Important Announcement
PubHTML5 Scheduled Server Maintenance on (GMT) Sunday, June 26th, 2:00 am - 8:00 am.
PubHTML5 site will be inoperative during the times indicated!

Home Explore DIGISCHOOLS.2021-1-RO01-KA220-SCH-000023611

DIGISCHOOLS.2021-1-RO01-KA220-SCH-000023611

Published by Fatih ERMEZ, 2023-08-22 07:37:24

Description: ERASMUS+ PROJECT
DIGISCHOOLS. 2021-1-RO01-KA220-SCH-000023611

Search

Read the Text Version

["Freedom of assembly, association and participation \uf075 You have the freedom to peacefully assemble and associate, participate in civil society, and join trade unions online. \uf075 You may also protest peacefully online, with the acknowledgement that blocking or disrupting service or causing property damage are not protected and are subject to legal consequences","Privacy and Data Protection \uf075 You have the right to privacy and a family life online, including but not limited to protection of personal data and respect for confidentiality. Personal data may only be processed or transferred to third parties with your informed consent. General surveillance or interception is not permitted, except in exceptional circumstances as prescribed by law, such as a criminal investigation.","Education and Literacy \uf075 You have the right to privacy and a family life online, including but not limited to protection of personal data and respect for confidentiality. \uf075 Personal data may only be processed or transferred to third parties with your informed consent. \uf075 General surveillance or interception is not permitted, except in exceptional circumstances as prescribed by law, such as a criminal investigation.","Production of personal data","Production of personal data \uf075 The increasing use of the internet in the world and in our country brings many conveniences, while the issue of protection of personal data has become more important. \uf075 In today's world, every sharing that was made , every data that was entered on the internet can be used by malicious people who want to reach you and your information. Especially social networks are the easiest way for malicious people to access your information. Before sharing, you need to think in detail what kind of consequences and risks you will have. \uf075 Even a game that you download to your smartphone and you can't wait to play can transfer your contacts to its database while you play the game, after obtaining your consent with a simple confirmation method with a small pop- up, and then share them with companies you don't know what they are doing","So \uf075 We recommend that you activate the 'do not track' option of your internet web browser. You can find more detailed information on the subject in the web security section. \uf075 Read the policy and confidentiality agreements of the web pages you want to process. In addition, you can get information about the page from the contact, about us sections of the relevant page. \uf075 Analyze what kind of information the applications you download from mobile platforms collect from you. If necessary, do not download applications that you will not use a lot on your phone. \uf075 Pay attention to what mobile apps you download are synchronized with. Disable information you don't want synced. For this, we recommend that you review your accounts, application management, location services and security in your phone settings. \uf075 Reconsider your privacy and security settings on social networks. For this, we recommend that you read the section on safety in social networks.","What Are Your Rights According to the Personal Data Protection Law? \uf075 Learning whether your personal data is being processed. \uf075 If your personal data has been processed, requesting information about it. \uf075 Learning the purpose of processing your personal data and whether they are used in accordance with the purpose \uf075 Objecting to the emergence of a result against the person himself by analyzing the processed data exclusively through automated systems \uf075 In case of loss of personal data due to unlawful processing, you have the right to demand the compensation of the damage.","Digital Ethics","DIGITAL ETHICS \uf075 The concept of ethics tries to understand the nature of the concept of morality in order to distinguish the wrong directly. \uf075 The concept of ethics is a concept that examines what moral values such as right and wrong are and how actions should be. \uf075 The concept of ethics is also described as compliance. \uf075 Today just like the moral principles and rules that societies have to comply with those principles should also be adapted in the internet environment. \uf075 Digital ethics is a concept that determines morally correct behavior in all