KEEP
YOUR DEVICES
LOCK THEMOUT
datahops.com
CYBERSECURITYAWARENESS
UNDER
LOCK
AND
KEY
KEEP YOUR
LOCK THEMOUT
datahops.com
CYBERSECURITYAWARENESS
DEVICES
PATCHED
UPDATED AND
NEVER
LOCK THEMOUT
datahops.com
CYBERSECURITYAWARENESS
USB DEVICE
PLUG IN A
UNLESS YOU KNOW THE SOURCE
LOCK THEMOUT
datahops.com
CYBERSECURITYAWARENESS
SMALL BUT
MIGHTY
Never plug in a USB or Flash Drive unless you
know the source. Never accept one a a free gift
and buy them from reputable dealers. It is one
of the easiest ways of distributing malware
LOCK THEMOUT
datahops.com
CYBERSECURITYAWARENESS
LOVE IT OR
LOSE IT
When travelling-Always keep your devices close
and know where they are at all times. Never
leave them unatended
SECURE
LOCK THEMOUT
datahops.com
CYBERSECURITYAWARENESS
WPA2 ENCRYPTION
YOUR HOME ROUTER
SET UP
LOCK IT
OR
LOSE IT
NEVER LEAVE IT UNLOCKED
CYBERSECURITYAWARENESS
datahops.com
LOCK THEMOUT
NO SUCH THING
FREE LUNCH?
FREE DOWNLOADS CAN BE DANGEROUS
CYBERSECURITYAWARENESS
datahops.com
LOCK THEMOUT
SECURITY PATCHES
FOR YOUR OPERATING SYSTEM
ALWAYS
UPDATE
CYBERSECURITYAWARENESS
datahops.com
LOCK THEMOUT
DOWNLOAD APPS
UNTRUSTED SOURCES
NEVER
CYBERSECURITYAWARENESS
datahops.com
LOCK THEMOUT
FROM
Allow APP to access
photos, media and files on
your device
ALLOW DENY
1 of 3
!
LOCK THEMOUT
datahops.com
CYBERSECURITYAWARENESS
KEEP DEVICES UPDATED
DON’T GIVE THEM
OPPORTUNITY
A WINDOW OF
LOCK THEMOUT
datahops.com
CYBERSECURITYAWARENESS
JUICE JACKING ?
AVOID
PUBLIC USB CHARGING POINTS
LOCK THEMOUT
datahops.com
CYBERSECURITYAWARENESS
TURN OFF
BLUETOOTH
WHEN IN PUBLIC PLACES
LOCK THEMOUT
datahops.com
CYBERSECURITYAWARENESS
NEVER
SOFTWARE
WHEN ASKED TO OVER THE PHONE
DOWNLOAD
LOCK THEMOUT
datahops.com
CYBERSECURITYAWARENESS
PROTECT YOUR
USE PASSWORDS AND AUTO LOCKING
PHONE & TABLET
LOCK THEMOUT
datahops.com
CYBERSECURITYAWARENESS
Do you know which apps can access your
microphone, camera, location, and contacts ?
Check and deny those that are unsafe
PERMISSION
ABOARD ?
TO COME
1 of 3
Allow APP to access
photos, media and files on
your device
ALLOW DENY
LOCK THEMOUT
datahops.com
CYBERSECURITYAWARENESS
IS PRICELESS
PEACE OF MIND
Turn on encryption to protect your files if your
device gets lost or stolen. It cannot be accessed
by anyone without the password or recovery
key
LOCK THEMOUT
datahops.com
CYBERSECURITYAWARENESS
JUST
BACK UP
Backup your files and folders regularly using
secure and authorised data storage devices or
recognised cloud services
LOCK THEMOUT
datahops.com
CYBERSECURITYAWARENESS
SMALL AND
DEADLY
Avoid using removable devices such as USB
sticks or flash drives or external hard drives
from untrusted and unknown sources
LOCK THEMOUT
datahops.com
CYBERSECURITYAWARENESS
IS IT
AUTHORISED?
Only install software from trusted and
authorised sources. Update your systems
regularly and avoid disabling security setting on
devices
Installing Updates…..
Cyber Awareness Training www.datahops.com
LOCK THEM OUT !
NEVER PLUG IN A….
USB OR FLASH DRIVE
UNLESS YOU KNOW THE SOURCE
!
Cyber Awareness Training www.datahops.com
LOCK THEM OUT !
HOME NETWORK SECURITY
SEGMENT YOUR HOME NETWORK
HOME NETWORK GUEST NETWORK
FOR: FOR:
● IMPORTANT WORK
● ACCESS SENSITIVE FILES
● REMOTE WORKING
● GUESTS
