尊敬的 微信汇率:1円 ≈ 0.046215 元 支付宝汇率:1円 ≈ 0.046306元 [退出登录]
SlideShare a Scribd company logo
LOCK THEM OUT
datahops.com
CYBER SECURITY AWARENESS
IDENTITY THEFT
BE CAREFUL WHAT YOU POST
ON SOCIAL MEDIA ?
DO YOU PUT YOUR WHOLE LIFE
LOCK THEM OUT
datahops.com
CYBER SECURITY AWARENESS
NEVER BUY A
IT’S A POPULAR SCAM
TO PAY SOMEONE
GIFT CARD
GIFT CARD
SCAM
LOCK THEM OUT
datahops.com
CYBER SECURITY AWARENESS
IF ALARM BELLS
START RINGING IN YOUR HEAD
TRUST YOUR INSTINCTS
WALK AWAY
LOCK THEM OUT
datahops.com
CYBER SECURITY AWARENESS
JUST INVITE
THEM IN
Don’t reveal too much about your plans on
social media especially revealing your travel
itinerary and giving commentaries, uploading
pictures. The thieves will know you are away
ON
HOLIDAY!
PICTURES
LOCK THEM OUT
datahops.com
CYBER SECURITY AWARENESS
IS LOVE FREE
OR BLIND
Con artists create online fake identities and
trick people into romantic relationships with the
aim of asking for money using a fabricated
emergency as an excuse
Cyber Awareness Training www.datahops.com
LOCK THEM OUT !
NEVER RESPOND TO MISSED PARCEL
DELIVERY TEXT MESSAGES
IT’S IDENTITY THEFT
POST OFFICE : Your parcel was
Returned to our depot after a failed
delivery attempt. You can arrange
redelivery via: https:// post office
delivery/payment
How did the post office get your Number ??
The post Office will never send you a text
message unless you requested it
LOCK THEM OUT
datahops.com
CYBER SECURITY AWARENESS
HOT OFF
THE PRESS
Never reveal, share or publish sensitive
information including pictures on social media
that may give away any clues about your
movements or insights into your personal life
Cyber Awareness Training www.datahops.com
LOCK THEM OUT !
BE CAREFUL OF ONE RING PHONE
SCAMS
RESULT: A LARGE PHONE BILL
MISSED CALLS
3
+235 123 4567
+233 890 1234
+256 123 4567
1. Don’t answer or return any
calls from numbers you
don’t recognize
2. Check the location the call
came from by doing a quick
search online for the code
3. Block the number and
report it to your network carrier
or block outgoing international
calls
Return calls to strange looking
numbers and you could end up
with a hefty bill because these
numbers coil be located
anywhere in the world
Cyber Awareness Training www.datahops.com
LOCK THEM OUT !
NEVER GIVE OUT PERSONAL INFO.
BEFORE YOU GET A FIRM JOB OFFER
BE VIGILANT!
BANK DETAILS TO PAY YOU
NATIONAL INSURANCE NUMBER
DATE OF BIRTH
ADDRESS
FORM OF ID LIKE PASSPORT/DRIVING LICENCE
IF YOU ARE ASKED QUESTIONS LIKE THIS:
WALK AWAY !
YOUR IDENTITY IS AT RISK
Cyber Awareness Training www.datahops.com
LOCK THEM OUT !
NEVER DISCLOSE……….
CONFIDENTIAL INFORMATION
URGENT: We have noticed some unusual
activity on your account
We have set up a safe account to protect your
money. TAP here
https:// safe account login.com/ for access
Monday. 15 April 2022
12:30
Your account details have
changed. Click to learn more
In an email By text
By Phone With People
Cyber Awareness Training www.datahops.com
LOCK THEM OUT !
NEVER PAY FOR GOODS VIA..
MONEY / WIRE TRANSFER
ITS CALLED MONEY FOR NOTHING
!
!
!
!
A payment request where it is the
only payment method
A payment request by
someone you have never met
A payment request from
someone in a crisis situation
A payment request to release
funds or get you more money
Cyber Awareness Training www.datahops.com
LOCK THEM OUT !
BE CAREFUL OF “SURFERS”
STEALING YOUR INFORMATION
“SHOULDER SURFERS”

