SlideShare a Scribd company logo
PERSONAL CYBER SAFETY
Oladeinde Kayode
LV 1 Speech 4
SURULERE TOASTMASTERS CLUB : District 94, Area F19
Digitally signed
by Kayode
Oladeinde
DN: C=NG,
OU=Surulere
Toastmasters,
O=Toastmaster
s International,
CN=Kayode
Oladeinde,
E=bishopbeeca
y@gmail.com
Reason: I am
the author of
this document
Location: LA
Date:
2020-07-19 22:
24:40
Foxit Reader
Version: 10.0.0
Kay
ode
Ola
dei
nde
Quote for thought
It takes 20 years to build a
reputation and few minutes of
cyber-incident to ruin it.”
― Stephane Nappo
Definition of Terms
And
Cyber
a combining word form
meaning “computer, "or
“computer network”
Safety
the condition of being
protected from
What is Cyber Safety?
•Cyber safety is trying to be safe on the internet and it
is the knowledge of maximizing the user's personal
safety and security risks to private information and
property associated with using the internet, and the
self-protection from computer crime (Wikipedia,
2020).
•Personal cyber safety is hence protecting self from
computer crime
Why do we need to be safe?
•Around 66% of the Nigerian population has an
internet connection today, More so the number of
internet users increased from about 126 million in the
last quarter of 2019 to over 136 million in the first
quarter of 2020 (NBS, 2020).
•With more users accessing the Internet through
mobile devices, the risk we face daily are changing
and growing quickly.
Why do we need to be safe?
•Being online exposes us to cyber criminals and
others who commit identity theft, fraud, and
harassment. ("Cyber Safety | CISA", 2019)
•Unsafe surfing can lead to threats from
embarrassing personal comments, images that once
online are nearly impossible to erase and getting
mixed up with people you'd rather have had nothing
to do with.
How can we be cyber safe?
Source: University of
Edinburg, BITS Magazine
Quote for thought
“Passwords are like underwear:
don’t let people see it, change it
very often, and you shouldn’t
share it with strangers.”
Chris Pirillo
Conclusion
“Technology trust is a good thing, but control is a
better one.”
Stephane Nappo
As a digital Citizen You need to be strategic and
intentional about your actions and inactions on
the World Wide Web, and must therefore take
caution, Don’t be the next victim of the ever
imminent Cyber Attack stay Cyber Safe
Personally.
References
• Cyber Safety | CISA. (n.d.). Cisa.Gov. Retrieved July 19, 2020, from
https://www.cisa.gov/cyber-safety
• Highton, M. (Ed.). (2017). BITS Magazine: Treat It like a Treasure (Issue
18). Information Services Group, The University of Edinburgh.
https://www.ed.ac.uk/files/atoms/files/bits_18_summer_2017_web_low_re
s.pdf
• Kaspersky. (2020, March 31). Top 10 Internet safety rules & what not to do
online. Kaspersky.Com. https://usa.kaspersky.com/resource-
center/preemptive-safety/top-10-internet-safety-rules-and-what-not-to-do-
online
• NBS. (2020). Telecoms Data: Active Voice and Internet per State, Porting
and Tariff Information, Q1 2020.
• Wikipedia contributors. (2020, June 25). Internet safety. Wikipedia, The
Free Encyclopedia.
https://en.wikipedia.org/w/index.php?title=Internet_safety&oldid=96449309
5
Thank you for Listening
Cyber Cautions 1 to 8
• Never click on a link you did not expect to receive
• Be cautious about adding new friends who you do not
personally know
• For existing friends or connections if in doubt of their true
identity or status kindly block or report the Individual
• Think before you share and how you share information,
Ask yourself the Grandma/Adult Question
• If you have a "wipe your phone" feature, you should set it
up
• Practice Safe Browsing,
• Ignore pop-ups
• Be wary of public Wi-Fi
Cyber Caution 9 to 17
• Run more than one email account each for a specific use
• Careful What You Download
• Don't store your card details on websites
• Enable two-step verification
• Keep Your Privacy Settings On, Lock down your Social Media
accoun
• Keep Personal Information Professional and Limited
• Be Careful Who You Meet Online
• Add a signature to your personal images
• Add an alert to your intellectual or personal data
Personal cyber safety