● FAMILY AND FRIENDS
● SECURITY FROM FILES
Cyber Awareness Training www.datahops.com
LOCK THEM OUT !
ALWAYS DOWNLOAD APPS FROM
TRUSTED SOURCES
Allow APP to access
photos, media and files
on your device
ALLOW DENY
1 of 3
!
Cyber Awareness Training www.datahops.com
LOCK THEM OUT !
AT AIRPORTS
NEVER PLUG INTO USB CHARGER
REPORTS OF SOME COMPROMISE
Cyber Awareness Training www.datahops.com
LOCK THEM OUT !
NEVER LEAVE YOUR DEVICES
AUTOMATIC LOCK
UNATTENDED!USE
XXXXXXXXXXX
Protect your companies
intellectual property
● Don’t use company email for other purposes
● Don’t send any data unless encrypted
● Don’t use company devices for personal use
● Keep all devices up to date
Using Company
Resources
Cybersecurity awareness training datahops.com
● Don’t allow anyone to use company devices
● Always store company devices securely
● Never allow anyone access to devices
● Do not travel with devices unless necessary
● If device is lost or stolen-Report it
Don’t let
Them get
away with it
Protect your company
Maintain device security
Cybersecurity awareness training datahops.com
If Lost or Stolen report it
to the appropriate team
Always store company devices in a secure
place when you are not using them
Out of SIGHT
Out of MIND
Cybersecurity awareness training datahops.com
Keep Software
Up-to-date.
● Turn on Automatic Updates
● Use web browsers with automatic security updates.
● keep browser plugins up-to-date. (Flash, Java, etc.)
Always install the latest security
updates for your devices
Installing Updates…..
Cybersecurity awareness training datahops.com
Unattended
Devices ?
● Never leave devices unattended
● Lock your devices if you need to be away from
them for any length of time
● Encrypt and password protect any sensitive data
on a removable media device
● Lock or shut down your computer screen screen
when not in use.
Cybersecurity awareness training datahops.com
The physical security of your devices
is just as important
Secure your devices.
Keep your system up to date
Install software updates and patches
Install antivirus software
Protect your systems from infections
Turn on your firewall
Another layer of defence
Use a Password Manager
Manage all your passwords
Lock your devices
Set your devices to auto lock
Cybersecurity awareness training datahops.com
Mobile Device Safety
Lock your device with a PIN or
password
Only install apps from trusted
sources
Keep the device's operating
system up-to-date.
Turn off automatic WiFi
discoverability
Encrypt sensitive data before
storing or transmitting
Set up remote wiping function if
device is stolen or lost.
Use find my phone feature in
case of loss or theft
Cybersecurity awareness training datahops.com
All is not lost!
The only guaranteed way to repair your computer
after a security incident is to Backup your files
regularly - then erase and reinstall the system.
How to Recover
From a Disaster
Cybersecurity awareness training datahops.com
The Trap is Set
Don’t Download or install apps
from unknown sources
Cybersecurity awareness training datahops.com
Don’t Download or install apps
from unknown sources
You can give criminals remote
access to your mobile phone
Cybersecurity awareness training datahops.com
BACKDOOR OPEN?
IS THE