More Related Content

Similar to FREE A4 Cyber Security Awareness Posters-Social Engineering part 3

Identity Theft article_Good Neighbor magazine
Identity Theft article_Good Neighbor magazineIdentity Theft article_Good Neighbor magazine
Identity Theft article_Good Neighbor magazine
Kristi Valentini
 
Identity theft in the internet
Identity theft in the internetIdentity theft in the internet
Identity theft in the internet
mohmd-kutbi
 
FREE A4 Cyber Security Awareness Posters-Phishing
FREE A4 Cyber Security Awareness Posters-PhishingFREE A4 Cyber Security Awareness Posters-Phishing
FREE A4 Cyber Security Awareness Posters-Phishing
Data Hops
 
Protecting Yourself from Cyber Threats
Protecting Yourself from Cyber ThreatsProtecting Yourself from Cyber Threats
Protecting Yourself from Cyber Threats
Ray Brannon
 
cybercrime_presentation - Copy.ppt
cybercrime_presentation - Copy.pptcybercrime_presentation - Copy.ppt
cybercrime_presentation - Copy.ppt
bcanawakadalcollege
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
Rayanehaz
 
Avoiding Fraud and Identity Theft - October 2008
Avoiding Fraud and Identity Theft - October 2008Avoiding Fraud and Identity Theft - October 2008
Avoiding Fraud and Identity Theft - October 2008
FinancialCenter
 
FNC Personal Protect Workshop
FNC Personal Protect WorkshopFNC Personal Protect Workshop
FNC Personal Protect Workshop
forensicsnation
 
Identity theft
Identity theftIdentity theft
Identity theft
bhabagrahi dash
 
Common Consumer Frauds and How to Avoid Them-03-14
Common Consumer Frauds and How to Avoid Them-03-14Common Consumer Frauds and How to Avoid Them-03-14
Common Consumer Frauds and How to Avoid Them-03-14
Barbara O'Neill
 
Fraud Awareness
Fraud AwarenessFraud Awareness
Fraud Awareness
Yogi Schulz
 
Identity Theft ppt
Identity Theft pptIdentity Theft ppt
Identity Theft ppt
Angela Lawson
 
Cyber crime in india
Cyber crime in indiaCyber crime in india
Cyber crime in india
Rushikesh Maddalwar
 
Slideshow - Lil Rat
Slideshow - Lil RatSlideshow - Lil Rat
Slideshow - Lil Rat
megg16
 
Frauds and scams
Frauds and scamsFrauds and scams
Frauds and scams
Harold Stallard
 
Cybersecurity for the non-technical
Cybersecurity for the non-technicalCybersecurity for the non-technical
Cybersecurity for the non-technical
Stephen Cobb
 
Frauds and Seniors
Frauds and SeniorsFrauds and Seniors
Frauds and Seniors
Resiliency for Life
 
101 Ways Your Identity Can Be Stolen - Acuant #identitytheft
101 Ways Your Identity Can Be Stolen - Acuant #identitytheft101 Ways Your Identity Can Be Stolen - Acuant #identitytheft
101 Ways Your Identity Can Be Stolen - Acuant #identitytheft
Acuant
 
All about identity_theft
All about identity_theftAll about identity_theft
All about identity_theft
Flora Runyenje
 
Online Security & Privacy: Updated
Online Security & Privacy: UpdatedOnline Security & Privacy: Updated
Online Security & Privacy: Updated
Amanda L. Goodman
 

Similar to FREE A4 Cyber Security Awareness Posters-Social Engineering part 3 (20)

Identity Theft article_Good Neighbor magazine
Identity Theft article_Good Neighbor magazineIdentity Theft article_Good Neighbor magazine
Identity Theft article_Good Neighbor magazine
 
