SlideShare a Scribd company logo
1 of 7
Download to read offline
01 The employees should use strong
passcodes on their phones.
02
But they can be cracked when the
phones get stolen.
Why is cybersecuity
training for Mobiles
important?
Smartphones are the most powerful devices of our
time. But, indeed, they can also be misused by
hackers.
They store the most sensitive data about a person and
once anyone unscrupulous gets access to them, he
can wreak havoc.
Therefore, companies must teach the employees to
make their mobile phones secure.
Cyber security training is essential for employees to
learn how to set fingerprint or facial authentication
on their devices.
If such authentication is not possible, then it's
better to use two-factor authentication for crucial
apps. And the pin code under this authentication
should be sent on another device.
Biometric locks
Ways to protect data when a phone gets
stolen:
When the phone
has not been
stolen but
hacked:
The worst part is when an employee’s phone has not been stolen, but has been hacked. Then the
employee’s data is being used without his knowledge. This is more troublesome, for example, when
Pegasus software is installed; it collects all your data through keylogger software and sends it to an
organization who can sell it.
Once the email ID and password are stolen, cybercriminals can get access to company emails. They
can also access to documents that have been shared through such email ids.
A company can lose the trust of customers when a such data breach happens. There can be trouble
when such documents contain vendor payment details
Problems can arise when anyone clicks on
a phishing link and download such
software. The employees have to be
taught through cyber awareness training
how to recognize such links and not click
on them. Such links can also be included
in text messages apart from emails, and
hence employees have to be cautious.
Ever since the concept of apps came into
the picture where everything can be
accessed through this software, phishing
attacks have increased.
Phishing emails
Using public Wi-Fi:
How does
hacking
happen?
The employees must be taught not to use their
smartphones with public Wi-Fi. It's because when the
data is transferred on such networks, it’s not
encrypted and can be accessed by hackers.
So, employees must only use mobile data even
though public Wi-Fi is available. Hence cybersecurity
training teaches employees how to prevent the
hacking of their smartphones.
How to prevent
hacking:
Antivirus apps can prevent any installation of malware on the
Smartphone. So, if anyone gets across a phishing link, it
prevents him from clicking on it.
They also give employees access to VPN so that they don’t use
public Wi-Fi which can prove to be dangerous.
Call blocker is also an essential function of these apps so that
unsuspecting users don’t reveal any sensitive information to
unknown callers.
In cyber security training, the companies can give a demo of
such antivirus apps to the employees.
Antivirus apps:
How to conduct
Cybersecurity
training:
Simulations and games
to teach employees
Cybersecurity training is a
problem because the
employees are located in
different parts of the
world. So, they have
different work hours. They
can be sent games to learn
about cybersecurity.
These games can be in the
form of simulations where
heroes fight hackers.
Simulations and games
to teach employees
Train through positive
reinforcement
Employees should also be sent
phishing emails to test their
knowledge. If someone opens
such emails, inform them what is
phishing and what are the signs
of such emails.
You can also make sure that if a
certain employee receives such
emails and reports them to the IT
team; he is acknowledged in
front of others.
01 02
Creativ Technologies provides
elearning solutions for
cybersecurity training. You can
reach us at
info@creativtechnologies.com
S L I D E P R E S E N T A T I O N S D E S I G N

More Related Content

Recently uploaded

Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
Chris Hunter
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 

Recently uploaded (20)

Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Role Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxRole Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptx
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 

Featured

Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them wellGood Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Saba Software
 
Introduction to C Programming Language
Introduction to C Programming LanguageIntroduction to C Programming Language
Introduction to C Programming Language
Simplilearn
 

Featured (20)

How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
 
Barbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationBarbie - Brand Strategy Presentation
Barbie - Brand Strategy Presentation
 
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them wellGood Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
 
Introduction to C Programming Language
Introduction to C Programming LanguageIntroduction to C Programming Language
Introduction to C Programming Language
 

cybersecurity presentation.pdf

  • 1. 01 The employees should use strong passcodes on their phones. 02 But they can be cracked when the phones get stolen. Why is cybersecuity training for Mobiles important? Smartphones are the most powerful devices of our time. But, indeed, they can also be misused by hackers. They store the most sensitive data about a person and once anyone unscrupulous gets access to them, he can wreak havoc. Therefore, companies must teach the employees to make their mobile phones secure.
  • 2. Cyber security training is essential for employees to learn how to set fingerprint or facial authentication on their devices. If such authentication is not possible, then it's better to use two-factor authentication for crucial apps. And the pin code under this authentication should be sent on another device. Biometric locks Ways to protect data when a phone gets stolen:
  • 3. When the phone has not been stolen but hacked: The worst part is when an employee’s phone has not been stolen, but has been hacked. Then the employee’s data is being used without his knowledge. This is more troublesome, for example, when Pegasus software is installed; it collects all your data through keylogger software and sends it to an organization who can sell it. Once the email ID and password are stolen, cybercriminals can get access to company emails. They can also access to documents that have been shared through such email ids. A company can lose the trust of customers when a such data breach happens. There can be trouble when such documents contain vendor payment details
  • 4. Problems can arise when anyone clicks on a phishing link and download such software. The employees have to be taught through cyber awareness training how to recognize such links and not click on them. Such links can also be included in text messages apart from emails, and hence employees have to be cautious. Ever since the concept of apps came into the picture where everything can be accessed through this software, phishing attacks have increased. Phishing emails Using public Wi-Fi: How does hacking happen? The employees must be taught not to use their smartphones with public Wi-Fi. It's because when the data is transferred on such networks, it’s not encrypted and can be accessed by hackers. So, employees must only use mobile data even though public Wi-Fi is available. Hence cybersecurity training teaches employees how to prevent the hacking of their smartphones.
  • 5. How to prevent hacking: Antivirus apps can prevent any installation of malware on the Smartphone. So, if anyone gets across a phishing link, it prevents him from clicking on it. They also give employees access to VPN so that they don’t use public Wi-Fi which can prove to be dangerous. Call blocker is also an essential function of these apps so that unsuspecting users don’t reveal any sensitive information to unknown callers. In cyber security training, the companies can give a demo of such antivirus apps to the employees. Antivirus apps:
  • 6. How to conduct Cybersecurity training: Simulations and games to teach employees Cybersecurity training is a problem because the employees are located in different parts of the world. So, they have different work hours. They can be sent games to learn about cybersecurity. These games can be in the form of simulations where heroes fight hackers. Simulations and games to teach employees Train through positive reinforcement Employees should also be sent phishing emails to test their knowledge. If someone opens such emails, inform them what is phishing and what are the signs of such emails. You can also make sure that if a certain employee receives such emails and reports them to the IT team; he is acknowledged in front of others. 01 02
  • 7. Creativ Technologies provides elearning solutions for cybersecurity training. You can reach us at info@creativtechnologies.com S L I D E P R E S E N T A T I O N S D E S I G N