Page 48 - TP_iPlus_V2.1_Class7
P. 48

Keep a strong password for your Wi-Fi
                                                     connection and keep it changing regularly.





                                                                  Some tips to
                              Always download trusted apps      safeguard from         Don’t plug in devices
                               from the Internet and check          hacking           you are not sure about.
                              permissions and authentication





                                                     Always look at the green lock sign ( ) and
                                                   htttps at the address bar of the window before
                                                    accessing any website to check if it is secure.
                  E-mail Spoofing

                  When someone sends e-mails that appear genuine from a trusted e-mail ID but in reality they're
                  not to be trusted.

                  For example, a user may receive an e-mail from a portal or social media platform where the
                  spelling of the service provider or email ID has been slightly changed.
                  For example, mailto:customersupport@tridentportall.com.
                  Notice that the spelling of "portall" is incorrect. These e-mails contain links that direct the user to
                  another web page where they are asked to enter information leading them to provide personal
                  credentials to cybercriminals. This is called phishing.

                                                   Update the operating system and
                                                           antivirus timely.





                                                            Some tips to
                                                                                 Use secure websites by
                                  Frequently update        safeguard from
                                                                                looking at the lock sign or
                                   your passwords.        E-mail Spoofing
                                                                                HTTPS on the address bar.




                                                    Use two-factor authentication to
                                                       log in to e-mail accounts.
                  Spamming


                  It refers to the sending of bulk mail by an identified or unidentified source. Sometimes, certain
                  businesses  send bulk-advertising mail to many accounts  at the same time. Some people
                  intentionally send bulk mail to a user until the mail server runs out of disk space.
                  Some people send virus-infected applications and files through the Internet via e-mails, chats,
                  games, etc. to get access to your smartphone and personal data.





                    46
                         iPlus (Ver. 2.1)-VII
   43   44   45   46   47   48   49   50   51   52   53