SlideShare a Scribd company logo
1 of 1
Download to read offline
#CyberSecMonth
#ThinkB4UClick
!
**********
******************
******************
The consequences of someone
hacking your account depend on
how much personal information
you share e.g. your date of birth,
address, names of family
members - your information could
be used to access your other
accounts or steal your identity.
• You have trouble logging into your account
• You get a message saying your account password
has been changed, but you didn’t do it
• You see posts that you didn’t write
• You are suddenly following lots of people you don’t
know
• You see a login from an unusual location
• You receive lots of ads that feel like spam
• Change your passwords. The scammer may have
your password so change it to a strong password
with at least 15 characters including upper and
lower case letters, numbers and symbols.
• A passphrase may be easier to remember. This
could be a sentence that includes unusual words,
or words from different languages.
• You should also change login details for any of
your other accounts that use the same or similar
username and password. This includes
applications linked to the social media account.
• Use a unique password for each account.
• Make your account more secure. Look for the
security and privacy settings where you can
find tools to protect your account.
Here are some signs:
What does it mean?
What to do?
• Notify the provider that your account has been
hacked. This will help the provider track scams
and improve security.
• Report the fraud. Your information may help
catch the fraudster and prevent further
incidents. To find out where to get advice and to
report the crime in your country, visit
https://cybersecuritymonth.eu/cyber-first-aid
• Tell your contacts that your account was hacked.
Your contacts may receive messages or see posts
sent from your account, which contain fraudulent
links or misleading information. Let them know
that it was not you who posted or sent the
messages so that they do not click on any links.
• Share your experience with family and friends to
help protect them.
Then:
If you can still access your account:
• Follow the provider's account
recovery process if you are
completely locked out. All of the main
providers have a process in place to
recover your account, go to their help
centre for advice.
If you are unable to access your account:
Has your social media account
been hacked?

More Related Content

What's hot

Internet Security
Internet SecurityInternet Security
Internet SecurityAvnish Jain
 
Slideshow - Lil Rat
Slideshow - Lil RatSlideshow - Lil Rat
Slideshow - Lil Ratmegg16
 
Don't ask, don't tell the virtues of privacy by design
Don't ask, don't tell   the virtues of privacy by designDon't ask, don't tell   the virtues of privacy by design
Don't ask, don't tell the virtues of privacy by designEleanor McHugh
 
How to Avoid Crypto Scams - Crypto JBro
How to Avoid Crypto Scams - Crypto JBroHow to Avoid Crypto Scams - Crypto JBro
How to Avoid Crypto Scams - Crypto JBroJared Broker
 
Cyberattacks the-next-healthcare-epidemic
Cyberattacks the-next-healthcare-epidemicCyberattacks the-next-healthcare-epidemic
Cyberattacks the-next-healthcare-epidemicKate Barney
 
Getting inside the cybercriminal's m ind
Getting inside the cybercriminal's m ind Getting inside the cybercriminal's m ind
Getting inside the cybercriminal's m ind Alin Adrian Florea
 
Internet Security - Naga Rohit S [ IIT Guwahati ] - Coding Club & DefCon DC91...
Internet Security - Naga Rohit S [ IIT Guwahati ] - Coding Club & DefCon DC91...Internet Security - Naga Rohit S [ IIT Guwahati ] - Coding Club & DefCon DC91...
Internet Security - Naga Rohit S [ IIT Guwahati ] - Coding Club & DefCon DC91...Naga Rohit
 
Introduction to Hacking
Introduction to HackingIntroduction to Hacking
Introduction to Hackingleet detected
 
Internet Safety for 1950s Adults and Beginners
Internet Safety for 1950s Adults and BeginnersInternet Safety for 1950s Adults and Beginners
Internet Safety for 1950s Adults and BeginnersRajesh Soundararajan
 
Email Security Awareness
Email Security AwarenessEmail Security Awareness
Email Security AwarenessDale Rapp
 
Test Your Internet Security IQ Quiz
Test Your Internet Security IQ QuizTest Your Internet Security IQ Quiz
Test Your Internet Security IQ QuizAkilah Kamaria
 
Junior secondary yr 7:8 aug 18 4.3 preview
Junior secondary yr 7:8 aug 18 4.3 previewJunior secondary yr 7:8 aug 18 4.3 preview
Junior secondary yr 7:8 aug 18 4.3 previewLeonie Smith
 
