46
46
<item><p>Be wary of emails, attachments, or links that were sent from people you do not know.</p></item>
47
47
<item><p>If a website's offer is too good to be true, or asks for sensitive information
49
49
consequences if that information is compromised by identity thieves or other criminals.</p></item>
52
52
permissions puts your computer at high risk to exploitation.</p></item>
53
53
<item><p>Make sure you are only running necessary remote-access services. Having
56
56
protect your computer from intrusion.</p></item>