More Related Content

PDF
Cybersecurity Awareness Posters - Set #2
PPTX
Manpower planning
PPT
Industrial control systems cybersecurity.ppt
PDF
Nat'l Cyber Security Awareness Month (NCSAM) Posters
PPT
Employee Security Training[1]@
PDF
Standar Operasional Prosedur (SOP) Minimarket (Toko Retail Modern)
PPTX
Abc Analysis
PDF
Social engineering attacks
Cybersecurity Awareness Posters - Set #2
Manpower planning
Industrial control systems cybersecurity.ppt
Nat'l Cyber Security Awareness Month (NCSAM) Posters
Employee Security Training[1]@
Standar Operasional Prosedur (SOP) Minimarket (Toko Retail Modern)
Abc Analysis
Social engineering attacks

What's hot (20)

PDF
2023 - IBM Cost of a Data Breach Report.pdf
PPSX
Security Awareness Training
PPTX
Basic Security Training for End Users
PPTX
Implementing and Running SIEM: Approaches and Lessons
PPSX
Next-Gen security operation center
PPTX
Beginner's Guide to SIEM
PDF
Endpoint Detection & Response - FireEye
PPTX
Cyber security
PDF
Data Leakage Prevention (DLP)
PDF
End-User Security Awareness
PPTX
Security operation center (SOC)
PDF
Security architecture - Perform a gap analysis
PPTX
It security controls, plans, and procedures
 
PPTX
Windows 2019
PPTX
SIEM : Security Information and Event Management
PPTX
National cyber security policy final
PDF
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
PDF
IBM QRadar Security Intelligence Overview
PPTX
Threat Hunting with Splunk
2023 - IBM Cost of a Data Breach Report.pdf
Security Awareness Training
Basic Security Training for End Users
Implementing and Running SIEM: Approaches and Lessons
Next-Gen security operation center
Beginner's Guide to SIEM
Endpoint Detection & Response - FireEye
Cyber security
Data Leakage Prevention (DLP)
End-User Security Awareness
Security operation center (SOC)
Security architecture - Perform a gap analysis
It security controls, plans, and procedures
 
Windows 2019
SIEM : Security Information and Event Management
National cyber security policy final
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
IBM QRadar Security Intelligence Overview
Threat Hunting with Splunk
Ad

Similar to FREE A4 Cyber Security Awareness Posters-Device Security (20)

PDF
FREE A4 Cyber Security Awareness Posters-Removable Device
PDF
Free Printable A4 Cyber Security Awareness Posters-Malware
PDF
Cyber security
PDF
WISE KIDS Leaflet: eSecurity
PDF
Cybersecurity Awareness Month Tips
PPT
Adult Internet Safety
PDF
FREE A4 Cyber Security Posters-Data Protection-GDPR
PPTX
Secure End User
PDF
10 Essential Information Security Tips for Everyone
PPTX
Cyber pledge infoMagnum
PPT
Cybersafety basics.ppt cs
PPTX
Internet security
PPTX
Senior Technology Education
PPTX
Senior Education
PPTX
online and offline computer security
PPTX
User Security Awareness for office emplyee.pptx
PPTX
Cyber Security
PDF
How to protect your smartphone from malware
PPT
Computer security
PPT
Dev Abhijet Gagan Chaitanya VII-A ....Salwan public school
FREE A4 Cyber Security Awareness Posters-Removable Device
Free Printable A4 Cyber Security Awareness Posters-Malware
Cyber security
WISE KIDS Leaflet: eSecurity
Cybersecurity Awareness Month Tips
Adult Internet Safety
FREE A4 Cyber Security Posters-Data Protection-GDPR
Secure End User
10 Essential Information Security Tips for Everyone
Cyber pledge infoMagnum
Cybersafety basics.ppt cs
Internet security
Senior Technology Education
Senior Education
online and offline computer security
User Security Awareness for office emplyee.pptx
Cyber Security
How to protect your smartphone from malware
Computer security
Dev Abhijet Gagan Chaitanya VII-A ....Salwan public school
Ad

More from Data Hops (20)

