SlideShare ist ein Scribd-Unternehmen logo
1 von 20
Your Business is safer in our Scotland
Practical advice for
keeping You, Your
Employees and
your Business safe
on the internet
Research
  Work
Browsing      Everything!!
Shopping
 Banking
Socialising
Secure your router or HUB




   Stop sensitive data being accessed


Prevent access to your bandwidth and data
          allowance being used


    Stop inappropriate material being
               downloads.
Public WIFI




Do not send personal information

Use commercial hotspot providers

  Use a Virtual Private Network

Ensure you have effective antivirus
Email                        Identity Theft
 attachments

Spyware, worms,
 trojans, adware
                   Consequences       Fraud
  and malware

USB connected                     Corruption of
   devices                            data
SPYWARE
Type of virus which is designed to steal information about
                    computer activity




                   Takes screen shots



                  False advertisements



                  Copying bank details
PHISHING
Fraudulent emails used to gain personal information and
                to open new accounts




Emails arrive claiming to be from your bank credit card
                     company etc



        Can be identified by their poor quality
Requests
         for personal                 Use of real
         information                 information
              and
          passwords



  Use the
  name of
                            Spot a                  Bad spelling
well known                  Scam                        and
                                                     Grammar
companies




             Threats that              Generic
               require                greetings
                action
Actions

            Ensure you have anti virus and it is up to date



                   Use secure WIFI and websites


             Do not open or click on any links and delete
                               emails.


                   Do not provide account details.


If you think you have responded to a scam, change passwords,
               PIN numbers and contact the bank
52% mobile
                   phones are
                  smartphones




                                   47.8 million
  22.9 million
                                  iphones sold
 ipads sold in
                                     in last 4
last 4 months
                                    months of
   of 2012
                                      2012




                     28% of
                 internet usage
                     is from
                  smartphones
Spot the difference?
Use a secure connection                                  Use strong passwords




Look out for shoulder surfers                              Report unusual activity



                                Never disclose passwords
Search and use reputable companies




Use Paypal when paying an individual               Ensure third party payment sites are
                                                                  secure
Only provide information that you                  Choose a name that does not reveal
       feel comfortable with                              personal information




Choose public places if you choose to                 Choose a site that will keep you
               meet                                            anonymous



                            Do not post personal information
Profiles should be private         Learn how to use the site privately




Do not reveal personal information     Do not talk about future plans
www.ecrimescotland.org.uk
www.getsafeonline.org
www.sophos.com
www.sbcc.org.uk
Questions?

Weitere ähnliche Inhalte

Was ist angesagt?

Cataluña jennifer protect your good name
Cataluña jennifer  protect your good nameCataluña jennifer  protect your good name
Cataluña jennifer protect your good nameJennifer Cataluña
 
Protect your good name
Protect your good nameProtect your good name
Protect your good namelord_durana
 
Slideshow - Lil Rat
Slideshow - Lil RatSlideshow - Lil Rat
Slideshow - Lil Ratmegg16
 
8 steps to smartphone security for android
8 steps to smartphone security for android8 steps to smartphone security for android
8 steps to smartphone security for androidiYogi
 
My protection plan
My protection planMy protection plan
My protection planShakena12
 
Cyber security tips in Banking in Nepal
Cyber security tips in Banking in NepalCyber security tips in Banking in Nepal
Cyber security tips in Banking in NepalResham Acharya
 
Internet Security: Protect the Personal; Defend the Workplace
Internet Security: Protect the Personal; Defend the WorkplaceInternet Security: Protect the Personal; Defend the Workplace
Internet Security: Protect the Personal; Defend the WorkplaceMarian Merritt
 
Internet safety presentation 2012
Internet safety presentation 2012Internet safety presentation 2012
Internet safety presentation 2012KanelandSvihlik
 
Std 12 Computer Chapter 5 Introduction to Mcommerce (Part 2)
Std 12 Computer Chapter 5  Introduction to Mcommerce (Part 2)Std 12 Computer Chapter 5  Introduction to Mcommerce (Part 2)
Std 12 Computer Chapter 5 Introduction to Mcommerce (Part 2)Nuzhat Memon
 
How to login to ringtoindia android app
How to login to ringtoindia android appHow to login to ringtoindia android app
How to login to ringtoindia android appRingtoIndia
 
Protect smartphone from hackers
Protect smartphone from hackersProtect smartphone from hackers
Protect smartphone from hackersAndrew
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric TechnologyTony Chew
 
Biometrics Authentication
Biometrics Authentication Biometrics Authentication
Biometrics Authentication Tony Chew
 
Joe CFO for CiscoLive Berlin 2016 Email and Web Security Presentation
Joe CFO for CiscoLive Berlin 2016 Email and Web Security PresentationJoe CFO for CiscoLive Berlin 2016 Email and Web Security Presentation
Joe CFO for CiscoLive Berlin 2016 Email and Web Security PresentationBruce Johnson
 
internet safety 2013
internet safety 2013internet safety 2013
internet safety 2013Brian Downey
 

Was ist angesagt? (20)

Cataluña jennifer protect your good name
Cataluña jennifer  protect your good nameCataluña jennifer  protect your good name
Cataluña jennifer protect your good name
 
Protect your good name
Protect your good nameProtect your good name
Protect your good name
 
Protect your good name
Protect your good nameProtect your good name
Protect your good name
 
Slideshow - Lil Rat
Slideshow - Lil RatSlideshow - Lil Rat
Slideshow - Lil Rat
 
8 steps to smartphone security for android
8 steps to smartphone security for android8 steps to smartphone security for android
8 steps to smartphone security for android
 
My protection plan
My protection planMy protection plan
My protection plan
 
Cyber security tips in Banking in Nepal
Cyber security tips in Banking in NepalCyber security tips in Banking in Nepal
Cyber security tips in Banking in Nepal
 
Internet Security: Protect the Personal; Defend the Workplace
Internet Security: Protect the Personal; Defend the WorkplaceInternet Security: Protect the Personal; Defend the Workplace
Internet Security: Protect the Personal; Defend the Workplace
 
Security provisions
Security provisions Security provisions
Security provisions
 
Internet safety presentation 2012
Internet safety presentation 2012Internet safety presentation 2012
Internet safety presentation 2012
 
Std 12 Computer Chapter 5 Introduction to Mcommerce (Part 2)
Std 12 Computer Chapter 5  Introduction to Mcommerce (Part 2)Std 12 Computer Chapter 5  Introduction to Mcommerce (Part 2)
Std 12 Computer Chapter 5 Introduction to Mcommerce (Part 2)
 
Cyberbullying!!!
Cyberbullying!!! Cyberbullying!!!
Cyberbullying!!!
 
How to login to ringtoindia android app
How to login to ringtoindia android appHow to login to ringtoindia android app
How to login to ringtoindia android app
 
Cyber safe girl e book
Cyber safe girl e bookCyber safe girl e book
Cyber safe girl e book
 
Protect smartphone from hackers
Protect smartphone from hackersProtect smartphone from hackers
Protect smartphone from hackers
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Biometrics Authentication
Biometrics Authentication Biometrics Authentication
Biometrics Authentication
 
Joe CFO for CiscoLive Berlin 2016 Email and Web Security Presentation
Joe CFO for CiscoLive Berlin 2016 Email and Web Security PresentationJoe CFO for CiscoLive Berlin 2016 Email and Web Security Presentation
Joe CFO for CiscoLive Berlin 2016 Email and Web Security Presentation
 
Avoiding Bad URL's In the Mobile Web
Avoiding Bad URL's In the Mobile WebAvoiding Bad URL's In the Mobile Web
Avoiding Bad URL's In the Mobile Web
 
internet safety 2013
internet safety 2013internet safety 2013
internet safety 2013
 

Andere mochten auch

Get Linked In
Get Linked InGet Linked In
Get Linked Inalbryce
 
East Lothian Coffee Morning
East Lothian Coffee MorningEast Lothian Coffee Morning
East Lothian Coffee Morningalbryce
 
Local SEO - An Introduction
Local SEO - An IntroductionLocal SEO - An Introduction
Local SEO - An Introductionalbryce
 
