48
48
<item><p>Be wary of emails, attachments, or links that were sent from people you do not know.</p></item>
49
49
<item><p>If a website's offer is too good to be true, or asks for sensitive information
51
51
consequences if that information is compromised by identity thieves or other criminals.</p></item>
54
54
permissions puts your computer at high risk to exploitation.</p></item>
55
55
<item><p>Make sure you are only running necessary remote-access services. Having
58
58
protect your computer from intrusion.</p></item>