How to Identify Online Threats

Understand what Phishing is., Install and update an effective firewall with the capability to scan both inbound and outbound internet traffic as well as check the gateway for web content to establish whether it is legitimate website or not and block...

2 Steps 1 min read Easy

Step-by-Step Guide

  1. Step 1: Understand what Phishing is.

    The term phishing is used in computing terms to denote the action of sending someone an email message lying to them that it is an authentic letter from a well established firm all in a bid to try to corn the user into giving you personal information that can be used in assuming their identity.

    The email in most cases refers the user to a particular web site where they are requested to reveal some personal details, i.e. credit card numbers, password, bank details and social security numbers.

    To safeguard your PC and personal data from such sites follow the steps below:
  2. Step 2: Install and update an effective firewall with the capability to scan both inbound and outbound internet traffic as well as check the gateway for web content to establish whether it is legitimate website or not and block or give access to it.

Detailed Guide

The term phishing is used in computing terms to denote the action of sending someone an email message lying to them that it is an authentic letter from a well established firm all in a bid to try to corn the user into giving you personal information that can be used in assuming their identity.

The email in most cases refers the user to a particular web site where they are requested to reveal some personal details, i.e. credit card numbers, password, bank details and social security numbers.

To safeguard your PC and personal data from such sites follow the steps below:

About the Author

J

Janet Butler

Writer and educator with a focus on practical creative arts knowledge.

64 articles
View all articles

Rate This Guide

--
Loading...
5
0
4
0
3
0
2
0
1
0

How helpful was this guide? Click to rate: