SlideShare a Scribd company logo
1 of 20
Download to read offline
CYBERSECURITY AWARENESS
MONTH 2023
HOW TO STAY SAFE ONLINE
October is
Cybersecurity
Awareness Month
Topic: CYBERSECURITY IS A SHARED RESPONSIBILITY
In today's interconnected world, protecting ourselves
from cyber threats is no longer an individual
responsibility. It's a shared duty that requires
collaboration and awareness.
What is Cybersecurity?
▪ Defined as "the protection of computer systems and
networks from attacks by malicious actors that may
result in unauthorized information disclosure, theft
of, or damage to hardware, software, or data..."
▪ Wherever there is technology, there needs to be
cybersecurity.
Why is it Important?
▪ Implementing cybersecurity best practices is important
for individuals as well as organizations of all sizes to
protect personal, financial and sensitive information.
▪ For both government and private entities, developing
and implementing tailored cybersecurity plans and
processes is key to protecting and maintaining
business operations.
Feelings Toward Cybersecurity
▪ 78% of people consider staying secure online a priority
▪ 34% noted they often feel overwhelmed by information and, as a result,
minimize their online actions
▪ 46% felt frustrated while staying secure online
▪ 39% of users trying to keep safe felt information on how to stay secure online
is confusing
Findings from Oh Behave! The Annual Cybersecurity Attitudes and Behaviors Report 2022
Our Online Behaviors
▪ Only 33% of individuals create unique passwords for all accounts
▪ Only 18% of individuals have downloaded a password manager
▪ 43% of respondents have never heard of multifactor authentication (MFA)
▪ Out of the 57% of the participants who had heard about it:
▪ 79% applied it at least once and 94% of them reporting that they were still using MFA
▪ 92% of respondents took action after a security training
▪ 58% say they are better at recognizing phishing
▪ 45% started using strong and unique passwords
▪ 40% started using MFA
▪ 40% started regularly installing software updates
Findings from Oh Behave! The Annual Cybersecurity Attitudes and Behaviors Report 2022
4 Easy Ways to Stay Safe Online
Use Strong Passwords and a Password Manager
Turn on Multifactor Authentication
Recognize and Report Phishing Attacks​
Update Your Software​
Use Strong Passwords
CREATE STRONG PASSWORDS: • Long
• At least 16 characters
• Unique
• NEVER reuse passwords
• Complex
• Upper- and lower-case letters
• Numbers
• Special characters
• Spaces
Use a Password Manager
WHY USE A PASSWORD MANAGER?
• Stores your passwords
• Alerts you of duplicate passwords
• Generates strong new passwords
• Some automatically fill your login credentials
into website to make sign-in easy
Encryption ensures that password managers
never "know" what your passwords are,
keeping them safe from cyber attacks.
Turn on Multifactor Authentication
WHAT IS IT?
• A code sent to your phone or email
• An authenticator app
• A security key
• Biometrics
Fingerprint
Facial recognition
Turn on Multifactor Authentication
WHERE SHOULD YOU USE MFA?
• Email
• Accounts with financial information
Ex: Online store
• Accounts with personal information
Ex: Social media
Recognize and Report Phishing
PHISHING RED FLAGS:
• A tone that’s urgent or makes you scared
"Click this link immediately or your account will
be closed"
• Bad spellings, bad grammar
• Requests to send personal info
• Sender email address doesn’t match the
company it’s coming from
Ex: safetycomm.org vs. safetyc0mm.org
• An email you weren't expecting
Recognize and Report Phishing
WHAT TO DO
Do NOT
• Don't click any links
• Don't click any attachments
• Don't send personal info
Do
• Verify
• Contact that person directly if it's
someone you know
• Report it to your IT department
• DELETE IT
Update Your Software
WHY?
• Updates ensure your devices and
apps are protected from the latest
threats
• Don't click "remind me later", it could
leave you vulnerable to cyber threats
• Automatic updates are the easiest
way to stay secure
Update Your Software
WHERE TO FIND AVAILABLE UPDATES
• Check for notifications to your phone
or computer
• Look in your phone, browser or app
settings
• Check the upper corner of your
browser for any alerts
Ways to Get Involved
AT WORK
▪ Publicize resources and activities
▪ Intranet
▪ Website
▪ Emails to employees/customers
▪ Promotions
▪ Discounts
▪ Giveaways
▪ Hold a contest
▪ Phishing simulation
▪ Poster contest
AT HOME
▪ Share helpful tips and resources
▪ Kids
▪ Parents
▪ Friends
▪ Hold a family “tech talk”
▪ Discuss how each family member
can protect their devices, accounts,
and personal information.
▪ Create a culture of security in your
family
Ways to Get Involved Cont.
IN YOUR COMMUNITY
▪ Volunteer to teach others in your
community
▪ Reach out to
▪ Your kid's school
▪ Community center
▪ Senior center
▪ Place of worship
ONLINE
▪ Join on the conversation
on social media using
▪ #CybersecurityAwarenessMonth
▪ #SecureOurWorld
Building a Strong Cybersecurity Culture
▪ Use basic cybersecurity training. This helps familiarize staff with cybersecurity
concepts and activities associated with implementing cybersecurity best practices.
▪ Identify available cybersecurity training resources. Cybersecurity training
resources—on topics like phishing and good email practices—are available through
professional association, educational institutions, as well as private sector and
government sources.
▪ Stay current on cybersecurity events and incidents. This helps identify lessons
learned and helps to maintain vigilance and agility to cybersecurity trends.
▪ Encourage employees to make good choices online and learn about risks like
phishing and business email compromise.
THE END
Thank you

