SlideShare a Scribd company logo
ALWAYS SHRED
LOCK THEM OUT
datahops.com
CYBER SECURITY AWARENESS
DOCUMENTS
IMPORTANT & PERSONAL
PRINT IMPORTANT DOCUMENTS
WORK ON THEM IN PUBLIC PLACES
DON’T
CYBER SECURITY AWARENESS
datahops.com
LOCK THEM OUT
AND
LOCK THEM OUT
datahops.com
CYBER SECURITY AWARENESS
WHO’S LISTENING ?
INFORMATION IN PUBLIC PLACES
DON’T REVEAL SENSITIVE
TO YOUR PHONE CALLS AND CONVERSATIONS
LOCK THEM OUT
datahops.com
CYBER SECURITY AWARENESS
Check your privacy settings to control who can
see and access your profile, the way your data
is used, collected and shared
WHO WANTS
TO KNOW?
P
R
I VA T
E
LOCK THEM OUT
datahops.com
CYBER SECURITY AWARENESS
SINK OR
SWIM ?
Avoid that sinking feeling.
Do a regular backup of files in case of an
unexpected occurrence. This can help you
restore your files quickly and easily.
Where is the Data?
Cybersecurity awareness training datahops.com
If you need it Protect it
If you don’t delete it
Keep Data Safe
Where is the Data?
Deleted data is still on the computer
Did You know That
Cybersecurity awareness training datahops.com
You emptied the recycle bin but
All is not lost!
The only guaranteed way to repair your computer
after a security incident is to Backup your files
regularly - then erase and reinstall the system.
How to Recover
From a Disaster
Cybersecurity awareness training datahops.com
LOCK THEM OUT
datahops.com
CYBER SECURITY AWARENESS
JUST
BACK UP
Backup your files and folders regularly using
secure and authorised data storage devices or
recognised cloud services
LOCK THEM OUT
datahops.com
CYBER SECURITY AWARENESS
IS PRICELESS
PEACE OF MIND
Turn on encryption to protect your files if your
device gets lost or stolen. It cannot be accessed
by anyone without the password or recovery
key
Cybersecurity awareness training datahops.com
Encrypt
Lock them up
Lock them out
to
Cybersecurity awareness training datahops.com
your Files
Any sensitive or confidential data, should be encrypted.
THE WALL IS ON FIRE
Cybersecurity awareness training datahops.com
Turn on the Firewall
Protect Your Data
Make Your Device Safe And Secure
Turn on the
firewall
Install antivirus
software
Check security settings
for operating system
and browser
Set up password
protection
Cybersecurity awareness training datahops.com
Prevent Unauthorised Access
Password Protect all your Devices
If one is compromised, the criminals may be able to access
all of your data through your cloud storage service provider
Cybersecurity awareness training datahops.com
SECURE YOUR
LOCK THEM OUT
datahops.com
CYBER SECURITY AWARENESS
WIRELESS NETWORK
Change default Passwords
Hackers are aware of the preset SSID and default password
Enable WPA2 Encryption
TURN OFF BLUETOOTH
These can be exploited by hackers to eavesdrop,
establish remote access controls, distribute
malware and drain batteries! OUCH!!
WHEN NOT IN USE
Cybersecurity awareness training datahops.com
Off
Turn on Bluetooth to connect to nearby devices
< Bluetooth
Cybersecurity awareness training datahops.com
Encrypt
Cybersecurity awareness training datahops.com
sensitive Data
Prevent Unauthorized Persons From
viewing or Accessing the Content
Regular Backups
Can prevent the loss of irreplaceable data.
Cybersecurity awareness training datahops.com
DATA USE POLICY
How will the service provider:
Collect your information
WHAT HAPPENS TO YOU DATA
Use your information
Collect your information
Cybersecurity awareness training datahops.com
PRIVACY SETTINGS
These settings allow you to say who can:
See your information
WHAT HAPPENS TO YOU DATA
Access your information
Access account data
Cybersecurity awareness training datahops.com
SECURITY POLICY
How the company is protecting your data:
Confidentiality
WHAT HAPPENS TO YOU DATA
Integrity
Availability
Cybersecurity awareness training datahops.com
FAQ’s
Can you request a copy of
your data
WHAT HAPPENS TO YOU DATA
What can they do with the
data you uploaded
What happens to your data
When you close your account
Cybersecurity awareness training datahops.com
Have you read the terms
and conditions
What are your rights over
your data
STOP
PROTECT YOUR DATA
Cybersecurity awareness training datahops.com
ENCRYPT SENSITIVE DATA
STOP
Cybersecurity awareness training datahops.com
PROTECT YOUR DATA
USE STRONG PASSWORDS
STOP
Cybersecurity awareness training datahops.com
PROTECT YOUR DATA
BACKUP DATA REGULARLY
STOP
Cybersecurity awareness training datahops.com
PROTECT YOUR DATA
TURN ON FIREWALL
STOP
Cybersecurity awareness training datahops.com
PROTECT YOUR DATA
LOCK UP YOUR DEVICES

