ITComputerTechnical SupportNewsletter January25,2016 Vol.2,No.12 TABLEOFCONTENTS Overview.........................…...1 INTERNETSAFETY Internetiseverywheretoday—atwork,home,coffee shops,airports.Thankstowirelesstechnology,itfollowsyou virtuallyeverywhere.ThereisnodoubtthattheInternetmakes ourliveseasier.Activitiesandtasksthattookhourstobe completedcanbetakencareofquicklyandeasily.Butas beneficialastheInternetmightbe,itisalsoabreedinggroundfor fraud,identitytheftandpiracy.UsetheInternet,butuseitvery wisely. Keepyourpersonal informationprivate…………...2 Thinkbefore sharing…………………………………2 Checkprivacypolicies…………3 Watchoutforphishing……...3 Thinkbeforeopeningany attachment…………………………4 The IT Computer Technical Support Newsletter is complements Of Pejman Kamkarian ITComputerTechnicalSupportNewsletter|1 Keep Your Personal Information Private TheInternetisfullofopportunitiestosharepersonalinformation,butthis canmakeyouvulnerabletoidentitytheft,cyberstalking,andotherissues. AccordingtoPublicOpiniononPrivacy,89%ofpeopleareconcernedabout thelevelofpersonalinformationontheInternet. It'scommontoincludealotofinformationonyourprofile.Fromyour employertoyourreligiousviews,thinktwicebeforeyouputitoutonthe web.Makesuretheinformationyoushareissuitableforalleyes. Think About Photos before Sharing Sharingphotoscanbeagreatwaytoconnectwithfriendsandfamily,but theycanalsomakeyouvulnerable.Beforesharingapicture,takeafew minutestoexaminethebackgroundfordetails.Besureyoufuzzoutour cropphotosthatshowyourhouseaddress,yourcarlicenseplate,and otherinformationpeoplecouldusetofindyou. ITComputerTechnicalSupportNewsletter|2 Check a Company's Privacy Policy before Buying You'veprobablynoticedthatyoubeginreceivingemailorevenphonecalls aftermakingapurchase.Thiscanhappenwhenacompanysharesyour informationandpurchasehistorywithothers.Beforeyoumakeany Internetpurchase,checkthecompany'sprivacypolicy.Theyshouldnever shareorsellyourpersonaldata. Watch Out for Phishing ITComputerTechnicalSupportNewsletter| 3 Phishingisacommontrickusedbyidentitythievestogainyourpersonal information.Thiscrimeinvolvessendinge-mailsorcreatingsitesthat appeartobefromalegitimatecompanyandaskingyoutoconfirm personalinformationsuchasbankaccountnumbers,passwords,birth dates,oraddresses.Mostofthetrustedsiteswon’tbedealingbysending mailstouserstogetthepersonalinformationbutfewsitesmayleadyouto phishingscams.Whenyougetthosekindofmailsyouneedtodirectly contacttheoriginalsiteofficialstoconfirmaboutthatmail. Think Before Opening Email Attachments Don'topenemailattachmentsfrompeopleyoudon'tknow.These attachmentsmaycontainvirusesorothermalware.Additionally,thinkat leasttwicebeforeyouopenanattachmentfromsomeoneyoudoknow.It's commonforemailaccountstogethacked,andthehackersmaysend messagesandattachmentstoallofthepeopleintheaddressbook. ITComputerTechnicalSupportNewsletter| 4 Ifitdoesn'tsoundlikesomethingyourfriendmightsendyou,emailhimor herseparatelytofindoutifit'slegit. ITComputerTechnicalSupportNewsletter| 5