How to incrementally improve Sanctions Screening with AI
How to incrementally improve Sanctions Screening with AIHow to incrementally improve Sanctions Screening with AI
How to incrementally improve Sanctions Screening with AIBLECKWEN
 
Cybersafety Checklist for Writers
Cybersafety Checklist for WritersCybersafety Checklist for Writers
Cybersafety Checklist for WritersShennandoah Diaz
 
Passwords for sale
Passwords for salePasswords for sale
Passwords for saleRamiro Cid
 

What's hot (20)

Email hacking
Email hackingEmail hacking
Email hacking
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Slideshow - Lil Rat
Slideshow - Lil RatSlideshow - Lil Rat
Slideshow - Lil Rat
 
Webspoofing
WebspoofingWebspoofing
Webspoofing
 
Don't ask, don't tell the virtues of privacy by design
Don't ask, don't tell   the virtues of privacy by designDon't ask, don't tell   the virtues of privacy by design
Don't ask, don't tell the virtues of privacy by design
 
How to Avoid Crypto Scams - Crypto JBro
How to Avoid Crypto Scams - Crypto JBroHow to Avoid Crypto Scams - Crypto JBro
How to Avoid Crypto Scams - Crypto JBro
 
Cyberattacks the-next-healthcare-epidemic
Cyberattacks the-next-healthcare-epidemicCyberattacks the-next-healthcare-epidemic
Cyberattacks the-next-healthcare-epidemic
 
Getting inside the cybercriminal's m ind
Getting inside the cybercriminal's m ind Getting inside the cybercriminal's m ind
Getting inside the cybercriminal's m ind
 
Internet Security - Naga Rohit S [ IIT Guwahati ] - Coding Club & DefCon DC91...
Internet Security - Naga Rohit S [ IIT Guwahati ] - Coding Club & DefCon DC91...Internet Security - Naga Rohit S [ IIT Guwahati ] - Coding Club & DefCon DC91...
Internet Security - Naga Rohit S [ IIT Guwahati ] - Coding Club & DefCon DC91...
 
Introduction to Hacking
Introduction to HackingIntroduction to Hacking
Introduction to Hacking
 
Internet Safety for 1950s Adults and Beginners
Internet Safety for 1950s Adults and BeginnersInternet Safety for 1950s Adults and Beginners
Internet Safety for 1950s Adults and Beginners
 
Internet fraud and identity theft
Internet fraud and identity theftInternet fraud and identity theft
Internet fraud and identity theft
 
Email Security Awareness
Email Security AwarenessEmail Security Awareness
Email Security Awareness
 
Test Your Internet Security IQ Quiz
Test Your Internet Security IQ QuizTest Your Internet Security IQ Quiz
Test Your Internet Security IQ Quiz
 
Junior secondary yr 7:8 aug 18 4.3 preview
Junior secondary yr 7:8 aug 18 4.3 previewJunior secondary yr 7:8 aug 18 4.3 preview
Junior secondary yr 7:8 aug 18 4.3 preview
 
How to incrementally improve Sanctions Screening with AI
How to incrementally improve Sanctions Screening with AIHow to incrementally improve Sanctions Screening with AI
How to incrementally improve Sanctions Screening with AI
 
Cybersafety Checklist for Writers
Cybersafety Checklist for WritersCybersafety Checklist for Writers
Cybersafety Checklist for Writers
 
Passwords for sale
Passwords for salePasswords for sale
Passwords for sale
 
Phishing
PhishingPhishing
Phishing
 

Similar to ECSM 2021 - Ce faci dacă ți-au fost sparte conturile de social media

Spam & Phishing
Spam & PhishingSpam & Phishing
Spam & PhishingGrittyCC
 
Social media security
Social media securitySocial media security
Social media securityMosoco Ltd
 
Internet Fraud #scichallenge2017
Internet Fraud #scichallenge2017Internet Fraud #scichallenge2017
Internet Fraud #scichallenge2017Alexandru Turcu
 
Cyber Safety Month summary
 Cyber Safety Month summary Cyber Safety Month summary
Cyber Safety Month summaryicts-uct
 
Cyber privacy and password protection
Cyber privacy and password protectionCyber privacy and password protection
Cyber privacy and password protectionsajeena81
 
How to Protect Yourself From Heartbleed Security Flaw
How to Protect Yourself From Heartbleed Security FlawHow to Protect Yourself From Heartbleed Security Flaw
How to Protect Yourself From Heartbleed Security FlawConnectSafely
 
