SlideShare a Scribd company logo
STAYING

SAFE
ONLINE

August	
  2013	
  

1	
  
Internet world
offers the opportunities

August	
  2013	
  

2	
  
to
explore, create,
and
collaborate

August	
  2013	
  

3	
  
and
in connection with all this
opportunities

August	
  2013	
  

4	
  
were
different kinds of

August	
  2013	
  

5	
  
CYBER CRIME

August	
  2013	
  

6	
  
August	
  2013	
  

7	
  
Criminal acts like:

August	
  2013	
  

8	
  
ü gain access to your
information
that includes

August	
  2013	
  

9	
  
your
EMAIL PASSWORD

August	
  2013	
  

10	
  
ü by installing
malware on your computer

August	
  2013	
  

11	
  
ü hack your account.

August	
  2013	
  

12	
  
ü they will try to use the
internet to scam you.

August	
  2013	
  

13	
  
ü tricking you into
giving them your information

August	
  2013	
  

14	
  
August	
  2013	
  

15	
  
check this out

✍Gmail
✍Security
✍checklist
August	
  2013	
  

16	
  
August	
  2013	
  

17	
  
"   use a strong unique
password for
EACH of your accounts

August	
  2013	
  

18	
  
"   Use a long
password.
the longer the harder
to guess.

August	
  2013	
  

19	
  
"   Try using a phrase

August	
  2013	
  

20	
  
Sign in to your
G-mail account

August	
  2013	
  

21	
  
Go to
https://www.google.com/
settings/security

August	
  2013	
  

22	
  
August	
  2013	
  

23	
  
Change your password

August	
  2013	
  

24	
  
August	
  2013	
  

25	
  
Fill up

August	
  2013	
  

26	
  
Click change password

August	
  2013	
  

27	
  
August	
  2013	
  

28	
  
August	
  2013	
  

29	
  
Go to
http://www.google.com/
landing/2step/

August	
  2013	
  

30	
  
Get started

August	
  2013	
  

31	
  
Set up

August	
  2013	
  

32	
  
Sign in

August	
  2013	
  

33	
  
Set up your phone

August	
  2013	
  

34	
  
Check your phone for a
Text message

August	
  2013	
  

35	
  
Verify your phone

August	
  2013	
  

36	
  
August	
  2013	
  

37	
  
Tick Trust this computer

August	
  2013	
  

38	
  
Now confirm

August	
  2013	
  

39	
  
You can also use a
Google authenticator

August	
  2013	
  

40	
  
HOW?

August	
  2013	
  

41	
  
On your
iPhone

August	
  2013	
  

42	
  
Tap the
App store icon

August	
  2013	
  

43	
  
Download the
Google Authenticator

August	
  2013	
  

44	
  
Now open
And
Configure Google
Authenticator

August	
  2013	
  

45	
  
In Google authenticator

August	
  2013	
  

46	
  
Tap
“+”

August	
  2013	
  

47	
  
And then
“Scan Barcode”

August	
  2013	
  

48	
  
Then use your phone/iPad’s
Camera to scan

August	
  2013	
  

49	
  
August	
  2013	
  

50	
  
Once you’ve
scan the barcode

August	
  2013	
  

51	
  
August	
  2013	
  

52	
  
Enter now the 6-digit
verification mode

August	
  2013	
  

53	
  
August	
  2013	
  

54	
  
Then verify

August	
  2013	
  

55	
  
August	
  2013	
  

56	
  
August	
  2013	
  

57	
  
To clean up your computer

August	
  2013	
  

58	
  
Scan at least one,
with a high quality

August	
  2013	
  

59	
  
Antivirus products

August	
  2013	
  

60	
  
Check out this link
http://www.google.com/
goodtoknow/online-safety/
device/

August	
  2013	
  

61	
  
August	
  2013	
  

62	
  
Make sure your Operating
system is

August	
  2013	
  

63	
  
Up to date

August	
  2013	
  

64	
  
That includes your

August	
  2013	
  

65	
  
Web browser

August	
  2013	
  

66	
  
Go to
http://whatbrowser.org/

August	
  2013	
  

67	
  
You can update your web
browser to the latest version

August	
  2013	
  

68	
  
August	
  2013	
  

69	
  
August	
  2013	
  

70	
  
Go to
https://security.google.com/
settings/security/activity

August	
  2013	
  

71	
  
Review all the activity
and

August	
  2013	
  

72	
  
take note of the time and
location,

August	
  2013	
  

73	
  
where they took place

August	
  2013	
  

74	
  
August	
  2013	
  

75	
  
In cases of
Unusual Activity

August	
  2013	
  

76	
  
Unusual activities
like

August	
  2013	
  

77	
  
þ Missing
Or
suspicious message

August	
  2013	
  

78	
  
þ Contacts for errors

August	
  2013	
  

79	
  
þ Change your password

August	
  2013	
  

80	
  
August	
  2013	
  

81	
  
August	
  2013	
  

82	
  
August	
  2013	
  

83	
  
Don’t reply for suspicious
message or message

August	
  2013	
  

84	
  
Asking for your personal
information
Like . . .

