尊敬的 微信汇率:1円 ≈ 0.046166 元 支付宝汇率:1円 ≈ 0.046257元 [退出登录]
SlideShare a Scribd company logo
ALWAYS SHRED
LOCK THEM OUT
datahops.com
CYBER SECURITY AWARENESS
DOCUMENTS
IMPORTANT & PERSONAL
PRINT IMPORTANT DOCUMENTS
WORK ON THEM IN PUBLIC PLACES
DON’T
CYBER SECURITY AWARENESS
datahops.com
LOCK THEM OUT
AND
LOCK THEM OUT
datahops.com
CYBER SECURITY AWARENESS
WHO’S LISTENING ?
INFORMATION IN PUBLIC PLACES
DON’T REVEAL SENSITIVE
TO YOUR PHONE CALLS AND CONVERSATIONS
LOCK THEM OUT
datahops.com
CYBER SECURITY AWARENESS
Check your privacy settings to control who can
see and access your profile, the way your data
is used, collected and shared
WHO WANTS
TO KNOW?
P
R
I VA T
E
LOCK THEM OUT
datahops.com
CYBER SECURITY AWARENESS
SINK OR
SWIM ?
Avoid that sinking feeling.
Do a regular backup of files in case of an
unexpected occurrence. This can help you
restore your files quickly and easily.
Where is the Data?
Cybersecurity awareness training datahops.com
If you need it Protect it
If you don’t delete it
Keep Data Safe
Where is the Data?
Deleted data is still on the computer
Did You know That
Cybersecurity awareness training datahops.com
You emptied the recycle bin but
All is not lost!
The only guaranteed way to repair your computer
after a security incident is to Backup your files
regularly - then erase and reinstall the system.
How to Recover
From a Disaster
Cybersecurity awareness training datahops.com
LOCK THEM OUT
datahops.com
CYBER SECURITY AWARENESS
JUST
BACK UP
Backup your files and folders regularly using
secure and authorised data storage devices or
recognised cloud services
LOCK THEM OUT
datahops.com
CYBER SECURITY AWARENESS
IS PRICELESS
PEACE OF MIND
Turn on encryption to protect your files if your
device gets lost or stolen. It cannot be accessed
by anyone without the password or recovery
key
Cybersecurity awareness training datahops.com
Encrypt
Lock them up
Lock them out
to
Cybersecurity awareness training datahops.com
your Files
Any sensitive or confidential data, should be encrypted.
THE WALL IS ON FIRE
Cybersecurity awareness training datahops.com
Turn on the Firewall
Protect Your Data
Make Your Device Safe And Secure
Turn on the
firewall
Install antivirus
software
Check security settings
for operating system
and browser
Set up password
protection
Cybersecurity awareness training datahops.com
Prevent Unauthorised Access
Password Protect all your Devices
If one is compromised, the criminals may be able to access
all of your data through your cloud storage service provider
Cybersecurity awareness training datahops.com
SECURE YOUR
LOCK THEM OUT
datahops.com
CYBER SECURITY AWARENESS
WIRELESS NETWORK
Change default Passwords
Hackers are aware of the preset SSID and default password
Enable WPA2 Encryption
TURN OFF BLUETOOTH
These can be exploited by hackers to eavesdrop,
establish remote access controls, distribute
malware and drain batteries! OUCH!!
WHEN NOT IN USE
Cybersecurity awareness training datahops.com
Off
Turn on Bluetooth to connect to nearby devices
< Bluetooth
Cybersecurity awareness training datahops.com
Encrypt
Cybersecurity awareness training datahops.com
sensitive Data
Prevent Unauthorized Persons From
viewing or Accessing the Content
Regular Backups
Can prevent the loss of irreplaceable data.
Cybersecurity awareness training datahops.com
DATA USE POLICY
How will the service provider:
Collect your information
WHAT HAPPENS TO YOU DATA
Use your information
Collect your information
Cybersecurity awareness training datahops.com
PRIVACY SETTINGS
These settings allow you to say who can:
See your information
WHAT HAPPENS TO YOU DATA
Access your information
Access account data
Cybersecurity awareness training datahops.com
SECURITY POLICY
How the company is protecting your data:
Confidentiality
WHAT HAPPENS TO YOU DATA
Integrity
Availability
Cybersecurity awareness training datahops.com
FAQ’s
Can you request a copy of
your data
WHAT HAPPENS TO YOU DATA
What can they do with the
data you uploaded
What happens to your data
When you close your account
Cybersecurity awareness training datahops.com
Have you read the terms
and conditions
What are your rights over
your data
STOP
PROTECT YOUR DATA
Cybersecurity awareness training datahops.com
ENCRYPT SENSITIVE DATA
STOP
Cybersecurity awareness training datahops.com
PROTECT YOUR DATA
USE STRONG PASSWORDS
STOP
Cybersecurity awareness training datahops.com
PROTECT YOUR DATA
BACKUP DATA REGULARLY
STOP
Cybersecurity awareness training datahops.com
PROTECT YOUR DATA
TURN ON FIREWALL
STOP
Cybersecurity awareness training datahops.com
PROTECT YOUR DATA
LOCK UP YOUR DEVICES

