SlideShare a Scribd company logo
1 of 39
FHSU CITI
Cybersecurity Training
01
Hi, Welcome to the FHSU CITI
Micro-Internship Portal!
2
3
This presentation was
created in partnership
with TreeTop Security
Why is cybersecurity
awareness important?
4
Awareness Training is a
necessary!
5
● Technology alone CANNOT protect you for everything
● Attackers focus on where security is the weakness
● Users are the first line of defense, no the last
● Training is a must to reduce cybersecurity risk
● Cybersecurity Awareness Training is for
○ Employees and Business Owners
○ Parents and Seniors
○ Kids and Students
○ Essentially, Everyone!
Many tips that keep you safe at work also keep you
safe at home!
But an attacker isn’t
interested in me…
6
Credit Card and
Financial Data
Banking Account, Card
Numbers
Medical
Data
Prescription, Insurance,
or Identity Fraud
User or Email
Credentials
Sending Spam,
Accessibility and
Recovery of other
accounts
Computer
Resources
Cryptomining,
Ransomware,
Advertising, and
Jump Points
Wrong! You are exactly who
they target!
7
How do I protect
myself?
8
Users that have
never backed up
Users that
backup yearly
Users that
backup monthly
Users that
backup daily
9
20% 25% 20% 11%
Backups
● Backups protect when all else fails
○ NO level of protection is perfect, only ‘guaranteed’ protection against
ransomware
● Backup Media should NOT be connected at all times
● Test the backups! Restore, Restore, Restore!
10
Updates are Essential to Security
What was secure yesterday, may not be secure today
New Software vulnerabilities are found every day
Over 450,000 new malware (viruses & ransomware) released every day
NOTHING is “Set & Forget”
Keeping Your System Up-To-Date
Operating Systems
• Microsoft Windows, Apple
MacOS, Linux
• Windows 7 end of life was
January 2020
Anti-Virus
• Update the latest definitions to
ensure protection
• Symantec/Norton, McAfee, WIndows
Defender, Avast and others!
11
Browser
Chrome, Firefox, Edge,
Safari, Brave, etc.
Internet Explorer is not
recommended
Mobile Devices
Cell Phones and Tablets
Internet of Things (IoT)
Alexa, Google Home, Light Bulbs,
Thermostats, Doorbells,
Surveillance Systems, Smart
Locks, etc.
12
Don’t Forget to Update
All About Passwords:
They’re secure right?
13
Managing Passwords
14
Keep Your Passwords
in a SECURE location
Do NOT use paper or
sticky notes
Do NOT store passwords
in clear-text on your
computer
Utilize a Password
Manager
• Bitwarden
• KeePass
• LastPass
• Chrome?
• Apple Keychain?
Benefits of a Password
Manager
• One strong password to access
them all
• Passwords are stored securely
• Auto-fill username/password on
websites
• Sync between desktop, laptop,
and mobile devices
Rely on
sticky notes
Reuse password for
multiple accounts
Use name and
birthdate
Reuse same password
for all accounts
15
42% 52% 59% 13%
Password Tips
● Avoid using items that can be associated with you
○ Address, Phone Numbers, Pet Names, Child Names, Birthdays, Teams
● Seperate passwords for every account
● Auto-Generated, near impossible to guess
Easy with a
password Manager
Passphrases,
Not Passwords
16
Useful when passwords must be typed in
Let’s Create a Password.
Should NOT be easy
to guess
At least 12 Characters
Length better than
“complexity”
Uppercase, lowercase,
numbers and special
characters
17
Image Source:
Hive Systems
Time for an
attacker to
brute force
passwords
What color
are you in?
What is 2 Factor Authentication?
It goes beyond the username and password, it is a second form to prove that it is you. 2
Factor Authentication usually uses an out-of-band system, like at Fort Hays State
University, we use DUO!
• SMS
• Phone Call
• Email
• Phone Pop-Up
FUN FACT
99.9% LESS likely to be compromised if you use Multi-Factor Authentication 18
2 Factor-Authentication
Applications:
- Google AUthenticator
- Microsoft Authenticator
- Built In Password Manager
Your One Time Code is…
Just A Little Click:
Link Safety
19
Verify
Were you expecting this
link?
● Not just email!
Social Media
● SMS / iMessage
● Zoom, Teams,
Slack, etc.
Hover
Hover over the link to
ensure that it leads to
where it says it does
Sniff Test
Is it a site you
recognize?
Does it feel “familiar” to
you?
Be skeptical
Click
Does it pass all 3 tests?
Still use caution
“When in doubt, throw it
out”
4 Steps for Link Safety