More Related Content

Similar to FREE A4 Cyber Security Posters-Data Protection-GDPR

The Cloud Beckons, But is it Safe?
The Cloud Beckons, But is it Safe?The Cloud Beckons, But is it Safe?
Confidentiality in a Digital World
Confidentiality in a Digital WorldConfidentiality in a Digital World
Confidentiality in a Digital World
David Whelan
 
Profile securitarian
Profile   securitarianProfile   securitarian
Profile securitarian
Rupesh Verma
 
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptxCYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
BarakaMuyengi
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
amiinaaa
 
Who Can Benefit from a Cyber-Security Framework in Dubai?
Who Can Benefit from a Cyber-Security Framework in Dubai?Who Can Benefit from a Cyber-Security Framework in Dubai?
Who Can Benefit from a Cyber-Security Framework in Dubai?
VRS Technologies
 
FREE A4 Data Security GDPR Posters-Data Protection part 5
FREE A4 Data Security GDPR Posters-Data Protection part 5FREE A4 Data Security GDPR Posters-Data Protection part 5
FREE A4 Data Security GDPR Posters-Data Protection part 5
Data Hops
 
Secure End User
Secure End UserSecure End User
Secure End User
Muhammad Salahuddien
 
FREE A4 Cyber Security Awareness Posters-Device Security
FREE A4 Cyber Security Awareness Posters-Device SecurityFREE A4 Cyber Security Awareness Posters-Device Security
FREE A4 Cyber Security Awareness Posters-Device Security
Data Hops
 
Scouts-Internet-Safety.pptx
Scouts-Internet-Safety.pptxScouts-Internet-Safety.pptx
Scouts-Internet-Safety.pptx
SujayJadhav16
 
Find Powerful Methods To Fight Against Cyber Threats?
Find Powerful Methods To Fight Against Cyber Threats?Find Powerful Methods To Fight Against Cyber Threats?
Find Powerful Methods To Fight Against Cyber Threats?
VRS Technologies
 
Law Firm & Legal Department Security & Practice In The Real World
Law Firm & Legal Department Security & Practice In The Real WorldLaw Firm & Legal Department Security & Practice In The Real World
Law Firm & Legal Department Security & Practice In The Real World
Richard Harbridge
 
Stackfield Cloud Security 101
Stackfield Cloud Security 101Stackfield Cloud Security 101
Stackfield Cloud Security 101
Stackfield
 
datasheet-quickheal-total-securitypdf...
datasheet-quickheal-total-securitypdf...datasheet-quickheal-total-securitypdf...
datasheet-quickheal-total-securitypdf...
QUICK HEAL TECHNOLOGIES LIMITED
 
TheInternetDigitalSecurityfddreeere.pptx
TheInternetDigitalSecurityfddreeere.pptxTheInternetDigitalSecurityfddreeere.pptx
TheInternetDigitalSecurityfddreeere.pptx
HAYDEECAYDA
 
