ORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptx

JohnSimLabayan2 39 views 65 slides May 10, 2024
Slide 1
Slide 1 of 65
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22
Slide 23
23
Slide 24
24
Slide 25
25
Slide 26
26
Slide 27
27
Slide 28
28
Slide 29
29
Slide 30
30
Slide 31
31
Slide 32
32
Slide 33
33
Slide 34
34
Slide 35
35
Slide 36
36
Slide 37
37
Slide 38
38
Slide 39
39
Slide 40
40
Slide 41
41
Slide 42
42
Slide 43
43
Slide 44
44
Slide 45
45
Slide 46
46
Slide 47
47
Slide 48
48
Slide 49
49
Slide 50
50
Slide 51
51
Slide 52
52
Slide 53
53
Slide 54
54
Slide 55
55
Slide 56
56
Slide 57
57
Slide 58
58
Slide 59
59
Slide 60
60
Slide 61
61
Slide 62
62
Slide 63
63
Slide 64
64
Slide 65
65

About This Presentation

ORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION


Slide Content

PIEDAD CENTRAL ELEM. SCHOOL ORIENTATION WORKSHOP ON CYBERSECURITY & MICROSOFT 365 ADOPTION

Objectives: Activate Microsoft 365 Accounts Back up & transfer files from google drive to Microsoft One Drive Discuss cybersecurity issues & concern Secure social media accounts

3 MICROSOFT 365 ADOPTION (DM No. 068 S. 2023)

LEGAL BASIS OUA-OUT-011023010 Division Memo No. 068 series 2023

LEGAL BASIS

LEGAL BASIS

CHECK YOUR DEPED EMAIL

To activate your account and start taking advantage of the many features of Microsoft 365, simply go to  https://portal.office.com  and log in using the credentials below:

Set up new password and input code to activate Microsoft Account

MICROSOFT 365 DASHBOARD

11 Back up & transfer files from google drive to Microsoft One Drive

HOW TO BACK UP & TRANSFER FILES FROM GOOGLE DRIVE TO MICROSOFT ONE DRIVE

STEP 1 – Set up Microsoft One Drive to your new user account Open on your browser https://portal.office.com Sign in your activated Microsoft Account Install Microsoft One Drive Open Microsoft One Drive online platform at Microsoft 365 Dashboard

CLICK STEP 2 – Open on your browser www.mover.io and click Login to Mover

STEP 3 – Sign in Microsoft Accounts CLICK

STEP 4 – Click accept CLICK

STEP 5 – Click Authorize New Connector in step 1 CLICK

STEP 6 – Click Authorize New Connector in step 2 CLICK 1 2 3

STEP 7 – Create folder to back up files from google drive CLICK

STEP 8 – Select created folder from google drive then click start copy CLICK CLICK

STEP 9 – Wait to finish the process

STEP 10 – Check all your files in Microsoft One Drive Online Platform

STEP 11 – Back up and sync all your files from PC to your Microsoft One Drive Account.

Advantages of Microsoft 365 Adoption Transfer Files from Google Drive to Microsoft One Drive Back up files up to 1TB Synchronization of files from your PC to Mobile Phones Usage of Microsoft 365 Applications Video Conference using Microsoft Teams

25 CYBERSECURITY ON SOCIAL MEDIA ACCOUNTS

Cyber security - refers to every aspect of protecting an organization and its employees and assets against cyber threats. Cyber Attack - Any kind of malicious activity that attempts to collect, disrupt, deny, degrade, or destroy information system resources or the information itself. Hacking - the gaining of unauthorized access to data in a system or computer. DEFINITION OF TERMS

Hacker - is an individual who uses computer, networking or other skills to overcome a technical problem. The term also may refer to anyone who uses their abilities to gain unauthorized access to systems or networks in order to commit crimes. 3 main types of hackers Black hat hackers - are cybercriminals that illegally crack systems with malicious intent. White hat hackers - are ethical security hackers who identify and fix vulnerabilities. Gray hat hackers - may not have the criminal or malicious intent of a black hat hacker, but they also don’t have the prior knowledge or consent of those whose systems they hack into. DEFINITION OF TERMS

Phishing Attack OTP CONTACT # PASSWORD EMAIL ADDRESS IP ADDRESS MAC ADDRESS DEVICE ID LOCATION ID EMAIL ADDRESS SOCMED NAME CONTACT # It is a type of social engineering attack wherein an attacker impersonates to be a trusted contact and sends the victim fake mails.  Email Address Contact # OTP Password

Reconnaissance - Forming the attack strategy. Scan - Searching for vulnerabilities. Exploit - Beginning the attack. Access Maintenance - Gathering as much data as possible. Exfiltration - Stealing sensitive data. Identification Prevention - Disguising presence to maintain access. 1 2 3 4 5 6 6 Stages of a Malicious Cyber Attack

10 Cyber Security Commandments

10 Cyber Security Commandments 1. Anyone can be a target for cyber criminals. - First and foremost, never assume that you won’t be hit by a cyber attack. If you’re lucky, it will never happen, but absolutely anyone can be a target, because many attacks use automated software, which doesn’t necessarily discriminate. Small businesses may also be more likely to fall victim to security breaches, because criminals consider them soft targets.

