Cybersecurity Awareness
Created by Com-Sec
Module 4: Security Best Practices
Training Objectives
Device & Data Protection
01
Data Usage
02
03
Network & Connectivity
Malware Protection
04
Device Protection
- Do not leave devices unattended or unlocked.
- Use multi-factor authentication to access your devices.
- Regularly update your device's operating system, applications, and antivirus software to patch security vulnerabilities.
- Avoid connecting to unsecured public Wi-Fi networks.
- Use a virtual private network (VPN) when accessing sensitive information over public networks.
Data Protection
What is sensitive data?
Personal Financial MedicalLegalAuthentication credentialsCompany-related
Name, address, social security number (SSN) personal identification number (PIN).
Credit card numbers, bank account details, financial transaction records.
Medical records, health insurance details.
Data subject to legal regulations (such as GDPR, HIPAA, or industry-specific standards).
Usernames, passwords, security codes
Proprietary company data, trade secrets, intellectual property, client information
Data Protection
Treating Sensitive Data
- Regularly back up important work data
- Test data restoration to ensure backups are functional.
- Encrypt sensitive data on devices and during transmission.
- Use encrypted messaging and email services for sensitive communications.
- Keep your workstation organized and free from sensitive information when not in use.
Beware Of...
Shoulder surfing - unauthorized individuals watching over your shoulder to steal sensitive information Tailgating - unauthorized entry/access to a restricted area by an individual who follows an authorized person without proper authentication or identification.
Data Usage
Principle of "least privelage"
Granting individuals only the access they need to perform their tasks, minimizing data exposure
Delete data that is no longer needed or relevant for ongoing tasks.
Avoid downloading sensitive data onto personal devices or cloud storage.
Do not share sensitive information over unsecured channels.
Network & Connectivity
Networks are like digital highways that connect various devices, systems, and individuals within an organization. Therefore, network security is vital to protect sensitive information and prevent unauthorized access.
Tips to keep your network safe:
Disable Bluetooth and Wi-Fi when not in use to prevent unauthorized access.
Do not connect to unknown or untrusted networks.
Avoid using public Wi-Fi for sensitive tasks; use VPNs when necessary.
Be careful about what websites you visit and files you download.
Be cautious of emails or messages asking for network credentials and ALWAYS verify sender authenticity.
Malware
Remember: Malware, or malicious software, is designed to infiltrate, damage, or compromise computer systems, aiming to steal information, disrupt operations, or gain unauthorized access.
How does malware spread?
Malware spreads through infected email attachments, malicious websites, software downloads from untrusted sources, and compromised external devices (e.g., USB drives).
This can lead to data breaches, financial loss, system crashes, identity theft, and unauthorized access to confidential information.
Antivirus Protection
Antivirus software is designed to detect, prevent, and remove malware from computer systems.
The antivirus software scans files and programs for known malware signatures and suspicious behavior.
Antivirus Protection
Key Features
Real-time Scanning: Monitors files and applications in real time to detect and block malware as it is encountered. Regular Updates: Antivirus databases are updated frequently to recognize the latest threats and vulnerabilities. Quarantine and Removal: Infected files are isolated in quarantine and can be safely removed from the system.
Perform regular scans to detect and remove potential threats.
Download software and files only from reputable sources to minimize the risk of infection
In Conclusion...
Each one of you holds a unique position within your organization, contributing to its success and security. Whether you're an executive making critical decisions or a team member handling daily operations, your actions influence the overall security posture.
End of Module 4
Cybersecurity Awareness Training: Module 4
Rojin Rezaei
Created on August 8, 2023
Start designing with a free template
Discover more than 1500 professional designs like these:
View
Essential Learning Unit
View
Akihabara Learning Unit
View
Genial learning unit
View
History Learning Unit
View
Primary Unit Plan
View
Vibrant Learning Unit
View
Art learning unit
Explore all templates
Transcript
Cybersecurity Awareness
Created by Com-Sec
Module 4: Security Best Practices
Training Objectives
Device & Data Protection
01
Data Usage
02
03
Network & Connectivity
Malware Protection
04
Device Protection
Data Protection
What is sensitive data?
Personal Financial MedicalLegalAuthentication credentialsCompany-related
Name, address, social security number (SSN) personal identification number (PIN).
Credit card numbers, bank account details, financial transaction records.
Medical records, health insurance details.
Data subject to legal regulations (such as GDPR, HIPAA, or industry-specific standards).
Usernames, passwords, security codes
Proprietary company data, trade secrets, intellectual property, client information
Data Protection
Treating Sensitive Data
Beware Of...
Shoulder surfing - unauthorized individuals watching over your shoulder to steal sensitive information Tailgating - unauthorized entry/access to a restricted area by an individual who follows an authorized person without proper authentication or identification.
Data Usage
Principle of "least privelage"
Granting individuals only the access they need to perform their tasks, minimizing data exposure
Delete data that is no longer needed or relevant for ongoing tasks.
Avoid downloading sensitive data onto personal devices or cloud storage.
Do not share sensitive information over unsecured channels.
Network & Connectivity
Networks are like digital highways that connect various devices, systems, and individuals within an organization. Therefore, network security is vital to protect sensitive information and prevent unauthorized access.
Tips to keep your network safe:
Disable Bluetooth and Wi-Fi when not in use to prevent unauthorized access.
Do not connect to unknown or untrusted networks.
Avoid using public Wi-Fi for sensitive tasks; use VPNs when necessary.
Be careful about what websites you visit and files you download.
Be cautious of emails or messages asking for network credentials and ALWAYS verify sender authenticity.
Malware
Remember: Malware, or malicious software, is designed to infiltrate, damage, or compromise computer systems, aiming to steal information, disrupt operations, or gain unauthorized access.
How does malware spread?
Malware spreads through infected email attachments, malicious websites, software downloads from untrusted sources, and compromised external devices (e.g., USB drives).
This can lead to data breaches, financial loss, system crashes, identity theft, and unauthorized access to confidential information.
Antivirus Protection
Antivirus software is designed to detect, prevent, and remove malware from computer systems.
The antivirus software scans files and programs for known malware signatures and suspicious behavior.
Antivirus Protection
Key Features
Real-time Scanning: Monitors files and applications in real time to detect and block malware as it is encountered. Regular Updates: Antivirus databases are updated frequently to recognize the latest threats and vulnerabilities. Quarantine and Removal: Infected files are isolated in quarantine and can be safely removed from the system.
Perform regular scans to detect and remove potential threats.
Download software and files only from reputable sources to minimize the risk of infection
In Conclusion...
Each one of you holds a unique position within your organization, contributing to its success and security. Whether you're an executive making critical decisions or a team member handling daily operations, your actions influence the overall security posture.
End of Module 4