Identity theft in the internet
Identity theft in the internetIdentity theft in the internet
Identity theft in the internet
 
FREE A4 Cyber Security Awareness Posters-Phishing
FREE A4 Cyber Security Awareness Posters-PhishingFREE A4 Cyber Security Awareness Posters-Phishing
FREE A4 Cyber Security Awareness Posters-Phishing
 
Protecting Yourself from Cyber Threats
Protecting Yourself from Cyber ThreatsProtecting Yourself from Cyber Threats
Protecting Yourself from Cyber Threats
 
cybercrime_presentation - Copy.ppt
cybercrime_presentation - Copy.pptcybercrime_presentation - Copy.ppt
cybercrime_presentation - Copy.ppt
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Avoiding Fraud and Identity Theft - October 2008
Avoiding Fraud and Identity Theft - October 2008Avoiding Fraud and Identity Theft - October 2008
Avoiding Fraud and Identity Theft - October 2008
 
FNC Personal Protect Workshop
FNC Personal Protect WorkshopFNC Personal Protect Workshop
FNC Personal Protect Workshop
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Common Consumer Frauds and How to Avoid Them-03-14
Common Consumer Frauds and How to Avoid Them-03-14Common Consumer Frauds and How to Avoid Them-03-14
Common Consumer Frauds and How to Avoid Them-03-14
 
Fraud Awareness
Fraud AwarenessFraud Awareness
Fraud Awareness
 
Identity Theft ppt
Identity Theft pptIdentity Theft ppt
Identity Theft ppt
 
Cyber crime in india
Cyber crime in indiaCyber crime in india
Cyber crime in india
 
Slideshow - Lil Rat
Slideshow - Lil RatSlideshow - Lil Rat
Slideshow - Lil Rat
 
Frauds and scams
Frauds and scamsFrauds and scams
Frauds and scams
 
Cybersecurity for the non-technical
Cybersecurity for the non-technicalCybersecurity for the non-technical
Cybersecurity for the non-technical
 
Frauds and Seniors
Frauds and SeniorsFrauds and Seniors
Frauds and Seniors
 
101 Ways Your Identity Can Be Stolen - Acuant #identitytheft
101 Ways Your Identity Can Be Stolen - Acuant #identitytheft101 Ways Your Identity Can Be Stolen - Acuant #identitytheft
101 Ways Your Identity Can Be Stolen - Acuant #identitytheft
 
All about identity_theft
All about identity_theftAll about identity_theft
All about identity_theft
 
Online Security & Privacy: Updated
Online Security & Privacy: UpdatedOnline Security & Privacy: Updated
Online Security & Privacy: Updated
 

More from Data Hops

FREE A4 Cyber Security Awareness Posters-Phishing part 1
FREE A4 Cyber Security Awareness Posters-Phishing part 1FREE A4 Cyber Security Awareness Posters-Phishing part 1
FREE A4 Cyber Security Awareness Posters-Phishing part 1
Data Hops
 
Free A4 Cyber Security Awareness Posters-Social Engineering part 1
Free A4 Cyber Security Awareness Posters-Social Engineering part 1Free A4 Cyber Security Awareness Posters-Social Engineering part 1
Free A4 Cyber Security Awareness Posters-Social Engineering part 1
Data Hops
 
FREE A4 Cyber Security Awareness Posters-Passwords part 5
FREE A4 Cyber Security Awareness Posters-Passwords part 5FREE A4 Cyber Security Awareness Posters-Passwords part 5
FREE A4 Cyber Security Awareness Posters-Passwords part 5
Data Hops
 
A4 Cyber Security Awareness Posters-Password Security part 4
A4 Cyber Security Awareness Posters-Password Security part 4A4 Cyber Security Awareness Posters-Password Security part 4
A4 Cyber Security Awareness Posters-Password Security part 4
Data Hops
 
