SlideShare a Scribd company logo
1 of 25
COFENSE.COM
© Copyright 2018 Cofense™ All rights reserved.
General Cybersecurity
Awareness
© Copyright 2018 Cofense™ All rights reserved.
What is Cybersecurity?
Cyber security is the practice of
defending computers, servers, mobile
devices, electronic systems, networks,
and data from malicious attacks.
© Copyright 2018 Cofense™ All rights reserved.
Personal Cybersecurity Tips /
Best Practices
Use Strong
Passwords
Use a VPN
When
Necessary
Think Before
You Click
Update Your
Home Router
Update Your
Devices
Use Two-
Factor
Authentication
© Copyright 2018 Cofense™ All rights reserved.
Threats and Practices
Malware
Spear Phishing
Malicious Links
Passwords
Browsing in Public
Data Compromise
© Copyright 2018 Cofense™ All rights reserved.
Threat: Malware
• Software designed to compromise
a device/network
• Examples:
– Worm/virus
– Botnet
– Banking Trojan
– Ransomware
© Copyright 2018 Cofense™ All rights reserved.
Who is Targeted?
• It is estimated that ransomware
damages will cost more than $20
billion globally in 2020
• Encrypts/locks files
• Holds files for ransom
• Typically obtained via:
– Spam & phishing emails
– Unpatched security vulnerabilities
Ransomware
© Copyright 2018 Cofense™ All rights reserved.
Threat: Malware
Ransomware
1
2
© Copyright 2018 Cofense™ All rights reserved.
Best Practices: Malware
• Learn to identify phishing emails
• Exercise caution with links
• Do not download or click suspicious
links or files
• Keep software up-to-date
• Back files up regularly
© Copyright 2018 Cofense™ All rights reserved.
Threat: Spear Phishing
• Spear-phishing is a targeted attempt to
steal sensitive information such as
account credentials or financial
information from a specific victim, often for
malicious reasons.
• Common cause of data breaches
• Targeted emails
• Sent to small groups or individuals
• Use social engineering tactics
• 93 percent of incidents/breaches
© Copyright 2018 Cofense™ All rights reserved.
Example of a Spear Phishing Email
1
3
2
5
4
© Copyright 2018 Cofense™ All rights reserved.
Threat: Business Email Compromise
• Solicits wire transfer
• Impersonates executive,
vendor, or supplier
• Resembles spear phishing
• Targets financial officers
© Copyright 2018 Cofense™ All rights reserved.
Best Practices: Spear Phishing
• Check the sender
• Look out for warning signs
• Think before you click or take action
• Never hand over sensitive info
© Copyright 2018 Cofense™ All rights reserved.
Threat: Malicious Links
• Anchor may hide true destination
• Hacked landing pages
• Copycat domains (exampel.com)
• Shortened links
© Copyright 2018 Cofense™ All rights reserved.
Best Practices: Malicious Links
• Always check the destination
• Desktop: hover over anchor
• Mobile: hold for several seconds
See It In Action!
https://www.example.com/totally-legit.html
(http://www.example.com.some-other-site.co.uk/downloads/file.php)
© Copyright 2018 Cofense™ All rights reserved.
Threat: Password Security
• Susceptible to:
– Brute force
– Hacking
– Malware
– Phishing
– Data breach
© Copyright 2018 Cofense™ All rights reserved.
Best Practices: Password Security
9@kj*YbM25nGnl
Yes
• Effective passwords are:
– Long
– Complex
– Unique
– Rotating
• Enable MFA where possible
p@ssw0rd12
No
© Copyright 2018 Cofense™ All rights reserved.
Threat: Browsing in Public
• Unsecured networks
– “Man in the Middle”
• Visual hacking
• 44% of stolen devices were left in a
public place [3]
© Copyright 2018 Cofense™ All rights reserved.
Best Practices: Browsing in Public
• Avoid public wireless networks
• Use reputable VPN
• Be mindful of surroundings
• Precautionary apps
– “Find my phone”
– “Remote wipe”
© Copyright 2018 Cofense™ All rights reserved.
Threat: Data Compromise
• May result from:
– Spear phishing
– Hacking or malware
– Simple negligence
• Average cost: $3.86 MM [4]
© Copyright 2018 Cofense™ All rights reserved.
Best Practices: Data Compromise
• Storing sensitive information:
– Yes to encrypted devices
– No to removable media (flash drives)
• Sharing:
– Who is authorized?
– Check email CC’s
– Secured network?
• Destruction:
– Recycle bin is not enough!
© Copyright 2018 Cofense™ All rights reserved.
Cybersecurity Basics Checklist
• Keep all your software up-to-date
• Install a reliable antivirus solution
• Enhance your security with a product that can block
attacks antivirus can’t detect
• Use strong passwords and change them often
• Activate and use two step verification where available
• Avoid oversharing information on social media
• Back up your data. Do it often. Back up in several places
© Copyright 2018 Cofense™ All rights reserved.
Cybersecurity Basics Checklist
• Never open emails from unknown senders
• Never download or open attachments sent by unknown
senders
• Keep your financial information safe and don’t share it with
anyone
• Avoid untrusted websites and don’t click on suspicious
banners or links
• Adjust the privacy and security settings in your browser
and apps
© Copyright 2018 Cofense™ All rights reserved.
Let’s Recap
© Copyright 2018 Cofense™ All rights reserved.
Sources for Cybersecurity News
1. Forbes Cybersecurity offers daily cybersecurity-focused pieces from staff writers and
contributors.
2. WIRED SECURITY publishes content on cyberwarfare, dark web and global
cybersecurity news.
3. The New York Times Computer Security News shares breaking cybersecurity
news/stories.
4. U.S. News Cybersecurity covers the latest news items on cybersecurity and
cybercrime.
5. CNBC Tech | Cybersecurity shares relevant news on cybersecurity and privacy issues.
6. Technopedia offers a comprehensive glossary of cybersecurity terms and concepts.
QUESTIONS?

