SlideShare uma empresa Scribd logo
1 de 22
Online course offering
Employee Awareness in
Cyber Security
“Suggesting that IT security issues can be
dealt with simply by drafting and
implementing a security policy is like saying
that speeding drivers won’t be a problem if we
introduce speed limits”
© KloudLearn www.kloudlearn.com
Learning
Objectives
Goal Of Employee Awareness in Cyber Security
Auditing Conclusions in the City of Winnipeg
Key Risks and Impacts
Educating Cyber Security Awareness among
Employees
Need For Employee Awareness Training and Best
Practices
Dos and Don’ts Checklist
© KloudLearn www.kloudlearn.com 2
Employees are aware of risks but unsure of how it
affects at workplace
Key takeaways on Cyber Security Employee
Awareness
Quiz
What is the goal of Corporate security
policies?
The goal of corporate security policies is to define
the procedures, guidelines and practices for
configuring and managing security in the
environment
Goal of Employee Awareness in Cyber Security
© KloudLearn www.kloudlearn.com 3
How do we improve Awareness among
Employees?
In order to improve awareness an understanding on
all key systems across the organization, there needs
to be an investment in additional time and resources
in an awareness and training strategy to reinforce the
directives and to improve security efforts across all
departments and special operating agencies
employees
● Responsibility for security has been assigned to the individual and most City staff are aware of the IT
Security directives. The directives are accessible online but some need to be updated to reflect the
current organizational structure.
● Results of the e-Survey revealed that nearly 30% of all respondents have only a poor or fair level of
understanding of the directives.
● Recommendations were made to create new directives. Evolving technology issues such as the use of
portable media devices and the performance of vulnerability assessments require administrative
directives to provide guidance to City staff.
Auditing Conclusions in the City of Winnipeg
© KloudLearn www.kloudlearn.com 4
KEY RISKS AND IMPACTS
© KloudLearn www.kloudlearn.com 5
Increased or
unknown
operational costs
due to unavailability
of key business
applications
Unauthorized
access to, or
disclosure of, client
records
Key Risks and
Impacts
Loss of physical
assets
Loss of Cash Flow
Educating Employees about Awareness
Issue Specific Rules for
mobile networks and emails
2017
2017
2018
2016
2014
Clearly communicate
the potential impact of
a cyber incident on
your business
Make cyber
security
everyone's
responsibility.
Train your
employees to
recognize and
respond to a cyber
attack
Hold Regular
CyberSecurity
Sessions.
01
03
05
02
04
2015
Need for Employee Awareness Training and Best Practices
© KloudLearn www.kloudlearn.com 7
01 02
03 04
05 06
07 08
09 10
Identifying organization's security
requirements
Creating appropriate content for
training medium
Schedule multiple training sessions
for Employees.
Capturing feedback on training.
Re-evaluate the training and
training medium for effectiveness.
Determine how best to deliver
the training
Set expectations for all employees
as to the requirements.
Deliver the training according to
the expectations.
Conduct post-training assessments.
Correlate the implementation of
training with the frequency of
security-related incidents.
The Do’s
● Create passwords that are unique and difficult
● Do change your password regularly
● Do keep your office clean and free of any sensitive
data
● Do stay alert and report any suspicious activity to
management
● Do send IT Support as an attachment for
verification.
Do’s and Don'ts Checklist
© KloudLearn www.kloudlearn.com 8
The Don'ts
● DON’T send any data via email that is sensitive
● DON’T write down your password anywhere around
your workplace.
● DON’T plug in personal devices into your computer
Employees Aware Of Privacy Risks, But Unsure Of How They Affect The Workplace
© KloudLearn www.kloudlearn.com 9
Employee cybersecurity and
privacy engagement
Confidence and security
awareness remain lacking
Misinformation and
misconceptions abound
Privacy regulations remain
challenging
Social media and file-sharing
security awareness is high
Employees possess password
savvy
Urgency of updates is
understood
● Train your entire staff, and your board of directors, to
understand and make cybersecurity a top priority
● Include training for employees on their first day or
during orientation
● Focus training on regulatory requirements
● Additionally, train employees to deal with a data breach
● Engage with the workforce and use multiple approaches
in training
● Put security rules and policies in writing.
● Change rules and policies when the law changes or when
there are new risks in the business environment.
● While informal training should occur regularly, formal
training should occur at least annually.
Key Takeaways on Cyber Security Employee Awareness
© KloudLearn www.kloudlearn.com 10
Test your knowledge!
Quiz
© KloudLearn www.kloudlearn.com
Which of the following is
the most secure backup
strategy?
One backup on an external hard disk and
another one cloud
Backups on 2 different external hard disks
A backup on an external hard disk
12
© KloudLearn www.kloudlearn.com
Is it generally considered
safe to use Public Wi-Fi
network for performing
an online banking
operation?
13
Yes, it is safe
No, it can be dangerous
© KloudLearn www.kloudlearn.com
Your business email
account has been
compromised and leaked
in a data breach. What is
the best course of
action(s)?
Change your password immediately
Inform the security team of your organization
Change the password on all sites where you use the
same password
All the above
14
© KloudLearn www.kloudlearn.com
If you receive a call from
someone that says to be a
clerk from your bank, is it
ok to give your bank
account details over the
phone?
Yes
No
Only if I recognize that the phone number is from my
bank.
15
© KloudLearn www.kloudlearn.com
Which of the following
statements are correct?
Phishing is a form of social engineering.
Phishing is a so called "spray and pray" technique in
which an attacker sends out the same email to
hundreds of potential targets in the hope they will
fall victim.
All of the above
16
© KloudLearn www.kloudlearn.com
Imagine you find a USB
device in the hallway at
work. What's the best
thing to do?
Pick it up and plug it in to see what’s on the USB device.
Maybe you can identify the owner.
Leave it in the hallway or bring it to the reception
desk, such that the person who lost it can get it back
Pick it up, don't plug it in but inform your IT
department because this could be a USB device
containing malware to infect your company's systems.
17
© KloudLearn www.kloudlearn.com
Is the following statement
true or false. Because
operating system updates
are time consuming and
may need to restart the
machine it's a good idea
to postpone them as long
as possible?
Yes
No
18
© KloudLearn www.kloudlearn.com
If you receive a suspicious
email, should you?
Reply to it
Open the attachments
Click the links
Report it to the phishing reporting mailbox of your
government
19
© KloudLearn www.kloudlearn.com
What is the best way to
validate a legitimate email
vs. a phishing email?
20
Bad spelling, poor syntax and grammar are one of
the tell-tale signs of a fake email.
Look at the email headers to see where it really
came from.
Look for poorly replicated logos.
Contact the sender on some other medium besides
email to verify whether they sent you the email.
© KloudLearn www.kloudlearn.com
You get a call from your
technical support
helpdesk saying they are
performing an urgent
server upgrade. They ask
you for your password.
What should you do?
21
Refuse and contact your manager or Information
Security team.
Get the agent's name and give him your login and
password.
Get the agent's email address and email him your
login and password.
Give the support representative your password, but
not your login.
Thank You
© KloudLearn www.kloudlearn.com 22
KloudLearn, Inc. is headquartered in Silicon Valley, California. Our mission is to help
enterprises provide an engaging and impactful learning experience that improves
business performance. We provide the industry’s most modern LMS (Learning
Management System). For more information visit us at www.kloudlearn.com or reach
out to us at info@kloudlearn.com

Mais conteúdo relacionado

Mais procurados

Information Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn HospitalInformation Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn HospitalAtlantic Training, LLC.
 
Cybersecurity Employee Training
Cybersecurity Employee TrainingCybersecurity Employee Training
Cybersecurity Employee TrainingPaige Rasid
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awarenessJason Murray
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@R_Yanus
 
Information Security Awareness
Information Security Awareness Information Security Awareness
Information Security Awareness SnapComms
 
Awareness Training on Information Security
Awareness Training on Information SecurityAwareness Training on Information Security
Awareness Training on Information SecurityKen Holmes
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness TrainingJen Ruhman
 
Cyber Security Update: How to Train Your Employees to Prevent Data Breaches
Cyber Security Update: How to Train Your Employees to Prevent Data BreachesCyber Security Update: How to Train Your Employees to Prevent Data Breaches
Cyber Security Update: How to Train Your Employees to Prevent Data BreachesParsons Behle & Latimer
 
Customer information security awareness training
Customer information security awareness trainingCustomer information security awareness training
Customer information security awareness trainingAbdalrhmanTHassan
 
Information Security Awareness Training Open
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training OpenFred Beck MBA, CPA
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness TrainingWilliam Mann
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsKrishna Srikanth Manda
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness TrainingRandy Bowman
 
Security awareness-checklist 2019
Security awareness-checklist 2019Security awareness-checklist 2019
Security awareness-checklist 2019Mustafa Kuğu
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Programdavidcurriecia
 
General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber SecurityDominic Rajesh
 

Mais procurados (20)

Information Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn HospitalInformation Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn Hospital
 
Security Awareness Training by Fortinet
Security Awareness Training by FortinetSecurity Awareness Training by Fortinet
Security Awareness Training by Fortinet
 
Cybersecurity Employee Training
Cybersecurity Employee TrainingCybersecurity Employee Training
Cybersecurity Employee Training
 
Security awareness
Security awarenessSecurity awareness
Security awareness
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awareness
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@
 
Basic Security Training for End Users
Basic Security Training for End UsersBasic Security Training for End Users
Basic Security Training for End Users
 
Information Security Awareness
Information Security Awareness Information Security Awareness
Information Security Awareness
 
Awareness Training on Information Security
Awareness Training on Information SecurityAwareness Training on Information Security
Awareness Training on Information Security
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness Training
 
Cyber Security Update: How to Train Your Employees to Prevent Data Breaches
Cyber Security Update: How to Train Your Employees to Prevent Data BreachesCyber Security Update: How to Train Your Employees to Prevent Data Breaches
Cyber Security Update: How to Train Your Employees to Prevent Data Breaches
 
Customer information security awareness training
Customer information security awareness trainingCustomer information security awareness training
Customer information security awareness training
 
Information Security Awareness Training Open
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training Open
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness Training
 
information security awareness course
information security awareness courseinformation security awareness course
information security awareness course
 
Security awareness-checklist 2019
Security awareness-checklist 2019Security awareness-checklist 2019
Security awareness-checklist 2019
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Program
 
General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber Security
 

Semelhante a Employee Awareness in Cyber Security - Kloudlearn

Csmp overview may 14
Csmp overview may 14Csmp overview may 14
Csmp overview may 14Jock ANDRE
 
Information and Cyber Warfare
Information and Cyber WarfareInformation and Cyber Warfare
Information and Cyber WarfareSwapnil Jagtap
 
How to assess your Cybersecurity Vulnerability_.pdf
How to assess your Cybersecurity Vulnerability_.pdfHow to assess your Cybersecurity Vulnerability_.pdf
How to assess your Cybersecurity Vulnerability_.pdfMetaorange
 
How to assess your Cybersecurity Vulnerability_.pptx
How to assess your Cybersecurity Vulnerability_.pptxHow to assess your Cybersecurity Vulnerability_.pptx
How to assess your Cybersecurity Vulnerability_.pptxMetaorange
 
Best Practices for Professional Audit Services in Singapore
Best Practices for Professional Audit Services in SingaporeBest Practices for Professional Audit Services in Singapore
Best Practices for Professional Audit Services in SingaporeWZWU & Partners
 
2016 Risk Management Workshop
2016 Risk Management Workshop2016 Risk Management Workshop
2016 Risk Management WorkshopStacy Willis
 
Cybersecurity crisis management a prep guide
Cybersecurity crisis management   a prep guideCybersecurity crisis management   a prep guide
Cybersecurity crisis management a prep guideJoAnna Cheshire
 
The Unpleasant Truths of Modern Business Cybersecurity
The Unpleasant Truths of Modern Business CybersecurityThe Unpleasant Truths of Modern Business Cybersecurity
The Unpleasant Truths of Modern Business CybersecurityGlobal Knowledge Training
 
Importance of Information Security and Goals for Preventing Data Breaches
 Importance of Information Security and Goals for Preventing Data Breaches Importance of Information Security and Goals for Preventing Data Breaches
Importance of Information Security and Goals for Preventing Data Breacheskimsrung lov
 
A CIRO's-eye view of Digital Risk Management
A CIRO's-eye view of Digital Risk ManagementA CIRO's-eye view of Digital Risk Management
A CIRO's-eye view of Digital Risk ManagementDaren Dunkel
 
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdfFor Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdfJustinBrown267905
 