FREE A4 Cyber Security Awareness Posters-Password Security part 3
FREE A4 Cyber Security Awareness Posters-Password Security part 3FREE A4 Cyber Security Awareness Posters-Password Security part 3
FREE A4 Cyber Security Awareness Posters-Password Security part 3
Data Hops
 
FREE A4 Cyber Security Awareness Posters-Password Security part 2
FREE A4 Cyber Security Awareness Posters-Password Security part 2FREE A4 Cyber Security Awareness Posters-Password Security part 2
FREE A4 Cyber Security Awareness Posters-Password Security part 2
Data Hops
 
FREE A4 Data Security GDPR Posters-Data Protection part 5
FREE A4 Data Security GDPR Posters-Data Protection part 5FREE A4 Data Security GDPR Posters-Data Protection part 5
FREE A4 Data Security GDPR Posters-Data Protection part 5
Data Hops
 
FREE A4 Data Security GDPR Posters-Data Protection part 4
FREE A4 Data Security GDPR Posters-Data Protection part 4FREE A4 Data Security GDPR Posters-Data Protection part 4
FREE A4 Data Security GDPR Posters-Data Protection part 4
Data Hops
 
FREE A4 Data Security GDPR Posters-Data Protection part 3
FREE A4 Data  Security GDPR Posters-Data Protection part 3FREE A4 Data  Security GDPR Posters-Data Protection part 3
FREE A4 Data Security GDPR Posters-Data Protection part 3
Data Hops
 
FREE A4 Data Security GDPR Posters-Data Protection part 2
FREE A4 Data Security GDPR Posters-Data Protection part 2FREE A4 Data Security GDPR Posters-Data Protection part 2
FREE A4 Data Security GDPR Posters-Data Protection part 2
Data Hops
 
E A4 Data Security GDPR Posters-Data Protection part1FRE
E A4 Data Security GDPR Posters-Data Protection part1FREE A4 Data Security GDPR Posters-Data Protection part1FRE
E A4 Data Security GDPR Posters-Data Protection part1FRE
Data Hops
 
FREE A4 Security Awareness Posters- GDPR Do's Data Protection Ninja
FREE A4 Security  Awareness Posters- GDPR Do's Data Protection NinjaFREE A4 Security  Awareness Posters- GDPR Do's Data Protection Ninja
FREE A4 Security Awareness Posters- GDPR Do's Data Protection Ninja
Data Hops
 
FREE A4 cyber Security awareness Posters-Data Protection -GDPR
FREE A4 cyber Security awareness  Posters-Data Protection -GDPRFREE A4 cyber Security awareness  Posters-Data Protection -GDPR
FREE A4 cyber Security awareness Posters-Data Protection -GDPR
Data Hops
 
FREE A4 Cyber Security awareness- Posters-Data Protection -GDPR
FREE A4 Cyber Security awareness- Posters-Data Protection -GDPRFREE A4 Cyber Security awareness- Posters-Data Protection -GDPR
FREE A4 Cyber Security awareness- Posters-Data Protection -GDPR
Data Hops
 
FREE A4 Cyber Security Posters-Data Protection-GDPR
FREE A4 Cyber Security Posters-Data Protection-GDPRFREE A4 Cyber Security Posters-Data Protection-GDPR
FREE A4 Cyber Security Posters-Data Protection-GDPR
Data Hops
 
FREE A4 Cyber Security Awareness Posters-Removable Device
FREE A4  Cyber Security Awareness Posters-Removable DeviceFREE A4  Cyber Security Awareness Posters-Removable Device
FREE A4 Cyber Security Awareness Posters-Removable Device
Data Hops
 
Free Printable A4 Cyber Security Awareness Posters-Malware
Free Printable A4 Cyber Security Awareness Posters-MalwareFree Printable A4 Cyber Security Awareness Posters-Malware
Free Printable A4 Cyber Security Awareness Posters-Malware
Data Hops
 
