SlideShare a Scribd company logo
Understanding threats in social media
September 2019
Cyber 101© 2019 Deloitte & Touche Enterprise Risk Services Pte Ltd 2
Overview
As we become increasingly connected via digital spaces and share more of our lives and information over social media,
we inevitably become more vulnerable to targeted cyber risks.
According to the 2019 Study on Social Media Privacy and Security Concerns conducted by ID Experts, majority of
adults are using one or more social media platforms at least once per day and are concerned about their security and
privacy on social media.
Understanding threats in social media
Cyber 101© 2019 Deloitte & Touche Enterprise Risk Services Pte Ltd 3
In-depth look: Social media consumption by platform
Findings indicate that Facebook is the most popular social media platform among adults.
https://www.idexpertscorp.com/knowledge-center/single/2019-study-on-social-media-privacy-and-security-concerns
Understanding threats in social media
Cyber 101© 2019 Deloitte & Touche Enterprise Risk Services Pte Ltd 4
Survey findings: How concerned are you?
Out of which, 2 in 5 respondents are very concerned about their privacy or security on Facebook.
https://www.idexpertscorp.com/knowledge-center/single/2019-study-on-social-media-privacy-and-security-concerns
Understanding threats in social media
Cyber 101© 2019 Deloitte & Touche Enterprise Risk Services Pte Ltd 5
Survey findings: Termination of social media due to concerns?
1 in 5 respondents have stopped using Facebook as a result of privacy and security concerns.
https://www.idexpertscorp.com/knowledge-center/single/2019-study-on-social-media-privacy-and-security-concerns
Understanding threats in social media
Cyber 101© 2019 Deloitte & Touche Enterprise Risk Services Pte Ltd 6
The threats lurking on social media
The fears surrounding privacy and security are not
unfounded.
With social media so closely interwoven into our
everyday lives, it has become a prime target for
cybercrimes and exploitations.
We will explore the four key areas of risks and the
ways in which you can protect yourself from them:
1) Data breaches
2) Phishing and malware
3) Catfishing and deception
4) Cyberbullying
Understanding threats in social media
Cyber 101© 2019 Deloitte & Touche Enterprise Risk Services Pte Ltd 7
According to Gemalto's latest Breach Level Index, a global database of public data breaches, social media incidents accounted for
over 56% of the 4.5 billion data records compromised worldwide in the first half of 2018.
Here are some well-known cases of data breaches that have occurred in social media giants:
1) Data breaches
Understanding threats in social media
Facebook’s code vulnerability affected
50 million users, potentially exposing
personal information and enabling
hackers to take control of user profiles.
(Source)
Google+ shuts down following a glitch
through which external developers
were able to access the data of over
500,000 users.
(Source)
Instagram breach exposes personal
contact information of 350,000
influencers.
(Source)
How to protect yourself?
• While such attacks are beyond users’ control, turning on two-factor authentication limits your exposure. Even
if someone has your password, they cannot access your account without a unique code verification sent by a text,
call or email.
• Conduct a device audit once you know of a breach, and remove devices you do not recognise from being logged
in to your account.
Cyber 101© 2019 Deloitte & Touche Enterprise Risk Services Pte Ltd 8
2) Phishing and malware
Phishing occurs when cyber criminals employ social
engineering techniques to trick users into clicking
deceptive links to download malware (short for malicious
software).
On social media, such deceptive links often appear in the
form of unbelievable news, giveaways and shocking
videos.
Cyber criminals may also design games and quizzes to
trick users into entering their personal information,
subscribing them to unwanted services that would
appear in their phone or credit card bills.
https://uk.norton.com/internetsecurity-online-scams-11-social-media-threats-and-scams-to-watch-out-for.html
https://us.norton.com/internetsecurity-malware-5-ways-you-didnt-know-you-could-get-a-virus-malware-or-your-social-account-hacked.html
Understanding threats in social media
(Source)
(Source)
How to protect yourself?
• Always be cautious when clicking on links and
attachments. Look out for spelling errors and
URLs that do not seem legitimate.
• Use a security software that can stop malware
from being installed on your computer.
Cyber 101© 2019 Deloitte & Touche Enterprise Risk Services Pte Ltd 9
3) Catfishing and deception
Catfishing is a term used to describe someone who purposefully
deceives others online by impersonating as someone else or
creating an identity that does not portray their actual self. This
may involve fake names, stolen or edited photos, made up
identities, or false experiences to deceive others.
While some catfish may use their false identity to solicit money
from their victims, the motivations for catfishing are often
emotional. They include loneliness, personal insecurities,
boredom, mental illness, revenge, harassment and others.
In a survey conducted by phys.org, loneliness was cited by
41% of respondents as the reason for their catfishing.
Although catfishing is not a crime, the implications for individuals
who have been catfished can be extremely damaging to their
mental health and result in embarrassment.
Avoiding getting catfished is increasingly difficult, especially as
online dating is becoming commonplace. Therefore, it is
imperative to verify the identity of individuals to avoid getting
misled.
https://phys.org/news/2018-07-catfish-people-onlineit-money.html
https://www.cybersmile.org/what-we-do/advice-help/catfishing
Understanding threats in social media
(Source)
(Source)
Cyber 101© 2019 Deloitte & Touche Enterprise Risk Services Pte Ltd 10
4) Cyberbullying
According to a survey by CNA, 3 in 4 children and teenagers in
Singapore have been a victim of cyberbullying.
Cyberbullying is abuse that takes place over digital platforms such
as online social media sites, messenger apps, forums, and other
platforms where people can view, participate and share content.
It includes sharing, sending or posting of negative, harmful, mean
or false content aimed at harming or humiliating another
individual. Cyberbullying affects individuals in the digital space,
but can also have direct impact to the physical, mental and
emotional safety of individuals offline.
https://www.stopbullying.gov/cyberbullying/what-is-it/index.html
https://onlinesense.org/how-to-protect-yourself-from-cyberbullies/
Understanding threats in social media
How to protect yourself?
Take steps to address cyberbullying when it escalates
beyond minor teasing and name-calling.
• Save the evidence
• Block the bully
• Report the bully to the web administrator
• If there are threats of physical harm, report it to the
authorities such as the police.
(Source)
(Source)
Cyber 101© 2019 Deloitte & Touche Enterprise Risk Services Pte Ltd 11
Protect yourself
As cybercriminals and individuals with malicious intent constantly evolve to exploit users, here are a
few rules of thumb you should follow to remain vigilant and secure:
Understanding threats in social media
Be aware of your privacy
settings. Change your
privacy settings to control
who can see your content.
Click links with caution.
Look out for language and
content that is suspicious or
too good to be true.
Be selective with friend
requests. Verify their
identity to ensure it is not a
fake account.
Be mindful of what you
share. Avoid sharing
personal or sensitive
information.
Protect your computer
with antivirus software.
Frequent PC updates helps to
protect against malware.
Use strong passwords. A
strong password helps to
protect your account against
hackers.
https://www.getcybersafe.gc.ca/cnt/rsks/nln-ctvts/scl-ntwrkng-en.aspx
Deloitte refers to one or more of Deloitte Touche Tohmatsu Limited (“DTTL”), its global network of member firms, and their related entities. DTTL (also referred to as
“Deloitte Global”) and each of its member firms and their affiliated entities are legally separate and independent entities. DTTL does not provide services to clients.
Please see www.deloitte.com/about to learn more.
Deloitte is a leading global provider of audit and assurance, consulting, financial advisory, risk advisory, tax and related services. Our network of member firms in more
than 150 countries and territories serves four out of five Fortune Global 500® companies. Learn how Deloitte’s approximately 286,000 people make an impact that
matters at www.deloitte.com.
Deloitte Asia Pacific Limited is a company limited by guarantee and a member firm of DTTL. Members of Deloitte Asia Pacific Limited and their related entities provide
services in Australia, Brunei Darussalam, Cambodia, East Timor, Federated States of Micronesia, Guam, Indonesia, Japan, Laos, Malaysia, Mongolia, Myanmar, New
Zealand, Palau, Papua New Guinea, Singapore, Thailand, The Marshall Islands, The Northern Mariana Islands, The People’s Republic of China (incl. Hong Kong SAR and
Macau SAR), The Philippines and Vietnam. In each of these, operations are conducted by separate and independent legal entities.
About Deloitte Singapore
In Singapore, services are provided by Deloitte & Touche LLP and its subsidiaries and affiliates.
This communication contains general information only, and none of Deloitte Touche Tohmatsu Limited, its member firms, or their related entities (collectively, the
“Deloitte Network”) is, by means of this communication, rendering professional advice or services. Before making any decision or taking any action that may affect
your finances or your business, you should consult a qualified professional adviser. No entity in the Deloitte Network shall be responsible for any loss whatsoever
sustained by any person who relies on this communication.
© 2019 Deloitte & Touche Enterprise Risk Services Pte Ltd

