In human life, technology and the internet have brought a lot of changes in the way people do simple tasks that made their life easier. As technology improves, more and more people begin to play with computers and cell phones, exploring the possibilities. Also, the internet today is a big help for us to find great sources of information and it also provides as a good platform to communicate between our families across the country. There are a lot of good sides to the internet, and as people become more and more curious about what the limits are, they begin to break those rules and steal information from other people's personal information, such as phone numbers, full names, home addresses, and much more. We cannot deny the fact that dangers are also present in online communication, but in consideration, there are ways we can protect ourselves from these kinds of issues. As we continue living with the high-technology, we must know our limit and the rules the we need to follow for us to keep our security, privacy and safety while engaging and exploring technologies.
Online Safety Tips 101
Here are the things, we recommend, for educators and students to be safe online. Let's get into it!
1. Be careful what you post online.
Be cautious about disclosing too much information on social media. Cybercriminals may use the information you've posted online against you. For example, you may have posted photos of yourself on vacation with your family. Because you have made it known that the house is empty, you have made yourself a target for robbery. In this situation, when you return from your vacation, you can share the photos you took. Always think before clicking. Your safety should always be your top priority.
2. Educate yourself about online scams.
Here are the different types of cyberattacks that you need to be aware of:
A. Pishing
Hackers will send an email, often impersonating a legitimate company, in order to gather usernames, passwords, credit card information, and other information. These emails will normally try convince you to open an attachment, click a button, or fill out a form.
B. Pharming.
Hackers will try to gather your personal information by redirecting traffic from a legitimate website to a similar-looking website controlled by them.
C. Vishing and Smishing
Phishing attacks, vishing, and smishing are all carried out through your phone. A vishing attack occurs when a hacker calls you and seems to be a legitimate business on your caller ID. When you're on the phone with this cybercriminal, they'll ask for your personal information. Similarly, smishing attacks will pretend to be an official business in order to get your personal information through text messages.
3. Security and Privacy.
Security involves measures taken to be protected from danger, threat, or harm. It is also an act of keeping your private information and data secure, ensuring it is not accessed by any unauthorized sources. On the other hand, privacy refers to details about you directly and how you wish to share them.
Ways on how to do it:
Read the organization’s privacy policy in its entirety before agreeing and accepting the terms.
Limit your social media presence and the data you share online.
Consider identity theft protection services.
Use different passwords for different sites and applications. Make each password complex.
4. Censorship.
Censorship involves the suppression of information. This happens when a person or group restricts something that they feel is unfit or offensive. The things that are censored are typically words, images, or ideas, usually by a person or group that is attempting to impose their moral, political, or personal belief on others.
Ways on how to do it:
TV warnings and ratings: This warning allows parents to understand that there are things that are inappropriate for children under a certain age.
Decide not to share information that they know about a certain people or group.
5. Online Etiquette.
Be respectful and kind to others online, and don’t engage in cyberbullying, harassment, or hate speech. Treat others the way you want to be treated and report any abusive or inappropriate behavior. Remember that your online actions can have real-world consequences, and that there are laws and rules that apply to online behavior.
Online etiquette is the set of rules and norms that guide how people should behave and communicate online. It is based on the principles of respect, kindness, and responsibility. Online etiquette helps people avoid online conflicts, such as cyberbullying, harassment, or hate speech, which can hurt others and damage their reputation. Online etiquette also helps people follow the laws and rules that apply to online behavior, such as privacy, security, and intellectual property. Online etiquette is important for both educators and students, as it can enhance their online learning experience and prepare them for the digital world.
6. Digital Literacy.
Digital literacy is the ability to use digital tools and technologies to work, learn and interact online. One of the key skills of digital literacy is to find and verify reliable information online, and avoid falling for online scams and fake news. This means that you need to be critical and careful about what you see or hear online, and not believe everything without checking its accuracy and credibility. You need to check the source, date, and author of the information, and compare it with other sources that are trustworthy and reputable. You also need to avoid sharing or spreading false or misleading information, as this can harm yourself and others, and damage your reputation and credibility. By developing this skill, you can become a responsible and informed digital citizen.
7. Be careful of what you are downloading.
People now has access to Internet and technologies thus we love to download from internet such as images, videos, music, and information BUT we must be aware that there are threats also in downloading contents.
These are the tips and ways to avoid trouble in DOWNLOADING:
Watching out for “free” stuff. Free games, ring tones, or other downloads can hide malware. Do not download anything that is free unless you trust the source and you've scanned it with security software.
Don’t share material that is under copyright.
Don’t become an easy target. Ensure you have effective and updated antivirus/antispyware software and firewall running before you start downloading.
Use trusted download websites rather than peer-to-peer systems to obtain programs.
8. Freedom of Speech.
Freedom of speech refers to our rights and freedom to express our selves in social media platform. But sometimes people may forget the word "respect" because of freedom of speech.
These are the ways where in you can do it without disrespecting other's privacy and opinions:
Express your thoughts and opinions without disrespecting and hurting anyone's feelings.
Spread truth, avoid spreading fake news.
Know your limitations so that you cannot disrespect anyone.
Avoid discriminating.
9. Avoid open unknown attachments.
Email attachments are a convenient way to communicate or receive vital information. However, using it can be challenging because hackers can use it to steal your personal information by opening attachments.
As a result, the following guidelines should be followed while sending or receiving email attachments:
Be cautious of attachments from unknown sources. It is generally safer to not open attachments from people you do not know. These attachments could contain malware or phishing scams.
Scan attachments for viruses. Before opening an attachment, use an up-to-date antivirus program to scan it for viruses. This will help protect your computer from malicious software.
Use caution when opening attachments in public places. Public Wi-Fi networks may not be secure, so it is best to avoid opening attachments in public places if possible. If you must open an attachment in a public place, make sure to use a secure connection (e.g., VPN) and scan the attachment for viruses before opening it.
Do not open attachments with suspicious file extensions. Be wary of file extensions that you do not recognize or that seem out of place (e.g., a .exe file in an email from a colleague). These types of attachments could contain malware.
Use encrypted email when sending sensitive information. If you need to send sensitive information via email, consider using an encrypted email service. This will help protect the information from being intercepted by hackers.
10. Use secure Internet connection.
People nowadays, whether they are children, teenagers, adults, or seniors, use technologies. They utilize public WiFi to watch or chat with their friends or family, as well as for work purposes. However, some people are unaware that simply connecting to a public Wi-Fi network can expose them to cyberattacks if they do not use it effectively.
Avoid using public WiFi for personal transactions that require sensitive data, such as online banking or shopping. Use a Virtual Private Network, or VPN, if you need to do any of them. A VPN will use real-time encryption to protect any data you communicate over a network that is unsecured. If you do not utilize a VPN, we recommend saving any personal transactions until you have access to a reliable internet connection.
Comments