SlideShare una empresa de Scribd logo
1 de 18
Dr. Babasaheb Ambedkar Technological
University, Lonere, Maharashtra
Department of Electronics and Telecommunication
Anu-Wid-Youth
Seminar presentation
on
Cyber Security Awareness
Presented by
Meghraj Patil
Presentation Contents
• Need for Cyber Security
• Threats:
• Hacking
• Malware
• Phishing
• Stay Secure
• Internet Shopping
• Internet Banking
• Personal Privacy
• Public Wi-Fi
• Passwords
• Router
• Support & Resources
Why is Cyber Awareness Important?
• Cyber crime is a growing trend
• Raise awareness of threats
• As with most crimes the police can’t tackle this problem
alone
• To encourage reporting
• Promote Government backed scheme ‘Cyber Essentials’
• Cyber crime is massively under reported.
How Cyber crime affects the India
• India reported 11.8% rise in cyber crime in
2021; 578 incidents of 'fake news on social
media. It poses a risk if the correct security
measures aren’t taken.
• In 2020 49% of businesses were breached.
It’s not a matter of if but when.
• Asia was the most-attacked region by cyber-
criminals in 2021, accounting for one in four
attacks globally, and India was among top
three nations that experienced most server
access and ransomware attacks in the
region
Who is doing the hacking?
• Financial (theft, fraud, blackmail)
• Political /state (state level/
military)
• Fame/ kudos (fun/ status)
• Hacktivism (cause)
• Pen testers (legal hacking)
• Police
• Insider
• Business
Common threats - Ransomware
• Normally loaded onto a computer via a
download/attachment/link from an email or website.
• Will either lock the screen or encrypt your data.
• Once Ransomware is uploaded on your
computer/tablet/phone it is very difficult to remove
without removing all of the data
• Wannacry attack 2017 - One of the biggest cyber attacks
to occur.
• Is said to have hit 300,000 computers in 150 countries.
• Companies affected include; NHS, Renault, FedEx, Spanish
telecoms and gas companies, German railways etc.
Ransomware
• India was one of the worst-affected areas by the WannaCry ransomware. The official figures say
around 45,000 computers were affected.
How to tackle Ransomware
• Back up- Keep a backed up copy of your data.
Ensure its not permanently connected to the
network.
• Patch- Keep your software up to date.
Wannacry was successful as those affected
computers hadn’t updated. The update
contained a fix for the problem.
• Attachments- Don’t click on links from
emails/SMS as this could easily be from an
untrusted source and contain malware like
Ransomware
Phishing
• Is the attempt to obtain sensitive information by deception.
• They will be after your login credentials, payment card details or to upload malware to your computer
• The email will normally impersonate a genuine company or person.
How to tackle the problem
• Don’t click any links on an email unless
you can guarantee who its from.
• Use a trusted method of contacting the
company via a phone number, app or
website.
• Mark the email as spam and contact the
organisation.
What to look out for when shopping on the
internet?
• Ensure you’re on the correct website
• HTTPS and the padlock- The ‘S’ stands for secure,
this means you have a secure connection to the
website. This should prevent a ‘man in the middle’
attack. It encrypts your data and the receiver will be
able to decrypt it but if it is a fraudulent website
they will still obtain your information.
Public Wi-Fi
• May not be trustworthy. They could share your information
to other companies who operate in countries without any
data protection.
• You may not know who is watching you whilst you’re online.
What to do and not do to
• Don’t use online banking. Use your own data.
• Don’t conduct any purchases
• Use a virtual private network (VPN)
Passwords Advice
• Use 1 password per account.
• Three random words Capitals, special
characters and numbers is your own choice.
• If you follow this advice your passwords
security will be significantly increased against a
brute force attack.
• Password managers can be helpful to store
your passwords.
Advice
• Update and migrate
• Activate your firewall
• Staff awareness
• Data encryption
• User accounts privileges i.e
admin
• Cyber insurance
• Prepare Plan
• try to use Qr codes instead of
sharing personal data
In the physical world we’re
good at protecting
ourselves and our
property, we need to
replicate this in the digital
world.
80% of cyber-crime is
preventable
You are the best defence!
• Technology is only a small part of Cyber Defence
• You are the most important person – protect
yourself
• For businesses the most important and best defence
is Cyber Security Aware employees – train your staff
Always be aware!
Always be on your guard!
Reporting Cybercrime
• You can report a cyber crime at
the online portal
https://cybercrime.gov.in/,
initiated by the Government of
India.
• Can be reported 24/7 via the
website.
Indian Cyber Crime Coordination Centre (I4C)
Indian Cyber Crime Coordination
Centre
https://cytrain.ncrb.gov.in/
https://www.cybercrime.gov.in/
Resources
• Get safe Online
(www.getsafeonline.org)
I hope this information has been helpful.
Thank you !

