SlideShare una empresa de Scribd logo
1 de 8
Are You
at Risk on the
World Wide Web?
© 2014 iYogi Limited. All Rights Reserved.
What was the last thing you did that didn’t includeinternet?
© 2014 iYogi Limited. All Rights Reserved.
Near to3 billionusers ofInternetand yetit is one of themostunsafeplaces
There has been91%
increase intargeted threats
in 2013
About 552M identities
exposed in 2013
23 zeroday vulnerabilities
discovered
38% mobile cybercrime 23% web based attacks
© 2014 iYogi Limited. All Rights Reserved.
You can beNext!
2013 alonewitnessedidentitybreaches ofover 10millionpeople.Datamostlystolenincludes:
Name Birth Dates Social Security Numbers Financial Information
User Names and
Passwords
Email Addresses Phone Numbers
© 2014 iYogi Limited. All Rights Reserved.
What it can do to you
Thereisn’tjust onerisk tobenamed.Identitytheftinstancescan:
Robyouofffinances
Ruinyourcredit history
Jeopardizeyourmedical records
Landyouin ‘crimeinstances’when youactuallyhavenothingtodothere
Compelyoutopartwithsocial benefitsthatyouareentitledto
Putatriskthe careeroptionsofyourkids andcreate issueswhile theylookfora job
Makeitdifficultforyoutoapplyforandget loans
Showyouin poorlight whereeveryonestartstoquestionyourintegrity
© 2014 iYogi Limited. All Rights Reserved.
How to know?
Bewatchfulofthesecommonsigns of identitytheft:
IRSnotifiesthatmorethan1 taxreturnhasbeen filed in yourname
Suddenwithdrawalfrombankaccount,of coursenotdone byyou
Yourmails havesuddenlygone missing andit’snotyourdog
Merchantshavestartedrefusing yourchecks fornoreason
Debtcollectors havestartedcalling you….why?
Medical bills forillness youdon’thave
© 2014 iYogi Limited. All Rights Reserved.
That’s not all, here’s more…
© 2014 iYogi Limited. All Rights Reserved.
Is there a way to escape being a victim?
You can, butonly ifyou:
Practice healthy online habits
Remain alertwhile using your PC
Apply caution while transacting online
Keeprecords ofyour financial transactions
Create strong passwords and change them frequently
Take carewhile trashing your sensitive data and documents
Becareful while sharing personal information with strangers/ in public places
Not givein to larger-than-life offers; if they are too good to betrue –they aren’t
Install a robust security solution on your PC to make yourcomputing and online sessions safe.
© 2014 iYogi Limited. All Rights Reserved.
Not sure whomto trust?
GetTechGenie Absolutewith 24x7and 365 days ayear protectionWithityou get:
Strong Antivirus
Parental Control
PC Optimizer
Identity Theft Protection
Empower yourPC this summerwith the perfect security solution that it needs! Visit http://www.techgenie.com/ now
to install TechGenieAbsolute.
Get Flat10% Off onTechGenie Absolute.
Use Coupon Code: TGSZ10
Hurry! LimitedOffers aresoon running out.
BUY NOW

Más contenido relacionado

La actualidad más candente

Information Security: Fundamental
Information Security: FundamentalInformation Security: Fundamental
Information Security: FundamentalICT Watch
 
Cyber Security vs IT Security in 2 mins
Cyber Security vs IT Security in 2 minsCyber Security vs IT Security in 2 mins
Cyber Security vs IT Security in 2 minsINKPPT
 
Cybersecurity threats you should know about in 2018
Cybersecurity threats you should know about in 2018Cybersecurity threats you should know about in 2018
Cybersecurity threats you should know about in 2018Microsoft
 
Cyber Crime - How to Prevent
Cyber Crime - How to PreventCyber Crime - How to Prevent
Cyber Crime - How to PreventShamiul Lajib
 
Cyber Crime and Prevention Tips
Cyber Crime and Prevention TipsCyber Crime and Prevention Tips
Cyber Crime and Prevention TipsTayyab Farooq
 
Cyberterrorism. Past, Present, Future
Cyberterrorism. Past, Present, FutureCyberterrorism. Past, Present, Future
Cyberterrorism. Past, Present, FuturePriyanka Aash
 