More Related Content

Similar to FREE A4 Cyber Security Posters-Data Protection-GDPR

The Cloud Beckons, But is it Safe?
The Cloud Beckons, But is it Safe?The Cloud Beckons, But is it Safe?
Confidentiality in a Digital World
Confidentiality in a Digital WorldConfidentiality in a Digital World
Confidentiality in a Digital World
David Whelan
 
Profile securitarian
Profile   securitarianProfile   securitarian
Profile securitarian
Rupesh Verma
 
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptxCYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
BarakaMuyengi
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
amiinaaa
 
Who Can Benefit from a Cyber-Security Framework in Dubai?
Who Can Benefit from a Cyber-Security Framework in Dubai?Who Can Benefit from a Cyber-Security Framework in Dubai?
Who Can Benefit from a Cyber-Security Framework in Dubai?
VRS Technologies
 
FREE A4 Data Security GDPR Posters-Data Protection part 5
FREE A4 Data Security GDPR Posters-Data Protection part 5FREE A4 Data Security GDPR Posters-Data Protection part 5
FREE A4 Data Security GDPR Posters-Data Protection part 5
Data Hops
 
Secure End User
Secure End UserSecure End User
Secure End User
Muhammad Salahuddien
 
FREE A4 Cyber Security Awareness Posters-Device Security
FREE A4 Cyber Security Awareness Posters-Device SecurityFREE A4 Cyber Security Awareness Posters-Device Security
FREE A4 Cyber Security Awareness Posters-Device Security
Data Hops
 
Scouts-Internet-Safety.pptx
Scouts-Internet-Safety.pptxScouts-Internet-Safety.pptx
Scouts-Internet-Safety.pptx
SujayJadhav16
 
Find Powerful Methods To Fight Against Cyber Threats?
Find Powerful Methods To Fight Against Cyber Threats?Find Powerful Methods To Fight Against Cyber Threats?
Find Powerful Methods To Fight Against Cyber Threats?
VRS Technologies
 
Law Firm & Legal Department Security & Practice In The Real World
Law Firm & Legal Department Security & Practice In The Real WorldLaw Firm & Legal Department Security & Practice In The Real World
Law Firm & Legal Department Security & Practice In The Real World
Richard Harbridge
 
Stackfield Cloud Security 101
Stackfield Cloud Security 101Stackfield Cloud Security 101
Stackfield Cloud Security 101
Stackfield
 
datasheet-quickheal-total-securitypdf...
datasheet-quickheal-total-securitypdf...datasheet-quickheal-total-securitypdf...
datasheet-quickheal-total-securitypdf...
QUICK HEAL TECHNOLOGIES LIMITED
 
TheInternetDigitalSecurityfddreeere.pptx
TheInternetDigitalSecurityfddreeere.pptxTheInternetDigitalSecurityfddreeere.pptx
TheInternetDigitalSecurityfddreeere.pptx
HAYDEECAYDA
 
Protecting Your Privacy: Cyberspace Security, Real World Safety
Protecting Your Privacy: Cyberspace Security, Real World SafetyProtecting Your Privacy: Cyberspace Security, Real World Safety
Protecting Your Privacy: Cyberspace Security, Real World Safety
AEGILITY
 
Securing Mobile & Online Identity in the Cyber World
Securing Mobile & Online Identity in the Cyber WorldSecuring Mobile & Online Identity in the Cyber World
Securing Mobile & Online Identity in the Cyber World
Emil Tan
 
Cyber Security School Workshop
Cyber Security School WorkshopCyber Security School Workshop
Cyber Security School Workshop
Rahul Nayan
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Adeel Younas
 
Persentation
PersentationPersentation
Persentation
Mehar Tayyab
 

Similar to FREE A4 Cyber Security Posters-Data Protection-GDPR (20)

The Cloud Beckons, But is it Safe?
The Cloud Beckons, But is it Safe?The Cloud Beckons, But is it Safe?
The Cloud Beckons, But is it Safe?
 
Confidentiality in a Digital World
Confidentiality in a Digital WorldConfidentiality in a Digital World
Confidentiality in a Digital World
 
Profile securitarian
Profile   securitarianProfile   securitarian
Profile securitarian
 
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptxCYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
 
Who Can Benefit from a Cyber-Security Framework in Dubai?
Who Can Benefit from a Cyber-Security Framework in Dubai?Who Can Benefit from a Cyber-Security Framework in Dubai?
Who Can Benefit from a Cyber-Security Framework in Dubai?
 
FREE A4 Data Security GDPR Posters-Data Protection part 5
FREE A4 Data Security GDPR Posters-Data Protection part 5FREE A4 Data Security GDPR Posters-Data Protection part 5
FREE A4 Data Security GDPR Posters-Data Protection part 5
 
Secure End User
Secure End UserSecure End User
Secure End User
 
FREE A4 Cyber Security Awareness Posters-Device Security
FREE A4 Cyber Security Awareness Posters-Device SecurityFREE A4 Cyber Security Awareness Posters-Device Security
FREE A4 Cyber Security Awareness Posters-Device Security
 
Scouts-Internet-Safety.pptx
Scouts-Internet-Safety.pptxScouts-Internet-Safety.pptx
Scouts-Internet-Safety.pptx
 
Find Powerful Methods To Fight Against Cyber Threats?
Find Powerful Methods To Fight Against Cyber Threats?Find Powerful Methods To Fight Against Cyber Threats?
Find Powerful Methods To Fight Against Cyber Threats?
 
Law Firm & Legal Department Security & Practice In The Real World
Law Firm & Legal Department Security & Practice In The Real WorldLaw Firm & Legal Department Security & Practice In The Real World
Law Firm & Legal Department Security & Practice In The Real World
 
Stackfield Cloud Security 101
Stackfield Cloud Security 101Stackfield Cloud Security 101
Stackfield Cloud Security 101
 
datasheet-quickheal-total-securitypdf...
datasheet-quickheal-total-securitypdf...datasheet-quickheal-total-securitypdf...
datasheet-quickheal-total-securitypdf...
 
TheInternetDigitalSecurityfddreeere.pptx
TheInternetDigitalSecurityfddreeere.pptxTheInternetDigitalSecurityfddreeere.pptx
TheInternetDigitalSecurityfddreeere.pptx
 
Protecting Your Privacy: Cyberspace Security, Real World Safety
Protecting Your Privacy: Cyberspace Security, Real World SafetyProtecting Your Privacy: Cyberspace Security, Real World Safety
Protecting Your Privacy: Cyberspace Security, Real World Safety
 
Securing Mobile & Online Identity in the Cyber World
Securing Mobile & Online Identity in the Cyber WorldSecuring Mobile & Online Identity in the Cyber World
Securing Mobile & Online Identity in the Cyber World
 
Cyber Security School Workshop
Cyber Security School WorkshopCyber Security School Workshop
Cyber Security School Workshop
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Persentation
PersentationPersentation
Persentation
 

More from Data Hops

FREE A4 Cyber Security Awareness Posters-Phishing part 1
FREE A4 Cyber Security Awareness Posters-Phishing part 1FREE A4 Cyber Security Awareness Posters-Phishing part 1
FREE A4 Cyber Security Awareness Posters-Phishing part 1
Data Hops
 
FREE A4 Cyber Security Awareness Posters-Phishing part 2
FREE A4 Cyber Security Awareness  Posters-Phishing part 2FREE A4 Cyber Security Awareness  Posters-Phishing part 2
FREE A4 Cyber Security Awareness Posters-Phishing part 2
Data Hops
 
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
Data Hops
 
FREE Cyber Security Awareness Posters-Social Engineering part 2
FREE Cyber Security Awareness  Posters-Social Engineering part 2FREE Cyber Security Awareness  Posters-Social Engineering part 2
FREE Cyber Security Awareness Posters-Social Engineering part 2
Data Hops
 
Free A4 Cyber Security Awareness Posters-Social Engineering part 1
Free A4 Cyber Security Awareness Posters-Social Engineering part 1Free A4 Cyber Security Awareness Posters-Social Engineering part 1
Free A4 Cyber Security Awareness Posters-Social Engineering part 1
Data Hops
 
FREE A4 Cyber Security Awareness Posters-Passwords part 5
FREE A4 Cyber Security Awareness Posters-Passwords part 5FREE A4 Cyber Security Awareness Posters-Passwords part 5
FREE A4 Cyber Security Awareness Posters-Passwords part 5
Data Hops
 
A4 Cyber Security Awareness Posters-Password Security part 4
A4 Cyber Security Awareness Posters-Password Security part 4A4 Cyber Security Awareness Posters-Password Security part 4
A4 Cyber Security Awareness Posters-Password Security part 4
Data Hops
 
