SlideShare a Scribd company logo
 

 

 Keep a Clean Machine.  






Keep security software current: Having the latest security software, web browser, and operating system 
are the best defenses against viruses, malware, and other online threats.  
Automate software updates: Many software programs will automatically connect and update to defend 
against known risks. Turn on automatic updates if that’s an available option..  
Protect all devices that connect to the Internet: Along with computers, smart phones, gaming systems, 
and other web‐enabled devices also need protection from viruses and malware.  
Plug & scan: “USBs” and other external devices can be infected by viruses and malware. Use your security 
software to scan them.  

 
Protect Your Personal Information.  






Secure your accounts: Ask for protection beyond passwords. Many account providers now offer 
additional ways for you verify who you are before you conduct business on that site.  
Make passwords long and strong: Combine capital and lowercase letters with numbers and symbols to 
create a more secure password.  
Unique account, unique password: Separate passwords for every account helps to thwart cybercriminals.  
Write it down and keep it safe: Everyone can forget a password. Keep a list that’s stored in a safe, secure 
place away from your computer.  
Own your online presence: When available, set the privacy and security settings on websites to your 
comfort level for information sharing. It’s ok to limit how and with whom you share information. 

 
Connect with Care.  





When in doubt, throw it out: Links in email, tweets, posts, and online advertising are often the way 
cybercriminals compromise your computer. If it looks suspicious, even if you know the source, it’s best to 
delete or if appropriate, mark as junk email.  
Get savvy about Wi‐Fi hotspots: Limit the type of business you conduct and adjust the security settings 
on your device to limit who can access your machine.  
Protect your $$: When banking and shopping, check to be sure the sites is security enabled. Look for web 
addresses with “https://” or “shttp://”, which means the site takes extra measures to help secure your 
information. “Http://” is not secure.  

 
Be Web Wise.  




Stay current. Keep pace with new ways to stay safe online. Check trusted websites for the latest 
information, and share with friends, family, and colleagues and encourage them to be web wise.  
Think before you act: Be wary of communications that implores you to act immediately, offers something 
that sounds too good to be true, or asks for personal information.  
Back it up: Protect your valuable work, music, photos, and other digital information by making an 
electronic copy and storing it safely.  
 

Be a Good Online Citizen.  


 

Safer for me more secure for all: What you do online has the potential to affect everyone – at home, at 
work and around the world. Practicing good online habits benefits the global digital community.  
 



Post only about others as you have them post about you.  
Help the authorities fight cybercrime: Report stolen finances or identities and other cybercrime to 
http://www.ic3.gov (Internet Crime Complaint Center), the Federal Trade Commission at 
http://www.onguardonline.gov/file‐complaint. 

 

Visit http://www.stopthinkconnect.org for more information. 

 

 

More Related Content

PPTX
Internet Safety Techniques
PPT
S P Y W A R E4 S I K
PDF
Presentation about security I.T.
PDF
Presentation about security i.t.
PDF
Review unit 2 tecnology 2 eso
PPTX
Adware
PPTX
How to Improve Computer Security - Wikki Verma
PPT
Digital Security Slide Show
Internet Safety Techniques
S P Y W A R E4 S I K
Presentation about security I.T.
Presentation about security i.t.
Review unit 2 tecnology 2 eso
Adware
How to Improve Computer Security - Wikki Verma
Digital Security Slide Show

What's hot (20)

PPTX
Spyware
PPT
ISDD Security Precautions
PPTX
Malware
PPTX
Safeguarding Your Data
PPT
ISDD - Security Risks
PPTX
Cyber security (daffodil international university)
PPTX
Computer security
PPTX
Network Security
PDF
How to Keep Yourself secure while browsing internet pre null meet kolkata
PPTX
Internet Securities Issues
PPTX
security issues
DOCX
You Got To Protect Your Computer
PPTX
Safe computing (Tips & Tricks)
PPTX
Introduction to Information security
DOCX
CLASS VII COMPUTER SECURITY
PPTX
online and offline computer security
PPTX
Why do you need the advanced protection of the Internet Security Product / Ma...
PPT
Introduction To Information Security
PPTX
Basics of Network Security
PPTX
Internet security issues
Spyware
ISDD Security Precautions
Malware
Safeguarding Your Data
ISDD - Security Risks
Cyber security (daffodil international university)
Computer security
Network Security
How to Keep Yourself secure while browsing internet pre null meet kolkata
Internet Securities Issues
security issues
You Got To Protect Your Computer
Safe computing (Tips & Tricks)
Introduction to Information security
CLASS VII COMPUTER SECURITY
online and offline computer security
Why do you need the advanced protection of the Internet Security Product / Ma...
Introduction To Information Security
Basics of Network Security
Internet security issues
Ad

Similar to Tip sheet (20)

