Book Creator

SAFER USE OF INTERNET

by Collaborative Guidebook

Pages 2 and 3 of 13

GUIDEBOOK OF SAFE USE OF INTERNET
Loading...
Collaborative Guidebook
Loading...
IES Antonio Menárguez Costa. Los Alcázares - Spain
Loading...
KTSO VOCATIONAL HIGH SCHOOL TURKEY
Loading...
1o GEL Agiou Dimitriou Athens - Greece
Loading...
Escola Secundária Campos de Melo, Covilhã - Portugal
Loading...
IPSCEOA "N. Gallo" di Agrigento - Italia
Loading...
Loading...
Your devices store a lot of private information.
Loading...
One of the main reasons to protect our mobile devices is to safeguard our personal information and that of those with whom we communicate: contacts, photographs, videos, emails, etc., and that we would not like to lose or fall into. hands of third parties.
Loading...
Tips and recommendations
Loading...
The risk of loss or theft will always exist. Therefore:
◆ Use a screen lock method (numerical code or pattern) and encrypt the information so that if this situation occurs, you make it difficult for the person who ends up with the device in their hands to have access.
◆ Make use of security tools that will help you locate the device, lock it and even delete the information stored on it.
◆ Make backup copies on other media so that, no matter what happens, you don't lose the information stored on the mobile or tablet.
Loading...
Loading...
Loading...
Don't let anyone guess your passwords
Choose strong or robust passwords
at least 8 characters and composed of:
◆ uppercase (A, B, C…)
◆ lowercase (a, b, c…)
◆ numbers (1, 2, 3…)
◆ and special characters ($, &, #...)
◆ DO NOT use easy-to-guess passwords such as:
“12345678”, “qwerty”, ”aaaaa”,family names, vehicle license plates, etc.
◆ DO NOT share your passwords.
If you do, it will no longer be secret and you will be giving other people access to your privacy.
◆ DO NOT use the same password on multiple services.
Don't wait for a problem, make backup copies.
Accidental deletion is one of the most common causes of loss of information, although it is not the only one, can also be due to the action of a virus capable of encrypting or deleting the information, due to the loss, accident or theft of the device that contains the information: smartphone, tablet, laptop, external hard drive , flash drive or because the device stops working correctly.
1. Select the information that under no circumstances would you like to lose.
2. Choose the media where you will store the information.
3. Make the backup.
4. Repeat your copies periodically.
It is important to eliminate the steps you take when you browse the internet.
When you browse the Internet, by default all the activity you have carried out with the browser is stored directly in the memory of your computer or device, it does not disappear, in such a way, that it is possible to know all the steps you took at a given time on the Internet.
Measures to minimize the risks when you browse the Internet:
◆ Keep your browser up to date.
◆ Choose trusted add-ons and plugins.
◆ Install a web page checker, usually provided by major antiviruses.
◆ Review the browser configuration options and enable those that you consider most interesting to protect your privacy and keep you safer.
◆ Clear browsing history.
◆ Delete cookies.
◆ Use a password manager to store and safeguard your access codes.
◆ Always close the session when you leave a page where you have authenticated yourself with a username and password.
You must protect your email.
Email is a tool that offers you many possibilities, both at work and in the private sphere, but you have to be careful when you use it, therefore, apply the following recommendations:
◆ Make sure you use a strong password.
◆ Whenever a service provides it, turn on 2-Step Verification to add an extra layer of security to the checkout process authentication.
◆ Avoid providing information that could compromise your privacy, if you have no other choice, encrypt or compress the files with a password that only the recipient of the email and you know.
◆ Do not open emails from unknown users and delete them: they could contain files with malware, links to malicious pages or that impersonate the identity of some entity.
◆ Even if the sender of the email is known, if the message seems suspicious to you, consult that person directly to confirm that they have not falsified their email address.
◆ Don't forget to make backup copies so that you don't lose valuable information in the event of a problem with the mail server.
Risks in instant messaging services
WhatsApp and the rest of the instant messaging applications incorporate many functionalities: send/receive text messages, videos, photos... and as such, they are exposed to the same risks associated with other Internet services such as email and social networks: spam , hoaxes, scams, scams, malware, etc.
◆ If you do not want information about you to be made public, better not spread it.
◆ Look for a profile photo that is not too compromising.
◆ Use the blocking of users with whom you do not want to have communication.
◆ Do not use your status to provide private information about yourself.
◆ Make sure that the exchange of messages is encrypted,
◆ Make backup copies if you don't want to lose the messages of chat.
PrevNext