More Related Content

What's hot

Data Security in the Insurance Industry: what you need to know about data pro...
Data Security in the Insurance Industry: what you need to know about data pro...Data Security in the Insurance Industry: what you need to know about data pro...
Data Security in the Insurance Industry: what you need to know about data pro...
XeniT Solutions nv
 
how we design privacy for smart city and tech
how we design privacy for smart city and techhow we design privacy for smart city and tech
how we design privacy for smart city and tech
MomokoImamura
 
San Antonio Security Community
San Antonio Security CommunitySan Antonio Security Community
San Antonio Security Community
Denim Group
 
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition   Emile Monette GSAImproving Cybersecurity and Resilience Through Acquisition   Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
GovCloud Network
 
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
Santosh Khadsare
 
Singapore Cybersecurity Strategy and Legislation (for SMU Law School 2019)
Singapore Cybersecurity Strategy and Legislation (for SMU Law School 2019)Singapore Cybersecurity Strategy and Legislation (for SMU Law School 2019)
Singapore Cybersecurity Strategy and Legislation (for SMU Law School 2019)
Benjamin Ang
 
New developments in cyber law - Singapore and beyond
New developments in cyber law - Singapore and beyondNew developments in cyber law - Singapore and beyond
New developments in cyber law - Singapore and beyond
Benjamin Ang
 
Building internet safety wall understanding the imperatives of national domai...
Building internet safety wall understanding the imperatives of national domai...Building internet safety wall understanding the imperatives of national domai...
Building internet safety wall understanding the imperatives of national domai...
Commonwealth Telecommunications Organisation
 
Overview of national cybercrime strategies
Overview of national cybercrime strategiesOverview of national cybercrime strategies
Overview of national cybercrime strategies
Benjamin Ang
 
Development of National Cybersecurity Strategy and Organisation
Development of National Cybersecurity Strategy and OrganisationDevelopment of National Cybersecurity Strategy and Organisation
Development of National Cybersecurity Strategy and Organisation
Dr David Probert
 
National Cyber Security Policy-2013
National Cyber Security Policy-2013National Cyber Security Policy-2013
National Cyber Security Policy-2013
Vidushi Singh
 
CTO-Cybersecurity-Forum-2010-Peter Burnett
CTO-Cybersecurity-Forum-2010-Peter BurnettCTO-Cybersecurity-Forum-2010-Peter Burnett
CTO-Cybersecurity-Forum-2010-Peter Burnett
segughana
 
CTO-CyberSecurityForum-2010-Philip Victor
CTO-CyberSecurityForum-2010-Philip VictorCTO-CyberSecurityForum-2010-Philip Victor
CTO-CyberSecurityForum-2010-Philip Victor
segughana
 
Singapore Cybersecurity Strategy and Legislation (2018)
Singapore Cybersecurity Strategy and Legislation (2018)Singapore Cybersecurity Strategy and Legislation (2018)
Singapore Cybersecurity Strategy and Legislation (2018)
Benjamin Ang
 
Cybersecurity for Critical National Information Infrastructure
Cybersecurity for Critical National Information InfrastructureCybersecurity for Critical National Information Infrastructure
Cybersecurity for Critical National Information Infrastructure
Dr David Probert
 
Cybersecurity legislation in Singapore (2017)
Cybersecurity legislation in Singapore (2017)Cybersecurity legislation in Singapore (2017)
Cybersecurity legislation in Singapore (2017)
Benjamin Ang
 
Why Cisco-for-Security
Why Cisco-for-SecurityWhy Cisco-for-Security
Why Cisco-for-Security
E.S.G. JR. Consulting, Inc.
 