PDF
SAMPLE ATTACKS PRESENTATION.pdf
PPTX
Cyber crime & security
PDF
cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre
PPTX
Cyber Security
PPT
CYBERSPACE SAFETY TIPS FOR SMEs.ppt
PPT
Cyber security and safety
PPTX
CYBER SECURITY AWARENESS.pptx
PPTX
Internet Security.pptx
PPTX
iIIBF Cyber Security Presentation 2.pptx
PPTX
Cyber-savvy Cyber-safety
PPTX
Aegis Personal Cybersecurity 101
PPTX
Securing, Buying, and buying computers 4-H
PPTX
Cyber_Security_Awareness_Presentation.pptx
PPT
Cybersafety basics.ppt cs
PPTX
Internet secutity ppt by vaishnavi khandelwal
PPT
DNR-Security-Awareness-Training expert.ppt
DOCX
End user security awareness
PPTX
Cyber Essentials for Managers
PPT
Computer Security Basics for UW-Madison Emeritus Faculty and Staff
PPSX
csa2014 IBC
SAMPLE ATTACKS PRESENTATION.pdf
Cyber crime & security
cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre
Cyber Security
CYBERSPACE SAFETY TIPS FOR SMEs.ppt
Cyber security and safety
CYBER SECURITY AWARENESS.pptx
Internet Security.pptx
iIIBF Cyber Security Presentation 2.pptx
Cyber-savvy Cyber-safety
Aegis Personal Cybersecurity 101
Securing, Buying, and buying computers 4-H
Cyber_Security_Awareness_Presentation.pptx
Cybersafety basics.ppt cs
Internet secutity ppt by vaishnavi khandelwal
DNR-Security-Awareness-Training expert.ppt
End user security awareness
Cyber Essentials for Managers
Computer Security Basics for UW-Madison Emeritus Faculty and Staff
csa2014 IBC
Ad

More from - Mark - Fullbright (20)

PDF
ISTR Internet Security Threat Report 2019
PDF
IC3 2019 Internet Crime Report
PDF
Police, Protesters, Press, 2020
PDF
2020 Data Breach Investigations Report (DBIR)
PDF
FCPA Guidance 2020
PDF
Consumer Sentinel Network Data Book 2019
PDF
CFPB Consumer Reporting Companies 2019
PDF
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
PDF
2018 IC3 Report
PDF
2019 Data Breach Investigations Report (DBIR)
PDF
2018 Privacy & Data Security Report
PDF
Consumer Sentinel Network Data Book 2018
PDF
Credit Score Explainer
PDF
The Geography of Medical Identity Theft
PDF
Consumer Sentinel Data Book 2017
PDF
Protecting Personal Information: A Guide for Business
PDF
Data Breach Response: A Guide for Business
PDF
2017 Data Breach Investigations Report
PDF
Consumer Sentinel Network Data Book for January 2016 - December 2016
PDF
Consumer Sentinel Data Book 2015
ISTR Internet Security Threat Report 2019
IC3 2019 Internet Crime Report
Police, Protesters, Press, 2020
2020 Data Breach Investigations Report (DBIR)
FCPA Guidance 2020
Consumer Sentinel Network Data Book 2019
CFPB Consumer Reporting Companies 2019
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
2018 IC3 Report
2019 Data Breach Investigations Report (DBIR)
2018 Privacy & Data Security Report
Consumer Sentinel Network Data Book 2018
Credit Score Explainer
The Geography of Medical Identity Theft
Consumer Sentinel Data Book 2017
Protecting Personal Information: A Guide for Business
Data Breach Response: A Guide for Business
2017 Data Breach Investigations Report
Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Data Book 2015

Recently uploaded (20)

PPTX
Pharma ospi slides which help in ospi learning
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PDF
VCE English Exam - Section C Student Revision Booklet
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PDF
Computing-Curriculum for Schools in Ghana
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
Complications of Minimal Access Surgery at WLH
PPTX
Cell Types and Its function , kingdom of life
PPTX
GDM (1) (1).pptx small presentation for students
PDF
Basic Mud Logging Guide for educational purpose
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PDF
Microbial disease of the cardiovascular and lymphatic systems
PDF
01-Introduction-to-Information-Management.pdf
PDF
Sports Quiz easy sports quiz sports quiz
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PDF
Classroom Observation Tools for Teachers
Pharma ospi slides which help in ospi learning
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
VCE English Exam - Section C Student Revision Booklet
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
O5-L3 Freight Transport Ops (International) V1.pdf
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
Computing-Curriculum for Schools in Ghana
Module 4: Burden of Disease Tutorial Slides S2 2025
Complications of Minimal Access Surgery at WLH
Cell Types and Its function , kingdom of life
GDM (1) (1).pptx small presentation for students
Basic Mud Logging Guide for educational purpose
Final Presentation General Medicine 03-08-2024.pptx
102 student loan defaulters named and shamed – Is someone you know on the list?
Microbial disease of the cardiovascular and lymphatic systems
01-Introduction-to-Information-Management.pdf
Sports Quiz easy sports quiz sports quiz
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
Classroom Observation Tools for Teachers

Tip sheet