SlideShare a Scribd company logo
1 of 40
post
pandemic
empowerment
programme
www.prosper-project.eu
Digital Cybersecurity
Module 1 / Unit 5
post
pandemic
empowerment
programme
Partners
Post Pandemic Empowerment Programme © 2023 by Die Berater/
European E-Learning Institute/ BUPNET/ CATRO/ Momentum/
Smart Revolution/ Eurotraining is licensed under CC BY-NC-SA 4.0
Funded by the European Union. Views and opinions expressed are however those of the
author(s) only and do not necessarily reflect those of the European Union or the
European Education and Culture Executive Agency (EACEA). Neither the European
Union nor EACEA can be held responsible for them.
post
pandemic
empowerment
programme
In order to secure sensitive data from numerous risks in the workplace of today, cybersecurity is
becoming more and more crucial.
Depending on how they work on-site or virtually, it is essential to train staff on cybersecurity. Leaders
can make sure that their employees are well-equipped to identify and prevent risk threats that can
jeopardise everyone's safety. What is crucial is to effectively safeguard processes to protect against
such risks, as well as to give staff the appropriate training on how to recognise and report suspicious
activity or possible security concerns.
Assuring the long-term survival and profitability of any firm requires fostering a culture of
cybersecurity knowledge and accountability inside the workplace.
Introduction
post
pandemic
empowerment
programme
Table of Contents
01
02
03
Raising employee awareness
Ensuring data protection
Avoiding cyber threats
04 Self-Assessment
05 Transition to next module
post
pandemic
empowerment
programme
KNOWLEDGE:
Learning Outcomes
SKILLS:
BEHAVIOURS:
ATTITUDES:
The importance of training employees on cybersecurity
Ensuring data protection and recognising cyberthreats
Training and raising employee awareness towards cybersecurity
Adopting cybersecurity policies and enrolling employees in
cybersecurity trainings
post
pandemic
empowerment
programme
Raising employee
awareness
01
post
pandemic
empowerment
programme
One of the most important concepts to grasp with cybersecurity is
that maintenance is a constant job. New attacks develop monthly, if
not daily, and your approach to guarding against them can’t be
limited to annual training.
You need to ensure that your employees are aware of the company’s
cybersecurity policy and feel comfortable enough with their rights
and responsibilities as an employee. Employees must know that if
they witness or find something suspicious, they must report it
immediately.
1. Raising Employee Awareness
Employee Training
post
pandemic
empowerment
programme
When it comes to staff training ensuring that they are aware of their role in maintaining the security of
company data is believed to be the first priority. Having the appropriate security software and tools on
their computers, understanding how it operates, and making any necessary efforts are crucial.
Company owners must establish their official policies and distribute them to every employee.
Nevertheless, just disseminating the materials and counting on staff members to read them cover to
cover and take in all of their information is insufficient. It's a good idea to talk with employees about the
policies both throughout the training process and while they are still employed.
1. Raising Employee Awareness
Employee Training
post
pandemic
empowerment
programme
● Create a training program: Provide a training curriculum that includes corporate rules, requirements
of compliance, and best practices for cybersecurity. The training program should be customised to
meet the unique demands of the business and its personnel.
● Make training compulsory: Cybersecurity training has to be mandatory for all employees. To make
sure that staff members are knowledgeable on the most recent dangers and regulations, this may be
done both during onboarding and continuously.
● Use interactive training techniques: Engage staff in participatory training techniques including role-
playing games, simulations, and quizzes to underline important ideas.
● Provide regular updates: Provide regular updates on changes to company policies and cybersecurity
threats to ensure that employees are aware of any changes that may affect their work.
● Monitor training efficiency: Using evaluations, polls, or other forms of feedback, track and evaluate
the training program's efficacy. This can assist pinpoint problem areas and guarantee that workers are
remembering the material.
● Utilise real-life examples: To highlight the significance of cybersecurity and regulation compliance,
use actual-world instances. Employees may be inspired to practice safe and legal conduct by learning
the effects of their activities on the company.
1. Training employees on existing policies
Internal Training Policies
post
pandemic
empowerment
programme
● The General Data Protection Regulation (GDPR) requires SMEs to protect user data against theft,
unauthorised access, and other security threats.
● The Network and Information Security Directive (NIS Directive) requires Businesses to maintain their
data networks’ safety and to report any significant concerns to the relevant agencies.
● The Cybersecurity Act creates a framework for certifying ICT processes, services, and goods to make
sure they adhere to predetermined cybersecurity criteria.
● Programmes such as the Horizon Europe and the European Cyber Security Organization, the EU
provides financing and support for SMEs to enhance their cybersecurity posture (ECSO).
● The EU provides guidance and tools to help SMEs develop their cybersecurity practices through
initiatives such as the European Union Agency for Cybersecurity (ENISA) as well as the European Cyber
Security Month.
● Penalties and consequences to SMEs’ reputations might occur from non-compliance with these
requirements.
1. Training employees on existing policies
European Policies
post
pandemic
empowerment
programme
Ensuring data
protection
02
post
pandemic
empowerment
programme
Employees need to understand that the data they create and/or deal with belongs to the company and
that this data needs to be kept safe. If relevant, make sure employees know how to back up data using
methods described in your policies.
Company issuing computers or other electronic devices should only be used by employees who are
authorised to use those specific devices. Also, stress the importance of obtaining authorisation to use
any devices.
When employees are working remotely, data security and IT professionals have less control over and
capacity to monitor data storage and movement. Remote employees can be utilising a compromised
internet connection, outdated software, or malfunctioning gear. As remote employees are responsible
for maintaining their equipment, it is up to them to carry out upgrades, install security software, and
follow best practices while accessing data without on-site assistance from IT.
2. Storing data, accounts and passwords, VPN, personal data
protection
Data protection
post
pandemic
empowerment
programme
Fortunately, there are fairly easy solutions that can be employed to secure and safeguard data for
employees who work remotely. Some of these solutions involve seeking guidance or services from IT
or data protection specialists, while others can be implemented by the remote workers themselves.
What could be of value for companies is that they could share a comprehensive list of measures
involving both their management team and remote staff, regardless of whether they work full-time
or part-time from a remote location.
This would help in informing all employees about the steps that can be taken to ensure the security of
company data and work collaboratively to implement them.
2. Storing data, accounts and passwords, VPN, personal data
protection
post
pandemic
empowerment
programme
2. Storing data, accounts and passwords, VPN, personal data
protection
Securing data protection
● Two-factor authentication (2FA): By requiring a second form of verification in addition to a
password, such as a code texted to a smartphone or biometric authentication, 2FA provides an
extra layer of protection to login details. (Microsoft)
● Endpoint protection software: This software protects distant devices from malware and virus
attacks by identifying and stopping them. (Trellix, McAfee)
● Data backup and recovery processes: In the case of a disaster or breach, having frequent
backups of firm data guarantees that crucial information is not lost. (Acronis, Google Drive)
● Firewalls and intrusion detection systems (IDS): These instruments keep tabs on unwanted
access to business networks and data and prevent it. (CISCO, SonicWall)
● Regular software and operating system updates: The danger of hacks and data breaches is
decreased by updating operating systems and software to address and fix any security flaws.
post
pandemic
empowerment
programme
Cybersecurity is a necessity, especially if managers recruit staff who work from home, giving them
unavoidable access via a VPN or encryption service to ensure that no vital information about the
company is obtained.
The most popular authentication method for confirming a user's identity and granting access to digital
resources including computers and online accounts is a password.
A weak password or one that's frequently used on several business accounts might make it simple for
hackers to access confidential material, strong passwords can help prevent unwanted access to these
resources.
To offer an extra degree of protection, passwords may also be used in association with other authentication
techniques like biometrics or multi-factor authentication.
2. Storing data, accounts and passwords, VPN, personal data
protection
Passwords
post
pandemic
empowerment
programme
2. Storing data, accounts and passwords, VPN, personal data
protection
•
It’s long
enough
•
It uses
multiple
character
sets
•
It doesn’t
use
complete
words
•
It’s changed
regularly
•
It’s not
shared
across
accounts
A strong password has these traits:
post
pandemic
empowerment
programme
Keeping an employee safe and secure is not enough. The whole company needs to be secured. Before you set
up a VPN or encryption solution at work, you must determine the cyber-resilience of the entire workforce.
You must have a firm security policy, which includes training and ensuring employees are aware of the
importance of their cyber-security.
Even though the advantages of hybrid working include the ability of flexibility, this comes with security risks.
Companies need to use effective and efficient tools to protect their networks against cyber threats by using
a multi-layer security solution that offers multi-pronged protection.
2. Storing data, accounts and passwords, VPN, personal data
protection
VPN & Encryption
post
pandemic
empowerment
programme
2. Storing data, accounts and passwords, VPN, personal data
protection
Users can access a private network remotely thanks to a Virtual Private Network (VPN), a software that establishes a
safe and stable connection between devices over the internet.
VPNs are useful for:
1) Protecting personal and financial data, by encrypting communication between the user and the company.
2) Providing secure, uninterrupted access to remote employees, so they can connect to the business network as if
they were in the office.
3) Hiding the device's IP address and location, to get around internet regulation and geographical restrictions
4) Safeguarding digital content and providing secure interaction between staff members and the business network.
It's crucial to take into account aspects like encryption strength, logging practices, and server locations while selecting
a VPN provider.
VPNs may be set up to limit access to particular apps or resources, adding another degree of protection.
By encrypting information during transmission, VPNs can help avoid third-party attacks and surveillance.
post
pandemic
empowerment
programme
2. Storing data, accounts and passwords, VPN, personal data
protection
Transmitted data is encrypted by converting it into a coded message to prevent unauthorised access.