20
92% of malware are
delivered by email
21
22
Email Attachments
Stop & think before you click!
Recognized Sender?
Over 450,000 new malware (viruses & ransomware) released every day
NOTHING is “Set & Forget”
Slide 1:
Phishing - a type of cyber attack where
scammers send fake emails, text messages
or make phone calls in order to trick people
into providing sensitive information such as
passwords, credit card numbers, and social
security numbers. Examples: A scammer
might send an email posing as a bank or other
trusted organization, asking the recipient to
click a link and enter their login credentials.
23
Slide 2:
Malware - short for malicious software,
malware is software designed to harm a
computer system or network. Examples:
viruses, worms, Trojan horses, and
ransomware.
24
Slide 3:
Social engineering - the use of deception to
manipulate individuals into divulging
confidential or personal information.
Examples: A cybercriminal might pose as a
trusted friend or acquaintance to gain access
to sensitive information, or might use
pretexting to trick someone into giving up
their login credentials.
25
Slide 4:
Password security - the practice of creating
strong passwords and using different
passwords for different accounts to prevent
unauthorized access. Examples: A strong
password might include a mix of upper and
lowercase letters, numbers, and symbols,
while a weak password might be a word
found in the dictionary.
26
Slide 5:
Multi-factor authentication - a security
system that requires users to verify their
identity in more than one way, typically with a
password and another form of identification
such as a fingerprint or a security token.
Examples: When logging into an account, a
user might need to enter their password and
a unique code sent to their phone.
27
Slide 1:
Phishing - a type of cyber attack where
scammers send fake emails, text messages
or make phone calls in order to trick people
into providing sensitive information such as
passwords, credit card numbers, and social
security numbers. Examples: A scammer
might send an email posing as a bank or other
trusted organization, asking the recipient to
click a link and enter their login credentials.
28
29
Elaborate on what you want to discuss.
Slide 2:
Malware - short for malicious
software, malware is software
designed to harm a computer
system or network. Examples:
viruses, worms, Trojan horses,
and ransomware.
Use these icons and illustrations in
your Canva Presentation. Happy
designing! Don't forget to delete
this page before presenting.
Resource
page
30
Write Your Topic or Idea
Add a main point
Elaborate on what you want
to discuss.
Add a main point
Elaborate on what you want
to discuss.
Add a main point
Elaborate on what you want
to discuss.
31
Add a main point
Elaborate on what you want
to discuss.
Add a main point
Elaborate on what you want
to discuss.
Add a main point
Elaborate on what you want
to discuss.
Thank you!
Write a closing statement or call-to-action here.
32
Add a Team Members Page
Elaborate on what you want to discuss.
NAME
Title or Position
NAME
Title or Position
NAME
Title or Position
NAME
Title or Position
33
Item
1
Item
2
Item
3
Item
4
Item
5
50
40
30
20
10
0
Write Your
Topic or Idea
34
Elaborate on what you want to discuss.
Add a Chart Page
Name
Job Title
Name
Job Title
Name
Job Title
Name
Job Title
Name
Job Title
Name
Job Title
Name
Job Title
35
Month 1 Month 2 Month 3 Month 4 Month 5
Tasks
Write your task here
Write your task here
Write your task here
Write your task here
Write your task here
Write your task here
Write your task here
Write your task here
Add a Gantt Chart Page
36
Credits
Special thanks to all the people who made and
released these awesome resources for free:
• Presentation template by SlidesCarnival
• Photographs by Pexels
37
Presentation design
This presentation uses the following typographies:
• Titles: Barlow Bold
• Body copy: Barlow Normal
They are free to use and easily available for download on the
Internet.
You must install them on your computer if you are going to edit this
presentation in PowerPoint®. 38
Free templates for all your presentation needs
Ready to use,
professional and
customizable
100% free for personal
or commercial use
Blow your audience
away with attractive
visuals
For PowerPoint and
Google Slides

