SlideShare a Scribd company logo
11Tipsto protect yourself from
being HACKED
Cybersecurity attacks are
very real.
In an instant, they can wipe out your company’s
finances and your personal finances, sometimes
beyond repair. It’s critical to know everything you
can to protect yourself.
Did you know that 95 percent of cyber attacks
occur due to human error? I’ll tell you why this
is great news.
Only five percent of all cyber attacks are out of
your control. Today, I’m going to give you 11 FREE
tips from my new book Hacked Again. I want to
make sure you protect yourself and your loved
ones from these vicious modern threats.
My book delves much deeper into my personal
experiences about how I was hacked, not once,
but twice!! I will also show how you can protect
yourself from cybersecurity threats. If you
want to read more and learn even more about
protecting yourself and your business, please
purchase, Hacked Again.
Hello, I’m Scott Schober,
renowned cybersecurity expert,
author and inventor.
Passwords –
Lockpicking Your Brain
According to the “2013 Data Breach Investigations
Report” (DBIR) done yearly by Verizon’s risk team,
approximately 76% of attacks on corporate networks
involved weak passwords. This further underscores
the importance of strong passwords.
Passwords are like memory keys that only you know,
but they can be stolen by anyone in the world look-
ing in the right places for the right clues.
Be careful whom you share your Wi-Fi password
with. If you have shared your password with anyone,
change your password to a stronger one immediately
after they leave.
1
Malware - ransomware is
a new growing threat
Remember when it was obvious that you were being
scammed online? The email lacked basic English
grammar or included an overtly fake link. Today’s
hackers are much more sophisticated. It’s important
to question emails, links and other forms of online
content that you see. Unless you are 100 percent
certain it’s not an attack on your computer or your
email, don’t click it.
Today’s malware also includes ransomware, which is
a type of hack that locks your computer or access
until you pay some sort of ransom. Be very cautious
of these attacks. It’s critical to backup your files
frequently in the case of such an attack. Never ever
pay ransom to a cyberhacker.
1) Never click on any attachment or link in an
e-mail sent to you, no matter how legitimate
it might look.
2) DON’T pay ransom to a cyberhacker.
3) Make frequent backups in case you are ever
a victim of ransomware.
2
Chapter 7 of Hacked Again I share how
to protect yourself from ransomware
Identity Theft
Social media is beneficial, but think before you put
out personal information on any social media site,
or you might end up being a victim of identity
theft.When it comes to identity theft, criminals are
scouring social media channels for information
about targeted victims. It’s important not to give up
too much information on your own social channels.
It’s even more important not to post every detail in
your personal life. While checking in on Facebook
can be fun, it can also be fun for a criminal who
now knows when you aren’t home.
3
Any pieces of personal information a hacker can
gather about you, is another step toward stealing or
selling your identity. Don’t list key information like
your date of birth or where you work. It makes you
an easy target.
Social media is beneficial, but think before you put
out personal information on any social media site,
or you might end up being a victim of identity theft.
Spam
The most important thing to remember about
thieves who try to spam you is that they first
have to confirm they have reached a real email
address. The best solution is to not respond.
Send to your junk or delete folder.
Do not click on the bottom of a spam e-mail
and ask to be removed from the “Do Not
E-mail” list. You will likely receive more spam
because they now know you are a real person
and will then sell your name for more money
to other spammers.
4
Phishing
Phishing attacks are one of the most popular and effective
ways to lure one to click on an attachment in an e-mail
you receive. Fight the urge and DON’T click.
You think that people don’t fall for phishing scams?
Think again.
Phishing Attacks Statistics (www.getcybersafe.gc.ca):
Who takes the bait?
• 156 Million phishing e-mails are sent every day by
cyber criminals globally.
• 16 million e-mails make it through the SPAM filters.
• 8 million people open the e-mails.
• 80,000 people (or 10%) fall for a scam every day and
share their personal information.
5
More on Passwords
but they are very necessary in
today’s digital world. It’s critical to
have a password that is not easy to
uncover. Don’t make passwords too
personal or use personal information
in any of your passwords. Make sure
that you don’t use the same pass-
word for multiple accounts.
Passwords long, strong, and complex
are secure. Use an automatic
password generator and a password
strength meter to verify how secure
a password truly is.
6 Protect yourself
Companies should invest in
independent vulnerability and
penetration assessments.
Do not try to save money by
using your own IT department.
7
YES.
Passwords
are a nuisance,
Wireless Threats
The wireless threat is often the
most attractive means a cyberthief
will exploit first to gain access to a
computer network.
8
Insider Threat
It only takes one corrupt employee within an organization
for a successful cyber crime. Report all suspicious activity
to your employer as you never know when you have an
insider threat.
9
Chapter 15 of Hacked Again learn how to
set up a secure WiFi network.
Make sure you check your
credit card statements regularly
Due to new technologies like scanners and other
devices that can quickly and discretely capture your
credit card data, these types of breaches are very
common today. Protect your credit cards with security
sleeves. Request credit cards that only use smartchip
technology, as these cards are much more difficult to
compromise.
Regularly check your statements to ensure your trans-
actions are valid. Contact your bank immediately if
you notice something suspicious.
If you accept credit cards, be extremely cautious if
your customer wants multiple items shipped in the
most expedited manner, especially if internationally.
STOP and ask them questions, such as issuing bank,
or for a photo ID to verify their credentials.
10
Social Media Scanning
Be aware that hackers will scan your profiles. It’s important to
check your LinkedIn and Twitter accounts regularly as these are
usually the most publicly accessible channels for hackers to
find information about you.
Never use your actual birthday when setting up an account!
11
Keep Informed
Scott Schober offers valuable information in his book
Hacked Again. You can also find valuable tips and
information on cybersecurity and related topics by
subscribing to his podcast:
“2-Minute Cyber Briefing.”
Scott is called upon by the major
TV networks as a cybersecurity
expert. On his website you can
view all of his appearances, along
with his archived Podcasts.
Due to personal experience, Scott
knows this topic and feels it is NOT
to be taken lightly!

