SlideShare a Scribd company logo
Are you safe in this cyber
world?
Security tips…..Read More
Do not share personal information
Security tip 1
Use strong passwords
• using a combination of capital and lower-case letters, numbers and
symbols
• making it between eight and 12 characters long
• avoiding the use of personal data
• changing it regularly
• never using it for multiple accounts
• using two factor authentication
Security tip 2
Control access
• control physical access to premises and computers network
• restrict access to unauthorised users
• limit access to data or services through application controls
• restrict what can be copied from the system and saved to storage
devices
• limit sending and receiving of certain types of email attachments
Security tip 3
Use a different password for each account
• you use the same password for sites like Gmail, Facebook and
Outlook and your password for Facebook gets revealed to someone.
That person can then access your Gmail and Outlook accounts as well
Security tip 4
Use sites with HTTPS
• Ensure the URL of the site contains HTTPS instead of HTTP
• HTTPS is a protocol for browsing internet that uses encryption
techniques and is more secure than HTTP.
Security tip 5
Update programs and systems regularly
• Important software like browser, payment wallet apps should be
updated regularly
Security tip 6
Use security software/ sites
• Avoid opening links of lotteries, prizes, gifts, discounts
• Download all software from authentic sources, avoid downloading
software (executable files) from torrent sites
• Use a good anti-virus software suite
• While using third party computers or mobiles for browsing use the
private/incognito mode
• Be careful while downloading any free software or screensaver etc.
Security tip 7
Put up a firewall
• Firewalls are effectively gatekeepers between your computer and the
internet, and one of the major barriers to prevent the spread of cyber
threats such as viruses and malware. Make sure that you set up your
firewall devices properly or they may not be fully effective.
• Install and use a firewall, pop-up blocker and spyware detector
Security tip 8
Update programs and systems regularly
• Updates contain vital security upgrades that help protect against
known bugs and vulnerabilities
• Ensure that your virus definitions are up to date and run antivirus and
spyware detectors/cleaners regularly
Security tip 9
Monitor for intrusion
• You can use intrusion detectors to monitor system and unusual
network activity. If a detection system suspects a potential security
breach, it can generate an alarm, such as an email alert, based upon
the type of activity it has identified
Security tip 10
Raise awareness
• Your employees have a responsibility to help keep your business
secure. Make sure that they understand their role and any relevant
policies and procedures, and provide them with regular cyber security
awareness and training.
• Your kids/ spouse/ relatives using computer/ mobile for online
transactions, make sure that they understand their usage and sites
they visit.
Security tip 11
Beware of Phishing
• Attackers sometimes create a fake login webpage similar to that of
standard websites and ask users to enter their login credentials.
However, when entered, the login username &
• password go to the attacker instead of the intended website. This
attack is known as phishing.
• While logging in to any site, check the URL (the one in the address
bar), it should be exactly the same as the site you want to log in to
• Always type in the website address yourself rather than clicking on a
link provided.
Security tip 12
Use password securely
• While using third party computers, use an on-screen keyboard while
entering important details
• Never give your password to anyone. Your ISP/banks will never, ever
ask you for your password while you are online or via email
• Create nicknames that do not reflect your own name or anything
personal
Security tip 13
Regular files backup
• Make Backups of Important Files and Folders to protect important
files and records on your computer
• Keep Important Files and Folders to protected with password
Security tip 14
Check E-Mail attachments securely
• Be cautious of unsolicited offers . Never purchase anything advertised
through an unsolicited email
• Open email attachment carefully
• Keep Antivirus Email security on
Security tip 15
Secure downloads
• Never accept any kind of freebies or free downloads of any
pictures/music files
• Download all software from authentic sources, avoid downloading
software (executable files) from torrent sites
• Be careful while downloading any free software or screensaver etc.
• Never accept any kind of freebies or free downloads of any
pictures/music files
Security tip 16
Secure online
• Always LOGOUT or SIGNOUT
• Do not store passwords in browser
• Do not accept cookies policy
• Do not upload personal information
• Be secure on social networking site. Do not accept friend request
from strangers
• Keep 2 ids, one id OFFICAL, 2nd id for social networking sites like
facebook , yahoo, gmail
• Always talk with your parents or a responsible adult about your online
activities
Security tip 17
Secure online transactions
• URL of the site contains HTTPS instead of HTTP
• Type URL, do not click on shared/ forwarded links
• Always enter password from online keyboard
• After transaction, logout the session from browser/ app
• Do not share OTP for any transaction with anyone
• Always keep banking n credit card companies phone numbers in your
mobile
• SMS-Alert facility: Banks & credit cards should send u a sms as soon
money is withdrawn from your account or any monetary transaction
happens in your account.
Security tip 18

