SlideShare a Scribd company logo
1 of 18
1
Cybersecurity
Awareness
Darren Tinai
Cybersecurity Awareness Lead
Agenda
2
• State of Cybersecurity/ Current Cyberthreats
• Topics of Interest:
• Phishing Emails/Scams
• Ransomware
• Social Engineering
• How to protect yourself
• WFH Tips
• Additional resources
• Q&A
Current state of Cybersecurity
3
Phishing attacks are still
number 1
Social Engineering is the
leading attack vector for
scams
Ransomware attacks are
on the rise
Cost of Cybersecurity Attacks
4
Phishing Attacks
5
Phishing emails
Smishing
Vishing
e.g. Computer technician call to
fix a virus on your machine
e.g. ATO text messages to claim a
tax refund
e.g. COVID 19 vaccines
Phishing Examples
Phishing Examples
Ransomware
8
Email
attachments
Website
downloads
Email links
Website links
Type of malware that encrypts data specifically
asking for payment in order to restore access.
How?
Regular backups
Updates
Verify emails
Protect Yourself
Don’t PAY!
Why is Cyber awareness so important?
9
• Everything is CONNECTED!
• Personal documents
• Identity
• Finances
• Digital footprint
How can I protect
myself?
• Long and strong. Passphrases
• Enable 2FA where possible
• Change default passwords
• Don’t reuse passwords across accounts
• Use a Password manager (LastPass is FREE)
Passwords
• Ensure all devices are on their latest updates.
• Turn on AUTOMATIC UPDATES
• Make time for updates
• Spring clean your apps regularly
Updates
1. Phishing - email
2. Vishing – phone call
3. Smishing – text messages
Look out for:
1. Urgency
2. Asking for personal/financial information
3. Unsolicited
4. Contain links and downloadable files
5. Bad grammar
6. Too good to be true
Be aware of Scams
• Privacy controls
• Be mindful of what you share
• Review app privacy collection
Search Yourself (Digital Footprint)
• Are my devices secure?
• Using VPN to access University systems?
• Beware of using FREE Wi-Fi
• Do I have anti virus installed?
• Am I backing up my important files? Cloud & Local
• Are my devices up to date?
• Enable two-factor authentication (2FA) where possible
• STOP. THINK BEFORE YOU CLICK.
Creating a Cyber secure home checklist
How can you help?
• Report suspicious emails : spam-report@unimelb.edu.au
• Got a question? Service Now ticket
• Yammer & Slack
• Sign up for free cyber alerts (Australian Cyber Security
Centre)
• GET IN TOUCH!
• Scamwatch
• Stay Smart Online
• SANS Security Awareness Blog
Helpful Websites
Thank you!

More Related Content

Similar to Cybersecurity-Awareness-Presentation-17-May-22 (1).pptx

csa2014 IBC
csa2014 IBCcsa2014 IBC
csa2014 IBC
apyn
 
Online reputation
Online reputationOnline reputation
Online reputation
esl2m
 
Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety
Sadaf Walliyani
 
Malware Security
Malware SecurityMalware Security
Malware Security
Mike Ellis
 
Cyber crime and security threads
Cyber crime and security threadsCyber crime and security threads
Cyber crime and security threads
Vdidv
 

Similar to Cybersecurity-Awareness-Presentation-17-May-22 (1).pptx (20)

Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....
 
Cybersecurity awareness session.pptx
Cybersecurity awareness session.pptxCybersecurity awareness session.pptx
Cybersecurity awareness session.pptx
 
csa2014 IBC
csa2014 IBCcsa2014 IBC
csa2014 IBC
 
cybersecurity.pptx
cybersecurity.pptxcybersecurity.pptx
cybersecurity.pptx
 
Online reputation
Online reputationOnline reputation
Online reputation
 
Phishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptxPhishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptx
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Cyber security
Cyber security Cyber security
Cyber security
 
It security in healthcare
It security in healthcareIt security in healthcare
It security in healthcare
 
Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety
 
Malware Security
Malware SecurityMalware Security
Malware Security
 
TheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxTheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptx
 
Breakfast Briefings - February 2018
Breakfast Briefings - February 2018Breakfast Briefings - February 2018
Breakfast Briefings - February 2018
 
Online reputation
Online reputationOnline reputation
Online reputation
 
Digital Security and Hygiene.pptx
Digital Security and Hygiene.pptxDigital Security and Hygiene.pptx
Digital Security and Hygiene.pptx
 
Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2
 
Cyber crime and security threads
Cyber crime and security threadsCyber crime and security threads
Cyber crime and security threads
 
Protecting Yourself From Data and Identity Theft
Protecting Yourself From Data and Identity TheftProtecting Yourself From Data and Identity Theft
Protecting Yourself From Data and Identity Theft
 
Cyber Security and Healthcare
Cyber Security and HealthcareCyber Security and Healthcare
Cyber Security and Healthcare
 
COMPUTER ETHICS.pptx
COMPUTER ETHICS.pptxCOMPUTER ETHICS.pptx
COMPUTER ETHICS.pptx
 

Recently uploaded

Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 

Recently uploaded (20)

HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 

Cybersecurity-Awareness-Presentation-17-May-22 (1).pptx

  • 2. Agenda 2 • State of Cybersecurity/ Current Cyberthreats • Topics of Interest: • Phishing Emails/Scams • Ransomware • Social Engineering • How to protect yourself • WFH Tips • Additional resources • Q&A
  • 3. Current state of Cybersecurity 3 Phishing attacks are still number 1 Social Engineering is the leading attack vector for scams Ransomware attacks are on the rise
  • 5. Phishing Attacks 5 Phishing emails Smishing Vishing e.g. Computer technician call to fix a virus on your machine e.g. ATO text messages to claim a tax refund e.g. COVID 19 vaccines
  • 8. Ransomware 8 Email attachments Website downloads Email links Website links Type of malware that encrypts data specifically asking for payment in order to restore access. How? Regular backups Updates Verify emails Protect Yourself Don’t PAY!
  • 9. Why is Cyber awareness so important? 9 • Everything is CONNECTED! • Personal documents • Identity • Finances • Digital footprint
  • 10. How can I protect myself?
  • 11. • Long and strong. Passphrases • Enable 2FA where possible • Change default passwords • Don’t reuse passwords across accounts • Use a Password manager (LastPass is FREE) Passwords
  • 12. • Ensure all devices are on their latest updates. • Turn on AUTOMATIC UPDATES • Make time for updates • Spring clean your apps regularly Updates
  • 13. 1. Phishing - email 2. Vishing – phone call 3. Smishing – text messages Look out for: 1. Urgency 2. Asking for personal/financial information 3. Unsolicited 4. Contain links and downloadable files 5. Bad grammar 6. Too good to be true Be aware of Scams
  • 14. • Privacy controls • Be mindful of what you share • Review app privacy collection Search Yourself (Digital Footprint)
  • 15. • Are my devices secure? • Using VPN to access University systems? • Beware of using FREE Wi-Fi • Do I have anti virus installed? • Am I backing up my important files? Cloud & Local • Are my devices up to date? • Enable two-factor authentication (2FA) where possible • STOP. THINK BEFORE YOU CLICK. Creating a Cyber secure home checklist
  • 16. How can you help? • Report suspicious emails : spam-report@unimelb.edu.au • Got a question? Service Now ticket • Yammer & Slack • Sign up for free cyber alerts (Australian Cyber Security Centre) • GET IN TOUCH!
  • 17. • Scamwatch • Stay Smart Online • SANS Security Awareness Blog Helpful Websites