100% found this document useful (1 vote)
68 views16 pages

Essential Cybersecurity Awareness Tips

Uploaded by

jane.ostin3
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
68 views16 pages

Essential Cybersecurity Awareness Tips

Uploaded by

jane.ostin3
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd

Security Awareness Session

Why cybersecurity
demands our focus
Cybersecurity matters more now due to
increased risks like malware, phishing,
and hacking.

Organizations of any scale face the


danger of their sensitive data being
compromised.

A cybersecurity breach can result in


financial losses, damage to reputation,
and legal liabilities which can have
serious consequences for a company.
How to enhance your
company’s security?
• Implement effective cybersecurity
measures.

• Implement strong access controls.

• Have an incident response plan in


place.

• Keep Software up to date.

• Train employees on good security


practices.
Recommended security practices for
accounts and emails
• Don’t share your sensitive data through
email or teams.
• Don’t share company information externally.
• Use strong passwords.
• Don’t use the same password for all
accounts.
• Don’t use personal emails at work.
• Keep your software up to date.
• Enable two-factor authentication.
• Don’t click on suspicious links or download
attachments.
• Beware of phishing emails.
• Be cautious with public Wi-Fi. (Man in the
middle attacks)
Recommended security practices for workstations

Keep your laptop in a Use a virtual private


Leave it? Lock it!
safe place. network. (VPN)

Avoid streaming or
downloading movies,
Don’t use USBs or
apps etc. that do not
Browse the web safely. other external devices
come from trusted
unless you own them.
sources, they may
contain malware.

Done? Shut down!


Recommended security practices
for sharing information
• Avoid sending attachments. Use SharePoint or
Google drive instead- timed. (If you need help
refer to your IT or open a ticket).

• Use the « Bcc » (blind carbon copy) for a large


number of recipients. This protects the email
addresses of the recipients by hiding them.

• Delete emails and attachments when you no


longer need them. Emails containing sensitive
information should be deleted securely.

• Don’t click or download any attachments that


originate from outside your organization.
Be extremely careful with file-sharing software
such as BitTorrent, LimeWare etc.

Recommended Improperly configured filesharing software can


security give others access to your entire computer, not
just to the files you intended to share.
practices for file
sharing File sharing opens your computer to the risk of
malicious files and attacks.
Phishing
Attack
Awareness
What is
phishing?
• Phishing is when attackers attempt to trick
users into clicking a bad link that will
download malware or direct them to a
sketchy website.

• The term "phishing" is primarily used to


refer to attacks that are delivered through
email, which is the most common method
used by cybercriminals to deceive users and
steal sensitive information.

• Phishing can target millions of users,


camouflaged among legitimate emails, and
cause harm by installing malware, disrupting
systems, or stealing valuable assets.
How to identify
phishing emails
• Suspicious sender email address

• Poor grammar and spelling errors

• Urgency or fear-inducing language


(Reset your password – Share documents – Personal
information – send money)

• Unexpected requests for personal information

• Suspicious links or attachments

• Claims of winning or financial prizes


What to do if you received a
phishing email?

SLOW DOWN DO NOT CLICK DO NOT DO NOT REPLY.


ON ANY LINKS. DOWNLOAD ANY
ATTACHMENTS.

REPORT IT. DELETE IT.


Q&A
Thank You

You might also like