More Related Content

What's hot

Cybersecurity Awareness Infographics
Cybersecurity Awareness InfographicsCybersecurity Awareness Infographics
Cybersecurity Awareness Infographics
NetLockSmith
 
Infosec 4 The Home
Infosec 4 The HomeInfosec 4 The Home
Infosec 4 The Home
jaysonstreet
 
Being Cyber Aware
Being Cyber AwareBeing Cyber Aware
Being Cyber Aware
Naveen Gulati
 
Are Phishing Attacks Angling For You?
Are Phishing Attacks Angling For You? Are Phishing Attacks Angling For You?
Are Phishing Attacks Angling For You?
The TNS Group
 
10 Steps to Creating a Corporate Phishing Awareness Program
10 Steps to Creating a Corporate Phishing Awareness Program10 Steps to Creating a Corporate Phishing Awareness Program
10 Steps to Creating a Corporate Phishing Awareness Program
Wiley
 
14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness
Michel Bitter
 
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScanHow to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
ControlScan, Inc.
 
How to check a suspicious link without clicking on it?
How to check a suspicious link without clicking on it?How to check a suspicious link without clicking on it?
How to check a suspicious link without clicking on it?
Ankush Sarkar
 
Are You a Hacker's Target?
Are You a Hacker's Target?Are You a Hacker's Target?
Are You a Hacker's Target?
Blue Coat
 
Phishing
PhishingPhishing
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
Vinay Bhargav
 
Cybercrime
CybercrimeCybercrime
Phishing--The Entire Story of a Dark World
Phishing--The Entire Story of a Dark WorldPhishing--The Entire Story of a Dark World
Phishing--The Entire Story of a Dark World
Avishek Datta
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
Preeti Papneja
 
Phishing scams in banking ppt
Phishing scams in banking pptPhishing scams in banking ppt
Phishing scams in banking ppt
Krishma Sandesra
 
Phishing
PhishingPhishing
Phishing Attack : A big Threat
Phishing Attack : A big ThreatPhishing Attack : A big Threat
Phishing Attack : A big Threat
sourav newatia
 
