SlideShare a Scribd company logo
#CyberSecMonth
#ThinkB4UClick
!
**********
******************
******************
The consequences of someone
hacking your account depend on
how much personal information
you share e.g. your date of birth,
address, names of family
members - your information could
be used to access your other
accounts or steal your identity.
• You have trouble logging into your account
• You get a message saying your account password
has been changed, but you didn’t do it
• You see posts that you didn’t write
• You are suddenly following lots of people you don’t
know
• You see a login from an unusual location
• You receive lots of ads that feel like spam
• Change your passwords. The scammer may have
your password so change it to a strong password
with at least 15 characters including upper and
lower case letters, numbers and symbols.
• A passphrase may be easier to remember. This
could be a sentence that includes unusual words,
or words from different languages.
• You should also change login details for any of
your other accounts that use the same or similar
username and password. This includes
applications linked to the social media account.
• Use a unique password for each account.
• Make your account more secure. Look for the
security and privacy settings where you can
find tools to protect your account.
Here are some signs:
What does it mean?
What to do?
• Notify the provider that your account has been
hacked. This will help the provider track scams
and improve security.
• Report the fraud. Your information may help
catch the fraudster and prevent further
incidents. To find out where to get advice and to
report the crime in your country, visit
https://cybersecuritymonth.eu/cyber-first-aid
• Tell your contacts that your account was hacked.
Your contacts may receive messages or see posts
sent from your account, which contain fraudulent
links or misleading information. Let them know
that it was not you who posted or sent the
messages so that they do not click on any links.
• Share your experience with family and friends to
help protect them.
Then:
If you can still access your account:
• Follow the provider's account
recovery process if you are
completely locked out. All of the main
providers have a process in place to
recover your account, go to their help
centre for advice.
If you are unable to access your account:
Has your social media account
been hacked?

More Related Content

What's hot

Email hacking
Email hackingEmail hacking
Email hacking
ShreyaBhoje
 
Internet Security
Internet SecurityInternet Security
Internet Security
Avnish Jain
 
Cybercrime
CybercrimeCybercrime
Slideshow - Lil Rat
Slideshow - Lil RatSlideshow - Lil Rat
Slideshow - Lil Rat
megg16
 
Webspoofing
WebspoofingWebspoofing
Webspoofing
jaimin_m_raval
 
Don't ask, don't tell the virtues of privacy by design
Don't ask, don't tell   the virtues of privacy by designDon't ask, don't tell   the virtues of privacy by design
Don't ask, don't tell the virtues of privacy by design
Eleanor McHugh
 
How to Avoid Crypto Scams - Crypto JBro
How to Avoid Crypto Scams - Crypto JBroHow to Avoid Crypto Scams - Crypto JBro
How to Avoid Crypto Scams - Crypto JBro
Jared Broker
 
Cyberattacks the-next-healthcare-epidemic
Cyberattacks the-next-healthcare-epidemicCyberattacks the-next-healthcare-epidemic
Cyberattacks the-next-healthcare-epidemic
Kate Barney
 
Getting inside the cybercriminal's m ind
Getting inside the cybercriminal's m ind Getting inside the cybercriminal's m ind
Getting inside the cybercriminal's m ind
Alin Adrian Florea
 
Internet Security - Naga Rohit S [ IIT Guwahati ] - Coding Club & DefCon DC91...
Internet Security - Naga Rohit S [ IIT Guwahati ] - Coding Club & DefCon DC91...Internet Security - Naga Rohit S [ IIT Guwahati ] - Coding Club & DefCon DC91...
Internet Security - Naga Rohit S [ IIT Guwahati ] - Coding Club & DefCon DC91...
Naga Rohit
 
Introduction to Hacking
Introduction to HackingIntroduction to Hacking
Introduction to Hacking
leet detected
 
Internet Safety for 1950s Adults and Beginners
Internet Safety for 1950s Adults and BeginnersInternet Safety for 1950s Adults and Beginners
Internet Safety for 1950s Adults and Beginners
Rajesh Soundararajan
 