10 steps to linked in success
10 steps to linked in success10 steps to linked in success
10 steps to linked in successalbryce
 
SEO: Getting Personal
SEO: Getting PersonalSEO: Getting Personal
SEO: Getting PersonalKirsty Hulse
 
32 Ways a Digital Marketing Consultant Can Help Grow Your Business
32 Ways a Digital Marketing Consultant Can Help Grow Your Business32 Ways a Digital Marketing Consultant Can Help Grow Your Business
32 Ways a Digital Marketing Consultant Can Help Grow Your BusinessBarry Feldman
 

Andere mochten auch (7)

Get Linked In
Get Linked InGet Linked In
Get Linked In
 
East Lothian Coffee Morning
East Lothian Coffee MorningEast Lothian Coffee Morning
East Lothian Coffee Morning
 
Local SEO - An Introduction
Local SEO - An IntroductionLocal SEO - An Introduction
Local SEO - An Introduction
 
10 steps to linked in success
10 steps to linked in success10 steps to linked in success
10 steps to linked in success
 
SEO: Getting Personal
SEO: Getting PersonalSEO: Getting Personal
SEO: Getting Personal
 
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job? Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
 
32 Ways a Digital Marketing Consultant Can Help Grow Your Business
32 Ways a Digital Marketing Consultant Can Help Grow Your Business32 Ways a Digital Marketing Consultant Can Help Grow Your Business
32 Ways a Digital Marketing Consultant Can Help Grow Your Business
 

Ähnlich wie Keep Your SME Safe Online

Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Jay Nagar
 
7 Small Business Security Tips
7 Small Business Security Tips7 Small Business Security Tips
7 Small Business Security TipsInfusionsoft
 
Computer crime by inqilab patel
Computer crime by inqilab patelComputer crime by inqilab patel
Computer crime by inqilab patelInqilab Patel
 
Cybersecurity Awareness Infographics
Cybersecurity Awareness InfographicsCybersecurity Awareness Infographics
Cybersecurity Awareness InfographicsNetLockSmith
 
Private Data and Prying Eyes
Private Data and Prying EyesPrivate Data and Prying Eyes
Private Data and Prying EyesEllie Sherven
 
A Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the InternetA Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the Internet- Mark - Fullbright
 
Edu -3 Cyber privacy arya. s
Edu -3 Cyber privacy arya. sEdu -3 Cyber privacy arya. s
Edu -3 Cyber privacy arya. sARYAS87
 
EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2JayMarkBandoy1
 
31 Internet Security Tips on CyberSecurity Month Ocotober
31 Internet Security Tips on CyberSecurity Month Ocotober31 Internet Security Tips on CyberSecurity Month Ocotober
31 Internet Security Tips on CyberSecurity Month OcotoberQuick Heal Technologies Ltd.
 
Securing Mobile & Online Identity in the Cyber World
Securing Mobile & Online Identity in the Cyber WorldSecuring Mobile & Online Identity in the Cyber World
Securing Mobile & Online Identity in the Cyber WorldEmil Tan
 
Identity theft in the internet
Identity theft in the internetIdentity theft in the internet
Identity theft in the internetmohmd-kutbi
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101mateenzero
 
Cyber Security and Cyber Awareness Tips manual 2020
Cyber Security and Cyber Awareness Tips manual 2020Cyber Security and Cyber Awareness Tips manual 2020
Cyber Security and Cyber Awareness Tips manual 2020Jay Nagar
 
Rules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxRules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxNoelBuctot1
 
Cyber Safety | Cyber Safety Tips | Cybersecurity
Cyber Safety | Cyber Safety Tips | CybersecurityCyber Safety | Cyber Safety Tips | Cybersecurity
Cyber Safety | Cyber Safety Tips | CybersecurityCyberambessador
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayanehaz
 

Ähnlich wie Keep Your SME Safe Online (20)

Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
Computer 4 ict
Computer 4 ictComputer 4 ict
Computer 4 ict
 