FREE A4 Cyber Security Awareness Posters-Password Security part 3
FREE A4 Cyber Security Awareness Posters-Password Security part 3FREE A4 Cyber Security Awareness Posters-Password Security part 3
FREE A4 Cyber Security Awareness Posters-Password Security part 3
Data Hops
 
FREE A4 Cyber Security Awareness Posters-Password Security part 2
FREE A4 Cyber Security Awareness Posters-Password Security part 2FREE A4 Cyber Security Awareness Posters-Password Security part 2
FREE A4 Cyber Security Awareness Posters-Password Security part 2
Data Hops
 
FREE A4 Data Security GDPR Posters-Data Protection part 4
FREE A4 Data Security GDPR Posters-Data Protection part 4FREE A4 Data Security GDPR Posters-Data Protection part 4
FREE A4 Data Security GDPR Posters-Data Protection part 4
Data Hops
 
FREE A4 Data Security GDPR Posters-Data Protection part 3
FREE A4 Data  Security GDPR Posters-Data Protection part 3FREE A4 Data  Security GDPR Posters-Data Protection part 3
FREE A4 Data Security GDPR Posters-Data Protection part 3
Data Hops
 
FREE A4 cyber Security awareness Posters-Data Protection -GDPR
FREE A4 cyber Security awareness  Posters-Data Protection -GDPRFREE A4 cyber Security awareness  Posters-Data Protection -GDPR
FREE A4 cyber Security awareness Posters-Data Protection -GDPR
Data Hops
 
FREE A4 Cyber Security awareness- Posters-Data Protection -GDPR
FREE A4 Cyber Security awareness- Posters-Data Protection -GDPRFREE A4 Cyber Security awareness- Posters-Data Protection -GDPR
FREE A4 Cyber Security awareness- Posters-Data Protection -GDPR
Data Hops
 
FREE A4 Cyber Security Awareness Posters-Removable Device
FREE A4  Cyber Security Awareness Posters-Removable DeviceFREE A4  Cyber Security Awareness Posters-Removable Device
FREE A4 Cyber Security Awareness Posters-Removable Device
Data Hops
 
Free Printable A4 Cyber Security Awareness Posters-Malware
Free Printable A4 Cyber Security Awareness Posters-MalwareFree Printable A4 Cyber Security Awareness Posters-Malware
Free Printable A4 Cyber Security Awareness Posters-Malware
Data Hops
 
FREE A4 Cyber Security Awareness Posters-Phishing
FREE A4 Cyber Security Awareness Posters-PhishingFREE A4 Cyber Security Awareness Posters-Phishing
FREE A4 Cyber Security Awareness Posters-Phishing
Data Hops
 
FREE A4 Cyber Security Awareness Posters-Social Engineering
FREE A4 Cyber Security Awareness Posters-Social EngineeringFREE A4 Cyber Security Awareness Posters-Social Engineering
FREE A4 Cyber Security Awareness Posters-Social Engineering
Data Hops
 
FREE A4 Cyber Security Awareness Posters-Data Privacy
FREE A4 Cyber Security Awareness Posters-Data PrivacyFREE A4 Cyber Security Awareness Posters-Data Privacy
FREE A4 Cyber Security Awareness Posters-Data Privacy
Data Hops
 
FREE A4 Cyber Security Awareness Posters-Passwords
FREE A4 Cyber Security Awareness Posters-PasswordsFREE A4 Cyber Security Awareness Posters-Passwords
FREE A4 Cyber Security Awareness Posters-Passwords
Data Hops
 
Free Digital Signage Cybersecurity Screensavers Part 1
Free  Digital Signage Cybersecurity Screensavers Part 1Free  Digital Signage Cybersecurity Screensavers Part 1
Free Digital Signage Cybersecurity Screensavers Part 1
Data Hops
 

More from Data Hops (20)

FREE A4 Cyber Security Awareness Posters-Phishing part 1
FREE A4 Cyber Security Awareness Posters-Phishing part 1FREE A4 Cyber Security Awareness Posters-Phishing part 1
FREE A4 Cyber Security Awareness Posters-Phishing part 1
 
FREE A4 Cyber Security Awareness Posters-Phishing part 2
FREE A4 Cyber Security Awareness  Posters-Phishing part 2FREE A4 Cyber Security Awareness  Posters-Phishing part 2
FREE A4 Cyber Security Awareness Posters-Phishing part 2
 
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
 
FREE Cyber Security Awareness Posters-Social Engineering part 2
FREE Cyber Security Awareness  Posters-Social Engineering part 2FREE Cyber Security Awareness  Posters-Social Engineering part 2
FREE Cyber Security Awareness Posters-Social Engineering part 2
 