More Related Content

What's hot

In the news
In the newsIn the news
In the news
Rob Wilson
 
Leveraging Board Governance for Cybersecurity
Leveraging Board Governance for CybersecurityLeveraging Board Governance for Cybersecurity
Leveraging Board Governance for Cybersecurity
ShareDocView.com
 
Data Breach Guide 2013
Data Breach Guide 2013Data Breach Guide 2013
Data Breach Guide 2013
- Mark - Fullbright
 
Forcepoint Whitepaper 2016 Security Predictions
Forcepoint Whitepaper 2016 Security PredictionsForcepoint Whitepaper 2016 Security Predictions
Forcepoint Whitepaper 2016 Security Predictions
Kim Jensen
 
Cyber Security Threats | IIA Boise Chapter
Cyber Security Threats | IIA Boise ChapterCyber Security Threats | IIA Boise Chapter
Cyber Security Threats | IIA Boise ChapterPatricia M Watson
 
DATA PROTECTION & BREACH READINESS GUIDE 2014
DATA PROTECTION & BREACH READINESS GUIDE 2014DATA PROTECTION & BREACH READINESS GUIDE 2014
DATA PROTECTION & BREACH READINESS GUIDE 2014
- Mark - Fullbright
 
[Infographic] Data Loss Prevention
[Infographic] Data Loss Prevention[Infographic] Data Loss Prevention
[Infographic] Data Loss Prevention
Seqrite
 
Top 5 Cybersecurity Risks in Banking
Top 5 Cybersecurity Risks in BankingTop 5 Cybersecurity Risks in Banking
Top 5 Cybersecurity Risks in Banking
Seqrite
 
Cybersecurity in the Boardroom
Cybersecurity in the BoardroomCybersecurity in the Boardroom
Cybersecurity in the Boardroom
Marko Suswanto
 
[Infographic] 7 Cyber attacks that shook the world
[Infographic] 7 Cyber attacks that shook the world[Infographic] 7 Cyber attacks that shook the world
[Infographic] 7 Cyber attacks that shook the world
Seqrite
 
Whitepaper-When-Admins-go-bad
Whitepaper-When-Admins-go-badWhitepaper-When-Admins-go-bad
Whitepaper-When-Admins-go-badbanerjeea
 
Why Should A Business Worry about Cyber Attacks?
Why Should A Business Worry about Cyber Attacks?Why Should A Business Worry about Cyber Attacks?
Why Should A Business Worry about Cyber Attacks?
Ainsha Noordin (Umie)
 
Executive Summary on the Cyber Risk Webinar
Executive Summary on the Cyber Risk WebinarExecutive Summary on the Cyber Risk Webinar
Executive Summary on the Cyber Risk Webinar
FERMA
 
Top 5 Cybersecurity Threats in Retail Industry
Top 5 Cybersecurity Threats in Retail IndustryTop 5 Cybersecurity Threats in Retail Industry
Top 5 Cybersecurity Threats in Retail Industry
Seqrite
 
5 Cybersecurity threats in Public Sector
5 Cybersecurity threats in Public Sector5 Cybersecurity threats in Public Sector
5 Cybersecurity threats in Public Sector
Seqrite
 
IRJET- Minimize Phishing Attacks: Securing Spear Attacks
IRJET- Minimize Phishing Attacks: Securing Spear AttacksIRJET- Minimize Phishing Attacks: Securing Spear Attacks
IRJET- Minimize Phishing Attacks: Securing Spear Attacks
IRJET Journal
 
What you need to know about cyber security
What you need to know about cyber securityWhat you need to know about cyber security
What you need to know about cyber security
Carol Meng-Shih Wang
 
SucessfulInsiderThreat
SucessfulInsiderThreatSucessfulInsiderThreat
SucessfulInsiderThreatHammerNJ
 
Reducing-Cyber-Risk-Whitepaper-Email (UK)
Reducing-Cyber-Risk-Whitepaper-Email (UK)Reducing-Cyber-Risk-Whitepaper-Email (UK)
Reducing-Cyber-Risk-Whitepaper-Email (UK)Mark Baker
 

