You are on page 1of 2

Issue # 1

There is a problem in zoom meetings wherein someone wants to sign in as

an anonymous person to keep his/her information private. Later on, it still

connects to their LinkedIn profile which has their personal information despite

having efforts to keep it private. The best way to avoid this scenario is to

use a VPN or virtual private network, and a firewall. These 2 techniques and

network technology are effective in securing your pieces of information. A

firewall restricts the software tools that invade your privacy or threats that

may affect your computer, and VPN secures your privacy while using the internet.

Issue # 2

Phishing is one of the major problems and threats when using the internet.

Phishing is a type of social engineering attack that steals important user data

or information like bank credentials and personal information. The most common

type of it is email phishing. You can prevent or avoid this kind of fraud by

following these techniques, Double checking unfamiliar links, and having multi

or two-factor authentication. These two are effective in handling phishing

attacks. Double-checking unfamiliar links are key to preventing you from getting

attacked by this threat. Multi and two-factor authentication is effective if

someone is opening your account and has your personal and important credentials

you can easily verify if it’s you or not.


Issue # 3

Stolen identities or con artists are commonly seen and experienced on

social media. Social media are publicly open and accessible to all. Personal

credentials, pictures, and much personal information are accessible on social

media. Social media are vulnerable to this kind of threat or problem. This kind

of problem can be easily resolved by limiting sharing of information on social

media and double-checking URL links. Do not post anything that might be a chance

for a con artist or poser to copy you. Don’t post everything on social media

and don’t give your information to anyone on social media learn to check

everything from the person and those links that they send to you to avoid

attacks that lead to the stealing of your personal data or information.

You might also like