الفرق بين المراجعتين لصفحة: «ممارسات عامة»
(جهز الصفحة للترجمة) |
لا ملخص تعديل |
||
سطر ١: | سطر ١: | ||
<languages/> | <languages/> | ||
<translate> | <translate> | ||
Personal behavior represents the weakest link in the chain in terms of digital safety and , and we can list the most important good practices as follows: | |||
• Update software and operating systems | |||
• Install security software on different devices | |||
• Ensure the safety of devices and gear | |||
• Use encrypted messengers or add encryption whenever possible | |||
• Ensure the identity of contacts on different platforms and applications | |||
• Reducing the amount of information that we share with others, whether in private communication or on various websites and platforms | |||
• Using legitimate software, whether through the use of freely available and open source applications, or purchasing the necessary licenses to run it | |||
• Use strong passwords | |||
• Install password storage and management software | |||
• Ensure the identity and security of the sites | |||
• Use two-step verification | |||
• Continuous education in digital safety issues | |||
• Regularly clear sensitive data | |||
• Periodic inventory of: digital data, digital accounts, applications and their powers | |||
• Connect securely to the Internet | |||
• Avoid using public networks without security | |||
• Keep more than one backup copy of important data/at least one of them is encrypted | |||
• Periodic review of privacy and security settings for websites and applications | |||
• Avoid opening site ads or use an ad blocker | |||
• Ensure the integrity of links and attachments before opening them | |||
• Read the user and privacy agreement for the various sites and applications. At a higher level, you can view the transparency reports issued by the major companies that own the services and the various sites. | |||
• Erase traces of browsing and online usage | |||
• Control how much information is available about us on the Internet | |||
• Use separate digital IDs for each task whenever possible and necessary | |||
</translate> | </translate> |
مراجعة ١٥:١٣، ٨ فبراير ٢٠٢٣
<languages/> <translate> Personal behavior represents the weakest link in the chain in terms of digital safety and , and we can list the most important good practices as follows:
• Update software and operating systems • Install security software on different devices • Ensure the safety of devices and gear • Use encrypted messengers or add encryption whenever possible • Ensure the identity of contacts on different platforms and applications • Reducing the amount of information that we share with others, whether in private communication or on various websites and platforms • Using legitimate software, whether through the use of freely available and open source applications, or purchasing the necessary licenses to run it • Use strong passwords • Install password storage and management software • Ensure the identity and security of the sites • Use two-step verification • Continuous education in digital safety issues • Regularly clear sensitive data • Periodic inventory of: digital data, digital accounts, applications and their powers • Connect securely to the Internet • Avoid using public networks without security • Keep more than one backup copy of important data/at least one of them is encrypted • Periodic review of privacy and security settings for websites and applications • Avoid opening site ads or use an ad blocker • Ensure the integrity of links and attachments before opening them • Read the user and privacy agreement for the various sites and applications. At a higher level, you can view the transparency reports issued by the major companies that own the services and the various sites. • Erase traces of browsing and online usage • Control how much information is available about us on the Internet • Use separate digital IDs for each task whenever possible and necessary
</translate>