What's hot (20)

In the news
In the newsIn the news
In the news
 
Leveraging Board Governance for Cybersecurity
Leveraging Board Governance for CybersecurityLeveraging Board Governance for Cybersecurity
Leveraging Board Governance for Cybersecurity
 
Data Breach Guide 2013
Data Breach Guide 2013Data Breach Guide 2013
Data Breach Guide 2013
 
idg_secops-solutions
idg_secops-solutionsidg_secops-solutions
idg_secops-solutions
 
Forcepoint Whitepaper 2016 Security Predictions
Forcepoint Whitepaper 2016 Security PredictionsForcepoint Whitepaper 2016 Security Predictions
Forcepoint Whitepaper 2016 Security Predictions
 
Cyber Security Threats | IIA Boise Chapter
Cyber Security Threats | IIA Boise ChapterCyber Security Threats | IIA Boise Chapter
Cyber Security Threats | IIA Boise Chapter
 
DATA PROTECTION & BREACH READINESS GUIDE 2014
DATA PROTECTION & BREACH READINESS GUIDE 2014DATA PROTECTION & BREACH READINESS GUIDE 2014
DATA PROTECTION & BREACH READINESS GUIDE 2014
 
[Infographic] Data Loss Prevention
[Infographic] Data Loss Prevention[Infographic] Data Loss Prevention
[Infographic] Data Loss Prevention
 
Top 5 Cybersecurity Risks in Banking
Top 5 Cybersecurity Risks in BankingTop 5 Cybersecurity Risks in Banking
Top 5 Cybersecurity Risks in Banking
 
Cybersecurity in the Boardroom
Cybersecurity in the BoardroomCybersecurity in the Boardroom
Cybersecurity in the Boardroom
 
[Infographic] 7 Cyber attacks that shook the world
[Infographic] 7 Cyber attacks that shook the world[Infographic] 7 Cyber attacks that shook the world
[Infographic] 7 Cyber attacks that shook the world
 
Whitepaper-When-Admins-go-bad
Whitepaper-When-Admins-go-badWhitepaper-When-Admins-go-bad
Whitepaper-When-Admins-go-bad
 
Why Should A Business Worry about Cyber Attacks?
Why Should A Business Worry about Cyber Attacks?Why Should A Business Worry about Cyber Attacks?
Why Should A Business Worry about Cyber Attacks?
 
Executive Summary on the Cyber Risk Webinar
Executive Summary on the Cyber Risk WebinarExecutive Summary on the Cyber Risk Webinar
Executive Summary on the Cyber Risk Webinar
 
Top 5 Cybersecurity Threats in Retail Industry
Top 5 Cybersecurity Threats in Retail IndustryTop 5 Cybersecurity Threats in Retail Industry
Top 5 Cybersecurity Threats in Retail Industry
 
5 Cybersecurity threats in Public Sector
5 Cybersecurity threats in Public Sector5 Cybersecurity threats in Public Sector
5 Cybersecurity threats in Public Sector
 
IRJET- Minimize Phishing Attacks: Securing Spear Attacks
IRJET- Minimize Phishing Attacks: Securing Spear AttacksIRJET- Minimize Phishing Attacks: Securing Spear Attacks
IRJET- Minimize Phishing Attacks: Securing Spear Attacks
 
What you need to know about cyber security
What you need to know about cyber securityWhat you need to know about cyber security
What you need to know about cyber security
 
SucessfulInsiderThreat
SucessfulInsiderThreatSucessfulInsiderThreat
SucessfulInsiderThreat
 
Reducing-Cyber-Risk-Whitepaper-Email (UK)
Reducing-Cyber-Risk-Whitepaper-Email (UK)Reducing-Cyber-Risk-Whitepaper-Email (UK)
Reducing-Cyber-Risk-Whitepaper-Email (UK)
 

Similar to September 2019 part 9

Adrian Ifrim - prezentare - Cyber Security Trends 2020
Adrian Ifrim - prezentare - Cyber Security Trends 2020Adrian Ifrim - prezentare - Cyber Security Trends 2020
Adrian Ifrim - prezentare - Cyber Security Trends 2020
Business Days
 
Cybersecurity awareness.pdf
Cybersecurity awareness.pdfCybersecurity awareness.pdf
Cybersecurity awareness.pdf
CRO Cyber Rights Organization
 
THE IMPORTANCE OF CYBERSECURITY TO MANKIND
THE IMPORTANCE OF CYBERSECURITY TO MANKINDTHE IMPORTANCE OF CYBERSECURITY TO MANKIND
THE IMPORTANCE OF CYBERSECURITY TO MANKIND
ReinIgnacioUrolaza
 
Balancing Security & Authencity Final
Balancing Security & Authencity FinalBalancing Security & Authencity Final
Balancing Security & Authencity FinalCindy Kim
 
Cybersecurity - Webinar Session
Cybersecurity - Webinar SessionCybersecurity - Webinar Session
Cybersecurity - Webinar Session
Kalilur Rahman
 
InfoSec's Guide to Social Media [WHITEPAPER]
InfoSec's Guide to Social Media [WHITEPAPER]InfoSec's Guide to Social Media [WHITEPAPER]
InfoSec's Guide to Social Media [WHITEPAPER]Josh Stein
 
Education 2.0 Reviews Phishing Scams Targeting Students To Protect Their Info...
Education 2.0 Reviews Phishing Scams Targeting Students To Protect Their Info...Education 2.0 Reviews Phishing Scams Targeting Students To Protect Their Info...
Education 2.0 Reviews Phishing Scams Targeting Students To Protect Their Info...
Education 2Conf
 
negative implications of IT
negative implications of ITnegative implications of IT
negative implications of IT
MahdiRahmani15
 
Social Media & Enterprise Security Whitepaper
Social Media & Enterprise Security WhitepaperSocial Media & Enterprise Security Whitepaper
Social Media & Enterprise Security WhitepaperSchleighS
 
11 Reasons Why Your Company Could Be In Danger
11 Reasons Why Your Company Could Be In Danger11 Reasons Why Your Company Could Be In Danger
11 Reasons Why Your Company Could Be In Danger
Copper Mobile, Inc.
 