Anti phishing
Anti phishingAnti phishing
Anti phishing
Shethwala Ridhvesh
 
Phishing and hacking
Phishing and hackingPhishing and hacking
Phishing and hacking
Md. Mehadi Hassan Bappy
 

What's hot (19)

Cybersecurity Awareness Infographics
Cybersecurity Awareness InfographicsCybersecurity Awareness Infographics
Cybersecurity Awareness Infographics
 
Infosec 4 The Home
Infosec 4 The HomeInfosec 4 The Home
Infosec 4 The Home
 
Being Cyber Aware
Being Cyber AwareBeing Cyber Aware
Being Cyber Aware
 
Are Phishing Attacks Angling For You?
Are Phishing Attacks Angling For You? Are Phishing Attacks Angling For You?
Are Phishing Attacks Angling For You?
 
10 Steps to Creating a Corporate Phishing Awareness Program
10 Steps to Creating a Corporate Phishing Awareness Program10 Steps to Creating a Corporate Phishing Awareness Program
10 Steps to Creating a Corporate Phishing Awareness Program
 
14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness
 
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScanHow to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
 
How to check a suspicious link without clicking on it?
How to check a suspicious link without clicking on it?How to check a suspicious link without clicking on it?
How to check a suspicious link without clicking on it?
 
Are You a Hacker's Target?
Are You a Hacker's Target?Are You a Hacker's Target?
Are You a Hacker's Target?
 
Phishing
PhishingPhishing
Phishing
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Phishing--The Entire Story of a Dark World
Phishing--The Entire Story of a Dark WorldPhishing--The Entire Story of a Dark World
Phishing--The Entire Story of a Dark World
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
Phishing scams in banking ppt
Phishing scams in banking pptPhishing scams in banking ppt
Phishing scams in banking ppt
 
Phishing
PhishingPhishing
Phishing
 
Phishing Attack : A big Threat
Phishing Attack : A big ThreatPhishing Attack : A big Threat
Phishing Attack : A big Threat
 
Anti phishing
Anti phishingAnti phishing
Anti phishing
 
Phishing and hacking
Phishing and hackingPhishing and hacking
Phishing and hacking
 

Viewers also liked

Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft Prevention
Alan Greggo
 
Data Protection, Humans and Common Sense
Data Protection, Humans and Common SenseData Protection, Humans and Common Sense
Data Protection, Humans and Common Sense
usbcopynotify
 
History of Computer Virus
History of Computer Virus History of Computer Virus
History of Computer Virus
Ammy Vijay
 
15 Tips to Protect Yourself from Cyber Attacks
15 Tips to Protect Yourself from Cyber Attacks15 Tips to Protect Yourself from Cyber Attacks
15 Tips to Protect Yourself from Cyber Attacks
The eCore Group
 
presentation on computer virus
presentation on computer viruspresentation on computer virus
presentation on computer virus
Yogesh Singh Rawat
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
ainizbahari97
 
Presentation on computer viruses
Presentation on computer virusesPresentation on computer viruses
Presentation on computer viruses
Nitish Xavier Tirkey
 
Computer Virus powerpoint presentation
Computer Virus powerpoint presentationComputer Virus powerpoint presentation
Computer Virus powerpoint presentation
shohrabkhan
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentation
abhijit chintamani
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
Aeman Khan
 

Viewers also liked (10)

Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft Prevention
 
Data Protection, Humans and Common Sense
Data Protection, Humans and Common SenseData Protection, Humans and Common Sense
Data Protection, Humans and Common Sense
 
History of Computer Virus
History of Computer Virus History of Computer Virus
History of Computer Virus
 
15 Tips to Protect Yourself from Cyber Attacks
15 Tips to Protect Yourself from Cyber Attacks15 Tips to Protect Yourself from Cyber Attacks
15 Tips to Protect Yourself from Cyber Attacks
 
presentation on computer virus
presentation on computer viruspresentation on computer virus
presentation on computer virus
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
 
Presentation on computer viruses
Presentation on computer virusesPresentation on computer viruses
Presentation on computer viruses
 
Computer Virus powerpoint presentation
Computer Virus powerpoint presentationComputer Virus powerpoint presentation
Computer Virus powerpoint presentation
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentation
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 

