smart phone comes with an operating system. Over time, developers make
changes to this and will offer security and other updates, which you should always carry
out. Keep any apps/ programmes you install updated too! For updates to the Windows
operating system, see:
Copyright © 2012 WISE KIDS. Creative Commons License: CC BY-ND 3.0
http://www.tucows.com
http://windowsupdate.microsoft.com
e-Securitye-Security
http://creativecommons.org/licenses/by-nd/3.0/
www.wisekids.org.uk
Backup
Using a good external hard disk, or an online 'cloud-based' storage service (examples:
Dropbox: http://www.dropbox.com, SkyDrive: http://www.skydrive.com,
SpiderOak: http://www.spideroak.com), always backup your data – this could be
coursework, emails, photos, videos or any content which you have created.

Weitere ähnliche Inhalte

Was ist angesagt?

HELE 4 Lesson 2: Safe and Responsible Use of ICT
HELE 4 Lesson 2: Safe and Responsible Use of ICTHELE 4 Lesson 2: Safe and Responsible Use of ICT
HELE 4 Lesson 2: Safe and Responsible Use of ICTBenandro Palor
 
Internet threats and defence mechanism
Internet threats and defence mechanismInternet threats and defence mechanism
Internet threats and defence mechanismCAS
 
Spyware Adware1
Spyware Adware1Spyware Adware1
Spyware Adware1rubal_9
 
S P Y W A R E4 S I K
S P Y W A R E4 S I KS P Y W A R E4 S I K
S P Y W A R E4 S I Kazman21
 
Virus Spyware Quiz
Virus Spyware QuizVirus Spyware Quiz
Virus Spyware QuizPEC
 
Spyware powerpoint
Spyware powerpointSpyware powerpoint
Spyware powerpointgalaxy201
 
Internet Threats
Internet ThreatsInternet Threats
Internet ThreatsLeelet1121
 
Computer Malware
Computer MalwareComputer Malware
Computer Malwareaztechtchr
 
Computer based crime
Computer based crimeComputer based crime
Computer based crimeTaylor_Marie
 
computer virus ppt.pptx
computer virus ppt.pptxcomputer virus ppt.pptx
computer virus ppt.pptxAbiniyavk
 
Security Awareness 9 10 09 V4 Viruses
Security Awareness 9 10 09 V4 VirusesSecurity Awareness 9 10 09 V4 Viruses
Security Awareness 9 10 09 V4 VirusesCatherine MacAllister
 
Internet Threats
Internet ThreatsInternet Threats
Internet ThreatsRonalyn_Cao
 
The Malware Menace
The Malware MenaceThe Malware Menace
The Malware MenaceTami Brass
 
OPSEC for OMBUDSMEN
OPSEC for OMBUDSMENOPSEC for OMBUDSMEN
OPSEC for OMBUDSMENNaval OPSEC
 

Was ist angesagt? (19)

HELE 4 Lesson 2: Safe and Responsible Use of ICT
HELE 4 Lesson 2: Safe and Responsible Use of ICTHELE 4 Lesson 2: Safe and Responsible Use of ICT
HELE 4 Lesson 2: Safe and Responsible Use of ICT
 
Internet threats and defence mechanism
Internet threats and defence mechanismInternet threats and defence mechanism
Internet threats and defence mechanism
 
Presented to Compass
Presented to CompassPresented to Compass
Presented to Compass
 
Spyware Adware1
Spyware Adware1Spyware Adware1
Spyware Adware1
 
S P Y W A R E4 S I K
S P Y W A R E4 S I KS P Y W A R E4 S I K
S P Y W A R E4 S I K
 
Virus Spyware Quiz
Virus Spyware QuizVirus Spyware Quiz
Virus Spyware Quiz
 
Spyware powerpoint
Spyware powerpointSpyware powerpoint
Spyware powerpoint
 
Internet Threats
Internet ThreatsInternet Threats
Internet Threats
 
Computer Malware
Computer MalwareComputer Malware
Computer Malware
 
Computer based crime
Computer based crimeComputer based crime
Computer based crime
 
computer virus ppt.pptx
computer virus ppt.pptxcomputer virus ppt.pptx
computer virus ppt.pptx
 
Virus
VirusVirus
Virus
 
spyware
spyware spyware
spyware
 
Pc security and_safety
Pc security and_safetyPc security and_safety
Pc security and_safety
 