communication processes over the internet \uf075 Digital ethics are rules that ensure not harming others by not misusing technology and encouraging right behavior \uf075 Today, it includes showing the courtesy and etiquette, moral rules and respect you show to individuals in real life on the internet","Why is it important \uf075 One of the most immediate reasons why digital ethics are important is because how we present, indeed construct our persona(s) effects the way in which our communication and intentions will be received \uf075 The notion that individual ethics impact our arguments is nothing new \uf075 The virtual universe is a universe that almost everyone uses actively or passively today \uf075 In this universe individuals feel quite free Individuals perform some actions in this virtual environment just as they do in the physical space \uf075 Among these actions interfering with the private lives of individuals by using fake accounts is beyond ethical limits \uf075 Therefore to draw the line to these actions digital ethics has come out","Six Ethical Principles in Social Media Communication 1 . JUSTICE 4 . DO NOT STEAL Use the power of Stay away from communication with illegal downloading care Think before activities you post! 5. KINDNESS 2 . RESPECT Mind Respect users your language personalities and opinions 6. SECURITY Each user is responsible 3. RESPONSIBILITY for ensuring their own You are responsible privacy for your content","Cyberbulling","Cyberbullying Cyberbullying is bullying that takes place overdigital deviceslike cell phones, computers, and tablets. Cyberbullying can occurthrough SMS, Text, and apps, oronline in social media, forums, orgaming wherepeople can view, participate in, orshare content. Cyberbullying includes sending, posting, orsharing negative, harmful, false, ormean content about someone else. It can include sharing personal orprivate information about someone elsecausing embarrassment orhumiliation. Some cyberbullying crossesthe line into unlawful orcriminal behavior.","Cyberbullying The most common places where cyberbullying occurs are: \uf075 Social Media, such as Facebook, Instagram, Snapchat, and Tik Tok \uf075 Text messaging and messaging apps on mobile or tablet devices \uf075 Instant messaging, direct messaging, and online chatting over the internet \uf075 Online forums, chat rooms, and message boards, such as Reddit \uf075 Email \uf075 Onlinegaming communities","DIGITAL AWARENESS FOR PARENTS The digital worldis constantly evolving with new social media platforms, apps, and devices, and children and teens are often the first to use them. Some negative things that may occurinclude cyberbullying,sexting, posting hateful messages orcontent, and participating in negative group conversations. If your child posts harmful ornegative content online, it may not only harm other children; it can affect their online reputation, which can have negative implications for their employment or collegeadmission","DIGITAL AWARENESS FOR PARENTS Whileyou may not beableto monitor all of your child\u2019s activities, therearethings you can doto prevent cyberbullying and protect your child from harmful digital behavior: \u2022Monitor a teen\u2019s social media sites, apps, and browsing history, if you have concerns that cyberbullying may beoccurring. \u2022 Revieworre-set your child\u2019s phone location and privacy settings. \u2022Follow orfriend your teen on social media sites orhave another trusted adult doso. \u2022Stay up-to-date on the latest apps, social media platforms, and digital slang used by children and teens. \u2022 Knowyour child\u2019s user names and passwords for email and social media. \u2022 Establish rules about appropriate digital behavior, content, and apps.","VIRTUAL LEARNING AND CYBERBULLYING Virtual learning can pose multiple benefits for students. For instance, it allows students to continue their schooling when it is not possible to bephysically present on school grounds. It may also provide relief for students who were experiencing bullying in school. However, virtual learning may also bechallenging for some students, and the risk of cyberbullying remains. Students often use microphones and web cams to attend online classes. Consequently, a student\u2019s home life, living situation, setting, or family member may appear in the background while they are in class. Each student\u2019s home situation is different, and those differences can show during virtual learning. Students who bully others tend to bully students they perceive as different.","Prevent Cyberbullying during Virtual Learning It is important to beaware of common cyberbullying tactics so you can recognize cyberbullying and help prevent it. For example, some