SlideShare une entreprise Scribd logo
1  sur  10
Télécharger pour lire hors ligne
The 9 Biggest Privacy And Security Breaches That Rocked 2013 
•Hackers stole usernames and passwords for nearly 2 million accounts at Facebook, Google, Yahoo, LinkedIn, Twitter and 93,000 other websites. 
•Nearly 40 million Target customers’ credit and debit card numbers were stolen by cyber-thieves. 
•Anonymous Hacker group hacked 250,000 user emails and passwords from The New York Times, Wall Street Journal computer networks and Twitter. 
•3 million customers’ credit card information and 40 million user emails and passwords exposed from Adobe’s Photoshop users. 
•System bug exposes 6 million Facebook users’ personal data in yearlong breach. 
•50 Million Users email-id and passwords were stolen from LivingSocial, an online marketplace that allows clients to buy and share things. 
•Evernote resets about 50 million account passwords after data breach. 
•The user contact information, including phone numbers and email addresses of The Federal Reserve bank customers hacked by anonymous hackers.
The biggest ever cyber- attacks and security breaches 
•Sony was fined £250,000 by British regulators for failing to protect its users from their personal details being leaked online in April 2011 
•A serious vulnerability was discovered in the encryption technology used to protect many of the world's major websites, leaving them vulnerable to data theft. 
•Google set up www.google.cn in 2006, operating under the country's strict internet governance. Three years later in December 2009,hackers accessed the company's corporate servers and stole intellectual property. 
•Names and email addresses were stolen from Epsilon, the world's largest email marketing firm in 2011, which handles more than 40 billion emails every year. 
•Hackers attacked the networks of three South Korean broadcasters and two banks in a seemingly coordinated cyber-attack last March 2013.
The 15 worst data security breaches of the 21st Century 
1. Heartland Payment Systems 
Date: March 2008 
Impact: 134 million credit cards exposed. 
2. TJX Companies Inc. 
Date: December 2006 
Impact: 94 million credit cards exposed. 
3. Epsilon 
Date: March 2011 
Impact: Exposed names and e- mails of millions of customers. 
4. RSA Security 
Date: March 2011 
Impact: Possibly 40 million employee records stolen. 
5. Stuxnet 
Date: Sometime in 2010, but origins date to 2007 
Impact: Meant to attack a nuclear power program to identify the real world situation. 
6. Department of Veterans Affairs 
Date: May 2006 
Impact: 26.5 million veterans, active-duty military personnel and spouses database was stolen. 
7. Sony's PlayStation Network 
Date: April 20, 2011 
Impact: 77 million PlayStation Network accounts hacked. 
8. ESTsoft 
Date: July-August 2011 
Impact: The personal information of 35 million South Koreans was exposed. 
9. Gawker Media 
Date: December 2010 
Impact: Compromised e-mail addresses and passwords of about 1.3 million commenters. 
10. Google/other Silicon Valley companies 
Date: Mid-2009 
Impact: Stolen intellectual property 
11. VeriSign 
Date: Throughout 2010 
Impact: Undisclosed information stolen 
12. CardSystems Solutions 
Date: June 2005 
Impact: 40 million credit card accounts exposed. 
13. AOL 
Date: August 6, 2006 
Impact: Data on more than 20 million web inquiries posted publicly on a web site. 
14. Monster.com 
Date: August 2007 
Impact: Confidential information of 1.3 million job seekers stolen. 
15. Fidelity National Information Services 
Date: July 2007 
Impact: 3.2 million customer records including credit card, banking and personal information stolen.
Seven things your kids shouldn’t do online 
•Talk to strangers 
•Share personal information 
•Play without time limits 
•Download inappropriate apps 
•Enter websites with inappropriate content for children 
•Believe they’ve won something 
•Suffer cyber-bullying
How secure is my password 
Visit 
http://www.passwordmeter.com/
Online Banking Safety Tips 
Here are some simple tips that you can follow to ensure that your online banking experience is safe and hassle free. 
•Keep your information confidential 
•Keep Changing your password frequently 
•Look for the lock icon in browser 
•Use a firewall for your PC 
•Shop with Verified by Visa 
•Install security updates regularly 
•Read Privacy policies 
•Learn Safe computing practices 
•Be aware of Online security 
•Clear your cache regularly
Password Tips 
•Use different passwords for different services 
•Change your passwords regularly 
•Do not share your password 
•Never send passwords or other sensitive personal information via email. 
•Do not use remember my password features 
•Use Password generating tools to create strong passwords. 
•Avoid writing down your password
How you can protect yourself from financial fraud 
•Use your hand or body to shield your PIN from onlookers when you are conducting transactions at a bank machine or at the point- of-sale. 
•Never let your debit or credit card out of your sight when conducting a transaction at the point-of-sale. 
•Always remember to take your card and transaction record with you once your transaction is completed. 
•Regularly check your billing statements or passbook to verify all transactions have been properly documented. 
•If your debit card is lost, stolen or retained by a bank machine inform the bank immediately. 
•Never disclose your PIN to anyone. 
•Do not create your PIN or Password by using easily guessed numbers such as your telephone number, date of birth, address or social insurance number. 
•Sign your credit or debit card on the signature panel as soon you receive it. 
•Never give credit card information over the phone to anyone.
12 Tips to Better Password Security 
•Make sure you use different passwords for each of your accounts. 
•Be sure no one watches when you enter your password. 
•Always log off if you leave your device. 
•Use comprehensive security software to avoid key loggers and other malware. 
•Avoid entering passwords on computers in an Internet café or library. 
•Avoid entering passwords when using unsecured Wi-Fi connections. 
•Don’t tell anyone your password. 
•Keep your passwords safe by keeping them to yourself. 
•Change your passwords periodically and avoid reusing a password for at least one year. 
• Do use at least eight characters of lowercase and uppercase letters, numbers, and symbols in your password. 
• Strong passwords are easy to remember but hard to guess. 
• Check your password strength using a password strength analyzer.
Identity Fraud and Theft 
•Protect your personal information 
•Memorize your passwords and bank machine Personal Identification Number (PIN) 
•Keep your Personal Verification Question (PVQ) answers confidential 
•Report thefts and losses immediately 
•Shred or tear up junk mail and statements 
•Review your account statements 
•Review your credit report 
•Protect your Personal Identification Number (PIN) 
•Protect your credit cards 
•Practice safe computing