Protecting Your Privacy: Cyberspace Security, Real World Safety
Protecting Your Privacy: Cyberspace Security, Real World SafetyProtecting Your Privacy: Cyberspace Security, Real World Safety
Protecting Your Privacy: Cyberspace Security, Real World Safety
AEGILITY
 
Securing Mobile & Online Identity in the Cyber World
Securing Mobile & Online Identity in the Cyber WorldSecuring Mobile & Online Identity in the Cyber World
Securing Mobile & Online Identity in the Cyber World
Emil Tan
 
Cyber Security School Workshop
Cyber Security School WorkshopCyber Security School Workshop
Cyber Security School Workshop
Rahul Nayan
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Adeel Younas
 
Persentation
PersentationPersentation
Persentation
Mehar Tayyab
 

Similar to FREE A4 Cyber Security Posters-Data Protection-GDPR (20)

The Cloud Beckons, But is it Safe?
The Cloud Beckons, But is it Safe?The Cloud Beckons, But is it Safe?
The Cloud Beckons, But is it Safe?
 
Confidentiality in a Digital World
Confidentiality in a Digital WorldConfidentiality in a Digital World
Confidentiality in a Digital World
 
Profile securitarian
Profile   securitarianProfile   securitarian
Profile securitarian
 
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptxCYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
 
Who Can Benefit from a Cyber-Security Framework in Dubai?
Who Can Benefit from a Cyber-Security Framework in Dubai?Who Can Benefit from a Cyber-Security Framework in Dubai?
Who Can Benefit from a Cyber-Security Framework in Dubai?
 
FREE A4 Data Security GDPR Posters-Data Protection part 5
FREE A4 Data Security GDPR Posters-Data Protection part 5FREE A4 Data Security GDPR Posters-Data Protection part 5
FREE A4 Data Security GDPR Posters-Data Protection part 5
 
Secure End User
Secure End UserSecure End User
Secure End User
 
FREE A4 Cyber Security Awareness Posters-Device Security
FREE A4 Cyber Security Awareness Posters-Device SecurityFREE A4 Cyber Security Awareness Posters-Device Security
FREE A4 Cyber Security Awareness Posters-Device Security
 
Scouts-Internet-Safety.pptx
Scouts-Internet-Safety.pptxScouts-Internet-Safety.pptx
Scouts-Internet-Safety.pptx
 
Find Powerful Methods To Fight Against Cyber Threats?
Find Powerful Methods To Fight Against Cyber Threats?Find Powerful Methods To Fight Against Cyber Threats?
Find Powerful Methods To Fight Against Cyber Threats?
 
Law Firm & Legal Department Security & Practice In The Real World
Law Firm & Legal Department Security & Practice In The Real WorldLaw Firm & Legal Department Security & Practice In The Real World
Law Firm & Legal Department Security & Practice In The Real World
 
Stackfield Cloud Security 101
Stackfield Cloud Security 101Stackfield Cloud Security 101
Stackfield Cloud Security 101
 
datasheet-quickheal-total-securitypdf...
datasheet-quickheal-total-securitypdf...datasheet-quickheal-total-securitypdf...
datasheet-quickheal-total-securitypdf...
 
TheInternetDigitalSecurityfddreeere.pptx
TheInternetDigitalSecurityfddreeere.pptxTheInternetDigitalSecurityfddreeere.pptx
TheInternetDigitalSecurityfddreeere.pptx
 
Protecting Your Privacy: Cyberspace Security, Real World Safety
Protecting Your Privacy: Cyberspace Security, Real World SafetyProtecting Your Privacy: Cyberspace Security, Real World Safety
Protecting Your Privacy: Cyberspace Security, Real World Safety
 
Securing Mobile & Online Identity in the Cyber World
Securing Mobile & Online Identity in the Cyber WorldSecuring Mobile & Online Identity in the Cyber World
Securing Mobile & Online Identity in the Cyber World
 
Cyber Security School Workshop
Cyber Security School WorkshopCyber Security School Workshop
Cyber Security School Workshop
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Persentation
PersentationPersentation
Persentation
 