Internet fraud and identity theft
Internet fraud and identity theftInternet fraud and identity theft
Internet fraud and identity theft
Sara Gallaher Richardson
 
Email Security Awareness
Email Security AwarenessEmail Security Awareness
Email Security Awareness
Dale Rapp
 
Test Your Internet Security IQ Quiz
Test Your Internet Security IQ QuizTest Your Internet Security IQ Quiz
Test Your Internet Security IQ Quiz
Akilah Kamaria
 
Junior secondary yr 7:8 aug 18 4.3 preview
Junior secondary yr 7:8 aug 18 4.3 previewJunior secondary yr 7:8 aug 18 4.3 preview
Junior secondary yr 7:8 aug 18 4.3 preview
Leonie Smith
 
How to incrementally improve Sanctions Screening with AI
How to incrementally improve Sanctions Screening with AIHow to incrementally improve Sanctions Screening with AI
How to incrementally improve Sanctions Screening with AI
BLECKWEN
 
Cybersafety Checklist for Writers
Cybersafety Checklist for WritersCybersafety Checklist for Writers
Cybersafety Checklist for Writers
Shennandoah Diaz
 
Passwords for sale
Passwords for salePasswords for sale
Passwords for sale
Ramiro Cid
 
Phishing
PhishingPhishing
Phishing
guest4b5c234
 

What's hot (20)

Email hacking
Email hackingEmail hacking
Email hacking
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Slideshow - Lil Rat
Slideshow - Lil RatSlideshow - Lil Rat
Slideshow - Lil Rat
 
Webspoofing
WebspoofingWebspoofing
Webspoofing
 
Don't ask, don't tell the virtues of privacy by design
Don't ask, don't tell   the virtues of privacy by designDon't ask, don't tell   the virtues of privacy by design
Don't ask, don't tell the virtues of privacy by design
 
How to Avoid Crypto Scams - Crypto JBro
How to Avoid Crypto Scams - Crypto JBroHow to Avoid Crypto Scams - Crypto JBro
How to Avoid Crypto Scams - Crypto JBro
 
Cyberattacks the-next-healthcare-epidemic
Cyberattacks the-next-healthcare-epidemicCyberattacks the-next-healthcare-epidemic
Cyberattacks the-next-healthcare-epidemic
 
Getting inside the cybercriminal's m ind
Getting inside the cybercriminal's m ind Getting inside the cybercriminal's m ind
Getting inside the cybercriminal's m ind
 
Internet Security - Naga Rohit S [ IIT Guwahati ] - Coding Club & DefCon DC91...
Internet Security - Naga Rohit S [ IIT Guwahati ] - Coding Club & DefCon DC91...Internet Security - Naga Rohit S [ IIT Guwahati ] - Coding Club & DefCon DC91...
Internet Security - Naga Rohit S [ IIT Guwahati ] - Coding Club & DefCon DC91...
 
Introduction to Hacking
Introduction to HackingIntroduction to Hacking
Introduction to Hacking
 
Internet Safety for 1950s Adults and Beginners
Internet Safety for 1950s Adults and BeginnersInternet Safety for 1950s Adults and Beginners
Internet Safety for 1950s Adults and Beginners
 
Internet fraud and identity theft
Internet fraud and identity theftInternet fraud and identity theft
Internet fraud and identity theft
 
Email Security Awareness
Email Security AwarenessEmail Security Awareness
Email Security Awareness
 
Test Your Internet Security IQ Quiz
Test Your Internet Security IQ QuizTest Your Internet Security IQ Quiz
Test Your Internet Security IQ Quiz
 
Junior secondary yr 7:8 aug 18 4.3 preview
Junior secondary yr 7:8 aug 18 4.3 previewJunior secondary yr 7:8 aug 18 4.3 preview
Junior secondary yr 7:8 aug 18 4.3 preview
 
How to incrementally improve Sanctions Screening with AI
How to incrementally improve Sanctions Screening with AIHow to incrementally improve Sanctions Screening with AI
How to incrementally improve Sanctions Screening with AI
 
Cybersafety Checklist for Writers
Cybersafety Checklist for WritersCybersafety Checklist for Writers
Cybersafety Checklist for Writers
 
Passwords for sale
Passwords for salePasswords for sale
Passwords for sale
 
Phishing
PhishingPhishing
Phishing
 

Similar to ECSM 2021 - Ce faci dacă ți-au fost sparte conturile de social media

Spam & Phishing
Spam & PhishingSpam & Phishing
Spam & Phishing
GrittyCC
 
Phishing
PhishingPhishing
Phishing
Sagar Rai
 
Social media security
Social media securitySocial media security
Social media security
Mosoco Ltd
 
Internet Fraud #scichallenge2017
Internet Fraud #scichallenge2017Internet Fraud #scichallenge2017
Internet Fraud #scichallenge2017
Alexandru Turcu
 
Cyber Safety Month summary
 Cyber Safety Month summary Cyber Safety Month summary
Cyber Safety Month summary
icts-uct
 
Cyber privacy and password protection
Cyber privacy and password protectionCyber privacy and password protection
Cyber privacy and password protection
sajeena81
 
How to Protect Yourself From Heartbleed Security Flaw
How to Protect Yourself From Heartbleed Security FlawHow to Protect Yourself From Heartbleed Security Flaw
How to Protect Yourself From Heartbleed Security Flaw
ConnectSafely
 
How To Keep the Grinch From Ruining Your Cyber Monday
How To Keep the Grinch From Ruining Your Cyber MondayHow To Keep the Grinch From Ruining Your Cyber Monday
How To Keep the Grinch From Ruining Your Cyber Monday
Michele Chubirka
 
TheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxTheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptx
KevinRiley83
 
Internet Security
Internet SecurityInternet Security
Internet Security
mjelson
 
WISE KIDS Leaflet: Junk Mail and Misleading Advertisements
WISE KIDS Leaflet: Junk Mail and Misleading AdvertisementsWISE KIDS Leaflet: Junk Mail and Misleading Advertisements
WISE KIDS Leaflet: Junk Mail and Misleading Advertisements
WISE KIDS
 
ISSA - Security Awareness 2016-1
ISSA - Security Awareness 2016-1ISSA - Security Awareness 2016-1
ISSA - Security Awareness 2016-1
Pedro Serrano
 
Scams and-fraud-presentation
Scams and-fraud-presentationScams and-fraud-presentation
Scams and-fraud-presentation
Roel Palmaers
 
twitter hacking causes and protection
twitter hacking causes and protectiontwitter hacking causes and protection
twitter hacking causes and protection
Fahd Allebdi
 
Day 2
Day 2Day 2
Day 2
sefreed
 
phishing technique.pptx
phishing technique.pptxphishing technique.pptx
phishing technique.pptx
ECE6054PRIYADHARSHIN
 
Chapter-5.pptx
Chapter-5.pptxChapter-5.pptx
Chapter-5.pptx
ShreyaKushwaha28
 
Identity Theft - by LINKS Technology
Identity Theft - by LINKS TechnologyIdentity Theft - by LINKS Technology
Identity Theft - by LINKS Technology
CoyleFinancial
 
Ict Phishing (Present)
Ict   Phishing (Present)Ict   Phishing (Present)
Ict Phishing (Present)
aleeya91
 
Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2
NetLockSmith
 

Similar to ECSM 2021 - Ce faci dacă ți-au fost sparte conturile de social media (20)

Spam & Phishing
Spam & PhishingSpam & Phishing
Spam & Phishing
 
Phishing
PhishingPhishing
Phishing
 
Social media security
Social media securitySocial media security
Social media security
 
Internet Fraud #scichallenge2017
Internet Fraud #scichallenge2017Internet Fraud #scichallenge2017
Internet Fraud #scichallenge2017
 
Cyber Safety Month summary
 Cyber Safety Month summary Cyber Safety Month summary
Cyber Safety Month summary
 
Cyber privacy and password protection
Cyber privacy and password protectionCyber privacy and password protection
Cyber privacy and password protection
 
How to Protect Yourself From Heartbleed Security Flaw
How to Protect Yourself From Heartbleed Security FlawHow to Protect Yourself From Heartbleed Security Flaw
How to Protect Yourself From Heartbleed Security Flaw
 
How To Keep the Grinch From Ruining Your Cyber Monday
How To Keep the Grinch From Ruining Your Cyber MondayHow To Keep the Grinch From Ruining Your Cyber Monday
How To Keep the Grinch From Ruining Your Cyber Monday
 
TheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxTheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptx
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
WISE KIDS Leaflet: Junk Mail and Misleading Advertisements
WISE KIDS Leaflet: Junk Mail and Misleading AdvertisementsWISE KIDS Leaflet: Junk Mail and Misleading Advertisements
WISE KIDS Leaflet: Junk Mail and Misleading Advertisements
 
ISSA - Security Awareness 2016-1
ISSA - Security Awareness 2016-1ISSA - Security Awareness 2016-1
ISSA - Security Awareness 2016-1
 
Scams and-fraud-presentation
Scams and-fraud-presentationScams and-fraud-presentation
Scams and-fraud-presentation
 
twitter hacking causes and protection
twitter hacking causes and protectiontwitter hacking causes and protection
twitter hacking causes and protection
 
Day 2
Day 2Day 2
Day 2
 
phishing technique.pptx
phishing technique.pptxphishing technique.pptx
phishing technique.pptx
 
Chapter-5.pptx
Chapter-5.pptxChapter-5.pptx
Chapter-5.pptx
 
Identity Theft - by LINKS Technology
Identity Theft - by LINKS TechnologyIdentity Theft - by LINKS Technology
Identity Theft - by LINKS Technology
 
Ict Phishing (Present)
Ict   Phishing (Present)Ict   Phishing (Present)
Ict Phishing (Present)
 
Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2
 

More from One-IT

Centralizator întrebări și răspunsuri Digitalizare IMM.doc
Centralizator întrebări și răspunsuri Digitalizare IMM.docCentralizator întrebări și răspunsuri Digitalizare IMM.doc
Centralizator întrebări și răspunsuri Digitalizare IMM.doc
One-IT
 
Ghid final Digitalizare IMM
Ghid final Digitalizare IMMGhid final Digitalizare IMM
Ghid final Digitalizare IMM
One-IT
 
Corrigendum-ul la Ghidul solicitantului POC 4.1.1. Bis.pdf
Corrigendum-ul la Ghidul solicitantului POC 4.1.1. Bis.pdfCorrigendum-ul la Ghidul solicitantului POC 4.1.1. Bis.pdf
Corrigendum-ul la Ghidul solicitantului POC 4.1.1. Bis.pdf
One-IT
 
Ghidul solicitantului 4.1.1. BIS.pdf
Ghidul solicitantului 4.1.1. BIS.pdfGhidul solicitantului 4.1.1. BIS.pdf
Ghidul solicitantului 4.1.1. BIS.pdf
One-IT
 
Ghidul Solicitantului varianta intermediară 4.1.1 BIS.docx
Ghidul Solicitantului varianta intermediară 4.1.1 BIS.docxGhidul Solicitantului varianta intermediară 4.1.1 BIS.docx
Ghidul Solicitantului varianta intermediară 4.1.1 BIS.docx
One-IT
 
Ordonanța 19/2022 cu privire la rectificarea bugetului de stat pe anul 2022
Ordonanța 19/2022 cu privire la rectificarea bugetului de stat pe anul 2022Ordonanța 19/2022 cu privire la rectificarea bugetului de stat pe anul 2022
Ordonanța 19/2022 cu privire la rectificarea bugetului de stat pe anul 2022
One-IT
 