Post 11. Long term GoalThe Group’s goal is to offer attr
Post 11. Long term GoalThe Group’s goal is to offer attrPost 11. Long term GoalThe Group’s goal is to offer attr
Post 11. Long term GoalThe Group’s goal is to offer attranhcrowley
 
How to Connect Your Server Room to the Board Room – Before a Data Breach Occurs
How to Connect Your Server Room to the Board Room – Before a Data Breach OccursHow to Connect Your Server Room to the Board Room – Before a Data Breach Occurs
How to Connect Your Server Room to the Board Room – Before a Data Breach OccursSurfWatch Labs
 
Cyber presentation spet 2019 v8sentfor upload
Cyber presentation spet 2019 v8sentfor uploadCyber presentation spet 2019 v8sentfor upload
Cyber presentation spet 2019 v8sentfor uploadsavassociates1
 
Weakest links of an organization's Cybersecurity chain
Weakest links of an organization's Cybersecurity chainWeakest links of an organization's Cybersecurity chain
Weakest links of an organization's Cybersecurity chainSanjay Chadha, CPA, CA
 
Pay Me Now or Pay Me A Lot More Later
Pay Me Now or Pay Me A Lot More LaterPay Me Now or Pay Me A Lot More Later
Pay Me Now or Pay Me A Lot More LaterRLE Technologies
 
Top 10 Measure to Mitigate Insider Security Threats.pptx
Top 10 Measure to Mitigate Insider Security Threats.pptxTop 10 Measure to Mitigate Insider Security Threats.pptx
Top 10 Measure to Mitigate Insider Security Threats.pptxinfosec train
 

Semelhante a Employee Awareness in Cyber Security - Kloudlearn (20)

Csmp overview may 14
Csmp overview may 14Csmp overview may 14
Csmp overview may 14
 
Information and Cyber Warfare
Information and Cyber WarfareInformation and Cyber Warfare
Information and Cyber Warfare
 
How to assess your Cybersecurity Vulnerability_.pdf
How to assess your Cybersecurity Vulnerability_.pdfHow to assess your Cybersecurity Vulnerability_.pdf
How to assess your Cybersecurity Vulnerability_.pdf
 
How to assess your Cybersecurity Vulnerability_.pptx
How to assess your Cybersecurity Vulnerability_.pptxHow to assess your Cybersecurity Vulnerability_.pptx
How to assess your Cybersecurity Vulnerability_.pptx
 
Best Practices for Professional Audit Services in Singapore
Best Practices for Professional Audit Services in SingaporeBest Practices for Professional Audit Services in Singapore
Best Practices for Professional Audit Services in Singapore
 
2016 Risk Management Workshop
2016 Risk Management Workshop2016 Risk Management Workshop
2016 Risk Management Workshop
 
Cybersecurity crisis management a prep guide
Cybersecurity crisis management   a prep guideCybersecurity crisis management   a prep guide
Cybersecurity crisis management a prep guide
 
Protect Your Firm: Knowledge, Process, Policy and Action
Protect Your Firm: Knowledge, Process, Policy and ActionProtect Your Firm: Knowledge, Process, Policy and Action
Protect Your Firm: Knowledge, Process, Policy and Action
 
The Unpleasant Truths of Modern Business Cybersecurity
The Unpleasant Truths of Modern Business CybersecurityThe Unpleasant Truths of Modern Business Cybersecurity
The Unpleasant Truths of Modern Business Cybersecurity
 
Importance of Information Security and Goals for Preventing Data Breaches
 Importance of Information Security and Goals for Preventing Data Breaches Importance of Information Security and Goals for Preventing Data Breaches
Importance of Information Security and Goals for Preventing Data Breaches
 
Azure Security.pdf
Azure Security.pdfAzure Security.pdf
Azure Security.pdf
 
Azure security
Azure securityAzure security
Azure security
 
A CIRO's-eye view of Digital Risk Management
A CIRO's-eye view of Digital Risk ManagementA CIRO's-eye view of Digital Risk Management
A CIRO's-eye view of Digital Risk Management
 
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdfFor Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
 
Post 11. Long term GoalThe Group’s goal is to offer attr
Post 11. Long term GoalThe Group’s goal is to offer attrPost 11. Long term GoalThe Group’s goal is to offer attr
Post 11. Long term GoalThe Group’s goal is to offer attr
 
