الفرق بين المراجعتين لصفحة: «ممارسات عامة»
لا ملخص تعديل وسمان: مسترجع المحرر المرئي: تبديل |
(علَّم هذه النسخة للترجمة) وسم: مسترجع |
||
سطر ١: | سطر ١: | ||
<translate> | <translate> | ||
<!--T:1--> | |||
<languages/> | <languages/> | ||
<!--T:2--> | |||
Personal behavior represents the weakest link in the chain in terms of digital safety and , and we can list the most important good practices as follows: | Personal behavior represents the weakest link in the chain in terms of digital safety and , and we can list the most important good practices as follows: | ||
• Update software and operating systems | <!--T:3--> | ||
• Update software and operating systems | |||
• Install security software on different devices | • Install security software on different devices | ||
• Ensure the safety of devices and gear | • Ensure the safety of devices and gear |
مراجعة ١٥:٢١، ٨ فبراير ٢٠٢٣
<translate> <languages/>
Personal behavior represents the weakest link in the chain in terms of digital safety and , and we can list the most important good practices as follows:
• Update software and operating systems
• Install security software on different devices • Ensure the safety of devices and gear • Use encrypted messengers or add encryption whenever possible • Ensure the identity of contacts on different platforms and applications • Reducing the amount of information that we share with others, whether in private communication or on various websites and platforms • Using legitimate software, whether through the use of freely available and open source applications, or purchasing the necessary licenses to run it • Use strong passwords • Install password storage and management software • Ensure the identity and security of the sites • Use two-step verification • Continuous education in digital safety issues • Regularly clear sensitive data • Periodic inventory of: digital data, digital accounts, applications and their powers • Connect securely to the Internet • Avoid using public networks without security • Keep more than one backup copy of important data/at least one of them is encrypted • Periodic review of privacy and security settings for websites and applications • Avoid opening site ads or use an ad blocker • Ensure the integrity of links and attachments before opening them • Read the user and privacy agreement for the various sites and applications. At a higher level, you can view the transparency reports issued by the major companies that own the services and the various sites. • Erase traces of browsing and online usage • Control how much information is available about us on the Internet • Use separate digital IDs for each task whenever possible and necessary
</translate>