SlideShare a Scribd company logo
Cyber Security, Data
and Travelling
HOW TO KEEP PERSONAL DATA SAFE WHILE TRAVELLING
Introduction: Who are the targets?
 Travellers are easy targets for identity thieves, especially during peak travel
times.
 Identity theft can happen anywhere in the world, and thieves across the
globe use the same technology.
 In 2016, 15.4 million Americans were victims of identity theft.
 Globally, nearly 1 in 3 consumers has been victimised by card fraud
How can you keep your data safe?
 Use ATMs at banks only
 Approach public computers with caution
 Beware of free Wi-Fi
 Review statements regularly
 Refrain from posting personal details on social media
 Scan copies of personal documents
 Ditch unneeded documents, papers and extra cards
Use ATMs at banks only
 Credit card skimmers use a small device to steal credit card information in
what appears to be a legitimate transaction.
 The skimmer can be attached to ATMs, and captures all the details stored
in the card's magnetic strip when it is swiped through the device.
 Experts advise travellers to use official bank ATMs instead of private ones
like those found at convenience stores, on street corners or in hotels.
Approach public computers with
caution
 Travellers flock to public computers at libraries, internet cafés and hotel
lobbies to access email, bank statements and social media quickly and
cheaply.
 However, these activities expose them to potential cyber threats. A public
computer is a fertile ground for identity theft.
 Public PCs are controlled by a third party, who could have installed
spyware or malicious software that records keystrokes and every website
username and password typed in.
 If a public computer is the only option available, travellers should delete
search histories after use, avoid logging into financial accounts and never
save passwords or use the auto-save function.
Beware of free Wi-Fi
 Connecting to a free Wi-Fi hotspot at airports, hotels and cafés is
appealing to travellers looking to save money on data costs, but
unsecured networks pose a serious risk in terms of cyber-attacks.
 1 in 5 tourists is likely to get hacked while browsing the web on a public
Wi-Fi network.
 Public hotspots have limited security, and are extremely accessible to
hackers looking to steal a user's card details, personal identity or financial
information.
 Travellers can keep their data safe by primarily using VPNs, which provide
an encrypted tunnel to the internet and a new IP address, so no one can
spy on their internet activity or steal data when they use an unsecured
network.
Review statements regularly
 No one wants to spend precious vacation days poring over financial
statements, but staying vigilant is the best defence against card fraud.
 Sign up for alerts with each credit card account to get instant emails (or
texts) when a transaction is made from your account.
 This makes it very easy to spot potentially fraudulent charges as soon as
they occur.
 Travel with at least two cards, so there is a backup in the event that one
card becomes compromised and must be put on hold.
Refrain from posting personal details
on social media
 Avoid posting about your trip on social media, as this could alert thieves
that no one is home and expose you to potential break-ins.
 Avoid posting pictures of boarding passes on Facebook or Instagram.
 Boarding documents contain sensitive information, including the person's
name, frequent flyer account and flight confirmation number.
 Consumers aren't thinking about theft when sharing a happy moment,
but letting their guard down can compromise personal data very quickly.
Scan copies of personal documents
 Though fraud is occurring online at an alarming rate these days,
pickpocketing and theft from hotel rooms are still real threats for
travellers.
 Scan copies of all personal documents and credit or bank cards in the
event a wallet or purse is lost or stolen.
 This helps travellers identify which cards are missing and whom to call to
freeze the account immediately.
Ditch unneeded documents, papers
and extra cards
 Travellers should remove any documents or papers that may contain
sensitive information from their wallets before heading out on a trip.
 Ditch drug prescriptions, old memos, business cards, expired documents
and extra credit or store cards.
Identity theft and cyber crime
Major identity theft cases in USA
For more information visit our website
http://cybersense-world.com/
Attend CyberSense World 2017, Kuwait
References
 Graph: Insurance Information Institute
 Image 1: Master Class Fraud- Potts Lawyer
 Image 2: Living in Grand Cayman
 Data: US News & World Report

More Related Content

What's hot

Phishing
PhishingPhishing
Phishing
Ajit Yadav
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
harpinderkaur123
 
P H I S H I N G
P H I S H I N GP H I S H I N G
P H I S H I N G
bensonoo
 
The Phishing Ecosystem
The Phishing EcosystemThe Phishing Ecosystem
The Phishing Ecosystem
amiable_indian
 
phishing and pharming - evil twins
phishing and pharming - evil twinsphishing and pharming - evil twins
phishing and pharming - evil twins
Nilantha Piyasiri
 