How to Connect Your Server Room to the Board Room – Before a Data Breach Occurs
How to Connect Your Server Room to the Board Room – Before a Data Breach OccursHow to Connect Your Server Room to the Board Room – Before a Data Breach Occurs
How to Connect Your Server Room to the Board Room – Before a Data Breach Occurs
 
Cyber presentation spet 2019 v8sentfor upload
Cyber presentation spet 2019 v8sentfor uploadCyber presentation spet 2019 v8sentfor upload
Cyber presentation spet 2019 v8sentfor upload
 
Weakest links of an organization's Cybersecurity chain
Weakest links of an organization's Cybersecurity chainWeakest links of an organization's Cybersecurity chain
Weakest links of an organization's Cybersecurity chain
 
Pay Me Now or Pay Me A Lot More Later
Pay Me Now or Pay Me A Lot More LaterPay Me Now or Pay Me A Lot More Later
Pay Me Now or Pay Me A Lot More Later
 
Top 10 Measure to Mitigate Insider Security Threats.pptx
Top 10 Measure to Mitigate Insider Security Threats.pptxTop 10 Measure to Mitigate Insider Security Threats.pptx
Top 10 Measure to Mitigate Insider Security Threats.pptx
 

Mais de KloudLearn

Service Organizational Control (SOC 2) Compliance - Kloudlearn
Service Organizational Control  (SOC 2) Compliance - KloudlearnService Organizational Control  (SOC 2) Compliance - Kloudlearn
Service Organizational Control (SOC 2) Compliance - KloudlearnKloudLearn
 
What is Phishing - Kloudlearn
What is Phishing - KloudlearnWhat is Phishing - Kloudlearn
What is Phishing - KloudlearnKloudLearn
 
What is a Malware - Kloudlearn
What is a Malware - KloudlearnWhat is a Malware - Kloudlearn
What is a Malware - KloudlearnKloudLearn
 
Health Insurance Portability and Accountability Act (HIPPA) - Kloudlearn
Health Insurance Portability and Accountability Act (HIPPA) - KloudlearnHealth Insurance Portability and Accountability Act (HIPPA) - Kloudlearn
Health Insurance Portability and Accountability Act (HIPPA) - KloudlearnKloudLearn
 
Cyber Crisis Management - Kloudlearn
Cyber Crisis Management - KloudlearnCyber Crisis Management - Kloudlearn
Cyber Crisis Management - KloudlearnKloudLearn
 
Cloud Security - Kloudlearn
Cloud Security - KloudlearnCloud Security - Kloudlearn
Cloud Security - KloudlearnKloudLearn
 
California Consumer Privacy Act (CCPA) - Kloudlearn
California Consumer Privacy Act (CCPA) - KloudlearnCalifornia Consumer Privacy Act (CCPA) - Kloudlearn
California Consumer Privacy Act (CCPA) - KloudlearnKloudLearn
 
KloudLearn LMS | E-learning Platform
KloudLearn LMS | E-learning Platform KloudLearn LMS | E-learning Platform
KloudLearn LMS | E-learning Platform KloudLearn
 

Mais de KloudLearn (8)

Service Organizational Control (SOC 2) Compliance - Kloudlearn
Service Organizational Control  (SOC 2) Compliance - KloudlearnService Organizational Control  (SOC 2) Compliance - Kloudlearn
Service Organizational Control (SOC 2) Compliance - Kloudlearn
 
What is Phishing - Kloudlearn
What is Phishing - KloudlearnWhat is Phishing - Kloudlearn
What is Phishing - Kloudlearn
 
What is a Malware - Kloudlearn
What is a Malware - KloudlearnWhat is a Malware - Kloudlearn
What is a Malware - Kloudlearn
 
Health Insurance Portability and Accountability Act (HIPPA) - Kloudlearn
Health Insurance Portability and Accountability Act (HIPPA) - KloudlearnHealth Insurance Portability and Accountability Act (HIPPA) - Kloudlearn
Health Insurance Portability and Accountability Act (HIPPA) - Kloudlearn
 
Cyber Crisis Management - Kloudlearn
Cyber Crisis Management - KloudlearnCyber Crisis Management - Kloudlearn
Cyber Crisis Management - Kloudlearn
 
