Compléter Technology and security - vocabularyVersion en ligne Perspectives Upper Intermediate Unit 2 par Ekaterina Orekhova 1 confirm active phishing scams USB stick private filter stored delete Sarah was a careful social media user . Without her permission , no one could access or a post from her account . Her spam was always up - to - date , protecting her from attempts . Sarah carefully edited posts before sharing them with her friends . She never fell for requests to her bank details online , aware of potential . Her important files were securely in the cloud , and she encrypted them on a as an extra measure . Sarah diligently made backups of her data to prevent any loss . She wasn ? t on social media and keept her profile very .