Professional Documents
Culture Documents
Security Personal Steps V1 1
Security Personal Steps V1 1
Security Personal Steps V1 1
PERSONAL
STEPS
TO PREVENT OR MITIGATE
CYBER AT TACKS AND TO
PROTECT YOUR PRIVACY
Presented By
V1.1 2022
MORE
DISCLAIMER
This is NOT a professional or technical advise and
it is not intended to replace any service. This is
just a “as is” non binding guide
The information provided on this document does not, and is not intended to, constitute legal advice; instead, all
information, content, and materials available on this document are for general informational purposes only.
Information on this document may not constitute the most up-to-date legal or other information. This document
may contain links to third-party websites or vendors. Such links are only for the convenience of the reader, user or
browser; the owner do not recommend or endorse the contents of the third-party sites. Readers of this document
should contact their attorney to obtain advice with respect to any particular legal matter.
Andres Saravia
IMPORTANT
If you are already a victim of any type of
malware (including but not limited to
ransomware, phishing or SIM swapping), apart
of contacting your bank and credit cards
institutions, please consider contacting and
following instructions from the device developer
(e.g. Apple, Google, Microsoft, etcetera), as all
your personal, commercial and sensitive data
could be already compromised
Andres Saravia
How to create a good and strong
password?
Solution
Try it here
Now It’s Time To Protect Our Devices
Clean Recover
Ransomware is Warning: If not sure data was already compromised when you did the
last back to the USB flash drive, don’t do it though
hitting America
And all users around the world
To Prevent
Ransomware: Use a
Third-Party App
https://objective-see.org/tools.html
Let’s Continue Protecting Our Assets
Encrypt your OSX files with FileVault Encrypt your Windows files with
BitLocker
Privatus for Mac OSX
R E A D M O R E R E A D M O R E
R E A D M O R E
R E A D M O R E
to be protected, to third party companies
R E A D M O R E
SIM Swapping
When they Steal your phone line and then
your identity to access banks, cryptos,
credit cards, everything
Every year: There are more and more victims of SIM Swapping
Learn More
Use One of these Authentication Apps
To Prevent SIM Swapping
Don’t use a text 6 or 7 digits code to confirm your account access. That’s what criminals will
use when swapping or taking control of your phone line
A n d r o i d M O R E M O R E
I O S
Do you use Google
as your search
engine?
Try StartPage.com
Google Engine + Privacy
Hiding Your Real
e-mail Address
Try Unshorten.it
To check if the real link is trustable
Use ”Have I Been Pwned”
To check if your private information has been compromised and
how to protect it
+1 305-850-1325
CONTACT NOW
Want to know more
about Privacy?