More Related Content

PDF
Cyber security and Privacy Awareness manual
PPTX
CYBER ETHICS, CRIMES AND SAFTY
PPTX
Do’s and Don’ts of Cybersecurity
PPTX
Online safety, Security, Ethics and Etiquette
PPT
Ten Important Rules
PPTX
Online reputation
PPT
Securitytips
Cyber security and Privacy Awareness manual
CYBER ETHICS, CRIMES AND SAFTY
Do’s and Don’ts of Cybersecurity
Online safety, Security, Ethics and Etiquette
Ten Important Rules
Online reputation
Securitytips

What's hot (20)

PPTX
IT Security DOs and DON'Ts
PPTX
INTERNET SAFETY FOR KIDS
PPTX
online and offline computer security
PPTX
ICT and end user security awareness slides
PPTX
IT Security DOs and DONTs
PPTX
Internet security
PPTX
Itsa end user 2013
PDF
Internet security tutorial
PDF
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
PPTX
Security awareness
PPT
SECURITY AWARENESS
PPTX
IT Security DOs and DON'Ts
PPTX
Tips to make it security robust against ransomware or malware
PPTX
Online Netiquette
PPTX
A survey of ethical hacking process and security
PPS
Microsoft (Projects)
PDF
Cyber Security and Cyber Awareness Tips manual 2020
PDF
001 ho basic computer
PPTX
Cyber pledge infoMagnum
PPT
Social Engineering: Protecting Yourself on the Campus Network
IT Security DOs and DON'Ts
INTERNET SAFETY FOR KIDS
online and offline computer security
ICT and end user security awareness slides
IT Security DOs and DONTs
Internet security
Itsa end user 2013
Internet security tutorial
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Security awareness
SECURITY AWARENESS
IT Security DOs and DON'Ts
Tips to make it security robust against ransomware or malware
Online Netiquette
A survey of ethical hacking process and security
Microsoft (Projects)
Cyber Security and Cyber Awareness Tips manual 2020
001 ho basic computer
Cyber pledge infoMagnum
Social Engineering: Protecting Yourself on the Campus Network
Ad

Similar to ACESnWS cyber security tips (20)

PPTX
AHADCYBER SAFETY AHADCYBER SAFETYAHADCYBER SAFETYAHADCYBER SAFETYAHADCYBER SA...
PPTX
7500_Lesson_07_Slides.pptx...............
PPTX
Secure End User
PPTX
Internet Security
PPTX
Cyber security-1.pptx
PPTX
Protect Your Computer From Viruses, Hackers,.pptx
PPTX
Basic Security Training for End Users
PDF
Nat'l Cyber Security Awareness Month (NCSAM) Posters
PDF
CYB 102 – Fundamentals of Cyber Security 3.pdf
PDF
CYB 102 – Fundamentals of Cyber Security 3.pdf
PDF
Building a culture of security
PPTX
1.2 Best Practices of Cyber Security sbk.pptx
PPT
Cyber crime and cyber security
PPTX
about cyber bullying -Presentation1.pptx
PPTX
securitya wareness dont miss it .pptx
PDF
CyberSecurity Cyber24x7.pdf
PPTX
Top 10 Cyber Crime Prevention Tips.pptx
PDF
Cybersecurity Awareness Month Tips
PPTX
Internet
AHADCYBER SAFETY AHADCYBER SAFETYAHADCYBER SAFETYAHADCYBER SAFETYAHADCYBER SA...
7500_Lesson_07_Slides.pptx...............
Secure End User
Internet Security
Cyber security-1.pptx
Protect Your Computer From Viruses, Hackers,.pptx
Basic Security Training for End Users
Nat'l Cyber Security Awareness Month (NCSAM) Posters
CYB 102 – Fundamentals of Cyber Security 3.pdf
CYB 102 – Fundamentals of Cyber Security 3.pdf
Building a culture of security
1.2 Best Practices of Cyber Security sbk.pptx
Cyber crime and cyber security
about cyber bullying -Presentation1.pptx
securitya wareness dont miss it .pptx
CyberSecurity Cyber24x7.pdf
Top 10 Cyber Crime Prevention Tips.pptx
Cybersecurity Awareness Month Tips
Internet
Ad

Recently uploaded (20)

PDF
Empathic Computing: Creating Shared Understanding
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Encapsulation theory and applications.pdf
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PPTX
Big Data Technologies - Introduction.pptx
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
Empathic Computing: Creating Shared Understanding
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Review of recent advances in non-invasive hemoglobin estimation
Diabetes mellitus diagnosis method based random forest with bat algorithm
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
The AUB Centre for AI in Media Proposal.docx
Chapter 3 Spatial Domain Image Processing.pdf
Dropbox Q2 2025 Financial Results & Investor Presentation
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
The Rise and Fall of 3GPP – Time for a Sabbatical?
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Encapsulation theory and applications.pdf
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Big Data Technologies - Introduction.pptx
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Mobile App Security Testing_ A Comprehensive Guide.pdf
Advanced methodologies resolving dimensionality complications for autism neur...
“AI and Expert System Decision Support & Business Intelligence Systems”