Similar to 11 Cybersecurity Tips to stay safe online

Phishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You SafePhishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You Safe
CheapSSLsecurity
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of Cybercrime
Rubi Orbeta
 
negative implications of IT
negative implications of ITnegative implications of IT
negative implications of IT
MahdiRahmani15
 
The Best And Easiest Ways To Protect Yourself From Hackers
The Best And Easiest Ways To Protect Yourself From HackersThe Best And Easiest Ways To Protect Yourself From Hackers
The Best And Easiest Ways To Protect Yourself From Hackers
Spouse Ware
 
Unit 3 - Cyber Crime.pptx
Unit 3 - Cyber Crime.pptxUnit 3 - Cyber Crime.pptx
Unit 3 - Cyber Crime.pptx
ssuserb73103
 
National Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationNational Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness Presentation
Jamie Proctor-Brassard
 
Phishing
PhishingPhishing
Phishing
shivli0769
 
Unveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity postureUnveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity posture
Lourdes Paloma Gimenez
 
IS Presetation.pptx
IS Presetation.pptxIS Presetation.pptx
IS Presetation.pptx
Tanvir Amin
 
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASSLESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
lesteraporado16
 
Cybercrime - An essential guide from Thawte
Cybercrime - An essential guide from ThawteCybercrime - An essential guide from Thawte
Cybercrime - An essential guide from Thawte
RapidSSLOnline.com
 
10 tips to prevent phishing attacks
10 tips to prevent phishing attacks10 tips to prevent phishing attacks
10 tips to prevent phishing attacks
Namik Heydarov
 
Ransomware all locked up book
Ransomware all locked up bookRansomware all locked up book
Ransomware all locked up book
Diego Souza
 
How Cyber-Secure is your Family Enterprise? A special report for clients of P...
How Cyber-Secure is your Family Enterprise? A special report for clients of P...How Cyber-Secure is your Family Enterprise? A special report for clients of P...
How Cyber-Secure is your Family Enterprise? A special report for clients of P...
Declan Winston Ramsaran
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
Innocent Korie
 
Unit iii: Common Hacking Techniques
Unit iii: Common Hacking TechniquesUnit iii: Common Hacking Techniques
Unit iii: Common Hacking Techniques
Arnav Chowdhury
 
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
Steve Poole
 
Internet Safety.pptx
Internet Safety.pptxInternet Safety.pptx
Internet Safety.pptx
AljunMisa
 
Cyber Defense For SMB's
Cyber Defense For SMB'sCyber Defense For SMB's
Cyber Defense For SMB's
Guise Bule
 
Jax london2016 cybercrime-and-the-developer
Jax london2016 cybercrime-and-the-developerJax london2016 cybercrime-and-the-developer
Jax london2016 cybercrime-and-the-developer
Steve Poole
 

Similar to 11 Cybersecurity Tips to stay safe online (20)

Phishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You SafePhishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You Safe
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of Cybercrime
 
negative implications of IT
negative implications of ITnegative implications of IT
negative implications of IT
 
The Best And Easiest Ways To Protect Yourself From Hackers
The Best And Easiest Ways To Protect Yourself From HackersThe Best And Easiest Ways To Protect Yourself From Hackers
The Best And Easiest Ways To Protect Yourself From Hackers
 
Unit 3 - Cyber Crime.pptx
Unit 3 - Cyber Crime.pptxUnit 3 - Cyber Crime.pptx
Unit 3 - Cyber Crime.pptx
 
National Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationNational Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness Presentation
 
Phishing
PhishingPhishing
Phishing
 
Unveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity postureUnveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity posture
 
IS Presetation.pptx
IS Presetation.pptxIS Presetation.pptx
IS Presetation.pptx
 
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASSLESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
 
Cybercrime - An essential guide from Thawte
Cybercrime - An essential guide from ThawteCybercrime - An essential guide from Thawte
Cybercrime - An essential guide from Thawte
 
10 tips to prevent phishing attacks
10 tips to prevent phishing attacks10 tips to prevent phishing attacks
10 tips to prevent phishing attacks
 