Security Awareness 9 10 09 V4 Viruses
Security Awareness 9 10 09 V4 VirusesSecurity Awareness 9 10 09 V4 Viruses
Security Awareness 9 10 09 V4 Viruses
 
Computer security
Computer securityComputer security
Computer security
 
Internet Threats
Internet ThreatsInternet Threats
Internet Threats
 
The Malware Menace
The Malware MenaceThe Malware Menace
The Malware Menace
 
OPSEC for OMBUDSMEN
OPSEC for OMBUDSMENOPSEC for OMBUDSMEN
OPSEC for OMBUDSMEN
 

Ähnlich wie WISE KIDS Leaflet: eSecurity

An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)Cyber Security Infotech
 
Giarritano concept paper 4
Giarritano concept paper 4Giarritano concept paper 4
Giarritano concept paper 4leahg118
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02amiinaaa
 
TheInternetDigitalSecurityfddreeere.pptx
TheInternetDigitalSecurityfddreeere.pptxTheInternetDigitalSecurityfddreeere.pptx
TheInternetDigitalSecurityfddreeere.pptxHAYDEECAYDA
 
10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.Khalil Jubran
 
Cybersecurity Awareness Month Tips
Cybersecurity Awareness Month TipsCybersecurity Awareness Month Tips
Cybersecurity Awareness Month TipsKevin Fream
 
Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual Jay Nagar
 
Dev Abhijet Gagan Chaitanya VII-A ....Salwan public school
Dev Abhijet Gagan Chaitanya VII-A  ....Salwan public schoolDev Abhijet Gagan Chaitanya VII-A  ....Salwan public school
Dev Abhijet Gagan Chaitanya VII-A ....Salwan public schoolDevku45
 
Document safer online for nonprofits guide
Document safer online for nonprofits guideDocument safer online for nonprofits guide
Document safer online for nonprofits guideNguyen Xuan Quang
 
How to Bulletproof Your Data Defenses Locally & In the Cloud
How to Bulletproof Your Data Defenses Locally & In the CloudHow to Bulletproof Your Data Defenses Locally & In the Cloud
How to Bulletproof Your Data Defenses Locally & In the CloudNordic Backup
 
Home and Business Computer Security 2014
Home and Business Computer Security 2014Home and Business Computer Security 2014
Home and Business Computer Security 2014B2BPlanner Ltd.
 
Computer Security Basics for UW-Madison Emeritus Faculty and Staff
Computer Security Basics for UW-Madison Emeritus Faculty and StaffComputer Security Basics for UW-Madison Emeritus Faculty and Staff
Computer Security Basics for UW-Madison Emeritus Faculty and StaffNicholas Davis
 
How to Keep Your Phone Safe from Hackers (1).pptx
How to Keep Your Phone Safe from Hackers (1).pptxHow to Keep Your Phone Safe from Hackers (1).pptx
How to Keep Your Phone Safe from Hackers (1).pptx4Freedom Mobile
 
Cyber pledge infoMagnum
Cyber pledge infoMagnumCyber pledge infoMagnum
Cyber pledge infoMagnumARUN REDDY M
 
CyberSecThreats_R_U_atRisk_Watson
CyberSecThreats_R_U_atRisk_WatsonCyberSecThreats_R_U_atRisk_Watson
CyberSecThreats_R_U_atRisk_WatsonPatricia M Watson
 

Ähnlich wie WISE KIDS Leaflet: eSecurity (20)

An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)
 
Giarritano concept paper 4
Giarritano concept paper 4Giarritano concept paper 4
Giarritano concept paper 4
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
 
TheInternetDigitalSecurityfddreeere.pptx
TheInternetDigitalSecurityfddreeere.pptxTheInternetDigitalSecurityfddreeere.pptx
TheInternetDigitalSecurityfddreeere.pptx
 
10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.
 
Cybersecurity Awareness Month Tips
Cybersecurity Awareness Month TipsCybersecurity Awareness Month Tips
Cybersecurity Awareness Month Tips
 
M
MM
M
 
Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual
 
Dev Abhijet Gagan Chaitanya VII-A ....Salwan public school
Dev Abhijet Gagan Chaitanya VII-A  ....Salwan public schoolDev Abhijet Gagan Chaitanya VII-A  ....Salwan public school
Dev Abhijet Gagan Chaitanya VII-A ....Salwan public school
 
Document safer online for nonprofits guide
Document safer online for nonprofits guideDocument safer online for nonprofits guide
Document safer online for nonprofits guide
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
How to Bulletproof Your Data Defenses Locally & In the Cloud
How to Bulletproof Your Data Defenses Locally & In the CloudHow to Bulletproof Your Data Defenses Locally & In the Cloud
How to Bulletproof Your Data Defenses Locally & In the Cloud
 
