formas de protegernos
TRANSCRIPT
![Page 1: Formas de protegernos](https://reader033.vdocuments.mx/reader033/viewer/2022052307/559f879d1a28abd1158b4625/html5/thumbnails/1.jpg)
![Page 2: Formas de protegernos](https://reader033.vdocuments.mx/reader033/viewer/2022052307/559f879d1a28abd1158b4625/html5/thumbnails/2.jpg)
virus
![Page 3: Formas de protegernos](https://reader033.vdocuments.mx/reader033/viewer/2022052307/559f879d1a28abd1158b4625/html5/thumbnails/3.jpg)
![Page 4: Formas de protegernos](https://reader033.vdocuments.mx/reader033/viewer/2022052307/559f879d1a28abd1158b4625/html5/thumbnails/4.jpg)
gusanos
![Page 5: Formas de protegernos](https://reader033.vdocuments.mx/reader033/viewer/2022052307/559f879d1a28abd1158b4625/html5/thumbnails/5.jpg)
troyanos
![Page 6: Formas de protegernos](https://reader033.vdocuments.mx/reader033/viewer/2022052307/559f879d1a28abd1158b4625/html5/thumbnails/6.jpg)
spyware
![Page 7: Formas de protegernos](https://reader033.vdocuments.mx/reader033/viewer/2022052307/559f879d1a28abd1158b4625/html5/thumbnails/7.jpg)
![Page 8: Formas de protegernos](https://reader033.vdocuments.mx/reader033/viewer/2022052307/559f879d1a28abd1158b4625/html5/thumbnails/8.jpg)
hijackers
![Page 9: Formas de protegernos](https://reader033.vdocuments.mx/reader033/viewer/2022052307/559f879d1a28abd1158b4625/html5/thumbnails/9.jpg)
hoaxes
![Page 10: Formas de protegernos](https://reader033.vdocuments.mx/reader033/viewer/2022052307/559f879d1a28abd1158b4625/html5/thumbnails/10.jpg)
![Page 11: Formas de protegernos](https://reader033.vdocuments.mx/reader033/viewer/2022052307/559f879d1a28abd1158b4625/html5/thumbnails/11.jpg)
![Page 12: Formas de protegernos](https://reader033.vdocuments.mx/reader033/viewer/2022052307/559f879d1a28abd1158b4625/html5/thumbnails/12.jpg)
![Page 13: Formas de protegernos](https://reader033.vdocuments.mx/reader033/viewer/2022052307/559f879d1a28abd1158b4625/html5/thumbnails/13.jpg)
![Page 14: Formas de protegernos](https://reader033.vdocuments.mx/reader033/viewer/2022052307/559f879d1a28abd1158b4625/html5/thumbnails/14.jpg)
Lee las políticas de uso y privacidad de los diferentes servicios antes de utilizarlos.
![Page 15: Formas de protegernos](https://reader033.vdocuments.mx/reader033/viewer/2022052307/559f879d1a28abd1158b4625/html5/thumbnails/15.jpg)
Piensa antes de publicar, no sea que luego te arrepientas.
![Page 16: Formas de protegernos](https://reader033.vdocuments.mx/reader033/viewer/2022052307/559f879d1a28abd1158b4625/html5/thumbnails/16.jpg)
Valora que información deseas revelar y controla quien puede acceder a ella.
![Page 17: Formas de protegernos](https://reader033.vdocuments.mx/reader033/viewer/2022052307/559f879d1a28abd1158b4625/html5/thumbnails/17.jpg)
Controla tu lista de contactos, y antes de agregar a alguien tomate tu tiempo para asegurarte de su confianza.
![Page 18: Formas de protegernos](https://reader033.vdocuments.mx/reader033/viewer/2022052307/559f879d1a28abd1158b4625/html5/thumbnails/18.jpg)
Las redes sociales contienen las mismas aplicaciones que utilizan los atacantes para propagar los virus –correo, mensajería, navegación, etc.-, mantén las mismas recomendaciones.