More Related Content

Similar to FHSU CITI CS Training.pptx

Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness TrainingJen Ruhman
 
Security and the Service Desk
Security and the Service DeskSecurity and the Service Desk
Security and the Service DeskNorthCoastHDI
 
Cyber security for small businesses
Cyber security for small businessesCyber security for small businesses
Cyber security for small businessesB2BPlanner Ltd.
 
Cyber security in a trump era [1/15/2017]
Cyber security in a trump era [1/15/2017]Cyber security in a trump era [1/15/2017]
Cyber security in a trump era [1/15/2017]Ann Lewis
 
7 Small Business Security Tips
7 Small Business Security Tips7 Small Business Security Tips
7 Small Business Security TipsInfusionsoft
 
Unveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity postureUnveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity postureLourdes Paloma Gimenez
 
Information Security and Compliance Follow-up Cource 2019
Information Security and Compliance Follow-up Cource 2019Information Security and Compliance Follow-up Cource 2019
Information Security and Compliance Follow-up Cource 2019imc-isec-comp
 
Working from home- How secure is it.pdf
Working from home- How secure is it.pdfWorking from home- How secure is it.pdf
Working from home- How secure is it.pdfFiyona Nourin
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101mateenzero
 
Rothke Sia 2006
Rothke   Sia 2006Rothke   Sia 2006
Rothke Sia 2006Ben Rothke
 
Cybersecurity Awareness Training Presentation v1.3
Cybersecurity Awareness Training Presentation v1.3Cybersecurity Awareness Training Presentation v1.3
Cybersecurity Awareness Training Presentation v1.3DallasHaselhorst
 
Users awarness programme for Online Privacy
Users awarness programme for Online PrivacyUsers awarness programme for Online Privacy
Users awarness programme for Online PrivacyKazi Sarwar Hossain
 
Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0DallasHaselhorst
 
Awareness Security 123.pptx
Awareness Security 123.pptxAwareness Security 123.pptx
Awareness Security 123.pptxRajuSingh730938
 
USG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptxUSG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptxBilmyRikas
 
USG_Security_Awareness_Primer (1).pptx
USG_Security_Awareness_Primer (1).pptxUSG_Security_Awareness_Primer (1).pptx
USG_Security_Awareness_Primer (1).pptxssuser59e4b8
 
USG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptxUSG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptxsumita02
 
CYBER_SECURITY_BASICS_FINAL.pptx
CYBER_SECURITY_BASICS_FINAL.pptxCYBER_SECURITY_BASICS_FINAL.pptx
CYBER_SECURITY_BASICS_FINAL.pptxQuiMo3
 

Similar to FHSU CITI CS Training.pptx (20)

Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness Training
 
Security and the Service Desk
Security and the Service DeskSecurity and the Service Desk
Security and the Service Desk
 
Cyber security for small businesses
Cyber security for small businessesCyber security for small businesses
Cyber security for small businesses
 
Cyber security in a trump era [1/15/2017]
Cyber security in a trump era [1/15/2017]Cyber security in a trump era [1/15/2017]
Cyber security in a trump era [1/15/2017]
 
7 Small Business Security Tips
7 Small Business Security Tips7 Small Business Security Tips
7 Small Business Security Tips
 
Unveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity postureUnveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity posture
 
Information Security and Compliance Follow-up Cource 2019
Information Security and Compliance Follow-up Cource 2019Information Security and Compliance Follow-up Cource 2019
Information Security and Compliance Follow-up Cource 2019
 
Working from home- How secure is it.pdf
Working from home- How secure is it.pdfWorking from home- How secure is it.pdf
Working from home- How secure is it.pdf
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101
 
Rothke Sia 2006
Rothke   Sia 2006Rothke   Sia 2006
Rothke Sia 2006
 
Cybersecurity Awareness Training Presentation v1.3
Cybersecurity Awareness Training Presentation v1.3Cybersecurity Awareness Training Presentation v1.3
Cybersecurity Awareness Training Presentation v1.3
 
Users awarness programme for Online Privacy
Users awarness programme for Online PrivacyUsers awarness programme for Online Privacy
Users awarness programme for Online Privacy
 
Keeping Your Cloud Data in Check
Keeping Your Cloud Data in CheckKeeping Your Cloud Data in Check
Keeping Your Cloud Data in Check
 
Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0
 
Awareness Security 123.pptx
Awareness Security 123.pptxAwareness Security 123.pptx
Awareness Security 123.pptx
 
USG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptxUSG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptx
 
USG_Security_Awareness_Primer (1).pptx
USG_Security_Awareness_Primer (1).pptxUSG_Security_Awareness_Primer (1).pptx
USG_Security_Awareness_Primer (1).pptx
 
USG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptxUSG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptx
 
Internet safety
Internet safetyInternet safety
Internet safety
 
CYBER_SECURITY_BASICS_FINAL.pptx
CYBER_SECURITY_BASICS_FINAL.pptxCYBER_SECURITY_BASICS_FINAL.pptx
CYBER_SECURITY_BASICS_FINAL.pptx
 

Recently uploaded

Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersChitralekhaTherkar
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 

Recently uploaded (20)

Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of Powders
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 

FHSU CITI CS Training.pptx

  • 2. Hi, Welcome to the FHSU CITI Micro-Internship Portal! 2
  • 3. 3 This presentation was created in partnership with TreeTop Security
  • 5. Awareness Training is a necessary! 5 ● Technology alone CANNOT protect you for everything ● Attackers focus on where security is the weakness ● Users are the first line of defense, no the last ● Training is a must to reduce cybersecurity risk ● Cybersecurity Awareness Training is for ○ Employees and Business Owners ○ Parents and Seniors ○ Kids and Students ○ Essentially, Everyone! Many tips that keep you safe at work also keep you safe at home!
  • 6. But an attacker isn’t interested in me… 6
  • 7. Credit Card and Financial Data Banking Account, Card Numbers Medical Data Prescription, Insurance, or Identity Fraud User or Email Credentials Sending Spam, Accessibility and Recovery of other accounts Computer Resources Cryptomining, Ransomware, Advertising, and Jump Points Wrong! You are exactly who they target! 7
  • 8. How do I protect myself? 8
  • 9. Users that have never backed up Users that backup yearly Users that backup monthly Users that backup daily 9 20% 25% 20% 11% Backups ● Backups protect when all else fails ○ NO level of protection is perfect, only ‘guaranteed’ protection against ransomware ● Backup Media should NOT be connected at all times ● Test the backups! Restore, Restore, Restore!
  • 10. 10 Updates are Essential to Security What was secure yesterday, may not be secure today New Software vulnerabilities are found every day Over 450,000 new malware (viruses & ransomware) released every day NOTHING is “Set & Forget”
  • 11. Keeping Your System Up-To-Date Operating Systems • Microsoft Windows, Apple MacOS, Linux • Windows 7 end of life was January 2020 Anti-Virus • Update the latest definitions to ensure protection • Symantec/Norton, McAfee, WIndows Defender, Avast and others! 11
  • 12. Browser Chrome, Firefox, Edge, Safari, Brave, etc. Internet Explorer is not recommended Mobile Devices Cell Phones and Tablets Internet of Things (IoT) Alexa, Google Home, Light Bulbs, Thermostats, Doorbells, Surveillance Systems, Smart Locks, etc. 12 Don’t Forget to Update
  • 13. All About Passwords: They’re secure right? 13
  • 14. Managing Passwords 14 Keep Your Passwords in a SECURE location Do NOT use paper or sticky notes Do NOT store passwords in clear-text on your computer Utilize a Password Manager • Bitwarden • KeePass • LastPass • Chrome? • Apple Keychain? Benefits of a Password Manager • One strong password to access them all • Passwords are stored securely • Auto-fill username/password on websites • Sync between desktop, laptop, and mobile devices
  • 15. Rely on sticky notes Reuse password for multiple accounts Use name and birthdate Reuse same password for all accounts 15 42% 52% 59% 13% Password Tips ● Avoid using items that can be associated with you ○ Address, Phone Numbers, Pet Names, Child Names, Birthdays, Teams ● Seperate passwords for every account ● Auto-Generated, near impossible to guess Easy with a password Manager
  • 16. Passphrases, Not Passwords 16 Useful when passwords must be typed in Let’s Create a Password. Should NOT be easy to guess At least 12 Characters Length better than “complexity” Uppercase, lowercase, numbers and special characters
  • 17. 17 Image Source: Hive Systems Time for an attacker to brute force passwords What color are you in?
  • 18. What is 2 Factor Authentication? It goes beyond the username and password, it is a second form to prove that it is you. 2 Factor Authentication usually uses an out-of-band system, like at Fort Hays State University, we use DUO! • SMS • Phone Call • Email • Phone Pop-Up FUN FACT 99.9% LESS likely to be compromised if you use Multi-Factor Authentication 18 2 Factor-Authentication Applications: - Google AUthenticator - Microsoft Authenticator - Built In Password Manager Your One Time Code is…
  • 19. Just A Little Click: Link Safety 19