Safe Computing
Safe ComputingSafe Computing
Safe Computing
 
Module 5: Safety
Module 5: SafetyModule 5: Safety
Module 5: Safety
 
Home and Business Computer Security 2014
Home and Business Computer Security 2014Home and Business Computer Security 2014
Home and Business Computer Security 2014
 
Computer Security Basics for UW-Madison Emeritus Faculty and Staff
Computer Security Basics for UW-Madison Emeritus Faculty and StaffComputer Security Basics for UW-Madison Emeritus Faculty and Staff
Computer Security Basics for UW-Madison Emeritus Faculty and Staff
 
Secure End User
Secure End UserSecure End User
Secure End User
 
How to Keep Your Phone Safe from Hackers (1).pptx
How to Keep Your Phone Safe from Hackers (1).pptxHow to Keep Your Phone Safe from Hackers (1).pptx
How to Keep Your Phone Safe from Hackers (1).pptx
 
Cyber pledge infoMagnum
Cyber pledge infoMagnumCyber pledge infoMagnum
Cyber pledge infoMagnum
 
CyberSecThreats_R_U_atRisk_Watson
CyberSecThreats_R_U_atRisk_WatsonCyberSecThreats_R_U_atRisk_Watson
CyberSecThreats_R_U_atRisk_Watson
 

Mehr von WISE KIDS

WISE KIDS Leaflet: Online Content True, False, Inappropriate and Illegal (in ...
WISE KIDS Leaflet: Online Content True, False, Inappropriate and Illegal (in ...WISE KIDS Leaflet: Online Content True, False, Inappropriate and Illegal (in ...
WISE KIDS Leaflet: Online Content True, False, Inappropriate and Illegal (in ...WISE KIDS
 
WISE KIDS Leaflet: Online Content True, False, Inappropriate and Illegal
WISE KIDS Leaflet: Online Content True, False, Inappropriate and IllegalWISE KIDS Leaflet: Online Content True, False, Inappropriate and Illegal
WISE KIDS Leaflet: Online Content True, False, Inappropriate and IllegalWISE KIDS
 
WISE KIDS Leaflet: Public on the Internet - Gaming, Forums, YouTube, Blogs an...
WISE KIDS Leaflet: Public on the Internet - Gaming, Forums, YouTube, Blogs an...WISE KIDS Leaflet: Public on the Internet - Gaming, Forums, YouTube, Blogs an...
WISE KIDS Leaflet: Public on the Internet - Gaming, Forums, YouTube, Blogs an...WISE KIDS
 
WISE KIDS Leaflet: Public on the Internet - Gaming, Forums, YouTube, Blogs an...
WISE KIDS Leaflet: Public on the Internet - Gaming, Forums, YouTube, Blogs an...WISE KIDS Leaflet: Public on the Internet - Gaming, Forums, YouTube, Blogs an...
WISE KIDS Leaflet: Public on the Internet - Gaming, Forums, YouTube, Blogs an...WISE KIDS
 
WISE KIDS Leaflet: Smart Phones, Social Networks, Messenger, Chat and Locatio...
WISE KIDS Leaflet: Smart Phones, Social Networks, Messenger, Chat and Locatio...WISE KIDS Leaflet: Smart Phones, Social Networks, Messenger, Chat and Locatio...
WISE KIDS Leaflet: Smart Phones, Social Networks, Messenger, Chat and Locatio...WISE KIDS
 
WISE KIDS Leaflet: Smart Phones, Social Networks, Messenger, Chat and Locatio...
WISE KIDS Leaflet: Smart Phones, Social Networks, Messenger, Chat and Locatio...WISE KIDS Leaflet: Smart Phones, Social Networks, Messenger, Chat and Locatio...
WISE KIDS Leaflet: Smart Phones, Social Networks, Messenger, Chat and Locatio...WISE KIDS
 
WISE KIDS Leaflet: Junk Mail and Misleading Advertisements (in Welsh)
WISE KIDS Leaflet: Junk Mail and Misleading Advertisements (in Welsh)WISE KIDS Leaflet: Junk Mail and Misleading Advertisements (in Welsh)
WISE KIDS Leaflet: Junk Mail and Misleading Advertisements (in Welsh)WISE KIDS
 
