PowerPoint Presentation

Published on
Scene 1 (0s)

Vlog-Making Contest

Cybercrime Awareness Submit by: Lance Jared Figueroa

Scene 2 (10s)

How to Avoid Cybercrime

The cyber definition relates to the field of digital technology, and today is often associated with cybercrime. You might say that it doesn’t matter to you as you’re not be a big cheese in the business world. Big mistake – since all individuals save data on their computers that is potentially profitable for scammers. Unfortunately, plenty of people are reckless when dealing with cybercrime. For example, up to 73% of users reuse passwords in their online accounts. The following tips can protect you from cybercrime.

Scene 3 (35s)


Refrain from connecting to free Wi-Fi networks from coffee shops or other public places. Connecting your device to public networks exposes it potential HACKERS that can easily get through the low level security of these kinds of networks.


Scene 4 (50s)

AVOID USING PUBLIC computers for sensitive Business


If you’re about to do some personal transactions like banking or online shopping, do not do it using public computers. Other people who have used the computers before you may have put programs that can record the passwords you type in.

Scene 5 (1m 6s)

Do not give out your passwords


Keep the passwords of your various accounts to yourself. If you do let someone know, make sure to change it afterwards to prevent that person from accessing your private internet accounts without permission.

Scene 6 (1m 10s)

Avoid downloading unknown applications.


The internet is full of free software from unknown sources. These kinds of programs normally carry malicious application with it and installing it may infect and cause serious damage to your computer.

Scene 7 (1m 13s)

How to be safe online

Cybercrime is becoming major problem for organizations around the world. With attack against business doubling in the last five years , organizations need to invest heavy in Cyber Security Awareness Training to help defend against attack. Over 90% of all successful cyber – attacks are a result of information unknowingly provided by employees. As networks become harder to breach, cybercriminals are increasingly targeting employees as they are the easiest way to break into a network and steal sensitive data .

Scene 8 (1m 18s)


1. Don’t open mail from strangers: If you get a phishing email with malware attached, you don’t have to download the attachment for it to do damage to your home network. That’s because drive – by downloads can install malware on your hard drive without you even agreeing to download them. 2. Make sure your devices are up to date: If you don’t have your security software, web browsers, and devices se t to update automatically, turn on those automatic updates now. Updates often include critical fixer for any security holes that may have been detected in your programs or devices.

Scene 9 (1m 47s)

3. Use strong passwords: There are several ways to protect yourself from identity theft online, and using strong passwords is one of them. Unfortunately, even now people still use passwords like “12345678” or “password ”. Don’t use those, and also don’t use your dog’s name or your kids birthday. 4. Use two – factor authentication: Two – factor authentication requires you to verify your identity after you’ve logged in using your username and password. In some cases, you’ll have to answer a security question. Whenever two – factor authentication is available, opt in. It may take you a couple of extra seconds to log in to your accounts, but it can make it less likely that other people will be able to log into your accounts, too.

Scene 10 (1m 48s)

5. Don’t click on strange – looking links: Viruses and other form of malware often spread because you click on a link from someone you know. If you receive a link that looks strange (for instance, it may have typos in it) from a trusted friend of family member, contact them to ask if the link you’ve received was sent on purpose. You might have to wait a bit to watch that funny viral video, but better safe than sorry. 6. Avoid using unsecured public Wi-Fi: If possible, try to avoid accessing unsecured public Wi-Fi on your devices. Using it can make you vulnerable to predatory practices. And if you must use it, avoid entering compromising information, like your social security number or financial information, on any websites. Better yet, use a VPN, or virtual private network, to do your browsing when you’re not at home. This will encrypt the data you send and receive, making it much harder to intercept.

Scene 11 (2m 29s)

7. Back up your data regularly: If you become a victim of malware, such as ransom ware, you might not be able to get your data back. That is, useless you’ve backed up your data. 8. Be smart with financial information: Be mindful of where you enter information like your credit card number online. Before you purchase anything on a website, ensure that the website’s URL starts with “http://”. The “s” at the end is critical, because it indicates that your connection is encrypted. Don’t purchase anything from a websites you buy from, even if you shop with them frequently. Storing your information on their site could make it easier for hacker to access in the event that company’s websites or network suffer a data breach.

Scene 12 (3m 4s)

9. Educate your Family: You can be taking all the right precautions on your home security network, but if your family and other people using your network aren’t doing their part to keep everything secure, your efforts might not be enough . 10. Avoid Sharing personal information: It’s easy to get comfortable with sharing a little too much personal information online. But you may be surprised at how much damage cybercriminals can do with just a little bit of information. To keep it safe, never share identifying details, like your full name, address, or financial information with stranger you meet online. You should also be careful about the usernames you create for websites – there’s no need for them to include your real name. And be sparing with the amount of information you share in online survey or forms. Most of the time, little to no personal information is genuinely needed to complete them.