Singapore. industry 4.0 and cybersecurity
Singapore. industry 4.0 and cybersecurity Singapore. industry 4.0 and cybersecurity
Singapore. industry 4.0 and cybersecurity
Yuri Anisimov
 
National cyber security policy 2013
National cyber security policy  2013National cyber security policy  2013
National cyber security policy 2013
M P Keshava
 
Cyber Security and The Cloud
Cyber Security and The CloudCyber Security and The Cloud
Cyber Security and The Cloud
Laura Bedell-Pearce
 

What's hot (20)

Data Security in the Insurance Industry: what you need to know about data pro...
Data Security in the Insurance Industry: what you need to know about data pro...Data Security in the Insurance Industry: what you need to know about data pro...
Data Security in the Insurance Industry: what you need to know about data pro...
 
how we design privacy for smart city and tech
how we design privacy for smart city and techhow we design privacy for smart city and tech
how we design privacy for smart city and tech
 
San Antonio Security Community
San Antonio Security CommunitySan Antonio Security Community
San Antonio Security Community
 
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition   Emile Monette GSAImproving Cybersecurity and Resilience Through Acquisition   Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
 
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
 
Singapore Cybersecurity Strategy and Legislation (for SMU Law School 2019)
Singapore Cybersecurity Strategy and Legislation (for SMU Law School 2019)Singapore Cybersecurity Strategy and Legislation (for SMU Law School 2019)
Singapore Cybersecurity Strategy and Legislation (for SMU Law School 2019)
 
New developments in cyber law - Singapore and beyond
New developments in cyber law - Singapore and beyondNew developments in cyber law - Singapore and beyond
New developments in cyber law - Singapore and beyond
 
Building internet safety wall understanding the imperatives of national domai...
Building internet safety wall understanding the imperatives of national domai...Building internet safety wall understanding the imperatives of national domai...
Building internet safety wall understanding the imperatives of national domai...
 
Overview of national cybercrime strategies
Overview of national cybercrime strategiesOverview of national cybercrime strategies
Overview of national cybercrime strategies
 
Development of National Cybersecurity Strategy and Organisation
Development of National Cybersecurity Strategy and OrganisationDevelopment of National Cybersecurity Strategy and Organisation
Development of National Cybersecurity Strategy and Organisation
 
National Cyber Security Policy-2013
National Cyber Security Policy-2013National Cyber Security Policy-2013
National Cyber Security Policy-2013
 
CTO-Cybersecurity-Forum-2010-Peter Burnett
CTO-Cybersecurity-Forum-2010-Peter BurnettCTO-Cybersecurity-Forum-2010-Peter Burnett
CTO-Cybersecurity-Forum-2010-Peter Burnett
 
CTO-CyberSecurityForum-2010-Philip Victor
CTO-CyberSecurityForum-2010-Philip VictorCTO-CyberSecurityForum-2010-Philip Victor
CTO-CyberSecurityForum-2010-Philip Victor
 
Singapore Cybersecurity Strategy and Legislation (2018)
Singapore Cybersecurity Strategy and Legislation (2018)Singapore Cybersecurity Strategy and Legislation (2018)
Singapore Cybersecurity Strategy and Legislation (2018)
 
Cybersecurity for Critical National Information Infrastructure
Cybersecurity for Critical National Information InfrastructureCybersecurity for Critical National Information Infrastructure
Cybersecurity for Critical National Information Infrastructure
 
Cybersecurity legislation in Singapore (2017)
Cybersecurity legislation in Singapore (2017)Cybersecurity legislation in Singapore (2017)
Cybersecurity legislation in Singapore (2017)
 
Why Cisco-for-Security
Why Cisco-for-SecurityWhy Cisco-for-Security
Why Cisco-for-Security
 
Singapore. industry 4.0 and cybersecurity
Singapore. industry 4.0 and cybersecurity Singapore. industry 4.0 and cybersecurity
Singapore. industry 4.0 and cybersecurity
 
National cyber security policy 2013
National cyber security policy  2013National cyber security policy  2013
National cyber security policy 2013
 
Cyber Security and The Cloud
Cyber Security and The CloudCyber Security and The Cloud
Cyber Security and The Cloud
 

