Asia
Select regional store:

Image Gallery

Take some time to browse our collection of images, designed for sharing on your social networks and to get you and your colleagues thinking about information security.

Please feel free to take these images and share them with your contacts, subject to the Creative Commons License.

Data is the currency of the internet. Keep yours safe.
Share online Share on Twitter Share on Facebook Share on LinkedIn
Data is the currency of the internet. Keep yours safe.
Share online Share on Twitter Share on Facebook Share on LinkedIn
Data is the currency of the internet. Keep yours safe.
Share online Share on Twitter Share on Facebook Share on LinkedIn
Data is the currency of the internet. Keep yours safe.
Share online Share on Twitter Share on Facebook Share on LinkedIn
Data is the currency of the internet. Keep yours safe.
Share online Share on Twitter Share on Facebook Share on LinkedIn
Data is the currency of the internet. Keep yours safe.
Share online Share on Twitter Share on Facebook Share on LinkedIn
Data is the currency of the internet. Keep yours safe.
Share online Share on Twitter Share on Facebook Share on LinkedIn
Data is the currency of the internet. Keep yours safe.
Share online Share on Twitter Share on Facebook Share on LinkedIn
Data is the currency of the internet. Keep yours safe.
Share online Share on Twitter Share on Facebook Share on LinkedIn
Data is the currency of the internet. Keep yours safe.
Share online Share on Twitter Share on Facebook Share on LinkedIn
Data is the currency of the internet. Keep yours safe.
Share online Share on Twitter Share on Facebook Share on LinkedIn
Data is the currency of the internet. Keep yours safe.
Share online Share on Twitter Share on Facebook Share on LinkedIn
Data is the currency of the internet. Keep yours safe.
Share online Share on Twitter Share on Facebook Share on LinkedIn
Data is the currency of the internet. Keep yours safe.
Share online Share on Twitter Share on Facebook Share on LinkedIn
Data is the currency of the internet. Keep yours safe.
Share online Share on Twitter Share on Facebook Share on LinkedIn
Leaving an unlocked laptop on a train is like leaving an open purse
Share online Share on Twitter Share on Facebook Share on LinkedIn
Clear desk policies support a green office and information security
Share online Share on Twitter Share on Facebook Share on LinkedIn
Don't say anything online that you wouldn't want to see on the side of a bus
Share online Share on TwitterShare on Facebook Share on LinkedIn
The greatest risk is not cybersecurity but complacency
Share online Share on Twitter Share on Facebook Share on LinkedIn
Data is the currency of the internet. Keep yours safe.
Share online Share on Twitter Share on Facebook Share on LinkedIn
You cannot be disaster free, but you can be disaster prepared in all walks of life
Share online Share on Twitter Share on Facebook Share on LinkedIn
Information security is as simple as A B C. Always Be Careful
Share online Share on Twitter Share on Facebook Share on inkedIn
Lock away and securely dispose of confidential data
Share online Share on Twitter Share on Facebook Share on LinkedIn
Information security needs YOU!
Share online Share on Twitter Share on Facebook Share on LinkedIn
Passwords are like pants. Don't let others see them, change them regularly and don't loan them out to strangers.
Share online Share on Twitter Share on Facebook Share on LinkedIn
Securing your IT won't stop the bad guys, but they may move to a softer target
Share online Share on Twitter Share on Facebook Share on LinkedIn
Never underestimate the significance of risk and never underestimate the risk of avoiding all risk
Share online Share on Twitter Share on Facebook Share on LinkedIn
Management will get excited about a disaster plan if they smell smoke
Share online Share on Twitter Share on Facebook Share on LinkedIn
Take risks, your success depends on them
Share online Share on Twitter Share on Facebook Share on LinkedIn
Security is like an umbrella - keep it close at hand even if you don't expect rain
Share online Share on Twitter Share on Facebook Share on LinkedIn
Data privacy is the law and everyone is responsible
Share online Share on Twitter Share on Facebook Share on LinkedIn
A risk managed is a risk halved
Share online Share on Twitter Share on Facebook Share on LinkedIn
Password Hangman
Share online Share on Twitter Share on Facebook Share on LinkedIn
Tailgating - How close is too close?
Share online Share on Twitter Share on Facebook Share on LinkedIn
Cyber security costs monet - but then, so does cyber insecurity
