5. Awareness Training is a
necessary!
5
● Technology alone CANNOT protect you for everything
● Attackers focus on where security is the weakness
● Users are the first line of defense, no the last
● Training is a must to reduce cybersecurity risk
● Cybersecurity Awareness Training is for
○ Employees and Business Owners
○ Parents and Seniors
○ Kids and Students
○ Essentially, Everyone!
Many tips that keep you safe at work also keep you
safe at home!
7. Credit Card and
Financial Data
Banking Account, Card
Numbers
Medical
Data
Prescription, Insurance,
or Identity Fraud
User or Email
Credentials
Sending Spam,
Accessibility and
Recovery of other
accounts
Computer
Resources
Cryptomining,
Ransomware,
Advertising, and
Jump Points
Wrong! You are exactly who
they target!
7
9. Users that have
never backed up
Users that
backup yearly
Users that
backup monthly
Users that
backup daily
9
20% 25% 20% 11%
Backups
● Backups protect when all else fails
○ NO level of protection is perfect, only ‘guaranteed’ protection against
ransomware
● Backup Media should NOT be connected at all times
● Test the backups! Restore, Restore, Restore!
10. 10
Updates are Essential to Security
What was secure yesterday, may not be secure today
New Software vulnerabilities are found every day
Over 450,000 new malware (viruses & ransomware) released every day
NOTHING is “Set & Forget”
11. Keeping Your System Up-To-Date
Operating Systems
• Microsoft Windows, Apple
MacOS, Linux
• Windows 7 end of life was
January 2020
Anti-Virus
• Update the latest definitions to
ensure protection
• Symantec/Norton, McAfee, WIndows
Defender, Avast and others!
11
12. Browser
Chrome, Firefox, Edge,
Safari, Brave, etc.
Internet Explorer is not
recommended
Mobile Devices
Cell Phones and Tablets
Internet of Things (IoT)
Alexa, Google Home, Light Bulbs,
Thermostats, Doorbells,
Surveillance Systems, Smart
Locks, etc.
12
Don’t Forget to Update
14. Managing Passwords
14
Keep Your Passwords
in a SECURE location
Do NOT use paper or
sticky notes
Do NOT store passwords
in clear-text on your
computer
Utilize a Password
Manager
• Bitwarden
• KeePass
• LastPass
• Chrome?
• Apple Keychain?
Benefits of a Password
Manager
• One strong password to access
them all
• Passwords are stored securely
• Auto-fill username/password on
websites
• Sync between desktop, laptop,
and mobile devices
15. Rely on
sticky notes
Reuse password for
multiple accounts
Use name and
birthdate
Reuse same password
for all accounts
15
42% 52% 59% 13%
Password Tips
● Avoid using items that can be associated with you
○ Address, Phone Numbers, Pet Names, Child Names, Birthdays, Teams
● Seperate passwords for every account
● Auto-Generated, near impossible to guess
Easy with a
password Manager
16. Passphrases,
Not Passwords
16
Useful when passwords must be typed in
Let’s Create a Password.
Should NOT be easy
to guess
At least 12 Characters
Length better than
“complexity”
Uppercase, lowercase,
numbers and special
characters
18. What is 2 Factor Authentication?
It goes beyond the username and password, it is a second form to prove that it is you. 2
Factor Authentication usually uses an out-of-band system, like at Fort Hays State
University, we use DUO!
• SMS
• Phone Call
• Email
• Phone Pop-Up
FUN FACT
99.9% LESS likely to be compromised if you use Multi-Factor Authentication 18
2 Factor-Authentication
Applications:
- Google AUthenticator
- Microsoft Authenticator
- Built In Password Manager
Your One Time Code is…
20. Verify
Were you expecting this
link?
● Not just email!
Social Media
● SMS / iMessage
● Zoom, Teams,
Slack, etc.
Hover
Hover over the link to
ensure that it leads to
where it says it does
Sniff Test
Is it a site you
recognize?
