Social engineering methods and tools used by attackers especially with regard to social media; The risks of peer-to-peer file sharing networks and downloading unknown programs or files; The risks of unsecure or unknown web sites and measures to identify and avoid these sites; The risks of clicking on unknown email links and the risks associated with social networking sites; The importance of regular data backups and alternative storage options such as external drives, CD/DVD's, or virtualization technologies; and The importance of applying software patches and security updates on a regular basis.