Bluejacking is the process of sending unwanted
messages to open Bluetooth connection.
Kee Bluetooth switched off when not in use.
Keep Bluetooth switched off when not in use.i
Physical threats such as theft, flooding, fire and accidental damage.
Keep computers in locked rooms and back up the data.
Hackers try to get acces without permission.
Use firewalls, passwords and encrypt the information traveling across networks.
Phishing 'cons' people into believing that an email or text is from a valid organization so that they give away their username and password leading to
identity theft.
You need to be able to identify phishing.
Unsecure wireless networks let other users easily see and use your wireless network.
Secure wireless networks using a password and encrypt data traveling over the network.
Storing passwords and other important information in cookies makes it easier for others to gain access to your accounts lots of damage during the system.
Know how to delete and manage cookies using options in the browser.
Viruses are designed to be harmful to digital diviaces and to spread easily over networks.