SlideShare a Scribd company logo
1 of 1
Threat for You’re
Name Email ID
Phone
Number
Resident
Address
Photos/
Videos
Credit/
Debit
Card
Numbers
You’re Not As Secure As You Think
41% of Internet
users in North
America at risk
Hackers have access to
personal data and account
information on
compromised social
accounts
32% of Internet users
world-wide are at risk
due to security glitch
In 2011, 15% of adults
suffered a crime in the
physical world, compared
to 44% who experienced
cyber crime
69% of adult experienced
cyber crime in their life
lifetime. Of those, 65%
have suffered in the past
12 months
Victims by gender
72% Male65% Male
Victims by age
48-6518-31
Reuse the same
password for social
networking
accounts.
Use similar
password for
various accounts.
Why Our Passwords Don’t Protect Us:
US States With Most
Identified Fraud Complaints
 34% in Florida
 24% in Georgia
 20% in California
How Identity Thieves Attack Our Social Media
Profiles:
Target of an
identity threat
“Socially
engineered”
to disclose
password or other
sensitive info
Had account
accessed without
their permission
Asked to visit a
scam website via a
private message
How Thieves Get Our Personal
Information on Facebook:
30% Do not have
Facebook profile
set to private
14% Did not know
their Facebook
privacy settings
Sources:
NextAdvisor Info-graphics
Norton by Symantec, Norton Online Family and Cybercrime Report, November 2011
National Cyber Security Alliance, STOP, THINK, CONNECT, Tips and Advice, May 2012
Havoscope, Black Market Product Rating, May 2012
Prepared by :
S Sathish Kumar
@satisonline

More Related Content

What's hot

red balloon - csn - 2015-04 - infographic - healthcare - 2015-08-21
red balloon - csn - 2015-04 - infographic - healthcare - 2015-08-21red balloon - csn - 2015-04 - infographic - healthcare - 2015-08-21
red balloon - csn - 2015-04 - infographic - healthcare - 2015-08-21Staci Sinay
 
Cyberattacks the-next-healthcare-epidemic
Cyberattacks the-next-healthcare-epidemicCyberattacks the-next-healthcare-epidemic
Cyberattacks the-next-healthcare-epidemicKate Barney
 
Fire eye spearphishing
Fire eye spearphishingFire eye spearphishing
Fire eye spearphishingZeno Idzerda
 
How to Protect Yourself From Identity Theft
How to Protect Yourself From Identity TheftHow to Protect Yourself From Identity Theft
How to Protect Yourself From Identity TheftExperian_US
 
An Education On Background Screening Compliance
An Education On Background Screening ComplianceAn Education On Background Screening Compliance
An Education On Background Screening ComplianceData Facts, Inc.
 
2011 02-17 cybertraps for law students and young lawyers
2011 02-17 cybertraps for law students and young lawyers2011 02-17 cybertraps for law students and young lawyers
2011 02-17 cybertraps for law students and young lawyersFrederick Lane
 

What's hot (9)

red balloon - csn - 2015-04 - infographic - healthcare - 2015-08-21
red balloon - csn - 2015-04 - infographic - healthcare - 2015-08-21red balloon - csn - 2015-04 - infographic - healthcare - 2015-08-21
red balloon - csn - 2015-04 - infographic - healthcare - 2015-08-21
 
Cyberattacks the-next-healthcare-epidemic
Cyberattacks the-next-healthcare-epidemicCyberattacks the-next-healthcare-epidemic
Cyberattacks the-next-healthcare-epidemic
 
Data Breach
Data BreachData Breach
Data Breach
 
Fire eye spearphishing
Fire eye spearphishingFire eye spearphishing
Fire eye spearphishing
 
Phishing
PhishingPhishing
Phishing
 
How to Protect Yourself From Identity Theft
How to Protect Yourself From Identity TheftHow to Protect Yourself From Identity Theft
How to Protect Yourself From Identity Theft
 
An Education On Background Screening Compliance
An Education On Background Screening ComplianceAn Education On Background Screening Compliance
An Education On Background Screening Compliance
 
Using tech safely
Using tech safelyUsing tech safely
Using tech safely
 
2011 02-17 cybertraps for law students and young lawyers
2011 02-17 cybertraps for law students and young lawyers2011 02-17 cybertraps for law students and young lawyers
2011 02-17 cybertraps for law students and young lawyers
 

Similar to Online Security #1

Social networking and identity theft
Social networking and identity theft Social networking and identity theft
Social networking and identity theft carlgiardina
 
Users and behaviors social internet: Safety & Security
Users and behaviors social internet: Safety & SecurityUsers and behaviors social internet: Safety & Security
Users and behaviors social internet: Safety & SecurityDr. V Vorvoreanu
 
Identity crisis
Identity crisisIdentity crisis
Identity crisisnnguyen10
 
Identity crisis
Identity crisisIdentity crisis
Identity crisisnnguyen10
 
Hacking Statistics & Trends - Cyber Suraksa.pptx
Hacking Statistics & Trends - Cyber Suraksa.pptxHacking Statistics & Trends - Cyber Suraksa.pptx
Hacking Statistics & Trends - Cyber Suraksa.pptxCyber Suraksa
 
Users and Behaviors- Social Internet
Users and Behaviors- Social InternetUsers and Behaviors- Social Internet
Users and Behaviors- Social InternetKenie Moses
 
Own Your Own Life (at least online)
Own Your Own Life (at least online)Own Your Own Life (at least online)
Own Your Own Life (at least online)Pat Sine
 
Teen Identity Theft Presentation - Family Online Safety Institue
Teen Identity Theft Presentation - Family Online Safety InstitueTeen Identity Theft Presentation - Family Online Safety Institue
Teen Identity Theft Presentation - Family Online Safety InstitueMindMake - Parenting & Education
 