More Related Content

What's hot

Information Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier UniversityInformation Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier UniversityAtlantic Training, LLC.
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@R_Yanus
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsKrishna Srikanth Manda
 
Introduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security FrameworkIntroduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security FrameworkPECB
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101mateenzero
 
Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to CybersecurityKrutarth Vasavada
 
Information Security Awareness, Petronas Marketing Sudan
Information Security Awareness, Petronas Marketing SudanInformation Security Awareness, Petronas Marketing Sudan
Information Security Awareness, Petronas Marketing SudanAhmed Musaad
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Programdavidcurriecia
 
Cyber security
Cyber securityCyber security
Cyber securitymanoj duli
 
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...Edureka!
 
Awareness Training on Information Security
Awareness Training on Information SecurityAwareness Training on Information Security
Awareness Training on Information SecurityKen Holmes
 
Security awareness training - 4 topics that matter most
Security awareness training - 4 topics that matter mostSecurity awareness training - 4 topics that matter most
Security awareness training - 4 topics that matter mostInfosec
 
NIST Zero Trust Explained
NIST Zero Trust ExplainedNIST Zero Trust Explained
NIST Zero Trust Explainedrtp2009
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness TrainingJen Ruhman
 
What is zero trust model (ztm)
What is zero trust model (ztm)What is zero trust model (ztm)
What is zero trust model (ztm)Ahmed Banafa
 
Information Security It's All About Compliance
Information Security   It's All About ComplianceInformation Security   It's All About Compliance
Information Security It's All About ComplianceDinesh O Bareja
 

What's hot (20)

Information Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier UniversityInformation Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier University
 
Zero Trust
Zero TrustZero Trust
Zero Trust
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
 
Introduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security FrameworkIntroduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security Framework
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101
 
Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to Cybersecurity
 
Information Security Awareness, Petronas Marketing Sudan
Information Security Awareness, Petronas Marketing SudanInformation Security Awareness, Petronas Marketing Sudan
Information Security Awareness, Petronas Marketing Sudan
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Program
 
Cyber security
Cyber securityCyber security
Cyber security
 
Security Awareness Training by Fortinet
Security Awareness Training by FortinetSecurity Awareness Training by Fortinet
Security Awareness Training by Fortinet
 
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
 
Zero Trust Model Presentation
Zero Trust Model PresentationZero Trust Model Presentation
Zero Trust Model Presentation
 
Awareness Training on Information Security
Awareness Training on Information SecurityAwareness Training on Information Security
Awareness Training on Information Security
 
information security awareness course
information security awareness courseinformation security awareness course
information security awareness course
 
Security awareness training - 4 topics that matter most
Security awareness training - 4 topics that matter mostSecurity awareness training - 4 topics that matter most
Security awareness training - 4 topics that matter most
 