Cloud Security - Kloudlearn
Cloud Security - KloudlearnCloud Security - Kloudlearn
Cloud Security - Kloudlearn
 
California Consumer Privacy Act (CCPA) - Kloudlearn
California Consumer Privacy Act (CCPA) - KloudlearnCalifornia Consumer Privacy Act (CCPA) - Kloudlearn
California Consumer Privacy Act (CCPA) - Kloudlearn
 
KloudLearn LMS | E-learning Platform
KloudLearn LMS | E-learning Platform KloudLearn LMS | E-learning Platform
KloudLearn LMS | E-learning Platform
 

Último

The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfPower Karaoke
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityNeo4j
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationkaushalgiri8080
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)OPEN KNOWLEDGE GmbH
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
XpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software SolutionsXpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software SolutionsMehedi Hasan Shohan
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样umasea
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Andreas Granig
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number SystemsJheuzeDellosa
 
Engage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyEngage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyFrank van der Linden
 
cybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningcybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningVitsRangannavar
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfjoe51371421
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmSujith Sukumaran
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWave PLM
 

Último (20)

The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdf
 
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanation
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
XpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software SolutionsXpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software Solutions
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number Systems
 
Engage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyEngage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The Ugly
 
cybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningcybersecurity notes for mca students for learning
cybersecurity notes for mca students for learning
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdf
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalm
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need It
 

