You are on page 1of 13

Presented by

Amarylis Crouche

Ashilya Heerah

Pooja Araburdoo

Subadra Ghoorun
use
CRYPTI
password
C
& it PROTECT  Use a combination of
UPPER CASE & lower
case letters, numbers,
and symbols
 Use at least 8
characters
 Do not use real words
or personal info
 And use a password
that’s easy to
remember
Reduce
SENSITIVE
information
• Erase sensitive information as much as you can • If possible, avoid putting it
on any other electronic devices • Do not store sensitive information on portable

devices. • These devices are more likely to be stolen or lost


• Be cautious with whom you • Never disclose to anyone your password.
share private information
• Never click on obscure links
with.
or attachments.
WEB
Ω Ensure maximum security for your information
while surfing the internet and using your email

Ω Be sure to connect to the internet over a


secure network (especially when connecting
over a wireless network)

SECURITY Ω Be sure to enable your firewall

Ω If you are connected to a wireless or public


network, be careful not too share sensitive
information over email, as these are usually
not encrypted and are thus more vulnerable to
Ω Be sure to download and share files (especially music and cyber attacks
films) legally. Pirated or copyrighted programs are more
prone to malware and viruses. Ω Do not enter or install suspected malicious or
Be sure to unable the auto-connect settings on your suspicious software and websites
wireless networks

Ω Avoid this by verifying the “http” in the URL; secure sites


should read “https”

Ω Do not share classified or confidential data over the email,


chat and messenger.
S I
N
E O F
∏ Online information on Social
Networks

C N O
R
U OF L M
∏ Avoid sharing of sensitive
information (birthdates, address,
phone numbers)

R I A
I N T ∏ Such data may lead to other

I information (decoding of passwords)

T E O
Y N
VIRUS PROTECTION
Regular backup of files & data
∞ Weekly, 12 000 laptops are stolen in the US alone
(Ponemon Institute)

∞ Laptops, tablets, mobiles are easily stolen because of they are


easily portable and small

∞ Never leave your devices unattended in public


areas

∞ If your institution, school or business offers personal lockers, make use of


these facilities for safekeeping

LOCK
KEY
PROTECT
your
anywhere
AREA before
GOING

• After locking doors & windows, secure all the keys. • Any access code, card or key should not

be shared. •Any important or sensitive material should be safely locked before leaving an area
unattended
Backup
copies of
essential files
or information

Securely

should be stored
These copies

You might also like