teachers restrict socializing by turning off the \u201cchat\u201d function in virtual learning environments. However, some students may use other digital communications, like texting or social media, to engage in conversations without the teacher\u2019s awareness. Parents, caregivers, and adults who are aware of the cyberbullying risks can take steps to help prevent it during virtual learning. * Have your child sit with a wall behind them or use a generic photo as a background image to limit what others seeof your home via the webcam. Some schools may require all students to use the same neutral background image. * Have your child mute their microphone when they are not speaking and sit in a quiet place, if possible, so others cannot hear activities in your home.","Prevent Cyberbullying during Virtual Learning \u2022Check in with your child while they are attending school virtually to see if they are using other devices or apps during class. Limit the use of other devices and apps while in class to reduce the risk of cyberbullying. \u2022Role model appropriate videoconferencing behavior and teach your child gooddigital citizenship skills. \u2022Remember, if a student conducts any cyberbullying activity while using a school laptop, there may bea record of their cyberbullying activity..","SocialM edia an d A pps S ocial M e d i a Apps and Sites Co m m o n ly U s e d by Children and Teens Digital media and apps allow children to communicate and express their creativity, connect with peers, and share their feelings. However, they can also bean avenue through which cyberbullying occurs. There are many types of apps and sites available for free that give users the ability to search for people and share or post information anonymously. Parents may not beaware of the apps that their children use regularly or the risks involved in using them. There are many ways that cyberbullying can behidden in apps and sites, such as texts, videos, and web calls that disappear or do not appear on the device\u2019s call or text message logs. Many apps also make it easy for users to access, view, or participate in adult or harmful content. In addition, privacy and location settings may make users vulnerable to stalking, cyberbullying, exposure to adult content, or other dangers","Social M edia an d A pps Popular Social Media Apps and Sites Some current popular social media platforms and apps include: \u2022Amino: An app that lets users join online communities, chats, forums, and groups on a variety of topics based on their interests. \u2022Askfm: A social networking site that allows users to ask other people questions, often anonymously. \u2022Calculator%: A \u201cvault\u201d or secret app that appears harmless, but hides photos, videos, files, and browser history. \u2022Chatroulette: There are over 20 different chat roulette sites that allow users to instantly connect via webcam and video chat. Sites typically pair the users randomly and instantly. \u2022Discord: A voice-over-IP (VOIP) app that allows users to video chat with others, private message, and join, create, or participate in public and private chat rooms. This app is often used by players to chat with each other while playing videogames","SocialM edia an d A pps Popular Social Media Apps and Sites \u2022Facebookand FacebookLive:Themost commonlyusedsocial media site that is accessibleon many different media platforms. \u2022FacebookMessenger Kids:A messaging app and platform for children. \u2022Houseparty:A group video chatand socialnetworking app that allows up toeight peopleto video chatat oncein a \u201croom.\u201d \u2022Instagram:A photoand video sharing and networking site that connectsusers through other social networking sites (e.g.,Facebook). \u2022Kik:A messaging app that allows users ofall ages tocontactothers anonymously. \u2022Line:A messaging app that allows users tomakefreephonecalls,leavevoicemessages,and text.Users candeletetextsor chats from recipient\u2019sphoneusing a timer. \u2022LiveMe:A tooltobroadcast live-streaming videos and watch otherusers\u2019videos.","SocialM edia an d A pps Popular Social Media Apps and Sites \u2022LiveMe:A tooltobroadcast live-streaming videos and watch otherusers\u2019videos. \u2022MeetMe:A dating app that connectsusers toothers basedon geographic proximity. \u2022Omegle:An app that pairs users with strangers in anonymous one-on-one chatsessions. \u2022Reddit:A site that stores social news,rates and evaluates webcontent,and discussion threads. \u2022Roblox:An onlinegameplatform with freemultiplayer games createdby users. Robloxallows users tocommunicatewith eachotherand join groups. \u2022Sarahah:An anonymous messaging app that allows users tosend anonymous messages. \u2022Snapchat:A