Ransomware all locked up book
Ransomware all locked up bookRansomware all locked up book
Ransomware all locked up book
 
How Cyber-Secure is your Family Enterprise? A special report for clients of P...
How Cyber-Secure is your Family Enterprise? A special report for clients of P...How Cyber-Secure is your Family Enterprise? A special report for clients of P...
How Cyber-Secure is your Family Enterprise? A special report for clients of P...
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Unit iii: Common Hacking Techniques
Unit iii: Common Hacking TechniquesUnit iii: Common Hacking Techniques
Unit iii: Common Hacking Techniques
 
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
 
Internet Safety.pptx
Internet Safety.pptxInternet Safety.pptx
Internet Safety.pptx
 
Cyber Defense For SMB's
Cyber Defense For SMB'sCyber Defense For SMB's
Cyber Defense For SMB's
 
Jax london2016 cybercrime-and-the-developer
Jax london2016 cybercrime-and-the-developerJax london2016 cybercrime-and-the-developer
Jax london2016 cybercrime-and-the-developer
 

Recently uploaded

在线办理(加拿大Concordia毕业证书)康考迪亚大学毕业证学历证书一模一样
在线办理(加拿大Concordia毕业证书)康考迪亚大学毕业证学历证书一模一样在线办理(加拿大Concordia毕业证书)康考迪亚大学毕业证学历证书一模一样
在线办理(加拿大Concordia毕业证书)康考迪亚大学毕业证学历证书一模一样
ch775c0l
 
快速办理(McGill毕业证书)麦吉尔大学毕业证Offer一模一样
快速办理(McGill毕业证书)麦吉尔大学毕业证Offer一模一样快速办理(McGill毕业证书)麦吉尔大学毕业证Offer一模一样
快速办理(McGill毕业证书)麦吉尔大学毕业证Offer一模一样
ch775c0l
 
Complete Self-write Restaurant Business Plan Guide for Entrepreneurs
Complete Self-write Restaurant Business Plan Guide for EntrepreneursComplete Self-write Restaurant Business Plan Guide for Entrepreneurs
Complete Self-write Restaurant Business Plan Guide for Entrepreneurs
Kopa Global Technologies
 
1:1制作英国伦敦大学毕业证(london毕业证书)学历学位证书原版一模一样
1:1制作英国伦敦大学毕业证(london毕业证书)学历学位证书原版一模一样1:1制作英国伦敦大学毕业证(london毕业证书)学历学位证书原版一模一样
1:1制作英国伦敦大学毕业证(london毕业证书)学历学位证书原版一模一样
es4hjcss
 
1比1定做(aub毕业证书)伯恩茅斯艺术大学毕业证硕士学历证书原版一模一样
1比1定做(aub毕业证书)伯恩茅斯艺术大学毕业证硕士学历证书原版一模一样1比1定做(aub毕业证书)伯恩茅斯艺术大学毕业证硕士学历证书原版一模一样
1比1定做(aub毕业证书)伯恩茅斯艺术大学毕业证硕士学历证书原版一模一样
es4hjcss
 
Exploring the Contrast Silicone Sponge Rubber Versus Foam Rubber.pptx
Exploring the Contrast Silicone Sponge Rubber Versus Foam Rubber.pptxExploring the Contrast Silicone Sponge Rubber Versus Foam Rubber.pptx
Exploring the Contrast Silicone Sponge Rubber Versus Foam Rubber.pptx
Elastostar Rubber Corporation
 
在线办理(uofc毕业证书)芝加哥大学毕业证学历学位证书原版一模一样
在线办理(uofc毕业证书)芝加哥大学毕业证学历学位证书原版一模一样在线办理(uofc毕业证书)芝加哥大学毕业证学历学位证书原版一模一样
在线办理(uofc毕业证书)芝加哥大学毕业证学历学位证书原版一模一样
pv4uhplv
 

Recently uploaded (7)

在线办理(加拿大Concordia毕业证书)康考迪亚大学毕业证学历证书一模一样
在线办理(加拿大Concordia毕业证书)康考迪亚大学毕业证学历证书一模一样在线办理(加拿大Concordia毕业证书)康考迪亚大学毕业证学历证书一模一样
在线办理(加拿大Concordia毕业证书)康考迪亚大学毕业证学历证书一模一样
 
