SlideShare uma empresa Scribd logo
1 de 12
Baixar para ler offline
Security Awareness Training
Dmitriy Scherbina
Talkable
Cybersecurity Risks
1. Identity theft
2. Monetary theft
3. Sensitive data theft
4. Legal ramifications, sanctions or termination
Vectors of Attack
1. Web browsers
2. Internet messengers
3. Websites and web applications
4. Operating systems
Valuable Data
1. Credit card data
2. Passwords
3. Financial data
4. Personally identifiable information: name, address, etc
5. Blockchain wallets
Physical Protection
1. Enable tracking services (e.g. Find My Mac for Apple devices)
2. Always close laptop lid or lock your screen when leaving your
computer
3. Do not store important data on removable media or encrypt it
Passwords
1. Choose strong password
2. Do not store passwords on paper sheets or sticky notes
3. Use password manager: 1password, etc
Safe Web Browsing
1. Use the most secure browsers (Chrome, Firefox) and update
them regularly
2. When sending personal information or credit card data pay
attention to the green lock icon in the address bar (https)
3. Use an AD blocker
4. Use 2 factor authentication when possible
Social Engineering Protection
1. Unless you trust the sender do not open email attachments
and do not click on links in emails
2. Do not provide your personal information or passwords over
the phone unless you trust the caller
Software and OS Protection
1. Enable hard drive encryption
2. Use a firewall
3. Update your operating system regularly
4. Use licensed software downloaded from trusted websites
Backups
1. Backup to cloud (iCloud, Google Drive, Dropbox, etc)
2. Backup to removable media
Protection for Windows Users
1. Use an anti virus: ESET NOD32, Avast, etc
2. Update Windows regularly
3. Update MS Office, Explorer / Edge regularly
Thank you!

Mais conteúdo relacionado

Mais procurados

Cybersecurity Awareness Training Presentation v2021.08
Cybersecurity Awareness Training Presentation v2021.08Cybersecurity Awareness Training Presentation v2021.08
Cybersecurity Awareness Training Presentation v2021.08
DallasHaselhorst
 
Cybersecurity Awareness Training Presentation v1.3
Cybersecurity Awareness Training Presentation v1.3Cybersecurity Awareness Training Presentation v1.3
Cybersecurity Awareness Training Presentation v1.3
DallasHaselhorst
 
Information Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn HospitalInformation Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn Hospital
Atlantic Training, LLC.
 

Mais procurados (20)

Basic Security Training for End Users
Basic Security Training for End UsersBasic Security Training for End Users
Basic Security Training for End Users
 
14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness
 
Cybersecurity Awareness Training
Cybersecurity Awareness TrainingCybersecurity Awareness Training
Cybersecurity Awareness Training
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Program
 
Cybersecurity Awareness Training Presentation v2021.08
Cybersecurity Awareness Training Presentation v2021.08Cybersecurity Awareness Training Presentation v2021.08
Cybersecurity Awareness Training Presentation v2021.08
 
Cyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxCyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptx
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness Training
 
Cybersecurity Employee Training
Cybersecurity Employee TrainingCybersecurity Employee Training
Cybersecurity Employee Training
 
Cybersecurity Awareness
Cybersecurity AwarenessCybersecurity Awareness
Cybersecurity Awareness
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
IT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.ppt
 
Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)
 
Awareness Training on Information Security
Awareness Training on Information SecurityAwareness Training on Information Security
Awareness Training on Information Security
 
Cyber security training
Cyber security trainingCyber security training
Cyber security training
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
 
Cybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by AdamCybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by Adam
 
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
 
Cybersecurity Awareness Training Presentation v1.3
Cybersecurity Awareness Training Presentation v1.3Cybersecurity Awareness Training Presentation v1.3
Cybersecurity Awareness Training Presentation v1.3
 
Information Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn HospitalInformation Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn Hospital
 
Employee Security Awareness Training
Employee Security Awareness TrainingEmployee Security Awareness Training
Employee Security Awareness Training
 

Semelhante a Security Awareness Training

6 Cyber Security Introduction - sec101-idtheft .pptx
6 Cyber Security Introduction - sec101-idtheft .pptx6 Cyber Security Introduction - sec101-idtheft .pptx
6 Cyber Security Introduction - sec101-idtheft .pptx
DevenderDahiya9
 

Semelhante a Security Awareness Training (20)

Internet safety at work presentation
Internet safety at work presentationInternet safety at work presentation
Internet safety at work presentation
 
Notes to The Ten Commandments of Online Security and Privacy
Notes to The Ten Commandments of Online Security and PrivacyNotes to The Ten Commandments of Online Security and Privacy
Notes to The Ten Commandments of Online Security and Privacy
 
CYBER SECURITY AWARENESS.pptx
CYBER SECURITY AWARENESS.pptxCYBER SECURITY AWARENESS.pptx
CYBER SECURITY AWARENESS.pptx
 
Information security a new era technology_
Information security a new era technology_Information security a new era technology_
Information security a new era technology_
 
