♻️Supporting the DJATOM Web Serv Cares Project

DJATOM Cares is a project on how we do our part for the environment.

See how you can help also with the news articles and tips in the Blog below and at our Cares Projects & Environment page on our main website.

Showing Tag: "online" (Show all posts)

How To Stay Safe Online Post Pandemic

Posted by DJATOM Website Services on Tuesday, April 6, 2021, In : Security & Staying Safe Online 


Following our free download guide in April 2020 during the COVID-19 Pandemic and the rise of scams online since, we have again compiled some simple steps you can take to stay protected.

Thinking about your confidential or personal information via phone calls, text messages and Emails that look genuine, our advice focuses on these areas;

  • Requests for information
  • Listen to your instincts
  • Device updates
  • Social media
  • Impersonators
  • Using strong passwords
  • Top tips

Download the free guide here - http://djato...

Continue reading ...
 

Stay safe online with this handy guide

Posted by DJATOM Website Services on Tuesday, April 14, 2020, In : Security & Staying Safe Online 


As we continue our time in quarantine, and with most children now being home-schooled, screen time is on the rise for parents and children alike.

Online scammers and cyber criminals are more prevalent and sophisticated than ever, exploiting the current situation and using a variety of tricks that can easily fool us into visiting fake sites or opening phishing Emails.

Here's the top tips, featured in the guide:

Be aware of phishing emails
Protect your children online
Be vigilant on s...

Continue reading ...
 

National Cyber Security Awareness

Posted by DJATOM Web Serv on Friday, January 20, 2012, In : Security & Staying Safe Online 


Security & how to be secure?
October is the National Cyber Security Awareness month Please see below the risks and how to avoid them.


Threats to your mobile phone:

1: Data leakage. A stolen or lost phone with unprotected memory allows an attacker to read the data on it.

Solution - Set a passcode lock, check out James' Tips opposite.


2: Improper decommissioning. When a used phone is disposed of or transferred to another user without removing sensitive data, this allows an attacker to read it.

Soluti...

Continue reading ...
 
 
 

Page Last Updated 04/03/24
© 2024 DJATOM Website Services

Make a free website with Yola