How to Identify Online Threats
Understand what Phishing is., Install and update an effective firewall with the capability to scan both inbound and outbound internet traffic as well as check the gateway for web content to establish whether it is legitimate website or not and block...
Step-by-Step Guide
-
Step 1: Understand what Phishing is.
The term phishing is used in computing terms to denote the action of sending someone an email message lying to them that it is an authentic letter from a well established firm all in a bid to try to corn the user into giving you personal information that can be used in assuming their identity.
The email in most cases refers the user to a particular web site where they are requested to reveal some personal details, i.e. credit card numbers, password, bank details and social security numbers.
To safeguard your PC and personal data from such sites follow the steps below: -
Step 2: Install and update an effective firewall with the capability to scan both inbound and outbound internet traffic as well as check the gateway for web content to establish whether it is legitimate website or not and block or give access to it.
Detailed Guide
The term phishing is used in computing terms to denote the action of sending someone an email message lying to them that it is an authentic letter from a well established firm all in a bid to try to corn the user into giving you personal information that can be used in assuming their identity.
The email in most cases refers the user to a particular web site where they are requested to reveal some personal details, i.e. credit card numbers, password, bank details and social security numbers.
To safeguard your PC and personal data from such sites follow the steps below:
About the Author
Janet Butler
Writer and educator with a focus on practical creative arts knowledge.
Rate This Guide
How helpful was this guide? Click to rate: