What are your risks? 

Part 2

Cyber Theft

  • Online payment systems may not guarantee the safety of your money – $81M stolen from central bank of Bangladesh in 2016 cyber heist
  • Drugs, information and your credit card data – Take your pick in the online black markets

Identity Theft

  • Is your child’s identity at risk? – Young mum experiences ‘digital kidnapping’

Cyber Bullying

  • Cyber bullying can kill - How it can lead to suicide


  • Your data and devices could be held hostage – Find out the anatomy of a ransomware

How is your data retrieved?

Social Engineering Attacks

  • Baiting – Watch what happens when you plug a foreign device into your computer
  • Phishing – Personal details targeted in phishing emails that appears as Google Docs
  • Pretexting – Your board director can be an impersonator to get your phone records (Hewlett-Packard incident)
  • Read more on social engineering fraud


  • Social media alone can help cyber criminals know you better– 30% of internet users vulnerable to attacks
  • Google tracks you by what you share – Here’s how to stop it
  • Think before you post – When it can cost you your job

What can you do?

  • Be discreet about your privacy settings and ‘check-in’s.
  • Be sure you know who people are before accepting connections
  • Be wary about messages from unfamiliar emails
June 2017 Part 2: Your Biggest Risk Could Be You

Daily Mail. (2016, April 23). Hackers steal $81 million from a Bangladeshi bank with no firewall... and were only caught out when the illiterate fraudsters spelt 'foundation' as 'fandation'. Retrieved from Daily Mail:

News. (2016, January 18). Suspicion and mistrust: Total anarchy on the dark web. Retrieved from News:

Yahoo. (2015, March 3). The Disturbing Facebook Trend of Stolen Kids Photos. Retrieved from Yahoo:

CNN. (2016, December 1). Teen who was relentlessly bullied kills herself in front of her family. Retrieved from CNN: Ransomware is moving to the next level. Retrieved from

NBC News. (2017, May 4). Massive Phishing Attack Targets Gmail Users. Retrieved from NBC News:

The New York Times. (2006, September 8). Hewlett-Packard Spied on Writers in Leaks. Retrieved from The New York Times: Safeguarding your enterprise from social engineering fraud risks. Retrieved from (2016, January 10). Oversharing on social networking sites leaves 30% internet users vulnerable to cybercrime. Retrieved from

Wired. (2017, March 20). Google tracks everything you do: here’s how to delete it. Retrieved from Wired: Phishing and ransomware can be your worst nightmares, how can you prevent these evolving threats. Retrieved from

Did you find this useful?