Cybersecurity Data Protection Awareness Training-1-3
Cybersecurity Data Protection Awareness Training-1-3
1
Agenda:
1. Definition of Cybersecurity.
2. What is Information
3. Types of threats.
4. Best Practise
5. Data Protection
6. Work from home
2
What is Cybersecurity?
3
What is Information
Information is an asset, as important as other business assets, that could bring value to the organization and
need to be properly protected. The storage of information includes the following methods:
4
The form of information
The Form of Information:
◆Computer Data
◆Network Transmission
◆Fax
◆Record on Paper
◆Image
◆Digital Image
◆Disc & Tape
◆Phone Conversation
What is information assets?
Information, exists with the help of media, becomes information assets by
bringing value to modern companies.
Types of Security threats?
8
Example of phishing email:
9
Top Tips to avoid phishing are:
➢ Check who the email sender really is.
➢ Mouse over the link (if any) to see where it goes to.
• Phishing – what to Do? If you do identify a phishing email, take these steps:
➢ DO NOT reply or click any link or attachment from that email
➢ Inform your IT or similar department with an immediate effect, and take a screenshot if possible.
➢ Ensure suspicious email domains are blocked and associated emails are sent to the spam or junk folder.
➢
10
Email Attachments:
➢ Email attachments are one of the most common ways to get infected with
malware it’s critical that you avoid opening it an attachment if you do not know
who an email us coming from.
➢ Even if it looks like an excel, word and pdf file it may be malicious.
➢ A download attachment can sometimes immediately infect your computer.
11
Top Tips for Email Attachments:
➢ Never open or save an attachment from an unknown sender even the email
comes from someone you trust since they might hacked their account.
➢ If it looks fishy do not open or save the attachment as well.
12
Spam Protection:
➢ Never open spam emails even if you think it is funny to see the content inside.
Many times the spam providers have read receipt on the email they sent this
means they know how many people open their emails and which email address
are legitimate.
➢ Never use the work email address to sign up on social media, offers etc.
Ensure that you use the work email address only for work purposes not to any
social media accounts or other third parties.
13
Top Tips for Spam Protection:
14
Social Engineering:
SHRED- Any document which is of no use to you, shred them before throwing away in
the bin!
DESTROY. If you are getting rid of any electronics (USB drive, old phones, hard disks,
make sure your wipe off the data and physically destroy the same before dumping them
15
Passwords:
➢ Can the below answers be found on your facebook account or on another social
media?:
What city you grow up? Or what is your favourite colour? etc.
➢ It’s very risky to post this information on social media because of security questions
exist on just about every website that requires a username and a password.
➢ The above security questions are information that your friends, family and social
media connection know and that anyone can likely find out.
➢ Also, malicious parties can utilize your social media account to find out the answers
that to these questions which then allows them to reset your password.
➢ Ther best practice is to not be honest when filling out these questions just treat the
security questions as another password field if it asks you for instance your mum’s
name just enter something completely unrelated.
16
Poor Password Hygiene:
17
Tips For Passwords:
18
Malware:
➢ Malware includes numerous threat families all with different names:
● Viruses
● Worms
● Trojans
● Ransomware
● Spyware etc.
19
How to protect your laptop/ computer get infected:
20
Public Wifi:
➢ Public Wifi is a non secure network that users can connect for free (libraries,
cafe, restaurants etc.)
➢ Malicious actors will set up their own wifi hotspot.
➢ Public wifi insecure and you should treat it as unsafe.
➢ Cell phone data can be used instead.
21
HTTPS:
22
Best Practice
▪ Pause and reflect on the impact of ▪ Use a strong password to lock your ▪ Turn off automatic WiFi
the information you share device connectivity on all devices
▪ Keep privacy settings high on ▪ Ensure device auto locks within set time ▪ Use password protected WiFi.
social networks to prevent sensitive ▪ Regularly update Operating Software ▪ Connect to legitimate/password-
information being shared with public (OS) and apps protected public WiFi hotspots
▪ Format / destroy your hard disk ▪ Delete all unused application ▪ Avoid performing any financial
before disposing ▪ Read through what type of information transactions while connected to a
▪ Print documents only if necessary, apps will have access to and restrict the public / free WiFi services
▪ Shred all unused / unnecessary same ▪ Do not key in or access
documents ▪ Download app only from official app store sensitive information while using
▪ Check app reviews and ratings to verify unsecured WiFi networks
its authenticity before downloading
Data Protection:
Various types of data which must be protected from unauthorized access and disclosure
Employees Sensitive Data
Employees’ Data ► Medical Records
Personal identifiable information (PII) ► Sexual orientations
► Full name ► Trade data/information
► Address ► Genetic Data
► Postal code
► Telephone number Coastr Data
► Income/Salary
24
Data Protection:
➢ Be aware of various kinds of the of PII you have and who is authorized to
access it
➢ Stay alert for social engineering attacks and refuse to give your PII to a bad
actor who is trying to extract it from you
➢ Shred any document containing customer PII before disposal
➢ Think twice before sharing PII and ensure that there is a necessary reason to
do so
➢ Avoid placing PII on portable devices such as flash drives, external hard drive,
smartphones
➢ If data must be placed on an portable device, ensure that it’s encrypted
➢ Completely destroy the document once it is no longer needed when you write
your PII in a piece of paper
Data Protection:
When protecting data, it’s important to consider the different ways that data is transmitted and
used
28
29