InfraGard Albany Member Alliance Monthly Security Tips
InfraGard Albany Member Alliance Monthly Security TipsInfraGard Albany Member Alliance Monthly Security Tips
InfraGard Albany Member Alliance Monthly Security TipsLiberteks
 
CyberSecurity.pptx
CyberSecurity.pptxCyberSecurity.pptx
CyberSecurity.pptxPranavRaj96
 
Winferno: Protecting Personal Information
Winferno: Protecting Personal InformationWinferno: Protecting Personal Information
Winferno: Protecting Personal InformationWinferno
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec
 
cyber crime - slideshare by jayed hossain jibon
cyber crime - slideshare  by  jayed hossain jiboncyber crime - slideshare  by  jayed hossain jibon
cyber crime - slideshare by jayed hossain jibonJayed Hossain Jibon
 
Cyber security , an Analysis of State Security in Sri Lanka
Cyber security , an Analysis of State Security in Sri LankaCyber security , an Analysis of State Security in Sri Lanka
Cyber security , an Analysis of State Security in Sri LankaEvan Pathiratne
 
Cyber Security Threats and Data Breaches
Cyber Security Threats and Data BreachesCyber Security Threats and Data Breaches
Cyber Security Threats and Data BreachesBijay Senihang
 
"Cyber crime- how to combat the menace"
"Cyber crime- how to combat the menace""Cyber crime- how to combat the menace"
"Cyber crime- how to combat the menace"Dr. Sushma N Jogan
 

La actualidad más candente (19)

Cybercrime ppt
Cybercrime pptCybercrime ppt
Cybercrime ppt
 
Information Security: Fundamental
Information Security: FundamentalInformation Security: Fundamental
Information Security: Fundamental
 
Web Site Security
Web Site SecurityWeb Site Security
Web Site Security
 
Cyber Security vs IT Security in 2 mins
Cyber Security vs IT Security in 2 minsCyber Security vs IT Security in 2 mins
Cyber Security vs IT Security in 2 mins
 
Ten Expert Tips on Internet of Things Security
Ten Expert Tips on Internet of Things SecurityTen Expert Tips on Internet of Things Security
Ten Expert Tips on Internet of Things Security
 
Cybersecurity threats you should know about in 2018
Cybersecurity threats you should know about in 2018Cybersecurity threats you should know about in 2018
Cybersecurity threats you should know about in 2018
 
Cyber Crime - How to Prevent
Cyber Crime - How to PreventCyber Crime - How to Prevent
Cyber Crime - How to Prevent
 
Cyber Crime and Prevention Tips
Cyber Crime and Prevention TipsCyber Crime and Prevention Tips
Cyber Crime and Prevention Tips
 
Cyberterrorism. Past, Present, Future
Cyberterrorism. Past, Present, FutureCyberterrorism. Past, Present, Future
Cyberterrorism. Past, Present, Future
 
6 Security Tips for Using Public WiFi
6 Security Tips for Using Public WiFi6 Security Tips for Using Public WiFi
6 Security Tips for Using Public WiFi
 
InfraGard Albany Member Alliance Monthly Security Tips
InfraGard Albany Member Alliance Monthly Security TipsInfraGard Albany Member Alliance Monthly Security Tips
InfraGard Albany Member Alliance Monthly Security Tips
 
CyberSecurity.pptx
CyberSecurity.pptxCyberSecurity.pptx
CyberSecurity.pptx
 
Winferno: Protecting Personal Information
Winferno: Protecting Personal InformationWinferno: Protecting Personal Information
Winferno: Protecting Personal Information
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
 
cyber crime - slideshare by jayed hossain jibon
cyber crime - slideshare  by  jayed hossain jiboncyber crime - slideshare  by  jayed hossain jibon
cyber crime - slideshare by jayed hossain jibon
 
Cyber security , an Analysis of State Security in Sri Lanka
Cyber security , an Analysis of State Security in Sri LankaCyber security , an Analysis of State Security in Sri Lanka
Cyber security , an Analysis of State Security in Sri Lanka
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Security Threats and Data Breaches
Cyber Security Threats and Data BreachesCyber Security Threats and Data Breaches
Cyber Security Threats and Data Breaches
 
"Cyber crime- how to combat the menace"
"Cyber crime- how to combat the menace""Cyber crime- how to combat the menace"
"Cyber crime- how to combat the menace"
 

Similar a Are you at risk on the World Wide Web?