Más contenido relacionado

Similar a cybersecurity.pptx

Unveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity postureUnveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity postureLourdes Paloma Gimenez
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsKrishna Srikanth Manda
 
Cyber_Security_Awareness_Presentation.pptx
Cyber_Security_Awareness_Presentation.pptxCyber_Security_Awareness_Presentation.pptx
Cyber_Security_Awareness_Presentation.pptxNavinKumarDewangan
 
csa2014 IBC
csa2014 IBCcsa2014 IBC
csa2014 IBCapyn
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptxCharithraaAR
 
The Threat Is Real. Protect Yourself.
The Threat Is Real. Protect Yourself.The Threat Is Real. Protect Yourself.
The Threat Is Real. Protect Yourself.Teri Radichel
 
Cyber security (2) (2)
Cyber security (2) (2)Cyber security (2) (2)
Cyber security (2) (2)ameyjakate
 
Data protection and security
Data protection and securityData protection and security
Data protection and securitysamina khan
 
What is Cybercrime and How to Prevent Cybercrime?
What is Cybercrime and How to Prevent Cybercrime?What is Cybercrime and How to Prevent Cybercrime?
What is Cybercrime and How to Prevent Cybercrime?Entrance Exam Info
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in SocietyRubal Sagwal
 
Cyber security awareness for end users
Cyber security awareness for end usersCyber security awareness for end users
Cyber security awareness for end usersNetWatcher
 
Ethics and safety measures in computing.pptx
Ethics and safety measures in computing.pptxEthics and safety measures in computing.pptx
Ethics and safety measures in computing.pptxAarush59
 
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONSIMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONSPreetiDevidas
 
CCIAOR Cyber Security Forum
CCIAOR Cyber Security ForumCCIAOR Cyber Security Forum
CCIAOR Cyber Security ForumCCIAOR
 
Introduction to Cyber Security-- L01.pptx
Introduction to Cyber Security-- L01.pptxIntroduction to Cyber Security-- L01.pptx
Introduction to Cyber Security-- L01.pptxsomi12
 

Similar a cybersecurity.pptx (20)

Unveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity postureUnveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity posture
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
 
Cyber_Security_Awareness_Presentation.pptx
Cyber_Security_Awareness_Presentation.pptxCyber_Security_Awareness_Presentation.pptx
Cyber_Security_Awareness_Presentation.pptx
 
csa2014 IBC
csa2014 IBCcsa2014 IBC
csa2014 IBC
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptx
 
The Threat Is Real. Protect Yourself.
The Threat Is Real. Protect Yourself.The Threat Is Real. Protect Yourself.
The Threat Is Real. Protect Yourself.
 
Cyberattacks.pptx
Cyberattacks.pptxCyberattacks.pptx
Cyberattacks.pptx
 
Cybersecurity.pptx
Cybersecurity.pptxCybersecurity.pptx
Cybersecurity.pptx
 
Cyber security (2) (2)
Cyber security (2) (2)Cyber security (2) (2)
Cyber security (2) (2)
 
Data protection and security
Data protection and securityData protection and security
Data protection and security
 
What is Cybercrime and How to Prevent Cybercrime?
What is Cybercrime and How to Prevent Cybercrime?What is Cybercrime and How to Prevent Cybercrime?
What is Cybercrime and How to Prevent Cybercrime?
 
Nonprofit Cybersecurity Incident Report
Nonprofit Cybersecurity Incident ReportNonprofit Cybersecurity Incident Report
Nonprofit Cybersecurity Incident Report
 
Cybersecurity awareness.pdf
Cybersecurity awareness.pdfCybersecurity awareness.pdf
Cybersecurity awareness.pdf
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
 
Cyber security awareness for end users
Cyber security awareness for end usersCyber security awareness for end users
Cyber security awareness for end users
 
Ethics and safety measures in computing.pptx
Ethics and safety measures in computing.pptxEthics and safety measures in computing.pptx
Ethics and safety measures in computing.pptx
 
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONSIMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
 
CCIAOR Cyber Security Forum
CCIAOR Cyber Security ForumCCIAOR Cyber Security Forum
CCIAOR Cyber Security Forum
 
Introduction to Cyber Security-- L01.pptx
Introduction to Cyber Security-- L01.pptxIntroduction to Cyber Security-- L01.pptx
Introduction to Cyber Security-- L01.pptx
 

Último

Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Association for Project Management
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jisc
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...Nguyen Thanh Tu Collection
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxCeline George
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Pooja Bhuva
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxJisc
 