Similar to Personal cyber safety

What The Cyber Entails-1.pdf
What The Cyber Entails-1.pdfWhat The Cyber Entails-1.pdf
What The Cyber Entails-1.pdf
Chinatu Uzuegbu
 
Board-toolkit-Introduction-to-cyber-security-for-board-members-briefing-pack....
Board-toolkit-Introduction-to-cyber-security-for-board-members-briefing-pack....Board-toolkit-Introduction-to-cyber-security-for-board-members-briefing-pack....
Board-toolkit-Introduction-to-cyber-security-for-board-members-briefing-pack....
zayadeen2003
 
Cyber security awareness - iWeek2017
Cyber security awareness  - iWeek2017Cyber security awareness  - iWeek2017
Cyber security awareness - iWeek2017
dotZADNA
 
Must Know Cyber Security Stats of 2016
Must Know Cyber Security Stats of 2016Must Know Cyber Security Stats of 2016
Must Know Cyber Security Stats of 2016
DWP Information Architects Inc.
 
The importance of understanding the global cybersecurity index
The importance of understanding the global cybersecurity indexThe importance of understanding the global cybersecurity index
The importance of understanding the global cybersecurity index
ShivamSharma909
 
Achieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyAchieving Caribbean Cybersecuirty
Achieving Caribbean Cybersecuirty
Shiva Bissessar
 
Cyber Security and possible cyber attacks in organizations
Cyber Security and possible cyber attacks in organizations Cyber Security and possible cyber attacks in organizations
Cyber Security and possible cyber attacks in organizations
Robin Sedeqi
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
Ben Liu
 
India and its wall of data security
India and its wall of data securityIndia and its wall of data security
India and its wall of data security
Ashish Jhalani
 
India and Its Wall of Data Security
India and Its Wall of Data SecurityIndia and Its Wall of Data Security
India and Its Wall of Data Security
eTailing India
 
Emerging Cyber Security Opportunity in India
Emerging Cyber Security Opportunity in IndiaEmerging Cyber Security Opportunity in India
Emerging Cyber Security Opportunity in India
Sam Ghosh
 
CYBER CRIME and security prevention.pptx
CYBER CRIME and security prevention.pptxCYBER CRIME and security prevention.pptx
CYBER CRIME and security prevention.pptx
padhand000
 
Top Cyber News MAGAZINE. Troels Oerting
Top Cyber News MAGAZINE. Troels Oerting Top Cyber News MAGAZINE. Troels Oerting
Top Cyber News MAGAZINE. Troels Oerting
TopCyberNewsMAGAZINE
 
Cyber Landscape in the Philippines.pptx
Cyber Landscape in the Philippines.pptxCyber Landscape in the Philippines.pptx
Cyber Landscape in the Philippines.pptx
ACAD1ITG
 
Cyber Security.pptx
Cyber Security.pptxCyber Security.pptx
Cyber Security.pptx
NavanathDarwante1
 
Digital Age-Preparing Yourself
Digital Age-Preparing YourselfDigital Age-Preparing Yourself
Digital Age-Preparing Yourself
jkl0202
 
The Top Five Cybersecurity Threats for 2018
The Top Five Cybersecurity Threats for 2018The Top Five Cybersecurity Threats for 2018
The Top Five Cybersecurity Threats for 2018
CheapSSLsecurity
 
Presenting and persuading with data
Presenting and persuading with dataPresenting and persuading with data
Presenting and persuading with data
Estrella Spaans
 
Overcoming the cybersecurity challenges of smart cities
Overcoming the cybersecurity challenges of smart citiesOvercoming the cybersecurity challenges of smart cities
Overcoming the cybersecurity challenges of smart cities
Saeed Al Dhaheri
 
Irjet v5 i1268
Irjet v5 i1268Irjet v5 i1268
Irjet v5 i1268
xosap
 

Similar to Personal cyber safety (20)

What The Cyber Entails-1.pdf
What The Cyber Entails-1.pdfWhat The Cyber Entails-1.pdf
What The Cyber Entails-1.pdf
 
Board-toolkit-Introduction-to-cyber-security-for-board-members-briefing-pack....
Board-toolkit-Introduction-to-cyber-security-for-board-members-briefing-pack....Board-toolkit-Introduction-to-cyber-security-for-board-members-briefing-pack....
Board-toolkit-Introduction-to-cyber-security-for-board-members-briefing-pack....
 
