Want to make interactive content? It’s easy in Genially!

Over 30 million people build interactive content in Genially.

Check out what others have designed:

Transcript

The majority of data breaches are caused by unintentional human error, so a lack of awareness is the biggest threat to protecting information.

These are the source of the majority of security breaches that occur within an organisation. Insider attacks may be 'non-malicious' - for example, a colleague accidentally sending business information to the wrong email address; and also 'malicious' - for example, an aggrieved current or former employee or contractor wanting to profit by selling critical business information or harming the business through actions that cause disruption.

Insider Threat

The joining of the two words 'malicious' and 'software', is an umbrella term used to refer to a variety of forms of hostile or intrusive software.These include computer viruses, worms, trojans, ransomware, spyware, adware, scareware, and other malicious programs. Malware can take the form of executable code, scripts, active content or other software.

Malware and Remote Access Threat

SpearPhishing is a type of phishing attack targeting a specific individual, group or organisation. They are usually more personalised, making them harder to spot. SpearPhishing attacks will be looking for higher value data and information that might be worth more to sell or contain highly sensitive data.

Phishing is one of the many social engineering techniques used by criminals and is by far the most popular. You may well be familiar with phishing emails - they are usually from someone you don't know or recognise.For example, they may ask you to urgently act; or advise you that your bank account has been locked and needs resetting. Banks never use this form of communication and you should not disclose such information - be suspicious and don't click on any links.

Phishing & SpearPhishing

Vishing is the practice of Social Engineering over the phone to gain access to personal and financial information. The word 'vishing' comes from a combination of 'voice' and 'fishing'. If you receive a call from someone claiming to be from your bank, do not give away your personal details.Always be suspicious of unexpected or irregular contact from individuals that you do not know.

Vishing and Scams

Whilst in a call, it is also advised that you reduce the discussion or distribution of personal information to ensure details are not leaked to uninvited guests.

As technology and working environments have evolved, video conferencing has seen a huge spike in popularity. Whether it's for talking with colleagues, or catching up with friends, it's a great way to connect with people without being next to them.Video conferencing also has its issues. You should always be careful and ensure that your groups and meetings are secured with a password and links to the group are only distributed to the intended users.

Threats to Conferencing Apps