Último (20)

Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 

cybersecurity.pptx

  • 1. Dr. Babasaheb Ambedkar Technological University, Lonere, Maharashtra Department of Electronics and Telecommunication Anu-Wid-Youth Seminar presentation on Cyber Security Awareness Presented by Meghraj Patil
  • 2. Presentation Contents • Need for Cyber Security • Threats: • Hacking • Malware • Phishing • Stay Secure • Internet Shopping • Internet Banking • Personal Privacy • Public Wi-Fi • Passwords • Router • Support & Resources
  • 3. Why is Cyber Awareness Important? • Cyber crime is a growing trend • Raise awareness of threats • As with most crimes the police can’t tackle this problem alone • To encourage reporting • Promote Government backed scheme ‘Cyber Essentials’ • Cyber crime is massively under reported.
  • 4. How Cyber crime affects the India • India reported 11.8% rise in cyber crime in 2021; 578 incidents of 'fake news on social media. It poses a risk if the correct security measures aren’t taken. • In 2020 49% of businesses were breached. It’s not a matter of if but when. • Asia was the most-attacked region by cyber- criminals in 2021, accounting for one in four attacks globally, and India was among top three nations that experienced most server access and ransomware attacks in the region
  • 5. Who is doing the hacking? • Financial (theft, fraud, blackmail) • Political /state (state level/ military) • Fame/ kudos (fun/ status) • Hacktivism (cause) • Pen testers (legal hacking) • Police • Insider • Business
  • 6. Common threats - Ransomware • Normally loaded onto a computer via a download/attachment/link from an email or website. • Will either lock the screen or encrypt your data. • Once Ransomware is uploaded on your computer/tablet/phone it is very difficult to remove without removing all of the data • Wannacry attack 2017 - One of the biggest cyber attacks to occur. • Is said to have hit 300,000 computers in 150 countries. • Companies affected include; NHS, Renault, FedEx, Spanish telecoms and gas companies, German railways etc.
  • 7. Ransomware • India was one of the worst-affected areas by the WannaCry ransomware. The official figures say around 45,000 computers were affected.
  • 8. How to tackle Ransomware • Back up- Keep a backed up copy of your data. Ensure its not permanently connected to the network. • Patch- Keep your software up to date. Wannacry was successful as those affected computers hadn’t updated. The update contained a fix for the problem. • Attachments- Don’t click on links from emails/SMS as this could easily be from an untrusted source and contain malware like Ransomware
  • 9. Phishing • Is the attempt to obtain sensitive information by deception. • They will be after your login credentials, payment card details or to upload malware to your computer • The email will normally impersonate a genuine company or person. How to tackle the problem • Don’t click any links on an email unless you can guarantee who its from. • Use a trusted method of contacting the company via a phone number, app or website. • Mark the email as spam and contact the organisation.
  • 10. What to look out for when shopping on the internet? • Ensure you’re on the correct website • HTTPS and the padlock- The ‘S’ stands for secure, this means you have a secure connection to the website. This should prevent a ‘man in the middle’ attack. It encrypts your data and the receiver will be able to decrypt it but if it is a fraudulent website they will still obtain your information.
  • 11. Public Wi-Fi • May not be trustworthy. They could share your information to other companies who operate in countries without any data protection. • You may not know who is watching you whilst you’re online. What to do and not do to • Don’t use online banking. Use your own data. • Don’t conduct any purchases • Use a virtual private network (VPN)
  • 12. Passwords Advice • Use 1 password per account. • Three random words Capitals, special characters and numbers is your own choice. • If you follow this advice your passwords security will be significantly increased against a brute force attack. • Password managers can be helpful to store your passwords.
  • 13. Advice • Update and migrate • Activate your firewall • Staff awareness • Data encryption • User accounts privileges i.e admin • Cyber insurance • Prepare Plan • try to use Qr codes instead of sharing personal data In the physical world we’re good at protecting ourselves and our property, we need to replicate this in the digital world. 80% of cyber-crime is preventable
  • 14. You are the best defence! • Technology is only a small part of Cyber Defence • You are the most important person – protect yourself • For businesses the most important and best defence is Cyber Security Aware employees – train your staff Always be aware! Always be on your guard!
  • 15. Reporting Cybercrime • You can report a cyber crime at the online portal https://cybercrime.gov.in/, initiated by the Government of India. • Can be reported 24/7 via the website.
  • 16. Indian Cyber Crime Coordination Centre (I4C) Indian Cyber Crime Coordination Centre https://cytrain.ncrb.gov.in/ https://www.cybercrime.gov.in/
  • 17. Resources • Get safe Online (www.getsafeonline.org)
  • 18. I hope this information has been helpful. Thank you !