T R U S T H O U S E I T
mockup    cyber security awarness

mockup cyber security awarness

screen saver include 7 best practices for strong password

mockup cyber security awarness

screen saver include 7 best practices for strong password
Best practices for strong password  Tip#1

Best practices for strong password Tip#1

Do not use sequential numbers or letters

Best practices for strong password Tip#1

Do not use sequential numbers or letters
Best practices for strong password Tip#2

Best practices for strong password Tip#2

Use a combination of at least nine symbols

Best practices for strong password Tip#2

Use a combination of at least nine symbols
Best practices for strong password Tip#3

Best practices for strong password Tip#3

Do not include personal information in your password

Best practices for strong password Tip#3

Do not include personal information in your password
Best practices for strong password Tip#4

Best practices for strong password Tip#4

Combine different unrelated words in your password

Best practices for strong password Tip#4

Combine different unrelated words in your password
Best practices for strong password Tip#5

Best practices for strong password Tip#5

Do not use names or words found in the dictionary

Best practices for strong password Tip#5

Do not use names or words found in the dictionary
Best practices for strong password Tip#6

Best practices for strong password Tip#6

Use a password manager to store your passwords

Best practices for strong password Tip#6

Use a password manager to store your passwords
Best Practices for Mobile Phone Security Tip#1

Best Practices for Mobile Phone Security Tip#1

Let's us keep the phone software constantly updated

Best Practices for Mobile Phone Security Tip#1

Let's us keep the phone software constantly updated
Best Practices for Mobile Phone Security Tip#2

Best Practices for Mobile Phone Security Tip#2

Let's delete all apps that we no longer use.

Best Practices for Mobile Phone Security Tip#2

Let's delete all apps that we no longer use.
Best Practices for Mobile Phone Security Tip#4

Best Practices for Mobile Phone Security Tip#4

Let's keep our personal information private

Best Practices for Mobile Phone Security Tip#4

Let's keep our personal information private
Best Practices for Mobile Phone Security Tip#5

Best Practices for Mobile Phone Security Tip#5

Let's determine who is allowed to see our information?

Best Practices for Mobile Phone Security Tip#5

Let's determine who is allowed to see our information?
Best Practices for Mobile Phone Security Tip#6

Best Practices for Mobile Phone Security Tip#6

Disable WiFi and Bluetooth when not in use.

Best Practices for Mobile Phone Security Tip#6

Disable WiFi and Bluetooth when not in use.
Best Practices for Mobile Phone Security Tip#7

Best Practices for Mobile Phone Security Tip#7

In case of doubt, you don’t answer.

Best Practices for Mobile Phone Security Tip#7

In case of doubt, you don’t answer.
Best Practices for Mobile Phone Security Tip#9

Best Practices for Mobile Phone Security Tip#9

Charge your phone in a safe and reliable place

Best Practices for Mobile Phone Security Tip#9

Charge your phone in a safe and reliable place
Best Practices for Mobile Phone Security Tip#10

Best Practices for Mobile Phone Security Tip#10

Do not make “Root” or “Jailbreak” on your phone

Best Practices for Mobile Phone Security Tip#10

Do not make “Root” or “Jailbreak” on your phone

Adress

.

Kingdom of Bahrain 
Seef Area
CR: 93807-2
Contact Us
Phone:
Bahrain  : (973) 33449082
Jordan   : (962) 797255583
Email:
Info@TrustHouseIT.com
sales@TrustHouseIT.com