快速办理(McGill毕业证书)麦吉尔大学毕业证Offer一模一样
快速办理(McGill毕业证书)麦吉尔大学毕业证Offer一模一样快速办理(McGill毕业证书)麦吉尔大学毕业证Offer一模一样
快速办理(McGill毕业证书)麦吉尔大学毕业证Offer一模一样
 
Complete Self-write Restaurant Business Plan Guide for Entrepreneurs
Complete Self-write Restaurant Business Plan Guide for EntrepreneursComplete Self-write Restaurant Business Plan Guide for Entrepreneurs
Complete Self-write Restaurant Business Plan Guide for Entrepreneurs
 
1:1制作英国伦敦大学毕业证(london毕业证书)学历学位证书原版一模一样
1:1制作英国伦敦大学毕业证(london毕业证书)学历学位证书原版一模一样1:1制作英国伦敦大学毕业证(london毕业证书)学历学位证书原版一模一样
1:1制作英国伦敦大学毕业证(london毕业证书)学历学位证书原版一模一样
 
1比1定做(aub毕业证书)伯恩茅斯艺术大学毕业证硕士学历证书原版一模一样
1比1定做(aub毕业证书)伯恩茅斯艺术大学毕业证硕士学历证书原版一模一样1比1定做(aub毕业证书)伯恩茅斯艺术大学毕业证硕士学历证书原版一模一样
1比1定做(aub毕业证书)伯恩茅斯艺术大学毕业证硕士学历证书原版一模一样
 
Exploring the Contrast Silicone Sponge Rubber Versus Foam Rubber.pptx
Exploring the Contrast Silicone Sponge Rubber Versus Foam Rubber.pptxExploring the Contrast Silicone Sponge Rubber Versus Foam Rubber.pptx
Exploring the Contrast Silicone Sponge Rubber Versus Foam Rubber.pptx
 
在线办理(uofc毕业证书)芝加哥大学毕业证学历学位证书原版一模一样
在线办理(uofc毕业证书)芝加哥大学毕业证学历学位证书原版一模一样在线办理(uofc毕业证书)芝加哥大学毕业证学历学位证书原版一模一样
在线办理(uofc毕业证书)芝加哥大学毕业证学历学位证书原版一模一样
 