NIST Zero Trust Explained
NIST Zero Trust ExplainedNIST Zero Trust Explained
NIST Zero Trust Explained
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness Training
 
What is zero trust model (ztm)
What is zero trust model (ztm)What is zero trust model (ztm)
What is zero trust model (ztm)
 
Information Security It's All About Compliance
Information Security   It's All About ComplianceInformation Security   It's All About Compliance
Information Security It's All About Compliance
 

Similar to Webinar_Cybersecurity is a shared responsibility presentation

Executive Directors Chat:It's easy to stay safe online.pdf
Executive Directors Chat:It's easy to stay safe online.pdfExecutive Directors Chat:It's easy to stay safe online.pdf
Executive Directors Chat:It's easy to stay safe online.pdfTechSoup
 
Users awarness programme for Online Privacy
Users awarness programme for Online PrivacyUsers awarness programme for Online Privacy
Users awarness programme for Online PrivacyKazi Sarwar Hossain
 
Unveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity postureUnveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity postureLourdes Paloma Gimenez
 
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptxCYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptxBarakaMuyengi
 
5 Security Tips to Protect Your Login Credentials and More
5 Security Tips to Protect Your Login Credentials and More5 Security Tips to Protect Your Login Credentials and More
5 Security Tips to Protect Your Login Credentials and MoreCommunity IT Innovators
 
cybersecurity.pptx
cybersecurity.pptxcybersecurity.pptx
cybersecurity.pptxxanparker
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptxCharithraaAR
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayane Hazimeh
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayane Hazimeh
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital AgeMarian Merritt
 
Cybersecurity Awareness E-book by Propelled Technologies
Cybersecurity Awareness E-book by Propelled Technologies Cybersecurity Awareness E-book by Propelled Technologies
Cybersecurity Awareness E-book by Propelled Technologies Anwar CHFI, SSCP, ITIL
 
Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things The Center for Identity
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02amiinaaa
 
What is Cybercrime and How to Prevent Cybercrime?
What is Cybercrime and How to Prevent Cybercrime?What is Cybercrime and How to Prevent Cybercrime?
What is Cybercrime and How to Prevent Cybercrime?Entrance Exam Info
 

Similar to Webinar_Cybersecurity is a shared responsibility presentation (20)

Executive Directors Chat:It's easy to stay safe online.pdf
Executive Directors Chat:It's easy to stay safe online.pdfExecutive Directors Chat:It's easy to stay safe online.pdf
Executive Directors Chat:It's easy to stay safe online.pdf
 
Users awarness programme for Online Privacy
Users awarness programme for Online PrivacyUsers awarness programme for Online Privacy
Users awarness programme for Online Privacy
 
Unveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity postureUnveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity posture
 
Cybersecurity awareness.pdf
Cybersecurity awareness.pdfCybersecurity awareness.pdf
Cybersecurity awareness.pdf
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptxCYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
 
5 Security Tips to Protect Your Login Credentials and More
5 Security Tips to Protect Your Login Credentials and More5 Security Tips to Protect Your Login Credentials and More
5 Security Tips to Protect Your Login Credentials and More
 
cybersecurity.pptx
cybersecurity.pptxcybersecurity.pptx
cybersecurity.pptx
 
Masterclass_ Cybersecurity and Data Privacy Basics
Masterclass_ Cybersecurity and Data Privacy BasicsMasterclass_ Cybersecurity and Data Privacy Basics
Masterclass_ Cybersecurity and Data Privacy Basics
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptx
 
Secure End User
Secure End UserSecure End User
Secure End User
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital Age
 
Digital Security and Hygiene.pptx
Digital Security and Hygiene.pptxDigital Security and Hygiene.pptx
Digital Security and Hygiene.pptx
 
Cybersecurity Awareness E-book by Propelled Technologies
Cybersecurity Awareness E-book by Propelled Technologies Cybersecurity Awareness E-book by Propelled Technologies
Cybersecurity Awareness E-book by Propelled Technologies
 
Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things
 
Cyber security
Cyber securityCyber security
Cyber security
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
 
What is Cybercrime and How to Prevent Cybercrime?
What is Cybercrime and How to Prevent Cybercrime?What is Cybercrime and How to Prevent Cybercrime?
What is Cybercrime and How to Prevent Cybercrime?
 