  • 20. Verify Were you expecting this link? ● Not just email! Social Media ● SMS / iMessage ● Zoom, Teams, Slack, etc. Hover Hover over the link to ensure that it leads to where it says it does Sniff Test Is it a site you recognize? Does it feel “familiar” to you? Be skeptical Click Does it pass all 3 tests? Still use caution “When in doubt, throw it out” 4 Steps for Link Safety 20
  • 21. 92% of malware are delivered by email 21
  • 22. 22 Email Attachments Stop & think before you click! Recognized Sender? Over 450,000 new malware (viruses & ransomware) released every day NOTHING is “Set & Forget”
  • 23. Slide 1: Phishing - a type of cyber attack where scammers send fake emails, text messages or make phone calls in order to trick people into providing sensitive information such as passwords, credit card numbers, and social security numbers. Examples: A scammer might send an email posing as a bank or other trusted organization, asking the recipient to click a link and enter their login credentials. 23
  • 24. Slide 2: Malware - short for malicious software, malware is software designed to harm a computer system or network. Examples: viruses, worms, Trojan horses, and ransomware. 24
  • 25. Slide 3: Social engineering - the use of deception to manipulate individuals into divulging confidential or personal information. Examples: A cybercriminal might pose as a trusted friend or acquaintance to gain access to sensitive information, or might use pretexting to trick someone into giving up their login credentials. 25
  • 26. Slide 4: Password security - the practice of creating strong passwords and using different passwords for different accounts to prevent unauthorized access. Examples: A strong password might include a mix of upper and lowercase letters, numbers, and symbols, while a weak password might be a word found in the dictionary. 26
  • 27. Slide 5: Multi-factor authentication - a security system that requires users to verify their identity in more than one way, typically with a password and another form of identification such as a fingerprint or a security token. Examples: When logging into an account, a user might need to enter their password and a unique code sent to their phone. 27
  • 28. Slide 1: Phishing - a type of cyber attack where scammers send fake emails, text messages or make phone calls in order to trick people into providing sensitive information such as passwords, credit card numbers, and social security numbers. Examples: A scammer might send an email posing as a bank or other trusted organization, asking the recipient to click a link and enter their login credentials. 28
  • 29. 29 Elaborate on what you want to discuss. Slide 2: Malware - short for malicious software, malware is software designed to harm a computer system or network. Examples: viruses, worms, Trojan horses, and ransomware.
  • 30. Use these icons and illustrations in your Canva Presentation. Happy designing! Don't forget to delete this page before presenting. Resource page 30
  • 31. Write Your Topic or Idea Add a main point Elaborate on what you want to discuss. Add a main point Elaborate on what you want to discuss. Add a main point Elaborate on what you want to discuss. 31 Add a main point Elaborate on what you want to discuss. Add a main point Elaborate on what you want to discuss. Add a main point Elaborate on what you want to discuss.
  • 32. Thank you! Write a closing statement or call-to-action here. 32
  • 33. Add a Team Members Page Elaborate on what you want to discuss. NAME Title or Position NAME Title or Position NAME Title or Position NAME Title or Position 33
  • 34. Item 1 Item 2 Item 3 Item 4 Item 5 50 40 30 20 10 0 Write Your Topic or Idea 34 Elaborate on what you want to discuss.
  • 35. Add a Chart Page Name Job Title Name Job Title Name Job Title Name Job Title Name Job Title Name Job Title Name Job Title 35
  • 36. Month 1 Month 2 Month 3 Month 4 Month 5 Tasks Write your task here Write your task here Write your task here Write your task here Write your task here Write your task here Write your task here Write your task here Add a Gantt Chart Page 36
  • 37. Credits Special thanks to all the people who made and released these awesome resources for free: • Presentation template by SlidesCarnival • Photographs by Pexels 37
  • 38. Presentation design This presentation uses the following typographies: • Titles: Barlow Bold • Body copy: Barlow Normal They are free to use and easily available for download on the Internet. You must install them on your computer if you are going to edit this presentation in PowerPoint®. 38
  • 39. Free templates for all your presentation needs Ready to use, professional and customizable 100% free for personal or commercial use Blow your audience away with attractive visuals For PowerPoint and Google Slides