Send the link below via email or IMCopy
Present to your audienceStart remote presentation
- Invited audience members will follow you as you navigate and present
- People invited to a presentation do not need a Prezi account
- This link expires 10 minutes after you close the presentation
- A maximum of 30 users can follow your presentation
- Learn more about this feature in our knowledge base article
Do you really want to delete this prezi?
Neither you, nor the coeditors you shared it with will be able to recover it again.
Make your likes visible on Facebook?
You can change this under Settings & Account at any time.
Cyber Security Awereness Presentation
Transcript of Cyber Security Awereness Presentation
Source: csmonitor.com Most Common Reason Behind Corporate Hacking Greed and financial gain
Activists motivated by ideological dissent (Anonymous, LulzSec)
Retribution (disgruntled employees)
Spying and espionage (Flame virus) Who is the target? The biggest misconception is that large corporations or organizations are the only cyber criminal’s target and not individuals.
Unaware, employees are the organizations greatest weakness as people make common mistakes such as clicking on malicious links or using an infected USB stick.
As a result of these unintended actions you have become the primary target. You are the target! Your computer and your information contains valuable information to a cybercriminal. It can also be used as a tool for hacking. Data theft – Cyber criminals can obtain confidential company information stored on your computer or use your credentials to steal it.
Identity theft – Cyber criminals can use employee identity's to access company credit card accounts.
Attacking others – Cybercriminals can use your computer to attack other individuals or organizations. Cyber crime is not limited from 9-5 Most individuals are unaware that they can be targeted any where at any time.You can be targeted at an;
Also at home Always assume that you are at risk.
Our identity and access has great value to cyber criminals even if we do not think it does.
If something seems or feels suspicious, it most likely is. Remember these core principles: Recognizing And Avoiding The Risks Only download or install programs that come from trusted sources. If a window pops up telling you your system is infected, that you need a program to make your system run faster, or anything that wants you to install it without you having purposely started a download, close the window without clicking on yes, no, or other.
Pay attention to the URL of a website. Malicious websites may look identical to a legitimate site, but the URL may use a variation in spelling or a different domain (e.g., .com vs. .net).
If a website seems suspicious, it most likely is. Browsing the Internet If you don’t know the sender and/or don’t know what it is they are sending you, simply delete the e-mail. If it was important, they will send it again with a more descriptive ‘Subject:’ or ‘Body.’
A common e-mail attacking method is called ‘phishing.’ Phishing is used to bait e-mail recipients to follow certain links used by scammers to pages that mock the look of popular sites such as Paypal, Hotmail, and online back accounts.
If it seems suspicious, it most likely is! E-mail USB Drives or Thumb Drives If you find a USB drive in the parking lot, NEVER use it on your computer without having someone from IT check it first.
Be weary of “promotional” USB drives.
If you receive a warning from Symantec when using a USB drive, contact the Service Desk immediately. Social Engineering Be suspicious of unsolicited phone calls, visits, or email messages from individuals asking about employees or other internal information. If an unknown individual claims to be from a legitimate organization, try to verify his or her identity directly with the company.
Do not give sensitive information to anyone unless you are sure that they are indeed who they claim to be and that they should have access to the information.
If you believe you might have revealed sensitive information about your organization, report it to the appropriate people within the organization, including network administrators. They can be alert for any suspicious or unusual activity. Takeaways Assume you're always at risk
Don't share your user ID
Don't trust e-mail that seems suspicious
Contact the Service Desk or an IT rep if you think you have been hacked or received something malicious. 286-1600 or ext 3333 opt 2
If it seems suspicious, it most likely is! text