More from Data Hops

FREE A4 Cyber Security Awareness Posters-Phishing part 1
FREE A4 Cyber Security Awareness Posters-Phishing part 1FREE A4 Cyber Security Awareness Posters-Phishing part 1
FREE A4 Cyber Security Awareness Posters-Phishing part 1
Data Hops
 
FREE A4 Cyber Security Awareness Posters-Phishing part 2
FREE A4 Cyber Security Awareness  Posters-Phishing part 2FREE A4 Cyber Security Awareness  Posters-Phishing part 2
FREE A4 Cyber Security Awareness Posters-Phishing part 2
Data Hops
 
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
Data Hops
 
FREE Cyber Security Awareness Posters-Social Engineering part 2
FREE Cyber Security Awareness  Posters-Social Engineering part 2FREE Cyber Security Awareness  Posters-Social Engineering part 2
FREE Cyber Security Awareness Posters-Social Engineering part 2
Data Hops
 
Free A4 Cyber Security Awareness Posters-Social Engineering part 1
Free A4 Cyber Security Awareness Posters-Social Engineering part 1Free A4 Cyber Security Awareness Posters-Social Engineering part 1
Free A4 Cyber Security Awareness Posters-Social Engineering part 1
Data Hops
 
FREE A4 Cyber Security Awareness Posters-Passwords part 5
FREE A4 Cyber Security Awareness Posters-Passwords part 5FREE A4 Cyber Security Awareness Posters-Passwords part 5
FREE A4 Cyber Security Awareness Posters-Passwords part 5
Data Hops
 
A4 Cyber Security Awareness Posters-Password Security part 4
A4 Cyber Security Awareness Posters-Password Security part 4A4 Cyber Security Awareness Posters-Password Security part 4
A4 Cyber Security Awareness Posters-Password Security part 4
Data Hops
 
FREE A4 Cyber Security Awareness Posters-Password Security part 3
FREE A4 Cyber Security Awareness Posters-Password Security part 3FREE A4 Cyber Security Awareness Posters-Password Security part 3
FREE A4 Cyber Security Awareness Posters-Password Security part 3
Data Hops
 
FREE A4 Cyber Security Awareness Posters-Password Security part 2
FREE A4 Cyber Security Awareness Posters-Password Security part 2FREE A4 Cyber Security Awareness Posters-Password Security part 2
FREE A4 Cyber Security Awareness Posters-Password Security part 2
Data Hops
 
FREE A4 Data Security GDPR Posters-Data Protection part 4
FREE A4 Data Security GDPR Posters-Data Protection part 4FREE A4 Data Security GDPR Posters-Data Protection part 4
FREE A4 Data Security GDPR Posters-Data Protection part 4
Data Hops
 
FREE A4 Data Security GDPR Posters-Data Protection part 3
FREE A4 Data  Security GDPR Posters-Data Protection part 3FREE A4 Data  Security GDPR Posters-Data Protection part 3
FREE A4 Data Security GDPR Posters-Data Protection part 3
Data Hops
 
FREE A4 cyber Security awareness Posters-Data Protection -GDPR
FREE A4 cyber Security awareness  Posters-Data Protection -GDPRFREE A4 cyber Security awareness  Posters-Data Protection -GDPR
FREE A4 cyber Security awareness Posters-Data Protection -GDPR
Data Hops
 
FREE A4 Cyber Security awareness- Posters-Data Protection -GDPR
FREE A4 Cyber Security awareness- Posters-Data Protection -GDPRFREE A4 Cyber Security awareness- Posters-Data Protection -GDPR
FREE A4 Cyber Security awareness- Posters-Data Protection -GDPR
Data Hops
 
FREE A4 Cyber Security Awareness Posters-Removable Device
FREE A4  Cyber Security Awareness Posters-Removable DeviceFREE A4  Cyber Security Awareness Posters-Removable Device
FREE A4 Cyber Security Awareness Posters-Removable Device
Data Hops
 