Free A4 Cyber Security Awareness Posters-Social Engineering part 1
Free A4 Cyber Security Awareness Posters-Social Engineering part 1Free A4 Cyber Security Awareness Posters-Social Engineering part 1
Free A4 Cyber Security Awareness Posters-Social Engineering part 1
 
FREE A4 Cyber Security Awareness Posters-Passwords part 5
FREE A4 Cyber Security Awareness Posters-Passwords part 5FREE A4 Cyber Security Awareness Posters-Passwords part 5
FREE A4 Cyber Security Awareness Posters-Passwords part 5
 
A4 Cyber Security Awareness Posters-Password Security part 4
A4 Cyber Security Awareness Posters-Password Security part 4A4 Cyber Security Awareness Posters-Password Security part 4
A4 Cyber Security Awareness Posters-Password Security part 4
 
FREE A4 Cyber Security Awareness Posters-Password Security part 3
FREE A4 Cyber Security Awareness Posters-Password Security part 3FREE A4 Cyber Security Awareness Posters-Password Security part 3
FREE A4 Cyber Security Awareness Posters-Password Security part 3
 
FREE A4 Cyber Security Awareness Posters-Password Security part 2
FREE A4 Cyber Security Awareness Posters-Password Security part 2FREE A4 Cyber Security Awareness Posters-Password Security part 2
FREE A4 Cyber Security Awareness Posters-Password Security part 2
 
FREE A4 Data Security GDPR Posters-Data Protection part 4
FREE A4 Data Security GDPR Posters-Data Protection part 4FREE A4 Data Security GDPR Posters-Data Protection part 4
FREE A4 Data Security GDPR Posters-Data Protection part 4
 
FREE A4 Data Security GDPR Posters-Data Protection part 3
FREE A4 Data  Security GDPR Posters-Data Protection part 3FREE A4 Data  Security GDPR Posters-Data Protection part 3
FREE A4 Data Security GDPR Posters-Data Protection part 3
 
FREE A4 cyber Security awareness Posters-Data Protection -GDPR
FREE A4 cyber Security awareness  Posters-Data Protection -GDPRFREE A4 cyber Security awareness  Posters-Data Protection -GDPR
FREE A4 cyber Security awareness Posters-Data Protection -GDPR
 
FREE A4 Cyber Security awareness- Posters-Data Protection -GDPR
FREE A4 Cyber Security awareness- Posters-Data Protection -GDPRFREE A4 Cyber Security awareness- Posters-Data Protection -GDPR
FREE A4 Cyber Security awareness- Posters-Data Protection -GDPR
 
FREE A4 Cyber Security Awareness Posters-Removable Device
FREE A4  Cyber Security Awareness Posters-Removable DeviceFREE A4  Cyber Security Awareness Posters-Removable Device
FREE A4 Cyber Security Awareness Posters-Removable Device
 
Free Printable A4 Cyber Security Awareness Posters-Malware
Free Printable A4 Cyber Security Awareness Posters-MalwareFree Printable A4 Cyber Security Awareness Posters-Malware
Free Printable A4 Cyber Security Awareness Posters-Malware
 
FREE A4 Cyber Security Awareness Posters-Phishing
FREE A4 Cyber Security Awareness Posters-PhishingFREE A4 Cyber Security Awareness Posters-Phishing
FREE A4 Cyber Security Awareness Posters-Phishing
 
FREE A4 Cyber Security Awareness Posters-Social Engineering
FREE A4 Cyber Security Awareness Posters-Social EngineeringFREE A4 Cyber Security Awareness Posters-Social Engineering
FREE A4 Cyber Security Awareness Posters-Social Engineering
 
FREE A4 Cyber Security Awareness Posters-Data Privacy
FREE A4 Cyber Security Awareness Posters-Data PrivacyFREE A4 Cyber Security Awareness Posters-Data Privacy
FREE A4 Cyber Security Awareness Posters-Data Privacy
 
FREE A4 Cyber Security Awareness Posters-Passwords
FREE A4 Cyber Security Awareness Posters-PasswordsFREE A4 Cyber Security Awareness Posters-Passwords
FREE A4 Cyber Security Awareness Posters-Passwords
 
Free Digital Signage Cybersecurity Screensavers Part 1
Free  Digital Signage Cybersecurity Screensavers Part 1Free  Digital Signage Cybersecurity Screensavers Part 1
Free Digital Signage Cybersecurity Screensavers Part 1
 

Recently uploaded

Day 4 - Excel Automation and Data Manipulation
Day 4 - Excel Automation and Data ManipulationDay 4 - Excel Automation and Data Manipulation
Day 4 - Excel Automation and Data Manipulation
UiPathCommunity
 
