SlideShare a Scribd company logo
1 of 11
CYBERSECURITY
AWARENESS 2022
CAP ROCK TELEPHONE COOPERATIVE, INC.
CONNECTING THE FUTURE
A MESSAGE
FROM
PATRICK
As a person whose mother
was targeted online by a
Texas prison inmate who
was given Internet privileges,
I have developed a deep
passion for cybersecurity
and all that it entails. I do
not claim to be an expert on
the subject (not yet anyway)
but my hope is that by
sharing what I do know will
help at least one person to
avoid what could be a life
altering cyber attack. The
effects can linger for the rest
of your life. SEC RITY is not
complete without U. Be safe
online, we are ALL
connected.
No Technology That’s Connected To
The Internet Is Unhackable.
“It takes 20 years to build a reputation and a few minutes
of cyber-incident to ruin it.”
– Stephane Nappo
Hackers Don’t Break In, They Login
Keep Personal
Information Professional
and Limited
Practice Safe Browsing
Make Sure Your Internet
Connection is Secure
(never bank over open
public Wi-Fi)
Be Careful What You
Download
Choose Strong Passwords
(phrases work best)
Make Online Purchases
From Secure Sites
Be Careful What You Post
(vacation posts can lead to
home break-ins)
Be Careful Who You Meet
Online
4 TYPES OF CYBERSECURITY THREATS
PHISHING
This type of threat is the practice of sending fraudulent
emails that resemble emails from legitimate sources.
The attacker aims to steal sensitive information like
credit card numbers and login information. It is by far
the most common type of cyber attack. Cap Rock has
an excellent filter solution but remember, all
technology connected to the Internet has the potential
to be hacked.
SOCIAL ENGINEERING
Social Engineering takes on a manipulative approach in
that the actor will try to “trick” you into revealing
personal or confidential information using authoritative
or urgent tactics. The actor will try to gain your trust to
get you to reveal Personally Identifiable Information
(PII). More damage can be done with just your cell
phone number than you realize.
MALWARE
Malicious Software (Malware) is a type of software
designed to gain unauthorized access to computer
systems often resulting in damage or failure. A
computer cannot judge intent therefore malware may
coincide with your computer’s normal functionality. To
sum it up; Malware is bad software. Think before you
click!
RANSOMWARE
Ransomware is one of many types of Malware. The
threat actors using this technique have taken things to
a new level of cyber crime; extortion. The actors will
block access to files by encrypting them one by one
while deleting the originals and demanding payment
(ransom) for the decryption key. Recent statistics show
that telecommunications has surpassed healthcare as
the most frequently targeted sector of Ransomware
hijackers. This is especially concerning for obvious
reasons. Help protect our livelihood!
NO MORE PASSWORDS?
The Fast Identity Online or FIDO Alliance and The World
Wide Web Consortium are on track to eliminate
passwords altogether. Giants like Google, Apple, and
Microsoft are forging this password-free future
together. This will be possible by utilizing a
cryptographic token called a passkey shared by your
cell phone and the website or app you are using. Logins
will be as simple as typing in your PIN, drawing a
pattern, or using biometrics; face recognition or
fingerprint. You might use these today, but you still
have a password.
-REMEMBER-
FREE SPEECH DOESN’T MEAN CARELESS
TALK!
What happens at Cap Rock stays at Cap Rock. One must
watch what is said in the office, around town, and at
home. Cybersecurity must be practiced daily to avoid
any slip-ups. Thank you for taking the time to complete
this presentation. Enjoy the rest of your day!
-Patrick

More Related Content

Similar to Cybersecurity Training 2022

Computer Security for Lawyers
Computer Security for LawyersComputer Security for Lawyers
Computer Security for Lawyers
Mark Lanterman
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet Security
Ashley Zimmerman
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet Security
JFashant
 
Getting users to care about security
Getting users to care about securityGetting users to care about security
Getting users to care about security
Alison Gianotto
 
Cyber Crime & Security.pdf
Cyber Crime & Security.pdfCyber Crime & Security.pdf
Cyber Crime & Security.pdf
MohanPandey31
 

Similar to Cybersecurity Training 2022 (20)