Ordonanța de Urgență 113/2022 privind acțiunea POC 4.1.1. Bis.pdf
Ordonanța de Urgență 113/2022 privind acțiunea POC 4.1.1. Bis.pdfOrdonanța de Urgență 113/2022 privind acțiunea POC 4.1.1. Bis.pdf
Ordonanța de Urgență 113/2022 privind acțiunea POC 4.1.1. Bis.pdf
One-IT
 
Ghid 4.1.1 BIS Industrie alimentară și construcții - Consultare Publică.docx
Ghid 4.1.1 BIS Industrie alimentară și construcții - Consultare Publică.docxGhid 4.1.1 BIS Industrie alimentară și construcții - Consultare Publică.docx
Ghid 4.1.1 BIS Industrie alimentară și construcții - Consultare Publică.docx
One-IT
 
Procedura-femeia-antreprenor-2022.pdf
Procedura-femeia-antreprenor-2022.pdfProcedura-femeia-antreprenor-2022.pdf
Procedura-femeia-antreprenor-2022.pdf
One-IT
 
Ghidul final al solicitantului Acțiunea 4.1.1 Investiții în activități produc...
Ghidul final al solicitantului Acțiunea 4.1.1 Investiții în activități produc...Ghidul final al solicitantului Acțiunea 4.1.1 Investiții în activități produc...
Ghidul final al solicitantului Acțiunea 4.1.1 Investiții în activități produc...
One-IT
 
Ghid actiunea 4.1.1 versiunea consolidata.docx
Ghid actiunea 4.1.1 versiunea consolidata.docxGhid actiunea 4.1.1 versiunea consolidata.docx
Ghid actiunea 4.1.1 versiunea consolidata.docx
One-IT
 
Ghid actiunea 4.1.1 versiunea consolidata 18.02.2022
Ghid actiunea 4.1.1 versiunea consolidata 18.02.2022Ghid actiunea 4.1.1 versiunea consolidata 18.02.2022
Ghid actiunea 4.1.1 versiunea consolidata 18.02.2022
One-IT
 
Cum te protejezi de tentativele de tip scam în business
Cum te protejezi de tentativele de tip scam în businessCum te protejezi de tentativele de tip scam în business
Cum te protejezi de tentativele de tip scam în business
One-IT
 
ECSM 2021 - Cum previi atacurile de tip phishing
ECSM 2021 - Cum previi atacurile de tip phishingECSM 2021 - Cum previi atacurile de tip phishing
ECSM 2021 - Cum previi atacurile de tip phishing
One-IT
 
ECSM 2021- Informații importante despre amprenta ta digitală
ECSM 2021- Informații importante despre amprenta ta digitalăECSM 2021- Informații importante despre amprenta ta digitală
ECSM 2021- Informații importante despre amprenta ta digitală
One-IT
 
Ghidul digitalizarea IMM oipsi consultare publica
Ghidul digitalizarea IMM oipsi consultare publicaGhidul digitalizarea IMM oipsi consultare publica
Ghidul digitalizarea IMM oipsi consultare publica
One-IT
 
Ghid poc imbunatatirea continutului digital si a infrastructurii TIC sistemic...
Ghid poc imbunatatirea continutului digital si a infrastructurii TIC sistemic...Ghid poc imbunatatirea continutului digital si a infrastructurii TIC sistemic...
Ghid poc imbunatatirea continutului digital si a infrastructurii TIC sistemic...
One-IT
 
Poly Eagle eye Mini
Poly Eagle eye MiniPoly Eagle eye Mini
Poly Eagle eye Mini
One-IT
 
Ghid cu contributie privata - Propunerea de ghid al solicitantului pentru acc...
Ghid cu contributie privata - Propunerea de ghid al solicitantului pentru acc...Ghid cu contributie privata - Propunerea de ghid al solicitantului pentru acc...
Ghid cu contributie privata - Propunerea de ghid al solicitantului pentru acc...
One-IT
 
One-IT - prezentare GDPR-ul si Protectia datelor personale
One-IT - prezentare GDPR-ul si Protectia datelor personaleOne-IT - prezentare GDPR-ul si Protectia datelor personale
One-IT - prezentare GDPR-ul si Protectia datelor personale
One-IT
 

