Send the link below via email or IMCopy
Present to your audienceStart remote presentation
- Invited audience members will follow you as you navigate and present
- People invited to a presentation do not need a Prezi account
- This link expires 10 minutes after you close the presentation
- A maximum of 30 users can follow your presentation
- Learn more about this feature in our knowledge base article
Do you really want to delete this prezi?
Neither you, nor the coeditors you shared it with will be able to recover it again.
Make your likes visible on Facebook?
You can change this under Settings & Account at any time.
Transcript of Cyber Security
WHAT IS THE KEY TO
If in Doubt!
William McGillivray, Commercial Director
Threats can come from credible sources, such as existing clients/suppliers. they may have become infected and are unknowingly transmitting to their contacts.
If they have been compromised LET THEM KNOW
Malware infection through users clicking on malicious e-mail attachments or website links.
Exploitation of known vulnerabilities in Internet connected servers and devices using widely available tools and techniques.
Boundary firewalls and internet gateways
Contrary to popular belief
Anti-Malware/Virus tools are
People require to be able to do things such as open attachments/click on web links.
People are the weakest link in ANY security system.
Never use any word which is related to you and may be easy to guess, for example by looking at your social media pages. Absolutely never use:
Other family members’ name
Current partner’s name
Place of birth
Something related to your favourite sports team
Servers/PC's, email systems, websites etc are under constant attack.
The important thing is that protection measures are not circumvented.
It is NEVER too much bother to check a concern with your IT support company!
More information: https://www.cyberstreetwise.com/cyberessentials/
Cyber Essentials is a new Government-backed and industry supported scheme to guide businesses in protecting themselves against cyber threats.
Phishing scams are when fraudsters send malicious fake emails, social network posts and texts to tempt you in or try to gain your trust to take your sensitive information and/or money.
Phishing emails sometimes pretend to be from your bank or they may ask for your logon details for certain other accounts like PayPal or your email account. If you’ve ever received an email saying you’ve won a lottery you’ve never entered or have inherited vast sums, this too is a phishing email trying to get hold of your personal details.
The emails, texts and posts often contain embedded links which encourage you to click.
If in doubt, delete it.
Cyber criminals will try to hack your computer/ tablet/smartphone to gain access to your systems and sensitive information in order to commit fraud and other crimes.
Download vendor software and app updates when prompted – they provide security fixes as well as design changes
Install and keep anti virus software up to date on all devices
Use strong passwords
Use firewalls at home and your business