Cyber security awareness - iWeek2017
Cyber security awareness  - iWeek2017Cyber security awareness  - iWeek2017
Cyber security awareness - iWeek2017
 
Must Know Cyber Security Stats of 2016
Must Know Cyber Security Stats of 2016Must Know Cyber Security Stats of 2016
Must Know Cyber Security Stats of 2016
 
The importance of understanding the global cybersecurity index
The importance of understanding the global cybersecurity indexThe importance of understanding the global cybersecurity index
The importance of understanding the global cybersecurity index
 
Achieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyAchieving Caribbean Cybersecuirty
Achieving Caribbean Cybersecuirty
 
Cyber Security and possible cyber attacks in organizations
Cyber Security and possible cyber attacks in organizations Cyber Security and possible cyber attacks in organizations
Cyber Security and possible cyber attacks in organizations
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
India and its wall of data security
India and its wall of data securityIndia and its wall of data security
India and its wall of data security
 
India and Its Wall of Data Security
India and Its Wall of Data SecurityIndia and Its Wall of Data Security
India and Its Wall of Data Security
 
Emerging Cyber Security Opportunity in India
Emerging Cyber Security Opportunity in IndiaEmerging Cyber Security Opportunity in India
Emerging Cyber Security Opportunity in India
 
CYBER CRIME and security prevention.pptx
CYBER CRIME and security prevention.pptxCYBER CRIME and security prevention.pptx
CYBER CRIME and security prevention.pptx
 
Top Cyber News MAGAZINE. Troels Oerting
Top Cyber News MAGAZINE. Troels Oerting Top Cyber News MAGAZINE. Troels Oerting
Top Cyber News MAGAZINE. Troels Oerting
 
Cyber Landscape in the Philippines.pptx
Cyber Landscape in the Philippines.pptxCyber Landscape in the Philippines.pptx
Cyber Landscape in the Philippines.pptx
 
Cyber Security.pptx
Cyber Security.pptxCyber Security.pptx
Cyber Security.pptx
 
Digital Age-Preparing Yourself
Digital Age-Preparing YourselfDigital Age-Preparing Yourself
Digital Age-Preparing Yourself
 
The Top Five Cybersecurity Threats for 2018
The Top Five Cybersecurity Threats for 2018The Top Five Cybersecurity Threats for 2018
The Top Five Cybersecurity Threats for 2018
 
Presenting and persuading with data
Presenting and persuading with dataPresenting and persuading with data
Presenting and persuading with data
 
Overcoming the cybersecurity challenges of smart cities
Overcoming the cybersecurity challenges of smart citiesOvercoming the cybersecurity challenges of smart cities
Overcoming the cybersecurity challenges of smart cities
 
Irjet v5 i1268
Irjet v5 i1268Irjet v5 i1268
Irjet v5 i1268
 

Recently uploaded

办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
xjq03c34
 
HijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process HollowingHijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process Hollowing
Donato Onofri
 
Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
Paul Walk
 
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
rtunex8r
 
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
3a0sd7z3
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
davidjhones387
 
Bengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal BrandingBengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal Branding
Tarandeep Singh
 
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
3a0sd7z3
 
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
k4ncd0z
 
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
APNIC
 
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
APNIC
 
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
thezot
 

Recently uploaded (12)

办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
 
HijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process HollowingHijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process Hollowing
 
Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
 
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
 
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
 
Bengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal BrandingBengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal Branding
 