photomessaging app that allows for sharing pictures and shortvideos that are intendedtobeerasedshortly afterdelivery. \u2022Telegram:A messaging app that allows users toshare photos,videos,and files; makecalls,and deletetextsor chats from recipient\u2019sphoneusing a timer. \u2022TikTok:An app that allows users tocreateand share their own videos wherethey lip-synch, sing, dance,orjust talk.","SocialM edia an d A pps Popular Social Media Apps and Sites \u2022Tumblr:A social networking site that allows posting ofshort blogs and media. \u2022Twitch:A live streamplatform for gamerstowatch live streamcontent,chat,and connect. \u2022Twitter:A microblogging site that allows users tosend,read,and replyto\u201ctweets\u201dor short messages. \u2022WeChat:An app that allows user tochatwith friends, and tosearch for peoplenearby and around theglobe. \u2022WhatsApp:A private messaging app that allows users totext,send photos,videos,and location information totheir contacts. \u2022YouTube:A video sharing platform that allows users topost and sharevideos. \u2022YUBO(formerly YELLOW):An app referredtoas the\u201cTinder for teens\u201dthat allows users to swipe right or lefttoacceptorrejecttheprofilesofotherusers. \u2022YouNow: Broadcast, Chat,and WatchLive Video:An app that letsteensbroadcast themselves live.They can seeand respond tolive chatorview otherbroadcasters and chatwith them.","SocialM edia an d A pps Risks of Social Media Apps and Sites Social media has many benefitsthat must bebalancedwith therisks it presents.Risks tobe awareo include: \u2022Screening for harmfulcontenton websites andapps varies widely. \u2022Contentpostedcan beincorrect,harmful, orhurtful. \u2022Apps and platformscan beusedtoshareharmful oradult content. \u2022Apps and platformscan include users ofall ages and allow children toconnectwith adults. \u2022Apps and platformscan have no moderatorforchats,groups,and forums that allow all types of content to beposted or shared. \u2022Apps and platformscan allow all types ofcontenttobepostedorshared.","SocialM edia an d A pps Risks of Social Media Apps and Sites \u2022Privacy controls overwho can view or accessposted material vary across apps, and many users arenot aware ofhow touse themeffectively. \u2022Apps that allow forreal-time user videos \u201clivestreaming\u201d can beenused toshow bullying, violence,suicide, and harmful acts as they arehappening. \u2022Some apps that include locationinformation can beused togetpersonal information, such as someone\u2019sage,current location,or where someonelives. \u2022Apps that support telephone callsdonot show up on a calllog,so parents may not know who their children aretalking to. Parents can search online for organizations that provide in-depth parental reviews of apps, platforms and games used by children tolearn moreabout them.By learning about therisks, important security features,and otherdetails about theapps, platforms, and games children want touse,parents can make an informed decisionabouthow orif their child will use them.","C yberb u llyin g an d G am in g Cyberbullying and Online Gaming Playing videogames is a popular activity, with 70%of youth under the ageof 18 playing videogames. Somegamesaresolitary or single-player games;others are multi-player. Multi-player games\u2013 whether they areplayed on a computer, gameconsole, handheld system, smartphone, ortablet \u2013 allow users to play with peoplethey know in person and othersthey meetonline. In fact, 65%of video gameplayers ofall agessay they play with others.Thereare many types ofvideogames:role- playing games, action games, shooter games, sport games, fighting games. There are also educational gameslike sandbox\/build\/construct games,puzzle games,and others.","C yberb u llyin g an d G am in g Benefits of Online Gaming Playing videogames can positively impact a players\u2019 cognitive, emotional, and social skills. It can also help children and teens enhance their problem-solving and strategizing skills. Multi-player team gamesmay help youth learn how to cooperate with others. Youth who play videogames may also improve their motor skills and creativity. Videogamesalso offer players a spaceto work out their emotions, and can boosta player\u2019s moodand easeanxiety. Gaming can also bea place to make new friends and socialize.","C yberb u llyin g an d G am in g Risks of Online Gaming Anonymity of players and the useof avatars allow users to createalter-egos or fictional versions of themselves, which is part of the fun of gaming. But it also allows users to harass, bully, and sometimes gang up on other players. Whenplayers are anonymous, it can bedifficult to hold them accountable when they bully others and usethe gameas a tool of harassment. Someplayers may usethe gameas a means to harass others or to gettheir personal information, like usernames and passwords. They can even make others\u2019 personal information available online through a tactic called \u201cdoxing.