Contenu connexe

Tendances

Computer hacking
Computer hackingComputer hacking
Computer hackingArjun Tomar
 
Computer Hacking by Rudy
Computer Hacking by RudyComputer Hacking by Rudy
Computer Hacking by RudyUdieh Moody
 
Internet trolls
Internet trollsInternet trolls
Internet trollskru1021
 
Hackingppt 160730081605
Hackingppt 160730081605Hackingppt 160730081605
Hackingppt 160730081605RAKESH SHARMA
 
how to prevent system from hacking...by sarika
how to prevent system from hacking...by sarikahow to prevent system from hacking...by sarika
how to prevent system from hacking...by sarikaSarika Dyne
 
Disadvantages of-i ct-woww
Disadvantages of-i ct-wowwDisadvantages of-i ct-woww
Disadvantages of-i ct-wowwFloroRaphaell
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its securityAshwini Awatare
 
Disadvantages of-i ct-woww
Disadvantages of-i ct-wowwDisadvantages of-i ct-woww
Disadvantages of-i ct-wowwFloroRaphaell
 
Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2NetLockSmith
 
Introduction Ethical hacking by eslam hussein
Introduction Ethical hacking by eslam husseinIntroduction Ethical hacking by eslam hussein
Introduction Ethical hacking by eslam husseinEslam Hussein
 