Does it feel “familiar” to
you?
Be skeptical
Click
Does it pass all 3 tests?
Still use caution
“When in doubt, throw it
out”
4 Steps for Link Safety
20
22. 22
Email Attachments
Stop & think before you click!
Recognized Sender?
Over 450,000 new malware (viruses & ransomware) released every day
NOTHING is “Set & Forget”
23. Slide 1:
Phishing - a type of cyber attack where
scammers send fake emails, text messages
or make phone calls in order to trick people
into providing sensitive information such as
passwords, credit card numbers, and social
security numbers. Examples: A scammer
might send an email posing as a bank or other
trusted organization, asking the recipient to
click a link and enter their login credentials.
23
24. Slide 2:
Malware - short for malicious software,
malware is software designed to harm a
computer system or network. Examples:
viruses, worms, Trojan horses, and
ransomware.
24
25. Slide 3:
Social engineering - the use of deception to
manipulate individuals into divulging
confidential or personal information.
Examples: A cybercriminal might pose as a
trusted friend or acquaintance to gain access
to sensitive information, or might use
pretexting to trick someone into giving up
their login credentials.
25
26. Slide 4:
Password security - the practice of creating
strong passwords and using different
passwords for different accounts to prevent
unauthorized access. Examples: A strong
password might include a mix of upper and
lowercase letters, numbers, and symbols,
while a weak password might be a word
found in the dictionary.
26
27. Slide 5:
Multi-factor authentication - a security
system that requires users to verify their
identity in more than one way, typically with a
password and another form of identification
such as a fingerprint or a security token.
Examples: When logging into an account, a
user might need to enter their password and
a unique code sent to their phone.
27
28. Slide 1:
Phishing - a type of cyber attack where
scammers send fake emails, text messages
or make phone calls in order to trick people
into providing sensitive information such as
passwords, credit card numbers, and social
security numbers. Examples: A scammer
might send an email posing as a bank or other
trusted organization, asking the recipient to
click a link and enter their login credentials.
28
29. 29
Elaborate on what you want to discuss.
Slide 2:
Malware - short for malicious
software, malware is software
designed to harm a computer
system or network. Examples:
viruses, worms, Trojan horses,
and ransomware.
30. Use these icons and illustrations in
your Canva Presentation. Happy
designing! Don't forget to delete
this page before presenting.
Resource
page
30
31. Write Your Topic or Idea
Add a main point
Elaborate on what you want
to discuss.
Add a main point
Elaborate on what you want
to discuss.
Add a main point
Elaborate on what you want
to discuss.
31
Add a main point
Elaborate on what you want
to discuss.
Add a main point
Elaborate on what you want
to discuss.
Add a main point
Elaborate on what you want
to discuss.
33. Add a Team Members Page
Elaborate on what you want to discuss.
NAME
Title or Position
NAME
Title or Position
NAME
Title or Position
NAME
Title or Position
33
35. Add a Chart Page
Name
Job Title
Name
Job Title
Name
Job Title
Name
Job Title
Name
Job Title
Name
Job Title
Name
Job Title
35
36. Month 1 Month 2 Month 3 Month 4 Month 5
Tasks
Write your task here
Write your task here
Write your task here
Write your task here
Write your task here
Write your task here
Write your task here
Write your task here
Add a Gantt Chart Page
36
37. Credits
Special thanks to all the people who made and
released these awesome resources for free:
• Presentation template by SlidesCarnival
• Photographs by Pexels
37
38. Presentation design
This presentation uses the following typographies:
• Titles: Barlow Bold
• Body copy: Barlow Normal
They are free to use and easily available for download on the
Internet.
You must install them on your computer if you are going to edit this
presentation in PowerPoint®. 38
39. Free templates for all your presentation needs
Ready to use,
professional and
customizable
100% free for personal
or commercial use
Blow your audience
away with attractive
visuals
For PowerPoint and
Google Slides