FREE A4 Cyber Security Awareness Posters-Data Privacy
FREE A4 Cyber Security Awareness Posters-Data PrivacyFREE A4 Cyber Security Awareness Posters-Data Privacy
FREE A4 Cyber Security Awareness Posters-Data Privacy
Data Hops
 
FREE A4 Cyber Security Awareness Posters-Device Security
FREE A4 Cyber Security Awareness Posters-Device SecurityFREE A4 Cyber Security Awareness Posters-Device Security
FREE A4 Cyber Security Awareness Posters-Device Security
Data Hops
 
FREE A4 Cyber Security Awareness Posters-Passwords
FREE A4 Cyber Security Awareness Posters-PasswordsFREE A4 Cyber Security Awareness Posters-Passwords
FREE A4 Cyber Security Awareness Posters-Passwords
Data Hops
 

More from Data Hops (20)

FREE A4 Cyber Security Awareness Posters-Phishing part 1
FREE A4 Cyber Security Awareness Posters-Phishing part 1FREE A4 Cyber Security Awareness Posters-Phishing part 1
FREE A4 Cyber Security Awareness Posters-Phishing part 1
 
Free A4 Cyber Security Awareness Posters-Social Engineering part 1
Free A4 Cyber Security Awareness Posters-Social Engineering part 1Free A4 Cyber Security Awareness Posters-Social Engineering part 1
Free A4 Cyber Security Awareness Posters-Social Engineering part 1
 
FREE A4 Cyber Security Awareness Posters-Passwords part 5
FREE A4 Cyber Security Awareness Posters-Passwords part 5FREE A4 Cyber Security Awareness Posters-Passwords part 5
FREE A4 Cyber Security Awareness Posters-Passwords part 5
 
A4 Cyber Security Awareness Posters-Password Security part 4
A4 Cyber Security Awareness Posters-Password Security part 4A4 Cyber Security Awareness Posters-Password Security part 4
A4 Cyber Security Awareness Posters-Password Security part 4
 
FREE A4 Cyber Security Awareness Posters-Password Security part 3
FREE A4 Cyber Security Awareness Posters-Password Security part 3FREE A4 Cyber Security Awareness Posters-Password Security part 3
FREE A4 Cyber Security Awareness Posters-Password Security part 3
 
FREE A4 Cyber Security Awareness Posters-Password Security part 2
FREE A4 Cyber Security Awareness Posters-Password Security part 2FREE A4 Cyber Security Awareness Posters-Password Security part 2
FREE A4 Cyber Security Awareness Posters-Password Security part 2
 
FREE A4 Data Security GDPR Posters-Data Protection part 5
FREE A4 Data Security GDPR Posters-Data Protection part 5FREE A4 Data Security GDPR Posters-Data Protection part 5
FREE A4 Data Security GDPR Posters-Data Protection part 5
 
FREE A4 Data Security GDPR Posters-Data Protection part 4
FREE A4 Data Security GDPR Posters-Data Protection part 4FREE A4 Data Security GDPR Posters-Data Protection part 4
FREE A4 Data Security GDPR Posters-Data Protection part 4
 
FREE A4 Data Security GDPR Posters-Data Protection part 3
FREE A4 Data  Security GDPR Posters-Data Protection part 3FREE A4 Data  Security GDPR Posters-Data Protection part 3
FREE A4 Data Security GDPR Posters-Data Protection part 3
 
FREE A4 Data Security GDPR Posters-Data Protection part 2
FREE A4 Data Security GDPR Posters-Data Protection part 2FREE A4 Data Security GDPR Posters-Data Protection part 2
FREE A4 Data Security GDPR Posters-Data Protection part 2
 
E A4 Data Security GDPR Posters-Data Protection part1FRE
E A4 Data Security GDPR Posters-Data Protection part1FREE A4 Data Security GDPR Posters-Data Protection part1FRE
E A4 Data Security GDPR Posters-Data Protection part1FRE
 