Free Printable A4 Cyber Security Awareness Posters-Malware
Free Printable A4 Cyber Security Awareness Posters-MalwareFree Printable A4 Cyber Security Awareness Posters-Malware
Free Printable A4 Cyber Security Awareness Posters-Malware
Data Hops
 
FREE A4 Cyber Security Awareness Posters-Phishing
FREE A4 Cyber Security Awareness Posters-PhishingFREE A4 Cyber Security Awareness Posters-Phishing
FREE A4 Cyber Security Awareness Posters-Phishing
Data Hops
 
FREE A4 Cyber Security Awareness Posters-Social Engineering
FREE A4 Cyber Security Awareness Posters-Social EngineeringFREE A4 Cyber Security Awareness Posters-Social Engineering
FREE A4 Cyber Security Awareness Posters-Social Engineering
Data Hops
 
FREE A4 Cyber Security Awareness Posters-Data Privacy
FREE A4 Cyber Security Awareness Posters-Data PrivacyFREE A4 Cyber Security Awareness Posters-Data Privacy
FREE A4 Cyber Security Awareness Posters-Data Privacy
Data Hops
 
FREE A4 Cyber Security Awareness Posters-Passwords
FREE A4 Cyber Security Awareness Posters-PasswordsFREE A4 Cyber Security Awareness Posters-Passwords
FREE A4 Cyber Security Awareness Posters-Passwords
Data Hops
 
Free Digital Signage Cybersecurity Screensavers Part 1
Free  Digital Signage Cybersecurity Screensavers Part 1Free  Digital Signage Cybersecurity Screensavers Part 1
Free Digital Signage Cybersecurity Screensavers Part 1
Data Hops
 

More from Data Hops (20)

FREE A4 Cyber Security Awareness Posters-Phishing part 1
FREE A4 Cyber Security Awareness Posters-Phishing part 1FREE A4 Cyber Security Awareness Posters-Phishing part 1
FREE A4 Cyber Security Awareness Posters-Phishing part 1
 
FREE A4 Cyber Security Awareness Posters-Phishing part 2
FREE A4 Cyber Security Awareness  Posters-Phishing part 2FREE A4 Cyber Security Awareness  Posters-Phishing part 2
FREE A4 Cyber Security Awareness Posters-Phishing part 2
 
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
 
FREE Cyber Security Awareness Posters-Social Engineering part 2
FREE Cyber Security Awareness  Posters-Social Engineering part 2FREE Cyber Security Awareness  Posters-Social Engineering part 2
FREE Cyber Security Awareness Posters-Social Engineering part 2
 
Free A4 Cyber Security Awareness Posters-Social Engineering part 1
Free A4 Cyber Security Awareness Posters-Social Engineering part 1Free A4 Cyber Security Awareness Posters-Social Engineering part 1
Free A4 Cyber Security Awareness Posters-Social Engineering part 1
 
FREE A4 Cyber Security Awareness Posters-Passwords part 5
FREE A4 Cyber Security Awareness Posters-Passwords part 5FREE A4 Cyber Security Awareness Posters-Passwords part 5
FREE A4 Cyber Security Awareness Posters-Passwords part 5
 
A4 Cyber Security Awareness Posters-Password Security part 4
A4 Cyber Security Awareness Posters-Password Security part 4A4 Cyber Security Awareness Posters-Password Security part 4
A4 Cyber Security Awareness Posters-Password Security part 4
 
FREE A4 Cyber Security Awareness Posters-Password Security part 3
FREE A4 Cyber Security Awareness Posters-Password Security part 3FREE A4 Cyber Security Awareness Posters-Password Security part 3
FREE A4 Cyber Security Awareness Posters-Password Security part 3
 
FREE A4 Cyber Security Awareness Posters-Password Security part 2
FREE A4 Cyber Security Awareness Posters-Password Security part 2FREE A4 Cyber Security Awareness Posters-Password Security part 2
FREE A4 Cyber Security Awareness Posters-Password Security part 2
 
