The document provides ways to protect personal information from various threats such as close friends, lovers, internet cafe users, impersonators, and malicious websites. Some key protections include not trusting others with access to phones or high-priority accounts, keeping social media profiles private, logging out of computers properly, setting up Google alerts to monitor accounts, and using security apps to avoid malicious websites.
The document provides ways to protect personal information from various threats such as close friends, lovers, internet cafe users, impersonators, and malicious websites. Some key protections include not trusting others with access to phones or high-priority accounts, keeping social media profiles private, logging out of computers properly, setting up Google alerts to monitor accounts, and using security apps to avoid malicious websites.
Original Description:
Ways to protect personal information/social information.
The document provides ways to protect personal information from various threats such as close friends, lovers, internet cafe users, impersonators, and malicious websites. Some key protections include not trusting others with access to phones or high-priority accounts, keeping social media profiles private, logging out of computers properly, setting up Google alerts to monitor accounts, and using security apps to avoid malicious websites.
The document provides ways to protect personal information from various threats such as close friends, lovers, internet cafe users, impersonators, and malicious websites. Some key protections include not trusting others with access to phones or high-priority accounts, keeping social media profiles private, logging out of computers properly, setting up Google alerts to monitor accounts, and using security apps to avoid malicious websites.
sonal Information / Social Information THREATS WAYS TO PROTECT
1. Close Friends *Don't trust on signing in on their phon
es .
*Don't give an access to your high-prio
2. Lovers rity accounts.
*Don't fill out your social media profile.
3. Internet Cafe Users *Resart/close the computer before an d after using. *Make sure that you logged out prope rly before leaving. *Set up a Google alert for your accoun ts.
4. Impersonators/ Pos *Don't fill out your social media profile
ers *Choose your audience on social medi a. (Private/Public) *Don't post too much on social media. 5. Malicious Websites *Think before you click! *Don't open a website that you are not familiar with. *Install a security apps/anti-virus ap ps.