Joke Collection Website - Blessing messages - Three principles of preventing telecommunication network fraud

Three principles of preventing telecommunication network fraud

The three principles of preventing telecommunication network fraud are no credulity, no disclosure and no transfer.

1, not to be trusted

Don't trust calls and text messages of unknown origin, hang up the phone in time, and don't reply to missed suspicious calls and strange phone numbers provided by text messages.

2. Don't disclose it

To build a strong psychological defense line, no matter what happens, don't disclose the identity information, deposits and bank cards of yourself and your family to each other. If you have any questions, please call 1 10 for help or consult with friends, relatives and colleagues.

3. No transfer

The police specially reminded the public that in case of suspicious circumstances, they should consult their relatives and friends and call the public security organs, financial departments and other departments in time for multi-party verification. Be sure to verify account information through formal channels.

Precautions for network security:

1. Use a strong password

Use a strong password containing uppercase and lowercase letters, numbers and special characters, and change the password regularly. At the same time, don't use the same password on multiple websites or applications, so as not to let one account leak and affect other accounts.

2. Keep the software and operating system updated.

Install all available security patches and updates to ensure that the operating system and software are kept in the latest security state. Update the software and operating system in time and install the latest security patches to prevent hackers from using known vulnerabilities to invade the system.

3. Install anti-virus software

Install reliable anti-virus software, update virus database regularly, and protect equipment from virus and malware attacks.

Step 4 use a firewall

Use a firewall to protect the network from attacks.

5. Disable Remote Desktop

Disable Remote Desktop and Remote Access unless these features are really needed.

6. Use public ***WiFi with caution.

Avoid using public ***WiFi network to process sensitive information, and use VPN to protect data transmission security when necessary.