Ccia internet security presentation fin
Ccia internet security presentation finCcia internet security presentation fin
Ccia internet security presentation finLiz Gannes
 
Family Internet Safety
Family Internet SafetyFamily Internet Safety
Family Internet SafetySage Lewis
 
Impact of social media on teenagers
Impact of social media on  teenagersImpact of social media on  teenagers
Impact of social media on teenagersMiss Perfect
 
How to safe online (presented by abhinav pathak)
How to safe online (presented by  abhinav pathak)How to safe online (presented by  abhinav pathak)
How to safe online (presented by abhinav pathak)Abhinav Pathak
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyinglheikkila
 

Similar to Online Security #1 (20)

Social networking and identity theft
Social networking and identity theft Social networking and identity theft
Social networking and identity theft
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Users and behaviors social internet: Safety & Security
Users and behaviors social internet: Safety & SecurityUsers and behaviors social internet: Safety & Security
Users and behaviors social internet: Safety & Security
 
Identity crisis
Identity crisisIdentity crisis
Identity crisis
 
Identity crisis
Identity crisisIdentity crisis
Identity crisis
 
Hacking Statistics & Trends - Cyber Suraksa.pptx
Hacking Statistics & Trends - Cyber Suraksa.pptxHacking Statistics & Trends - Cyber Suraksa.pptx
Hacking Statistics & Trends - Cyber Suraksa.pptx
 
Networked Privacy in the Age of Surveillance, Sousveillance, Coveillance
Networked Privacy in the Age of Surveillance, Sousveillance, CoveillanceNetworked Privacy in the Age of Surveillance, Sousveillance, Coveillance
Networked Privacy in the Age of Surveillance, Sousveillance, Coveillance
 
Users and Behaviors- Social Internet
Users and Behaviors- Social InternetUsers and Behaviors- Social Internet
Users and Behaviors- Social Internet
 
Own Your Own Life (at least online)
Own Your Own Life (at least online)Own Your Own Life (at least online)
Own Your Own Life (at least online)
 
Teen Identity Theft Presentation - Family Online Safety Institue
Teen Identity Theft Presentation - Family Online Safety InstitueTeen Identity Theft Presentation - Family Online Safety Institue
Teen Identity Theft Presentation - Family Online Safety Institue
 
Ccia internet security presentation fin
Ccia internet security presentation finCcia internet security presentation fin
Ccia internet security presentation fin
 
Teens, Online Stranger Contact & Cyberbullying
Teens, Online Stranger Contact & CyberbullyingTeens, Online Stranger Contact & Cyberbullying
Teens, Online Stranger Contact & Cyberbullying
 
Family Internet Safety
Family Internet SafetyFamily Internet Safety
Family Internet Safety
 
Privacy in the Digital Age
Privacy in the Digital AgePrivacy in the Digital Age
Privacy in the Digital Age
 
Teaching Cyber Safety
Teaching Cyber SafetyTeaching Cyber Safety
Teaching Cyber Safety
 
Impact of social media on teenagers
Impact of social media on  teenagersImpact of social media on  teenagers
Impact of social media on teenagers
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Facebook
FacebookFacebook
Facebook
 
How to safe online (presented by abhinav pathak)
How to safe online (presented by  abhinav pathak)How to safe online (presented by  abhinav pathak)
How to safe online (presented by abhinav pathak)
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 

More from Sathish Kumar Sundaram

More from Sathish Kumar Sundaram (7)

ABM advanced certificate
ABM advanced certificateABM advanced certificate
ABM advanced certificate
 
Slide on social media
Slide on social mediaSlide on social media
Slide on social media
 
Social Media - A Catalyst
Social Media - A CatalystSocial Media - A Catalyst
Social Media - A Catalyst
 
Social Media & Community Professional Certification
Social Media & Community Professional CertificationSocial Media & Community Professional Certification
Social Media & Community Professional Certification
 
certificate_66
certificate_66certificate_66
certificate_66
 
New Metrics in Social Media Listening and Monitoring
New Metrics in Social Media Listening and MonitoringNew Metrics in Social Media Listening and Monitoring
New Metrics in Social Media Listening and Monitoring
 
Branding a social media perspective
Branding a social media perspectiveBranding a social media perspective
Branding a social media perspective
 

Online Security #1

  • 1. Threat for You’re Name Email ID Phone Number Resident Address Photos/ Videos Credit/ Debit Card Numbers You’re Not As Secure As You Think 41% of Internet users in North America at risk Hackers have access to personal data and account information on compromised social accounts 32% of Internet users world-wide are at risk due to security glitch In 2011, 15% of adults suffered a crime in the physical world, compared to 44% who experienced cyber crime 69% of adult experienced cyber crime in their life lifetime. Of those, 65% have suffered in the past 12 months Victims by gender 72% Male65% Male Victims by age 48-6518-31 Reuse the same password for social networking accounts. Use similar password for various accounts. Why Our Passwords Don’t Protect Us: US States With Most Identified Fraud Complaints  34% in Florida  24% in Georgia  20% in California How Identity Thieves Attack Our Social Media Profiles: Target of an identity threat “Socially engineered” to disclose password or other sensitive info Had account accessed without their permission Asked to visit a scam website via a private message How Thieves Get Our Personal Information on Facebook: 30% Do not have Facebook profile set to private 14% Did not know their Facebook privacy settings Sources: NextAdvisor Info-graphics Norton by Symantec, Norton Online Family and Cybercrime Report, November 2011 National Cyber Security Alliance, STOP, THINK, CONNECT, Tips and Advice, May 2012 Havoscope, Black Market Product Rating, May 2012 Prepared by : S Sathish Kumar @satisonline