FREE A4 Security Awareness Posters- GDPR Do's Data Protection Ninja
FREE A4 Security  Awareness Posters- GDPR Do's Data Protection NinjaFREE A4 Security  Awareness Posters- GDPR Do's Data Protection Ninja
FREE A4 Security Awareness Posters- GDPR Do's Data Protection Ninja
 
FREE A4 cyber Security awareness Posters-Data Protection -GDPR
FREE A4 cyber Security awareness  Posters-Data Protection -GDPRFREE A4 cyber Security awareness  Posters-Data Protection -GDPR
FREE A4 cyber Security awareness Posters-Data Protection -GDPR
 
FREE A4 Cyber Security awareness- Posters-Data Protection -GDPR
FREE A4 Cyber Security awareness- Posters-Data Protection -GDPRFREE A4 Cyber Security awareness- Posters-Data Protection -GDPR
FREE A4 Cyber Security awareness- Posters-Data Protection -GDPR
 
FREE A4 Cyber Security Posters-Data Protection-GDPR
FREE A4 Cyber Security Posters-Data Protection-GDPRFREE A4 Cyber Security Posters-Data Protection-GDPR
FREE A4 Cyber Security Posters-Data Protection-GDPR
 
FREE A4 Cyber Security Awareness Posters-Removable Device
FREE A4  Cyber Security Awareness Posters-Removable DeviceFREE A4  Cyber Security Awareness Posters-Removable Device
FREE A4 Cyber Security Awareness Posters-Removable Device
 
Free Printable A4 Cyber Security Awareness Posters-Malware
Free Printable A4 Cyber Security Awareness Posters-MalwareFree Printable A4 Cyber Security Awareness Posters-Malware
Free Printable A4 Cyber Security Awareness Posters-Malware
 
FREE A4 Cyber Security Awareness Posters-Data Privacy
FREE A4 Cyber Security Awareness Posters-Data PrivacyFREE A4 Cyber Security Awareness Posters-Data Privacy
FREE A4 Cyber Security Awareness Posters-Data Privacy
 
FREE A4 Cyber Security Awareness Posters-Device Security
FREE A4 Cyber Security Awareness Posters-Device SecurityFREE A4 Cyber Security Awareness Posters-Device Security
FREE A4 Cyber Security Awareness Posters-Device Security
 
FREE A4 Cyber Security Awareness Posters-Passwords
FREE A4 Cyber Security Awareness Posters-PasswordsFREE A4 Cyber Security Awareness Posters-Passwords
FREE A4 Cyber Security Awareness Posters-Passwords
 

Recently uploaded

Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
Pablo Gómez Abajo
 
What is an RPA CoE? Session 2 – CoE Roles
What is an RPA CoE?  Session 2 – CoE RolesWhat is an RPA CoE?  Session 2 – CoE Roles
What is an RPA CoE? Session 2 – CoE Roles
DianaGray10
 
Automation Student Developers Session 3: Introduction to UI Automation
Automation Student Developers Session 3: Introduction to UI AutomationAutomation Student Developers Session 3: Introduction to UI Automation
Automation Student Developers Session 3: Introduction to UI Automation
UiPathCommunity
 
Introduction to ThousandEyes AMER Webinar
Introduction  to ThousandEyes AMER WebinarIntroduction  to ThousandEyes AMER Webinar
Introduction to ThousandEyes AMER Webinar
ThousandEyes
 
GlobalLogic Java Community Webinar #18 “How to Improve Web Application Perfor...
GlobalLogic Java Community Webinar #18 “How to Improve Web Application Perfor...GlobalLogic Java Community Webinar #18 “How to Improve Web Application Perfor...
GlobalLogic Java Community Webinar #18 “How to Improve Web Application Perfor...
GlobalLogic Ukraine
 
Christine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptxChristine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptx
christinelarrosa
 