FREE A4 Data Security GDPR Posters-Data Protection part 4
FREE A4 Data Security GDPR Posters-Data Protection part 4FREE A4 Data Security GDPR Posters-Data Protection part 4
FREE A4 Data Security GDPR Posters-Data Protection part 4
 
FREE A4 Data Security GDPR Posters-Data Protection part 3
FREE A4 Data  Security GDPR Posters-Data Protection part 3FREE A4 Data  Security GDPR Posters-Data Protection part 3
FREE A4 Data Security GDPR Posters-Data Protection part 3
 
FREE A4 cyber Security awareness Posters-Data Protection -GDPR
FREE A4 cyber Security awareness  Posters-Data Protection -GDPRFREE A4 cyber Security awareness  Posters-Data Protection -GDPR
FREE A4 cyber Security awareness Posters-Data Protection -GDPR
 
FREE A4 Cyber Security awareness- Posters-Data Protection -GDPR
FREE A4 Cyber Security awareness- Posters-Data Protection -GDPRFREE A4 Cyber Security awareness- Posters-Data Protection -GDPR
FREE A4 Cyber Security awareness- Posters-Data Protection -GDPR
 
FREE A4 Cyber Security Awareness Posters-Removable Device
FREE A4  Cyber Security Awareness Posters-Removable DeviceFREE A4  Cyber Security Awareness Posters-Removable Device
FREE A4 Cyber Security Awareness Posters-Removable Device
 
Free Printable A4 Cyber Security Awareness Posters-Malware
Free Printable A4 Cyber Security Awareness Posters-MalwareFree Printable A4 Cyber Security Awareness Posters-Malware
Free Printable A4 Cyber Security Awareness Posters-Malware
 
FREE A4 Cyber Security Awareness Posters-Phishing
FREE A4 Cyber Security Awareness Posters-PhishingFREE A4 Cyber Security Awareness Posters-Phishing
FREE A4 Cyber Security Awareness Posters-Phishing
 
FREE A4 Cyber Security Awareness Posters-Social Engineering
FREE A4 Cyber Security Awareness Posters-Social EngineeringFREE A4 Cyber Security Awareness Posters-Social Engineering
FREE A4 Cyber Security Awareness Posters-Social Engineering
 
FREE A4 Cyber Security Awareness Posters-Data Privacy
FREE A4 Cyber Security Awareness Posters-Data PrivacyFREE A4 Cyber Security Awareness Posters-Data Privacy
FREE A4 Cyber Security Awareness Posters-Data Privacy
 
FREE A4 Cyber Security Awareness Posters-Passwords
FREE A4 Cyber Security Awareness Posters-PasswordsFREE A4 Cyber Security Awareness Posters-Passwords
FREE A4 Cyber Security Awareness Posters-Passwords
 
Free Digital Signage Cybersecurity Screensavers Part 1
Free  Digital Signage Cybersecurity Screensavers Part 1Free  Digital Signage Cybersecurity Screensavers Part 1
Free Digital Signage Cybersecurity Screensavers Part 1
 

Recently uploaded

QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
zjhamm304
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
Miro Wengner
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
DianaGray10
 
Discover the Unseen: Tailored Recommendation of Unwatched Content
Discover the Unseen: Tailored Recommendation of Unwatched ContentDiscover the Unseen: Tailored Recommendation of Unwatched Content
Discover the Unseen: Tailored Recommendation of Unwatched Content
ScyllaDB
 
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
AlexanderRichford
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
DianaGray10
 
From Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMsFrom Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMs
Sease
 
"What does it really mean for your system to be available, or how to define w...
"What does it really mean for your system to be available, or how to define w..."What does it really mean for your system to be available, or how to define w...
"What does it really mean for your system to be available, or how to define w...
Fwdays
 
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
"Scaling RAG Applications to serve millions of users",  Kevin Goedecke"Scaling RAG Applications to serve millions of users",  Kevin Goedecke
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
Fwdays
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving
 
A Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's ArchitectureA Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's Architecture
ScyllaDB
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
Fwdays
 
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid ResearchHarnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Neo4j
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
AstuteBusiness
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
c5vrf27qcz
 