CYBER PRIVACY AND PASSWORD PROTECTION
CYBER PRIVACY AND PASSWORD PROTECTIONCYBER PRIVACY AND PASSWORD PROTECTION
CYBER PRIVACY AND PASSWORD PROTECTIONshanueduthoughts
 

Tendances (20)

Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Hacking
HackingHacking
Hacking
 
Computer hacking
Computer hackingComputer hacking
Computer hacking
 
Computer Hacking by Rudy
Computer Hacking by RudyComputer Hacking by Rudy
Computer Hacking by Rudy
 
Hacking
HackingHacking
Hacking
 
Internet trolls
Internet trollsInternet trolls
Internet trolls
 
Presentation on cyber safety
Presentation on cyber safetyPresentation on cyber safety
Presentation on cyber safety
 
C3 Cyber
C3 CyberC3 Cyber
C3 Cyber
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Hacking
HackingHacking
Hacking
 
Hackingppt 160730081605
Hackingppt 160730081605Hackingppt 160730081605
Hackingppt 160730081605
 
how to prevent system from hacking...by sarika
how to prevent system from hacking...by sarikahow to prevent system from hacking...by sarika
how to prevent system from hacking...by sarika
 
Disadvantages of-i ct-woww
Disadvantages of-i ct-wowwDisadvantages of-i ct-woww
Disadvantages of-i ct-woww
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its security
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
Disadvantages of-i ct-woww
Disadvantages of-i ct-wowwDisadvantages of-i ct-woww
Disadvantages of-i ct-woww
 
Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2
 
Dw communication
Dw communicationDw communication
Dw communication
 
Introduction Ethical hacking by eslam hussein
Introduction Ethical hacking by eslam husseinIntroduction Ethical hacking by eslam hussein
Introduction Ethical hacking by eslam hussein
 
CYBER PRIVACY AND PASSWORD PROTECTION
CYBER PRIVACY AND PASSWORD PROTECTIONCYBER PRIVACY AND PASSWORD PROTECTION
CYBER PRIVACY AND PASSWORD PROTECTION
 

Similaire à IT Security Awareness Posters

Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentationcharlesgarrett
 
Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Abzetdin Adamov
 
How To Keep the Grinch From Ruining Your Cyber Monday
How To Keep the Grinch From Ruining Your Cyber MondayHow To Keep the Grinch From Ruining Your Cyber Monday
How To Keep the Grinch From Ruining Your Cyber MondayMichele Chubirka
 
E business internet fraud
E business internet fraudE business internet fraud
E business internet fraudRadiant Minds
 
Identity thefts
Identity theftsIdentity thefts
Identity theftsHHSome
 
Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things The Center for Identity
 
PROTECTION PERSONAL PRIVACY
PROTECTION PERSONAL PRIVACYPROTECTION PERSONAL PRIVACY
PROTECTION PERSONAL PRIVACYDoubleXDS
 
Protecting Your Business From Cybercrime
Protecting Your Business From CybercrimeProtecting Your Business From Cybercrime
Protecting Your Business From CybercrimeDavid J Rosenthal
 
Protecting Personal Privacy
Protecting Personal PrivacyProtecting Personal Privacy
Protecting Personal PrivacyDoubleXDS
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber securityKaushal Solanki
 
Hacker risks presentation to ACFE PR Chapter
Hacker risks presentation to ACFE PR ChapterHacker risks presentation to ACFE PR Chapter
Hacker risks presentation to ACFE PR ChapterJose L. Quiñones-Borrero
 
Webinar: How to avoid the 12 Scams of Christmas
Webinar: How to avoid the 12 Scams of ChristmasWebinar: How to avoid the 12 Scams of Christmas
Webinar: How to avoid the 12 Scams of ChristmasAbilityNet
 
Data protection and security
Data protection and securityData protection and security
Data protection and securitysamina khan
 
TheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxTheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxKevinRiley83
 
Mobile Security for the Modern Tech Mogul
Mobile Security for the Modern Tech MogulMobile Security for the Modern Tech Mogul
Mobile Security for the Modern Tech MogulAndrew Schwabe
 
HACKING AND PHISHING
HACKING AND PHISHINGHACKING AND PHISHING
HACKING AND PHISHINGsanthuana sg
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptxCharithraaAR
 
How to protect your clients and your law firm from money transfer scams
How to protect your clients and your law firm from money transfer scamsHow to protect your clients and your law firm from money transfer scams
How to protect your clients and your law firm from money transfer scamsGabor Szathmari
 
Internet Safety & Privacy
Internet Safety & PrivacyInternet Safety & Privacy
Internet Safety & PrivacyAlexine Marier
 

Similaire à IT Security Awareness Posters (20)

Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
 
Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....
 
How To Keep the Grinch From Ruining Your Cyber Monday
How To Keep the Grinch From Ruining Your Cyber MondayHow To Keep the Grinch From Ruining Your Cyber Monday
How To Keep the Grinch From Ruining Your Cyber Monday
 
E business internet fraud
E business internet fraudE business internet fraud
E business internet fraud
 
Identity thefts
Identity theftsIdentity thefts
Identity thefts
 
Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things
 
PROTECTION PERSONAL PRIVACY
PROTECTION PERSONAL PRIVACYPROTECTION PERSONAL PRIVACY
PROTECTION PERSONAL PRIVACY
 
Protecting Your Business From Cybercrime
Protecting Your Business From CybercrimeProtecting Your Business From Cybercrime
Protecting Your Business From Cybercrime
 
Protecting Personal Privacy
Protecting Personal PrivacyProtecting Personal Privacy
Protecting Personal Privacy
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
Hacker risks presentation to ACFE PR Chapter
Hacker risks presentation to ACFE PR ChapterHacker risks presentation to ACFE PR Chapter
Hacker risks presentation to ACFE PR Chapter
 
Webinar: How to avoid the 12 Scams of Christmas
Webinar: How to avoid the 12 Scams of ChristmasWebinar: How to avoid the 12 Scams of Christmas
Webinar: How to avoid the 12 Scams of Christmas
 
Data protection and security
Data protection and securityData protection and security
Data protection and security
 
TheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxTheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptx
 
Mobile Security for the Modern Tech Mogul
Mobile Security for the Modern Tech MogulMobile Security for the Modern Tech Mogul
Mobile Security for the Modern Tech Mogul
 
HACKING AND PHISHING
HACKING AND PHISHINGHACKING AND PHISHING
HACKING AND PHISHING
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptx
 
How to protect your clients and your law firm from money transfer scams
How to protect your clients and your law firm from money transfer scamsHow to protect your clients and your law firm from money transfer scams
How to protect your clients and your law firm from money transfer scams
 
Recent PCI Hacks
Recent PCI HacksRecent PCI Hacks
Recent PCI Hacks
 
Internet Safety & Privacy
Internet Safety & PrivacyInternet Safety & Privacy
Internet Safety & Privacy
 

Plus de Dr. Ramkumar Lakshminarayanan

Plus de Dr. Ramkumar Lakshminarayanan (20)

IT security awareness
IT security awarenessIT security awareness
IT security awareness
 
Basics of IT security
Basics of IT securityBasics of IT security
Basics of IT security
 
Normalisation revision
Normalisation revisionNormalisation revision
Normalisation revision
 
Windows mobile programming
Windows mobile programmingWindows mobile programming
Windows mobile programming
 
Concurrency control
Concurrency controlConcurrency control
Concurrency control
 
Web technology today
Web technology todayWeb technology today
Web technology today
 
Php Tutorial
Php TutorialPhp Tutorial
Php Tutorial
 
Phonegap for Android
Phonegap for AndroidPhonegap for Android
Phonegap for Android
 
Create and Sell Android App (in tamil)
Create and Sell Android App (in tamil)Create and Sell Android App (in tamil)
Create and Sell Android App (in tamil)
 
Android app - Creating Live Wallpaper (tamil)
Android app - Creating Live Wallpaper (tamil)Android app - Creating Live Wallpaper (tamil)
Android app - Creating Live Wallpaper (tamil)
 
Android Tips (Tamil)
Android Tips (Tamil)Android Tips (Tamil)
Android Tips (Tamil)
 
Android Animation (in tamil)
Android Animation (in tamil)Android Animation (in tamil)
Android Animation (in tamil)
 
Creating List in Android App (in tamil)
Creating List in Android App (in tamil)Creating List in Android App (in tamil)
Creating List in Android App (in tamil)
 
Single Touch event view in Android (in tamil)
Single Touch event view in Android (in tamil)Single Touch event view in Android (in tamil)
Single Touch event view in Android (in tamil)
 
Android Application using seekbar (in tamil)
Android Application using seekbar (in tamil)Android Application using seekbar (in tamil)
Android Application using seekbar (in tamil)
 
Rating Bar in Android Example
Rating Bar in Android ExampleRating Bar in Android Example
Rating Bar in Android Example
 
Creating Image Gallery - Android app (in tamil)
Creating Image Gallery - Android app (in tamil)Creating Image Gallery - Android app (in tamil)
Creating Image Gallery - Android app (in tamil)
 
Create Android App using web view (in tamil)
Create Android App using web view (in tamil)Create Android App using web view (in tamil)
Create Android App using web view (in tamil)
 
Hardware Interface in Android (in tamil)
Hardware Interface in Android (in tamil)Hardware Interface in Android (in tamil)
Hardware Interface in Android (in tamil)
 
GPS in Android (in tamil)
GPS in Android (in tamil)GPS in Android (in tamil)
GPS in Android (in tamil)
 

Dernier

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 

Dernier (20)

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 

IT Security Awareness Posters

  • 1. The 9 Biggest Privacy And Security Breaches That Rocked 2013 •Hackers stole usernames and passwords for nearly 2 million accounts at Facebook, Google, Yahoo, LinkedIn, Twitter and 93,000 other websites. •Nearly 40 million Target customers’ credit and debit card numbers were stolen by cyber-thieves. •Anonymous Hacker group hacked 250,000 user emails and passwords from The New York Times, Wall Street Journal computer networks and Twitter. •3 million customers’ credit card information and 40 million user emails and passwords exposed from Adobe’s Photoshop users. •System bug exposes 6 million Facebook users’ personal data in yearlong breach. •50 Million Users email-id and passwords were stolen from LivingSocial, an online marketplace that allows clients to buy and share things. •Evernote resets about 50 million account passwords after data breach. •The user contact information, including phone numbers and email addresses of The Federal Reserve bank customers hacked by anonymous hackers.
  • 2. The biggest ever cyber- attacks and security breaches •Sony was fined £250,000 by British regulators for failing to protect its users from their personal details being leaked online in April 2011 •A serious vulnerability was discovered in the encryption technology used to protect many of the world's major websites, leaving them vulnerable to data theft. •Google set up www.google.cn in 2006, operating under the country's strict internet governance. Three years later in December 2009,hackers accessed the company's corporate servers and stole intellectual property. •Names and email addresses were stolen from Epsilon, the world's largest email marketing firm in 2011, which handles more than 40 billion emails every year. •Hackers attacked the networks of three South Korean broadcasters and two banks in a seemingly coordinated cyber-attack last March 2013.
  • 3. The 15 worst data security breaches of the 21st Century 1. Heartland Payment Systems Date: March 2008 Impact: 134 million credit cards exposed. 2. TJX Companies Inc. Date: December 2006 Impact: 94 million credit cards exposed. 3. Epsilon Date: March 2011 Impact: Exposed names and e- mails of millions of customers. 4. RSA Security Date: March 2011 Impact: Possibly 40 million employee records stolen. 5. Stuxnet Date: Sometime in 2010, but origins date to 2007 Impact: Meant to attack a nuclear power program to identify the real world situation. 6. Department of Veterans Affairs Date: May 2006 Impact: 26.5 million veterans, active-duty military personnel and spouses database was stolen. 7. Sony's PlayStation Network Date: April 20, 2011 Impact: 77 million PlayStation Network accounts hacked. 8. ESTsoft Date: July-August 2011 Impact: The personal information of 35 million South Koreans was exposed. 9. Gawker Media Date: December 2010 Impact: Compromised e-mail addresses and passwords of about 1.3 million commenters. 10. Google/other Silicon Valley companies Date: Mid-2009 Impact: Stolen intellectual property 11. VeriSign Date: Throughout 2010 Impact: Undisclosed information stolen 12. CardSystems Solutions Date: June 2005 Impact: 40 million credit card accounts exposed. 13. AOL Date: August 6, 2006 Impact: Data on more than 20 million web inquiries posted publicly on a web site. 14. Monster.com Date: August 2007 Impact: Confidential information of 1.3 million job seekers stolen. 15. Fidelity National Information Services Date: July 2007 Impact: 3.2 million customer records including credit card, banking and personal information stolen.
  • 4. Seven things your kids shouldn’t do online •Talk to strangers •Share personal information •Play without time limits •Download inappropriate apps •Enter websites with inappropriate content for children •Believe they’ve won something •Suffer cyber-bullying
  • 5. How secure is my password Visit http://www.passwordmeter.com/
  • 6. Online Banking Safety Tips Here are some simple tips that you can follow to ensure that your online banking experience is safe and hassle free. •Keep your information confidential •Keep Changing your password frequently •Look for the lock icon in browser •Use a firewall for your PC •Shop with Verified by Visa •Install security updates regularly •Read Privacy policies •Learn Safe computing practices •Be aware of Online security •Clear your cache regularly
  • 7. Password Tips •Use different passwords for different services •Change your passwords regularly •Do not share your password •Never send passwords or other sensitive personal information via email. •Do not use remember my password features •Use Password generating tools to create strong passwords. •Avoid writing down your password
  • 8. How you can protect yourself from financial fraud •Use your hand or body to shield your PIN from onlookers when you are conducting transactions at a bank machine or at the point- of-sale. •Never let your debit or credit card out of your sight when conducting a transaction at the point-of-sale. •Always remember to take your card and transaction record with you once your transaction is completed. •Regularly check your billing statements or passbook to verify all transactions have been properly documented. •If your debit card is lost, stolen or retained by a bank machine inform the bank immediately. •Never disclose your PIN to anyone. •Do not create your PIN or Password by using easily guessed numbers such as your telephone number, date of birth, address or social insurance number. •Sign your credit or debit card on the signature panel as soon you receive it. •Never give credit card information over the phone to anyone.
  • 9. 12 Tips to Better Password Security •Make sure you use different passwords for each of your accounts. •Be sure no one watches when you enter your password. •Always log off if you leave your device. •Use comprehensive security software to avoid key loggers and other malware. •Avoid entering passwords on computers in an Internet café or library. •Avoid entering passwords when using unsecured Wi-Fi connections. •Don’t tell anyone your password. •Keep your passwords safe by keeping them to yourself. •Change your passwords periodically and avoid reusing a password for at least one year. • Do use at least eight characters of lowercase and uppercase letters, numbers, and symbols in your password. • Strong passwords are easy to remember but hard to guess. • Check your password strength using a password strength analyzer.
  • 10. Identity Fraud and Theft •Protect your personal information •Memorize your passwords and bank machine Personal Identification Number (PIN) •Keep your Personal Verification Question (PVQ) answers confidential •Report thefts and losses immediately •Shred or tear up junk mail and statements •Review your account statements •Review your credit report •Protect your Personal Identification Number (PIN) •Protect your credit cards •Practice safe computing