Social Media And Business Risks | Cyberroot Risk Advisory (CR Group)
Social Media And Business Risks | Cyberroot Risk Advisory (CR Group)Social Media And Business Risks | Cyberroot Risk Advisory (CR Group)
Social Media And Business Risks | Cyberroot Risk Advisory (CR Group)
CR Group
 
Cybersecurity and data privacy
Cybersecurity and data privacyCybersecurity and data privacy
Cybersecurity and data privacy
Katherine Cancelado
 
Fraud in Social Media: Facing the Growing Threat
Fraud in Social Media: Facing the Growing ThreatFraud in Social Media: Facing the Growing Threat
Fraud in Social Media: Facing the Growing Threat
FraudBusters
 
Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...
Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...
Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...
IRJET Journal
 
social media presentation.pptx
social media presentation.pptxsocial media presentation.pptx
social media presentation.pptx
RACHANAB18
 
wp-analyzing-breaches-by-industry
wp-analyzing-breaches-by-industrywp-analyzing-breaches-by-industry
wp-analyzing-breaches-by-industryNumaan Huq
 
Internet 2.0 Conference Reviews Ways To Spot Scam Offenses In The Digital Com...
Internet 2.0 Conference Reviews Ways To Spot Scam Offenses In The Digital Com...Internet 2.0 Conference Reviews Ways To Spot Scam Offenses In The Digital Com...
Internet 2.0 Conference Reviews Ways To Spot Scam Offenses In The Digital Com...
Internet 2Conf
 
Social media Risk Management Presentation Sample (Animations don't work in sl...
Social media Risk Management Presentation Sample (Animations don't work in sl...Social media Risk Management Presentation Sample (Animations don't work in sl...
Social media Risk Management Presentation Sample (Animations don't work in sl...
Alexander Larsen
 
Cyber safety.pptx
Cyber safety.pptxCyber safety.pptx
Cyber safety.pptx
Achu69
 

Similar to September 2019 part 9 (20)

Protecting Yourself Against Mobile Phishing
Protecting Yourself Against Mobile PhishingProtecting Yourself Against Mobile Phishing
Protecting Yourself Against Mobile Phishing
 
Adrian Ifrim - prezentare - Cyber Security Trends 2020
Adrian Ifrim - prezentare - Cyber Security Trends 2020Adrian Ifrim - prezentare - Cyber Security Trends 2020
Adrian Ifrim - prezentare - Cyber Security Trends 2020
 
Cybersecurity awareness.pdf
Cybersecurity awareness.pdfCybersecurity awareness.pdf
Cybersecurity awareness.pdf
 
THE IMPORTANCE OF CYBERSECURITY TO MANKIND
THE IMPORTANCE OF CYBERSECURITY TO MANKINDTHE IMPORTANCE OF CYBERSECURITY TO MANKIND
THE IMPORTANCE OF CYBERSECURITY TO MANKIND
 
Balancing Security & Authencity Final
Balancing Security & Authencity FinalBalancing Security & Authencity Final
Balancing Security & Authencity Final
 
Cybersecurity - Webinar Session
Cybersecurity - Webinar SessionCybersecurity - Webinar Session
Cybersecurity - Webinar Session
 
InfoSec's Guide to Social Media [WHITEPAPER]
InfoSec's Guide to Social Media [WHITEPAPER]InfoSec's Guide to Social Media [WHITEPAPER]
InfoSec's Guide to Social Media [WHITEPAPER]
 
Education 2.0 Reviews Phishing Scams Targeting Students To Protect Their Info...
Education 2.0 Reviews Phishing Scams Targeting Students To Protect Their Info...Education 2.0 Reviews Phishing Scams Targeting Students To Protect Their Info...
Education 2.0 Reviews Phishing Scams Targeting Students To Protect Their Info...
 
negative implications of IT
negative implications of ITnegative implications of IT
negative implications of IT
 
Social Media & Enterprise Security Whitepaper
Social Media & Enterprise Security WhitepaperSocial Media & Enterprise Security Whitepaper
Social Media & Enterprise Security Whitepaper
 
11 Reasons Why Your Company Could Be In Danger
11 Reasons Why Your Company Could Be In Danger11 Reasons Why Your Company Could Be In Danger
11 Reasons Why Your Company Could Be In Danger
 
Social Media And Business Risks | Cyberroot Risk Advisory (CR Group)
Social Media And Business Risks | Cyberroot Risk Advisory (CR Group)Social Media And Business Risks | Cyberroot Risk Advisory (CR Group)
Social Media And Business Risks | Cyberroot Risk Advisory (CR Group)
 
Cybersecurity and data privacy
Cybersecurity and data privacyCybersecurity and data privacy
Cybersecurity and data privacy
 
Fraud in Social Media: Facing the Growing Threat
Fraud in Social Media: Facing the Growing ThreatFraud in Social Media: Facing the Growing Threat
Fraud in Social Media: Facing the Growing Threat
 
Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...
Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...
Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...
 
social media presentation.pptx
social media presentation.pptxsocial media presentation.pptx
social media presentation.pptx
 
wp-analyzing-breaches-by-industry
wp-analyzing-breaches-by-industrywp-analyzing-breaches-by-industry
wp-analyzing-breaches-by-industry
 
Internet 2.0 Conference Reviews Ways To Spot Scam Offenses In The Digital Com...
Internet 2.0 Conference Reviews Ways To Spot Scam Offenses In The Digital Com...Internet 2.0 Conference Reviews Ways To Spot Scam Offenses In The Digital Com...
Internet 2.0 Conference Reviews Ways To Spot Scam Offenses In The Digital Com...
 
Social media Risk Management Presentation Sample (Animations don't work in sl...
Social media Risk Management Presentation Sample (Animations don't work in sl...Social media Risk Management Presentation Sample (Animations don't work in sl...
Social media Risk Management Presentation Sample (Animations don't work in sl...
 
