Cyber Security Awareness for safety.pptx

ndlicertificates 92 views 15 slides Jul 01, 2024
Slide 1
Slide 1 of 15
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15

About This Presentation

Cyber security is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks. It's also known as information technology security or electronic information security.


Slide Content

CYBER SECURITY AWRENESS EVENT Expert – Mr. Asfahan Ahmed Khusro . Tally Solutions Pvt.Ltd Organised by- Shaikh Sayema

What Is Cybersecurity Awareness Month? Cybersecurity Awareness Month raises awareness about the importance of cybersecurity across our Nation. CYBERSECURITY AWARENESS MONTH 2021 CYBERSECURITY AWARENESS MONTH 2021

CYBERCRIME Examples Identity theft Child sexual abuse materials Financial theft Intellectual property violations Malware Malicious social engineering Why should you care? Crime is a danger offline and on! Cyber self-defense basics can go a long way to keeping you and your data out of the hands of Bad actors.

What is Cyber Security Awareness Training? Cybercriminals take advantage of users’ trust, fear, greed, and plain old human errors. Security awareness training teaches users to spot phishing, avoid risks online, and use good cyber-hygiene practices at work and at home.

WHY DOES IT MATTER? » The world is getting more digital Business, banking, healthcare, etc. is all online » Crime is following the same trend Worldwide ransomware attacks High-profile hacks in the news Phishing emails are more sophisticated each day » New privacy laws and regulations are being enacted Many sectors require training for compliance

 Use Two-Factor or Multi-Factor Authentication . Two-factor or multi-factor authentication is a service that adds additional layers of security to the standard password method of online identification. Without two-factor authentication, you would normally enter a username and password. But, with two-factor, you would be prompted to enter one additional authentication method such as a Personal Identification Code, another password or even fingerprint. With multi-factor authentication, you would be prompted to enter more than two additional authentication methods after entering your username and password.

Top New Threats in Mobile Security

Protect your passwords . Never reveal your passwords to anyone. Make them long, strong, unique and use multi-factor authentication (MFA) wherever possible. Use a password manager such as LastPass or RoboForm. Use different passwords for different accounts. Use different passwords for work and home. Don't let apps and websites remember your passwords. Keep your devices, browsers, and apps up to date . At home, automate software updates and periodically restart your devices to ensure that updates are fully installed. UC Davis Health IT manages workstation updates and restarts.

Verify requests for private information . Whenever you are requested to provide private information (yours or anyone else's), verify the identity of the requester — even if it appears to be somebody you know . Con artists are clever in how they collect information to steal information and identities. Even if you think you're safe, regularly check your financial statements and credit reports. Back up critical files . habit-6-backup-critical-filesStore backups in a physically separate location from the originals and periodically test them. For critical work files, use storage options that are approved by UC Davis Health IT. For personal files, save a backup on a separate drive (e.g., cloud or encrypted USB) to securely store it.

Use Your Mobile Devices Securely According to McAfee Labs, your mobile device is now a target to more than 1.5 million new incidents of mobile malware. Here are some quick tips for mobile device security : Create a Difficult Mobile Passcode – Not Your Birthdate or Bank PIN. Install Apps from Trusted Sources Keep Your Device Updated – Hackers Use Vulnerabilities in Unpatched Older Operating Systems Avoid sending PII or sensitive information over text message or email Leverage  Find my iPhone  or the  Android Device Manager  to prevent loss or theft Perform regular mobile backups using iCloud or Enabling Backup & Sync from Android

e-Learning course