Share online Share on Twitter Share on Facebook Share on LinkedIn
Responsibility to manage your company's cyber risks starts and stops at Board level
Share online Share on Twitter Share on Facebook Share on LinkedIn
Cyber espionage presents a real risk to the economic well-being of the UK. It poses a direct threat to UK national security
Share online Share on Twitter Share on Facebook Share on LinkedIn
Employees are your No.1 cyber security threat
Share online Share on Twitter Share on Facebook Share on LinkedIn
Process and people are the findamental building blocks of effective cyber security
Share online Share on Twitter Share on Facebook Share on LinkedIn
The demand for cyber security professionals in the past 5 years has grown more than 3.5 times faster than the demand for other IT jobs
Share online Share on Twitter Share on Facebook Share on LinkedIn
Protecting cyberspace requires strong vision and leadership
Share online Share on Twitter Share on Facebook Share on LinkedIn
An investment in knowledge pays the best interest
Share online Share on Twitter Share on Facebook Share on LinkedIn
ISO 27001 compliance not only secures your assets and wins you new business, it also helps you sleep more soundly at night
Share online Share on Twitter Share on Facebook Share on LinkedIn
Protect your information today to secure your tomorrow
Share online Share on Twitter Share on Facebook Share on LinkedIn
Keep calm and fight cybercrime
Share online Share on Twitter Share on Facebook Share on LinkedIn
Discover your breaches before hackers do
Share online Share on Twitter Share on Facebook Share on LinkedIn
A secure system is one that does what it is supposed to do and nothing more
Share online Share on Twitter Share on Facebook Share on LinkedIn
A secure system is one that does what it is supposed to do and nothing more
Share online Share on Twitter Share on Facebook Share on LinkedIn
70% would reveal their password for a bar of chocolate
Share online Share on Twitter Share on Facebook Share on LinkedIn
Periodically perform IT Health Checks
Share online Share on Twitter Share on Facebook Share on LinkedIn
Why should you conduct a pen test?
Share online Share on Twitter Share on Facebook Share on LinkedIn
Benefits of ISO38500 compliance
Share online Share on Twitter Share on Facebook Share on LinkedIn
IT Governance Wordcloud
Share online Share on Twitter Share on Facebook Share on LinkedIn
IT Governance Crossword
Share online Share on Twitter Share on Facebook Share on LinkedIn
Find out the major changes in ISO27001:2013
Share online Share on Twitter Share on Facebook Share on LinkedIn
Find out the major changes in ISO27001:2013
Share online Share on Twitter Share on Facebook Share on LinkedIn
Better to be safe than sorry when it comes to cyber security
Share online Share on Twitter Share on Facebook Share on LinkedIn
Suffering a cyber attack is only a matter of time
Share online Share on Twitter Share on Facebook Share on LinkedIn
80% of cyber attacks can be prevented with basic cyber hygeine
Share online Share on Twitter Share on Facebook Share on LinkedIn
Purchasing payment card data online is easier than you think
Share online Share on Twitter Share on Facebook Share on LinkedIn
The average number of days attackers were present on a victim's network
Share online Share on Twitter Share on Facebook Share on LinkedIn
Human error
Share online Share on Twitter Share on Facebook Share on LinkedIn
Information is a weapon
Share online Share on Twitter Share on Facebook Share on LinkedIn
Information security is a workplace connundrum
Share online Share on Twitter Share on Facebook Share on LinkedIn
68% of companies have been asked for IT security credentials by customers
Share online Share on Twitter Share on Facebook Share on LinkedIn
Cyber security should be your organisation's priority
Share online Share on Twitter Share on Facebook Share on LinkedIn
Patch your network
Share online Share on Twitter Share on Facebook Share on LinkedIn
Well-trained staff is the key to cyber security
Share online Share on Twitter Share on Facebook Share on LinkedIn
Don't lose your USB stick
Share online Share on Twitter Share on Facebook Share on LinkedIn
In God we trust. All others we virus scan.
Share online Share on Twitter Share on Facebook Share on LinkedIn
Worrying about your cyber security is to be congratulated
Share online Share on Twitter Share on Facebook Share on LinkedIn
 
Creative Commons Licence The Information Security Gallery by IT Governance Ltd is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 3.0 Unported License. Based on a work at /infosec/keep-safe-online.aspx.
This website uses cookies. View our cookie policy