Cyber safety.pptx
Cyber safety.pptxCyber safety.pptx
Cyber safety.pptx
 

More from seadeloitte

Celebrating our people – Marites Landicho
Celebrating our people – Marites LandichoCelebrating our people – Marites Landicho
Celebrating our people – Marites Landicho
seadeloitte
 
Celebrating our people - Bobby Christian
Celebrating our people - Bobby ChristianCelebrating our people - Bobby Christian
Celebrating our people - Bobby Christian
seadeloitte
 
Celebrating our people - Jill Lim
Celebrating our people - Jill LimCelebrating our people - Jill Lim
Celebrating our people - Jill Lim
seadeloitte
 
Celebrating our people - Joe M. Arnett
Celebrating our people - Joe M. ArnettCelebrating our people - Joe M. Arnett
Celebrating our people - Joe M. Arnett
seadeloitte
 
Celebrating our people – Melissa Delgado
Celebrating our people – Melissa DelgadoCelebrating our people – Melissa Delgado
Celebrating our people – Melissa Delgado
seadeloitte
 
Celebrating our people - Muhammad Ashik Ishak
Celebrating our people - Muhammad Ashik IshakCelebrating our people - Muhammad Ashik Ishak
Celebrating our people - Muhammad Ashik Ishak
seadeloitte
 
Dtc event slide share
Dtc event slide shareDtc event slide share
Dtc event slide share
seadeloitte
 
Kids edu event slide share
Kids edu event slide shareKids edu event slide share
Kids edu event slide share
seadeloitte
 
Celebrating our people - Joanne Loh
Celebrating our people - Joanne Loh Celebrating our people - Joanne Loh
Celebrating our people - Joanne Loh
seadeloitte
 
Celebrating our people - Thomas Chan
Celebrating our people - Thomas ChanCelebrating our people - Thomas Chan
Celebrating our people - Thomas Chan
seadeloitte
 
Celebrating our people - Daniel Ng
Celebrating our people - Daniel NgCelebrating our people - Daniel Ng
Celebrating our people - Daniel Ng
seadeloitte
 
Celebrating our people - Vergel Hoe Bantoc
Celebrating our people - Vergel Hoe BantocCelebrating our people - Vergel Hoe Bantoc
Celebrating our people - Vergel Hoe Bantoc
seadeloitte
 
Celebrating our people - Ellisa Tanara
Celebrating our people - Ellisa TanaraCelebrating our people - Ellisa Tanara
Celebrating our people - Ellisa Tanara
seadeloitte
 
Celebrating our people - Anthony Loh
Celebrating our people - Anthony LohCelebrating our people - Anthony Loh
Celebrating our people - Anthony Loh
seadeloitte
 
Celebrating our people - Annalisa Nawawi
Celebrating our people - Annalisa NawawiCelebrating our people - Annalisa Nawawi
Celebrating our people - Annalisa Nawawi
seadeloitte
 
Celebrating our people - Roy D. Kiantiong
Celebrating our people - Roy D. KiantiongCelebrating our people - Roy D. Kiantiong
Celebrating our people - Roy D. Kiantiong
seadeloitte
 
Celebrating our people - Wimolporn Boonyusthian
Celebrating our people - Wimolporn BoonyusthianCelebrating our people - Wimolporn Boonyusthian
Celebrating our people - Wimolporn Boonyusthian
seadeloitte
 
Celebrating our people - Madam Thanh Ha Thu
Celebrating our people - Madam Thanh Ha ThuCelebrating our people - Madam Thanh Ha Thu
Celebrating our people - Madam Thanh Ha Thu
seadeloitte
 
Celebrating our people - Pachanan Rattanagowin
Celebrating our people - Pachanan Rattanagowin Celebrating our people - Pachanan Rattanagowin
Celebrating our people - Pachanan Rattanagowin
seadeloitte
 
Celebrating our people - Nguyen Kim Lien
Celebrating our people - Nguyen Kim Lien Celebrating our people - Nguyen Kim Lien
Celebrating our people - Nguyen Kim Lien
seadeloitte
 

More from seadeloitte (20)

Celebrating our people – Marites Landicho
Celebrating our people – Marites LandichoCelebrating our people – Marites Landicho
Celebrating our people – Marites Landicho
 
Celebrating our people - Bobby Christian
Celebrating our people - Bobby ChristianCelebrating our people - Bobby Christian
Celebrating our people - Bobby Christian
 
Celebrating our people - Jill Lim
Celebrating our people - Jill LimCelebrating our people - Jill Lim
Celebrating our people - Jill Lim
 
Celebrating our people - Joe M. Arnett
Celebrating our people - Joe M. ArnettCelebrating our people - Joe M. Arnett
Celebrating our people - Joe M. Arnett
 
Celebrating our people – Melissa Delgado
Celebrating our people – Melissa DelgadoCelebrating our people – Melissa Delgado
Celebrating our people – Melissa Delgado
 
Celebrating our people - Muhammad Ashik Ishak
Celebrating our people - Muhammad Ashik IshakCelebrating our people - Muhammad Ashik Ishak
Celebrating our people - Muhammad Ashik Ishak
 
Dtc event slide share
Dtc event slide shareDtc event slide share
Dtc event slide share
 
Kids edu event slide share
Kids edu event slide shareKids edu event slide share
Kids edu event slide share
 
Celebrating our people - Joanne Loh
Celebrating our people - Joanne Loh Celebrating our people - Joanne Loh
Celebrating our people - Joanne Loh
 
Celebrating our people - Thomas Chan
Celebrating our people - Thomas ChanCelebrating our people - Thomas Chan
Celebrating our people - Thomas Chan
 
Celebrating our people - Daniel Ng
Celebrating our people - Daniel NgCelebrating our people - Daniel Ng
Celebrating our people - Daniel Ng
 
Celebrating our people - Vergel Hoe Bantoc
Celebrating our people - Vergel Hoe BantocCelebrating our people - Vergel Hoe Bantoc
Celebrating our people - Vergel Hoe Bantoc
 
Celebrating our people - Ellisa Tanara
Celebrating our people - Ellisa TanaraCelebrating our people - Ellisa Tanara
Celebrating our people - Ellisa Tanara
 
Celebrating our people - Anthony Loh
Celebrating our people - Anthony LohCelebrating our people - Anthony Loh
Celebrating our people - Anthony Loh
 
Celebrating our people - Annalisa Nawawi
Celebrating our people - Annalisa NawawiCelebrating our people - Annalisa Nawawi
Celebrating our people - Annalisa Nawawi
 
Celebrating our people - Roy D. Kiantiong
Celebrating our people - Roy D. KiantiongCelebrating our people - Roy D. Kiantiong
Celebrating our people - Roy D. Kiantiong
 
Celebrating our people - Wimolporn Boonyusthian
Celebrating our people - Wimolporn BoonyusthianCelebrating our people - Wimolporn Boonyusthian
Celebrating our people - Wimolporn Boonyusthian
 
Celebrating our people - Madam Thanh Ha Thu
Celebrating our people - Madam Thanh Ha ThuCelebrating our people - Madam Thanh Ha Thu
Celebrating our people - Madam Thanh Ha Thu
 