August	
  2013	
  

85	
  
•  Username
•  Passwords
•  Social Security numbers

August	
  2013	
  

86	
  
•  Your mother’s maiden name
•  Your birthday

August	
  2013	
  

87	
  
Don’t reply
Or
Filling out any form
or

August	
  2013	
  

88	
  
Sign-in screens
That might be linked to from
those messages

August	
  2013	
  

89	
  
Report
these messages

August	
  2013	
  

90	
  
Here’s HOW
Sign in to your account

August	
  2013	
  

91	
  
Open the message you’d like to
report

August	
  2013	
  

92	
  
Click
the arrow down next to reply

August	
  2013	
  

93	
  
August	
  2013	
  

94	
  
Select Report Phishing

August	
  2013	
  

95	
  
August	
  2013	
  

96	
  
Go to
https://www.google.com/
settings/security

August	
  2013	
  

97	
  
Click edit

August	
  2013	
  

98	
  
Click verify

August	
  2013	
  

99	
  
August	
  2013	
  

100	
  
On your
Gmail homepage

August	
  2013	
  

101	
  
Click the gear icon

August	
  2013	
  

102	
  
Select settings

August	
  2013	
  

103	
  
Tick all the information
according to your preferences.

August	
  2013	
  

104	
  
August	
  2013	
  

105	
  
For more
safety infos

August	
  2013	
  

106	
  
Go to
http://www.google.com/
goodtoknow/online-safety/
identity-theft/

August	
  2013	
  

107	
  
~ www.livelifehappy.com
August	
  2013	
  

108	
  
For the images and
tutorial tips
Thanks to :
Google image
https://www.google.com/
settings/security

August	
  2013	
  

109	
  

More Related Content

PPTX
https://ighack.org/
PDF
HOW TO USE HOOTSUITE
PDF
Google account
PPTX
Infusionsoft getting started
PDF
ANIMOTO TUTORIAL
PPTX
Email broadcast ing infusionsoft
PPTX
Facebook ad manager
PPTX
Libsyn basics
https://ighack.org/
HOW TO USE HOOTSUITE
Google account
Infusionsoft getting started
ANIMOTO TUTORIAL
Email broadcast ing infusionsoft
Facebook ad manager
Libsyn basics

Similar to Emerita salvador googlesecuritysettingstutorial (15)

PDF
LAST PASS TUTORIALS
PDF
GOOGLE TOOLS FOR VA
PDF
GOOGLE CALL PHONE TUTORIAL
PDF
GOOGLE APPS FOR BUSINESS TUTORIALS
PDF
Emerita salvador googleappsforbusinesstutorial
PDF
How To Use Google Analytics
PDF
Emerita salvador crazyeggtutorial
PDF
HOOTSUITE TUTORIAL
PDF
How To Run Giveaways On Facebook Using Rafflecopter
PDF
2 Factor Authentication for Wordpress
PPTX
360 t seo preso
PDF
Bitly and Analytics
PPTX
Basic tutorial how to use slideshare
PDF
Amárach and Cloud90 ZIndex Presentation November 2013
PDF
How to upload pdf to slideshare and embed to wordpress
LAST PASS TUTORIALS
GOOGLE TOOLS FOR VA
GOOGLE CALL PHONE TUTORIAL
GOOGLE APPS FOR BUSINESS TUTORIALS
Emerita salvador googleappsforbusinesstutorial
How To Use Google Analytics
Emerita salvador crazyeggtutorial
HOOTSUITE TUTORIAL
How To Run Giveaways On Facebook Using Rafflecopter
2 Factor Authentication for Wordpress
360 t seo preso
Bitly and Analytics
Basic tutorial how to use slideshare
Amárach and Cloud90 ZIndex Presentation November 2013
How to upload pdf to slideshare and embed to wordpress
Ad

More from Emerita Salvador (11)

PPTX
Social lead freak basics
PPTX
Join.me basics
PPTX
Power editor basics
PDF
Emerita salvador pinterest
PDF
Emerita salvador how to set up facebook page
PDF
EVERNOTE TUTORIAL
PDF
DROPBOX TUTORIAL
PDF
Emerita salvador googlesecuritysettingstutorial
PDF
Emerita salvador animototutorial
PDF
Emerita salvador dropboxtutorial
PDF
SOUNDCLOUD TUTORIAL
Social lead freak basics
Join.me basics
Power editor basics
Emerita salvador pinterest
Emerita salvador how to set up facebook page
EVERNOTE TUTORIAL
DROPBOX TUTORIAL
Emerita salvador googlesecuritysettingstutorial
Emerita salvador animototutorial
Emerita salvador dropboxtutorial
SOUNDCLOUD TUTORIAL
Ad

Recently uploaded (20)

PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PPTX
Chapter 5: Probability Theory and Statistics
PPTX
A Presentation on Touch Screen Technology
PDF
Hybrid model detection and classification of lung cancer
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
Hindi spoken digit analysis for native and non-native speakers
PPTX
TLE Review Electricity (Electricity).pptx
PDF
WOOl fibre morphology and structure.pdf for textiles
PDF
Web App vs Mobile App What Should You Build First.pdf
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PDF
project resource management chapter-09.pdf
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PPTX
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
PDF
August Patch Tuesday
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
A novel scalable deep ensemble learning framework for big data classification...
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
Chapter 5: Probability Theory and Statistics
A Presentation on Touch Screen Technology
Hybrid model detection and classification of lung cancer
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Hindi spoken digit analysis for native and non-native speakers
TLE Review Electricity (Electricity).pptx
WOOl fibre morphology and structure.pdf for textiles
Web App vs Mobile App What Should You Build First.pdf
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
project resource management chapter-09.pdf
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
MIND Revenue Release Quarter 2 2025 Press Release
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
August Patch Tuesday
SOPHOS-XG Firewall Administrator PPT.pptx
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
Programs and apps: productivity, graphics, security and other tools
NewMind AI Weekly Chronicles - August'25-Week II
A novel scalable deep ensemble learning framework for big data classification...

Emerita salvador googlesecuritysettingstutorial