The document provides guidelines for protecting personal information online, including not responding to unsolicited emails and reporting them as phishing. It emphasizes the importance of strong passwords, using a VPN on public Wi-Fi, enabling two-factor authentication, and regularly backing up data. Additional recommendations include using firewalls, avoiding suspicious downloads, and employing ad-blocking extensions to mitigate malware risks.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
12 views2 pages
123
The document provides guidelines for protecting personal information online, including not responding to unsolicited emails and reporting them as phishing. It emphasizes the importance of strong passwords, using a VPN on public Wi-Fi, enabling two-factor authentication, and regularly backing up data. Additional recommendations include using firewalls, avoiding suspicious downloads, and employing ad-blocking extensions to mitigate malware risks.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2
Question: What is the recommended action if you receive an unsolicited email
asking for your personal information or account details?
Answer: Do not provide any personal information and report the email as phishing. 4. Question: Which type of attack involves an attacker attempting to gain unauthorized access by trying numerous password combinations? Answer: Brute force attack 5. Question: What security measure can help protect your personal information when using public Wi-Fi networks? Answer: Using a Virtual Private Network (VPN) Question: What should you do if you suspect that your account has been compromised by a hacker? Answer: Change your password immediately . Question: What is the best practice for creating strong and secure passwords? Answer: Using a combination of letters, numbers, and special characters; avoiding easily guessable information like birthdays or pet names. Information on the Internet is open. Unless your information is protected, hackers can view your information at any time, but you can protect your information through various means.For example, if a stranger sends you an email asking for your personal information or account details, you can report the email as phishing to prevent more people from being scammed.You can also set a strong password to ensure the security of your account. Strongly encrypted passwords generally use a combination of letters, numbers, and special characters.Using a virtual private network when using public Wi-Fi can change your network port number and IP address, giving hackers a virtual location and making it harder for hackers to find your location.You can also use a firewall to block hacker attacks. Avoid downloading files from unknown sources and suspicious links, and use ad-blocking and script-blocking browser extensions to reduce the risk of malware infection. Regularly back up important data to an external hard drive, cloud storage, or other secure location. Enable two-factor authentication to protect using a password and a second method of verifying your account.
Information on the Internet is open. Unless your information is protected,
hackers can view your information at any time, but you can protect your information through various means.For example, if a stranger sends you an email asking for your personal information or account details, you can report the email as phishing to prevent more people from being scammed. You can also set a strong password to ensure the security of your account. Strongly encrypted passwords generally use a combination of letters, numbers, and special characters. Enable two-factor authentication to protect using a password and a second method of verifying your account. Using a virtual private network when using public Wi-Fi can change your network port number and IP address, giving hackers a virtual location and making it harder for hackers to find your location.You can also use a firewall to block hacker attacks. Avoid downloading files from unknown sources and suspicious links, and use ad-blocking and script-blocking browser extensions to reduce the risk of malware infection. Regularly back up important data to an external hard drive, cloud storage, or other secure location.