Celebrating our people - Pachanan Rattanagowin
Celebrating our people - Pachanan Rattanagowin Celebrating our people - Pachanan Rattanagowin
Celebrating our people - Pachanan Rattanagowin
 
Celebrating our people - Nguyen Kim Lien
Celebrating our people - Nguyen Kim Lien Celebrating our people - Nguyen Kim Lien
Celebrating our people - Nguyen Kim Lien
 

Recently uploaded

Importance of BWTS in the Maritime Industry
Importance of BWTS in the Maritime IndustryImportance of BWTS in the Maritime Industry
Importance of BWTS in the Maritime Industry
Blessed Marine Automation
 
Delightful Finds: Unveiling the Power of Gifts Under 100
Delightful Finds: Unveiling the Power of Gifts Under 100Delightful Finds: Unveiling the Power of Gifts Under 100
Delightful Finds: Unveiling the Power of Gifts Under 100
JoyTree Global
 
Colors of Wall Paint and Their Mentally Properties.pptx
Colors of Wall Paint and Their Mentally Properties.pptxColors of Wall Paint and Their Mentally Properties.pptx
Colors of Wall Paint and Their Mentally Properties.pptx
Brendon Jonathan
 
Solar Panel For Home Price List In india
Solar Panel For Home Price List In indiaSolar Panel For Home Price List In india
Solar Panel For Home Price List In india
janhaviconaxweb
 
Maximizing Efficiency with Integrated Water Management Systems
Maximizing Efficiency with Integrated Water Management SystemsMaximizing Efficiency with Integrated Water Management Systems
Maximizing Efficiency with Integrated Water Management Systems
Irri Design Studio
 
Bulk SMS Service Provider In Mumbai | sms2orbit
Bulk SMS Service Provider In Mumbai | sms2orbitBulk SMS Service Provider In Mumbai | sms2orbit
Bulk SMS Service Provider In Mumbai | sms2orbit
Orbit Messaging Hub
 
Waikiki Sunset Catamaran ! MAITAI Catamaran
Waikiki Sunset Catamaran !  MAITAI CatamaranWaikiki Sunset Catamaran !  MAITAI Catamaran
Waikiki Sunset Catamaran ! MAITAI Catamaran
maitaicatamaran
 
Earthmovers: Top Earth Moving Equipments
Earthmovers: Top Earth Moving EquipmentsEarthmovers: Top Earth Moving Equipments
Earthmovers: Top Earth Moving Equipments
earthmoverinternatio
 
Top Best Astrologer +91-9463629203 LoVe Problem SolUtion specialist In InDia ...
Top Best Astrologer +91-9463629203 LoVe Problem SolUtion specialist In InDia ...Top Best Astrologer +91-9463629203 LoVe Problem SolUtion specialist In InDia ...
Top Best Astrologer +91-9463629203 LoVe Problem SolUtion specialist In InDia ...
gitapress3
 
Chandigarh call garal serives 9512450098
Chandigarh call garal serives 9512450098Chandigarh call garal serives 9512450098
Chandigarh call garal serives 9512450098
Chandigarh export services garal
 
All Trophies at Trophy-World Malaysia | Custom Trophies & Plaques Supplier
All Trophies at Trophy-World Malaysia | Custom Trophies & Plaques SupplierAll Trophies at Trophy-World Malaysia | Custom Trophies & Plaques Supplier
All Trophies at Trophy-World Malaysia | Custom Trophies & Plaques Supplier
Trophy-World Malaysia Your #1 Rated Trophy Supplier
 
How Does Littering Affect the Environment.
How Does Littering Affect the Environment.How Does Littering Affect the Environment.
How Does Littering Affect the Environment.
ClenliDirect
 
Reliable Logistics Solutions - Truxcargo
Reliable Logistics Solutions - TruxcargoReliable Logistics Solutions - Truxcargo
Reliable Logistics Solutions - Truxcargo
Truxcargo
 
Nature’s Paradise Glamorous And Sustainable Designs For Your Outdoor Living S...
Nature’s Paradise Glamorous And Sustainable Designs For Your Outdoor Living S...Nature’s Paradise Glamorous And Sustainable Designs For Your Outdoor Living S...
Nature’s Paradise Glamorous And Sustainable Designs For Your Outdoor Living S...
Landscape Express
 
The Best Premium IPTV Service Frane.docx
The Best Premium IPTV Service Frane.docxThe Best Premium IPTV Service Frane.docx
The Best Premium IPTV Service Frane.docx
Industry Foods UK
 
WORK PERMIT IN BULGARIA | Work Visa Services
WORK PERMIT IN BULGARIA | Work Visa ServicesWORK PERMIT IN BULGARIA | Work Visa Services
WORK PERMIT IN BULGARIA | Work Visa Services
RKIMT
 
Elevate Your Brand with Digital Marketing for Fashion Industry
Elevate Your Brand with Digital Marketing for Fashion IndustryElevate Your Brand with Digital Marketing for Fashion Industry
Elevate Your Brand with Digital Marketing for Fashion Industry
Matebiz Pvt. Ltd
 
Inspect Edge & NSPIRE Inspection Application - Streamline Housing Inspections
Inspect Edge & NSPIRE Inspection Application - Streamline Housing InspectionsInspect Edge & NSPIRE Inspection Application - Streamline Housing Inspections
Inspect Edge & NSPIRE Inspection Application - Streamline Housing Inspections
inspectedge1
 
Best steel industrial company LLC in UAE
Best steel industrial company LLC in UAEBest steel industrial company LLC in UAE
Best steel industrial company LLC in UAE
alafnanmetals
 
Are Gutters Necessary? Explore the details now!
Are Gutters Necessary? Explore the details now!Are Gutters Necessary? Explore the details now!
Are Gutters Necessary? Explore the details now!
AmeliaLauren3
 

Recently uploaded (20)

Importance of BWTS in the Maritime Industry
Importance of BWTS in the Maritime IndustryImportance of BWTS in the Maritime Industry
Importance of BWTS in the Maritime Industry
 
Delightful Finds: Unveiling the Power of Gifts Under 100
Delightful Finds: Unveiling the Power of Gifts Under 100Delightful Finds: Unveiling the Power of Gifts Under 100
Delightful Finds: Unveiling the Power of Gifts Under 100
 
Colors of Wall Paint and Their Mentally Properties.pptx
Colors of Wall Paint and Their Mentally Properties.pptxColors of Wall Paint and Their Mentally Properties.pptx
Colors of Wall Paint and Their Mentally Properties.pptx
 