WISE KIDS Leaflet: Junk Mail and Misleading Advertisements
WISE KIDS Leaflet: Junk Mail and Misleading AdvertisementsWISE KIDS Leaflet: Junk Mail and Misleading Advertisements
WISE KIDS Leaflet: Junk Mail and Misleading AdvertisementsWISE KIDS
 
WISE KIDS Leaflet: eSecurity (in Welsh)
WISE KIDS Leaflet: eSecurity (in Welsh)WISE KIDS Leaflet: eSecurity (in Welsh)
WISE KIDS Leaflet: eSecurity (in Welsh)WISE KIDS
 
WISE KIDS Leaflet: Cyberbullying and Sexting (in Welsh)
WISE KIDS Leaflet: Cyberbullying and Sexting (in Welsh)WISE KIDS Leaflet: Cyberbullying and Sexting (in Welsh)
WISE KIDS Leaflet: Cyberbullying and Sexting (in Welsh)WISE KIDS
 
WISE KIDS Leaflet: Cyberbullying
WISE KIDS Leaflet: CyberbullyingWISE KIDS Leaflet: Cyberbullying
WISE KIDS Leaflet: CyberbullyingWISE KIDS
 
WISE KIDS Leaflet: Copyright (In Welsh)
WISE KIDS Leaflet: Copyright (In Welsh)WISE KIDS Leaflet: Copyright (In Welsh)
WISE KIDS Leaflet: Copyright (In Welsh)WISE KIDS
 
WISE KIDS Leaflet: Copyright Matters
WISE KIDS Leaflet: Copyright MattersWISE KIDS Leaflet: Copyright Matters
WISE KIDS Leaflet: Copyright MattersWISE KIDS
 
Internet Literacy and Safety
Internet Literacy and SafetyInternet Literacy and Safety
Internet Literacy and SafetyWISE KIDS
 

Mehr von WISE KIDS (14)

WISE KIDS Leaflet: Online Content True, False, Inappropriate and Illegal (in ...
WISE KIDS Leaflet: Online Content True, False, Inappropriate and Illegal (in ...WISE KIDS Leaflet: Online Content True, False, Inappropriate and Illegal (in ...
WISE KIDS Leaflet: Online Content True, False, Inappropriate and Illegal (in ...
 
WISE KIDS Leaflet: Online Content True, False, Inappropriate and Illegal
WISE KIDS Leaflet: Online Content True, False, Inappropriate and IllegalWISE KIDS Leaflet: Online Content True, False, Inappropriate and Illegal
WISE KIDS Leaflet: Online Content True, False, Inappropriate and Illegal
 
WISE KIDS Leaflet: Public on the Internet - Gaming, Forums, YouTube, Blogs an...
WISE KIDS Leaflet: Public on the Internet - Gaming, Forums, YouTube, Blogs an...WISE KIDS Leaflet: Public on the Internet - Gaming, Forums, YouTube, Blogs an...
WISE KIDS Leaflet: Public on the Internet - Gaming, Forums, YouTube, Blogs an...
 
WISE KIDS Leaflet: Public on the Internet - Gaming, Forums, YouTube, Blogs an...
WISE KIDS Leaflet: Public on the Internet - Gaming, Forums, YouTube, Blogs an...WISE KIDS Leaflet: Public on the Internet - Gaming, Forums, YouTube, Blogs an...
WISE KIDS Leaflet: Public on the Internet - Gaming, Forums, YouTube, Blogs an...
 
WISE KIDS Leaflet: Smart Phones, Social Networks, Messenger, Chat and Locatio...
WISE KIDS Leaflet: Smart Phones, Social Networks, Messenger, Chat and Locatio...WISE KIDS Leaflet: Smart Phones, Social Networks, Messenger, Chat and Locatio...
WISE KIDS Leaflet: Smart Phones, Social Networks, Messenger, Chat and Locatio...
 
WISE KIDS Leaflet: Smart Phones, Social Networks, Messenger, Chat and Locatio...
WISE KIDS Leaflet: Smart Phones, Social Networks, Messenger, Chat and Locatio...WISE KIDS Leaflet: Smart Phones, Social Networks, Messenger, Chat and Locatio...
WISE KIDS Leaflet: Smart Phones, Social Networks, Messenger, Chat and Locatio...
 