Computer Security for Lawyers
Computer Security for LawyersComputer Security for Lawyers
Computer Security for Lawyers
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet Security
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet Security
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorism
 
cyber terrorism
 cyber terrorism  cyber terrorism
cyber terrorism
 
Security Primer
Security PrimerSecurity Primer
Security Primer
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Getting users to care about security
Getting users to care about securityGetting users to care about security
Getting users to care about security
 
Cyber Security Professionals in Demand
Cyber Security Professionals in DemandCyber Security Professionals in Demand
Cyber Security Professionals in Demand
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
A Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.comA Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.com
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Name parul
Name parulName parul
Name parul
 
Name parul
Name parulName parul
Name parul
 
Sophos a-to-z
Sophos a-to-z Sophos a-to-z
Sophos a-to-z
 
Hamza
HamzaHamza
Hamza
 
Ransomware all locked up book
Ransomware all locked up bookRansomware all locked up book
Ransomware all locked up book
 
Cyber Crime & Security.pdf
Cyber Crime & Security.pdfCyber Crime & Security.pdf
Cyber Crime & Security.pdf
 

More from CapRockTelephone

March - Ergonomics in the HOME office and STFs.pptx
March - Ergonomics in the HOME office and STFs.pptxMarch - Ergonomics in the HOME office and STFs.pptx
March - Ergonomics in the HOME office and STFs.pptx
CapRockTelephone
 

More from CapRockTelephone (20)

First Aid
First Aid First Aid
First Aid
 
CPNI Training 2022.pptx
CPNI Training 2022.pptxCPNI Training 2022.pptx
CPNI Training 2022.pptx
 
EMERGENCY OPERATIONS PLAN.pptx
EMERGENCY OPERATIONS PLAN.pptxEMERGENCY OPERATIONS PLAN.pptx
EMERGENCY OPERATIONS PLAN.pptx
 
Step One National Preparedness Month 2022.pptx
Step One National Preparedness Month 2022.pptxStep One National Preparedness Month 2022.pptx
Step One National Preparedness Month 2022.pptx
 
September 2022 Monthly Safety Presentation.pptx
September 2022 Monthly Safety Presentation.pptxSeptember 2022 Monthly Safety Presentation.pptx
September 2022 Monthly Safety Presentation.pptx
 
Customer Homes 2022.pptx
Customer Homes 2022.pptxCustomer Homes 2022.pptx
Customer Homes 2022.pptx
 
Wildfire Awareness
Wildfire AwarenessWildfire Awareness
Wildfire Awareness
 
April 2022 -Safety Training
April 2022 -Safety TrainingApril 2022 -Safety Training
April 2022 -Safety Training
 
April 2022 - Safety Training
April 2022 - Safety TrainingApril 2022 - Safety Training
April 2022 - Safety Training
 
April 2022- Safety Training 1
April 2022- Safety Training 1April 2022- Safety Training 1
April 2022- Safety Training 1
 
March - Ergonomics in the HOME office and STFs.pptx
March - Ergonomics in the HOME office and STFs.pptxMarch - Ergonomics in the HOME office and STFs.pptx
March - Ergonomics in the HOME office and STFs.pptx
 
February Safety Training
February Safety TrainingFebruary Safety Training
February Safety Training
 
January 2022 driving exposures
January 2022 driving exposuresJanuary 2022 driving exposures
January 2022 driving exposures
 
Personal Protective Equip
Personal Protective EquipPersonal Protective Equip
Personal Protective Equip
 
Jan 2020 - Safety Training Powerpoint
Jan 2020 - Safety Training PowerpointJan 2020 - Safety Training Powerpoint
Jan 2020 - Safety Training Powerpoint
 
Brown recluse spider (1)
Brown recluse spider (1)Brown recluse spider (1)
Brown recluse spider (1)
 
Bites and stings April 2019
Bites and stings April 2019Bites and stings April 2019
Bites and stings April 2019
 
Respiratory Protection
Respiratory ProtectionRespiratory Protection
Respiratory Protection
 
Slips, Trips and Falls
Slips, Trips and FallsSlips, Trips and Falls
Slips, Trips and Falls
 
Drunk Driving Awareness
Drunk Driving AwarenessDrunk Driving Awareness
Drunk Driving Awareness
 

Recently uploaded

Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsIndian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Monica Sydney
 
