ORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptx
JohnSimLabayan2
39 views
65 slides
May 10, 2024
Slide 1 of 65
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
About This Presentation
ORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION
Size: 15.9 MB
Language: en
Added: May 10, 2024
Slides: 65 pages
Slide Content
PIEDAD CENTRAL ELEM. SCHOOL ORIENTATION WORKSHOP ON CYBERSECURITY & MICROSOFT 365 ADOPTION
Objectives: Activate Microsoft 365 Accounts Back up & transfer files from google drive to Microsoft One Drive Discuss cybersecurity issues & concern Secure social media accounts
3 MICROSOFT 365 ADOPTION (DM No. 068 S. 2023)
LEGAL BASIS OUA-OUT-011023010 Division Memo No. 068 series 2023
LEGAL BASIS
LEGAL BASIS
CHECK YOUR DEPED EMAIL
To activate your account and start taking advantage of the many features of Microsoft 365, simply go to https://portal.office.com and log in using the credentials below:
Set up new password and input code to activate Microsoft Account
MICROSOFT 365 DASHBOARD
11 Back up & transfer files from google drive to Microsoft One Drive
HOW TO BACK UP & TRANSFER FILES FROM GOOGLE DRIVE TO MICROSOFT ONE DRIVE
STEP 1 – Set up Microsoft One Drive to your new user account Open on your browser https://portal.office.com Sign in your activated Microsoft Account Install Microsoft One Drive Open Microsoft One Drive online platform at Microsoft 365 Dashboard
CLICK STEP 2 – Open on your browser www.mover.io and click Login to Mover
STEP 3 – Sign in Microsoft Accounts CLICK
STEP 4 – Click accept CLICK
STEP 5 – Click Authorize New Connector in step 1 CLICK
STEP 6 – Click Authorize New Connector in step 2 CLICK 1 2 3
STEP 7 – Create folder to back up files from google drive CLICK
STEP 8 – Select created folder from google drive then click start copy CLICK CLICK
STEP 9 – Wait to finish the process
STEP 10 – Check all your files in Microsoft One Drive Online Platform
STEP 11 – Back up and sync all your files from PC to your Microsoft One Drive Account.
Advantages of Microsoft 365 Adoption Transfer Files from Google Drive to Microsoft One Drive Back up files up to 1TB Synchronization of files from your PC to Mobile Phones Usage of Microsoft 365 Applications Video Conference using Microsoft Teams
25 CYBERSECURITY ON SOCIAL MEDIA ACCOUNTS
Cyber security - refers to every aspect of protecting an organization and its employees and assets against cyber threats. Cyber Attack - Any kind of malicious activity that attempts to collect, disrupt, deny, degrade, or destroy information system resources or the information itself. Hacking - the gaining of unauthorized access to data in a system or computer. DEFINITION OF TERMS
Hacker - is an individual who uses computer, networking or other skills to overcome a technical problem. The term also may refer to anyone who uses their abilities to gain unauthorized access to systems or networks in order to commit crimes. 3 main types of hackers Black hat hackers - are cybercriminals that illegally crack systems with malicious intent. White hat hackers - are ethical security hackers who identify and fix vulnerabilities. Gray hat hackers - may not have the criminal or malicious intent of a black hat hacker, but they also don’t have the prior knowledge or consent of those whose systems they hack into. DEFINITION OF TERMS
Phishing Attack OTP CONTACT # PASSWORD EMAIL ADDRESS IP ADDRESS MAC ADDRESS DEVICE ID LOCATION ID EMAIL ADDRESS SOCMED NAME CONTACT # It is a type of social engineering attack wherein an attacker impersonates to be a trusted contact and sends the victim fake mails. Email Address Contact # OTP Password
Reconnaissance - Forming the attack strategy. Scan - Searching for vulnerabilities. Exploit - Beginning the attack. Access Maintenance - Gathering as much data as possible. Exfiltration - Stealing sensitive data. Identification Prevention - Disguising presence to maintain access. 1 2 3 4 5 6 6 Stages of a Malicious Cyber Attack
10 Cyber Security Commandments
10 Cyber Security Commandments 1. Anyone can be a target for cyber criminals. - First and foremost, never assume that you won’t be hit by a cyber attack. If you’re lucky, it will never happen, but absolutely anyone can be a target, because many attacks use automated software, which doesn’t necessarily discriminate. Small businesses may also be more likely to fall victim to security breaches, because criminals consider them soft targets.