More Related Content

Similar to Cybersecurity Awareness Overview.pptx

Unveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity postureUnveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity postureLourdes Paloma Gimenez
 
106 Threat defense and information security development trends
106 Threat defense and information security development trends106 Threat defense and information security development trends
106 Threat defense and information security development trendsSsendiSamuel
 
Protecting Your Business From Cybercrime
Protecting Your Business From CybercrimeProtecting Your Business From Cybercrime
Protecting Your Business From CybercrimeDavid J Rosenthal
 
iGCSE Theory Unit 6 – Effects of Using ICT
iGCSE Theory Unit 6 – Effects of Using ICTiGCSE Theory Unit 6 – Effects of Using ICT
iGCSE Theory Unit 6 – Effects of Using ICTjonspav
 
Cybercrime - Stealing in the Connected Age
Cybercrime - Stealing in the Connected AgeCybercrime - Stealing in the Connected Age
Cybercrime - Stealing in the Connected Agedlblumen
 
Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Imperva
 
You think you are safe online. Are You?
You think you are safe online. Are You?You think you are safe online. Are You?
You think you are safe online. Are You?TechGenie
 
Data security best practices for risk awareness and mitigation
Data security best practices for risk awareness and mitigationData security best practices for risk awareness and mitigation
Data security best practices for risk awareness and mitigationNick Chandi
 
Defending Your IBM i Against Malware
Defending Your IBM i Against MalwareDefending Your IBM i Against Malware
Defending Your IBM i Against MalwarePrecisely
 
Cybersecurity for CRM v0219-3
Cybersecurity for CRM v0219-3Cybersecurity for CRM v0219-3
Cybersecurity for CRM v0219-3Caston Thomas
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security PresentationPraphullaShrestha1
 
Cybersecurity: Malware & Protecting Your Business From Cyberthreats
Cybersecurity: Malware & Protecting Your Business From CyberthreatsCybersecurity: Malware & Protecting Your Business From Cyberthreats
Cybersecurity: Malware & Protecting Your Business From CyberthreatsSecureDocs
 
IntroCyberv2.1_Chp2_Instructor_Supplemental_Material.pptx
IntroCyberv2.1_Chp2_Instructor_Supplemental_Material.pptxIntroCyberv2.1_Chp2_Instructor_Supplemental_Material.pptx
IntroCyberv2.1_Chp2_Instructor_Supplemental_Material.pptxfuebf
 
Leveraging Compliance to “Help” Prevent a Future Breach
Leveraging Compliance to “Help” Prevent a Future BreachLeveraging Compliance to “Help” Prevent a Future Breach
Leveraging Compliance to “Help” Prevent a Future BreachKevin Murphy
 
OWASP Poland Day 2018 - Amir Shladovsky - Crypto-mining
OWASP Poland Day 2018 - Amir Shladovsky - Crypto-miningOWASP Poland Day 2018 - Amir Shladovsky - Crypto-mining
OWASP Poland Day 2018 - Amir Shladovsky - Crypto-miningOWASP
 

Similar to Cybersecurity Awareness Overview.pptx (20)

Unveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity postureUnveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity posture
 
106 Threat defense and information security development trends
106 Threat defense and information security development trends106 Threat defense and information security development trends
106 Threat defense and information security development trends
 
Protecting Your Business From Cybercrime
Protecting Your Business From CybercrimeProtecting Your Business From Cybercrime
Protecting Your Business From Cybercrime
 
NEDMA18 Keynote: Cyber Security – what you need to know, what you need to do
NEDMA18 Keynote: Cyber Security – what you need to know, what you need to doNEDMA18 Keynote: Cyber Security – what you need to know, what you need to do
NEDMA18 Keynote: Cyber Security – what you need to know, what you need to do
 
Cybersecurity.pptx
Cybersecurity.pptxCybersecurity.pptx
Cybersecurity.pptx
 
iGCSE Theory Unit 6 – Effects of Using ICT
iGCSE Theory Unit 6 – Effects of Using ICTiGCSE Theory Unit 6 – Effects of Using ICT
iGCSE Theory Unit 6 – Effects of Using ICT
 
Cyberattacks.pptx
Cyberattacks.pptxCyberattacks.pptx
Cyberattacks.pptx
 
Cybercrime - Stealing in the Connected Age
Cybercrime - Stealing in the Connected AgeCybercrime - Stealing in the Connected Age
Cybercrime - Stealing in the Connected Age
 
Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016
 
You think you are safe online. Are You?
You think you are safe online. Are You?You think you are safe online. Are You?
You think you are safe online. Are You?
 
Data security best practices for risk awareness and mitigation
Data security best practices for risk awareness and mitigationData security best practices for risk awareness and mitigation
Data security best practices for risk awareness and mitigation
 
Defending Your IBM i Against Malware
Defending Your IBM i Against MalwareDefending Your IBM i Against Malware
Defending Your IBM i Against Malware
 
Cybersecurity for CRM v0219-3
Cybersecurity for CRM v0219-3Cybersecurity for CRM v0219-3
Cybersecurity for CRM v0219-3
 
Cyber
CyberCyber
Cyber
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
Cybersecurity: Malware & Protecting Your Business From Cyberthreats
Cybersecurity: Malware & Protecting Your Business From CyberthreatsCybersecurity: Malware & Protecting Your Business From Cyberthreats
Cybersecurity: Malware & Protecting Your Business From Cyberthreats
 
Cyber security
Cyber securityCyber security
Cyber security
 
IntroCyberv2.1_Chp2_Instructor_Supplemental_Material.pptx
IntroCyberv2.1_Chp2_Instructor_Supplemental_Material.pptxIntroCyberv2.1_Chp2_Instructor_Supplemental_Material.pptx
IntroCyberv2.1_Chp2_Instructor_Supplemental_Material.pptx
 
Leveraging Compliance to “Help” Prevent a Future Breach
Leveraging Compliance to “Help” Prevent a Future BreachLeveraging Compliance to “Help” Prevent a Future Breach
Leveraging Compliance to “Help” Prevent a Future Breach
 
OWASP Poland Day 2018 - Amir Shladovsky - Crypto-mining
OWASP Poland Day 2018 - Amir Shladovsky - Crypto-miningOWASP Poland Day 2018 - Amir Shladovsky - Crypto-mining
OWASP Poland Day 2018 - Amir Shladovsky - Crypto-mining
 

Recently uploaded

Ukraine War presentation: KNOW THE BASICS
Ukraine War presentation: KNOW THE BASICSUkraine War presentation: KNOW THE BASICS
Ukraine War presentation: KNOW THE BASICSAishani27
 
PKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptxPKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptxPramod Kumar Srivastava
 
Invezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signalsInvezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signalsInvezz1
 
Dubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls DubaiDubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls Dubaihf8803863
 
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...Suhani Kapoor
 
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Customer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptxCustomer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptxEmmanuel Dauda
 
From idea to production in a day – Leveraging Azure ML and Streamlit to build...
From idea to production in a day – Leveraging Azure ML and Streamlit to build...From idea to production in a day – Leveraging Azure ML and Streamlit to build...
From idea to production in a day – Leveraging Azure ML and Streamlit to build...Florian Roscheck
 
04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationships04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationshipsccctableauusergroup
 
Unveiling Insights: The Role of a Data Analyst
Unveiling Insights: The Role of a Data AnalystUnveiling Insights: The Role of a Data Analyst
Unveiling Insights: The Role of a Data AnalystSamantha Rae Coolbeth
 
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...Sapana Sha
 
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service BhilaiLow Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service BhilaiSuhani Kapoor
 
定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一
定制英国白金汉大学毕业证(UCB毕业证书)																			成绩单原版一比一定制英国白金汉大学毕业证(UCB毕业证书)																			成绩单原版一比一
定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一ffjhghh
 
100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptxAnupama Kate
 
Call Girls In Mahipalpur O9654467111 Escorts Service
Call Girls In Mahipalpur O9654467111  Escorts ServiceCall Girls In Mahipalpur O9654467111  Escorts Service
Call Girls In Mahipalpur O9654467111 Escorts ServiceSapana Sha
 
FESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfFESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfMarinCaroMartnezBerg
 
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...Suhani Kapoor
 
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 

Recently uploaded (20)

Ukraine War presentation: KNOW THE BASICS
Ukraine War presentation: KNOW THE BASICSUkraine War presentation: KNOW THE BASICS
Ukraine War presentation: KNOW THE BASICS
 
Decoding Loan Approval: Predictive Modeling in Action
Decoding Loan Approval: Predictive Modeling in ActionDecoding Loan Approval: Predictive Modeling in Action
Decoding Loan Approval: Predictive Modeling in Action
 
PKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptxPKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptx
 
Invezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signalsInvezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signals
 
Dubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls DubaiDubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls Dubai
 
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
 
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
 
Customer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptxCustomer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptx
 
From idea to production in a day – Leveraging Azure ML and Streamlit to build...
From idea to production in a day – Leveraging Azure ML and Streamlit to build...From idea to production in a day – Leveraging Azure ML and Streamlit to build...
From idea to production in a day – Leveraging Azure ML and Streamlit to build...
 
04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationships04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationships
 
Unveiling Insights: The Role of a Data Analyst
Unveiling Insights: The Role of a Data AnalystUnveiling Insights: The Role of a Data Analyst
Unveiling Insights: The Role of a Data Analyst
 
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...
 
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service BhilaiLow Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
 
VIP Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Boo...
VIP Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Boo...VIP Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Boo...
VIP Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Boo...
 
定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一
定制英国白金汉大学毕业证(UCB毕业证书)																			成绩单原版一比一定制英国白金汉大学毕业证(UCB毕业证书)																			成绩单原版一比一
定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一
 
100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx
 
Call Girls In Mahipalpur O9654467111 Escorts Service
Call Girls In Mahipalpur O9654467111  Escorts ServiceCall Girls In Mahipalpur O9654467111  Escorts Service
Call Girls In Mahipalpur O9654467111 Escorts Service
 
FESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfFESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdf
 
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
 
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
 

Cybersecurity Awareness Overview.pptx

  • 1. COFENSE.COM © Copyright 2018 Cofense™ All rights reserved. General Cybersecurity Awareness
  • 2. © Copyright 2018 Cofense™ All rights reserved. What is Cybersecurity? Cyber security is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
  • 3. © Copyright 2018 Cofense™ All rights reserved. Personal Cybersecurity Tips / Best Practices Use Strong Passwords Use a VPN When Necessary Think Before You Click Update Your Home Router Update Your Devices Use Two- Factor Authentication
  • 4. © Copyright 2018 Cofense™ All rights reserved. Threats and Practices Malware Spear Phishing Malicious Links Passwords Browsing in Public Data Compromise
  • 5. © Copyright 2018 Cofense™ All rights reserved. Threat: Malware • Software designed to compromise a device/network • Examples: – Worm/virus – Botnet – Banking Trojan – Ransomware
  • 6. © Copyright 2018 Cofense™ All rights reserved. Who is Targeted? • It is estimated that ransomware damages will cost more than $20 billion globally in 2020 • Encrypts/locks files • Holds files for ransom • Typically obtained via: – Spam & phishing emails – Unpatched security vulnerabilities Ransomware
  • 7. © Copyright 2018 Cofense™ All rights reserved. Threat: Malware Ransomware 1 2
  • 8. © Copyright 2018 Cofense™ All rights reserved. Best Practices: Malware • Learn to identify phishing emails • Exercise caution with links • Do not download or click suspicious links or files • Keep software up-to-date • Back files up regularly
  • 9. © Copyright 2018 Cofense™ All rights reserved. Threat: Spear Phishing • Spear-phishing is a targeted attempt to steal sensitive information such as account credentials or financial information from a specific victim, often for malicious reasons. • Common cause of data breaches • Targeted emails • Sent to small groups or individuals • Use social engineering tactics • 93 percent of incidents/breaches
  • 10. © Copyright 2018 Cofense™ All rights reserved. Example of a Spear Phishing Email 1 3 2 5 4
  • 11. © Copyright 2018 Cofense™ All rights reserved. Threat: Business Email Compromise • Solicits wire transfer • Impersonates executive, vendor, or supplier • Resembles spear phishing • Targets financial officers
  • 12. © Copyright 2018 Cofense™ All rights reserved. Best Practices: Spear Phishing • Check the sender • Look out for warning signs • Think before you click or take action • Never hand over sensitive info
  • 13. © Copyright 2018 Cofense™ All rights reserved. Threat: Malicious Links • Anchor may hide true destination • Hacked landing pages • Copycat domains (exampel.com) • Shortened links
  • 14. © Copyright 2018 Cofense™ All rights reserved. Best Practices: Malicious Links • Always check the destination • Desktop: hover over anchor • Mobile: hold for several seconds See It In Action! https://www.example.com/totally-legit.html (http://www.example.com.some-other-site.co.uk/downloads/file.php)
  • 15. © Copyright 2018 Cofense™ All rights reserved. Threat: Password Security • Susceptible to: – Brute force – Hacking – Malware – Phishing – Data breach
  • 16. © Copyright 2018 Cofense™ All rights reserved. Best Practices: Password Security 9@kj*YbM25nGnl Yes • Effective passwords are: – Long – Complex – Unique – Rotating • Enable MFA where possible p@ssw0rd12 No
  • 17. © Copyright 2018 Cofense™ All rights reserved. Threat: Browsing in Public • Unsecured networks – “Man in the Middle” • Visual hacking • 44% of stolen devices were left in a public place [3]
  • 18. © Copyright 2018 Cofense™ All rights reserved. Best Practices: Browsing in Public • Avoid public wireless networks • Use reputable VPN • Be mindful of surroundings • Precautionary apps – “Find my phone” – “Remote wipe”
  • 19. © Copyright 2018 Cofense™ All rights reserved. Threat: Data Compromise • May result from: – Spear phishing – Hacking or malware – Simple negligence • Average cost: $3.86 MM [4]
  • 20. © Copyright 2018 Cofense™ All rights reserved. Best Practices: Data Compromise • Storing sensitive information: – Yes to encrypted devices – No to removable media (flash drives) • Sharing: – Who is authorized? – Check email CC’s – Secured network? • Destruction: – Recycle bin is not enough!
  • 21. © Copyright 2018 Cofense™ All rights reserved. Cybersecurity Basics Checklist • Keep all your software up-to-date • Install a reliable antivirus solution • Enhance your security with a product that can block attacks antivirus can’t detect • Use strong passwords and change them often • Activate and use two step verification where available • Avoid oversharing information on social media • Back up your data. Do it often. Back up in several places
  • 22. © Copyright 2018 Cofense™ All rights reserved. Cybersecurity Basics Checklist • Never open emails from unknown senders • Never download or open attachments sent by unknown senders • Keep your financial information safe and don’t share it with anyone • Avoid untrusted websites and don’t click on suspicious banners or links • Adjust the privacy and security settings in your browser and apps
  • 23. © Copyright 2018 Cofense™ All rights reserved. Let’s Recap
  • 24. © Copyright 2018 Cofense™ All rights reserved. Sources for Cybersecurity News 1. Forbes Cybersecurity offers daily cybersecurity-focused pieces from staff writers and contributors. 2. WIRED SECURITY publishes content on cyberwarfare, dark web and global cybersecurity news. 3. The New York Times Computer Security News shares breaking cybersecurity news/stories. 4. U.S. News Cybersecurity covers the latest news items on cybersecurity and cybercrime. 5. CNBC Tech | Cybersecurity shares relevant news on cybersecurity and privacy issues. 6. Technopedia offers a comprehensive glossary of cybersecurity terms and concepts.