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
ayvbos
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
ydyuyu
 
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
ydyuyu
 
75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx
Asmae Rabhi
 
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
ayvbos
 
PowerDirector Explination Process...pptx
PowerDirector Explination Process...pptxPowerDirector Explination Process...pptx
PowerDirector Explination Process...pptx
galaxypingy
 
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsRussian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Monica Sydney
 
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
JOHNBEBONYAP1
 

Recently uploaded (20)

Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
 
Best SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency DallasBest SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency Dallas
 
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrStory Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
 
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
 
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsIndian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
 
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
 
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency""Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
 
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
 
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
 
75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx
 
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirt
 
PowerDirector Explination Process...pptx
PowerDirector Explination Process...pptxPowerDirector Explination Process...pptx
PowerDirector Explination Process...pptx
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
 
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
 
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsRussian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
 
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
 

Cybersecurity Training 2022

  • 1. CYBERSECURITY AWARENESS 2022 CAP ROCK TELEPHONE COOPERATIVE, INC. CONNECTING THE FUTURE
  • 2. A MESSAGE FROM PATRICK As a person whose mother was targeted online by a Texas prison inmate who was given Internet privileges, I have developed a deep passion for cybersecurity and all that it entails. I do not claim to be an expert on the subject (not yet anyway) but my hope is that by sharing what I do know will help at least one person to avoid what could be a life altering cyber attack. The effects can linger for the rest of your life. SEC RITY is not complete without U. Be safe online, we are ALL connected.
  • 3. No Technology That’s Connected To The Internet Is Unhackable. “It takes 20 years to build a reputation and a few minutes of cyber-incident to ruin it.” – Stephane Nappo
  • 4. Hackers Don’t Break In, They Login Keep Personal Information Professional and Limited Practice Safe Browsing Make Sure Your Internet Connection is Secure (never bank over open public Wi-Fi) Be Careful What You Download Choose Strong Passwords (phrases work best) Make Online Purchases From Secure Sites Be Careful What You Post (vacation posts can lead to home break-ins) Be Careful Who You Meet Online
  • 5. 4 TYPES OF CYBERSECURITY THREATS
  • 6. PHISHING This type of threat is the practice of sending fraudulent emails that resemble emails from legitimate sources. The attacker aims to steal sensitive information like credit card numbers and login information. It is by far the most common type of cyber attack. Cap Rock has an excellent filter solution but remember, all technology connected to the Internet has the potential to be hacked.
  • 7. SOCIAL ENGINEERING Social Engineering takes on a manipulative approach in that the actor will try to “trick” you into revealing personal or confidential information using authoritative or urgent tactics. The actor will try to gain your trust to get you to reveal Personally Identifiable Information (PII). More damage can be done with just your cell phone number than you realize.
  • 8. MALWARE Malicious Software (Malware) is a type of software designed to gain unauthorized access to computer systems often resulting in damage or failure. A computer cannot judge intent therefore malware may coincide with your computer’s normal functionality. To sum it up; Malware is bad software. Think before you click!
  • 9. RANSOMWARE Ransomware is one of many types of Malware. The threat actors using this technique have taken things to a new level of cyber crime; extortion. The actors will block access to files by encrypting them one by one while deleting the originals and demanding payment (ransom) for the decryption key. Recent statistics show that telecommunications has surpassed healthcare as the most frequently targeted sector of Ransomware hijackers. This is especially concerning for obvious reasons. Help protect our livelihood!
  • 10. NO MORE PASSWORDS? The Fast Identity Online or FIDO Alliance and The World Wide Web Consortium are on track to eliminate passwords altogether. Giants like Google, Apple, and Microsoft are forging this password-free future together. This will be possible by utilizing a cryptographic token called a passkey shared by your cell phone and the website or app you are using. Logins will be as simple as typing in your PIN, drawing a pattern, or using biometrics; face recognition or fingerprint. You might use these today, but you still have a password.
  • 11. -REMEMBER- FREE SPEECH DOESN’T MEAN CARELESS TALK! What happens at Cap Rock stays at Cap Rock. One must watch what is said in the office, around town, and at home. Cybersecurity must be practiced daily to avoid any slip-ups. Thank you for taking the time to complete this presentation. Enjoy the rest of your day! -Patrick