SlideShare a Scribd company logo
1 of 10
Download to read offline
LOCK THEM OUT
datahops.com
CYBER SECURITY AWARENESS
Do you know which apps can access your
microphone, camera, location, and contacts ?
Check and deny those that are unsafe
PERMISSION
ABOARD ?
TO COME
1 of 3
Allow APP to access
photos, media and files on
your device
ALLOW DENY
LOCK THEM OUT
datahops.com
CYBER SECURITY AWARENESS
DO YOU WANT
TO SWAP?
Set a PIN code for your SIM card to protect it
in case of theft and prevent an attacker from
Taking over your phone number and stealing
your information
LOCK THEM OUT
datahops.com
CYBER SECURITY AWARENESS
WHO’S
WATCHING
WHO ?
An attacker can access your security camera
and spy on you. To protect yourself.
1. Set a strong password for your router
2. Set up multi factor authentication
3. Keep your cameras firmware updated
LOCK THEM OUT
datahops.com
CYBER SECURITY AWARENESS
Check your privacy settings to control who can
see and access your profile, the way your data
is used, collected and shared
WHO WANTS
TO KNOW?
P
R
I VA T
E
LOCK THEM OUT
datahops.com
CYBER SECURITY AWARENESS
HOW
SMART!
An attacker can access your Smart TV through
your home network. Protect Yourself
1. Set a strong password for your router
2. Install updates if prompted
3. Adjust privacy settings
LOCK THEM OUT
datahops.com
CYBER SECURITY AWARENESS
JUST LIKE
HADRIAN’S WALL
Enable a firewall to prevent unauthorized
access to your network and block unwanted
connections to the internet and attempts to
install malware
LOCK THEM OUT
datahops.com
CYBER SECURITY AWARENESS
TIME FOR
A CHECK UP
Review your security settings on all accounts
periodically.
Set up multifactor authentication.
You can see which actions need urgent
attention
LOCK THEM OUT
datahops.com
CYBER SECURITY AWARENESS
FEEL LIKE
YOU'RE BEEN
FOLLOWED?
Use a privacy browser to stop websites
collecting data about you, your devices, and
what you do online
LOCK THEM OUT
datahops.com
CYBER SECURITY AWARENESS
SINK OR
SWIM ?
Avoid that sinking feeling.
Do a regular backup of files in case of an
unexpected occurrence. This can help you
restore your files quickly and easily.
LOCK THEM OUT
datahops.com
CYBER SECURITY AWARENESS
IS PRICELESS
PEACE OF MIND
Turn on encryption to protect your files if your
device gets lost or stolen. It cannot be accessed
by anyone without the password or recovery
key

More Related Content

Similar to A4 Cybersecurity Awareness Posters Part 9

Secure Your Mobile Apps
Secure Your Mobile AppsSecure Your Mobile Apps
Secure Your Mobile Appsprimomh
 
Computer & Internet Security.pptx
Computer & Internet Security.pptxComputer & Internet Security.pptx
Computer & Internet Security.pptxPratheeshKumarN
 
Network Security of Data Protection
Network Security of Data ProtectionNetwork Security of Data Protection
Network Security of Data ProtectionUthsoNandy
 
Profile securitarian
Profile   securitarianProfile   securitarian
Profile securitarianRupesh Verma
 
Computer security and privacy
Computer security and privacyComputer security and privacy
Computer security and privacyeiramespi07
 
Securing Mobile & Online Identity in the Cyber World
Securing Mobile & Online Identity in the Cyber WorldSecuring Mobile & Online Identity in the Cyber World
Securing Mobile & Online Identity in the Cyber WorldEmil Tan
 
Mobile protection
Mobile protection Mobile protection
Mobile protection preetpatel72
 
Check-Computer-Networks-to-Ensure-Safe-Operation-Johua-2nd.pptx
Check-Computer-Networks-to-Ensure-Safe-Operation-Johua-2nd.pptxCheck-Computer-Networks-to-Ensure-Safe-Operation-Johua-2nd.pptx
Check-Computer-Networks-to-Ensure-Safe-Operation-Johua-2nd.pptxkris harden
 
TheInternetDigitalSecurityfddreeere.pptx
TheInternetDigitalSecurityfddreeere.pptxTheInternetDigitalSecurityfddreeere.pptx
TheInternetDigitalSecurityfddreeere.pptxHAYDEECAYDA
 
Cyber-Leave-Behind-Brochure-Done (1)
Cyber-Leave-Behind-Brochure-Done (1)Cyber-Leave-Behind-Brochure-Done (1)
Cyber-Leave-Behind-Brochure-Done (1)Sam Norallah
 
Riordan Network VulnerabilitiesVulnerabilityThreatProbabil.docx
Riordan Network VulnerabilitiesVulnerabilityThreatProbabil.docxRiordan Network VulnerabilitiesVulnerabilityThreatProbabil.docx
Riordan Network VulnerabilitiesVulnerabilityThreatProbabil.docxjoellemurphey
 
IT Threats and Computer Security
IT Threats and Computer SecurityIT Threats and Computer Security
IT Threats and Computer SecurityKongChunLeong1
 
Cybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppCybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppWeSecureApp
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsMuhammadRobeel3
 
CYBERSECURITY AWARENESS AND BEST PRACTICES AT ALL WORKING LEVEL.
CYBERSECURITY AWARENESS AND BEST PRACTICES AT ALL WORKING LEVEL. CYBERSECURITY AWARENESS AND BEST PRACTICES AT ALL WORKING LEVEL.
CYBERSECURITY AWARENESS AND BEST PRACTICES AT ALL WORKING LEVEL. Info-Tech
 

Similar to A4 Cybersecurity Awareness Posters Part 9 (20)

Secure Your Mobile Apps
Secure Your Mobile AppsSecure Your Mobile Apps
Secure Your Mobile Apps
 
Computer & Internet Security.pptx
Computer & Internet Security.pptxComputer & Internet Security.pptx
Computer & Internet Security.pptx
 
Network Security of Data Protection
Network Security of Data ProtectionNetwork Security of Data Protection
Network Security of Data Protection
 
pp.pptx
pp.pptxpp.pptx
pp.pptx
 
Secure End User
Secure End UserSecure End User
Secure End User
 
Profile securitarian
Profile   securitarianProfile   securitarian
Profile securitarian
 
Computer security and privacy
Computer security and privacyComputer security and privacy
Computer security and privacy
 
Securing Mobile & Online Identity in the Cyber World
Securing Mobile & Online Identity in the Cyber WorldSecuring Mobile & Online Identity in the Cyber World
Securing Mobile & Online Identity in the Cyber World
 
Mobile protection
Mobile protection Mobile protection
Mobile protection
 
Check-Computer-Networks-to-Ensure-Safe-Operation-Johua-2nd.pptx
Check-Computer-Networks-to-Ensure-Safe-Operation-Johua-2nd.pptxCheck-Computer-Networks-to-Ensure-Safe-Operation-Johua-2nd.pptx
Check-Computer-Networks-to-Ensure-Safe-Operation-Johua-2nd.pptx
 
Wireless security
Wireless securityWireless security
Wireless security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
TheInternetDigitalSecurityfddreeere.pptx
TheInternetDigitalSecurityfddreeere.pptxTheInternetDigitalSecurityfddreeere.pptx
TheInternetDigitalSecurityfddreeere.pptx
 
Cyber-Leave-Behind-Brochure-Done (1)
Cyber-Leave-Behind-Brochure-Done (1)Cyber-Leave-Behind-Brochure-Done (1)
Cyber-Leave-Behind-Brochure-Done (1)
 
Riordan Network VulnerabilitiesVulnerabilityThreatProbabil.docx
Riordan Network VulnerabilitiesVulnerabilityThreatProbabil.docxRiordan Network VulnerabilitiesVulnerabilityThreatProbabil.docx
Riordan Network VulnerabilitiesVulnerabilityThreatProbabil.docx
 
IT Threats and Computer Security
IT Threats and Computer SecurityIT Threats and Computer Security
IT Threats and Computer Security
 
Are you the next target?
Are you the next target?Are you the next target?
Are you the next target?
 
Cybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppCybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureApp
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
 
CYBERSECURITY AWARENESS AND BEST PRACTICES AT ALL WORKING LEVEL.
CYBERSECURITY AWARENESS AND BEST PRACTICES AT ALL WORKING LEVEL. CYBERSECURITY AWARENESS AND BEST PRACTICES AT ALL WORKING LEVEL.
CYBERSECURITY AWARENESS AND BEST PRACTICES AT ALL WORKING LEVEL.
 

More from Data Hops

Free Digital Signage Cybersecurity Screensavers Part 1
Free  Digital Signage Cybersecurity Screensavers Part 1Free  Digital Signage Cybersecurity Screensavers Part 1
Free Digital Signage Cybersecurity Screensavers Part 1Data Hops
 
Free A4 Cyber Security Awareness Training Posters Part 11
Free A4 Cyber Security Awareness Training Posters Part 11Free A4 Cyber Security Awareness Training Posters Part 11
Free A4 Cyber Security Awareness Training Posters Part 11Data Hops
 
A4 Cybersecurity Awareness Posters Part 7
A4 Cybersecurity Awareness Posters Part 7A4 Cybersecurity Awareness Posters Part 7
A4 Cybersecurity Awareness Posters Part 7Data Hops
 
A4 Cybersecurity Awareness Posters Part 6
A4 Cybersecurity Awareness Posters Part 6A4 Cybersecurity Awareness Posters Part 6
A4 Cybersecurity Awareness Posters Part 6Data Hops
 
Cybersecurity Password Safety A4 Flash Cards.pdf
Cybersecurity Password Safety  A4 Flash Cards.pdfCybersecurity Password Safety  A4 Flash Cards.pdf
Cybersecurity Password Safety A4 Flash Cards.pdfData Hops
 
Cybersecurity Remote Working a4 printable Flash Cards.pdf
 Cybersecurity Remote Working  a4 printable Flash Cards.pdf Cybersecurity Remote Working  a4 printable Flash Cards.pdf
Cybersecurity Remote Working a4 printable Flash Cards.pdfData Hops
 
Phishing Alert
Phishing AlertPhishing Alert
Phishing AlertData Hops
 

More from Data Hops (7)

Free Digital Signage Cybersecurity Screensavers Part 1
Free  Digital Signage Cybersecurity Screensavers Part 1Free  Digital Signage Cybersecurity Screensavers Part 1
Free Digital Signage Cybersecurity Screensavers Part 1
 
Free A4 Cyber Security Awareness Training Posters Part 11
Free A4 Cyber Security Awareness Training Posters Part 11Free A4 Cyber Security Awareness Training Posters Part 11
Free A4 Cyber Security Awareness Training Posters Part 11
 
A4 Cybersecurity Awareness Posters Part 7
A4 Cybersecurity Awareness Posters Part 7A4 Cybersecurity Awareness Posters Part 7
A4 Cybersecurity Awareness Posters Part 7
 
A4 Cybersecurity Awareness Posters Part 6
A4 Cybersecurity Awareness Posters Part 6A4 Cybersecurity Awareness Posters Part 6
A4 Cybersecurity Awareness Posters Part 6
 
Cybersecurity Password Safety A4 Flash Cards.pdf
Cybersecurity Password Safety  A4 Flash Cards.pdfCybersecurity Password Safety  A4 Flash Cards.pdf
Cybersecurity Password Safety A4 Flash Cards.pdf
 
Cybersecurity Remote Working a4 printable Flash Cards.pdf
 Cybersecurity Remote Working  a4 printable Flash Cards.pdf Cybersecurity Remote Working  a4 printable Flash Cards.pdf
Cybersecurity Remote Working a4 printable Flash Cards.pdf
 
Phishing Alert
Phishing AlertPhishing Alert
Phishing Alert
 

Recently uploaded

Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 

Recently uploaded (20)

Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 

A4 Cybersecurity Awareness Posters Part 9

  • 1. LOCK THEM OUT datahops.com CYBER SECURITY AWARENESS Do you know which apps can access your microphone, camera, location, and contacts ? Check and deny those that are unsafe PERMISSION ABOARD ? TO COME 1 of 3 Allow APP to access photos, media and files on your device ALLOW DENY
  • 2. LOCK THEM OUT datahops.com CYBER SECURITY AWARENESS DO YOU WANT TO SWAP? Set a PIN code for your SIM card to protect it in case of theft and prevent an attacker from Taking over your phone number and stealing your information
  • 3. LOCK THEM OUT datahops.com CYBER SECURITY AWARENESS WHO’S WATCHING WHO ? An attacker can access your security camera and spy on you. To protect yourself. 1. Set a strong password for your router 2. Set up multi factor authentication 3. Keep your cameras firmware updated
  • 4. LOCK THEM OUT datahops.com CYBER SECURITY AWARENESS Check your privacy settings to control who can see and access your profile, the way your data is used, collected and shared WHO WANTS TO KNOW? P R I VA T E
  • 5. LOCK THEM OUT datahops.com CYBER SECURITY AWARENESS HOW SMART! An attacker can access your Smart TV through your home network. Protect Yourself 1. Set a strong password for your router 2. Install updates if prompted 3. Adjust privacy settings
  • 6. LOCK THEM OUT datahops.com CYBER SECURITY AWARENESS JUST LIKE HADRIAN’S WALL Enable a firewall to prevent unauthorized access to your network and block unwanted connections to the internet and attempts to install malware
  • 7. LOCK THEM OUT datahops.com CYBER SECURITY AWARENESS TIME FOR A CHECK UP Review your security settings on all accounts periodically. Set up multifactor authentication. You can see which actions need urgent attention
  • 8. LOCK THEM OUT datahops.com CYBER SECURITY AWARENESS FEEL LIKE YOU'RE BEEN FOLLOWED? Use a privacy browser to stop websites collecting data about you, your devices, and what you do online
  • 9. LOCK THEM OUT datahops.com CYBER SECURITY AWARENESS SINK OR SWIM ? Avoid that sinking feeling. Do a regular backup of files in case of an unexpected occurrence. This can help you restore your files quickly and easily.
  • 10. LOCK THEM OUT datahops.com CYBER SECURITY AWARENESS IS PRICELESS PEACE OF MIND Turn on encryption to protect your files if your device gets lost or stolen. It cannot be accessed by anyone without the password or recovery key