SlideShare a Scribd company logo
1 of 18
1
Cybersecurity
Awareness
Darren Tinai
Cybersecurity Awareness Lead
Agenda
2
• State of Cybersecurity/ Current Cyberthreats
• Topics of Interest:
• Phishing Emails/Scams
• Ransomware
• Social Engineering
• How to protect yourself
• WFH Tips
• Additional resources
• Q&A
Current state of Cybersecurity
3
Phishing attacks are still
number 1
Social Engineering is the
leading attack vector for
scams
Ransomware attacks are
on the rise
Cost of Cybersecurity Attacks
4
Phishing Attacks
5
Phishing emails
Smishing
Vishing
e.g. Computer technician call to
fix a virus on your machine
e.g. ATO text messages to claim a
tax refund
e.g. COVID 19 vaccines
Phishing Examples
Phishing Examples
Ransomware
8
Email
attachments
Website
downloads
Email links
Website links
Type of malware that encrypts data specifically
asking for payment in order to restore access.
How?
Regular backups
Updates
Verify emails
Protect Yourself
Don’t PAY!
Why is Cyber awareness so important?
9
• Everything is CONNECTED!
• Personal documents
• Identity
• Finances
• Digital footprint
How can I protect
myself?
• Long and strong. Passphrases
• Enable 2FA where possible
• Change default passwords
• Don’t reuse passwords across accounts
• Use a Password manager (LastPass is FREE)
Passwords
• Ensure all devices are on their latest updates.
• Turn on AUTOMATIC UPDATES
• Make time for updates
• Spring clean your apps regularly
Updates
1. Phishing - email
2. Vishing – phone call
3. Smishing – text messages
Look out for:
1. Urgency
2. Asking for personal/financial information
3. Unsolicited
4. Contain links and downloadable files
5. Bad grammar
6. Too good to be true
Be aware of Scams
• Privacy controls
• Be mindful of what you share
• Review app privacy collection
Search Yourself (Digital Footprint)
• Are my devices secure?
• Using VPN to access University systems?
• Beware of using FREE Wi-Fi
• Do I have anti virus installed?
• Am I backing up my important files? Cloud & Local
• Are my devices up to date?
• Enable two-factor authentication (2FA) where possible
• STOP. THINK BEFORE YOU CLICK.
Creating a Cyber secure home checklist
How can you help?
• Report suspicious emails : spam-report@unimelb.edu.au
• Got a question? Service Now ticket
• Yammer & Slack
• Sign up for free cyber alerts (Australian Cyber Security
Centre)
• GET IN TOUCH!
• Scamwatch
• Stay Smart Online
• SANS Security Awareness Blog
Helpful Websites
Thank you!

More Related Content

Similar to Cybersecurity-Awareness-Presentation-17-May-22.pptx

csa2014 IBC
csa2014 IBCcsa2014 IBC
csa2014 IBC
apyn
 
Online reputation
Online reputationOnline reputation
Online reputation
esl2m
 
Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety
Sadaf Walliyani
 
Malware Security
Malware SecurityMalware Security
Malware Security
Mike Ellis
 
Cyber crime and security threads
Cyber crime and security threadsCyber crime and security threads
Cyber crime and security threads
Vdidv
 

Similar to Cybersecurity-Awareness-Presentation-17-May-22.pptx (20)

Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....
 
Cybersecurity awareness session.pptx
Cybersecurity awareness session.pptxCybersecurity awareness session.pptx
Cybersecurity awareness session.pptx
 
csa2014 IBC
csa2014 IBCcsa2014 IBC
csa2014 IBC
 
cybersecurity.pptx
cybersecurity.pptxcybersecurity.pptx
cybersecurity.pptx
 
Online reputation
Online reputationOnline reputation
Online reputation
 
Phishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptxPhishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptx
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Cyber security
Cyber security Cyber security
Cyber security
 
It security in healthcare
It security in healthcareIt security in healthcare
It security in healthcare
 
Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety
 
Malware Security
Malware SecurityMalware Security
Malware Security
 
TheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxTheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptx
 
Breakfast Briefings - February 2018
Breakfast Briefings - February 2018Breakfast Briefings - February 2018
Breakfast Briefings - February 2018
 
Online reputation
Online reputationOnline reputation
Online reputation
 
Digital Security and Hygiene.pptx
Digital Security and Hygiene.pptxDigital Security and Hygiene.pptx
Digital Security and Hygiene.pptx
 
Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2
 
Cyber crime and security threads
Cyber crime and security threadsCyber crime and security threads
Cyber crime and security threads
 
Protecting Yourself From Data and Identity Theft
Protecting Yourself From Data and Identity TheftProtecting Yourself From Data and Identity Theft
Protecting Yourself From Data and Identity Theft
 
Cyber Security and Healthcare
Cyber Security and HealthcareCyber Security and Healthcare
Cyber Security and Healthcare
 
COMPUTER ETHICS.pptx
COMPUTER ETHICS.pptxCOMPUTER ETHICS.pptx
COMPUTER ETHICS.pptx
 

Recently uploaded

Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
jaanualu31
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
MayuraD1
 

Recently uploaded (20)

Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
Rums floating Omkareshwar FSPV IM_16112021.pdf
Rums floating Omkareshwar FSPV IM_16112021.pdfRums floating Omkareshwar FSPV IM_16112021.pdf
Rums floating Omkareshwar FSPV IM_16112021.pdf
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
Computer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersComputer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to Computers
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
Air Compressor reciprocating single stage
Air Compressor reciprocating single stageAir Compressor reciprocating single stage
Air Compressor reciprocating single stage
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
 
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
Learn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic MarksLearn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic Marks
 

Cybersecurity-Awareness-Presentation-17-May-22.pptx

  • 2. Agenda 2 • State of Cybersecurity/ Current Cyberthreats • Topics of Interest: • Phishing Emails/Scams • Ransomware • Social Engineering • How to protect yourself • WFH Tips • Additional resources • Q&A
  • 3. Current state of Cybersecurity 3 Phishing attacks are still number 1 Social Engineering is the leading attack vector for scams Ransomware attacks are on the rise
  • 5. Phishing Attacks 5 Phishing emails Smishing Vishing e.g. Computer technician call to fix a virus on your machine e.g. ATO text messages to claim a tax refund e.g. COVID 19 vaccines
  • 8. Ransomware 8 Email attachments Website downloads Email links Website links Type of malware that encrypts data specifically asking for payment in order to restore access. How? Regular backups Updates Verify emails Protect Yourself Don’t PAY!
  • 9. Why is Cyber awareness so important? 9 • Everything is CONNECTED! • Personal documents • Identity • Finances • Digital footprint
  • 10. How can I protect myself?
  • 11. • Long and strong. Passphrases • Enable 2FA where possible • Change default passwords • Don’t reuse passwords across accounts • Use a Password manager (LastPass is FREE) Passwords
  • 12. • Ensure all devices are on their latest updates. • Turn on AUTOMATIC UPDATES • Make time for updates • Spring clean your apps regularly Updates
  • 13. 1. Phishing - email 2. Vishing – phone call 3. Smishing – text messages Look out for: 1. Urgency 2. Asking for personal/financial information 3. Unsolicited 4. Contain links and downloadable files 5. Bad grammar 6. Too good to be true Be aware of Scams
  • 14. • Privacy controls • Be mindful of what you share • Review app privacy collection Search Yourself (Digital Footprint)
  • 15. • Are my devices secure? • Using VPN to access University systems? • Beware of using FREE Wi-Fi • Do I have anti virus installed? • Am I backing up my important files? Cloud & Local • Are my devices up to date? • Enable two-factor authentication (2FA) where possible • STOP. THINK BEFORE YOU CLICK. Creating a Cyber secure home checklist
  • 16. How can you help? • Report suspicious emails : spam-report@unimelb.edu.au • Got a question? Service Now ticket • Yammer & Slack • Sign up for free cyber alerts (Australian Cyber Security Centre) • GET IN TOUCH!
  • 17. • Scamwatch • Stay Smart Online • SANS Security Awareness Blog Helpful Websites