The document outlines 5 threats to personal information and social media accounts: close friends, lovers, internet cafe users, impersonators/posers, and malicious websites. It provides ways to protect against these threats, such as not trusting devices to close friends, not oversharing on social media, logging out of accounts properly, and using caution when clicking links or opening unfamiliar websites. The document also lists members of a group that may find this information useful.
The document outlines 5 threats to personal information and social media accounts: close friends, lovers, internet cafe users, impersonators/posers, and malicious websites. It provides ways to protect against these threats, such as not trusting devices to close friends, not oversharing on social media, logging out of accounts properly, and using caution when clicking links or opening unfamiliar websites. The document also lists members of a group that may find this information useful.
The document outlines 5 threats to personal information and social media accounts: close friends, lovers, internet cafe users, impersonators/posers, and malicious websites. It provides ways to protect against these threats, such as not trusting devices to close friends, not oversharing on social media, logging out of accounts properly, and using caution when clicking links or opening unfamiliar websites. The document also lists members of a group that may find this information useful.
The document outlines 5 threats to personal information and social media accounts: close friends, lovers, internet cafe users, impersonators/posers, and malicious websites. It provides ways to protect against these threats, such as not trusting devices to close friends, not oversharing on social media, logging out of accounts properly, and using caution when clicking links or opening unfamiliar websites. The document also lists members of a group that may find this information useful.
*Resart/close the computer before and after using. *Make sure that you logged out properly before leaving. *Set up a Google alert for your accounts.
*Don't fill out your social media
profile 4. Impersonators/ *Choose your audience on social Posers media. (Private/Public) *Don't post too much on social media. 5. Malicious Websites *Think before you click! *Don't open a website that you are not familiar with. *Install a security apps/anti-virus apps. Members:
• Ruffa Mae Sanchez • Erika Diaz
• Nivonne Millan • Melody Oliveron • Jenelyn Casamis • Maryluz Mamac • Ma. Joan Ocaña • Jay Mark Aldiano • Marylou Acilo • Daniel Rizaldo • Adrian Briones • Estela Gloria