…without being ripped off, scamed, or getting stolen your identity
This set of rules is intended to arm the users of the internet for the lurking dangers in it. Whether it’s the deceptively real-looking “application.doc” that lands in the HR department, or the Office 365 login link in the CEO’s inbox with the inconspicuous request to review a shared document. After you have read and understood this set of rules, you are 99.99% safe when using the Internet.
The e2 Security rulebook is available here: DOWNLOAD