More from One-IT (20)

Centralizator întrebări și răspunsuri Digitalizare IMM.doc
Centralizator întrebări și răspunsuri Digitalizare IMM.docCentralizator întrebări și răspunsuri Digitalizare IMM.doc
Centralizator întrebări și răspunsuri Digitalizare IMM.doc
 
Ghid final Digitalizare IMM
Ghid final Digitalizare IMMGhid final Digitalizare IMM
Ghid final Digitalizare IMM
 
Corrigendum-ul la Ghidul solicitantului POC 4.1.1. Bis.pdf
Corrigendum-ul la Ghidul solicitantului POC 4.1.1. Bis.pdfCorrigendum-ul la Ghidul solicitantului POC 4.1.1. Bis.pdf
Corrigendum-ul la Ghidul solicitantului POC 4.1.1. Bis.pdf
 
Ghidul solicitantului 4.1.1. BIS.pdf
Ghidul solicitantului 4.1.1. BIS.pdfGhidul solicitantului 4.1.1. BIS.pdf
Ghidul solicitantului 4.1.1. BIS.pdf
 
Ghidul Solicitantului varianta intermediară 4.1.1 BIS.docx
Ghidul Solicitantului varianta intermediară 4.1.1 BIS.docxGhidul Solicitantului varianta intermediară 4.1.1 BIS.docx
Ghidul Solicitantului varianta intermediară 4.1.1 BIS.docx
 
Ordonanța 19/2022 cu privire la rectificarea bugetului de stat pe anul 2022
Ordonanța 19/2022 cu privire la rectificarea bugetului de stat pe anul 2022Ordonanța 19/2022 cu privire la rectificarea bugetului de stat pe anul 2022
Ordonanța 19/2022 cu privire la rectificarea bugetului de stat pe anul 2022
 
Ordonanța de Urgență 113/2022 privind acțiunea POC 4.1.1. Bis.pdf
Ordonanța de Urgență 113/2022 privind acțiunea POC 4.1.1. Bis.pdfOrdonanța de Urgență 113/2022 privind acțiunea POC 4.1.1. Bis.pdf
Ordonanța de Urgență 113/2022 privind acțiunea POC 4.1.1. Bis.pdf
 
Ghid 4.1.1 BIS Industrie alimentară și construcții - Consultare Publică.docx
Ghid 4.1.1 BIS Industrie alimentară și construcții - Consultare Publică.docxGhid 4.1.1 BIS Industrie alimentară și construcții - Consultare Publică.docx
Ghid 4.1.1 BIS Industrie alimentară și construcții - Consultare Publică.docx
 
Procedura-femeia-antreprenor-2022.pdf
Procedura-femeia-antreprenor-2022.pdfProcedura-femeia-antreprenor-2022.pdf
Procedura-femeia-antreprenor-2022.pdf
 
Ghidul final al solicitantului Acțiunea 4.1.1 Investiții în activități produc...
Ghidul final al solicitantului Acțiunea 4.1.1 Investiții în activități produc...Ghidul final al solicitantului Acțiunea 4.1.1 Investiții în activități produc...
Ghidul final al solicitantului Acțiunea 4.1.1 Investiții în activități produc...
 
Ghid actiunea 4.1.1 versiunea consolidata.docx
Ghid actiunea 4.1.1 versiunea consolidata.docxGhid actiunea 4.1.1 versiunea consolidata.docx
Ghid actiunea 4.1.1 versiunea consolidata.docx
 
Ghid actiunea 4.1.1 versiunea consolidata 18.02.2022
Ghid actiunea 4.1.1 versiunea consolidata 18.02.2022Ghid actiunea 4.1.1 versiunea consolidata 18.02.2022
Ghid actiunea 4.1.1 versiunea consolidata 18.02.2022
 