To ensure that only individuals with the appropriate decryption keys may access the data, it is encoded
and translated using algorithms and credentials. It is used in a wide range of technologies such as secure
email, VPNs, encrypted storage devices, and secure chatting programs.
It may be used to protect private communications between individuals or groups of people along with
commercial, financial and personal data.
Encryption comes in two main types: symmetric and asymmetric. Whilst symmetric utilises a single key for
both encryption and decryption, asymmetric encryption requires a pair of public and private keys.
End-to-end encryption (E2EE) is a type of cryptography used in telecommunications. Only the recipient
and the sender have access to the decrypted material.
post
pandemic
empowerment
programme
Avoiding
Cyberthreats
03
post
pandemic
empowerment
programme
The most common cyber threats to SMEs include:
● Phishing: Suspicious messages that lure employees into giving away sensitive information or
downloading malware. SMEs should provide multi-factor authentication and use email filtering.
● Ransomware: Software intended to harm or provide unauthorised access to a system via downloads,
malicious websites, and attachments. SMEs should back up data and implement endpoint protection.
● Malware: Software designed to damage or gain unauthorised access to computer systems through
attachments, downloads and malicious websites. SMEs should use endpoint protection software,
update their software and implement email and filtering tools.
(continues on the next slide)
3. Avoiding cyber threats
Typical threats
post
pandemic
empowerment
programme
● Insider threats: Liability presented by current or former employees, independent contractors, or
suppliers who have access to systems and data with permission. SMEs should implement access
controls, background checks on employees and monitor user activity.
● Third-party breaches: An attack that compromises sensitive data against a partner company or
vendor. SMEs should monitor vendor activity, develop data sharing agreements and security
measures, and do due diligence on suppliers.
3. Avoiding Cyber threats
post
pandemic
empowerment
programme
● Simulated phishing tools: They allow managers to create mock phishing attacks to test their
employees' awareness and response to phishing attempts. This can help identify areas where
additional training is needed. (PhishMe, KnowBe4, GoPhish, IronScales, Barracuda)
● Vulnerability scanning tools: They can be used to scan a network or system for vulnerabilities, which
can help managers identify potential security weaknesses and take corrective action. (Nessus, Qualys,
OpenVAS, Rapid7 Nexpose, Acunetix)
● Security awareness training platforms: These platforms offer interactive and engaging training
modules that focus on specific areas of cybersecurity, such as phishing, password security, and social
engineering. (KnowBe4, SANS Security Awareness, Infosec IQ, Wombat Security, PhishMe)
● Security policy templates: These templates provide a framework for creating comprehensive security
policies that cover various areas of digital security, including access control, data protection, and
incident response. (SANS Institute, NIST)
● Incident response planning tools: These tools can help managers develop and implement a
comprehensive incident response plan, which outlines the steps to be taken in the event of a security
breach or other incident.
3. Avoiding cyber threats
Tools for managers
post
pandemic
empowerment
programme
Advantages
1) Identification of dangerous behaviour;
2) Real-time network traffic detection;
3) Recognition of probable frauds, social
engineering assaults, and phishing attacks;
4) Filtering and detection of spam messages;
5) Automation of procedures.
3. Avoiding cyber threats
Disadvantages
1) Development of powerful AI-generated
techniques;
2) Ineffectiveness of compatible means of
detection;
3) Communication challenges in the form of
deceiving and fake alarms.
The ever-increasing use of AI Tools has demonstrated the need to ensure business security.
AI Tools
post
pandemic
empowerment
programme
3. Avoiding cyber threats
Key Measures for SMEs
1) Development of intrusion detection systems
such as firewalls and antivirus software;
2) Adequate staff training;
3) Establishment of security tactics with the
assistance of cybersecurity professionals;
4) Regular updates of software.
post
pandemic
empowerment
programme
Advantages
1) Availability of expertise: Threat detection and
response are handled by specialists
2) Cost savings: Businesses can avoid investing in
new workers and equipment;
3) Escalation: Services may be adjustable
depending on the demands of the business;
4) Constant monitoring: Provision of continuous
security;
5) Reduced Risk: Expertise resources are
outsourced.
3. Avoiding cyber threats
Disadvantages
1) Loss of control: The company is dependent on
the provider;
2) Communication challenges: Misunderstandings
regarding processes;
3) Dependence: Potential risk might arise in the
event of a security compromise;
4) Integration Challenges: Third parties and
existing teams need coordination;
5) Compliance Risks: Misunderstandings of
compliance standards may result in dangers.
Outsourcing requires hiring an external cybersecurity company to administer the security needs of the
business. It provides unlimited access to expertise and high technologies. However, it may pose risks
that have to do with data privacy and management of suppliers.
Outsourcing
post
pandemic
empowerment
programme
Troubleshooting the system
Troubleshooting is a systematic approach to
problem-solving that is often used to find and
correct issues with complex machines,
electronics, computers and software systems.
Troubleshooting methodologies usually try to
isolate a problem so that it can be examined.
Example
When a laptop won't boot up, an obvious first step
is to check whether the power cable is working.
Once common issues are ruled out,
troubleshooters must run through a checklist of
components to identify where the failure is
happening.
Good Practices & Examples
Troubleshooting Steps
1) Gather information;
2) Describe the problem;
3) Determine the most
probable cause;
4) Create a plan of action
and test a solution;
5) Implement the solution;
6) Analyse the results;
7) Document the process.
post
pandemic
empowerment
programme
● Phishing attacks were the most common type of incident experienced by SMEs, followed by
malware infections and ransomware attacks (ENISA,2021).
● 60% of small businesses in the European Union experienced at least one cyber incident in 2020
(ENISA,2021).
● 26% of UK SMEs have no cybersecurity measures in place, and only 16% have a cybersecurity
incident management plan (UK's National Cyber Security Centre,2020).
● 43% of European SMEs have experienced a cyber incident in the past year, and 67% of these
incidents resulted in a material impact on the business (EY,2021).
● 49% of European SMEs believe that cybersecurity is a priority, but only 37% have an incident
response plan in place (EY, 2021)
Facts & Figures
post
pandemic
empowerment
programme
● Conduct risk assessments?
● Implement cybersecurity policies?
● Use secure passwords and multi-factor authentication?
● Regularly update software and security patches?
● Provide regular cybersecurity training?
● Use encryption?
● Regularly back up data?
● Implement access controls?
● Monitor systems and networks?
By adopting these good practices, SMEs can significantly improve their cybersecurity posture and
reduce the risk of cyber-attacks.
Checklist: In your SME do you..?
post
pandemic
empowerment
programme
Cybersecurity is the new world order for
businesses which has great importance
for remote employees today. Employers
need to ensure that employees are
aware of and trained on the company’s
cybersecurity policy. Important aspects
of these policies should be storing data,
accounts and passwords, VPN and
personal data protection. Employers and
employees should be able to avoid the
most common cyber threats.
SUMMARY OF UNIT 5
post
pandemic
empowerment
programme
We offer you a short questionnaire
for self-assessment of the extent to
which you have understood the
content.
The goal is to check and reinforce
what you have learned.
You can take the quiz as many times
as you want. Remember, the quiz is
just part of the process of learning
new things!
SELF-ASSESSMENT
QUESTIONNAIRE
post
pandemic
empowerment
programme
Question 1:
SMEs are not at risk of
cyberattacks as they are not
attractive targets for hackers.
Answers:
True
False
Question 2:
Which of the following is the best
way to protect data stored on a
computer or mobile device?
Answers:
● Keep devices in a locked
cabinet
● Encrypt data with a secure
encryption algorithm
● Regularly backup important
data to a public cloud service
post
pandemic
empowerment
programme
Question 3:
Which of the following is a
characteristic of a strong
password?
Answers:
• It’s long and consists of multiple
character sets
• It consists of only lowercase
letters
• it’s the same password used for
multiple accounts
Question 4:
What does the GDPR require
SMEs to do?
Answers:
● Ensure the security of their
network and information
systems
● Protect personal data against
unauthorised access, theft,
and other security breaches
● Establish a framework for the
certification of ICT products,
services and processes
post
pandemic
empowerment
programme
Question 5:
1. Which of the following is a
common cybersecurity threat
for SMEs?
● Posting personal information
on Social Media platforms
● Running antivirus software on
devices
● Phishing attacks
Question 6:
Which of the following is a
potential cybersecurity risk
associated with outsourcing?
Answers:
● Increased productivity and
efficiency
● Loss of control over sensitive
data
● Improved customer
satisfaction
post
pandemic
empowerment
programme
References
Cybersecurity training best practices for Employees, 2018
https://www.nationwide.com/business/solutions-
center/cybersecurity/train-employees
The Importance of Cybersecurity For Remote Employees, 2022
https://www.linkedin.com/pulse/importance-cybersecurity-remote-
employees-ark-solvers/
8 Tips and Best Practices on How to Train Employees for Cyber
Security
https://www.coxblue.com/8-tips-and-best-practices-on-how-to-train-
employees-for-cyber-security/
post
pandemic
empowerment
programme
References
Cybersecurity in the Workplace
https://my.pennhighlands.edu/ICS/IT_Services/Cyber_Security_Awaren
ess_Materials.jnz?portlet=Free-form_Content_2017-10-06T15-24-11-
858
Why Cybersecurity In The Workplace Is Everyone's Responsibility, 2022
https://www.stickmancyber.com/cybersecurity-blog/why-
cybersecurity-in-the-workplace-is-everyones-responsibility
SME Troubleshooting https://shorturl.at/lISX7
The NCSC Annual Review, 2020
https://www.ncsc.gov.uk/news/annual-review-2020
post
pandemic
empowerment
programme
Federal Trade Commission, Cybersecurity for Small Business,
https://www.ftc.gov/tips-advice/business-center/small-
businesses/cybersecurity
ENISA ,2021, Cybersecurity for SMEs
https://www.enisa.europa.eu/publications/enisa-report-cybersecurity-
for-smes
SBA, Strengthen your cybersecurity https://www.sba.gov/business-
guide/manage-your-business/strengthen-your-cybersecurity#section-
header-6
The 2021 Security Outcomes Study – Small and Midsize Business
Edition, Cisco https://shorturl.at/mzNT4
References
post
pandemic
empowerment
programme
Cybersecurity is much
more than a matter of IT.
Stephane Nappo
post
pandemic
empowerment
programme
Raising employee awareness and
complying with EU policies is
crucial in terms of cybersecurity.
Employers must educate their
employees on how to recognize
and avoid cyber threats. By
providing training, organizations
mitigate the risks of data
breaches, which result in financial
and reputational damage.
Employee training is essential in
maintaining a strong
cybersecurity posture.
Summary of the Unit
post
pandemic
empowerment
programme
Thank you for learning with us!
www.prosper-project.eu
You can find us:
● https://prosper-project.eu/
● https://www.facebook.com/Workplace.SMEs.EU
● https://www.linkedin.com/company/workplace-smes/

More Related Content

Similar to Module 1 / Unit 5 Digital Cybersecurity

Csmp overview may 14
Csmp overview may 14Csmp overview may 14
Csmp overview may 14Jock ANDRE
 
Presentation(group j)implementing trustworthy computing by Sundas Ilyas
Presentation(group j)implementing  trustworthy computing by Sundas IlyasPresentation(group j)implementing  trustworthy computing by Sundas Ilyas
Presentation(group j)implementing trustworthy computing by Sundas IlyasSundas Kayani
 
How to Secure Your Enterprise Network.docx
How to Secure Your Enterprise Network.docxHow to Secure Your Enterprise Network.docx
How to Secure Your Enterprise Network.docxNeilStark1
 
How to Secure Your Enterprise Network.pdf
How to Secure Your Enterprise Network.pdfHow to Secure Your Enterprise Network.pdf
How to Secure Your Enterprise Network.pdfNeilStark1
 
How to Secure Your Enterprise Network.docx
How to Secure Your Enterprise Network.docxHow to Secure Your Enterprise Network.docx
How to Secure Your Enterprise Network.docxNeilStark1
 
Fissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-trainingFissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-trainingSwati Gupta
 
How to make employees aware and responsible towards security of the Company's...
How to make employees aware and responsible towards security of the Company's...How to make employees aware and responsible towards security of the Company's...
How to make employees aware and responsible towards security of the Company's...CommLab India – Rapid eLearning Solutions
 
IET India cybersecurity advisory: security practices for remote working
IET India cybersecurity advisory: security practices for remote workingIET India cybersecurity advisory: security practices for remote working
IET India cybersecurity advisory: security practices for remote workingIET India
 
Pci dss compliance for remote access during covid 19 pandemic article 1 with ...
Pci dss compliance for remote access during covid 19 pandemic article 1 with ...Pci dss compliance for remote access during covid 19 pandemic article 1 with ...
Pci dss compliance for remote access during covid 19 pandemic article 1 with ...VISTA InfoSec
 
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVESAN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVESijcsit
 
CompTIA CySA Domain 5 Compliance and Assessment.pptx
CompTIA CySA Domain 5 Compliance and Assessment.pptxCompTIA CySA Domain 5 Compliance and Assessment.pptx
CompTIA CySA Domain 5 Compliance and Assessment.pptxInfosectrain3
 
Computrace Laptop Security Solutions
Computrace Laptop Security SolutionsComputrace Laptop Security Solutions
Computrace Laptop Security Solutionsabe8512000
 
Building and implementing a successful information security policy
Building and implementing a successful information security policyBuilding and implementing a successful information security policy
Building and implementing a successful information security policyRossMob1
 
A to Z of Information Security Management
A to Z of Information Security ManagementA to Z of Information Security Management
A to Z of Information Security ManagementMark Conway
 
Importance of Information Security and Goals for Preventing Data Breaches
 Importance of Information Security and Goals for Preventing Data Breaches Importance of Information Security and Goals for Preventing Data Breaches
Importance of Information Security and Goals for Preventing Data Breacheskimsrung lov
 
Key Cybersecurity Risks and Mitigation Strategies in 2023 | The Enterprise World
Key Cybersecurity Risks and Mitigation Strategies in 2023 | The Enterprise WorldKey Cybersecurity Risks and Mitigation Strategies in 2023 | The Enterprise World
Key Cybersecurity Risks and Mitigation Strategies in 2023 | The Enterprise WorldTEWMAGAZINE
 
report on Mobile security
report on Mobile securityreport on Mobile security
report on Mobile securityJAYANT RAJURKAR
 

Similar to Module 1 / Unit 5 Digital Cybersecurity (20)

Csmp overview may 14
Csmp overview may 14Csmp overview may 14
Csmp overview may 14
 
Presentation(group j)implementing trustworthy computing by Sundas Ilyas
Presentation(group j)implementing  trustworthy computing by Sundas IlyasPresentation(group j)implementing  trustworthy computing by Sundas Ilyas
Presentation(group j)implementing trustworthy computing by Sundas Ilyas
 
How to Secure Your Enterprise Network.docx
How to Secure Your Enterprise Network.docxHow to Secure Your Enterprise Network.docx
How to Secure Your Enterprise Network.docx
 
How to Secure Your Enterprise Network.pdf
How to Secure Your Enterprise Network.pdfHow to Secure Your Enterprise Network.pdf
How to Secure Your Enterprise Network.pdf
 
How to Secure Your Enterprise Network.docx
How to Secure Your Enterprise Network.docxHow to Secure Your Enterprise Network.docx
How to Secure Your Enterprise Network.docx
 
Fissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-trainingFissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-training
 
How to make employees aware and responsible towards security of the Company's...
How to make employees aware and responsible towards security of the Company's...How to make employees aware and responsible towards security of the Company's...
How to make employees aware and responsible towards security of the Company's...
 
IET India cybersecurity advisory: security practices for remote working
IET India cybersecurity advisory: security practices for remote workingIET India cybersecurity advisory: security practices for remote working
IET India cybersecurity advisory: security practices for remote working
 
Pci dss compliance for remote access during covid 19 pandemic article 1 with ...
Pci dss compliance for remote access during covid 19 pandemic article 1 with ...Pci dss compliance for remote access during covid 19 pandemic article 1 with ...
Pci dss compliance for remote access during covid 19 pandemic article 1 with ...
 
Understanding Endpoint Security: A Guide For Everyone
Understanding Endpoint Security: A Guide For EveryoneUnderstanding Endpoint Security: A Guide For Everyone
Understanding Endpoint Security: A Guide For Everyone
 
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVESAN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
 
PACE-IT, Security+2.6: Security Related Awareness and Training
PACE-IT, Security+2.6: Security Related Awareness and TrainingPACE-IT, Security+2.6: Security Related Awareness and Training
PACE-IT, Security+2.6: Security Related Awareness and Training
 
CompTIA CySA Domain 5 Compliance and Assessment.pptx
CompTIA CySA Domain 5 Compliance and Assessment.pptxCompTIA CySA Domain 5 Compliance and Assessment.pptx
CompTIA CySA Domain 5 Compliance and Assessment.pptx
 
Computrace Laptop Security Solutions
Computrace Laptop Security SolutionsComputrace Laptop Security Solutions
Computrace Laptop Security Solutions
 
Applying Lean for information security operations centre
Applying Lean for information security operations centreApplying Lean for information security operations centre
Applying Lean for information security operations centre
 
Building and implementing a successful information security policy
Building and implementing a successful information security policyBuilding and implementing a successful information security policy
Building and implementing a successful information security policy
 
A to Z of Information Security Management
A to Z of Information Security ManagementA to Z of Information Security Management
A to Z of Information Security Management
 
Importance of Information Security and Goals for Preventing Data Breaches
 Importance of Information Security and Goals for Preventing Data Breaches Importance of Information Security and Goals for Preventing Data Breaches
Importance of Information Security and Goals for Preventing Data Breaches
 
Key Cybersecurity Risks and Mitigation Strategies in 2023 | The Enterprise World
Key Cybersecurity Risks and Mitigation Strategies in 2023 | The Enterprise WorldKey Cybersecurity Risks and Mitigation Strategies in 2023 | The Enterprise World
Key Cybersecurity Risks and Mitigation Strategies in 2023 | The Enterprise World
 
report on Mobile security
report on Mobile securityreport on Mobile security
report on Mobile security
 

More from SMKCreations

Module 6 Getting resources Comm Unity pptx
Module 6 Getting resources Comm Unity pptxModule 6 Getting resources Comm Unity pptx
Module 6 Getting resources Comm Unity pptxSMKCreations
 
Module 5 Programme marketing including social media channels
Module 5 Programme marketing including social media channelsModule 5 Programme marketing including social media channels
Module 5 Programme marketing including social media channelsSMKCreations
 
Module 4 Soft skills in community broadcasting setting
Module 4 Soft skills in community broadcasting settingModule 4 Soft skills in community broadcasting setting
Module 4 Soft skills in community broadcasting settingSMKCreations
 
Module 3 Content preparation and management for the radio
Module 3 Content preparation and management for the radioModule 3 Content preparation and management for the radio
Module 3 Content preparation and management for the radioSMKCreations
 
Module 2 Technical skills for community radio and podcasting
Module 2 Technical skills for community radio and podcastingModule 2 Technical skills for community radio and podcasting
Module 2 Technical skills for community radio and podcastingSMKCreations
 
INTRODUCTION TO THE COMM UNITY BROADCASTING SECTOR
INTRODUCTION TO THE COMM UNITY BROADCASTING SECTORINTRODUCTION TO THE COMM UNITY BROADCASTING SECTOR
INTRODUCTION TO THE COMM UNITY BROADCASTING SECTORSMKCreations
 
BALANCE_Module5_ESTONIA.pptx
BALANCE_Module5_ESTONIA.pptxBALANCE_Module5_ESTONIA.pptx
BALANCE_Module5_ESTONIA.pptxSMKCreations
 
BALANCE_Module4_ESTONIA.pptx
BALANCE_Module4_ESTONIA.pptxBALANCE_Module4_ESTONIA.pptx
BALANCE_Module4_ESTONIA.pptxSMKCreations
 
BALANCE_Module3_ESTONIA.pptx
BALANCE_Module3_ESTONIA.pptxBALANCE_Module3_ESTONIA.pptx
BALANCE_Module3_ESTONIA.pptxSMKCreations
 
BalanceModule2_ESTONIA_FINAL.pptx
BalanceModule2_ESTONIA_FINAL.pptxBalanceModule2_ESTONIA_FINAL.pptx
BalanceModule2_ESTONIA_FINAL.pptxSMKCreations
 
BALANCE_Module1_ESTONIA.pptx
BALANCE_Module1_ESTONIA.pptxBALANCE_Module1_ESTONIA.pptx
BALANCE_Module1_ESTONIA.pptxSMKCreations
 
Balance - Moduuli 5 FIN Yhteistyo tyopaikalla.pptx
Balance - Moduuli 5 FIN Yhteistyo tyopaikalla.pptxBalance - Moduuli 5 FIN Yhteistyo tyopaikalla.pptx
Balance - Moduuli 5 FIN Yhteistyo tyopaikalla.pptxSMKCreations
 
BALANCE - Moduuli 4 FIN Monimuotoiset tiimit.pptx
BALANCE - Moduuli 4 FIN Monimuotoiset tiimit.pptxBALANCE - Moduuli 4 FIN Monimuotoiset tiimit.pptx
BALANCE - Moduuli 4 FIN Monimuotoiset tiimit.pptxSMKCreations
 
Balance - Moduuli 3 FIN Digitaalinen hyvinvointi.pptx
Balance - Moduuli 3 FIN Digitaalinen hyvinvointi.pptxBalance - Moduuli 3 FIN Digitaalinen hyvinvointi.pptx
Balance - Moduuli 3 FIN Digitaalinen hyvinvointi.pptxSMKCreations
 
Balance - Moduuli 2 FIN Organisatoriset ja yksilolliset vastuut.pptx
Balance - Moduuli 2 FIN Organisatoriset ja yksilolliset vastuut.pptxBalance - Moduuli 2 FIN Organisatoriset ja yksilolliset vastuut.pptx
Balance - Moduuli 2 FIN Organisatoriset ja yksilolliset vastuut.pptxSMKCreations
 
Balance - Moduuli 1 FIN Työn ja yksityiselämän tasapaino etatiimejä johdettae...
Balance - Moduuli 1 FIN Työn ja yksityiselämän tasapaino etatiimejä johdettae...Balance - Moduuli 1 FIN Työn ja yksityiselämän tasapaino etatiimejä johdettae...
Balance - Moduuli 1 FIN Työn ja yksityiselämän tasapaino etatiimejä johdettae...SMKCreations
 
Balance - Module 5 Collaborative work environment - GR.pptx
Balance - Module 5 Collaborative work environment - GR.pptxBalance - Module 5 Collaborative work environment - GR.pptx
Balance - Module 5 Collaborative work environment - GR.pptxSMKCreations
 
Balance - Module 4 Catering for diverse teams_GR.pptx
Balance - Module 4 Catering for diverse teams_GR.pptxBalance - Module 4 Catering for diverse teams_GR.pptx
Balance - Module 4 Catering for diverse teams_GR.pptxSMKCreations
 
Balance - Module 3 Digital wellbeing - GR.pptx
Balance - Module 3 Digital wellbeing - GR.pptxBalance - Module 3 Digital wellbeing - GR.pptx
Balance - Module 3 Digital wellbeing - GR.pptxSMKCreations
 
Balance - Module 2 Organisational and individual responsibilities - GR.pptx
Balance - Module 2 Organisational and individual responsibilities - GR.pptxBalance - Module 2 Organisational and individual responsibilities - GR.pptx
Balance - Module 2 Organisational and individual responsibilities - GR.pptxSMKCreations
 

More from SMKCreations (20)

Module 6 Getting resources Comm Unity pptx
Module 6 Getting resources Comm Unity pptxModule 6 Getting resources Comm Unity pptx
Module 6 Getting resources Comm Unity pptx
 
Module 5 Programme marketing including social media channels
Module 5 Programme marketing including social media channelsModule 5 Programme marketing including social media channels
Module 5 Programme marketing including social media channels
 
Module 4 Soft skills in community broadcasting setting
Module 4 Soft skills in community broadcasting settingModule 4 Soft skills in community broadcasting setting
Module 4 Soft skills in community broadcasting setting
 
Module 3 Content preparation and management for the radio
Module 3 Content preparation and management for the radioModule 3 Content preparation and management for the radio
Module 3 Content preparation and management for the radio
 
Module 2 Technical skills for community radio and podcasting
Module 2 Technical skills for community radio and podcastingModule 2 Technical skills for community radio and podcasting
Module 2 Technical skills for community radio and podcasting
 
INTRODUCTION TO THE COMM UNITY BROADCASTING SECTOR
INTRODUCTION TO THE COMM UNITY BROADCASTING SECTORINTRODUCTION TO THE COMM UNITY BROADCASTING SECTOR
INTRODUCTION TO THE COMM UNITY BROADCASTING SECTOR
 
BALANCE_Module5_ESTONIA.pptx
BALANCE_Module5_ESTONIA.pptxBALANCE_Module5_ESTONIA.pptx
BALANCE_Module5_ESTONIA.pptx
 
BALANCE_Module4_ESTONIA.pptx
BALANCE_Module4_ESTONIA.pptxBALANCE_Module4_ESTONIA.pptx
BALANCE_Module4_ESTONIA.pptx
 
BALANCE_Module3_ESTONIA.pptx
BALANCE_Module3_ESTONIA.pptxBALANCE_Module3_ESTONIA.pptx
BALANCE_Module3_ESTONIA.pptx
 
BalanceModule2_ESTONIA_FINAL.pptx
BalanceModule2_ESTONIA_FINAL.pptxBalanceModule2_ESTONIA_FINAL.pptx
BalanceModule2_ESTONIA_FINAL.pptx
 
BALANCE_Module1_ESTONIA.pptx
BALANCE_Module1_ESTONIA.pptxBALANCE_Module1_ESTONIA.pptx
BALANCE_Module1_ESTONIA.pptx
 
Balance - Moduuli 5 FIN Yhteistyo tyopaikalla.pptx
Balance - Moduuli 5 FIN Yhteistyo tyopaikalla.pptxBalance - Moduuli 5 FIN Yhteistyo tyopaikalla.pptx
Balance - Moduuli 5 FIN Yhteistyo tyopaikalla.pptx
 
BALANCE - Moduuli 4 FIN Monimuotoiset tiimit.pptx
BALANCE - Moduuli 4 FIN Monimuotoiset tiimit.pptxBALANCE - Moduuli 4 FIN Monimuotoiset tiimit.pptx
BALANCE - Moduuli 4 FIN Monimuotoiset tiimit.pptx
 
Balance - Moduuli 3 FIN Digitaalinen hyvinvointi.pptx
Balance - Moduuli 3 FIN Digitaalinen hyvinvointi.pptxBalance - Moduuli 3 FIN Digitaalinen hyvinvointi.pptx
Balance - Moduuli 3 FIN Digitaalinen hyvinvointi.pptx
 
Balance - Moduuli 2 FIN Organisatoriset ja yksilolliset vastuut.pptx
Balance - Moduuli 2 FIN Organisatoriset ja yksilolliset vastuut.pptxBalance - Moduuli 2 FIN Organisatoriset ja yksilolliset vastuut.pptx
Balance - Moduuli 2 FIN Organisatoriset ja yksilolliset vastuut.pptx
 
Balance - Moduuli 1 FIN Työn ja yksityiselämän tasapaino etatiimejä johdettae...
Balance - Moduuli 1 FIN Työn ja yksityiselämän tasapaino etatiimejä johdettae...Balance - Moduuli 1 FIN Työn ja yksityiselämän tasapaino etatiimejä johdettae...
Balance - Moduuli 1 FIN Työn ja yksityiselämän tasapaino etatiimejä johdettae...
 
Balance - Module 5 Collaborative work environment - GR.pptx
Balance - Module 5 Collaborative work environment - GR.pptxBalance - Module 5 Collaborative work environment - GR.pptx
Balance - Module 5 Collaborative work environment - GR.pptx
 
Balance - Module 4 Catering for diverse teams_GR.pptx
Balance - Module 4 Catering for diverse teams_GR.pptxBalance - Module 4 Catering for diverse teams_GR.pptx
Balance - Module 4 Catering for diverse teams_GR.pptx
 
Balance - Module 3 Digital wellbeing - GR.pptx
Balance - Module 3 Digital wellbeing - GR.pptxBalance - Module 3 Digital wellbeing - GR.pptx
Balance - Module 3 Digital wellbeing - GR.pptx
 
Balance - Module 2 Organisational and individual responsibilities - GR.pptx
Balance - Module 2 Organisational and individual responsibilities - GR.pptxBalance - Module 2 Organisational and individual responsibilities - GR.pptx
Balance - Module 2 Organisational and individual responsibilities - GR.pptx
 

Recently uploaded

Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsNbelano25
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxPooja Bhuva
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdfUGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdfNirmal Dwivedi
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSAnaAcapella
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
What is 3 Way Matching Process in Odoo 17.pptx
What is 3 Way Matching Process in Odoo 17.pptxWhat is 3 Way Matching Process in Odoo 17.pptx
What is 3 Way Matching Process in Odoo 17.pptxCeline George
 
How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17Celine George
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsSandeep D Chaudhary
 
Model Attribute _rec_name in the Odoo 17
Model Attribute _rec_name in the Odoo 17Model Attribute _rec_name in the Odoo 17
Model Attribute _rec_name in the Odoo 17Celine George
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptNishitharanjan Rout
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxPooja Bhuva
 
Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111GangaMaiya1
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfDr Vijay Vishwakarma
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxDr. Ravikiran H M Gowda
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
PANDITA RAMABAI- Indian political thought GENDER.pptx
PANDITA RAMABAI- Indian political thought GENDER.pptxPANDITA RAMABAI- Indian political thought GENDER.pptx
PANDITA RAMABAI- Indian political thought GENDER.pptxakanksha16arora
 

Recently uploaded (20)

Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf arts
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdfUGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
What is 3 Way Matching Process in Odoo 17.pptx
What is 3 Way Matching Process in Odoo 17.pptxWhat is 3 Way Matching Process in Odoo 17.pptx
What is 3 Way Matching Process in Odoo 17.pptx
 
How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & Systems
 
Model Attribute _rec_name in the Odoo 17
Model Attribute _rec_name in the Odoo 17Model Attribute _rec_name in the Odoo 17
Model Attribute _rec_name in the Odoo 17
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.ppt
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
PANDITA RAMABAI- Indian political thought GENDER.pptx
PANDITA RAMABAI- Indian political thought GENDER.pptxPANDITA RAMABAI- Indian political thought GENDER.pptx
PANDITA RAMABAI- Indian political thought GENDER.pptx
 

Module 1 / Unit 5 Digital Cybersecurity

  • 2. post pandemic empowerment programme Partners Post Pandemic Empowerment Programme © 2023 by Die Berater/ European E-Learning Institute/ BUPNET/ CATRO/ Momentum/ Smart Revolution/ Eurotraining is licensed under CC BY-NC-SA 4.0 Funded by the European Union. Views and opinions expressed are however those of the author(s) only and do not necessarily reflect those of the European Union or the European Education and Culture Executive Agency (EACEA). Neither the European Union nor EACEA can be held responsible for them.
  • 3. post pandemic empowerment programme In order to secure sensitive data from numerous risks in the workplace of today, cybersecurity is becoming more and more crucial. Depending on how they work on-site or virtually, it is essential to train staff on cybersecurity. Leaders can make sure that their employees are well-equipped to identify and prevent risk threats that can jeopardise everyone's safety. What is crucial is to effectively safeguard processes to protect against such risks, as well as to give staff the appropriate training on how to recognise and report suspicious activity or possible security concerns. Assuring the long-term survival and profitability of any firm requires fostering a culture of cybersecurity knowledge and accountability inside the workplace. Introduction
  • 4. post pandemic empowerment programme Table of Contents 01 02 03 Raising employee awareness Ensuring data protection Avoiding cyber threats 04 Self-Assessment 05 Transition to next module
  • 5. post pandemic empowerment programme KNOWLEDGE: Learning Outcomes SKILLS: BEHAVIOURS: ATTITUDES: The importance of training employees on cybersecurity Ensuring data protection and recognising cyberthreats Training and raising employee awareness towards cybersecurity Adopting cybersecurity policies and enrolling employees in cybersecurity trainings
  • 7. post pandemic empowerment programme One of the most important concepts to grasp with cybersecurity is that maintenance is a constant job. New attacks develop monthly, if not daily, and your approach to guarding against them can’t be limited to annual training. You need to ensure that your employees are aware of the company’s cybersecurity policy and feel comfortable enough with their rights and responsibilities as an employee. Employees must know that if they witness or find something suspicious, they must report it immediately. 1. Raising Employee Awareness Employee Training
  • 8. post pandemic empowerment programme When it comes to staff training ensuring that they are aware of their role in maintaining the security of company data is believed to be the first priority. Having the appropriate security software and tools on their computers, understanding how it operates, and making any necessary efforts are crucial. Company owners must establish their official policies and distribute them to every employee. Nevertheless, just disseminating the materials and counting on staff members to read them cover to cover and take in all of their information is insufficient. It's a good idea to talk with employees about the policies both throughout the training process and while they are still employed. 1. Raising Employee Awareness Employee Training
  • 9. post pandemic empowerment programme ● Create a training program: Provide a training curriculum that includes corporate rules, requirements of compliance, and best practices for cybersecurity. The training program should be customised to meet the unique demands of the business and its personnel. ● Make training compulsory: Cybersecurity training has to be mandatory for all employees. To make sure that staff members are knowledgeable on the most recent dangers and regulations, this may be done both during onboarding and continuously. ● Use interactive training techniques: Engage staff in participatory training techniques including role- playing games, simulations, and quizzes to underline important ideas. ● Provide regular updates: Provide regular updates on changes to company policies and cybersecurity threats to ensure that employees are aware of any changes that may affect their work. ● Monitor training efficiency: Using evaluations, polls, or other forms of feedback, track and evaluate the training program's efficacy. This can assist pinpoint problem areas and guarantee that workers are remembering the material. ● Utilise real-life examples: To highlight the significance of cybersecurity and regulation compliance, use actual-world instances. Employees may be inspired to practice safe and legal conduct by learning the effects of their activities on the company. 1. Training employees on existing policies Internal Training Policies
  • 10. post pandemic empowerment programme ● The General Data Protection Regulation (GDPR) requires SMEs to protect user data against theft, unauthorised access, and other security threats. ● The Network and Information Security Directive (NIS Directive) requires Businesses to maintain their data networks’ safety and to report any significant concerns to the relevant agencies. ● The Cybersecurity Act creates a framework for certifying ICT processes, services, and goods to make sure they adhere to predetermined cybersecurity criteria. ● Programmes such as the Horizon Europe and the European Cyber Security Organization, the EU provides financing and support for SMEs to enhance their cybersecurity posture (ECSO). ● The EU provides guidance and tools to help SMEs develop their cybersecurity practices through initiatives such as the European Union Agency for Cybersecurity (ENISA) as well as the European Cyber Security Month. ● Penalties and consequences to SMEs’ reputations might occur from non-compliance with these requirements. 1. Training employees on existing policies European Policies
  • 12. post pandemic empowerment programme Employees need to understand that the data they create and/or deal with belongs to the company and that this data needs to be kept safe. If relevant, make sure employees know how to back up data using methods described in your policies. Company issuing computers or other electronic devices should only be used by employees who are authorised to use those specific devices. Also, stress the importance of obtaining authorisation to use any devices. When employees are working remotely, data security and IT professionals have less control over and capacity to monitor data storage and movement. Remote employees can be utilising a compromised internet connection, outdated software, or malfunctioning gear. As remote employees are responsible for maintaining their equipment, it is up to them to carry out upgrades, install security software, and follow best practices while accessing data without on-site assistance from IT. 2. Storing data, accounts and passwords, VPN, personal data protection Data protection
  • 13. post pandemic empowerment programme Fortunately, there are fairly easy solutions that can be employed to secure and safeguard data for employees who work remotely. Some of these solutions involve seeking guidance or services from IT or data protection specialists, while others can be implemented by the remote workers themselves. What could be of value for companies is that they could share a comprehensive list of measures involving both their management team and remote staff, regardless of whether they work full-time or part-time from a remote location. This would help in informing all employees about the steps that can be taken to ensure the security of company data and work collaboratively to implement them. 2. Storing data, accounts and passwords, VPN, personal data protection
  • 14. post pandemic empowerment programme 2. Storing data, accounts and passwords, VPN, personal data protection Securing data protection ● Two-factor authentication (2FA): By requiring a second form of verification in addition to a password, such as a code texted to a smartphone or biometric authentication, 2FA provides an extra layer of protection to login details. (Microsoft) ● Endpoint protection software: This software protects distant devices from malware and virus attacks by identifying and stopping them. (Trellix, McAfee) ● Data backup and recovery processes: In the case of a disaster or breach, having frequent backups of firm data guarantees that crucial information is not lost. (Acronis, Google Drive) ● Firewalls and intrusion detection systems (IDS): These instruments keep tabs on unwanted access to business networks and data and prevent it. (CISCO, SonicWall) ● Regular software and operating system updates: The danger of hacks and data breaches is decreased by updating operating systems and software to address and fix any security flaws.
  • 15. post pandemic empowerment programme Cybersecurity is a necessity, especially if managers recruit staff who work from home, giving them unavoidable access via a VPN or encryption service to ensure that no vital information about the company is obtained. The most popular authentication method for confirming a user's identity and granting access to digital resources including computers and online accounts is a password. A weak password or one that's frequently used on several business accounts might make it simple for hackers to access confidential material, strong passwords can help prevent unwanted access to these resources. To offer an extra degree of protection, passwords may also be used in association with other authentication techniques like biometrics or multi-factor authentication. 2. Storing data, accounts and passwords, VPN, personal data protection Passwords
  • 16. post pandemic empowerment programme 2. Storing data, accounts and passwords, VPN, personal data protection • It’s long enough • It uses multiple character sets • It doesn’t use complete words • It’s changed regularly • It’s not shared across accounts A strong password has these traits:
  • 17. post pandemic empowerment programme Keeping an employee safe and secure is not enough. The whole company needs to be secured. Before you set up a VPN or encryption solution at work, you must determine the cyber-resilience of the entire workforce. You must have a firm security policy, which includes training and ensuring employees are aware of the importance of their cyber-security. Even though the advantages of hybrid working include the ability of flexibility, this comes with security risks. Companies need to use effective and efficient tools to protect their networks against cyber threats by using a multi-layer security solution that offers multi-pronged protection. 2. Storing data, accounts and passwords, VPN, personal data protection VPN & Encryption
  • 18. post pandemic empowerment programme 2. Storing data, accounts and passwords, VPN, personal data protection Users can access a private network remotely thanks to a Virtual Private Network (VPN), a software that establishes a safe and stable connection between devices over the internet. VPNs are useful for: 1) Protecting personal and financial data, by encrypting communication between the user and the company. 2) Providing secure, uninterrupted access to remote employees, so they can connect to the business network as if they were in the office. 3) Hiding the device's IP address and location, to get around internet regulation and geographical restrictions 4) Safeguarding digital content and providing secure interaction between staff members and the business network. It's crucial to take into account aspects like encryption strength, logging practices, and server locations while selecting a VPN provider. VPNs may be set up to limit access to particular apps or resources, adding another degree of protection. By encrypting information during transmission, VPNs can help avoid third-party attacks and surveillance.
  • 19. post pandemic empowerment programme 2. Storing data, accounts and passwords, VPN, personal data protection Transmitted data is encrypted by converting it into a coded message to prevent unauthorised access. To ensure that only individuals with the appropriate decryption keys may access the data, it is encoded and translated using algorithms and credentials. It is used in a wide range of technologies such as secure email, VPNs, encrypted storage devices, and secure chatting programs. It may be used to protect private communications between individuals or groups of people along with commercial, financial and personal data. Encryption comes in two main types: symmetric and asymmetric. Whilst symmetric utilises a single key for both encryption and decryption, asymmetric encryption requires a pair of public and private keys. End-to-end encryption (E2EE) is a type of cryptography used in telecommunications. Only the recipient and the sender have access to the decrypted material.
  • 21. post pandemic empowerment programme The most common cyber threats to SMEs include: ● Phishing: Suspicious messages that lure employees into giving away sensitive information or downloading malware. SMEs should provide multi-factor authentication and use email filtering. ● Ransomware: Software intended to harm or provide unauthorised access to a system via downloads, malicious websites, and attachments. SMEs should back up data and implement endpoint protection. ● Malware: Software designed to damage or gain unauthorised access to computer systems through attachments, downloads and malicious websites. SMEs should use endpoint protection software, update their software and implement email and filtering tools. (continues on the next slide) 3. Avoiding cyber threats Typical threats
  • 22. post pandemic empowerment programme ● Insider threats: Liability presented by current or former employees, independent contractors, or suppliers who have access to systems and data with permission. SMEs should implement access controls, background checks on employees and monitor user activity. ● Third-party breaches: An attack that compromises sensitive data against a partner company or vendor. SMEs should monitor vendor activity, develop data sharing agreements and security measures, and do due diligence on suppliers. 3. Avoiding Cyber threats
  • 23. post pandemic empowerment programme ● Simulated phishing tools: They allow managers to create mock phishing attacks to test their employees' awareness and response to phishing attempts. This can help identify areas where additional training is needed. (PhishMe, KnowBe4, GoPhish, IronScales, Barracuda) ● Vulnerability scanning tools: They can be used to scan a network or system for vulnerabilities, which can help managers identify potential security weaknesses and take corrective action. (Nessus, Qualys, OpenVAS, Rapid7 Nexpose, Acunetix) ● Security awareness training platforms: These platforms offer interactive and engaging training modules that focus on specific areas of cybersecurity, such as phishing, password security, and social engineering. (KnowBe4, SANS Security Awareness, Infosec IQ, Wombat Security, PhishMe) ● Security policy templates: These templates provide a framework for creating comprehensive security policies that cover various areas of digital security, including access control, data protection, and incident response. (SANS Institute, NIST) ● Incident response planning tools: These tools can help managers develop and implement a comprehensive incident response plan, which outlines the steps to be taken in the event of a security breach or other incident. 3. Avoiding cyber threats Tools for managers
  • 24. post pandemic empowerment programme Advantages 1) Identification of dangerous behaviour; 2) Real-time network traffic detection; 3) Recognition of probable frauds, social engineering assaults, and phishing attacks; 4) Filtering and detection of spam messages; 5) Automation of procedures. 3. Avoiding cyber threats Disadvantages 1) Development of powerful AI-generated techniques; 2) Ineffectiveness of compatible means of detection; 3) Communication challenges in the form of deceiving and fake alarms. The ever-increasing use of AI Tools has demonstrated the need to ensure business security. AI Tools
  • 25. post pandemic empowerment programme 3. Avoiding cyber threats Key Measures for SMEs 1) Development of intrusion detection systems such as firewalls and antivirus software; 2) Adequate staff training; 3) Establishment of security tactics with the assistance of cybersecurity professionals; 4) Regular updates of software.
  • 26. post pandemic empowerment programme Advantages 1) Availability of expertise: Threat detection and response are handled by specialists 2) Cost savings: Businesses can avoid investing in new workers and equipment; 3) Escalation: Services may be adjustable depending on the demands of the business; 4) Constant monitoring: Provision of continuous security; 5) Reduced Risk: Expertise resources are outsourced. 3. Avoiding cyber threats Disadvantages 1) Loss of control: The company is dependent on the provider; 2) Communication challenges: Misunderstandings regarding processes; 3) Dependence: Potential risk might arise in the event of a security compromise; 4) Integration Challenges: Third parties and existing teams need coordination; 5) Compliance Risks: Misunderstandings of compliance standards may result in dangers. Outsourcing requires hiring an external cybersecurity company to administer the security needs of the business. It provides unlimited access to expertise and high technologies. However, it may pose risks that have to do with data privacy and management of suppliers. Outsourcing
  • 27. post pandemic empowerment programme Troubleshooting the system Troubleshooting is a systematic approach to problem-solving that is often used to find and correct issues with complex machines, electronics, computers and software systems. Troubleshooting methodologies usually try to isolate a problem so that it can be examined. Example When a laptop won't boot up, an obvious first step is to check whether the power cable is working. Once common issues are ruled out, troubleshooters must run through a checklist of components to identify where the failure is happening. Good Practices & Examples Troubleshooting Steps 1) Gather information; 2) Describe the problem; 3) Determine the most probable cause; 4) Create a plan of action and test a solution; 5) Implement the solution; 6) Analyse the results; 7) Document the process.
  • 28. post pandemic empowerment programme ● Phishing attacks were the most common type of incident experienced by SMEs, followed by malware infections and ransomware attacks (ENISA,2021). ● 60% of small businesses in the European Union experienced at least one cyber incident in 2020 (ENISA,2021). ● 26% of UK SMEs have no cybersecurity measures in place, and only 16% have a cybersecurity incident management plan (UK's National Cyber Security Centre,2020). ● 43% of European SMEs have experienced a cyber incident in the past year, and 67% of these incidents resulted in a material impact on the business (EY,2021). ● 49% of European SMEs believe that cybersecurity is a priority, but only 37% have an incident response plan in place (EY, 2021) Facts & Figures
  • 29. post pandemic empowerment programme ● Conduct risk assessments? ● Implement cybersecurity policies? ● Use secure passwords and multi-factor authentication? ● Regularly update software and security patches? ● Provide regular cybersecurity training? ● Use encryption? ● Regularly back up data? ● Implement access controls? ● Monitor systems and networks? By adopting these good practices, SMEs can significantly improve their cybersecurity posture and reduce the risk of cyber-attacks. Checklist: In your SME do you..?
  • 30. post pandemic empowerment programme Cybersecurity is the new world order for businesses which has great importance for remote employees today. Employers need to ensure that employees are aware of and trained on the company’s cybersecurity policy. Important aspects of these policies should be storing data, accounts and passwords, VPN and personal data protection. Employers and employees should be able to avoid the most common cyber threats. SUMMARY OF UNIT 5
  • 31. post pandemic empowerment programme We offer you a short questionnaire for self-assessment of the extent to which you have understood the content. The goal is to check and reinforce what you have learned. You can take the quiz as many times as you want. Remember, the quiz is just part of the process of learning new things! SELF-ASSESSMENT QUESTIONNAIRE
  • 32. post pandemic empowerment programme Question 1: SMEs are not at risk of cyberattacks as they are not attractive targets for hackers. Answers: True False Question 2: Which of the following is the best way to protect data stored on a computer or mobile device? Answers: ● Keep devices in a locked cabinet ● Encrypt data with a secure encryption algorithm ● Regularly backup important data to a public cloud service
  • 33. post pandemic empowerment programme Question 3: Which of the following is a characteristic of a strong password? Answers: • It’s long and consists of multiple character sets • It consists of only lowercase letters • it’s the same password used for multiple accounts Question 4: What does the GDPR require SMEs to do? Answers: ● Ensure the security of their network and information systems ● Protect personal data against unauthorised access, theft, and other security breaches ● Establish a framework for the certification of ICT products, services and processes
  • 34. post pandemic empowerment programme Question 5: 1. Which of the following is a common cybersecurity threat for SMEs? ● Posting personal information on Social Media platforms ● Running antivirus software on devices ● Phishing attacks Question 6: Which of the following is a potential cybersecurity risk associated with outsourcing? Answers: ● Increased productivity and efficiency ● Loss of control over sensitive data ● Improved customer satisfaction
  • 35. post pandemic empowerment programme References Cybersecurity training best practices for Employees, 2018 https://www.nationwide.com/business/solutions- center/cybersecurity/train-employees The Importance of Cybersecurity For Remote Employees, 2022 https://www.linkedin.com/pulse/importance-cybersecurity-remote- employees-ark-solvers/ 8 Tips and Best Practices on How to Train Employees for Cyber Security https://www.coxblue.com/8-tips-and-best-practices-on-how-to-train- employees-for-cyber-security/
  • 36. post pandemic empowerment programme References Cybersecurity in the Workplace https://my.pennhighlands.edu/ICS/IT_Services/Cyber_Security_Awaren ess_Materials.jnz?portlet=Free-form_Content_2017-10-06T15-24-11- 858 Why Cybersecurity In The Workplace Is Everyone's Responsibility, 2022 https://www.stickmancyber.com/cybersecurity-blog/why- cybersecurity-in-the-workplace-is-everyones-responsibility SME Troubleshooting https://shorturl.at/lISX7 The NCSC Annual Review, 2020 https://www.ncsc.gov.uk/news/annual-review-2020
  • 37. post pandemic empowerment programme Federal Trade Commission, Cybersecurity for Small Business, https://www.ftc.gov/tips-advice/business-center/small- businesses/cybersecurity ENISA ,2021, Cybersecurity for SMEs https://www.enisa.europa.eu/publications/enisa-report-cybersecurity- for-smes SBA, Strengthen your cybersecurity https://www.sba.gov/business- guide/manage-your-business/strengthen-your-cybersecurity#section- header-6 The 2021 Security Outcomes Study – Small and Midsize Business Edition, Cisco https://shorturl.at/mzNT4 References
  • 39. post pandemic empowerment programme Raising employee awareness and complying with EU policies is crucial in terms of cybersecurity. Employers must educate their employees on how to recognize and avoid cyber threats. By providing training, organizations mitigate the risks of data breaches, which result in financial and reputational damage. Employee training is essential in maintaining a strong cybersecurity posture. Summary of the Unit
  • 40. post pandemic empowerment programme Thank you for learning with us! www.prosper-project.eu You can find us: ● https://prosper-project.eu/ ● https://www.facebook.com/Workplace.SMEs.EU ● https://www.linkedin.com/company/workplace-smes/