SlideShare a Scribd company logo
1 of 20
10 COMPONENTS
OF
BUSINESS
CYBER SECURITY
CYBER SECURITY has become the major
complex issue for almost every business. Here
we share essential elements of cyber security to
ensure that your business or organization is
risk-free..
NETWORK
PROTECTION
Quite often, your network
acts as the getaway to
malicious files that end up
damaging your systems.
That’s why you need to
take precautionary
measures by employing
proper hardware and
software solutions. This
will filter out mischievous
content and doesn’t let
your systems get infected.
PRIVILEGED
ACCOUNT
MANAGEMENT
Some accounts are more
privileged than others.
Only the privileged and
trusted users should be
entrusted with credentials
of such accounts. Any
human error could cause
havoc.
MALWARE
DEFENSE
Many aren't aware of the
fact that malware is the
most dominant breed of
threats online. The thing
about them is that they
can be infused in a
system using a ton of
ways. That's why having a
malware protection plan is
of paramount importance.
LET'S
HAVE A
LOOK AT A
RECENT
MALWARE
REPORT
15,107,232Different malware files that we had never seen before
99%of all malware never appears again anywhere else
285,000New malware samples every day
CONSTANT
MONITORING
All of your systems must
be monitored and
analyzed by a security
professional. This way,
attacks could be thwarted
even before they take
place.
GET
EVERYTHING
UP-TO-DATE
Updates exist for a
reason, and that reason is
improvement. In many
instances, authorities roll
out updates with patches
for older vulnerabilities.
You need to be on guard
and update your systems
and software as soon as
possible.
5 RISKS OF
OUTDATED OR
UNSUPPORTED
SOFTWARE,
BROWSERS, &
OPERATING
SYSTEMS
RANSOMWARE
BUSINESS DISRUPTIONS
DECREASED
PRODUCTIVITY
SECURITY HOLES
INCREASE DOWNTIME
INCIDENT
MANAGEMENT
PLAN
You don't want your
employees to run and
scream around your office
on getting attacked, do
you? That's why having a
proper incident
management plan should
be a priority for you, and
all of your involved
employees must be aware
of it.
What to do in the
first 24 hours of
Data Breach
Incident
DATA BREACH INCIDENT
RESPONSE – A COMPLETE
CHECKLIST
What to do Beyond
24 hours of Data
Breach Incident
MANAGE
REMOVABLE
DEVICES
In movies, you might have seen
a hacker plugging in a USB drive
and downloading all of the
system's data in it.
Well, that might seem far-
fetched, but it isn't. Using a
removable device such as a
USB flash drive, a hacker could
unleash viruses and malware
that could break your systems
down. That's why keeping the
removable devices to the
minimum is the best thing to do
SECURITY
EDUCATION
We couldn't stress this enough,
and the organizations couldn't
ignore this enough. When it
comes to cyber-attacks,
employee mistakes act as the
chief reason.
Various studies conducted
around the world vouch for it.
That’s why every employee must
be equipped with the basics of
cyber security so that any
unfortunate incident doesn’t take
place
9 Reasons Why You Need
Security Education and
Awareness
1. It is the first line
of defense against
security risks
2. You will have
greater chances of
employment
3. You will be
complying with
regulatory
requirements
4. You will build
customer trust and
loyalty
5. Every business
now needs it.
6. You will be able to
work with security
technology
7. You will be safe
from personal
risks, too
8. You will be able to
enlighten others
9. Your mindset will
align with your
employer’s
objectives
SECURITY
POLICY
What good is your security plan
if you don't have a robust
security policy in place? Good
security acts as the guideline for
online behavior within the
organization. It comprises the
dos and don’ts so that any trivial
mistake or ignorance doesn’t
result in a disaster.
MOBILE
WORKING
The work from home culture is
getting more and more traction
nowadays. As good as it is, it
comes with some risks.
For example, if an employee
gets connected through a public
network, it could leave him open
to data stealing and data
tampering – man-in-the-middle
attack in technical terms. To
avoid such lapses, there should
be a stringent policy in place for
mobile working.
HOW TO PROTECT YOUR
DEVICE
LOSS
Do keep your phone
encrypted so that in case of
any breach your data
remain encrypted
APPS
We should avoid using beta
install applications and
always read reviews and
rating of Apps from
authentic sites
WIFI
Avoid using
banking/Financial or sites
for sharing personal
information on Unsecured
or public Wi-Fi’s
MALWARE
Do a security check for any
app and ensures that
installed application do not
install any third party tools
by itself.
SOCIAL ATTACKS
One should always notice
above things before clicking
on any link or giving any
important information. If
you find any such
noticeable things you
should avoid that piece of
information.
THANKS!
Any questions?
You can write us at support@comodosslstore.com
Or
Visit – https://comodosslstore.com
CREDITS
Special thanks to all the people who made and released these
awesome resources for free:
 Helpful Resources
 Data Breach Incident Response – A Complete Checklist
 A Comprehensive Strategy for Preventing Cyber Attacks
 Top 5 Mobile Security Threats You Can Avoid
 10 Reasons Why You Need Security Education and
Awareness
 Figure & Data by Panda Security
 Presentation template by SlidesCarnival