10 Cyber Security Commandments 2. Passwords should be strong and unique Although other forms of authentication exist, such as fingerprint scanners, passwords remain the most common way of logging into websites and systems. Don’t make life easy for criminals by using weak or easily guessed passwords like ‘Pa$$w0rd’ or ‘12345678’, and don’t reuse your passwords in different places.

10 Cyber Security Commandments 3. Keep all software and hardware up to date If possible, use automatic updates to keep your IT solutions up to date. Otherwise, ensure that you regularly check for updates, particularly those that include security patches. Cyber criminals will be well aware of any weaknesses, and they’ll waste no time trying to exploit them.

10 Cyber Security Commandments 4. Report any and all suspicious activity It’s not necessary to report every single dodgy email you get, as long as they’re automatically getting sent to your spam folder, but if you see what you think might be a phishing attempt and it hasn’t been filtered out, tell your IT people. By getting the word out, you can make sure no one in your business falls victim to a scam.

10 Cyber Security Commandments 5. Secure all devices including smartphones In the modern workplace, it’s not just workstations and servers you need to be concerned with; many workers also carry phones and tablets that are connected to the corporate network via WiFi . These need to made secure or limited to a guest network, because they present a potential entry point for hackers.

10 Cyber Security Commandments 6. Identify your security weaknesses and fix them All businesses should be aware of their weak points. That could include many things, including operating systems that are no longer supported, people who aren’t trained to spot phishing emails, routers that don’t use the latest security protocols and systems not configured to deliver the maximum security benefits. Arrange a security audit to gain clarity and to plan ahead.

10 Cyber Security Commandments 7. Be careful when clicking links or files in emails Booby-trapped files and websites are a favorite way for hackers to install malware or to steal data, and email is the most common way of getting people to open them. If you receive an email from someone you don’t know and it’s urging you to download a file or follow a link, stop and think about it first.

10 Cyber Security Commandments 8. Lock your computer when you’re away from it This is especially important if you’re using a laptop or other mobile device and you’re not in the office, because if criminals gain physical access to your computer, it’s no problem for them to install malware on it. To lock your system, simply press the Windows key and L. You’ll need your password or PIN to log back in.

10 Cyber Security Commandments 9. Review your cyber security measures every year Cyber criminals are always looking for new ways to rip people off, so cyber security cannot be considered as a one-off, static purchase. At least once a year, you should assess your current security solutions, to see if they’re still up to the task, and if they’re not, then you need to upgrade.

10 Cyber Security Commandments 10. Make multiple backups, with at least one kept off site In the majority of cases, one backup will be enough if your main copy of data is damaged by mechanical failure or human error, but if you’re unlucky, your backup could be lost at the same time. The chances of your backups being affected increase when malware enters the equation.

44 SECURE SOCIAL MEDIA ACCOUNTS

SOCIAL MEDIA PLAFORMS

STEP 1 LOG IN FACEBOOK ACOUNTS

STEP 2 Go to Facebook Profile

STEP 3 Go to account settings & privacy

STEP 4 Go to account settings

STEP 5 Go to Personal Information/Contact

STEP 6 Go to contact info

STEP 7 Add/Change primary email and add phone number Change email add if your are using yahoo.com Remove unused email address and phone numbers

STEP 8 Enter new email address and type facebook password then type the confirmation code being sent to the email address you added.

STEP 9 Enter phone number and type facebook password then type the confirmation code being sent to your phone number you added

56 SECURE YOUR FACEBOOK ACCOUNT USING TWO-FACTOR AUTHENTICATION

STEP 1 Go to account settings & privacy

STEP 2 Go to account settings

STEP 3 Go to account settings & privacy

STEP 4 Go to account two-factor authentication

STEP 5 Select “Text message (SMS)

STEP 6 Type phone number and input 6-digit code

This window will appear if you log in your facebook account to a new device

“There are no secrets better kept than the secrets that everybody guesses”. - George Bernard Shaw

Thank you!
Tags