Solar Panel For Home Price List In india
Solar Panel For Home Price List In indiaSolar Panel For Home Price List In india
Solar Panel For Home Price List In india
 
Maximizing Efficiency with Integrated Water Management Systems
Maximizing Efficiency with Integrated Water Management SystemsMaximizing Efficiency with Integrated Water Management Systems
Maximizing Efficiency with Integrated Water Management Systems
 
Bulk SMS Service Provider In Mumbai | sms2orbit
Bulk SMS Service Provider In Mumbai | sms2orbitBulk SMS Service Provider In Mumbai | sms2orbit
Bulk SMS Service Provider In Mumbai | sms2orbit
 
Waikiki Sunset Catamaran ! MAITAI Catamaran
Waikiki Sunset Catamaran !  MAITAI CatamaranWaikiki Sunset Catamaran !  MAITAI Catamaran
Waikiki Sunset Catamaran ! MAITAI Catamaran
 
Earthmovers: Top Earth Moving Equipments
Earthmovers: Top Earth Moving EquipmentsEarthmovers: Top Earth Moving Equipments
Earthmovers: Top Earth Moving Equipments
 
Top Best Astrologer +91-9463629203 LoVe Problem SolUtion specialist In InDia ...
Top Best Astrologer +91-9463629203 LoVe Problem SolUtion specialist In InDia ...Top Best Astrologer +91-9463629203 LoVe Problem SolUtion specialist In InDia ...
Top Best Astrologer +91-9463629203 LoVe Problem SolUtion specialist In InDia ...
 
Chandigarh call garal serives 9512450098
Chandigarh call garal serives 9512450098Chandigarh call garal serives 9512450098
Chandigarh call garal serives 9512450098
 
All Trophies at Trophy-World Malaysia | Custom Trophies & Plaques Supplier
All Trophies at Trophy-World Malaysia | Custom Trophies & Plaques SupplierAll Trophies at Trophy-World Malaysia | Custom Trophies & Plaques Supplier
All Trophies at Trophy-World Malaysia | Custom Trophies & Plaques Supplier
 
How Does Littering Affect the Environment.
How Does Littering Affect the Environment.How Does Littering Affect the Environment.
How Does Littering Affect the Environment.
 
Reliable Logistics Solutions - Truxcargo
Reliable Logistics Solutions - TruxcargoReliable Logistics Solutions - Truxcargo
Reliable Logistics Solutions - Truxcargo
 
Nature’s Paradise Glamorous And Sustainable Designs For Your Outdoor Living S...
Nature’s Paradise Glamorous And Sustainable Designs For Your Outdoor Living S...Nature’s Paradise Glamorous And Sustainable Designs For Your Outdoor Living S...
Nature’s Paradise Glamorous And Sustainable Designs For Your Outdoor Living S...
 
The Best Premium IPTV Service Frane.docx
The Best Premium IPTV Service Frane.docxThe Best Premium IPTV Service Frane.docx
The Best Premium IPTV Service Frane.docx
 
WORK PERMIT IN BULGARIA | Work Visa Services
WORK PERMIT IN BULGARIA | Work Visa ServicesWORK PERMIT IN BULGARIA | Work Visa Services
WORK PERMIT IN BULGARIA | Work Visa Services
 
Elevate Your Brand with Digital Marketing for Fashion Industry
Elevate Your Brand with Digital Marketing for Fashion IndustryElevate Your Brand with Digital Marketing for Fashion Industry
Elevate Your Brand with Digital Marketing for Fashion Industry
 
Inspect Edge & NSPIRE Inspection Application - Streamline Housing Inspections
Inspect Edge & NSPIRE Inspection Application - Streamline Housing InspectionsInspect Edge & NSPIRE Inspection Application - Streamline Housing Inspections
Inspect Edge & NSPIRE Inspection Application - Streamline Housing Inspections
 
Best steel industrial company LLC in UAE
Best steel industrial company LLC in UAEBest steel industrial company LLC in UAE
Best steel industrial company LLC in UAE
 
Are Gutters Necessary? Explore the details now!
Are Gutters Necessary? Explore the details now!Are Gutters Necessary? Explore the details now!
Are Gutters Necessary? Explore the details now!
 