WISE KIDS Leaflet: Junk Mail and Misleading Advertisements (in Welsh)
WISE KIDS Leaflet: Junk Mail and Misleading Advertisements (in Welsh)WISE KIDS Leaflet: Junk Mail and Misleading Advertisements (in Welsh)
WISE KIDS Leaflet: Junk Mail and Misleading Advertisements (in Welsh)
 
WISE KIDS Leaflet: Junk Mail and Misleading Advertisements
WISE KIDS Leaflet: Junk Mail and Misleading AdvertisementsWISE KIDS Leaflet: Junk Mail and Misleading Advertisements
WISE KIDS Leaflet: Junk Mail and Misleading Advertisements
 
WISE KIDS Leaflet: eSecurity (in Welsh)
WISE KIDS Leaflet: eSecurity (in Welsh)WISE KIDS Leaflet: eSecurity (in Welsh)
WISE KIDS Leaflet: eSecurity (in Welsh)
 
WISE KIDS Leaflet: Cyberbullying and Sexting (in Welsh)
WISE KIDS Leaflet: Cyberbullying and Sexting (in Welsh)WISE KIDS Leaflet: Cyberbullying and Sexting (in Welsh)
WISE KIDS Leaflet: Cyberbullying and Sexting (in Welsh)
 
WISE KIDS Leaflet: Cyberbullying
WISE KIDS Leaflet: CyberbullyingWISE KIDS Leaflet: Cyberbullying
WISE KIDS Leaflet: Cyberbullying
 
WISE KIDS Leaflet: Copyright (In Welsh)
WISE KIDS Leaflet: Copyright (In Welsh)WISE KIDS Leaflet: Copyright (In Welsh)
WISE KIDS Leaflet: Copyright (In Welsh)
 
WISE KIDS Leaflet: Copyright Matters
WISE KIDS Leaflet: Copyright MattersWISE KIDS Leaflet: Copyright Matters
WISE KIDS Leaflet: Copyright Matters
 
Internet Literacy and Safety
Internet Literacy and SafetyInternet Literacy and Safety
Internet Literacy and Safety
 

Kürzlich hochgeladen

Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxlancelewisportillo
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxMusic 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxleah joy valeriano
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4JOYLYNSAMANIEGO
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...JojoEDelaCruz
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxVanesaIglesias10
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationRosabel UA
 
Food processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsFood processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsManeerUddin
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 

Kürzlich hochgeladen (20)

Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxMusic 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptx
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translation
 
Food processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsFood processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture hons
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 

WISE KIDS Leaflet: eSecurity

  • 1. The more you use the Internet, the more important it is to be sure that you are able to manage your security online. The UK loses billions every year to e-criminals. The following are some key points to note: Anti-Virus/ Anti-Spyware Everyone using the Internet, whether on their iPad, smart phone or pc needs to have good anti-virus and anti-spyware programmes or apps. Keep these updated!. Believe it or not, it is possible to get viruses on smart phones, tablet pcs and jail-broken iPhones too! A good firewall will help too. Fraping and Identity Theft Fraping is when a friend or family member pretends to be you and uses your Facebook account to posts funny updates! To prevent fraping, or someone hacking your identity, always log off after using services like email, Pinterest, Amazon, Facebook, Twitter, Foursquare etc. Also use hard to guess passwords, and never share these with your friends. Dodgy Files and Downloads Never open emails with strange subject lines or from people you do not know. Similarly never accept suspicious looking files sent/shared via Bluetooth, Dropbox, Messenger programmes, Skype, email or similar services. Some malware also gets bundled with software you download, so always read the fine print, before clicking ‘Agree’, and only download programmes from trusted websites for example Wireless Network Security If you have a wireless network, password protect it, make it invisible, change the default router password, and use ‘machine level’ filtering to limit access to your wireless network to specific devices. These settings can be customised by logging onto your router. Whilst not foolproof, these steps will reduce the possibility of misuse. Update your Operating System and Software Your pc or smart phone comes with an operating system. Over time, developers make changes to this and will offer security and other updates, which you should always carry out. Keep any apps/ programmes you install updated too! For updates to the Windows operating system, see: Copyright © 2012 WISE KIDS. Creative Commons License: CC BY-ND 3.0 http://www.tucows.com http://windowsupdate.microsoft.com e-Securitye-Security http://creativecommons.org/licenses/by-nd/3.0/ www.wisekids.org.uk Backup Using a good external hard disk, or an online 'cloud-based' storage service (examples: Dropbox: http://www.dropbox.com, SkyDrive: http://www.skydrive.com, SpiderOak: http://www.spideroak.com), always backup your data – this could be coursework, emails, photos, videos or any content which you have created.