Here are our top 10 tips to stay safe on social media:
1.Use a strong password.
2. Use a different password for each of your social media accounts.
3. Set up your security answers.
4. If you have social media apps on your phone, be sure to password protect your device.
5. Be selective with friend requests. If you don’t know the person, don’t accept their request.
6. Click links with caution.
7. Be careful about what you share.
8. Become familiar with the privacy policies of the social media channels you use and customize your privacy settings to control who sees what.
9. Protect your computer by installing antivirus software to safeguard.
10. Remember to log off when you’re done.
5 Rules You Should Always Follow to Stay Safe on Social Media
, the use of a computer as an instrument to further illegal ends, such as committing fraud, trafficking in child pornography and intellectual property, stealing identities, or violating privacy.
Cybercrime
Cybercrime, also called _____ crime,
Computer
5 Popular Cybercrimes to Effortlessly Protect Your Computer and Data Against its Impact
What Are Some Examples of Cybercrime?
• Hacking into personal accounts.
• Hacking into work databases.
• Breaking into competitor databases.
• Various forms of internet theft and fraud.
• Schemes/scams based on fake websites.
• Various credit-related thefts.
tops the list of computer crimes as it enables cyber crime on a massive scale.
Malicious Software (Malware)
can be of different types like Trojans, viruses, worms and any other ow to protect yourself against cybercrime
Malware
Malicious Software (Malware) tops the list of computer crimes as it enables cyber crime on a massive scale. Malware can be of different types like Trojans, viruses, worms and any other ow to protect yourself against cybercrime
Attempts by cybercriminals to trick users into revealing sensitive information like passwords or credit card details through deceptive emails, messages, or websites.
Phishing scam
Fraudulent activities where someone’s personal information is stolen and used for financial gain or other malicious purposes.
Identify theft scam
Unwanted or abusive behavior directed at someone over the internet, often through social media, messaging platforms, or online forums.
Online harassment
Persistent online monitoring or harassment of an individual, often involving threats, intimidation, or unwanted attention.
Cyber stalking
Unauthorized intrusion into someone’s personal life or affairs, often through surveillance, data collection, or dissemination of private information without consent.
Invasion of privacy