Cum te protejezi de tentativele de tip scam în business
Cum te protejezi de tentativele de tip scam în businessCum te protejezi de tentativele de tip scam în business
Cum te protejezi de tentativele de tip scam în business
 
ECSM 2021 - Cum previi atacurile de tip phishing
ECSM 2021 - Cum previi atacurile de tip phishingECSM 2021 - Cum previi atacurile de tip phishing
ECSM 2021 - Cum previi atacurile de tip phishing
 
ECSM 2021- Informații importante despre amprenta ta digitală
ECSM 2021- Informații importante despre amprenta ta digitalăECSM 2021- Informații importante despre amprenta ta digitală
ECSM 2021- Informații importante despre amprenta ta digitală
 
Ghidul digitalizarea IMM oipsi consultare publica
Ghidul digitalizarea IMM oipsi consultare publicaGhidul digitalizarea IMM oipsi consultare publica
Ghidul digitalizarea IMM oipsi consultare publica
 
Ghid poc imbunatatirea continutului digital si a infrastructurii TIC sistemic...
Ghid poc imbunatatirea continutului digital si a infrastructurii TIC sistemic...Ghid poc imbunatatirea continutului digital si a infrastructurii TIC sistemic...
Ghid poc imbunatatirea continutului digital si a infrastructurii TIC sistemic...
 
Poly Eagle eye Mini
Poly Eagle eye MiniPoly Eagle eye Mini
Poly Eagle eye Mini
 
Ghid cu contributie privata - Propunerea de ghid al solicitantului pentru acc...
Ghid cu contributie privata - Propunerea de ghid al solicitantului pentru acc...Ghid cu contributie privata - Propunerea de ghid al solicitantului pentru acc...
Ghid cu contributie privata - Propunerea de ghid al solicitantului pentru acc...
 
One-IT - prezentare GDPR-ul si Protectia datelor personale
One-IT - prezentare GDPR-ul si Protectia datelor personaleOne-IT - prezentare GDPR-ul si Protectia datelor personale
One-IT - prezentare GDPR-ul si Protectia datelor personale
 

Recently uploaded

Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdfAI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
Techgropse Pvt.Ltd.
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
CAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on BlockchainCAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on Blockchain
Claudio Di Ciccio
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 

Recently uploaded (20)

Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdfAI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
CAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on BlockchainCAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on Blockchain
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 

ECSM 2021 - Ce faci dacă ți-au fost sparte conturile de social media

  • 1. #CyberSecMonth #ThinkB4UClick ! ********** ****************** ****************** The consequences of someone hacking your account depend on how much personal information you share e.g. your date of birth, address, names of family members - your information could be used to access your other accounts or steal your identity. • You have trouble logging into your account • You get a message saying your account password has been changed, but you didn’t do it • You see posts that you didn’t write • You are suddenly following lots of people you don’t know • You see a login from an unusual location • You receive lots of ads that feel like spam • Change your passwords. The scammer may have your password so change it to a strong password with at least 15 characters including upper and lower case letters, numbers and symbols. • A passphrase may be easier to remember. This could be a sentence that includes unusual words, or words from different languages. • You should also change login details for any of your other accounts that use the same or similar username and password. This includes applications linked to the social media account. • Use a unique password for each account. • Make your account more secure. Look for the security and privacy settings where you can find tools to protect your account. Here are some signs: What does it mean? What to do? • Notify the provider that your account has been hacked. This will help the provider track scams and improve security. • Report the fraud. Your information may help catch the fraudster and prevent further incidents. To find out where to get advice and to report the crime in your country, visit https://cybersecuritymonth.eu/cyber-first-aid • Tell your contacts that your account was hacked. Your contacts may receive messages or see posts sent from your account, which contain fraudulent links or misleading information. Let them know that it was not you who posted or sent the messages so that they do not click on any links. • Share your experience with family and friends to help protect them. Then: If you can still access your account: • Follow the provider's account recovery process if you are completely locked out. All of the main providers have a process in place to recover your account, go to their help centre for advice. If you are unable to access your account: Has your social media account been hacked?