September 2019 part 9

  • 1. Understanding threats in social media September 2019
  • 2. Cyber 101© 2019 Deloitte & Touche Enterprise Risk Services Pte Ltd 2 Overview As we become increasingly connected via digital spaces and share more of our lives and information over social media, we inevitably become more vulnerable to targeted cyber risks. According to the 2019 Study on Social Media Privacy and Security Concerns conducted by ID Experts, majority of adults are using one or more social media platforms at least once per day and are concerned about their security and privacy on social media. Understanding threats in social media
  • 3. Cyber 101© 2019 Deloitte & Touche Enterprise Risk Services Pte Ltd 3 In-depth look: Social media consumption by platform Findings indicate that Facebook is the most popular social media platform among adults. https://www.idexpertscorp.com/knowledge-center/single/2019-study-on-social-media-privacy-and-security-concerns Understanding threats in social media
  • 4. Cyber 101© 2019 Deloitte & Touche Enterprise Risk Services Pte Ltd 4 Survey findings: How concerned are you? Out of which, 2 in 5 respondents are very concerned about their privacy or security on Facebook. https://www.idexpertscorp.com/knowledge-center/single/2019-study-on-social-media-privacy-and-security-concerns Understanding threats in social media
  • 5. Cyber 101© 2019 Deloitte & Touche Enterprise Risk Services Pte Ltd 5 Survey findings: Termination of social media due to concerns? 1 in 5 respondents have stopped using Facebook as a result of privacy and security concerns. https://www.idexpertscorp.com/knowledge-center/single/2019-study-on-social-media-privacy-and-security-concerns Understanding threats in social media
  • 6. Cyber 101© 2019 Deloitte & Touche Enterprise Risk Services Pte Ltd 6 The threats lurking on social media The fears surrounding privacy and security are not unfounded. With social media so closely interwoven into our everyday lives, it has become a prime target for cybercrimes and exploitations. We will explore the four key areas of risks and the ways in which you can protect yourself from them: 1) Data breaches 2) Phishing and malware 3) Catfishing and deception 4) Cyberbullying Understanding threats in social media
  • 7. Cyber 101© 2019 Deloitte & Touche Enterprise Risk Services Pte Ltd 7 According to Gemalto's latest Breach Level Index, a global database of public data breaches, social media incidents accounted for over 56% of the 4.5 billion data records compromised worldwide in the first half of 2018. Here are some well-known cases of data breaches that have occurred in social media giants: 1) Data breaches Understanding threats in social media Facebook’s code vulnerability affected 50 million users, potentially exposing personal information and enabling hackers to take control of user profiles. (Source) Google+ shuts down following a glitch through which external developers were able to access the data of over 500,000 users. (Source) Instagram breach exposes personal contact information of 350,000 influencers. (Source) How to protect yourself? • While such attacks are beyond users’ control, turning on two-factor authentication limits your exposure. Even if someone has your password, they cannot access your account without a unique code verification sent by a text, call or email. • Conduct a device audit once you know of a breach, and remove devices you do not recognise from being logged in to your account.
  • 8. Cyber 101© 2019 Deloitte & Touche Enterprise Risk Services Pte Ltd 8 2) Phishing and malware Phishing occurs when cyber criminals employ social engineering techniques to trick users into clicking deceptive links to download malware (short for malicious software). On social media, such deceptive links often appear in the form of unbelievable news, giveaways and shocking videos. Cyber criminals may also design games and quizzes to trick users into entering their personal information, subscribing them to unwanted services that would appear in their phone or credit card bills. https://uk.norton.com/internetsecurity-online-scams-11-social-media-threats-and-scams-to-watch-out-for.html https://us.norton.com/internetsecurity-malware-5-ways-you-didnt-know-you-could-get-a-virus-malware-or-your-social-account-hacked.html Understanding threats in social media (Source) (Source) How to protect yourself? • Always be cautious when clicking on links and attachments. Look out for spelling errors and URLs that do not seem legitimate. • Use a security software that can stop malware from being installed on your computer.
  • 9. Cyber 101© 2019 Deloitte & Touche Enterprise Risk Services Pte Ltd 9 3) Catfishing and deception Catfishing is a term used to describe someone who purposefully deceives others online by impersonating as someone else or creating an identity that does not portray their actual self. This may involve fake names, stolen or edited photos, made up identities, or false experiences to deceive others. While some catfish may use their false identity to solicit money from their victims, the motivations for catfishing are often emotional. They include loneliness, personal insecurities, boredom, mental illness, revenge, harassment and others. In a survey conducted by phys.org, loneliness was cited by 41% of respondents as the reason for their catfishing. Although catfishing is not a crime, the implications for individuals who have been catfished can be extremely damaging to their mental health and result in embarrassment. Avoiding getting catfished is increasingly difficult, especially as online dating is becoming commonplace. Therefore, it is imperative to verify the identity of individuals to avoid getting misled. https://phys.org/news/2018-07-catfish-people-onlineit-money.html https://www.cybersmile.org/what-we-do/advice-help/catfishing Understanding threats in social media (Source) (Source)
  • 10. Cyber 101© 2019 Deloitte & Touche Enterprise Risk Services Pte Ltd 10 4) Cyberbullying According to a survey by CNA, 3 in 4 children and teenagers in Singapore have been a victim of cyberbullying. Cyberbullying is abuse that takes place over digital platforms such as online social media sites, messenger apps, forums, and other platforms where people can view, participate and share content. It includes sharing, sending or posting of negative, harmful, mean or false content aimed at harming or humiliating another individual. Cyberbullying affects individuals in the digital space, but can also have direct impact to the physical, mental and emotional safety of individuals offline. https://www.stopbullying.gov/cyberbullying/what-is-it/index.html https://onlinesense.org/how-to-protect-yourself-from-cyberbullies/ Understanding threats in social media How to protect yourself? Take steps to address cyberbullying when it escalates beyond minor teasing and name-calling. • Save the evidence • Block the bully • Report the bully to the web administrator • If there are threats of physical harm, report it to the authorities such as the police. (Source) (Source)
  • 11. Cyber 101© 2019 Deloitte & Touche Enterprise Risk Services Pte Ltd 11 Protect yourself As cybercriminals and individuals with malicious intent constantly evolve to exploit users, here are a few rules of thumb you should follow to remain vigilant and secure: Understanding threats in social media Be aware of your privacy settings. Change your privacy settings to control who can see your content. Click links with caution. Look out for language and content that is suspicious or too good to be true. Be selective with friend requests. Verify their identity to ensure it is not a fake account. Be mindful of what you share. Avoid sharing personal or sensitive information. Protect your computer with antivirus software. Frequent PC updates helps to protect against malware. Use strong passwords. A strong password helps to protect your account against hackers. https://www.getcybersafe.gc.ca/cnt/rsks/nln-ctvts/scl-ntwrkng-en.aspx
  • 12. Deloitte refers to one or more of Deloitte Touche Tohmatsu Limited (“DTTL”), its global network of member firms, and their related entities. DTTL (also referred to as “Deloitte Global”) and each of its member firms and their affiliated entities are legally separate and independent entities. DTTL does not provide services to clients. Please see www.deloitte.com/about to learn more. Deloitte is a leading global provider of audit and assurance, consulting, financial advisory, risk advisory, tax and related services. Our network of member firms in more than 150 countries and territories serves four out of five Fortune Global 500® companies. Learn how Deloitte’s approximately 286,000 people make an impact that matters at www.deloitte.com. Deloitte Asia Pacific Limited is a company limited by guarantee and a member firm of DTTL. Members of Deloitte Asia Pacific Limited and their related entities provide services in Australia, Brunei Darussalam, Cambodia, East Timor, Federated States of Micronesia, Guam, Indonesia, Japan, Laos, Malaysia, Mongolia, Myanmar, New Zealand, Palau, Papua New Guinea, Singapore, Thailand, The Marshall Islands, The Northern Mariana Islands, The People’s Republic of China (incl. Hong Kong SAR and Macau SAR), The Philippines and Vietnam. In each of these, operations are conducted by separate and independent legal entities. About Deloitte Singapore In Singapore, services are provided by Deloitte & Touche LLP and its subsidiaries and affiliates. This communication contains general information only, and none of Deloitte Touche Tohmatsu Limited, its member firms, or their related entities (collectively, the “Deloitte Network”) is, by means of this communication, rendering professional advice or services. Before making any decision or taking any action that may affect your finances or your business, you should consult a qualified professional adviser. No entity in the Deloitte Network shall be responsible for any loss whatsoever sustained by any person who relies on this communication. © 2019 Deloitte & Touche Enterprise Risk Services Pte Ltd