Employee Awareness in Cyber Security - Kloudlearn

  • 1. Online course offering Employee Awareness in Cyber Security “Suggesting that IT security issues can be dealt with simply by drafting and implementing a security policy is like saying that speeding drivers won’t be a problem if we introduce speed limits” © KloudLearn www.kloudlearn.com
  • 2. Learning Objectives Goal Of Employee Awareness in Cyber Security Auditing Conclusions in the City of Winnipeg Key Risks and Impacts Educating Cyber Security Awareness among Employees Need For Employee Awareness Training and Best Practices Dos and Don’ts Checklist © KloudLearn www.kloudlearn.com 2 Employees are aware of risks but unsure of how it affects at workplace Key takeaways on Cyber Security Employee Awareness Quiz
  • 3. What is the goal of Corporate security policies? The goal of corporate security policies is to define the procedures, guidelines and practices for configuring and managing security in the environment Goal of Employee Awareness in Cyber Security © KloudLearn www.kloudlearn.com 3 How do we improve Awareness among Employees? In order to improve awareness an understanding on all key systems across the organization, there needs to be an investment in additional time and resources in an awareness and training strategy to reinforce the directives and to improve security efforts across all departments and special operating agencies employees
  • 4. ● Responsibility for security has been assigned to the individual and most City staff are aware of the IT Security directives. The directives are accessible online but some need to be updated to reflect the current organizational structure. ● Results of the e-Survey revealed that nearly 30% of all respondents have only a poor or fair level of understanding of the directives. ● Recommendations were made to create new directives. Evolving technology issues such as the use of portable media devices and the performance of vulnerability assessments require administrative directives to provide guidance to City staff. Auditing Conclusions in the City of Winnipeg © KloudLearn www.kloudlearn.com 4
  • 5. KEY RISKS AND IMPACTS © KloudLearn www.kloudlearn.com 5 Increased or unknown operational costs due to unavailability of key business applications Unauthorized access to, or disclosure of, client records Key Risks and Impacts Loss of physical assets Loss of Cash Flow
  • 6. Educating Employees about Awareness Issue Specific Rules for mobile networks and emails 2017 2017 2018 2016 2014 Clearly communicate the potential impact of a cyber incident on your business Make cyber security everyone's responsibility. Train your employees to recognize and respond to a cyber attack Hold Regular CyberSecurity Sessions. 01 03 05 02 04 2015
  • 7. Need for Employee Awareness Training and Best Practices © KloudLearn www.kloudlearn.com 7 01 02 03 04 05 06 07 08 09 10 Identifying organization's security requirements Creating appropriate content for training medium Schedule multiple training sessions for Employees. Capturing feedback on training. Re-evaluate the training and training medium for effectiveness. Determine how best to deliver the training Set expectations for all employees as to the requirements. Deliver the training according to the expectations. Conduct post-training assessments. Correlate the implementation of training with the frequency of security-related incidents.
  • 8. The Do’s ● Create passwords that are unique and difficult ● Do change your password regularly ● Do keep your office clean and free of any sensitive data ● Do stay alert and report any suspicious activity to management ● Do send IT Support as an attachment for verification. Do’s and Don'ts Checklist © KloudLearn www.kloudlearn.com 8 The Don'ts ● DON’T send any data via email that is sensitive ● DON’T write down your password anywhere around your workplace. ● DON’T plug in personal devices into your computer
  • 9. Employees Aware Of Privacy Risks, But Unsure Of How They Affect The Workplace © KloudLearn www.kloudlearn.com 9 Employee cybersecurity and privacy engagement Confidence and security awareness remain lacking Misinformation and misconceptions abound Privacy regulations remain challenging Social media and file-sharing security awareness is high Employees possess password savvy Urgency of updates is understood
  • 10. ● Train your entire staff, and your board of directors, to understand and make cybersecurity a top priority ● Include training for employees on their first day or during orientation ● Focus training on regulatory requirements ● Additionally, train employees to deal with a data breach ● Engage with the workforce and use multiple approaches in training ● Put security rules and policies in writing. ● Change rules and policies when the law changes or when there are new risks in the business environment. ● While informal training should occur regularly, formal training should occur at least annually. Key Takeaways on Cyber Security Employee Awareness © KloudLearn www.kloudlearn.com 10
  • 12. © KloudLearn www.kloudlearn.com Which of the following is the most secure backup strategy? One backup on an external hard disk and another one cloud Backups on 2 different external hard disks A backup on an external hard disk 12
  • 13. © KloudLearn www.kloudlearn.com Is it generally considered safe to use Public Wi-Fi network for performing an online banking operation? 13 Yes, it is safe No, it can be dangerous
  • 14. © KloudLearn www.kloudlearn.com Your business email account has been compromised and leaked in a data breach. What is the best course of action(s)? Change your password immediately Inform the security team of your organization Change the password on all sites where you use the same password All the above 14
  • 15. © KloudLearn www.kloudlearn.com If you receive a call from someone that says to be a clerk from your bank, is it ok to give your bank account details over the phone? Yes No Only if I recognize that the phone number is from my bank. 15
  • 16. © KloudLearn www.kloudlearn.com Which of the following statements are correct? Phishing is a form of social engineering. Phishing is a so called "spray and pray" technique in which an attacker sends out the same email to hundreds of potential targets in the hope they will fall victim. All of the above 16
  • 17. © KloudLearn www.kloudlearn.com Imagine you find a USB device in the hallway at work. What's the best thing to do? Pick it up and plug it in to see what’s on the USB device. Maybe you can identify the owner. Leave it in the hallway or bring it to the reception desk, such that the person who lost it can get it back Pick it up, don't plug it in but inform your IT department because this could be a USB device containing malware to infect your company's systems. 17
  • 18. © KloudLearn www.kloudlearn.com Is the following statement true or false. Because operating system updates are time consuming and may need to restart the machine it's a good idea to postpone them as long as possible? Yes No 18
  • 19. © KloudLearn www.kloudlearn.com If you receive a suspicious email, should you? Reply to it Open the attachments Click the links Report it to the phishing reporting mailbox of your government 19
  • 20. © KloudLearn www.kloudlearn.com What is the best way to validate a legitimate email vs. a phishing email? 20 Bad spelling, poor syntax and grammar are one of the tell-tale signs of a fake email. Look at the email headers to see where it really came from. Look for poorly replicated logos. Contact the sender on some other medium besides email to verify whether they sent you the email.
  • 21. © KloudLearn www.kloudlearn.com You get a call from your technical support helpdesk saying they are performing an urgent server upgrade. They ask you for your password. What should you do? 21 Refuse and contact your manager or Information Security team. Get the agent's name and give him your login and password. Get the agent's email address and email him your login and password. Give the support representative your password, but not your login.
  • 22. Thank You © KloudLearn www.kloudlearn.com 22 KloudLearn, Inc. is headquartered in Silicon Valley, California. Our mission is to help enterprises provide an engaging and impactful learning experience that improves business performance. We provide the industry’s most modern LMS (Learning Management System). For more information visit us at www.kloudlearn.com or reach out to us at info@kloudlearn.com