Guidelines for Effective Data Visualization
Guidelines for Effective Data VisualizationGuidelines for Effective Data Visualization
Guidelines for Effective Data Visualization
UmmeSalmaM1
 
TrustArc Webinar - Your Guide for Smooth Cross-Border Data Transfers and Glob...
TrustArc Webinar - Your Guide for Smooth Cross-Border Data Transfers and Glob...TrustArc Webinar - Your Guide for Smooth Cross-Border Data Transfers and Glob...
TrustArc Webinar - Your Guide for Smooth Cross-Border Data Transfers and Glob...
TrustArc
 
Introducing BoxLang : A new JVM language for productivity and modularity!
Introducing BoxLang : A new JVM language for productivity and modularity!Introducing BoxLang : A new JVM language for productivity and modularity!
Introducing BoxLang : A new JVM language for productivity and modularity!
Ortus Solutions, Corp
 
Radically Outperforming DynamoDB @ Digital Turbine with SADA and Google Cloud
Radically Outperforming DynamoDB @ Digital Turbine with SADA and Google CloudRadically Outperforming DynamoDB @ Digital Turbine with SADA and Google Cloud
Radically Outperforming DynamoDB @ Digital Turbine with SADA and Google Cloud
ScyllaDB
 
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
DanBrown980551
 
Communications Mining Series - Zero to Hero - Session 2
Communications Mining Series - Zero to Hero - Session 2Communications Mining Series - Zero to Hero - Session 2
Communications Mining Series - Zero to Hero - Session 2
DianaGray10
 
APJC Introduction to ThousandEyes Webinar
APJC Introduction to ThousandEyes WebinarAPJC Introduction to ThousandEyes Webinar
APJC Introduction to ThousandEyes Webinar
ThousandEyes
 
Cyber Recovery Wargame
Cyber Recovery WargameCyber Recovery Wargame
Cyber Recovery Wargame
Databarracks
 
ScyllaDB Real-Time Event Processing with CDC
ScyllaDB Real-Time Event Processing with CDCScyllaDB Real-Time Event Processing with CDC
ScyllaDB Real-Time Event Processing with CDC
ScyllaDB
 
Building a Semantic Layer of your Data Platform
Building a Semantic Layer of your Data PlatformBuilding a Semantic Layer of your Data Platform
Building a Semantic Layer of your Data Platform
Enterprise Knowledge
 
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
manji sharman06
 
Call Girls Chennai ☎️ +91-7426014248 😍 Chennai Call Girl Beauty Girls Chennai...
Call Girls Chennai ☎️ +91-7426014248 😍 Chennai Call Girl Beauty Girls Chennai...Call Girls Chennai ☎️ +91-7426014248 😍 Chennai Call Girl Beauty Girls Chennai...
Call Girls Chennai ☎️ +91-7426014248 😍 Chennai Call Girl Beauty Girls Chennai...
anilsa9823
 
Automation Student Developers Session 3: Introduction to UI Automation
Automation Student Developers Session 3: Introduction to UI AutomationAutomation Student Developers Session 3: Introduction to UI Automation
Automation Student Developers Session 3: Introduction to UI Automation
UiPathCommunity
 
From NCSA to the National Research Platform
From NCSA to the National Research PlatformFrom NCSA to the National Research Platform
From NCSA to the National Research Platform
Larry Smarr
 
MongoDB to ScyllaDB: Technical Comparison and the Path to Success
MongoDB to ScyllaDB: Technical Comparison and the Path to SuccessMongoDB to ScyllaDB: Technical Comparison and the Path to Success
MongoDB to ScyllaDB: Technical Comparison and the Path to Success
ScyllaDB
 
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeckPoznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
FilipTomaszewski5
 
ThousandEyes New Product Features and Release Highlights: June 2024
ThousandEyes New Product Features and Release Highlights: June 2024ThousandEyes New Product Features and Release Highlights: June 2024
ThousandEyes New Product Features and Release Highlights: June 2024
ThousandEyes
 
Introduction to ThousandEyes AMER Webinar
Introduction  to ThousandEyes AMER WebinarIntroduction  to ThousandEyes AMER Webinar
Introduction to ThousandEyes AMER Webinar
ThousandEyes
 
Discover the Unseen: Tailored Recommendation of Unwatched Content
Discover the Unseen: Tailored Recommendation of Unwatched ContentDiscover the Unseen: Tailored Recommendation of Unwatched Content
Discover the Unseen: Tailored Recommendation of Unwatched Content
ScyllaDB
 

Recently uploaded (20)