More from 211 Check

Prebunking and Debunking in Fact-checking
Prebunking and Debunking in Fact-checkingPrebunking and Debunking in Fact-checking
Prebunking and Debunking in Fact-checking211 Check
 
HOW TO WRITE A FACT-CHECK: Master the art of writing a fact-check
HOW TO WRITE A FACT-CHECK: Master the art of writing a fact-checkHOW TO WRITE A FACT-CHECK: Master the art of writing a fact-check
HOW TO WRITE A FACT-CHECK: Master the art of writing a fact-check211 Check
 
211 CHECK ANNUAL IMPACT REPORT 2023
211 CHECK ANNUAL IMPACT REPORT 2023211 CHECK ANNUAL IMPACT REPORT 2023
211 CHECK ANNUAL IMPACT REPORT 2023211 Check
 
Unmasking Disinformation and Misinformation in South Sudan_Understanding the ...
Unmasking Disinformation and Misinformation in South Sudan_Understanding the ...Unmasking Disinformation and Misinformation in South Sudan_Understanding the ...
Unmasking Disinformation and Misinformation in South Sudan_Understanding the ...211 Check
 
Presentation: Unmasking Dis/Misinformation in South Sudan: Understanding the ...
Presentation: Unmasking Dis/Misinformation in South Sudan: Understanding the ...Presentation: Unmasking Dis/Misinformation in South Sudan: Understanding the ...
Presentation: Unmasking Dis/Misinformation in South Sudan: Understanding the ...211 Check
 
Mental Health in Fact-checking and Journalism: Dealing with Stress and Trauma
Mental Health in Fact-checking and Journalism: Dealing with Stress and TraumaMental Health in Fact-checking and Journalism: Dealing with Stress and Trauma
Mental Health in Fact-checking and Journalism: Dealing with Stress and Trauma211 Check
 
Penetration Testing for Cybersecurity Professionals
Penetration Testing for Cybersecurity ProfessionalsPenetration Testing for Cybersecurity Professionals
Penetration Testing for Cybersecurity Professionals211 Check
 
Mapping, Researching and Documenting Hate Speech_Skills for Civil Society O...
Mapping, Researching and  Documenting Hate Speech_Skills for Civil Society  O...Mapping, Researching and  Documenting Hate Speech_Skills for Civil Society  O...
Mapping, Researching and Documenting Hate Speech_Skills for Civil Society O...211 Check
 
Online Research_How to get the best out of internet searches
Online Research_How to get the best out of internet searchesOnline Research_How to get the best out of internet searches
Online Research_How to get the best out of internet searches211 Check
 
Artificial Intelligence (AI)_ A Friend or Enemy in Combating Disinformation ...
Artificial Intelligence (AI)_  A Friend or Enemy in Combating Disinformation ...Artificial Intelligence (AI)_  A Friend or Enemy in Combating Disinformation ...
Artificial Intelligence (AI)_ A Friend or Enemy in Combating Disinformation ...211 Check
 
Techniques and Tools for fact-checking
Techniques and Tools for fact-checkingTechniques and Tools for fact-checking
Techniques and Tools for fact-checking211 Check
 
Discarding confusion: Navigating Information Disorder in South Sudan
Discarding confusion: Navigating Information Disorder in South SudanDiscarding confusion: Navigating Information Disorder in South Sudan
Discarding confusion: Navigating Information Disorder in South Sudan211 Check
 
211 Check Profile August 2023
211 Check Profile August 2023211 Check Profile August 2023
211 Check Profile August 2023211 Check
 

More from 211 Check (13)

Prebunking and Debunking in Fact-checking
Prebunking and Debunking in Fact-checkingPrebunking and Debunking in Fact-checking
Prebunking and Debunking in Fact-checking
 
HOW TO WRITE A FACT-CHECK: Master the art of writing a fact-check
HOW TO WRITE A FACT-CHECK: Master the art of writing a fact-checkHOW TO WRITE A FACT-CHECK: Master the art of writing a fact-check
HOW TO WRITE A FACT-CHECK: Master the art of writing a fact-check
 
211 CHECK ANNUAL IMPACT REPORT 2023
211 CHECK ANNUAL IMPACT REPORT 2023211 CHECK ANNUAL IMPACT REPORT 2023
211 CHECK ANNUAL IMPACT REPORT 2023
 
Unmasking Disinformation and Misinformation in South Sudan_Understanding the ...
Unmasking Disinformation and Misinformation in South Sudan_Understanding the ...Unmasking Disinformation and Misinformation in South Sudan_Understanding the ...
Unmasking Disinformation and Misinformation in South Sudan_Understanding the ...
 
