|
|
|
5 | (1) |
|
2 Addressing Physical Security |
|
|
6 | (1) |
|
3 Securing Sensitive Data |
|
|
7 | (1) |
|
4 Using Anti-Virus Software |
|
|
8 | (1) |
|
5 Identifying New Viruses |
|
|
9 | (1) |
|
|
|
10 | (1) |
|
7 Changing a Router Password |
|
|
11 | (1) |
|
|
|
12 | (1) |
|
9 Disposing of Old Devices |
|
|
13 | (1) |
|
10 When it's not Good to Share |
|
|
14 | (1) |
|
|
|
15 | (1) |
|
12 Avoiding Online Dangers |
|
|
16 | (1) |
|
13 Don't Leave it Unprotected |
|
|
17 | (1) |
|
14 Creating a Strong Password |
|
|
18 | (1) |
|
|
|
19 | (1) |
|
16 Two-Factor Authentication |
|
|
20 | (1) |
|
17 About Password Managers |
|
|
21 | (1) |
|
18 Using Password Managers |
|
|
22 | (1) |
|
|
|
23 | (1) |
|
|
|
24 | (1) |
|
|
|
25 | (1) |
|
22 Using Passwords in Public |
|
|
26 | (1) |
|
23 Your Finger is Your Password |
|
|
27 | (1) |
|
24 Your Face is Your Password |
|
|
28 | (1) |
|
|
|
29 | (1) |
|
|
|
30 | (1) |
|
27 Viruses can be Sickening |
|
|
31 | (1) |
|
28 Updating Operating Systems |
|
|
32 | (1) |
|
|
|
33 | (1) |
|
30 Beware of the Hidden Trojans |
|
|
34 | (1) |
|
|
|
35 | (1) |
|
|
|
36 | (1) |
|
|
|
37 | (1) |
|
|
|
38 | (1) |
|
35 Online and Phone Scams |
|
|
39 | (1) |
|
36 Being Wary of Peripherals |
|
|
40 | (1) |
|
|
|
41 | (1) |
|
|
|
42 | (1) |
|
39 Recognizing Fake Websites |
|
|
43 | (1) |
|
40 Finding Privacy Settings |
|
|
44 | (1) |
|
41 Applying Privacy Settings |
|
|
45 | (1) |
|
42 Allowing Cookies or Not |
|
|
46 | (1) |
|
|
|
47 | (1) |
|
|
|
48 | (1) |
|
|
|
49 | (1) |
|
|
|
50 | (1) |
|
47 Claims of Account Locking |
|
|
51 | (1) |
|
48 Checking the Email Address |
|
|
52 | (1) |
|
49 Checking Email Content |
|
|
53 | (1) |
|
50 Don't Reply or Unsubscribe |
|
|
54 | (1) |
|
|
|
55 | (1) |
|
52 Social Media Passwords |
|
|
56 | (1) |
|
53 Be Friends With Your Friends |
|
|
57 | (1) |
|
54 Things Not To Post About |
|
|
58 | (1) |
|
55 Beware the Digital Footprint |
|
|
59 | (1) |
|
|
|
60 | (1) |
|
57 Falling Foul of the Law |
|
|
61 | (1) |
|
58 It's Not All About You |
|
|
62 | (1) |
|
|
|
63 | (1) |
|
|
|
64 | (1) |
|
61 Facebook Security Settings |
|
|
65 | (1) |
|
62 Editing Security Settings |
|
|
66 | (1) |
|
63 Facebook Privacy Options |
|
|
67 | (1) |
|
64 Choosing Your Audience |
|
|
68 | (1) |
|
|
|
69 | (1) |
|
|
|
70 | (1) |
|
67 Accessing the Safety Center |
|
|
71 | (1) |
|
|
|
72 | (1) |
|
|
|
73 | (1) |
|
70 Reporting a Hacked Account |
|
|
74 | (1) |
|
71 Deactivating an Account |
|
|
75 | (1) |
|
72 Recognizing Identity Fraud |
|
|
76 | (1) |
|
73 Protecting Vital Information |
|
|
77 | (1) |
|
74 Micro-Shredding Everything |
|
|
78 | (1) |
|
75 Checking Your Credit Score |
|
|
79 | (1) |
|
76 Blocking Website Trackers |
|
|
80 | (1) |
|
77 Reporting Identity Fraud |
|
|
81 | (1) |
|
|
|
82 | (1) |
|
|
|
83 | (1) |
|
80 Getting Your Banking Online |
|
|
84 | (1) |
|
|
|
85 | (1) |
|
82 Potential Banking Scams |
|
|
86 | (1) |
|
|
|
87 | (1) |
|
84 Monitoring Your Accounts |
|
|
88 | (1) |
|
85 Making Payments Online |
|
|
89 | (1) |
|
86 About Contactless Payment |
|
|
90 | (1) |
|
87 Setting Up Contactless |
|
|
91 | (1) |
|
88 Using Contactless Online |
|
|
92 | (1) |
|
|
|
93 | (1) |
|
|
|
94 | (1) |
|
91 Social Media for Children |
|
|
95 | (1) |
|
92 Parental Controls Apps |
|
|
96 | (1) |
|
93 Setting Up Parental Controls |
|
|
97 | (1) |
|
94 Setting Content Restrictions |
|
|
98 | (1) |
|
95 Setting Age Restrictions |
|
|
99 | (1) |
|
96 Setting Time Restrictions |
|
|
100 | (1) |
|
97 Setting Up Screen Time |
|
|
101 | (1) |
|
|
|
102 | (1) |
|
|
|
103 | (1) |
|
100 Screen Time Restrictions |
|
|
104 | |