How To Keep the Grinch From Ruining Your Cyber Monday
How To Keep the Grinch From Ruining Your Cyber MondayHow To Keep the Grinch From Ruining Your Cyber Monday
How To Keep the Grinch From Ruining Your Cyber MondayMichele Chubirka
 
TheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxTheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxKevinRiley83
 
Internet Security
Internet SecurityInternet Security
Internet Securitymjelson
 
WISE KIDS Leaflet: Junk Mail and Misleading Advertisements
WISE KIDS Leaflet: Junk Mail and Misleading AdvertisementsWISE KIDS Leaflet: Junk Mail and Misleading Advertisements
WISE KIDS Leaflet: Junk Mail and Misleading AdvertisementsWISE KIDS
 
ISSA - Security Awareness 2016-1
ISSA - Security Awareness 2016-1ISSA - Security Awareness 2016-1
ISSA - Security Awareness 2016-1Pedro Serrano
 
Scams and-fraud-presentation
Scams and-fraud-presentationScams and-fraud-presentation
Scams and-fraud-presentationRoel Palmaers
 
twitter hacking causes and protection
twitter hacking causes and protectiontwitter hacking causes and protection
twitter hacking causes and protectionFahd Allebdi
 
Identity Theft - by LINKS Technology
Identity Theft - by LINKS TechnologyIdentity Theft - by LINKS Technology
Identity Theft - by LINKS TechnologyCoyleFinancial
 
Ict Phishing (Present)
Ict   Phishing (Present)Ict   Phishing (Present)
Ict Phishing (Present)aleeya91
 
Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2NetLockSmith
 

Similar to ECSM 2021 - Ce faci dacă ți-au fost sparte conturile de social media (20)

Spam & Phishing
Spam & PhishingSpam & Phishing
Spam & Phishing
 
Phishing
PhishingPhishing
Phishing
 
Social media security
Social media securitySocial media security
Social media security
 
Internet Fraud #scichallenge2017
Internet Fraud #scichallenge2017Internet Fraud #scichallenge2017
Internet Fraud #scichallenge2017
 
Cyber Safety Month summary
 Cyber Safety Month summary Cyber Safety Month summary
Cyber Safety Month summary
 
Cyber privacy and password protection
Cyber privacy and password protectionCyber privacy and password protection
Cyber privacy and password protection
 
How to Protect Yourself From Heartbleed Security Flaw
How to Protect Yourself From Heartbleed Security FlawHow to Protect Yourself From Heartbleed Security Flaw
How to Protect Yourself From Heartbleed Security Flaw
 
How To Keep the Grinch From Ruining Your Cyber Monday
How To Keep the Grinch From Ruining Your Cyber MondayHow To Keep the Grinch From Ruining Your Cyber Monday
How To Keep the Grinch From Ruining Your Cyber Monday
 
TheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxTheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptx
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
WISE KIDS Leaflet: Junk Mail and Misleading Advertisements
WISE KIDS Leaflet: Junk Mail and Misleading AdvertisementsWISE KIDS Leaflet: Junk Mail and Misleading Advertisements
WISE KIDS Leaflet: Junk Mail and Misleading Advertisements
 
ISSA - Security Awareness 2016-1
ISSA - Security Awareness 2016-1ISSA - Security Awareness 2016-1
ISSA - Security Awareness 2016-1
 
Scams and-fraud-presentation
Scams and-fraud-presentationScams and-fraud-presentation
Scams and-fraud-presentation
 
twitter hacking causes and protection
twitter hacking causes and protectiontwitter hacking causes and protection
twitter hacking causes and protection
 
Day 2
Day 2Day 2
Day 2
 
phishing technique.pptx
phishing technique.pptxphishing technique.pptx
phishing technique.pptx
 
Chapter-5.pptx
Chapter-5.pptxChapter-5.pptx
Chapter-5.pptx
 
Identity Theft - by LINKS Technology
Identity Theft - by LINKS TechnologyIdentity Theft - by LINKS Technology
Identity Theft - by LINKS Technology
 
Ict Phishing (Present)
Ict   Phishing (Present)Ict   Phishing (Present)
Ict Phishing (Present)
 
Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2
 

More from One-IT

Centralizator întrebări și răspunsuri Digitalizare IMM.doc
Centralizator întrebări și răspunsuri Digitalizare IMM.docCentralizator întrebări și răspunsuri Digitalizare IMM.doc
Centralizator întrebări și răspunsuri Digitalizare IMM.docOne-IT
 