Multivendor cloud production with VSF TR-11 - there and back again
Multivendor cloud production with VSF TR-11 - there and back againMultivendor cloud production with VSF TR-11 - there and back again
Multivendor cloud production with VSF TR-11 - there and back again
Kieran Kunhya
 
MongoDB to ScyllaDB: Technical Comparison and the Path to Success
MongoDB to ScyllaDB: Technical Comparison and the Path to SuccessMongoDB to ScyllaDB: Technical Comparison and the Path to Success
MongoDB to ScyllaDB: Technical Comparison and the Path to Success
ScyllaDB
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
Jason Yip
 
Introducing BoxLang : A new JVM language for productivity and modularity!
Introducing BoxLang : A new JVM language for productivity and modularity!Introducing BoxLang : A new JVM language for productivity and modularity!
Introducing BoxLang : A new JVM language for productivity and modularity!
Ortus Solutions, Corp
 
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
DanBrown980551
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
Safe Software
 
Discover the Unseen: Tailored Recommendation of Unwatched Content
Discover the Unseen: Tailored Recommendation of Unwatched ContentDiscover the Unseen: Tailored Recommendation of Unwatched Content
Discover the Unseen: Tailored Recommendation of Unwatched Content
ScyllaDB
 
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
AlexanderRichford
 
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving
 
Christine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptxChristine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptx
christinelarrosa
 
A Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's ArchitectureA Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's Architecture
ScyllaDB
 
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptxPRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
christinelarrosa
 
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham HillinQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
LizaNolte
 

Recently uploaded (20)

Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
 
What is an RPA CoE? Session 2 – CoE Roles
What is an RPA CoE?  Session 2 – CoE RolesWhat is an RPA CoE?  Session 2 – CoE Roles
What is an RPA CoE? Session 2 – CoE Roles
 
Automation Student Developers Session 3: Introduction to UI Automation
Automation Student Developers Session 3: Introduction to UI AutomationAutomation Student Developers Session 3: Introduction to UI Automation
Automation Student Developers Session 3: Introduction to UI Automation
 
Introduction to ThousandEyes AMER Webinar
Introduction  to ThousandEyes AMER WebinarIntroduction  to ThousandEyes AMER Webinar
Introduction to ThousandEyes AMER Webinar
 
GlobalLogic Java Community Webinar #18 “How to Improve Web Application Perfor...
GlobalLogic Java Community Webinar #18 “How to Improve Web Application Perfor...GlobalLogic Java Community Webinar #18 “How to Improve Web Application Perfor...
GlobalLogic Java Community Webinar #18 “How to Improve Web Application Perfor...
 
Christine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptxChristine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptx
 
Multivendor cloud production with VSF TR-11 - there and back again
Multivendor cloud production with VSF TR-11 - there and back againMultivendor cloud production with VSF TR-11 - there and back again
Multivendor cloud production with VSF TR-11 - there and back again
 
MongoDB to ScyllaDB: Technical Comparison and the Path to Success
MongoDB to ScyllaDB: Technical Comparison and the Path to SuccessMongoDB to ScyllaDB: Technical Comparison and the Path to Success
MongoDB to ScyllaDB: Technical Comparison and the Path to Success
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
 
Introducing BoxLang : A new JVM language for productivity and modularity!
Introducing BoxLang : A new JVM language for productivity and modularity!Introducing BoxLang : A new JVM language for productivity and modularity!
Introducing BoxLang : A new JVM language for productivity and modularity!
 