Phishing
PhishingPhishing
Phishing attack
Phishing attackPhishing attack
Phishing attack
Raghav Chhabra
 
Phishing attack till now
Phishing attack till nowPhishing attack till now
Phishing attack till now
elakkiya poongunran
 
Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks
Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks
Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks
Er. Rahul Jain
 
MatahariMall.com - Jiwasraya Knowledge Sharing
MatahariMall.com - Jiwasraya Knowledge SharingMatahariMall.com - Jiwasraya Knowledge Sharing
MatahariMall.com - Jiwasraya Knowledge Sharing
Rendra Perdana Satria
 
Strategies to handle Phishing attacks
Strategies to handle Phishing attacksStrategies to handle Phishing attacks
Strategies to handle Phishing attacks
Sreejith.D. Menon
 
Anatomy of a Spear Phishing Attack
Anatomy of a Spear Phishing AttackAnatomy of a Spear Phishing Attack
Anatomy of a Spear Phishing Attack
Mark Mair
 
Spear phishing attacks-by-hari_krishna
Spear phishing attacks-by-hari_krishnaSpear phishing attacks-by-hari_krishna
Spear phishing attacks-by-hari_krishnaRaghunath G
 
Spear Phishing 101
Spear Phishing 101Spear Phishing 101
Spear Phishing 101
Sendio
 
Spear Phishing
Spear PhishingSpear Phishing
Spear Phishing
- Mark - Fullbright
 
Introduction to security
Introduction to securityIntroduction to security
Introduction to security
Mostafa Elgamala
 

What's hot (19)

Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
Phishing
PhishingPhishing
Phishing
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
P H I S H I N G
P H I S H I N GP H I S H I N G
P H I S H I N G
 
Seminar
SeminarSeminar
Seminar
 
The Phishing Ecosystem
The Phishing EcosystemThe Phishing Ecosystem
The Phishing Ecosystem
 
phishing and pharming - evil twins
phishing and pharming - evil twinsphishing and pharming - evil twins
phishing and pharming - evil twins
 
Phishing
PhishingPhishing
Phishing
 
Phishing attack
Phishing attackPhishing attack
Phishing attack
 
Phishing attack till now
Phishing attack till nowPhishing attack till now
Phishing attack till now
 
Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks
Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks
Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks
 
MatahariMall.com - Jiwasraya Knowledge Sharing
MatahariMall.com - Jiwasraya Knowledge SharingMatahariMall.com - Jiwasraya Knowledge Sharing
MatahariMall.com - Jiwasraya Knowledge Sharing
 
Strategies to handle Phishing attacks
Strategies to handle Phishing attacksStrategies to handle Phishing attacks
Strategies to handle Phishing attacks
 
Anatomy of a Spear Phishing Attack
Anatomy of a Spear Phishing AttackAnatomy of a Spear Phishing Attack
Anatomy of a Spear Phishing Attack
 
Spear phishing attacks-by-hari_krishna
Spear phishing attacks-by-hari_krishnaSpear phishing attacks-by-hari_krishna
Spear phishing attacks-by-hari_krishna
 
Phishing
PhishingPhishing
Phishing
 
Spear Phishing 101
Spear Phishing 101Spear Phishing 101
Spear Phishing 101
 
Spear Phishing
Spear PhishingSpear Phishing
Spear Phishing
 
Introduction to security
Introduction to securityIntroduction to security
Introduction to security
 

Similar to Protect your data while travelling

Tips to secure yourself from identity thefts
Tips to secure yourself from identity theftsTips to secure yourself from identity thefts
Tips to secure yourself from identity thefts
weblinkindia1
 
PurchasingB2B - Mistaken Identity - October 2016
PurchasingB2B - Mistaken Identity - October 2016PurchasingB2B - Mistaken Identity - October 2016
PurchasingB2B - Mistaken Identity - October 2016Paige Schaffer
 
Identity theft in the internet
Identity theft in the internetIdentity theft in the internet
Identity theft in the internet
mohmd-kutbi
 
Youth Protection Guide - Canada
Youth Protection Guide - CanadaYouth Protection Guide - Canada
Youth Protection Guide - Canada
- Mark - Fullbright
 
Identity Fraud Precautions
Identity Fraud PrecautionsIdentity Fraud Precautions
Identity Fraud Precautions
quentinz52
 