100812 internet security2.0
100812 internet security2.0100812 internet security2.0
100812 internet security2.0
 
6 Cyber Security Introduction - sec101-idtheft .pptx
6 Cyber Security Introduction - sec101-idtheft .pptx6 Cyber Security Introduction - sec101-idtheft .pptx
6 Cyber Security Introduction - sec101-idtheft .pptx
 
Anti phishing presentation
Anti phishing presentationAnti phishing presentation
Anti phishing presentation
 
Securitytips
SecuritytipsSecuritytips
Securitytips
 
techalpha07
techalpha07techalpha07
techalpha07
 
It security,malware,phishing,information theft
It security,malware,phishing,information theftIt security,malware,phishing,information theft
It security,malware,phishing,information theft
 
PCC Training - Security
PCC Training - SecurityPCC Training - Security
PCC Training - Security
 
Users guide
Users guideUsers guide
Users guide
 
Basic Digital Security
Basic Digital SecurityBasic Digital Security
Basic Digital Security
 
Protect
ProtectProtect
Protect
 
Cybersecurity awareness session.pptx
Cybersecurity awareness session.pptxCybersecurity awareness session.pptx
Cybersecurity awareness session.pptx
 
Rothke Sia 2006
Rothke   Sia 2006Rothke   Sia 2006
Rothke Sia 2006
 
Security Awareness Training.pptx
Security Awareness Training.pptxSecurity Awareness Training.pptx
Security Awareness Training.pptx
 
Internet security
Internet securityInternet security
Internet security
 
Cyber Privacy & Password Protection
Cyber Privacy & Password ProtectionCyber Privacy & Password Protection
Cyber Privacy & Password Protection
 
Online spying tools
Online spying toolsOnline spying tools
Online spying tools
 

Mais de Dmitriy Scherbina

Mais de Dmitriy Scherbina (7)

Hiring A-grade Project Managers – A-Players Recruiting School 2019
Hiring A-grade Project Managers – A-Players Recruiting School 2019Hiring A-grade Project Managers – A-Players Recruiting School 2019
Hiring A-grade Project Managers – A-Players Recruiting School 2019
 
Project Management Fundamentals – A-Players Recruiting School 2019
Project Management Fundamentals – A-Players Recruiting School 2019Project Management Fundamentals – A-Players Recruiting School 2019
Project Management Fundamentals – A-Players Recruiting School 2019
 
Negotiation Crash Course – A-Players Recruiting School 2019
Negotiation Crash Course – A-Players Recruiting School 2019Negotiation Crash Course – A-Players Recruiting School 2019
Negotiation Crash Course – A-Players Recruiting School 2019
 
Emotional Intelligence – A-Players Recruiting School 2019
Emotional Intelligence – A-Players Recruiting School 2019Emotional Intelligence – A-Players Recruiting School 2019
Emotional Intelligence – A-Players Recruiting School 2019
 
Success Factors – Soft Skills v2
Success Factors – Soft Skills v2Success Factors – Soft Skills v2
Success Factors – Soft Skills v2
 
Soft Skills and Future Trends
Soft Skills and Future TrendsSoft Skills and Future Trends
Soft Skills and Future Trends
 
Success Factors – Soft Skills
Success Factors – Soft SkillsSuccess Factors – Soft Skills
Success Factors – Soft Skills
 

Último

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Último (20)

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 

Security Awareness Training

  • 2. Cybersecurity Risks 1. Identity theft 2. Monetary theft 3. Sensitive data theft 4. Legal ramifications, sanctions or termination
  • 3. Vectors of Attack 1. Web browsers 2. Internet messengers 3. Websites and web applications 4. Operating systems
  • 4. Valuable Data 1. Credit card data 2. Passwords 3. Financial data 4. Personally identifiable information: name, address, etc 5. Blockchain wallets
  • 5. Physical Protection 1. Enable tracking services (e.g. Find My Mac for Apple devices) 2. Always close laptop lid or lock your screen when leaving your computer 3. Do not store important data on removable media or encrypt it
  • 6. Passwords 1. Choose strong password 2. Do not store passwords on paper sheets or sticky notes 3. Use password manager: 1password, etc
  • 7. Safe Web Browsing 1. Use the most secure browsers (Chrome, Firefox) and update them regularly 2. When sending personal information or credit card data pay attention to the green lock icon in the address bar (https) 3. Use an AD blocker 4. Use 2 factor authentication when possible
  • 8. Social Engineering Protection 1. Unless you trust the sender do not open email attachments and do not click on links in emails 2. Do not provide your personal information or passwords over the phone unless you trust the caller
  • 9. Software and OS Protection 1. Enable hard drive encryption 2. Use a firewall 3. Update your operating system regularly 4. Use licensed software downloaded from trusted websites
  • 10. Backups 1. Backup to cloud (iCloud, Google Drive, Dropbox, etc) 2. Backup to removable media
  • 11. Protection for Windows Users 1. Use an anti virus: ESET NOD32, Avast, etc 2. Update Windows regularly 3. Update MS Office, Explorer / Edge regularly