\u201d Doxing can compromise not just a child\u2019s information, but their parent\u2019s information as well, and can make them targets ofbullying and- harassment","C yberb u llyin g an d G am in g Prevent Cyberbullying for Gamers Gaming can bea fun, safe and positive environment for all. Parents can help prevent cyberbullying of their children who play video games by: \u2022Playing the gamewith your child or observing the gameto understand how it works and what a child is exposed toin thegame. \u2022Checking in periodically with your child about who is online, playing the game with them. \u2022Knowing which gaming communities, social media, and apps your child uses while gaming and their security risks, which you can research online. \u2022Helping your child set the privacy and security settings for their games and apps. \u2022Teaching children about safe digital behavior,including not clicking on links from strangers; not downloading bots (software for automated tasks) or clicking on links in gaming forums; not sharing personal information like emails, phone numbers, addresses, and passwords; not participating in bullying behavior of other players; and what to doif they observe or experience cyberbullying.","C yberb u llyin g an d G am in g Prevent Cyberbullying for Gamers \u2022Establishing rules about how much time a child can spend playing video games. \u2022Keeping an open line of communication about your child\u2019s digital life. There are things that gamers can doif they are experiencing cyberbullying or seeit happen to others while gaming: \u2022Tell theplayer whois bullyingtostop. \u2022Block the player who is bullying from the game and de-friend them on social media and in gaming communities. \u2022Report the player who is bullying to the game group, team, platform, community, or developers. \u2022Takea break from playingthegame. \u2022Tell a parent or trusted adult and getsomesupport.","Pr event C yber bullying B e Aware of W h a t Your Kids are D o i n g Online A child may beinvolved in cyberbullying in several ways.A child can bebullied, bully others, orwitness bullying. Parents,teachers, and other adults may not beaware of all the digital media and apps that a child is using. Themoredigital platforms that a child uses,themoreopportunities therearefor being exposed to potential cyberbullying.","Pr event C yber bullying Warning Signs a Child is Being Cyberbullied or is Cyberbullying Many ofthewarning signs that cyberObut hllyeinrgs is occurring happen around a child\u2019s use of their device.Some ofthewarning signs that a child may beinvolved in cyberbullying are: \u2022Noticeableincreases or decreasesin deviceuse,including texting. \u2022A childexhibitsemotional responses (laughter, anger,upset) towhat is happening on their device. \u2022A childhides their screenor devicewhen othersarenear,and avoids discussion aboutwhat they aredoing on their device. \u2022Socialmediaaccountsareshut down or new onesappear. \u2022A childstarts toavoid social situations, eventhosethat wereenjoyedin thepast. \u2022A child becomeswithdrawn or depressed, or loses interest in peopleand activities.","Pr event C yber bullying What to Do When Cyberbullying Happens If you noticewarning signs that a child may beinvolved in cyberbullying, takesteps toinvestigate that child\u2019s digital behavior.Cyberbullying is a form ofbullying, and adults should takethesame approach toaddress it: support the child being bullied, address the bullying behavior of a participant, and show children that cyberbullying is taken seriously. Becausecyberbullying happens online,responding toit requires different approaches.If you think that a child is involved in cyberbullying, thereare severalthings you can do:","Pr event C yber bullying What to Do When Cyberbullying Happens \u2022Notice\u2013 Recognizeif therehas beena change in moodorbehavior and explorewhat thecausemight be.Try todetermineif thesechanges happen around a child\u2019s useoftheir digital devices. \u2022Talk \u2013 Ask questions tolearn what is happening, how it started,and who is involved. Document \u2013 Keep a record of what is happening and where. Take screenshotsofharmful posts orcontent if possible.Most laws and policies notethat bullying is a repeatedbehavior,so recordshelptodocumentit.","Pr event C yber bullying What to Do When Cyberbullying Happens \u2022Report\u2013 Most socialmedia platforms and schools have clearpolicies and reporting processes. If a classmateis cyberbullying,reportit theschool.You