INTERNET SAFETY

advertisement
ITComputerTechnical
SupportNewsletter
January25,2016
Vol.2,No.12
TABLEOFCONTENTS
Overview.........................…...1
INTERNETSAFETY
Internetiseverywheretoday—atwork,home,coffee
shops,airports.Thankstowirelesstechnology,itfollowsyou
virtuallyeverywhere.ThereisnodoubtthattheInternetmakes
ourliveseasier.Activitiesandtasksthattookhourstobe
completedcanbetakencareofquicklyandeasily.Butas
beneficialastheInternetmightbe,itisalsoabreedinggroundfor
fraud,identitytheftandpiracy.UsetheInternet,butuseitvery
wisely.
Keepyourpersonal
informationprivate…………...2
Thinkbefore
sharing…………………………………2
Checkprivacypolicies…………3
Watchoutforphishing……...3
Thinkbeforeopeningany
attachment…………………………4
The IT Computer
Technical Support
Newsletter is complements
Of Pejman Kamkarian
ITComputerTechnicalSupportNewsletter|1
Keep Your Personal Information Private
TheInternetisfullofopportunitiestosharepersonalinformation,butthis
canmakeyouvulnerabletoidentitytheft,cyberstalking,andotherissues.
AccordingtoPublicOpiniononPrivacy,89%ofpeopleareconcernedabout
thelevelofpersonalinformationontheInternet.
It'scommontoincludealotofinformationonyourprofile.Fromyour
employertoyourreligiousviews,thinktwicebeforeyouputitoutonthe
web.Makesuretheinformationyoushareissuitableforalleyes.
Think About Photos before Sharing
Sharingphotoscanbeagreatwaytoconnectwithfriendsandfamily,but
theycanalsomakeyouvulnerable.Beforesharingapicture,takeafew
minutestoexaminethebackgroundfordetails.Besureyoufuzzoutour
cropphotosthatshowyourhouseaddress,yourcarlicenseplate,and
otherinformationpeoplecouldusetofindyou.
ITComputerTechnicalSupportNewsletter|2
Check a Company's Privacy Policy before Buying
You'veprobablynoticedthatyoubeginreceivingemailorevenphonecalls
aftermakingapurchase.Thiscanhappenwhenacompanysharesyour
informationandpurchasehistorywithothers.Beforeyoumakeany
Internetpurchase,checkthecompany'sprivacypolicy.Theyshouldnever
shareorsellyourpersonaldata.
Watch Out for Phishing
ITComputerTechnicalSupportNewsletter| 3
Phishingisacommontrickusedbyidentitythievestogainyourpersonal
information.Thiscrimeinvolvessendinge-mailsorcreatingsitesthat
appeartobefromalegitimatecompanyandaskingyoutoconfirm
personalinformationsuchasbankaccountnumbers,passwords,birth
dates,oraddresses.Mostofthetrustedsiteswon’tbedealingbysending
mailstouserstogetthepersonalinformationbutfewsitesmayleadyouto
phishingscams.Whenyougetthosekindofmailsyouneedtodirectly
contacttheoriginalsiteofficialstoconfirmaboutthatmail.
Think Before Opening Email Attachments
Don'topenemailattachmentsfrompeopleyoudon'tknow.These
attachmentsmaycontainvirusesorothermalware.Additionally,thinkat
leasttwicebeforeyouopenanattachmentfromsomeoneyoudoknow.It's
commonforemailaccountstogethacked,andthehackersmaysend
messagesandattachmentstoallofthepeopleintheaddressbook.
ITComputerTechnicalSupportNewsletter| 4
Ifitdoesn'tsoundlikesomethingyourfriendmightsendyou,emailhimor
herseparatelytofindoutifit'slegit.
ITComputerTechnicalSupportNewsletter| 5
Download