SlideShare una empresa de Scribd logo
1 de 18
Descargar para leer sin conexión
Millions of people are targets of phishing scams each day. Cyber criminals use a variety of tricks to disguise themselves
as legitimate companies, your colleagues, and people you would normally trust. Make sure you know who you are really
communicating with and be careful of suspicious links.
October is National Cyber Security Awareness Month. For more information and tips to stay safe online,
visit: https://www.dhs.gov/ncsam
Doessomething
seem“phishy”toyou?
How to Spot a Phishing Scam
Generic subject line
Legitimate emails usually
have detailed subject lines.
A vague subject line can
be a key indicator of a
phishing scam.
Suspicious URL
Hover over links included
in emails to see the actual
destination of the URL.
Bad grammar/spelling
Phishing emails often contain
misspelled words and bad
grammar. This is a sign that the
email did not come from a
professional organization or a
real person you may know.
Dear Webmail User,
You are required to authenticate your account below to continue sending and receive
messages. We strongly advice you to upgrade now to protect your web/Domain and
avoid termination. Follow link to verify your email address immediately:
www.security.webmail.com.
Failure to update might process your account as inactive, and you may experience
termination of services or undue errors. Please comply with new server requirements
and read through the attached privacy policy.
Wondering why you go this email?
This email was sent automatically during routine security checks. We are trying to
protect your account so you can continue using services uninterrupted.
Thanks,
Webmail Master
©2017 Webmail Domain
Subject: Urgent Email
From: Webmail Master Security (webmastersecurity@webmail.com)
Improper use of
copyright
Watch for improper use of
copyright information. This
is used to make the phishing
email look official.
Unnecessary urgency
Use your intuition and if
something 'feels' wrong, consider
calling the organization or office
directly to validate the email.
Types of Social Engineering
Online communications or emails
designed to lure individuals into
providing sensitive information.
Tip: When in doubt, throw it out. If
an email looks suspicious, contact
the organization/individual
directly to validate the legitimacy
of the email. You can also report
the email to your email provider’s
IT Security department.
An act of wrongfully obtaining
and using another person’s
information that involves fraud
or deception.
Tip: Be diligent before posting
personal information online and
think carefully before sharing
information through apps
and websites.
Identity Theft:Phishing:
A type of malware that prevents
or limits users from accessing
their system or select files,
unless a ransom is paid to
restore access.
Tip: Be proactive and protect
against data loss by backing up
your files and keeping them
safe on a physical, external
storage device.
Ransomware:
For more information and tips to stay safe online throughout the year, visit: https://www.dhs.gov/ncsam
Cyber crime is a critical threat with social engineering attacks becoming more sophisticated, realistic, and difficult to
recognize. Phishing attacks are one of the most common forms of cyber crime. What does a phishing email look like?
Review the example below for characteristics of a phishing scam disguised to look like a legitimate email.
DON’T GET REELED IN.
Phishing is a scam by which an
email user is duped into revealing
personal or confidential
information that the scammer can
use illicitly or fraudulently.
PHISHING
PREVENTION 101
Secure yourself from fraud
and phishing attempts by:
• Turning off the option to
automatically download
attachments
• Saving and scanning any
attachments before opening them
• Before providing any kind of
information, call and verify
with the source that they are
indeed the ones who sent the
email or message
For more information
on phishing visit:
http://www.cdse.edu/toolkits/cybersecurity
•	 	Do not open attachments or click on links from untrusted
sources
•		Never send personal information in an email
•	 	Keep your firewall and antivirus software updated
CYBER SECURITY IS OUR SHARED RESPONSIBILITY
DON’T TAKE
THE BAIT
CONNECT
WITH CARE
•	 	Keep your devices updated with the latest system and
application patches
•		Assume that Wi-Fi connections are not secure, since many
Wi-Fi hotspots don’t encrypt the information you send
•	 	Do not log into financial accounts or other sensitive accounts
when using public Wi-Fi networks
•	 	Consider turning off features on your computer or mobile
devices that allow you to automatically connect to Wi-Fi
CYBER SECURITY IS OUR SHARED RESPONSIBILITY
CYBER SECURITY IS OUR SHARED RESPONSIBILITY
PROTECT YOUR
SMART PHONE
•	 Make sure the OS and software
are up to date at all times
•	 Download apps from reputable
sites and closely review permission
requests
•	 Make sure to check the feedback
from other users before installing
the program from an app store
•	 Use a strong,complex password
•	 Use a security app,if available for your
device
•	 Turn off Bluetooth and other
connections when not in use
•		Jailbreak your phone
•		Download apps from third-
party app stores and sites
•		Leave your mobile device
unattended in public places
•		Enable your“Wi-Fi ad-hoc
mode”
DO’S DON’TS
KEEP YOUR PASSWORD SAFE BY FOLLOWING
THESE EASY TIPS:
DEVELOP strong passwords that use a combination of words, numbers, symbols, and
both upper- and lower-case letters
CREATEa password phrase and make it relevant. If you’re joining a shopping site for
example, think “About to Use Shopping Site” and use “ABT2_uz_$h0pping”
USE different passwords for every unique account, such as work, banking, and email
DISABLE the “save password” feature in your Internet browser
CYBER SECURITY IS OUR SHARED RESPONSIBILITY
USE SECURE
PASSWORDS
Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2

Más contenido relacionado

La actualidad más candente

Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@
R_Yanus
 

La actualidad más candente (20)

Cyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxCyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptx
 
Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0
 
Basic Security Training for End Users
Basic Security Training for End UsersBasic Security Training for End Users
Basic Security Training for End Users
 
cyber security
cyber security cyber security
cyber security
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Program
 
Cybersecurity Employee Training
Cybersecurity Employee TrainingCybersecurity Employee Training
Cybersecurity Employee Training
 
14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
 
Security Awareness Training by Fortinet
Security Awareness Training by FortinetSecurity Awareness Training by Fortinet
Security Awareness Training by Fortinet
 
End User Security Awareness Presentation
End User Security Awareness PresentationEnd User Security Awareness Presentation
End User Security Awareness Presentation
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cyber Security PPT - 2023.pptx
Cyber Security PPT - 2023.pptxCyber Security PPT - 2023.pptx
Cyber Security PPT - 2023.pptx
 
Employee Awareness in Cyber Security - Kloudlearn
Employee Awareness in Cyber Security - KloudlearnEmployee Awareness in Cyber Security - Kloudlearn
Employee Awareness in Cyber Security - Kloudlearn
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Cyber security awareness presentation nepal
Cyber security awareness presentation nepalCyber security awareness presentation nepal
Cyber security awareness presentation nepal
 
Cyber Security Best Practices
Cyber Security Best PracticesCyber Security Best Practices
Cyber Security Best Practices
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Information Security Awareness, Petronas Marketing Sudan
Information Security Awareness, Petronas Marketing SudanInformation Security Awareness, Petronas Marketing Sudan
Information Security Awareness, Petronas Marketing Sudan
 

Similar a Cybersecurity Awareness Posters - Set #2

INTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptxINTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptx
BHUt6
 

Similar a Cybersecurity Awareness Posters - Set #2 (20)

Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptx
 
TheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxTheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptx
 
Security Awareness Training.pptx
Security Awareness Training.pptxSecurity Awareness Training.pptx
Security Awareness Training.pptx
 
Cyber Safety | Cyber Safety Tips | Cybersecurity
Cyber Safety | Cyber Safety Tips | CybersecurityCyber Safety | Cyber Safety Tips | Cybersecurity
Cyber Safety | Cyber Safety Tips | Cybersecurity
 
Cyber security tips in Banking in Nepal
Cyber security tips in Banking in NepalCyber security tips in Banking in Nepal
Cyber security tips in Banking in Nepal
 
IS Presetation.pptx
IS Presetation.pptxIS Presetation.pptx
IS Presetation.pptx
 
Identity theft in the internet
Identity theft in the internetIdentity theft in the internet
Identity theft in the internet
 
Cyber safety.pptx
Cyber safety.pptxCyber safety.pptx
Cyber safety.pptx
 
INTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptxINTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptx
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Safe Computing
Safe ComputingSafe Computing
Safe Computing
 
Cybersecurity Awareness for employees.pptx
Cybersecurity Awareness for employees.pptxCybersecurity Awareness for employees.pptx
Cybersecurity Awareness for employees.pptx
 
End user security awareness
End user security awarenessEnd user security awareness
End user security awareness
 
S01.L06 - Internet Security
S01.L06 - Internet SecurityS01.L06 - Internet Security
S01.L06 - Internet Security
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS Working
 
Internet Fraud #scichallenge2017
Internet Fraud #scichallenge2017Internet Fraud #scichallenge2017
Internet Fraud #scichallenge2017
 
Unveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity postureUnveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity posture
 
Building a culture of security
Building a culture of securityBuilding a culture of security
Building a culture of security
 
[Albanyinfragard] infra gard albany members alliance april security tips news...
[Albanyinfragard] infra gard albany members alliance april security tips news...[Albanyinfragard] infra gard albany members alliance april security tips news...
[Albanyinfragard] infra gard albany members alliance april security tips news...
 

Más de NetLockSmith

Más de NetLockSmith (9)

10 Clever Cybersecurity Awareness Posters
10 Clever Cybersecurity Awareness Posters10 Clever Cybersecurity Awareness Posters
10 Clever Cybersecurity Awareness Posters
 
Cybersecurity Awareness Posters from OpenIDEO
Cybersecurity Awareness Posters from OpenIDEOCybersecurity Awareness Posters from OpenIDEO
Cybersecurity Awareness Posters from OpenIDEO
 
JP Cybersecurity Awareness Cartoons
JP Cybersecurity Awareness CartoonsJP Cybersecurity Awareness Cartoons
JP Cybersecurity Awareness Cartoons
 
NCSC Social Engineering Awareness Posters
NCSC Social Engineering Awareness PostersNCSC Social Engineering Awareness Posters
NCSC Social Engineering Awareness Posters
 
DoE Cybersecurity Awareness Posters
DoE Cybersecurity Awareness PostersDoE Cybersecurity Awareness Posters
DoE Cybersecurity Awareness Posters
 
CDSE Cybsecurity Awareness Posters
CDSE Cybsecurity Awareness PostersCDSE Cybsecurity Awareness Posters
CDSE Cybsecurity Awareness Posters
 
Cybersecurity Awareness (Spanish) posters
Cybersecurity Awareness (Spanish) postersCybersecurity Awareness (Spanish) posters
Cybersecurity Awareness (Spanish) posters
 
Cybersecurity awareness posters
Cybersecurity awareness postersCybersecurity awareness posters
Cybersecurity awareness posters
 
NIST presentation on RMF 2.0 / SP 800-37 rev. 2
NIST presentation on RMF 2.0 / SP 800-37 rev. 2NIST presentation on RMF 2.0 / SP 800-37 rev. 2
NIST presentation on RMF 2.0 / SP 800-37 rev. 2
 

Último

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Último (20)

AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 

Cybersecurity Awareness Posters - Set #2

  • 1. Millions of people are targets of phishing scams each day. Cyber criminals use a variety of tricks to disguise themselves as legitimate companies, your colleagues, and people you would normally trust. Make sure you know who you are really communicating with and be careful of suspicious links. October is National Cyber Security Awareness Month. For more information and tips to stay safe online, visit: https://www.dhs.gov/ncsam Doessomething seem“phishy”toyou?
  • 2. How to Spot a Phishing Scam Generic subject line Legitimate emails usually have detailed subject lines. A vague subject line can be a key indicator of a phishing scam. Suspicious URL Hover over links included in emails to see the actual destination of the URL. Bad grammar/spelling Phishing emails often contain misspelled words and bad grammar. This is a sign that the email did not come from a professional organization or a real person you may know. Dear Webmail User, You are required to authenticate your account below to continue sending and receive messages. We strongly advice you to upgrade now to protect your web/Domain and avoid termination. Follow link to verify your email address immediately: www.security.webmail.com. Failure to update might process your account as inactive, and you may experience termination of services or undue errors. Please comply with new server requirements and read through the attached privacy policy. Wondering why you go this email? This email was sent automatically during routine security checks. We are trying to protect your account so you can continue using services uninterrupted. Thanks, Webmail Master ©2017 Webmail Domain Subject: Urgent Email From: Webmail Master Security (webmastersecurity@webmail.com) Improper use of copyright Watch for improper use of copyright information. This is used to make the phishing email look official. Unnecessary urgency Use your intuition and if something 'feels' wrong, consider calling the organization or office directly to validate the email. Types of Social Engineering Online communications or emails designed to lure individuals into providing sensitive information. Tip: When in doubt, throw it out. If an email looks suspicious, contact the organization/individual directly to validate the legitimacy of the email. You can also report the email to your email provider’s IT Security department. An act of wrongfully obtaining and using another person’s information that involves fraud or deception. Tip: Be diligent before posting personal information online and think carefully before sharing information through apps and websites. Identity Theft:Phishing: A type of malware that prevents or limits users from accessing their system or select files, unless a ransom is paid to restore access. Tip: Be proactive and protect against data loss by backing up your files and keeping them safe on a physical, external storage device. Ransomware: For more information and tips to stay safe online throughout the year, visit: https://www.dhs.gov/ncsam Cyber crime is a critical threat with social engineering attacks becoming more sophisticated, realistic, and difficult to recognize. Phishing attacks are one of the most common forms of cyber crime. What does a phishing email look like? Review the example below for characteristics of a phishing scam disguised to look like a legitimate email.
  • 3. DON’T GET REELED IN. Phishing is a scam by which an email user is duped into revealing personal or confidential information that the scammer can use illicitly or fraudulently. PHISHING PREVENTION 101 Secure yourself from fraud and phishing attempts by: • Turning off the option to automatically download attachments • Saving and scanning any attachments before opening them • Before providing any kind of information, call and verify with the source that they are indeed the ones who sent the email or message For more information on phishing visit: http://www.cdse.edu/toolkits/cybersecurity
  • 4. • Do not open attachments or click on links from untrusted sources • Never send personal information in an email • Keep your firewall and antivirus software updated CYBER SECURITY IS OUR SHARED RESPONSIBILITY DON’T TAKE THE BAIT
  • 5. CONNECT WITH CARE • Keep your devices updated with the latest system and application patches • Assume that Wi-Fi connections are not secure, since many Wi-Fi hotspots don’t encrypt the information you send • Do not log into financial accounts or other sensitive accounts when using public Wi-Fi networks • Consider turning off features on your computer or mobile devices that allow you to automatically connect to Wi-Fi CYBER SECURITY IS OUR SHARED RESPONSIBILITY
  • 6.
  • 7. CYBER SECURITY IS OUR SHARED RESPONSIBILITY PROTECT YOUR SMART PHONE • Make sure the OS and software are up to date at all times • Download apps from reputable sites and closely review permission requests • Make sure to check the feedback from other users before installing the program from an app store • Use a strong,complex password • Use a security app,if available for your device • Turn off Bluetooth and other connections when not in use • Jailbreak your phone • Download apps from third- party app stores and sites • Leave your mobile device unattended in public places • Enable your“Wi-Fi ad-hoc mode” DO’S DON’TS
  • 8. KEEP YOUR PASSWORD SAFE BY FOLLOWING THESE EASY TIPS: DEVELOP strong passwords that use a combination of words, numbers, symbols, and both upper- and lower-case letters CREATEa password phrase and make it relevant. If you’re joining a shopping site for example, think “About to Use Shopping Site” and use “ABT2_uz_$h0pping” USE different passwords for every unique account, such as work, banking, and email DISABLE the “save password” feature in your Internet browser CYBER SECURITY IS OUR SHARED RESPONSIBILITY USE SECURE PASSWORDS