can alsocontactapp orsocial media platforms toreportoffensivecontentand have it removed.If a childhas receivedphysical threats, orif a potential crimeorillegalbehavior is occurring,reportit tothepolice. \u2022Support \u2013 Peers,mentors, and trusted adults can sometimes intervenepublicly to positively influencea situation wherenegative orhurtful contentposts abouta child. Public Intervention can include posting positive commentsabouttheperson targeted with bullying totry toshift theconversationin a positivedirection. It can also helpto reachouttothechild who is bullying and thetarget ofthebullying toexpress your concern.If possible,try todetermine if moreprofessional support is neededforthose involved, such as speaking with a guidance counselorormental health professional.","E stab lish in g R u les Tips for Parents: Talk to You r C h ild abou t Appropriate D ig ital Behavior and Content Parents create trust with children by initiating open, honest discussions. Thesedialogues arean opportunity tocommunicatevalues and expectations aboutyour family\u2019s appropriatedigitalbehavior,including viewing or sharing content,and apps theycan and cannot use. Checkin frequently with your children about their digital experiencesto address any potential risk ofcyberbullying and harm. Beclearthat your intention is tolookout fortheir wellbeing,and that you want tohave an open dialogue.Listen totheir concerns and express your perspective.","E stab lish in g R u les Tips for Parents: Talk to You r C h ild abou t Appropriate D ig ital Behavior and Content Tominimizetherisk ofcyberbullying or harm from digital behavior, parents can: \u2022Set clearexpectations aboutdigital behavior and online reputation. \u2022Educate about the harmful effects of cyberbullying, posting hateful speech or comments, sexting, and sharing naked photosofthemselves orothers (including potential legal issues). \u2022Beclearaboutwhat contentcan beviewed orshared. \u2022Identify which apps areappropriate foryour child\u2019suseand which arenot. \u2022Establish rules abouttheamount oftime that a child can spend online oron their devices. \u2022Model positive, respectful digital behavior on your own devicesand accounts.","R eportC yberb u llyin g Steps to Take Immediately \u2022Don\u2019trespond toand don\u2019tforward cyberbullying messages. \u2022Keepevidenceofcyberbullying.Recordthedates, times, and descriptions of instances when cyberbullying has occurred. Save and print screenshots, emails, and textmessages.Usethis evidencetoreportcyberbullying to web and cell phoneserviceproviders. \u2022Block theperson whois cyberbullying.","R eportC yberb u llyin g Report Cyberbullying to Online Service Providers Cyberbullyingoftenviolates theterms ofservice established by social media sites and internet service providers. \u2022Review their terms and conditions or rights and responsibilities sections. Thesedescribecontent that is oris not appropriate. \u2022Visit social media safety centerstolearn how toblockusers and change settings tocontrol whocan contact you. \u2022Reportcyberbullying tothesocial media site so they can takeaction against users abusing theterms ofservice.","R eportC yberb u llyin g Report Cyberbullying to Law Enforcement When cyberbullying involves theseactivities it is considereda crime and shouldbereportedtolaw enforcement: \u2022Threats ofviolence \u2022Child pornography orsending sexually explicitmessages orphotos \u2022Taking a photoorvideoofsomeonein a placewhereheorshewould expect privacy \u2022Stalking andhatecrimes Some states consider otherforms ofcyberbullying criminal. Consult your state\u2019slaws and law enforcementforadditional guidance.","R epor t C yber bullying Report Cyberbullying to Schools \u2022Cyberbullyingcan createa disruptiveenvironment atschooland isoften relatedtoin-personbullying.The schoolcan use theinformationtohelp inform prevention and responsestrategies. \u2022In m a n y states,schoolsarerequiredtoaddresscyberbullyingintheiranti- bullyingpolicy. Some statelaws alsocoveroff-campus behaviorthatcreatesa hostileschool environment.","Stay Safe Online","STAY SAFE ONLINE Online Safety Basics I D E N T I T Y T H E F T, F R AU D A N D C Y B E R C R I M E Spam and Phishing Cybercriminals have become quite savvy in their attempts to lure peoplein and get you to click on a link or open an attachment.","M alicious Email A malicious email can look just like it comes from a financial institution, an e-commerce site, a government agency or any other service or business. It often urges you to act quickly, because your account has been compromised, your order cannot be fulfilled or there is another urgent matter to address. If you are unsure whether an email request is