ACESnWS cyber security tips

  • 1. Are you safe in this cyber world? Security tips…..Read More
  • 2. Do not share personal information Security tip 1
  • 3. Use strong passwords • using a combination of capital and lower-case letters, numbers and symbols • making it between eight and 12 characters long • avoiding the use of personal data • changing it regularly • never using it for multiple accounts • using two factor authentication Security tip 2
  • 4. Control access • control physical access to premises and computers network • restrict access to unauthorised users • limit access to data or services through application controls • restrict what can be copied from the system and saved to storage devices • limit sending and receiving of certain types of email attachments Security tip 3
  • 5. Use a different password for each account • you use the same password for sites like Gmail, Facebook and Outlook and your password for Facebook gets revealed to someone. That person can then access your Gmail and Outlook accounts as well Security tip 4
  • 6. Use sites with HTTPS • Ensure the URL of the site contains HTTPS instead of HTTP • HTTPS is a protocol for browsing internet that uses encryption techniques and is more secure than HTTP. Security tip 5
  • 7. Update programs and systems regularly • Important software like browser, payment wallet apps should be updated regularly Security tip 6
  • 8. Use security software/ sites • Avoid opening links of lotteries, prizes, gifts, discounts • Download all software from authentic sources, avoid downloading software (executable files) from torrent sites • Use a good anti-virus software suite • While using third party computers or mobiles for browsing use the private/incognito mode • Be careful while downloading any free software or screensaver etc. Security tip 7
  • 9. Put up a firewall • Firewalls are effectively gatekeepers between your computer and the internet, and one of the major barriers to prevent the spread of cyber threats such as viruses and malware. Make sure that you set up your firewall devices properly or they may not be fully effective. • Install and use a firewall, pop-up blocker and spyware detector Security tip 8
  • 10. Update programs and systems regularly • Updates contain vital security upgrades that help protect against known bugs and vulnerabilities • Ensure that your virus definitions are up to date and run antivirus and spyware detectors/cleaners regularly Security tip 9
  • 11. Monitor for intrusion • You can use intrusion detectors to monitor system and unusual network activity. If a detection system suspects a potential security breach, it can generate an alarm, such as an email alert, based upon the type of activity it has identified Security tip 10
  • 12. Raise awareness • Your employees have a responsibility to help keep your business secure. Make sure that they understand their role and any relevant policies and procedures, and provide them with regular cyber security awareness and training. • Your kids/ spouse/ relatives using computer/ mobile for online transactions, make sure that they understand their usage and sites they visit. Security tip 11
  • 13. Beware of Phishing • Attackers sometimes create a fake login webpage similar to that of standard websites and ask users to enter their login credentials. However, when entered, the login username & • password go to the attacker instead of the intended website. This attack is known as phishing. • While logging in to any site, check the URL (the one in the address bar), it should be exactly the same as the site you want to log in to • Always type in the website address yourself rather than clicking on a link provided. Security tip 12
  • 14. Use password securely • While using third party computers, use an on-screen keyboard while entering important details • Never give your password to anyone. Your ISP/banks will never, ever ask you for your password while you are online or via email • Create nicknames that do not reflect your own name or anything personal Security tip 13
  • 15. Regular files backup • Make Backups of Important Files and Folders to protect important files and records on your computer • Keep Important Files and Folders to protected with password Security tip 14
  • 16. Check E-Mail attachments securely • Be cautious of unsolicited offers . Never purchase anything advertised through an unsolicited email • Open email attachment carefully • Keep Antivirus Email security on Security tip 15
  • 17. Secure downloads • Never accept any kind of freebies or free downloads of any pictures/music files • Download all software from authentic sources, avoid downloading software (executable files) from torrent sites • Be careful while downloading any free software or screensaver etc. • Never accept any kind of freebies or free downloads of any pictures/music files Security tip 16
  • 18. Secure online • Always LOGOUT or SIGNOUT • Do not store passwords in browser • Do not accept cookies policy • Do not upload personal information • Be secure on social networking site. Do not accept friend request from strangers • Keep 2 ids, one id OFFICAL, 2nd id for social networking sites like facebook , yahoo, gmail • Always talk with your parents or a responsible adult about your online activities Security tip 17
  • 19. Secure online transactions • URL of the site contains HTTPS instead of HTTP • Type URL, do not click on shared/ forwarded links • Always enter password from online keyboard • After transaction, logout the session from browser/ app • Do not share OTP for any transaction with anyone • Always keep banking n credit card companies phone numbers in your mobile • SMS-Alert facility: Banks & credit cards should send u a sms as soon money is withdrawn from your account or any monetary transaction happens in your account. Security tip 18