Ghid final Digitalizare IMM
Ghid final Digitalizare IMMGhid final Digitalizare IMM
Ghid final Digitalizare IMMOne-IT
 
Corrigendum-ul la Ghidul solicitantului POC 4.1.1. Bis.pdf
Corrigendum-ul la Ghidul solicitantului POC 4.1.1. Bis.pdfCorrigendum-ul la Ghidul solicitantului POC 4.1.1. Bis.pdf
Corrigendum-ul la Ghidul solicitantului POC 4.1.1. Bis.pdfOne-IT
 
Ghidul solicitantului 4.1.1. BIS.pdf
Ghidul solicitantului 4.1.1. BIS.pdfGhidul solicitantului 4.1.1. BIS.pdf
Ghidul solicitantului 4.1.1. BIS.pdfOne-IT
 
Ghidul Solicitantului varianta intermediară 4.1.1 BIS.docx
Ghidul Solicitantului varianta intermediară 4.1.1 BIS.docxGhidul Solicitantului varianta intermediară 4.1.1 BIS.docx
Ghidul Solicitantului varianta intermediară 4.1.1 BIS.docxOne-IT
 
Ordonanța 19/2022 cu privire la rectificarea bugetului de stat pe anul 2022
Ordonanța 19/2022 cu privire la rectificarea bugetului de stat pe anul 2022Ordonanța 19/2022 cu privire la rectificarea bugetului de stat pe anul 2022
Ordonanța 19/2022 cu privire la rectificarea bugetului de stat pe anul 2022One-IT
 
Ordonanța de Urgență 113/2022 privind acțiunea POC 4.1.1. Bis.pdf
Ordonanța de Urgență 113/2022 privind acțiunea POC 4.1.1. Bis.pdfOrdonanța de Urgență 113/2022 privind acțiunea POC 4.1.1. Bis.pdf
Ordonanța de Urgență 113/2022 privind acțiunea POC 4.1.1. Bis.pdfOne-IT
 
Ghid 4.1.1 BIS Industrie alimentară și construcții - Consultare Publică.docx
Ghid 4.1.1 BIS Industrie alimentară și construcții - Consultare Publică.docxGhid 4.1.1 BIS Industrie alimentară și construcții - Consultare Publică.docx
Ghid 4.1.1 BIS Industrie alimentară și construcții - Consultare Publică.docxOne-IT
 
Procedura-femeia-antreprenor-2022.pdf
Procedura-femeia-antreprenor-2022.pdfProcedura-femeia-antreprenor-2022.pdf
Procedura-femeia-antreprenor-2022.pdfOne-IT
 
Ghidul final al solicitantului Acțiunea 4.1.1 Investiții în activități produc...
Ghidul final al solicitantului Acțiunea 4.1.1 Investiții în activități produc...Ghidul final al solicitantului Acțiunea 4.1.1 Investiții în activități produc...
Ghidul final al solicitantului Acțiunea 4.1.1 Investiții în activități produc...One-IT
 
Ghid actiunea 4.1.1 versiunea consolidata.docx
Ghid actiunea 4.1.1 versiunea consolidata.docxGhid actiunea 4.1.1 versiunea consolidata.docx
Ghid actiunea 4.1.1 versiunea consolidata.docxOne-IT
 
Ghid actiunea 4.1.1 versiunea consolidata 18.02.2022
Ghid actiunea 4.1.1 versiunea consolidata 18.02.2022Ghid actiunea 4.1.1 versiunea consolidata 18.02.2022
Ghid actiunea 4.1.1 versiunea consolidata 18.02.2022One-IT
 
Cum te protejezi de tentativele de tip scam în business
Cum te protejezi de tentativele de tip scam în businessCum te protejezi de tentativele de tip scam în business
Cum te protejezi de tentativele de tip scam în businessOne-IT
 
ECSM 2021 - Cum previi atacurile de tip phishing
ECSM 2021 - Cum previi atacurile de tip phishingECSM 2021 - Cum previi atacurile de tip phishing
ECSM 2021 - Cum previi atacurile de tip phishingOne-IT
 
ECSM 2021- Informații importante despre amprenta ta digitală
ECSM 2021- Informații importante despre amprenta ta digitalăECSM 2021- Informații importante despre amprenta ta digitală
ECSM 2021- Informații importante despre amprenta ta digitalăOne-IT
 
Ghidul digitalizarea IMM oipsi consultare publica
Ghidul digitalizarea IMM oipsi consultare publicaGhidul digitalizarea IMM oipsi consultare publica
Ghidul digitalizarea IMM oipsi consultare publicaOne-IT
 
