Profile image of AnonymusIII
@AnonymusIII
Flag of Ukraine Kivertsy, Ukraine
Member since May 29, 2018
0 Recommendations

AnonymusIII

Online Offline
***_1С-bitrix_ ***_WordPress_***_Joomla!_***_MODX_***_OpenCart_*** _Drupal_***_CS-Cart_***_Magento_***_PrestaShop_***_ImageCMS_*** _Laravel_***_Tilda Publishing_and other... ========== Testing web resources ========== ==========delete malicious code of any complexity========== <<<<<<<<<< develop and update web resources >>>>>>>>>> Worked and completed projects with CSS, HTML, Web Design, Database, PHP, MySQL, Javascript, Hosting web, Install and config templates, migrations or upgrades, configuration apache, ngix. __________________ In the field of Internet cybersecurity 5 years__________________
$10 USD/hr
0 reviews
0.0
  • N/AJobs Completed
  • N/AOn Budget
  • N/AOn Time
  • N/ARepeat Hire Rate

Portfolio Items

Recent Reviews

No reviews.

Experience

Сybersecurity specialist

Jan 2019 - May 2020 (1 year)

Protection and security of resources, development and optimization, guarantee for work performed [login to view URL]

Publications

Protect your data and avoid pop-ups, unknown emails, and links

In your daily life, you probably avoid sharing personally identifiable information like your Social Security number or credit card number when answering an unsolicited email, phone call, text message, or instant message. It’s important to exercise the same caution at work. Keep in mind that cybercriminals can create email addresses and websites that look legitimate.

Avoid pop-ups, unknown emails, and links

Here’s a rule to follow: Never enter personal or company information in response to an email, pop-up webpage, or any other form of communication you didn’t initiate. Phishing can lead to identity theft. It’s also the way most ransomware attacks occur.

Use strong password protection and authentication

Strong, complex passwords can help stop cyberthieves from accessing company information. Simple passwords can make access easy. If a cybercriminal figures out your password, it could give them access to the company’s network. Creating unique, complex passwords is essential.

Verifications

  • Facebook Connected
  • Preferred Freelancer
  • Payment Verified
  • Phone Verified
  • Identity Verified
  • Email Verified

Browse Similar Freelancers