2. Cybersecurity Risks
1. Identity theft
2. Monetary theft
3. Sensitive data theft
4. Legal ramifications, sanctions or termination
3. Vectors of Attack
1. Web browsers
2. Internet messengers
3. Websites and web applications
4. Operating systems
4. Valuable Data
1. Credit card data
2. Passwords
3. Financial data
4. Personally identifiable information: name, address, etc
5. Blockchain wallets
5. Physical Protection
1. Enable tracking services (e.g. Find My Mac for Apple devices)
2. Always close laptop lid or lock your screen when leaving your
computer
3. Do not store important data on removable media or encrypt it
6. Passwords
1. Choose strong password
2. Do not store passwords on paper sheets or sticky notes
3. Use password manager: 1password, etc
7. Safe Web Browsing
1. Use the most secure browsers (Chrome, Firefox) and update
them regularly
2. When sending personal information or credit card data pay
attention to the green lock icon in the address bar (https)
3. Use an AD blocker
4. Use 2 factor authentication when possible
8. Social Engineering Protection
1. Unless you trust the sender do not open email attachments
and do not click on links in emails
2. Do not provide your personal information or passwords over
the phone unless you trust the caller
9. Software and OS Protection
1. Enable hard drive encryption
2. Use a firewall
3. Update your operating system regularly
4. Use licensed software downloaded from trusted websites
10. Backups
1. Backup to cloud (iCloud, Google Drive, Dropbox, etc)
2. Backup to removable media
11. Protection for Windows Users
1. Use an anti virus: ESET NOD32, Avast, etc
2. Update Windows regularly
3. Update MS Office, Explorer / Edge regularly