Ghid poc imbunatatirea continutului digital si a infrastructurii TIC sistemic...
Ghid poc imbunatatirea continutului digital si a infrastructurii TIC sistemic...Ghid poc imbunatatirea continutului digital si a infrastructurii TIC sistemic...
Ghid poc imbunatatirea continutului digital si a infrastructurii TIC sistemic...One-IT
 
Poly Eagle eye Mini
Poly Eagle eye MiniPoly Eagle eye Mini
Poly Eagle eye MiniOne-IT
 
Ghid cu contributie privata - Propunerea de ghid al solicitantului pentru acc...
Ghid cu contributie privata - Propunerea de ghid al solicitantului pentru acc...Ghid cu contributie privata - Propunerea de ghid al solicitantului pentru acc...
Ghid cu contributie privata - Propunerea de ghid al solicitantului pentru acc...One-IT
 
One-IT - prezentare GDPR-ul si Protectia datelor personale
One-IT - prezentare GDPR-ul si Protectia datelor personaleOne-IT - prezentare GDPR-ul si Protectia datelor personale
One-IT - prezentare GDPR-ul si Protectia datelor personaleOne-IT
 

More from One-IT (20)

Centralizator întrebări și răspunsuri Digitalizare IMM.doc
Centralizator întrebări și răspunsuri Digitalizare IMM.docCentralizator întrebări și răspunsuri Digitalizare IMM.doc
Centralizator întrebări și răspunsuri Digitalizare IMM.doc
 
Ghid final Digitalizare IMM
Ghid final Digitalizare IMMGhid final Digitalizare IMM
Ghid final Digitalizare IMM
 
Corrigendum-ul la Ghidul solicitantului POC 4.1.1. Bis.pdf
Corrigendum-ul la Ghidul solicitantului POC 4.1.1. Bis.pdfCorrigendum-ul la Ghidul solicitantului POC 4.1.1. Bis.pdf
Corrigendum-ul la Ghidul solicitantului POC 4.1.1. Bis.pdf
 
Ghidul solicitantului 4.1.1. BIS.pdf
Ghidul solicitantului 4.1.1. BIS.pdfGhidul solicitantului 4.1.1. BIS.pdf
Ghidul solicitantului 4.1.1. BIS.pdf
 
Ghidul Solicitantului varianta intermediară 4.1.1 BIS.docx
Ghidul Solicitantului varianta intermediară 4.1.1 BIS.docxGhidul Solicitantului varianta intermediară 4.1.1 BIS.docx
Ghidul Solicitantului varianta intermediară 4.1.1 BIS.docx
 
Ordonanța 19/2022 cu privire la rectificarea bugetului de stat pe anul 2022
Ordonanța 19/2022 cu privire la rectificarea bugetului de stat pe anul 2022Ordonanța 19/2022 cu privire la rectificarea bugetului de stat pe anul 2022
Ordonanța 19/2022 cu privire la rectificarea bugetului de stat pe anul 2022
 
Ordonanța de Urgență 113/2022 privind acțiunea POC 4.1.1. Bis.pdf
Ordonanța de Urgență 113/2022 privind acțiunea POC 4.1.1. Bis.pdfOrdonanța de Urgență 113/2022 privind acțiunea POC 4.1.1. Bis.pdf
Ordonanța de Urgență 113/2022 privind acțiunea POC 4.1.1. Bis.pdf
 
Ghid 4.1.1 BIS Industrie alimentară și construcții - Consultare Publică.docx
Ghid 4.1.1 BIS Industrie alimentară și construcții - Consultare Publică.docxGhid 4.1.1 BIS Industrie alimentară și construcții - Consultare Publică.docx
Ghid 4.1.1 BIS Industrie alimentară și construcții - Consultare Publică.docx
 
Procedura-femeia-antreprenor-2022.pdf
Procedura-femeia-antreprenor-2022.pdfProcedura-femeia-antreprenor-2022.pdf
Procedura-femeia-antreprenor-2022.pdf
 
Ghidul final al solicitantului Acțiunea 4.1.1 Investiții în activități produc...
Ghidul final al solicitantului Acțiunea 4.1.1 Investiții în activități produc...Ghidul final al solicitantului Acțiunea 4.1.1 Investiții în activități produc...
Ghidul final al solicitantului Acțiunea 4.1.1 Investiții în activități produc...
 