legitimate, try to verify it with these steps: \u00b7Contact the company directly \u2013 using information provided on an account statement, on the company\u2019s official website or on the back of a credit card. Search for the company online \u2013 but not with information provided in the email","Spam S pam is the electronic equivalent of junk m ail. The term refers to unsolicited, bulk \u2013 and often unwanted \u2013 email. Here are ways to reduce spam: \u00b7Enable filters on your email programs: Most internet service providers (ISPs) and email providers offer spam filters; however, depending on the level you set, you m ay end up blocking em ails you want. It\u2019s a good idea to occasionally check your junk folder to ensure the filters are working properly. \u00b7Report spam: Most email clients offer ways to mark an email as spam or report instances of spam . R eporting spam will also help to prevent the messages from being directly deliveredto your inbox. \u00b7O wn your online presence: C onsider hiding your em ail address from online profiles and social networking sites or only allowing certain people to view your personal information.","Phishing Phishing attacks use em ail or m alicious websites (clicking on a link) to collect personal and financial information or infect your machine with malware and viruses. Spam & Phishing on Social Networks S pam , phishing and other scam s aren\u2019t lim ited to just em ail. They\u2019re also prevalent on social networking sites. The same rules apply on social networks: When in doubt, throw it out. This rule applies to links in online ads, status updates, tweets and other posts. Here are ways to report spam and phishing on major social networks:","Tips for Avoiding Being a Victim \u00b7D on\u2019t reveal personal or financ ial inform ation in an em ail, and do not respond to email solicitations for this information. This includes following links sent in email. \u00b7B efore sending or entering sensitive inform ation online, check the security of the website. \u00b7Pay attention to the website\u2019s URL. Malicious websites may look identical to a legitim ate site, but the U R L m ay use a variation in spelling or a different domain (e.g., .com versus .net). \u00b7If you are unsure whether an em ail request is legitim ate, try to verify it by contacting the companydirectly. Contact the company using information provided on an account statement, not information provided in an email. C heck out the Anti-Phishing Working G roup (A PW G ) to learn about known phishing attacks and\/or report phishing. \u00b7K eep a clean m achine. K eep all software on internet-connec ted devices \u2013 including PCs, smartphones and tablets \u2013 up to date to reduce risk of infection from malware.","What to Do if You Are a Victim \u00b7Report it to the appropriate people within the organization, including network administrators. They can be alert for any suspicious or unusual activity. \u00b7If you believe your financial accounts may be compromised, contact your financial institution immediately and close the account(s). \u00b7Watch for any unauthorized charges to your account. \u00b7Consider reporting the attack to your local police department, and file a report with the Internet Crime Complaint Center.","Protect Yourself With These Tips \u00b7When in doubt, throw it out: Links in email, tweets, posts and online advertising are often how cybercriminals try to compromise your information. If it looks suspicious, even if you know the source, it\u2019s best to delete or \u2013 if appropriate \u2013 mark it as junk. \u00b7Think before you act: B e wary of communications that implores you to act immediately, offers something that sounds too good to be true or asks for personal information. \u00b7\u00b7Make your passphrase a sentence: A strong passphrase is a sentence that is at least 12 characters long. Focus on positive sentences or phrases that you like to think about and are easy to remember (for example, \u201cI love country music.\u201d). O n many sites, you can even use spaces! \u00b7Unique account, unique passphrase: Having separate passphrases for every account helps to thwart cybercriminals. At a minimum, separate your work and personal accounts and make sure that your critical accounts have the strongest passphrases. \u00b7Lock down your login: Fortify your online accounts by enabling the strongest authentication tools available, such as biometrics, security keys or a unique one-time co d e through an app o n your mobile device. Your usernames and passphrases are not enough to protect key accounts like email, banking and social media."]


Like this book? You can publish your book online for free in a few minutes!
Create your own flipbook