The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of CybercrimeRubi Orbeta
 
Cybersecurity Awareness E-book by Propelled Technologies
Cybersecurity Awareness E-book by Propelled Technologies Cybersecurity Awareness E-book by Propelled Technologies
Cybersecurity Awareness E-book by Propelled Technologies Anwar CHFI, SSCP, ITIL
 
Norton Cyber Security Insights Report 2017
Norton Cyber Security Insights Report 2017Norton Cyber Security Insights Report 2017
Norton Cyber Security Insights Report 2017CheapSSLsecurity
 
The significance of the 7 Colors of Information Security
The significance of the 7 Colors of Information SecurityThe significance of the 7 Colors of Information Security
The significance of the 7 Colors of Information Securitylearntransformation0
 
What is Cybercrime and How to Prevent Cybercrime?
What is Cybercrime and How to Prevent Cybercrime?What is Cybercrime and How to Prevent Cybercrime?
What is Cybercrime and How to Prevent Cybercrime?Entrance Exam Info
 
Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things The Center for Identity
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityNcell
 
September 2019 part 9
September 2019 part 9September 2019 part 9
September 2019 part 9seadeloitte
 
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnovProtecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnovEric Vanderburg
 
Protecting yourself online - second edition - booklet
Protecting yourself online - second edition - bookletProtecting yourself online - second edition - booklet
Protecting yourself online - second edition - bookletprestamonster
 
Man in the Browser attacks on online banking transactions
Man in the Browser attacks on online banking transactionsMan in the Browser attacks on online banking transactions
Man in the Browser attacks on online banking transactionsDaveEdwards12
 
Mastering Digital Self-Defense: Protecting Your Online Identity in a Connecte...
Mastering Digital Self-Defense: Protecting Your Online Identity in a Connecte...Mastering Digital Self-Defense: Protecting Your Online Identity in a Connecte...
Mastering Digital Self-Defense: Protecting Your Online Identity in a Connecte...Kasperi Lötjönen
 
Introduction to cyber security
Introduction to cyber security Introduction to cyber security
Introduction to cyber security RaviPrashant5
 
introduction to cyber security
introduction to cyber securityintroduction to cyber security
introduction to cyber securitySlamet Ar Rokhim
 

Similar a Are you at risk on the World Wide Web? (20)

The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of Cybercrime
 
techalpha07
techalpha07techalpha07
techalpha07
 
Cybersecurity Awareness E-book by Propelled Technologies
Cybersecurity Awareness E-book by Propelled Technologies Cybersecurity Awareness E-book by Propelled Technologies
Cybersecurity Awareness E-book by Propelled Technologies
 
Norton Cyber Security Insights Report 2017
Norton Cyber Security Insights Report 2017Norton Cyber Security Insights Report 2017
Norton Cyber Security Insights Report 2017
 
Cybersecurity awareness.pdf
Cybersecurity awareness.pdfCybersecurity awareness.pdf
Cybersecurity awareness.pdf
 
Cybersecurity Basics.pptx
Cybersecurity Basics.pptxCybersecurity Basics.pptx
Cybersecurity Basics.pptx
 
The significance of the 7 Colors of Information Security
The significance of the 7 Colors of Information SecurityThe significance of the 7 Colors of Information Security
The significance of the 7 Colors of Information Security
 
What is Cybercrime and How to Prevent Cybercrime?
What is Cybercrime and How to Prevent Cybercrime?What is Cybercrime and How to Prevent Cybercrime?
What is Cybercrime and How to Prevent Cybercrime?
 
Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Data Privacy
Data PrivacyData Privacy
Data Privacy
 
September 2019 part 9
September 2019 part 9September 2019 part 9
September 2019 part 9
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnovProtecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
 
Protecting yourself online - second edition - booklet
Protecting yourself online - second edition - bookletProtecting yourself online - second edition - booklet
Protecting yourself online - second edition - booklet
 
Man in the Browser attacks on online banking transactions
Man in the Browser attacks on online banking transactionsMan in the Browser attacks on online banking transactions
Man in the Browser attacks on online banking transactions
 
Mastering Digital Self-Defense: Protecting Your Online Identity in a Connecte...
Mastering Digital Self-Defense: Protecting Your Online Identity in a Connecte...Mastering Digital Self-Defense: Protecting Your Online Identity in a Connecte...
Mastering Digital Self-Defense: Protecting Your Online Identity in a Connecte...
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Introduction to cyber security
Introduction to cyber security Introduction to cyber security
Introduction to cyber security
 
introduction to cyber security
introduction to cyber securityintroduction to cyber security
introduction to cyber security
 

Último

Company Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxCompany Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxMario
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书rnrncn29
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa494f574xmv
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119APNIC
 
TRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxTRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxAndrieCagasanAkio
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxDyna Gilbert
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书rnrncn29
 
ETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxNIMMANAGANTI RAMAKRISHNA
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书zdzoqco
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predieusebiomeyer
 
Unidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxUnidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxmibuzondetrabajo
 

Último (11)

Company Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxCompany Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptx
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119
 
TRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxTRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptx
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptx
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
 
ETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptx
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predi
 
Unidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxUnidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptx
 

Are you at risk on the World Wide Web?

  • 1. Are You at Risk on the World Wide Web? © 2014 iYogi Limited. All Rights Reserved.
  • 2. What was the last thing you did that didn’t includeinternet? © 2014 iYogi Limited. All Rights Reserved. Near to3 billionusers ofInternetand yetit is one of themostunsafeplaces There has been91% increase intargeted threats in 2013 About 552M identities exposed in 2013 23 zeroday vulnerabilities discovered 38% mobile cybercrime 23% web based attacks
  • 3. © 2014 iYogi Limited. All Rights Reserved. You can beNext! 2013 alonewitnessedidentitybreaches ofover 10millionpeople.Datamostlystolenincludes: Name Birth Dates Social Security Numbers Financial Information User Names and Passwords Email Addresses Phone Numbers
  • 4. © 2014 iYogi Limited. All Rights Reserved. What it can do to you Thereisn’tjust onerisk tobenamed.Identitytheftinstancescan: Robyouofffinances Ruinyourcredit history Jeopardizeyourmedical records Landyouin ‘crimeinstances’when youactuallyhavenothingtodothere Compelyoutopartwithsocial benefitsthatyouareentitledto Putatriskthe careeroptionsofyourkids andcreate issueswhile theylookfora job Makeitdifficultforyoutoapplyforandget loans Showyouin poorlight whereeveryonestartstoquestionyourintegrity
  • 5. © 2014 iYogi Limited. All Rights Reserved. How to know? Bewatchfulofthesecommonsigns of identitytheft: IRSnotifiesthatmorethan1 taxreturnhasbeen filed in yourname Suddenwithdrawalfrombankaccount,of coursenotdone byyou Yourmails havesuddenlygone missing andit’snotyourdog Merchantshavestartedrefusing yourchecks fornoreason Debtcollectors havestartedcalling you….why? Medical bills forillness youdon’thave
  • 6. © 2014 iYogi Limited. All Rights Reserved. That’s not all, here’s more…
  • 7. © 2014 iYogi Limited. All Rights Reserved. Is there a way to escape being a victim? You can, butonly ifyou: Practice healthy online habits Remain alertwhile using your PC Apply caution while transacting online Keeprecords ofyour financial transactions Create strong passwords and change them frequently Take carewhile trashing your sensitive data and documents Becareful while sharing personal information with strangers/ in public places Not givein to larger-than-life offers; if they are too good to betrue –they aren’t Install a robust security solution on your PC to make yourcomputing and online sessions safe.
  • 8. © 2014 iYogi Limited. All Rights Reserved. Not sure whomto trust? GetTechGenie Absolutewith 24x7and 365 days ayear protectionWithityou get: Strong Antivirus Parental Control PC Optimizer Identity Theft Protection Empower yourPC this summerwith the perfect security solution that it needs! Visit http://www.techgenie.com/ now to install TechGenieAbsolute. Get Flat10% Off onTechGenie Absolute. Use Coupon Code: TGSZ10 Hurry! LimitedOffers aresoon running out. BUY NOW