What is an RPA CoE? Session 2 – CoE Roles
What is an RPA CoE?  Session 2 – CoE RolesWhat is an RPA CoE?  Session 2 – CoE Roles
What is an RPA CoE? Session 2 – CoE Roles
DianaGray10
 
AI in the Workplace Reskilling, Upskilling, and Future Work.pptx
AI in the Workplace Reskilling, Upskilling, and Future Work.pptxAI in the Workplace Reskilling, Upskilling, and Future Work.pptx
AI in the Workplace Reskilling, Upskilling, and Future Work.pptx
Sunil Jagani
 
Containers & AI - Beauty and the Beast!?!
Containers & AI - Beauty and the Beast!?!Containers & AI - Beauty and the Beast!?!
Containers & AI - Beauty and the Beast!?!
Tobias Schneck
 
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
DanBrown980551
 
Introducing BoxLang : A new JVM language for productivity and modularity!
Introducing BoxLang : A new JVM language for productivity and modularity!Introducing BoxLang : A new JVM language for productivity and modularity!
Introducing BoxLang : A new JVM language for productivity and modularity!
Ortus Solutions, Corp
 

Recently uploaded (20)

QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
 
Discover the Unseen: Tailored Recommendation of Unwatched Content
Discover the Unseen: Tailored Recommendation of Unwatched ContentDiscover the Unseen: Tailored Recommendation of Unwatched Content
Discover the Unseen: Tailored Recommendation of Unwatched Content
 
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
 
From Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMsFrom Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMs
 
"What does it really mean for your system to be available, or how to define w...
"What does it really mean for your system to be available, or how to define w..."What does it really mean for your system to be available, or how to define w...
"What does it really mean for your system to be available, or how to define w...
 
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
"Scaling RAG Applications to serve millions of users",  Kevin Goedecke"Scaling RAG Applications to serve millions of users",  Kevin Goedecke
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
 
A Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's ArchitectureA Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's Architecture
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
 
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid ResearchHarnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
 
What is an RPA CoE? Session 2 – CoE Roles
What is an RPA CoE?  Session 2 – CoE RolesWhat is an RPA CoE?  Session 2 – CoE Roles
What is an RPA CoE? Session 2 – CoE Roles
 
AI in the Workplace Reskilling, Upskilling, and Future Work.pptx
AI in the Workplace Reskilling, Upskilling, and Future Work.pptxAI in the Workplace Reskilling, Upskilling, and Future Work.pptx
AI in the Workplace Reskilling, Upskilling, and Future Work.pptx
 
Containers & AI - Beauty and the Beast!?!
Containers & AI - Beauty and the Beast!?!Containers & AI - Beauty and the Beast!?!
Containers & AI - Beauty and the Beast!?!
 
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
 
Introducing BoxLang : A new JVM language for productivity and modularity!
Introducing BoxLang : A new JVM language for productivity and modularity!Introducing BoxLang : A new JVM language for productivity and modularity!
Introducing BoxLang : A new JVM language for productivity and modularity!
 

FREE A4 Cyber Security Posters-Data Protection-GDPR

  • 1. ALWAYS SHRED LOCK THEM OUT datahops.com CYBER SECURITY AWARENESS DOCUMENTS IMPORTANT & PERSONAL
  • 2. PRINT IMPORTANT DOCUMENTS WORK ON THEM IN PUBLIC PLACES DON’T CYBER SECURITY AWARENESS datahops.com LOCK THEM OUT AND
  • 3. LOCK THEM OUT datahops.com CYBER SECURITY AWARENESS WHO’S LISTENING ? INFORMATION IN PUBLIC PLACES DON’T REVEAL SENSITIVE TO YOUR PHONE CALLS AND CONVERSATIONS
  • 4. LOCK THEM OUT datahops.com CYBER SECURITY AWARENESS Check your privacy settings to control who can see and access your profile, the way your data is used, collected and shared WHO WANTS TO KNOW? P R I VA T E
  • 5. LOCK THEM OUT datahops.com CYBER SECURITY AWARENESS SINK OR SWIM ? Avoid that sinking feeling. Do a regular backup of files in case of an unexpected occurrence. This can help you restore your files quickly and easily.
  • 6. Where is the Data? Cybersecurity awareness training datahops.com If you need it Protect it If you don’t delete it Keep Data Safe
  • 7. Where is the Data? Deleted data is still on the computer Did You know That Cybersecurity awareness training datahops.com You emptied the recycle bin but
  • 8. All is not lost! The only guaranteed way to repair your computer after a security incident is to Backup your files regularly - then erase and reinstall the system. How to Recover From a Disaster Cybersecurity awareness training datahops.com
  • 9. LOCK THEM OUT datahops.com CYBER SECURITY AWARENESS JUST BACK UP Backup your files and folders regularly using secure and authorised data storage devices or recognised cloud services
  • 10. LOCK THEM OUT datahops.com CYBER SECURITY AWARENESS IS PRICELESS PEACE OF MIND Turn on encryption to protect your files if your device gets lost or stolen. It cannot be accessed by anyone without the password or recovery key
  • 11. Cybersecurity awareness training datahops.com Encrypt Lock them up Lock them out to Cybersecurity awareness training datahops.com your Files Any sensitive or confidential data, should be encrypted.
  • 12. THE WALL IS ON FIRE Cybersecurity awareness training datahops.com Turn on the Firewall Protect Your Data
  • 13. Make Your Device Safe And Secure Turn on the firewall Install antivirus software Check security settings for operating system and browser Set up password protection Cybersecurity awareness training datahops.com
  • 14. Prevent Unauthorised Access Password Protect all your Devices If one is compromised, the criminals may be able to access all of your data through your cloud storage service provider Cybersecurity awareness training datahops.com
  • 15. SECURE YOUR LOCK THEM OUT datahops.com CYBER SECURITY AWARENESS WIRELESS NETWORK Change default Passwords Hackers are aware of the preset SSID and default password Enable WPA2 Encryption
  • 16. TURN OFF BLUETOOTH These can be exploited by hackers to eavesdrop, establish remote access controls, distribute malware and drain batteries! OUCH!! WHEN NOT IN USE Cybersecurity awareness training datahops.com Off Turn on Bluetooth to connect to nearby devices < Bluetooth
  • 17. Cybersecurity awareness training datahops.com Encrypt Cybersecurity awareness training datahops.com sensitive Data Prevent Unauthorized Persons From viewing or Accessing the Content
  • 18. Regular Backups Can prevent the loss of irreplaceable data. Cybersecurity awareness training datahops.com
  • 19. DATA USE POLICY How will the service provider: Collect your information WHAT HAPPENS TO YOU DATA Use your information Collect your information Cybersecurity awareness training datahops.com
  • 20. PRIVACY SETTINGS These settings allow you to say who can: See your information WHAT HAPPENS TO YOU DATA Access your information Access account data Cybersecurity awareness training datahops.com
  • 21. SECURITY POLICY How the company is protecting your data: Confidentiality WHAT HAPPENS TO YOU DATA Integrity Availability Cybersecurity awareness training datahops.com
  • 22. FAQ’s Can you request a copy of your data WHAT HAPPENS TO YOU DATA What can they do with the data you uploaded What happens to your data When you close your account Cybersecurity awareness training datahops.com Have you read the terms and conditions What are your rights over your data
  • 23. STOP PROTECT YOUR DATA Cybersecurity awareness training datahops.com ENCRYPT SENSITIVE DATA
  • 24. STOP Cybersecurity awareness training datahops.com PROTECT YOUR DATA USE STRONG PASSWORDS
  • 25. STOP Cybersecurity awareness training datahops.com PROTECT YOUR DATA BACKUP DATA REGULARLY
  • 26. STOP Cybersecurity awareness training datahops.com PROTECT YOUR DATA TURN ON FIREWALL
  • 27. STOP Cybersecurity awareness training datahops.com PROTECT YOUR DATA LOCK UP YOUR DEVICES