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
 
Discover the Unseen: Tailored Recommendation of Unwatched Content
Discover the Unseen: Tailored Recommendation of Unwatched ContentDiscover the Unseen: Tailored Recommendation of Unwatched Content
Discover the Unseen: Tailored Recommendation of Unwatched Content
 
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
 
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
 
Christine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptxChristine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptx
 
A Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's ArchitectureA Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's Architecture
 
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptxPRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
 
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham HillinQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
 

FREE A4 Cyber Security Awareness Posters-Social Engineering part 3

  • 1. LOCK THEM OUT datahops.com CYBER SECURITY AWARENESS IDENTITY THEFT BE CAREFUL WHAT YOU POST ON SOCIAL MEDIA ? DO YOU PUT YOUR WHOLE LIFE
  • 2. LOCK THEM OUT datahops.com CYBER SECURITY AWARENESS NEVER BUY A IT’S A POPULAR SCAM TO PAY SOMEONE GIFT CARD GIFT CARD SCAM
  • 3. LOCK THEM OUT datahops.com CYBER SECURITY AWARENESS IF ALARM BELLS START RINGING IN YOUR HEAD TRUST YOUR INSTINCTS WALK AWAY
  • 4. LOCK THEM OUT datahops.com CYBER SECURITY AWARENESS JUST INVITE THEM IN Don’t reveal too much about your plans on social media especially revealing your travel itinerary and giving commentaries, uploading pictures. The thieves will know you are away ON HOLIDAY! PICTURES
  • 5. LOCK THEM OUT datahops.com CYBER SECURITY AWARENESS IS LOVE FREE OR BLIND Con artists create online fake identities and trick people into romantic relationships with the aim of asking for money using a fabricated emergency as an excuse
  • 6. Cyber Awareness Training www.datahops.com LOCK THEM OUT ! NEVER RESPOND TO MISSED PARCEL DELIVERY TEXT MESSAGES IT’S IDENTITY THEFT POST OFFICE : Your parcel was Returned to our depot after a failed delivery attempt. You can arrange redelivery via: https:// post office delivery/payment How did the post office get your Number ?? The post Office will never send you a text message unless you requested it
  • 7. LOCK THEM OUT datahops.com CYBER SECURITY AWARENESS HOT OFF THE PRESS Never reveal, share or publish sensitive information including pictures on social media that may give away any clues about your movements or insights into your personal life
  • 8. Cyber Awareness Training www.datahops.com LOCK THEM OUT ! BE CAREFUL OF ONE RING PHONE SCAMS RESULT: A LARGE PHONE BILL MISSED CALLS 3 +235 123 4567 +233 890 1234 +256 123 4567 1. Don’t answer or return any calls from numbers you don’t recognize 2. Check the location the call came from by doing a quick search online for the code 3. Block the number and report it to your network carrier or block outgoing international calls Return calls to strange looking numbers and you could end up with a hefty bill because these numbers coil be located anywhere in the world
  • 9. Cyber Awareness Training www.datahops.com LOCK THEM OUT ! NEVER GIVE OUT PERSONAL INFO. BEFORE YOU GET A FIRM JOB OFFER BE VIGILANT! BANK DETAILS TO PAY YOU NATIONAL INSURANCE NUMBER DATE OF BIRTH ADDRESS FORM OF ID LIKE PASSPORT/DRIVING LICENCE IF YOU ARE ASKED QUESTIONS LIKE THIS: WALK AWAY ! YOUR IDENTITY IS AT RISK
  • 10. Cyber Awareness Training www.datahops.com LOCK THEM OUT ! NEVER DISCLOSE………. CONFIDENTIAL INFORMATION URGENT: We have noticed some unusual activity on your account We have set up a safe account to protect your money. TAP here https:// safe account login.com/ for access Monday. 15 April 2022 12:30 Your account details have changed. Click to learn more In an email By text By Phone With People
  • 11. Cyber Awareness Training www.datahops.com LOCK THEM OUT ! NEVER PAY FOR GOODS VIA.. MONEY / WIRE TRANSFER ITS CALLED MONEY FOR NOTHING ! ! ! ! A payment request where it is the only payment method A payment request by someone you have never met A payment request from someone in a crisis situation A payment request to release funds or get you more money
  • 12. Cyber Awareness Training www.datahops.com LOCK THEM OUT ! BE CAREFUL OF “SURFERS” STEALING YOUR INFORMATION “SHOULDER SURFERS”
  翻译: