Want to create interactive content? It’s easy in Genially!

Get started free

Cybersecurity Awareness Training: Module 4

Rojin Rezaei

Created on August 8, 2023

Start designing with a free template

Discover more than 1500 professional designs like these:

Essential Learning Unit

Akihabara Learning Unit

Genial learning unit

History Learning Unit

Primary Unit Plan

Vibrant Learning Unit

Art learning unit

Transcript

Cybersecurity Awareness

Created by Com-Sec

Module 4: Security Best Practices

Training Objectives

Device & Data Protection

01

Data Usage

02

03

Network & Connectivity

Malware Protection

04

Device Protection

  • Do not leave devices unattended or unlocked.
  • Use multi-factor authentication to access your devices.
  • Regularly update your device's operating system, applications, and antivirus software to patch security vulnerabilities.
  • Avoid connecting to unsecured public Wi-Fi networks.
    • Use a virtual private network (VPN) when accessing sensitive information over public networks.

Data Protection

What is sensitive data?
Personal Financial MedicalLegalAuthentication credentialsCompany-related

Name, address, social security number (SSN) personal identification number (PIN).

Credit card numbers, bank account details, financial transaction records.

Medical records, health insurance details.

Data subject to legal regulations (such as GDPR, HIPAA, or industry-specific standards).

Usernames, passwords, security codes

Proprietary company data, trade secrets, intellectual property, client information

Data Protection

Treating Sensitive Data
  • Regularly back up important work data
    • Test data restoration to ensure backups are functional.
  • Encrypt sensitive data on devices and during transmission.
    • Use encrypted messaging and email services for sensitive communications.
  • Keep your workstation organized and free from sensitive information when not in use.

Beware Of...

Shoulder surfing - unauthorized individuals watching over your shoulder to steal sensitive information Tailgating - unauthorized entry/access to a restricted area by an individual who follows an authorized person without proper authentication or identification.

Data Usage

Principle of "least privelage"

Granting individuals only the access they need to perform their tasks, minimizing data exposure

Delete data that is no longer needed or relevant for ongoing tasks.

Avoid downloading sensitive data onto personal devices or cloud storage.

Do not share sensitive information over unsecured channels.

Network & Connectivity

Networks are like digital highways that connect various devices, systems, and individuals within an organization. Therefore, network security is vital to protect sensitive information and prevent unauthorized access.

Tips to keep your network safe:

Disable Bluetooth and Wi-Fi when not in use to prevent unauthorized access.

Do not connect to unknown or untrusted networks.

Avoid using public Wi-Fi for sensitive tasks; use VPNs when necessary.

Be careful about what websites you visit and files you download.

Be cautious of emails or messages asking for network credentials and ALWAYS verify sender authenticity.

Malware

Remember: Malware, or malicious software, is designed to infiltrate, damage, or compromise computer systems, aiming to steal information, disrupt operations, or gain unauthorized access.
How does malware spread?

Malware spreads through infected email attachments, malicious websites, software downloads from untrusted sources, and compromised external devices (e.g., USB drives).

This can lead to data breaches, financial loss, system crashes, identity theft, and unauthorized access to confidential information.

Antivirus Protection

Antivirus software is designed to detect, prevent, and remove malware from computer systems.
The antivirus software scans files and programs for known malware signatures and suspicious behavior.

Antivirus Protection

Key Features

Real-time Scanning: Monitors files and applications in real time to detect and block malware as it is encountered. Regular Updates: Antivirus databases are updated frequently to recognize the latest threats and vulnerabilities. Quarantine and Removal: Infected files are isolated in quarantine and can be safely removed from the system.

Perform regular scans to detect and remove potential threats.

Download software and files only from reputable sources to minimize the risk of infection

In Conclusion...

Each one of you holds a unique position within your organization, contributing to its success and security. Whether you're an executive making critical decisions or a team member handling daily operations, your actions influence the overall security posture.

End of Module 4