Identity Fraud Precautions
Identity Fraud PrecautionsIdentity Fraud Precautions
Identity Fraud Precautions
quentinz52
 
Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things
The Center for Identity
 
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptx
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptxInternet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptx
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptx
Internet 2Conf
 
Mobile Wallet Services Protection
Mobile Wallet Services ProtectionMobile Wallet Services Protection
Mobile Wallet Services Protection
- Mark - Fullbright
 
Cyber Law (Identity Theft)
Cyber Law (Identity Theft)Cyber Law (Identity Theft)
Cyber Law (Identity Theft)Jermaine Smith
 
Cyber law (identity theft)
Cyber law (identity theft)Cyber law (identity theft)
Cyber law (identity theft)
Jermaine Smith
 
Digital Identity:Threats and Prevention
Digital Identity:Threats and PreventionDigital Identity:Threats and Prevention
Digital Identity:Threats and Prevention
Quatrro Processing Services (QPS)
 
Identity Theft: The Other You
Identity Theft: The Other YouIdentity Theft: The Other You
Identity Theft: The Other You
- Mark - Fullbright
 
Identity Theft and You
Identity Theft and YouIdentity Theft and You
Identity Theft and You
- Mark - Fullbright
 
ID Theft Prevention
ID Theft PreventionID Theft Prevention
ID Theft PreventionOremDPS
 
Identity Theft: Evolving with Technology
Identity Theft: Evolving with TechnologyIdentity Theft: Evolving with Technology
Identity Theft: Evolving with Technology
- Mark - Fullbright
 
Identity Fraud Precautions
Identity Fraud PrecautionsIdentity Fraud Precautions
Identity Fraud Precautions
TwinVasion
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
Maria Taylor
 
exper advice
exper adviceexper advice
exper advice
Hakki Aydin Ucar
 

Similar to Protect your data while travelling (20)

Tips to secure yourself from identity thefts
Tips to secure yourself from identity theftsTips to secure yourself from identity thefts
Tips to secure yourself from identity thefts
 
PurchasingB2B - Mistaken Identity - October 2016
PurchasingB2B - Mistaken Identity - October 2016PurchasingB2B - Mistaken Identity - October 2016
PurchasingB2B - Mistaken Identity - October 2016
 
Identity theft in the internet
Identity theft in the internetIdentity theft in the internet
Identity theft in the internet
 
Youth Protection Guide - Canada
Youth Protection Guide - CanadaYouth Protection Guide - Canada
Youth Protection Guide - Canada
 
Identity Theft ppt
Identity Theft pptIdentity Theft ppt
Identity Theft ppt
 
Identity Fraud Precautions
Identity Fraud PrecautionsIdentity Fraud Precautions
Identity Fraud Precautions
 
Identity Fraud Precautions
Identity Fraud PrecautionsIdentity Fraud Precautions
Identity Fraud Precautions
 
Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things
 
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptx
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptxInternet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptx
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptx
 
Mobile Wallet Services Protection
Mobile Wallet Services ProtectionMobile Wallet Services Protection
Mobile Wallet Services Protection
 
Cyber Law (Identity Theft)
Cyber Law (Identity Theft)Cyber Law (Identity Theft)
Cyber Law (Identity Theft)
 
Cyber law (identity theft)
Cyber law (identity theft)Cyber law (identity theft)
Cyber law (identity theft)
 
Digital Identity:Threats and Prevention
Digital Identity:Threats and PreventionDigital Identity:Threats and Prevention
Digital Identity:Threats and Prevention
 
Identity Theft: The Other You
Identity Theft: The Other YouIdentity Theft: The Other You
Identity Theft: The Other You
 
Identity Theft and You
Identity Theft and YouIdentity Theft and You
Identity Theft and You
 
ID Theft Prevention
ID Theft PreventionID Theft Prevention
ID Theft Prevention
 
Identity Theft: Evolving with Technology
Identity Theft: Evolving with TechnologyIdentity Theft: Evolving with Technology
Identity Theft: Evolving with Technology
 
Identity Fraud Precautions
Identity Fraud PrecautionsIdentity Fraud Precautions
Identity Fraud Precautions
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
 
exper advice
exper adviceexper advice
exper advice
 

Recently uploaded

APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Brad Spiegel Macon GA
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
Javier Lasa
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
laozhuseo02
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
natyesu
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
laozhuseo02
 
Comptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guideComptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guide
GTProductions1
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
ufdana
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
keoku
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
nirahealhty
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
Rogerio Filho
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
Gal Baras
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Sanjeev Rampal
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
3ipehhoa
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
JungkooksNonexistent
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
3ipehhoa
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
3ipehhoa
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
eutxy
 
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptxInternet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
VivekSinghShekhawat2
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
JeyaPerumal1
 

Recently uploaded (20)

APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
 
Comptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guideComptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guide
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
 
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptxInternet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
 

Protect your data while travelling

  • 1. Cyber Security, Data and Travelling HOW TO KEEP PERSONAL DATA SAFE WHILE TRAVELLING
  • 2. Introduction: Who are the targets?  Travellers are easy targets for identity thieves, especially during peak travel times.  Identity theft can happen anywhere in the world, and thieves across the globe use the same technology.  In 2016, 15.4 million Americans were victims of identity theft.  Globally, nearly 1 in 3 consumers has been victimised by card fraud
  • 3. How can you keep your data safe?  Use ATMs at banks only  Approach public computers with caution  Beware of free Wi-Fi  Review statements regularly  Refrain from posting personal details on social media  Scan copies of personal documents  Ditch unneeded documents, papers and extra cards
  • 4. Use ATMs at banks only  Credit card skimmers use a small device to steal credit card information in what appears to be a legitimate transaction.  The skimmer can be attached to ATMs, and captures all the details stored in the card's magnetic strip when it is swiped through the device.  Experts advise travellers to use official bank ATMs instead of private ones like those found at convenience stores, on street corners or in hotels.
  • 5. Approach public computers with caution  Travellers flock to public computers at libraries, internet cafés and hotel lobbies to access email, bank statements and social media quickly and cheaply.  However, these activities expose them to potential cyber threats. A public computer is a fertile ground for identity theft.  Public PCs are controlled by a third party, who could have installed spyware or malicious software that records keystrokes and every website username and password typed in.  If a public computer is the only option available, travellers should delete search histories after use, avoid logging into financial accounts and never save passwords or use the auto-save function.
  • 6. Beware of free Wi-Fi  Connecting to a free Wi-Fi hotspot at airports, hotels and cafés is appealing to travellers looking to save money on data costs, but unsecured networks pose a serious risk in terms of cyber-attacks.  1 in 5 tourists is likely to get hacked while browsing the web on a public Wi-Fi network.  Public hotspots have limited security, and are extremely accessible to hackers looking to steal a user's card details, personal identity or financial information.  Travellers can keep their data safe by primarily using VPNs, which provide an encrypted tunnel to the internet and a new IP address, so no one can spy on their internet activity or steal data when they use an unsecured network.
  • 7. Review statements regularly  No one wants to spend precious vacation days poring over financial statements, but staying vigilant is the best defence against card fraud.  Sign up for alerts with each credit card account to get instant emails (or texts) when a transaction is made from your account.  This makes it very easy to spot potentially fraudulent charges as soon as they occur.  Travel with at least two cards, so there is a backup in the event that one card becomes compromised and must be put on hold.
  • 8. Refrain from posting personal details on social media  Avoid posting about your trip on social media, as this could alert thieves that no one is home and expose you to potential break-ins.  Avoid posting pictures of boarding passes on Facebook or Instagram.  Boarding documents contain sensitive information, including the person's name, frequent flyer account and flight confirmation number.  Consumers aren't thinking about theft when sharing a happy moment, but letting their guard down can compromise personal data very quickly.
  • 9. Scan copies of personal documents  Though fraud is occurring online at an alarming rate these days, pickpocketing and theft from hotel rooms are still real threats for travellers.  Scan copies of all personal documents and credit or bank cards in the event a wallet or purse is lost or stolen.  This helps travellers identify which cards are missing and whom to call to freeze the account immediately.
  • 10. Ditch unneeded documents, papers and extra cards  Travellers should remove any documents or papers that may contain sensitive information from their wallets before heading out on a trip.  Ditch drug prescriptions, old memos, business cards, expired documents and extra credit or store cards.
  • 11. Identity theft and cyber crime
  • 12. Major identity theft cases in USA
  • 13. For more information visit our website http://cybersense-world.com/ Attend CyberSense World 2017, Kuwait
  • 14. References  Graph: Insurance Information Institute  Image 1: Master Class Fraud- Potts Lawyer  Image 2: Living in Grand Cayman  Data: US News & World Report