PDF
FREE A4 Cyber Security Awareness Posters-Phishing part 1
PDF
FREE A4 Cyber Security Awareness Posters-Phishing part 2
PDF
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
PDF
FREE Cyber Security Awareness Posters-Social Engineering part 2
PDF
Free A4 Cyber Security Awareness Posters-Social Engineering part 1
PDF
FREE A4 Cyber Security Awareness Posters-Passwords part 5
PDF
A4 Cyber Security Awareness Posters-Password Security part 4
PDF
FREE A4 Cyber Security Awareness Posters-Password Security part 3
PDF
FREE A4 Cyber Security Awareness Posters-Password Security part 2
PDF
FREE A4 Data Security GDPR Posters-Data Protection part 5
PDF
FREE A4 Data Security GDPR Posters-Data Protection part 4
PDF
FREE A4 Data Security GDPR Posters-Data Protection part 3
PDF
FREE A4 Data Security GDPR Posters-Data Protection part 2
PDF
E A4 Data Security GDPR Posters-Data Protection part1FRE
PDF
FREE A4 Security Awareness Posters- GDPR Do's Data Protection Ninja
PDF
FREE A4 cyber Security awareness Posters-Data Protection -GDPR
PDF
FREE A4 Cyber Security awareness- Posters-Data Protection -GDPR
PDF
FREE A4 Cyber Security Awareness Posters-Phishing
PDF
FREE A4 Cyber Security Awareness Posters-Social Engineering
PDF
FREE A4 Cyber Security Awareness Posters-Data Privacy
FREE A4 Cyber Security Awareness Posters-Phishing part 1
FREE A4 Cyber Security Awareness Posters-Phishing part 2
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
FREE Cyber Security Awareness Posters-Social Engineering part 2
Free A4 Cyber Security Awareness Posters-Social Engineering part 1
FREE A4 Cyber Security Awareness Posters-Passwords part 5
A4 Cyber Security Awareness Posters-Password Security part 4
FREE A4 Cyber Security Awareness Posters-Password Security part 3
FREE A4 Cyber Security Awareness Posters-Password Security part 2
FREE A4 Data Security GDPR Posters-Data Protection part 5
FREE A4 Data Security GDPR Posters-Data Protection part 4
FREE A4 Data Security GDPR Posters-Data Protection part 3
FREE A4 Data Security GDPR Posters-Data Protection part 2
E A4 Data Security GDPR Posters-Data Protection part1FRE
FREE A4 Security Awareness Posters- GDPR Do's Data Protection Ninja
FREE A4 cyber Security awareness Posters-Data Protection -GDPR
FREE A4 Cyber Security awareness- Posters-Data Protection -GDPR
FREE A4 Cyber Security Awareness Posters-Phishing
FREE A4 Cyber Security Awareness Posters-Social Engineering
FREE A4 Cyber Security Awareness Posters-Data Privacy

Recently uploaded (20)

PDF
Connector Corner: Transform Unstructured Documents with Agentic Automation
PDF
NewMind AI Weekly Chronicles – August ’25 Week IV
PPTX
Module 1 Introduction to Web Programming .pptx
PDF
Accessing-Finance-in-Jordan-MENA 2024 2025.pdf
PDF
SaaS reusability assessment using machine learning techniques
PPTX
SGT Report The Beast Plan and Cyberphysical Systems of Control
PPTX
Internet of Everything -Basic concepts details
PDF
Electrocardiogram sequences data analytics and classification using unsupervi...
PDF
Build Real-Time ML Apps with Python, Feast & NoSQL
PDF
4 layer Arch & Reference Arch of IoT.pdf
PDF
Auditboard EB SOX Playbook 2023 edition.
PDF
zbrain.ai-Scope Key Metrics Configuration and Best Practices.pdf
PDF
A hybrid framework for wild animal classification using fine-tuned DenseNet12...
PDF
Ensemble model-based arrhythmia classification with local interpretable model...
PDF
Dell Pro Micro: Speed customer interactions, patient processing, and learning...
PDF
giants, standing on the shoulders of - by Daniel Stenberg
PDF
Transform-Your-Factory-with-AI-Driven-Quality-Engineering.pdf
PDF
Rapid Prototyping: A lecture on prototyping techniques for interface design
PDF
Aug23rd - Mulesoft Community Workshop - Hyd, India.pdf
PDF
AI.gov: A Trojan Horse in the Age of Artificial Intelligence
Connector Corner: Transform Unstructured Documents with Agentic Automation
NewMind AI Weekly Chronicles – August ’25 Week IV
Module 1 Introduction to Web Programming .pptx
Accessing-Finance-in-Jordan-MENA 2024 2025.pdf
SaaS reusability assessment using machine learning techniques
SGT Report The Beast Plan and Cyberphysical Systems of Control
Internet of Everything -Basic concepts details
Electrocardiogram sequences data analytics and classification using unsupervi...
Build Real-Time ML Apps with Python, Feast & NoSQL
4 layer Arch & Reference Arch of IoT.pdf
Auditboard EB SOX Playbook 2023 edition.
zbrain.ai-Scope Key Metrics Configuration and Best Practices.pdf
A hybrid framework for wild animal classification using fine-tuned DenseNet12...
Ensemble model-based arrhythmia classification with local interpretable model...
Dell Pro Micro: Speed customer interactions, patient processing, and learning...
giants, standing on the shoulders of - by Daniel Stenberg
Transform-Your-Factory-with-AI-Driven-Quality-Engineering.pdf
Rapid Prototyping: A lecture on prototyping techniques for interface design
Aug23rd - Mulesoft Community Workshop - Hyd, India.pdf
AI.gov: A Trojan Horse in the Age of Artificial Intelligence

FREE A4 Cyber Security Awareness Posters-Device Security