Day 4 - Excel Automation and Data Manipulation
Day 4 - Excel Automation and Data ManipulationDay 4 - Excel Automation and Data Manipulation
Day 4 - Excel Automation and Data Manipulation
 
Guidelines for Effective Data Visualization
Guidelines for Effective Data VisualizationGuidelines for Effective Data Visualization
Guidelines for Effective Data Visualization
 
TrustArc Webinar - Your Guide for Smooth Cross-Border Data Transfers and Glob...
TrustArc Webinar - Your Guide for Smooth Cross-Border Data Transfers and Glob...TrustArc Webinar - Your Guide for Smooth Cross-Border Data Transfers and Glob...
TrustArc Webinar - Your Guide for Smooth Cross-Border Data Transfers and Glob...
 
Introducing BoxLang : A new JVM language for productivity and modularity!
Introducing BoxLang : A new JVM language for productivity and modularity!Introducing BoxLang : A new JVM language for productivity and modularity!
Introducing BoxLang : A new JVM language for productivity and modularity!
 
Radically Outperforming DynamoDB @ Digital Turbine with SADA and Google Cloud
Radically Outperforming DynamoDB @ Digital Turbine with SADA and Google CloudRadically Outperforming DynamoDB @ Digital Turbine with SADA and Google Cloud
Radically Outperforming DynamoDB @ Digital Turbine with SADA and Google Cloud
 
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
 
Communications Mining Series - Zero to Hero - Session 2
Communications Mining Series - Zero to Hero - Session 2Communications Mining Series - Zero to Hero - Session 2
Communications Mining Series - Zero to Hero - Session 2
 
APJC Introduction to ThousandEyes Webinar
APJC Introduction to ThousandEyes WebinarAPJC Introduction to ThousandEyes Webinar
APJC Introduction to ThousandEyes Webinar
 
Cyber Recovery Wargame
Cyber Recovery WargameCyber Recovery Wargame
Cyber Recovery Wargame
 
ScyllaDB Real-Time Event Processing with CDC
ScyllaDB Real-Time Event Processing with CDCScyllaDB Real-Time Event Processing with CDC
ScyllaDB Real-Time Event Processing with CDC
 
Building a Semantic Layer of your Data Platform
Building a Semantic Layer of your Data PlatformBuilding a Semantic Layer of your Data Platform
Building a Semantic Layer of your Data Platform
 
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
 
Call Girls Chennai ☎️ +91-7426014248 😍 Chennai Call Girl Beauty Girls Chennai...
Call Girls Chennai ☎️ +91-7426014248 😍 Chennai Call Girl Beauty Girls Chennai...Call Girls Chennai ☎️ +91-7426014248 😍 Chennai Call Girl Beauty Girls Chennai...
Call Girls Chennai ☎️ +91-7426014248 😍 Chennai Call Girl Beauty Girls Chennai...
 
Automation Student Developers Session 3: Introduction to UI Automation
Automation Student Developers Session 3: Introduction to UI AutomationAutomation Student Developers Session 3: Introduction to UI Automation
Automation Student Developers Session 3: Introduction to UI Automation
 
From NCSA to the National Research Platform
From NCSA to the National Research PlatformFrom NCSA to the National Research Platform
From NCSA to the National Research Platform
 
MongoDB to ScyllaDB: Technical Comparison and the Path to Success
MongoDB to ScyllaDB: Technical Comparison and the Path to SuccessMongoDB to ScyllaDB: Technical Comparison and the Path to Success
MongoDB to ScyllaDB: Technical Comparison and the Path to Success
 
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeckPoznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
 
ThousandEyes New Product Features and Release Highlights: June 2024
ThousandEyes New Product Features and Release Highlights: June 2024ThousandEyes New Product Features and Release Highlights: June 2024
ThousandEyes New Product Features and Release Highlights: June 2024
 
Introduction to ThousandEyes AMER Webinar
Introduction  to ThousandEyes AMER WebinarIntroduction  to ThousandEyes AMER Webinar
Introduction to ThousandEyes AMER Webinar
 
Discover the Unseen: Tailored Recommendation of Unwatched Content
Discover the Unseen: Tailored Recommendation of Unwatched ContentDiscover the Unseen: Tailored Recommendation of Unwatched Content
Discover the Unseen: Tailored Recommendation of Unwatched Content
 