Ghid actiunea 4.1.1 versiunea consolidata.docx
Ghid actiunea 4.1.1 versiunea consolidata.docxGhid actiunea 4.1.1 versiunea consolidata.docx
Ghid actiunea 4.1.1 versiunea consolidata.docx
 
Ghid actiunea 4.1.1 versiunea consolidata 18.02.2022
Ghid actiunea 4.1.1 versiunea consolidata 18.02.2022Ghid actiunea 4.1.1 versiunea consolidata 18.02.2022
Ghid actiunea 4.1.1 versiunea consolidata 18.02.2022
 
Cum te protejezi de tentativele de tip scam în business
Cum te protejezi de tentativele de tip scam în businessCum te protejezi de tentativele de tip scam în business
Cum te protejezi de tentativele de tip scam în business
 
ECSM 2021 - Cum previi atacurile de tip phishing
ECSM 2021 - Cum previi atacurile de tip phishingECSM 2021 - Cum previi atacurile de tip phishing
ECSM 2021 - Cum previi atacurile de tip phishing
 
ECSM 2021- Informații importante despre amprenta ta digitală
ECSM 2021- Informații importante despre amprenta ta digitalăECSM 2021- Informații importante despre amprenta ta digitală
ECSM 2021- Informații importante despre amprenta ta digitală
 
Ghidul digitalizarea IMM oipsi consultare publica
Ghidul digitalizarea IMM oipsi consultare publicaGhidul digitalizarea IMM oipsi consultare publica
Ghidul digitalizarea IMM oipsi consultare publica
 
Ghid poc imbunatatirea continutului digital si a infrastructurii TIC sistemic...
Ghid poc imbunatatirea continutului digital si a infrastructurii TIC sistemic...Ghid poc imbunatatirea continutului digital si a infrastructurii TIC sistemic...
Ghid poc imbunatatirea continutului digital si a infrastructurii TIC sistemic...
 
Poly Eagle eye Mini
Poly Eagle eye MiniPoly Eagle eye Mini
Poly Eagle eye Mini
 
Ghid cu contributie privata - Propunerea de ghid al solicitantului pentru acc...
Ghid cu contributie privata - Propunerea de ghid al solicitantului pentru acc...Ghid cu contributie privata - Propunerea de ghid al solicitantului pentru acc...
Ghid cu contributie privata - Propunerea de ghid al solicitantului pentru acc...
 
One-IT - prezentare GDPR-ul si Protectia datelor personale
One-IT - prezentare GDPR-ul si Protectia datelor personaleOne-IT - prezentare GDPR-ul si Protectia datelor personale
One-IT - prezentare GDPR-ul si Protectia datelor personale
 

Recently uploaded

Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 

Recently uploaded (20)

Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 

ECSM 2021 - Ce faci dacă ți-au fost sparte conturile de social media

  • 1. #CyberSecMonth #ThinkB4UClick ! ********** ****************** ****************** The consequences of someone hacking your account depend on how much personal information you share e.g. your date of birth, address, names of family members - your information could be used to access your other accounts or steal your identity. • You have trouble logging into your account • You get a message saying your account password has been changed, but you didn’t do it • You see posts that you didn’t write • You are suddenly following lots of people you don’t know • You see a login from an unusual location • You receive lots of ads that feel like spam • Change your passwords. The scammer may have your password so change it to a strong password with at least 15 characters including upper and lower case letters, numbers and symbols. • A passphrase may be easier to remember. This could be a sentence that includes unusual words, or words from different languages. • You should also change login details for any of your other accounts that use the same or similar username and password. This includes applications linked to the social media account. • Use a unique password for each account. • Make your account more secure. Look for the security and privacy settings where you can find tools to protect your account. Here are some signs: What does it mean? What to do? • Notify the provider that your account has been hacked. This will help the provider track scams and improve security. • Report the fraud. Your information may help catch the fraudster and prevent further incidents. To find out where to get advice and to report the crime in your country, visit https://cybersecuritymonth.eu/cyber-first-aid • Tell your contacts that your account was hacked. Your contacts may receive messages or see posts sent from your account, which contain fraudulent links or misleading information. Let them know that it was not you who posted or sent the messages so that they do not click on any links. • Share your experience with family and friends to help protect them. Then: If you can still access your account: • Follow the provider's account recovery process if you are completely locked out. All of the main providers have a process in place to recover your account, go to their help centre for advice. If you are unable to access your account: Has your social media account been hacked?