This is Part 4 of the Outline.
Buttons below will take you to other parts of the outline.
Passwords
Updates
Viruses/Malware
Backup
Internet
“Remember that anything you post on a social network is on the internet forever even if you delete it.”
“A fake email disguised to look like it is coming from a legitimate business is called a phishing email. The “bad guys” are trying to trick you into handing over your personal information (usernames, passwords, credit card numbers, etc).”
“These emails often contain generic greetings, poor grammar, punctuation and phrasing, and almost always use scare tactics to try to get you to take action.”
“Another common scam is one that takes place via the phone. Someone will call you claiming to be from a tech company (often Microsoft). They will tell you that there is something wrong with your computer and that they can help fix it. They will want to take control of your computer.
NEVER GIVE SOMEONE CONTROL OF YOUR COMPUTER IF YOU DON’T KNOW THEM!
If you give them control of the computer, they will show you some scary error messages and convince you to pay them lots of money to “fix it”. This is totally a scam.
”