11 Cybersecurity Tips to stay safe online

  • 1. 11Tipsto protect yourself from being HACKED
  • 2. Cybersecurity attacks are very real. In an instant, they can wipe out your company’s finances and your personal finances, sometimes beyond repair. It’s critical to know everything you can to protect yourself. Did you know that 95 percent of cyber attacks occur due to human error? I’ll tell you why this is great news. Only five percent of all cyber attacks are out of your control. Today, I’m going to give you 11 FREE tips from my new book Hacked Again. I want to make sure you protect yourself and your loved ones from these vicious modern threats. My book delves much deeper into my personal experiences about how I was hacked, not once, but twice!! I will also show how you can protect yourself from cybersecurity threats. If you want to read more and learn even more about protecting yourself and your business, please purchase, Hacked Again. Hello, I’m Scott Schober, renowned cybersecurity expert, author and inventor.
  • 3. Passwords – Lockpicking Your Brain According to the “2013 Data Breach Investigations Report” (DBIR) done yearly by Verizon’s risk team, approximately 76% of attacks on corporate networks involved weak passwords. This further underscores the importance of strong passwords. Passwords are like memory keys that only you know, but they can be stolen by anyone in the world look- ing in the right places for the right clues. Be careful whom you share your Wi-Fi password with. If you have shared your password with anyone, change your password to a stronger one immediately after they leave. 1
  • 4. Malware - ransomware is a new growing threat Remember when it was obvious that you were being scammed online? The email lacked basic English grammar or included an overtly fake link. Today’s hackers are much more sophisticated. It’s important to question emails, links and other forms of online content that you see. Unless you are 100 percent certain it’s not an attack on your computer or your email, don’t click it. Today’s malware also includes ransomware, which is a type of hack that locks your computer or access until you pay some sort of ransom. Be very cautious of these attacks. It’s critical to backup your files frequently in the case of such an attack. Never ever pay ransom to a cyberhacker. 1) Never click on any attachment or link in an e-mail sent to you, no matter how legitimate it might look. 2) DON’T pay ransom to a cyberhacker. 3) Make frequent backups in case you are ever a victim of ransomware. 2 Chapter 7 of Hacked Again I share how to protect yourself from ransomware
  • 5. Identity Theft Social media is beneficial, but think before you put out personal information on any social media site, or you might end up being a victim of identity theft.When it comes to identity theft, criminals are scouring social media channels for information about targeted victims. It’s important not to give up too much information on your own social channels. It’s even more important not to post every detail in your personal life. While checking in on Facebook can be fun, it can also be fun for a criminal who now knows when you aren’t home. 3 Any pieces of personal information a hacker can gather about you, is another step toward stealing or selling your identity. Don’t list key information like your date of birth or where you work. It makes you an easy target. Social media is beneficial, but think before you put out personal information on any social media site, or you might end up being a victim of identity theft.
  • 6. Spam The most important thing to remember about thieves who try to spam you is that they first have to confirm they have reached a real email address. The best solution is to not respond. Send to your junk or delete folder. Do not click on the bottom of a spam e-mail and ask to be removed from the “Do Not E-mail” list. You will likely receive more spam because they now know you are a real person and will then sell your name for more money to other spammers. 4
  • 7. Phishing Phishing attacks are one of the most popular and effective ways to lure one to click on an attachment in an e-mail you receive. Fight the urge and DON’T click. You think that people don’t fall for phishing scams? Think again. Phishing Attacks Statistics (www.getcybersafe.gc.ca): Who takes the bait? • 156 Million phishing e-mails are sent every day by cyber criminals globally. • 16 million e-mails make it through the SPAM filters. • 8 million people open the e-mails. • 80,000 people (or 10%) fall for a scam every day and share their personal information. 5
  • 8. More on Passwords but they are very necessary in today’s digital world. It’s critical to have a password that is not easy to uncover. Don’t make passwords too personal or use personal information in any of your passwords. Make sure that you don’t use the same pass- word for multiple accounts. Passwords long, strong, and complex are secure. Use an automatic password generator and a password strength meter to verify how secure a password truly is. 6 Protect yourself Companies should invest in independent vulnerability and penetration assessments. Do not try to save money by using your own IT department. 7 YES. Passwords are a nuisance,
  • 9. Wireless Threats The wireless threat is often the most attractive means a cyberthief will exploit first to gain access to a computer network. 8 Insider Threat It only takes one corrupt employee within an organization for a successful cyber crime. Report all suspicious activity to your employer as you never know when you have an insider threat. 9 Chapter 15 of Hacked Again learn how to set up a secure WiFi network.
  • 10. Make sure you check your credit card statements regularly Due to new technologies like scanners and other devices that can quickly and discretely capture your credit card data, these types of breaches are very common today. Protect your credit cards with security sleeves. Request credit cards that only use smartchip technology, as these cards are much more difficult to compromise. Regularly check your statements to ensure your trans- actions are valid. Contact your bank immediately if you notice something suspicious. If you accept credit cards, be extremely cautious if your customer wants multiple items shipped in the most expedited manner, especially if internationally. STOP and ask them questions, such as issuing bank, or for a photo ID to verify their credentials. 10
  • 11. Social Media Scanning Be aware that hackers will scan your profiles. It’s important to check your LinkedIn and Twitter accounts regularly as these are usually the most publicly accessible channels for hackers to find information about you. Never use your actual birthday when setting up an account! 11
  • 12. Keep Informed Scott Schober offers valuable information in his book Hacked Again. You can also find valuable tips and information on cybersecurity and related topics by subscribing to his podcast: “2-Minute Cyber Briefing.” Scott is called upon by the major TV networks as a cybersecurity expert. On his website you can view all of his appearances, along with his archived Podcasts. Due to personal experience, Scott knows this topic and feels it is NOT to be taken lightly!