Presentation: Unmasking Dis/Misinformation in South Sudan: Understanding the ...
Presentation: Unmasking Dis/Misinformation in South Sudan: Understanding the ...Presentation: Unmasking Dis/Misinformation in South Sudan: Understanding the ...
Presentation: Unmasking Dis/Misinformation in South Sudan: Understanding the ...
 
Mental Health in Fact-checking and Journalism: Dealing with Stress and Trauma
Mental Health in Fact-checking and Journalism: Dealing with Stress and TraumaMental Health in Fact-checking and Journalism: Dealing with Stress and Trauma
Mental Health in Fact-checking and Journalism: Dealing with Stress and Trauma
 
Penetration Testing for Cybersecurity Professionals
Penetration Testing for Cybersecurity ProfessionalsPenetration Testing for Cybersecurity Professionals
Penetration Testing for Cybersecurity Professionals
 
Mapping, Researching and Documenting Hate Speech_Skills for Civil Society O...
Mapping, Researching and  Documenting Hate Speech_Skills for Civil Society  O...Mapping, Researching and  Documenting Hate Speech_Skills for Civil Society  O...
Mapping, Researching and Documenting Hate Speech_Skills for Civil Society O...
 
Online Research_How to get the best out of internet searches
Online Research_How to get the best out of internet searchesOnline Research_How to get the best out of internet searches
Online Research_How to get the best out of internet searches
 
Artificial Intelligence (AI)_ A Friend or Enemy in Combating Disinformation ...
Artificial Intelligence (AI)_  A Friend or Enemy in Combating Disinformation ...Artificial Intelligence (AI)_  A Friend or Enemy in Combating Disinformation ...
Artificial Intelligence (AI)_ A Friend or Enemy in Combating Disinformation ...
 
Techniques and Tools for fact-checking
Techniques and Tools for fact-checkingTechniques and Tools for fact-checking
Techniques and Tools for fact-checking
 
Discarding confusion: Navigating Information Disorder in South Sudan
Discarding confusion: Navigating Information Disorder in South SudanDiscarding confusion: Navigating Information Disorder in South Sudan
Discarding confusion: Navigating Information Disorder in South Sudan
 
211 Check Profile August 2023
211 Check Profile August 2023211 Check Profile August 2023
211 Check Profile August 2023
 

Recently uploaded

Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 

Recently uploaded (20)

Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 

Webinar_Cybersecurity is a shared responsibility presentation

  • 3. Topic: CYBERSECURITY IS A SHARED RESPONSIBILITY In today's interconnected world, protecting ourselves from cyber threats is no longer an individual responsibility. It's a shared duty that requires collaboration and awareness.
  • 4. What is Cybersecurity? ▪ Defined as "the protection of computer systems and networks from attacks by malicious actors that may result in unauthorized information disclosure, theft of, or damage to hardware, software, or data..." ▪ Wherever there is technology, there needs to be cybersecurity.
  • 5. Why is it Important? ▪ Implementing cybersecurity best practices is important for individuals as well as organizations of all sizes to protect personal, financial and sensitive information. ▪ For both government and private entities, developing and implementing tailored cybersecurity plans and processes is key to protecting and maintaining business operations.
  • 6. Feelings Toward Cybersecurity ▪ 78% of people consider staying secure online a priority ▪ 34% noted they often feel overwhelmed by information and, as a result, minimize their online actions ▪ 46% felt frustrated while staying secure online ▪ 39% of users trying to keep safe felt information on how to stay secure online is confusing Findings from Oh Behave! The Annual Cybersecurity Attitudes and Behaviors Report 2022
  • 7. Our Online Behaviors ▪ Only 33% of individuals create unique passwords for all accounts ▪ Only 18% of individuals have downloaded a password manager ▪ 43% of respondents have never heard of multifactor authentication (MFA) ▪ Out of the 57% of the participants who had heard about it: ▪ 79% applied it at least once and 94% of them reporting that they were still using MFA ▪ 92% of respondents took action after a security training ▪ 58% say they are better at recognizing phishing ▪ 45% started using strong and unique passwords ▪ 40% started using MFA ▪ 40% started regularly installing software updates Findings from Oh Behave! The Annual Cybersecurity Attitudes and Behaviors Report 2022
  • 8. 4 Easy Ways to Stay Safe Online Use Strong Passwords and a Password Manager Turn on Multifactor Authentication Recognize and Report Phishing Attacks​ Update Your Software​
  • 9. Use Strong Passwords CREATE STRONG PASSWORDS: • Long • At least 16 characters • Unique • NEVER reuse passwords • Complex • Upper- and lower-case letters • Numbers • Special characters • Spaces
  • 10. Use a Password Manager WHY USE A PASSWORD MANAGER? • Stores your passwords • Alerts you of duplicate passwords • Generates strong new passwords • Some automatically fill your login credentials into website to make sign-in easy Encryption ensures that password managers never "know" what your passwords are, keeping them safe from cyber attacks.
  • 11. Turn on Multifactor Authentication WHAT IS IT? • A code sent to your phone or email • An authenticator app • A security key • Biometrics Fingerprint Facial recognition
  • 12. Turn on Multifactor Authentication WHERE SHOULD YOU USE MFA? • Email • Accounts with financial information Ex: Online store • Accounts with personal information Ex: Social media
  • 13. Recognize and Report Phishing PHISHING RED FLAGS: • A tone that’s urgent or makes you scared "Click this link immediately or your account will be closed" • Bad spellings, bad grammar • Requests to send personal info • Sender email address doesn’t match the company it’s coming from Ex: safetycomm.org vs. safetyc0mm.org • An email you weren't expecting
  • 14. Recognize and Report Phishing WHAT TO DO Do NOT • Don't click any links • Don't click any attachments • Don't send personal info Do • Verify • Contact that person directly if it's someone you know • Report it to your IT department • DELETE IT
  • 15. Update Your Software WHY? • Updates ensure your devices and apps are protected from the latest threats • Don't click "remind me later", it could leave you vulnerable to cyber threats • Automatic updates are the easiest way to stay secure
  • 16. Update Your Software WHERE TO FIND AVAILABLE UPDATES • Check for notifications to your phone or computer • Look in your phone, browser or app settings • Check the upper corner of your browser for any alerts
  • 17. Ways to Get Involved AT WORK ▪ Publicize resources and activities ▪ Intranet ▪ Website ▪ Emails to employees/customers ▪ Promotions ▪ Discounts ▪ Giveaways ▪ Hold a contest ▪ Phishing simulation ▪ Poster contest AT HOME ▪ Share helpful tips and resources ▪ Kids ▪ Parents ▪ Friends ▪ Hold a family “tech talk” ▪ Discuss how each family member can protect their devices, accounts, and personal information. ▪ Create a culture of security in your family
  • 18. Ways to Get Involved Cont. IN YOUR COMMUNITY ▪ Volunteer to teach others in your community ▪ Reach out to ▪ Your kid's school ▪ Community center ▪ Senior center ▪ Place of worship ONLINE ▪ Join on the conversation on social media using ▪ #CybersecurityAwarenessMonth ▪ #SecureOurWorld
  • 19. Building a Strong Cybersecurity Culture ▪ Use basic cybersecurity training. This helps familiarize staff with cybersecurity concepts and activities associated with implementing cybersecurity best practices. ▪ Identify available cybersecurity training resources. Cybersecurity training resources—on topics like phishing and good email practices—are available through professional association, educational institutions, as well as private sector and government sources. ▪ Stay current on cybersecurity events and incidents. This helps identify lessons learned and helps to maintain vigilance and agility to cybersecurity trends. ▪ Encourage employees to make good choices online and learn about risks like phishing and business email compromise.