10 Cyber Security Commandments 2. Passwords should be strong and unique Although other forms of authentication exist, such as fingerprint scanners, passwords remain the most common way of logging into websites and systems. Don’t make life easy for criminals by using weak or easily guessed passwords like ‘Pa$$w0rd’ or ‘12345678’, and don’t reuse your passwords in different places.
10 Cyber Security Commandments 3. Keep all software and hardware up to date If possible, use automatic updates to keep your IT solutions up to date. Otherwise, ensure that you regularly check for updates, particularly those that include security patches. Cyber criminals will be well aware of any weaknesses, and they’ll waste no time trying to exploit them.
10 Cyber Security Commandments 4. Report any and all suspicious activity It’s not necessary to report every single dodgy email you get, as long as they’re automatically getting sent to your spam folder, but if you see what you think might be a phishing attempt and it hasn’t been filtered out, tell your IT people. By getting the word out, you can make sure no one in your business falls victim to a scam.
10 Cyber Security Commandments 5. Secure all devices including smartphones In the modern workplace, it’s not just workstations and servers you need to be concerned with; many workers also carry phones and tablets that are connected to the corporate network via WiFi . These need to made secure or limited to a guest network, because they present a potential entry point for hackers.
10 Cyber Security Commandments 6. Identify your security weaknesses and fix them All businesses should be aware of their weak points. That could include many things, including operating systems that are no longer supported, people who aren’t trained to spot phishing emails, routers that don’t use the latest security protocols and systems not configured to deliver the maximum security benefits. Arrange a security audit to gain clarity and to plan ahead.
10 Cyber Security Commandments 7. Be careful when clicking links or files in emails Booby-trapped files and websites are a favorite way for hackers to install malware or to steal data, and email is the most common way of getting people to open them. If you receive an email from someone you don’t know and it’s urging you to download a file or follow a link, stop and think about it first.
10 Cyber Security Commandments 8. Lock your computer when you’re away from it This is especially important if you’re using a laptop or other mobile device and you’re not in the office, because if criminals gain physical access to your computer, it’s no problem for them to install malware on it. To lock your system, simply press the Windows key and L. You’ll need your password or PIN to log back in.
10 Cyber Security Commandments 9. Review your cyber security measures every year Cyber criminals are always looking for new ways to rip people off, so cyber security cannot be considered as a one-off, static purchase. At least once a year, you should assess your current security solutions, to see if they’re still up to the task, and if they’re not, then you need to upgrade.
10 Cyber Security Commandments 10. Make multiple backups, with at least one kept off site In the majority of cases, one backup will be enough if your main copy of data is damaged by mechanical failure or human error, but if you’re unlucky, your backup could be lost at the same time. The chances of your backups being affected increase when malware enters the equation.
44 SECURE SOCIAL MEDIA ACCOUNTS
SOCIAL MEDIA PLAFORMS
STEP 1 LOG IN FACEBOOK ACOUNTS
STEP 2 Go to Facebook Profile
STEP 3 Go to account settings & privacy
STEP 4 Go to account settings
STEP 5 Go to Personal Information/Contact
STEP 6 Go to contact info
STEP 7 Add/Change primary email and add phone number Change email add if your are using yahoo.com Remove unused email address and phone numbers
STEP 8 Enter new email address and type facebook password then type the confirmation code being sent to the email address you added.
STEP 9 Enter phone number and type facebook password then type the confirmation code being sent to your phone number you added
56 SECURE YOUR FACEBOOK ACCOUNT USING TWO-FACTOR AUTHENTICATION
STEP 1 Go to account settings & privacy
STEP 2 Go to account settings
STEP 3 Go to account settings & privacy
STEP 4 Go to account two-factor authentication
STEP 5 Select “Text message (SMS)
STEP 6 Type phone number and input 6-digit code
This window will appear if you log in your facebook account to a new device
“There are no secrets better kept than the secrets that everybody guesses”. - George Bernard Shaw