More Related Content

What's hot

Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@
R_Yanus
 
IT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeIT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community College
Atlantic Training, LLC.
 

What's hot (20)

information security awareness course
information security awareness courseinformation security awareness course
information security awareness course
 
INTERNET SAFETY FOR KIDS
INTERNET SAFETY FOR KIDSINTERNET SAFETY FOR KIDS
INTERNET SAFETY FOR KIDS
 
Information Security Awareness And Training Business Case For Web Based Solut...
Information Security Awareness And Training Business Case For Web Based Solut...Information Security Awareness And Training Business Case For Web Based Solut...
Information Security Awareness And Training Business Case For Web Based Solut...
 
Protecting Against Ransomware
Protecting Against RansomwareProtecting Against Ransomware
Protecting Against Ransomware
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Program
 
Checklist for Preventing Ransomware
Checklist for Preventing RansomwareChecklist for Preventing Ransomware
Checklist for Preventing Ransomware
 
Information Security Awareness
Information Security Awareness Information Security Awareness
Information Security Awareness
 
Basic Security Training for End Users
Basic Security Training for End UsersBasic Security Training for End Users
Basic Security Training for End Users
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@
 
Common Cybersecurity Mistakes
Common Cybersecurity MistakesCommon Cybersecurity Mistakes
Common Cybersecurity Mistakes
 
OSB160: Trust Your Apps. See How with Ivanti Application Control
OSB160: Trust Your Apps. See How with Ivanti Application ControlOSB160: Trust Your Apps. See How with Ivanti Application Control
OSB160: Trust Your Apps. See How with Ivanti Application Control
 
Security Awareness Training by Fortinet
Security Awareness Training by FortinetSecurity Awareness Training by Fortinet
Security Awareness Training by Fortinet
 
Resolution - Security - Cisco Advanced Malware Protection for Endpoints - Fea...
Resolution - Security - Cisco Advanced Malware Protection for Endpoints - Fea...Resolution - Security - Cisco Advanced Malware Protection for Endpoints - Fea...
Resolution - Security - Cisco Advanced Malware Protection for Endpoints - Fea...
 
IT viruses
 IT viruses IT viruses
IT viruses
 
10 critical elements of next generation of endpoint layered security
10 critical elements of next generation of endpoint layered security10 critical elements of next generation of endpoint layered security
10 critical elements of next generation of endpoint layered security
 
GRRCON 2013: Imparting security awareness to all levels of users
GRRCON 2013: Imparting security awareness to all levels of usersGRRCON 2013: Imparting security awareness to all levels of users
GRRCON 2013: Imparting security awareness to all levels of users
 
New Hire Information Security Awareness
New Hire Information Security AwarenessNew Hire Information Security Awareness
New Hire Information Security Awareness
 
Infosec IQ - Anti-Phishing & Security Awareness Training
Infosec IQ - Anti-Phishing & Security Awareness TrainingInfosec IQ - Anti-Phishing & Security Awareness Training
Infosec IQ - Anti-Phishing & Security Awareness Training
 
IT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeIT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community College
 
Itsa end user 2013
Itsa end user 2013Itsa end user 2013
Itsa end user 2013
 

Similar to 10 Components of Business Cyber Security

Similar to 10 Components of Business Cyber Security (20)

Working from home- How secure is it.pdf
Working from home- How secure is it.pdfWorking from home- How secure is it.pdf
Working from home- How secure is it.pdf
 
Enhancing Cybersecurity in Remote Work-3.pdf
Enhancing Cybersecurity in Remote Work-3.pdfEnhancing Cybersecurity in Remote Work-3.pdf
Enhancing Cybersecurity in Remote Work-3.pdf
 
The Unconventional Guide to Cyber Threat Intelligence - Ahad.pdf
The Unconventional Guide to Cyber Threat Intelligence - Ahad.pdfThe Unconventional Guide to Cyber Threat Intelligence - Ahad.pdf
The Unconventional Guide to Cyber Threat Intelligence - Ahad.pdf
 
Cyber threat Intelligence Dubai - Ahad.pptx
Cyber threat Intelligence Dubai - Ahad.pptxCyber threat Intelligence Dubai - Ahad.pptx
Cyber threat Intelligence Dubai - Ahad.pptx
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
A sneak peek into the top 5 network security solutions.docx
A sneak peek into the top 5 network security solutions.docxA sneak peek into the top 5 network security solutions.docx
A sneak peek into the top 5 network security solutions.docx
 
A sneak peek into the top 5 network security solutions.pdf
A sneak peek into the top 5 network security solutions.pdfA sneak peek into the top 5 network security solutions.pdf
A sneak peek into the top 5 network security solutions.pdf
 
Security Threats for SMBs
Security Threats for SMBsSecurity Threats for SMBs
Security Threats for SMBs
 
How to secure your enterprise data during Covid-19
How to secure your enterprise data during Covid-19How to secure your enterprise data during Covid-19
How to secure your enterprise data during Covid-19
 
Choosing the Right Network Security for Your Business - Minerva.pdf
Choosing the Right Network Security for Your Business  - Minerva.pdfChoosing the Right Network Security for Your Business  - Minerva.pdf
Choosing the Right Network Security for Your Business - Minerva.pdf
 
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdfJust-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
 
Guarding the Digital Fortress Unmasking 10 Common Types of Cybersecurity Thre...
Guarding the Digital Fortress Unmasking 10 Common Types of Cybersecurity Thre...Guarding the Digital Fortress Unmasking 10 Common Types of Cybersecurity Thre...
Guarding the Digital Fortress Unmasking 10 Common Types of Cybersecurity Thre...
 
Guarding the Digital Fortress.pdf
Guarding the Digital Fortress.pdfGuarding the Digital Fortress.pdf
Guarding the Digital Fortress.pdf
 
Prevent Getting Hacked by Using a Network Vulnerability Scanner
Prevent Getting Hacked by Using a Network Vulnerability ScannerPrevent Getting Hacked by Using a Network Vulnerability Scanner
Prevent Getting Hacked by Using a Network Vulnerability Scanner
 
Network Security of Data Protection
Network Security of Data ProtectionNetwork Security of Data Protection
Network Security of Data Protection
 
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
 
IT security in 2021: Why Ransomware Is Still The Biggest Threat
IT security in 2021: Why Ransomware Is Still The Biggest ThreatIT security in 2021: Why Ransomware Is Still The Biggest Threat
IT security in 2021: Why Ransomware Is Still The Biggest Threat
 
The Small Business Cyber Security Best Practice Guide
The Small Business Cyber Security Best Practice GuideThe Small Business Cyber Security Best Practice Guide
The Small Business Cyber Security Best Practice Guide
 
Dos and Don’ts of Network Security.pdf
Dos and Don’ts of Network Security.pdfDos and Don’ts of Network Security.pdf
Dos and Don’ts of Network Security.pdf
 
Cyber Security: Most Important Aspect of a Successful Business
Cyber Security: Most Important Aspect of a Successful BusinessCyber Security: Most Important Aspect of a Successful Business
Cyber Security: Most Important Aspect of a Successful Business
 

Recently uploaded

一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
ayvbos
 
一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理
F
 
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
ydyuyu
 
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girlsRussian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Monica Sydney
 
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
ydyuyu
 
call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsIndian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Monica Sydney
 
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
gajnagarg
 
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsRussian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Monica Sydney
 

Recently uploaded (20)

一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirt
 
一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理
 
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
 
Best SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency DallasBest SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency Dallas
 
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girlsRussian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
 
Local Call Girls in Seoni 9332606886 HOT & SEXY Models beautiful and charmin...
Local Call Girls in Seoni  9332606886 HOT & SEXY Models beautiful and charmin...Local Call Girls in Seoni  9332606886 HOT & SEXY Models beautiful and charmin...
Local Call Girls in Seoni 9332606886 HOT & SEXY Models beautiful and charmin...
 
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
 
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
 
call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
 
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsIndian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
 
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrStory Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
 
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency""Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
 
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
 
Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
 
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime NagercoilNagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
 
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsRussian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
 
Mira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
Mira Road Housewife Call Girls 07506202331, Nalasopara Call GirlsMira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
Mira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf
 

10 Components of Business Cyber Security

  • 2. CYBER SECURITY has become the major complex issue for almost every business. Here we share essential elements of cyber security to ensure that your business or organization is risk-free..
  • 3. NETWORK PROTECTION Quite often, your network acts as the getaway to malicious files that end up damaging your systems. That’s why you need to take precautionary measures by employing proper hardware and software solutions. This will filter out mischievous content and doesn’t let your systems get infected.
  • 4. PRIVILEGED ACCOUNT MANAGEMENT Some accounts are more privileged than others. Only the privileged and trusted users should be entrusted with credentials of such accounts. Any human error could cause havoc.
  • 5. MALWARE DEFENSE Many aren't aware of the fact that malware is the most dominant breed of threats online. The thing about them is that they can be infused in a system using a ton of ways. That's why having a malware protection plan is of paramount importance.
  • 6. LET'S HAVE A LOOK AT A RECENT MALWARE REPORT
  • 7. 15,107,232Different malware files that we had never seen before 99%of all malware never appears again anywhere else 285,000New malware samples every day
  • 8. CONSTANT MONITORING All of your systems must be monitored and analyzed by a security professional. This way, attacks could be thwarted even before they take place.
  • 9. GET EVERYTHING UP-TO-DATE Updates exist for a reason, and that reason is improvement. In many instances, authorities roll out updates with patches for older vulnerabilities. You need to be on guard and update your systems and software as soon as possible.
  • 10. 5 RISKS OF OUTDATED OR UNSUPPORTED SOFTWARE, BROWSERS, & OPERATING SYSTEMS RANSOMWARE BUSINESS DISRUPTIONS DECREASED PRODUCTIVITY SECURITY HOLES INCREASE DOWNTIME
  • 11. INCIDENT MANAGEMENT PLAN You don't want your employees to run and scream around your office on getting attacked, do you? That's why having a proper incident management plan should be a priority for you, and all of your involved employees must be aware of it.
  • 12. What to do in the first 24 hours of Data Breach Incident DATA BREACH INCIDENT RESPONSE – A COMPLETE CHECKLIST What to do Beyond 24 hours of Data Breach Incident
  • 13. MANAGE REMOVABLE DEVICES In movies, you might have seen a hacker plugging in a USB drive and downloading all of the system's data in it. Well, that might seem far- fetched, but it isn't. Using a removable device such as a USB flash drive, a hacker could unleash viruses and malware that could break your systems down. That's why keeping the removable devices to the minimum is the best thing to do
  • 14. SECURITY EDUCATION We couldn't stress this enough, and the organizations couldn't ignore this enough. When it comes to cyber-attacks, employee mistakes act as the chief reason. Various studies conducted around the world vouch for it. That’s why every employee must be equipped with the basics of cyber security so that any unfortunate incident doesn’t take place
  • 15. 9 Reasons Why You Need Security Education and Awareness 1. It is the first line of defense against security risks 2. You will have greater chances of employment 3. You will be complying with regulatory requirements 4. You will build customer trust and loyalty 5. Every business now needs it. 6. You will be able to work with security technology 7. You will be safe from personal risks, too 8. You will be able to enlighten others 9. Your mindset will align with your employer’s objectives
  • 16. SECURITY POLICY What good is your security plan if you don't have a robust security policy in place? Good security acts as the guideline for online behavior within the organization. It comprises the dos and don’ts so that any trivial mistake or ignorance doesn’t result in a disaster.
  • 17. MOBILE WORKING The work from home culture is getting more and more traction nowadays. As good as it is, it comes with some risks. For example, if an employee gets connected through a public network, it could leave him open to data stealing and data tampering – man-in-the-middle attack in technical terms. To avoid such lapses, there should be a stringent policy in place for mobile working.
  • 18. HOW TO PROTECT YOUR DEVICE LOSS Do keep your phone encrypted so that in case of any breach your data remain encrypted APPS We should avoid using beta install applications and always read reviews and rating of Apps from authentic sites WIFI Avoid using banking/Financial or sites for sharing personal information on Unsecured or public Wi-Fi’s MALWARE Do a security check for any app and ensures that installed application do not install any third party tools by itself. SOCIAL ATTACKS One should always notice above things before clicking on any link or giving any important information. If you find any such noticeable things you should avoid that piece of information.
  • 19. THANKS! Any questions? You can write us at support@comodosslstore.com Or Visit – https://comodosslstore.com
  • 20. CREDITS Special thanks to all the people who made and released these awesome resources for free:  Helpful Resources  Data Breach Incident Response – A Complete Checklist  A Comprehensive Strategy for Preventing Cyber Attacks  Top 5 Mobile Security Threats You Can Avoid  10 Reasons Why You Need Security Education and Awareness  Figure & Data by Panda Security  Presentation template by SlidesCarnival