7 Small Business Security Tips
7 Small Business Security Tips7 Small Business Security Tips
7 Small Business Security Tips
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Computer crime by inqilab patel
Computer crime by inqilab patelComputer crime by inqilab patel
Computer crime by inqilab patel
 
S_A_T.pptx
S_A_T.pptxS_A_T.pptx
S_A_T.pptx
 
Cybersecurity Awareness Infographics
Cybersecurity Awareness InfographicsCybersecurity Awareness Infographics
Cybersecurity Awareness Infographics
 
Private Data and Prying Eyes
Private Data and Prying EyesPrivate Data and Prying Eyes
Private Data and Prying Eyes
 
A Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the InternetA Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the Internet
 
Edu -3 Cyber privacy arya. s
Edu -3 Cyber privacy arya. sEdu -3 Cyber privacy arya. s
Edu -3 Cyber privacy arya. s
 
EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2
 
31 Internet Security Tips on CyberSecurity Month Ocotober
31 Internet Security Tips on CyberSecurity Month Ocotober31 Internet Security Tips on CyberSecurity Month Ocotober
31 Internet Security Tips on CyberSecurity Month Ocotober
 
Securing Mobile & Online Identity in the Cyber World
Securing Mobile & Online Identity in the Cyber WorldSecuring Mobile & Online Identity in the Cyber World
Securing Mobile & Online Identity in the Cyber World
 
Security-Awareness-Training.pptx
Security-Awareness-Training.pptxSecurity-Awareness-Training.pptx
Security-Awareness-Training.pptx
 
Identity theft in the internet
Identity theft in the internetIdentity theft in the internet
Identity theft in the internet
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101
 
Cyber Security and Cyber Awareness Tips manual 2020
Cyber Security and Cyber Awareness Tips manual 2020Cyber Security and Cyber Awareness Tips manual 2020
Cyber Security and Cyber Awareness Tips manual 2020
 
Rules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxRules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptx
 
Cyber Safety | Cyber Safety Tips | Cybersecurity
Cyber Safety | Cyber Safety Tips | CybersecurityCyber Safety | Cyber Safety Tips | Cybersecurity
Cyber Safety | Cyber Safety Tips | Cybersecurity
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 

Keep Your SME Safe Online

  • 1. Your Business is safer in our Scotland
  • 2. Practical advice for keeping You, Your Employees and your Business safe on the internet
  • 3. Research Work Browsing Everything!! Shopping Banking Socialising
  • 4. Secure your router or HUB Stop sensitive data being accessed Prevent access to your bandwidth and data allowance being used Stop inappropriate material being downloads.
  • 5. Public WIFI Do not send personal information Use commercial hotspot providers Use a Virtual Private Network Ensure you have effective antivirus
  • 6. Email Identity Theft attachments Spyware, worms, trojans, adware Consequences Fraud and malware USB connected Corruption of devices data
  • 7. SPYWARE Type of virus which is designed to steal information about computer activity Takes screen shots False advertisements Copying bank details
  • 8. PHISHING Fraudulent emails used to gain personal information and to open new accounts Emails arrive claiming to be from your bank credit card company etc Can be identified by their poor quality
  • 9. Requests for personal Use of real information information and passwords Use the name of Spot a Bad spelling well known Scam and Grammar companies Threats that Generic require greetings action
  • 10. Actions Ensure you have anti virus and it is up to date Use secure WIFI and websites Do not open or click on any links and delete emails. Do not provide account details. If you think you have responded to a scam, change passwords, PIN numbers and contact the bank
  • 11.
  • 12. 52% mobile phones are smartphones 47.8 million 22.9 million iphones sold ipads sold in in last 4 last 4 months months of of 2012 2012 28% of internet usage is from smartphones
  • 14. Use a secure connection Use strong passwords Look out for shoulder surfers Report unusual activity Never disclose passwords
  • 15. Search and use reputable companies Use Paypal when paying an individual Ensure third party payment sites are secure
  • 16. Only provide information that you Choose a name that does not reveal feel comfortable with personal information Choose public places if you choose to Choose a site that will keep you meet anonymous Do not post personal information
  • 17. Profiles should be private Learn how to use the site privately Do not reveal personal information Do not talk about future plans
  • 18.