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
 
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
 
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
 
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
 
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
 

Personal cyber safety

  • 1. PERSONAL CYBER SAFETY Oladeinde Kayode LV 1 Speech 4 SURULERE TOASTMASTERS CLUB : District 94, Area F19 Digitally signed by Kayode Oladeinde DN: C=NG, OU=Surulere Toastmasters, O=Toastmaster s International, CN=Kayode Oladeinde, E=bishopbeeca y@gmail.com Reason: I am the author of this document Location: LA Date: 2020-07-19 22: 24:40 Foxit Reader Version: 10.0.0 Kay ode Ola dei nde
  • 2. Quote for thought It takes 20 years to build a reputation and few minutes of cyber-incident to ruin it.” ― Stephane Nappo
  • 3. Definition of Terms And Cyber a combining word form meaning “computer, "or “computer network” Safety the condition of being protected from
  • 4. What is Cyber Safety? •Cyber safety is trying to be safe on the internet and it is the knowledge of maximizing the user's personal safety and security risks to private information and property associated with using the internet, and the self-protection from computer crime (Wikipedia, 2020). •Personal cyber safety is hence protecting self from computer crime
  • 5. Why do we need to be safe? •Around 66% of the Nigerian population has an internet connection today, More so the number of internet users increased from about 126 million in the last quarter of 2019 to over 136 million in the first quarter of 2020 (NBS, 2020). •With more users accessing the Internet through mobile devices, the risk we face daily are changing and growing quickly.
  • 6. Why do we need to be safe? •Being online exposes us to cyber criminals and others who commit identity theft, fraud, and harassment. ("Cyber Safety | CISA", 2019) •Unsafe surfing can lead to threats from embarrassing personal comments, images that once online are nearly impossible to erase and getting mixed up with people you'd rather have had nothing to do with.
  • 7. How can we be cyber safe? Source: University of Edinburg, BITS Magazine
  • 8. Quote for thought “Passwords are like underwear: don’t let people see it, change it very often, and you shouldn’t share it with strangers.” Chris Pirillo
  • 9. Conclusion “Technology trust is a good thing, but control is a better one.” Stephane Nappo As a digital Citizen You need to be strategic and intentional about your actions and inactions on the World Wide Web, and must therefore take caution, Don’t be the next victim of the ever imminent Cyber Attack stay Cyber Safe Personally.
  • 10. References • Cyber Safety | CISA. (n.d.). Cisa.Gov. Retrieved July 19, 2020, from https://www.cisa.gov/cyber-safety • Highton, M. (Ed.). (2017). BITS Magazine: Treat It like a Treasure (Issue 18). Information Services Group, The University of Edinburgh. https://www.ed.ac.uk/files/atoms/files/bits_18_summer_2017_web_low_re s.pdf • Kaspersky. (2020, March 31). Top 10 Internet safety rules & what not to do online. Kaspersky.Com. https://usa.kaspersky.com/resource- center/preemptive-safety/top-10-internet-safety-rules-and-what-not-to-do- online • NBS. (2020). Telecoms Data: Active Voice and Internet per State, Porting and Tariff Information, Q1 2020. • Wikipedia contributors. (2020, June 25). Internet safety. Wikipedia, The Free Encyclopedia. https://en.wikipedia.org/w/index.php?title=Internet_safety&oldid=96449309 5
  • 11. Thank you for Listening
  • 12. Cyber Cautions 1 to 8 • Never click on a link you did not expect to receive • Be cautious about adding new friends who you do not personally know • For existing friends or connections if in doubt of their true identity or status kindly block or report the Individual • Think before you share and how you share information, Ask yourself the Grandma/Adult Question • If you have a "wipe your phone" feature, you should set it up • Practice Safe Browsing, • Ignore pop-ups • Be wary of public Wi-Fi
  • 13. Cyber Caution 9 to 17 • Run more than one email account each for a specific use • Careful What You Download • Don't store your card details on websites • Enable two-step verification • Keep Your Privacy Settings On, Lock down your Social Media accoun • Keep Personal Information Professional and Limited • Be Careful Who You Meet Online • Add a signature to your personal images • Add an alert to your intellectual or personal data