FREE A4 Cyber Security Posters-Data Protection-GDPR

  • 1. ALWAYS SHRED LOCK THEM OUT datahops.com CYBER SECURITY AWARENESS DOCUMENTS IMPORTANT & PERSONAL
  • 2. PRINT IMPORTANT DOCUMENTS WORK ON THEM IN PUBLIC PLACES DON’T CYBER SECURITY AWARENESS datahops.com LOCK THEM OUT AND
  • 3. LOCK THEM OUT datahops.com CYBER SECURITY AWARENESS WHO’S LISTENING ? INFORMATION IN PUBLIC PLACES DON’T REVEAL SENSITIVE TO YOUR PHONE CALLS AND CONVERSATIONS
  • 4. LOCK THEM OUT datahops.com CYBER SECURITY AWARENESS Check your privacy settings to control who can see and access your profile, the way your data is used, collected and shared WHO WANTS TO KNOW? P R I VA T E
  • 5. LOCK THEM OUT datahops.com CYBER SECURITY AWARENESS SINK OR SWIM ? Avoid that sinking feeling. Do a regular backup of files in case of an unexpected occurrence. This can help you restore your files quickly and easily.
  • 6. Where is the Data? Cybersecurity awareness training datahops.com If you need it Protect it If you don’t delete it Keep Data Safe
  • 7. Where is the Data? Deleted data is still on the computer Did You know That Cybersecurity awareness training datahops.com You emptied the recycle bin but
  • 8. All is not lost! The only guaranteed way to repair your computer after a security incident is to Backup your files regularly - then erase and reinstall the system. How to Recover From a Disaster Cybersecurity awareness training datahops.com
  • 9. LOCK THEM OUT datahops.com CYBER SECURITY AWARENESS JUST BACK UP Backup your files and folders regularly using secure and authorised data storage devices or recognised cloud services
  • 10. LOCK THEM OUT datahops.com CYBER SECURITY AWARENESS IS PRICELESS PEACE OF MIND Turn on encryption to protect your files if your device gets lost or stolen. It cannot be accessed by anyone without the password or recovery key
  • 11. Cybersecurity awareness training datahops.com Encrypt Lock them up Lock them out to Cybersecurity awareness training datahops.com your Files Any sensitive or confidential data, should be encrypted.
  • 12. THE WALL IS ON FIRE Cybersecurity awareness training datahops.com Turn on the Firewall Protect Your Data
  • 13. Make Your Device Safe And Secure Turn on the firewall Install antivirus software Check security settings for operating system and browser Set up password protection Cybersecurity awareness training datahops.com
  • 14. Prevent Unauthorised Access Password Protect all your Devices If one is compromised, the criminals may be able to access all of your data through your cloud storage service provider Cybersecurity awareness training datahops.com
  • 15. SECURE YOUR LOCK THEM OUT datahops.com CYBER SECURITY AWARENESS WIRELESS NETWORK Change default Passwords Hackers are aware of the preset SSID and default password Enable WPA2 Encryption
  • 16. TURN OFF BLUETOOTH These can be exploited by hackers to eavesdrop, establish remote access controls, distribute malware and drain batteries! OUCH!! WHEN NOT IN USE Cybersecurity awareness training datahops.com Off Turn on Bluetooth to connect to nearby devices < Bluetooth
  • 17. Cybersecurity awareness training datahops.com Encrypt Cybersecurity awareness training datahops.com sensitive Data Prevent Unauthorized Persons From viewing or Accessing the Content
  • 18. Regular Backups Can prevent the loss of irreplaceable data. Cybersecurity awareness training datahops.com
  • 19. DATA USE POLICY How will the service provider: Collect your information WHAT HAPPENS TO YOU DATA Use your information Collect your information Cybersecurity awareness training datahops.com
  • 20. PRIVACY SETTINGS These settings allow you to say who can: See your information WHAT HAPPENS TO YOU DATA Access your information Access account data Cybersecurity awareness training datahops.com
  • 21. SECURITY POLICY How the company is protecting your data: Confidentiality WHAT HAPPENS TO YOU DATA Integrity Availability Cybersecurity awareness training datahops.com
  • 22. FAQ’s Can you request a copy of your data WHAT HAPPENS TO YOU DATA What can they do with the data you uploaded What happens to your data When you close your account Cybersecurity awareness training datahops.com Have you read the terms and conditions What are your rights over your data
  • 23. STOP PROTECT YOUR DATA Cybersecurity awareness training datahops.com ENCRYPT SENSITIVE DATA
  • 24. STOP Cybersecurity awareness training datahops.com PROTECT YOUR DATA USE STRONG PASSWORDS
  • 25. STOP Cybersecurity awareness training datahops.com PROTECT YOUR DATA BACKUP DATA REGULARLY
  • 26. STOP Cybersecurity awareness training datahops.com PROTECT YOUR DATA TURN ON FIREWALL
  • 27. STOP Cybersecurity awareness training datahops.com PROTECT YOUR DATA LOCK UP YOUR DEVICES
  翻译: