SlideShare a Scribd company logo
Cyber Security Induction
E – Learning Course Information
1. To promote information security awareness in the area of:
i. Introduction to information security;
ii. Social engineering;
iii. Malware;
iv. Mobile security & social media; and
v. Responsible browsing.
2. To serve as an induction course for new Axiata employees.
3. To serve as a refresher course for existing Axiata employees.
OBJECTIVES
OBJECTIVES
1. Understand information security, its importance and the role you have to
play to protect our information security.
2. Recognise the many forms of social engineering, its potential impacts and
how to stay vigilant against it.
3. Be aware of the different types of malware and signs of malware infection,
and ways to prevent exposing your device to malware.
4. Understand mobile security, identify common mobile devices and mobile
security attacks, and ways to reduce risk of mobile security attacks.
5. Recognise the importance of responsible browsing, understand safe
browsing practices and practise safe sharing on social media.
Why Is This Course Important?
Upon completion of this course, participants will be able to:
Let’s begin.
1
2
3
4
5
Course Content
Introduction to Information Security
Social Engineering
Mobile Security and Social Media
Responsible Browsing
Malware
6 Assessment
Introduction to
Information Security
PEOPLE.
Our people working across the Axiata Group.
Even with the absence of malicious intent, often times, information security is
compromised due to employees’ lack of understanding on how to work in a secure
manner.
But where does our biggest threat come from?
Why Do We Care?
Estimates upwards of 250 billion dollars of loss associated with Cyber Crime!
Every year, the Director of National Intelligence publishes an unclassified “Worldwide
Threat Assessment.” The year 2018 report was published listing “Cyber” is the first (and
greatest) threat listed.
Information Security
What is it?
All the processes and practices we implement to protect networks, computers,
applications and data from attacks on the C-I-A triad (Confidentiality, Integrity, and
Availability).
You can ensure you play your part in protecting our information by:
Keeping to our values.
Keeping vigilant and diligent.
Keeping hold of our valuables.
Keeping it confidential.
Keeping us all safe.
How Do I Play My Part and How Will I Help?
You will be helping Axiata to:
Protect information from a range of threats.
Ensure business continuity.
Minimise potential financial loss.
Optimise return on investments.
Increase business opportunities.
Always logoff or lock your
system even if you leave for a
short time.
Keep systems patched and up
to date.
Use strong passwords and
protect your passwords.
Encrypt sensitive files to ensure
confidentiality of data.
Watch what you share and be
cautious of what information
you put out there.
Never let someone have
access to your system with
your credentials.
Be wary of individuals looking
for information or access to the
building.
Disable unsecured
mechanisms.
If something feels wrong or
uncomfortable, trust your
instinct and ask for help.
Report any potential breach to
your security team.
Good Information Security Practices
1
2
3
4
5
6
7
8
9
10
Social Engineering
• Social engineering is the act of manipulating people into disclosing private
information and sometimes it involves breaking normal security procedures.
• It relies heavily on manipulating human emotions, such as guilt and fear.
• It exploits our natural tendency to trust others.
• It is very common because it is much easier to trick a person into disclosing
his or her credentials than hacking into his or her account.
Social Engineering?
Common Social Engineering Attacks
Phishing
Phishing is a technique of fraudulently obtaining private information.
Phishing refers to the use of emails that appear to originate from a trusted source to
trick a user into entering his or her login credentials, ATM card’s PIN number or credit card
number at a fake website.
Phishing emails typically look very convincing and contains a link to fake web pages with
seemingly legitimate company logos and addresses.
While spear phishing and phishing are similar in the sense that both attacks involve
sending emails to trick users into providing information, the key difference is that spear
phishing involves sending highly customised emails to a few specific users whereas
phishing involves sending generic emails to a broad number of users.
This means that spear phishing email is more strategic and specific with its choice of
targets. Hence, spear phishing attacks are known to have higher rate of success than
phishing attacks.
Spear Phishing
Common Social Engineering Attacks
Vishing, otherwise known as voice phishing, is the practice of using the telephone to
impersonate a known individual to gain access to sensitive information.
Typically, the victim receives a call with a voice message disguised as a communication from
a financial institute or government agency.
3. Vishing
4. Tailgating
Tailgating is the practice of following someone through a security controlled door
without showing or using the required ID pass.
A tailgater may request the target to hold the door, stating that he or she forgot to bring his
or her ID along.
The target typically complies to the tailgater’s request out of good faith and common courtesy
without verifying if the tailgater is allowed on premises. z
Limit what you share online
• Without prior information,
social engineers are unable
to establish a solid pretext
to trick you.
• Set your social media
accounts private
• Accept friend requests from
people you know in real life
• Refrain from posting
sensitive information online.
Think before you click
Do not click, forward or respond to phishing
emails.
Challenge tailgaters
Politely reject requests from tailgaters to hold the
door and direct them to register at the reception
counter instead.
Think before you speak
Do not disclose your personal information to
unknown caller.
Be aware, connect with care
Do not connect unfamiliar physical media to the
organisation’s network.
Defending Against Social Engineering Attacks
Practise laptop security
• Secure your laptop to your workstation with a cable lock.
• Never leave your laptop in your vehicle.
• Press “Ctrl” and “L” to lock your laptop screen when it is not in use.
Follow Axiata Policy and Procedures
Read, understand and follow Axiata’s policy and procedures.
When in doubt, report to IT helpdesk!
Keep your software up-to-date
Software updates involves security patches that fixes security vulnerabilities.
Defending Against Social Engineering Attacks
Malware
What is Malware?
Malicious software.
Executes without your permission.
Tricks you into thinking it’s something else.
Works to remain unnoticed.
Compromise computer functions.
Steal data.
Bypass access controls.
Harms the host computer.
Stealing data, monitoring user activity, modifying files - these are one of the few
things a malware can do.
Being aware of their tactics is the first line of defense! The list below depicts
some of the common malwares.
Trojan
Bot
RAT
Common Malwares
Bots are software programs created to automatically perform specific
operations such as video gaming, internet auctions and online contests.
A Trojan disguises itself as a normal file or program to trick users into
downloading and installing malware. It is typically bundled with games.
RAT (short for remote access Trojan) is a malware program that
includes a back door for administrative control over the target
computer.
Pop-ups that asks you to download antivirus software or offer freebies.
Antivirus software and firewalls have been disabled without your consent.
Computer is running slower than usual.
Emails/messages being sent automatically without user’s knowledge.
Computer has been crashing or freezing lately.
Detecting Malwares
Detecting malware is not an easy task. Anti-virus software are rarely 100%
accurate at detecting malware because malwares are designed to self-update and
continually hides its presence whenever they start getting detected.
If your computer is acting “funny”, it may be infected with malware.
The most common indicators of a malware attack include:
Preventing Malwares
Prevention is better than cure. As malwares are getting harder to detect and new
threats are seen on a regular basis, you must be extra cautious in reducing the risk
of getting malware attacks on your computer.
Listed below are a few key recommendations to prevent malwares.
Installing protection
software
Update your
operating system
Securing your
network
• Important updates
for your system are
packed with bug
fixes, virus
protection, and lots
of other important
things to keep your
device clean.
• Ensure your
network needs a
strong password to
connect.
• Do not broadcast
your network name.
• Provide a separate
network for guests.
When you suspect a malware infection, report to your IT security team
immediately before the problem gets worst!
• This protection is a
must-have first step
in keeping your
computer virus free.
• Ensure that you
keep your software
up to date too.
Mobile Security
What is Mobile Security?
Also known as wireless security.
Serves as a protection of smartphones,
tablets, laptops and other portable
computing devices and the networks
they connect to from threats and
vulnerabilities.
A means by which a mobile device can
authenticate users and protect or restrict
access to data stored on the device.
Common Mobile Devices
in the Workplace
Laptops
Bluetooth devices
Smartphone
BYOD (Bring Your
Own Device)
Tablets
Common Attacks
Theft / Gaining Physical Access
Data Interception
Insider Threats
Malware
Eavesdropping
Ways to reduce the risk of mobile security attacks
What can
we do?
Use Strong
Passwords.
Enable remote wipe function and
consider the “Find Your Device
Option”.
Backup and protect
your data.
Don’t connect to a work system
or the network unless you have
permission to do so.
Download only secure
applications.
Be cautious about what you share
– text is not inherently secure.
Don’t ‘jailbreak’ or
‘root’ your device.
Report anything suspicious to the
security team.
Responsible
Browsing
What is Responsible Browsing?
Browsing habits that protect your personal information and online
activity from cyber criminals, while being accountable for the impacts of
your browsing habits towards Axiata's information security.
What are Safe Browsing Practices?
• All information shared on the internet are easily accessed by the public within
a single click, which makes the internet a risky place.
• Cyber criminals often lurk behind the scenes while internet users browse
online, prying to steal sensitive information and execute other malicious
activities.
• Hence, it is important to understand and follow certain safeguards in order to
defend ourselves from the schemes of cyber criminals.
• These safeguards are known as safe browsing practices, which are simple
tips you can take to keep your online activity safe from cyber criminals.
• The next few pages show some examples of safe browsing practices.
Create Secure & Unique Passwords.
• Creating strong passwords make it difficult for cyber criminals to crack
the password. A strong password should have a mix of the following:
• Upper case;
• Lower case;
• Number; and
• Special character.
• Example of a weak password versus a strong password is as below:
Weak Password Strong Password
• ThisPasswordIsStrong Th1sPa55wordisStr0ng
Staying Safe while using Public Wi-Fi
• Verify your connection.
• Be sure to ask the employee what the actual public Wi-Fi is to avoid
connecting to a bogus network.
• Avoid checking sensitive data.
• Hold off on login to your social media, email and especially your financial
accounts while on public Wi-Fi.
• Turn off sharing.
• Be sure to turn off sharing while you are on public Wi-Fi. If you leave it on
while in a public place, cyber criminals can easily gain access to sensitive
personal information and fields.
• Use a VPN.
• If you need to check sensitive data like your banking account while on public
Wi-Fi, use a virtual private network or a VPN. Even if a cyber criminal
positions himself in the middle of your connection, your data will be strongly
encrypted.
• Turn your Wi-Fi off when you’re done.
• Even if you haven't actively connected to your network, the Wi-Fi hardware
and your computer can still be transmitting data with any network in range. If
you are through using the internet, ensure that your Wi-Fi is turned off.
Avoid Unsecured Websites
• Websites with secured connection will have URLs that start with
“https.” instead of “http://”.
• The “s” suffix indicate that the website information is secured and encrypted.
This security is provided by a SSL certificate, which certifies that sensitive
information entered into that site is secured.
• Without a SSL certificate, that information is highly vulnerable to be exposed
and easily accessible by cybercriminals.
• Identify a padlock symbol in the browser window frame, which appears
when you attempt to log in to your existing accounts or register new
accounts. You can click on the padlock icon to verify that your connection is
secure.
Keep Browser Up-to-date
• Most updates will include security patches. New patches are often released
to fix existing vulnerabilities in browser software, so having the most up-to-
date versions is critical.
• If you're not installing those updates, you may leave yourself and Axiata
vulnerable to new threats that pop up constantly.
• Therefore, always make it a point to update your browser and leave no room
for any form of security vulnerabilities.
Importance of Responsible Browsing
• Browsing without caution can put Axiata at risk of all sorts of
dangers, which includes identity theft, data theft and even computer
damage.
• Sensitive information (e.g. credit card
number, bank accounts, IC number &
mobile number) could be stolen & used
for malicious purposes.
• It can be used to make fraudulent
purchases, sign up new credit cards,
and even apply for government
benefits.
IDENTITY THEFT
• Files from your computer such as
photographs, videos and documents
are stolen & then sold for illicit
purposes.
DATA THEFT
• Viruses are sent to computers to
cause damage and make them
inoperable.
COMPUTER DAMAGE
• Experiencing data breach will not only give us a bad reputation and affect our
business operations, it will also compromise our customer’s trust towards us.
• Losing our customer’s trust is the last thing we want to see happening, which
is why everyone in Axiata play an essential role in practicing browsing habits
that will improve the security of your online activities.
Assessment

More Related Content

What's hot

Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
Daniel P Wallace
 
Information Security Awareness Training Open
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training OpenFred Beck MBA, CPA
 
Security awareness
Security awarenessSecurity awareness
Security awareness
Josh Chandler
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@R_Yanus
 
Social Engineering Basics
Social Engineering BasicsSocial Engineering Basics
Social Engineering Basics
Luke Rusten
 
IT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeIT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeAtlantic Training, LLC.
 
Cybersecurity Awareness Training
Cybersecurity Awareness TrainingCybersecurity Awareness Training
Cybersecurity Awareness Training
Dave Monahan
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
TriCorps Technologies
 
Building An Information Security Awareness Program
Building An Information Security Awareness ProgramBuilding An Information Security Awareness Program
Building An Information Security Awareness Program
Bill Gardner
 
14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness
Michel Bitter
 
IT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.ppt
OoXair
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
Innocent Korie
 
Webinar_Cybersecurity is a shared responsibility presentation
Webinar_Cybersecurity is a shared responsibility presentationWebinar_Cybersecurity is a shared responsibility presentation
Webinar_Cybersecurity is a shared responsibility presentation
211 Check
 
End User Security Awareness Presentation
End User Security Awareness PresentationEnd User Security Awareness Presentation
End User Security Awareness Presentation
Cristian Mihai
 
Penetration Testing Basics
Penetration Testing BasicsPenetration Testing Basics
Penetration Testing Basics
Rick Wanner
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
sweetpeace1
 
Information Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn HospitalInformation Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn HospitalAtlantic Training, LLC.
 
Pranavi verma-cyber-security-ppt
Pranavi verma-cyber-security-pptPranavi verma-cyber-security-ppt
Pranavi verma-cyber-security-ppt
PranaviVerma
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101
mateenzero
 

What's hot (20)

Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Information Security Awareness Training Open
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training Open
 
Security awareness
Security awarenessSecurity awareness
Security awareness
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@
 
Social Engineering Basics
Social Engineering BasicsSocial Engineering Basics
Social Engineering Basics
 
IT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeIT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community College
 
Cybersecurity Awareness Training
Cybersecurity Awareness TrainingCybersecurity Awareness Training
Cybersecurity Awareness Training
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
 
Building An Information Security Awareness Program
Building An Information Security Awareness ProgramBuilding An Information Security Awareness Program
Building An Information Security Awareness Program
 
14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness
 
IT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.ppt
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Webinar_Cybersecurity is a shared responsibility presentation
Webinar_Cybersecurity is a shared responsibility presentationWebinar_Cybersecurity is a shared responsibility presentation
Webinar_Cybersecurity is a shared responsibility presentation
 
End User Security Awareness Presentation
End User Security Awareness PresentationEnd User Security Awareness Presentation
End User Security Awareness Presentation
 
Phishing
PhishingPhishing
Phishing
 
Penetration Testing Basics
Penetration Testing BasicsPenetration Testing Basics
Penetration Testing Basics
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
 
Information Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn HospitalInformation Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn Hospital
 
Pranavi verma-cyber-security-ppt
Pranavi verma-cyber-security-pptPranavi verma-cyber-security-ppt
Pranavi verma-cyber-security-ppt
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101
 

Similar to Cyber Security

Mobile security
Mobile securityMobile security
Mobile security
Tapan Khilar
 
Cybersecurity Awareness E-book by Propelled Technologies
Cybersecurity Awareness E-book by Propelled Technologies Cybersecurity Awareness E-book by Propelled Technologies
Cybersecurity Awareness E-book by Propelled Technologies
Anwar CHFI, SSCP, ITIL
 
Guarding the Digital Fortress Unmasking 10 Common Types of Cybersecurity Thre...
Guarding the Digital Fortress Unmasking 10 Common Types of Cybersecurity Thre...Guarding the Digital Fortress Unmasking 10 Common Types of Cybersecurity Thre...
Guarding the Digital Fortress Unmasking 10 Common Types of Cybersecurity Thre...
Mverve1
 
Guarding the Digital Fortress.pdf
Guarding the Digital Fortress.pdfGuarding the Digital Fortress.pdf
Guarding the Digital Fortress.pdf
Mverve1
 
Security Awareness Training.pptx
Security Awareness Training.pptxSecurity Awareness Training.pptx
Security Awareness Training.pptx
MohammedYaseen638128
 
cyber security.pptx
cyber security.pptxcyber security.pptx
cyber security.pptx
Tapan Khilar
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
Animesh Roy
 
Measures to Avoid Cyber-attacks
Measures to Avoid Cyber-attacksMeasures to Avoid Cyber-attacks
Measures to Avoid Cyber-attacks
Skillmine Technology Consulting
 
Measure To Avoid Cyber Attacks
Measure To Avoid Cyber AttacksMeasure To Avoid Cyber Attacks
Measure To Avoid Cyber Attacks
Skillmine Technology Consulting
 
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptxCYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
BarakaMuyengi
 
Ceferov Cefer Intelectual Technologies
Ceferov Cefer Intelectual TechnologiesCeferov Cefer Intelectual Technologies
Ceferov Cefer Intelectual Technologies
yusifagalar
 
Cybersecurity awareness.pdf
Cybersecurity awareness.pdfCybersecurity awareness.pdf
Cybersecurity awareness.pdf
CRO Cyber Rights Organization
 
7 Types of Cyber Security Threats | The Lifesciences Magazine
7 Types of Cyber Security Threats | The Lifesciences Magazine7 Types of Cyber Security Threats | The Lifesciences Magazine
7 Types of Cyber Security Threats | The Lifesciences Magazine
The Lifesciences Magazine
 
End user security awareness
End user security awarenessEnd user security awareness
End user security awareness
Kanishk Raj
 
Cyber security
Cyber securityCyber security
Cyber security
Akdu095
 
Ethical hacking and social engineering
Ethical hacking and social engineeringEthical hacking and social engineering
Ethical hacking and social engineering
Sweta Kumari Barnwal
 
Module 3-cyber security
Module 3-cyber securityModule 3-cyber security
Module 3-cyber security
Sweta Kumari Barnwal
 
Cyber Security for Financial Planners
Cyber Security for Financial PlannersCyber Security for Financial Planners
Cyber Security for Financial Planners
Michael O'Phelan
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdf
Careerera
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
tunzida045
 

Similar to Cyber Security (20)

Mobile security
Mobile securityMobile security
Mobile security
 
Cybersecurity Awareness E-book by Propelled Technologies
Cybersecurity Awareness E-book by Propelled Technologies Cybersecurity Awareness E-book by Propelled Technologies
Cybersecurity Awareness E-book by Propelled Technologies
 
Guarding the Digital Fortress Unmasking 10 Common Types of Cybersecurity Thre...
Guarding the Digital Fortress Unmasking 10 Common Types of Cybersecurity Thre...Guarding the Digital Fortress Unmasking 10 Common Types of Cybersecurity Thre...
Guarding the Digital Fortress Unmasking 10 Common Types of Cybersecurity Thre...
 
Guarding the Digital Fortress.pdf
Guarding the Digital Fortress.pdfGuarding the Digital Fortress.pdf
Guarding the Digital Fortress.pdf
 
Security Awareness Training.pptx
Security Awareness Training.pptxSecurity Awareness Training.pptx
Security Awareness Training.pptx
 
cyber security.pptx
cyber security.pptxcyber security.pptx
cyber security.pptx
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
 
Measures to Avoid Cyber-attacks
Measures to Avoid Cyber-attacksMeasures to Avoid Cyber-attacks
Measures to Avoid Cyber-attacks
 
Measure To Avoid Cyber Attacks
Measure To Avoid Cyber AttacksMeasure To Avoid Cyber Attacks
Measure To Avoid Cyber Attacks
 
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptxCYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
 
Ceferov Cefer Intelectual Technologies
Ceferov Cefer Intelectual TechnologiesCeferov Cefer Intelectual Technologies
Ceferov Cefer Intelectual Technologies
 
Cybersecurity awareness.pdf
Cybersecurity awareness.pdfCybersecurity awareness.pdf
Cybersecurity awareness.pdf
 
7 Types of Cyber Security Threats | The Lifesciences Magazine
7 Types of Cyber Security Threats | The Lifesciences Magazine7 Types of Cyber Security Threats | The Lifesciences Magazine
7 Types of Cyber Security Threats | The Lifesciences Magazine
 
End user security awareness
End user security awarenessEnd user security awareness
End user security awareness
 
Cyber security
Cyber securityCyber security
Cyber security
 
Ethical hacking and social engineering
Ethical hacking and social engineeringEthical hacking and social engineering
Ethical hacking and social engineering
 
Module 3-cyber security
Module 3-cyber securityModule 3-cyber security
Module 3-cyber security
 
Cyber Security for Financial Planners
Cyber Security for Financial PlannersCyber Security for Financial Planners
Cyber Security for Financial Planners
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdf
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
 

More from Ncell

Termination of contract
Termination of contractTermination of contract
Termination of contract
Ncell
 
Law of contract
Law of contractLaw of contract
Law of contract
Ncell
 
Law making procedures and law operating system for Business in nepal
Law making procedures and law operating system for Business in nepalLaw making procedures and law operating system for Business in nepal
Law making procedures and law operating system for Business in nepal
Ncell
 
Law & business law
Law  & business lawLaw  & business law
Law & business law
Ncell
 
Judicial system and jurisdiction of court in nepal
Judicial system and jurisdiction of court in nepalJudicial system and jurisdiction of court in nepal
Judicial system and jurisdiction of court in nepal
Ncell
 
Intellectual property rights (IPR)
Intellectual property rights (IPR)Intellectual property rights (IPR)
Intellectual property rights (IPR)
Ncell
 
Indemnity and guarantee
Indemnity and guaranteeIndemnity and guarantee
Indemnity and guarantee
Ncell
 
Foreign investment and technology transfer act
Foreign investment and technology transfer actForeign investment and technology transfer act
Foreign investment and technology transfer act
Ncell
 
Contract of sale of goods
Contract of sale of goodsContract of sale of goods
Contract of sale of goods
Ncell
 
Contract of agency
Contract of agencyContract of agency
Contract of agency
Ncell
 
Company
CompanyCompany
Company
Ncell
 
Breach of contract
Breach of contractBreach of contract
Breach of contract
Ncell
 
Board of directors
Board of directorsBoard of directors
Board of directors
Ncell
 
Bailment and pledge
Bailment and pledgeBailment and pledge
Bailment and pledge
Ncell
 
Employee Training & development
Employee Training & developmentEmployee Training & development
Employee Training & development
Ncell
 
Selection decisions
Selection decisionsSelection decisions
Selection decisions
Ncell
 
Recruitment decisions
Recruitment decisionsRecruitment decisions
Recruitment decisions
Ncell
 
Person profiling - Person Job Fit
Person profiling - Person Job FitPerson profiling - Person Job Fit
Person profiling - Person Job Fit
Ncell
 
Performance planning
Performance planningPerformance planning
Performance planning
Ncell
 
Performance appraisal
Performance appraisalPerformance appraisal
Performance appraisal
Ncell
 

More from Ncell (20)

Termination of contract
Termination of contractTermination of contract
Termination of contract
 
Law of contract
Law of contractLaw of contract
Law of contract
 
Law making procedures and law operating system for Business in nepal
Law making procedures and law operating system for Business in nepalLaw making procedures and law operating system for Business in nepal
Law making procedures and law operating system for Business in nepal
 
Law & business law
Law  & business lawLaw  & business law
Law & business law
 
Judicial system and jurisdiction of court in nepal
Judicial system and jurisdiction of court in nepalJudicial system and jurisdiction of court in nepal
Judicial system and jurisdiction of court in nepal
 
Intellectual property rights (IPR)
Intellectual property rights (IPR)Intellectual property rights (IPR)
Intellectual property rights (IPR)
 
Indemnity and guarantee
Indemnity and guaranteeIndemnity and guarantee
Indemnity and guarantee
 
Foreign investment and technology transfer act
Foreign investment and technology transfer actForeign investment and technology transfer act
Foreign investment and technology transfer act
 
Contract of sale of goods
Contract of sale of goodsContract of sale of goods
Contract of sale of goods
 
Contract of agency
Contract of agencyContract of agency
Contract of agency
 
Company
CompanyCompany
Company
 
Breach of contract
Breach of contractBreach of contract
Breach of contract
 
Board of directors
Board of directorsBoard of directors
Board of directors
 
Bailment and pledge
Bailment and pledgeBailment and pledge
Bailment and pledge
 
Employee Training & development
Employee Training & developmentEmployee Training & development
Employee Training & development
 
Selection decisions
Selection decisionsSelection decisions
Selection decisions
 
Recruitment decisions
Recruitment decisionsRecruitment decisions
Recruitment decisions
 
Person profiling - Person Job Fit
Person profiling - Person Job FitPerson profiling - Person Job Fit
Person profiling - Person Job Fit
 
Performance planning
Performance planningPerformance planning
Performance planning
 
Performance appraisal
Performance appraisalPerformance appraisal
Performance appraisal
 

Recently uploaded

The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
Vlad Stirbu
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 

Recently uploaded (20)

The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 

Cyber Security

  • 2. E – Learning Course Information 1. To promote information security awareness in the area of: i. Introduction to information security; ii. Social engineering; iii. Malware; iv. Mobile security & social media; and v. Responsible browsing. 2. To serve as an induction course for new Axiata employees. 3. To serve as a refresher course for existing Axiata employees. OBJECTIVES
  • 3. OBJECTIVES 1. Understand information security, its importance and the role you have to play to protect our information security. 2. Recognise the many forms of social engineering, its potential impacts and how to stay vigilant against it. 3. Be aware of the different types of malware and signs of malware infection, and ways to prevent exposing your device to malware. 4. Understand mobile security, identify common mobile devices and mobile security attacks, and ways to reduce risk of mobile security attacks. 5. Recognise the importance of responsible browsing, understand safe browsing practices and practise safe sharing on social media. Why Is This Course Important? Upon completion of this course, participants will be able to: Let’s begin.
  • 4. 1 2 3 4 5 Course Content Introduction to Information Security Social Engineering Mobile Security and Social Media Responsible Browsing Malware 6 Assessment
  • 6. PEOPLE. Our people working across the Axiata Group. Even with the absence of malicious intent, often times, information security is compromised due to employees’ lack of understanding on how to work in a secure manner. But where does our biggest threat come from? Why Do We Care? Estimates upwards of 250 billion dollars of loss associated with Cyber Crime! Every year, the Director of National Intelligence publishes an unclassified “Worldwide Threat Assessment.” The year 2018 report was published listing “Cyber” is the first (and greatest) threat listed. Information Security What is it? All the processes and practices we implement to protect networks, computers, applications and data from attacks on the C-I-A triad (Confidentiality, Integrity, and Availability).
  • 7. You can ensure you play your part in protecting our information by: Keeping to our values. Keeping vigilant and diligent. Keeping hold of our valuables. Keeping it confidential. Keeping us all safe. How Do I Play My Part and How Will I Help? You will be helping Axiata to: Protect information from a range of threats. Ensure business continuity. Minimise potential financial loss. Optimise return on investments. Increase business opportunities.
  • 8. Always logoff or lock your system even if you leave for a short time. Keep systems patched and up to date. Use strong passwords and protect your passwords. Encrypt sensitive files to ensure confidentiality of data. Watch what you share and be cautious of what information you put out there. Never let someone have access to your system with your credentials. Be wary of individuals looking for information or access to the building. Disable unsecured mechanisms. If something feels wrong or uncomfortable, trust your instinct and ask for help. Report any potential breach to your security team. Good Information Security Practices 1 2 3 4 5 6 7 8 9 10
  • 10. • Social engineering is the act of manipulating people into disclosing private information and sometimes it involves breaking normal security procedures. • It relies heavily on manipulating human emotions, such as guilt and fear. • It exploits our natural tendency to trust others. • It is very common because it is much easier to trick a person into disclosing his or her credentials than hacking into his or her account. Social Engineering?
  • 11. Common Social Engineering Attacks Phishing Phishing is a technique of fraudulently obtaining private information. Phishing refers to the use of emails that appear to originate from a trusted source to trick a user into entering his or her login credentials, ATM card’s PIN number or credit card number at a fake website. Phishing emails typically look very convincing and contains a link to fake web pages with seemingly legitimate company logos and addresses. While spear phishing and phishing are similar in the sense that both attacks involve sending emails to trick users into providing information, the key difference is that spear phishing involves sending highly customised emails to a few specific users whereas phishing involves sending generic emails to a broad number of users. This means that spear phishing email is more strategic and specific with its choice of targets. Hence, spear phishing attacks are known to have higher rate of success than phishing attacks. Spear Phishing
  • 12. Common Social Engineering Attacks Vishing, otherwise known as voice phishing, is the practice of using the telephone to impersonate a known individual to gain access to sensitive information. Typically, the victim receives a call with a voice message disguised as a communication from a financial institute or government agency. 3. Vishing 4. Tailgating Tailgating is the practice of following someone through a security controlled door without showing or using the required ID pass. A tailgater may request the target to hold the door, stating that he or she forgot to bring his or her ID along. The target typically complies to the tailgater’s request out of good faith and common courtesy without verifying if the tailgater is allowed on premises. z
  • 13. Limit what you share online • Without prior information, social engineers are unable to establish a solid pretext to trick you. • Set your social media accounts private • Accept friend requests from people you know in real life • Refrain from posting sensitive information online. Think before you click Do not click, forward or respond to phishing emails. Challenge tailgaters Politely reject requests from tailgaters to hold the door and direct them to register at the reception counter instead. Think before you speak Do not disclose your personal information to unknown caller. Be aware, connect with care Do not connect unfamiliar physical media to the organisation’s network. Defending Against Social Engineering Attacks
  • 14. Practise laptop security • Secure your laptop to your workstation with a cable lock. • Never leave your laptop in your vehicle. • Press “Ctrl” and “L” to lock your laptop screen when it is not in use. Follow Axiata Policy and Procedures Read, understand and follow Axiata’s policy and procedures. When in doubt, report to IT helpdesk! Keep your software up-to-date Software updates involves security patches that fixes security vulnerabilities. Defending Against Social Engineering Attacks
  • 16. What is Malware? Malicious software. Executes without your permission. Tricks you into thinking it’s something else. Works to remain unnoticed. Compromise computer functions. Steal data. Bypass access controls. Harms the host computer.
  • 17. Stealing data, monitoring user activity, modifying files - these are one of the few things a malware can do. Being aware of their tactics is the first line of defense! The list below depicts some of the common malwares. Trojan Bot RAT Common Malwares Bots are software programs created to automatically perform specific operations such as video gaming, internet auctions and online contests. A Trojan disguises itself as a normal file or program to trick users into downloading and installing malware. It is typically bundled with games. RAT (short for remote access Trojan) is a malware program that includes a back door for administrative control over the target computer.
  • 18. Pop-ups that asks you to download antivirus software or offer freebies. Antivirus software and firewalls have been disabled without your consent. Computer is running slower than usual. Emails/messages being sent automatically without user’s knowledge. Computer has been crashing or freezing lately. Detecting Malwares Detecting malware is not an easy task. Anti-virus software are rarely 100% accurate at detecting malware because malwares are designed to self-update and continually hides its presence whenever they start getting detected. If your computer is acting “funny”, it may be infected with malware. The most common indicators of a malware attack include:
  • 19. Preventing Malwares Prevention is better than cure. As malwares are getting harder to detect and new threats are seen on a regular basis, you must be extra cautious in reducing the risk of getting malware attacks on your computer. Listed below are a few key recommendations to prevent malwares. Installing protection software Update your operating system Securing your network • Important updates for your system are packed with bug fixes, virus protection, and lots of other important things to keep your device clean. • Ensure your network needs a strong password to connect. • Do not broadcast your network name. • Provide a separate network for guests. When you suspect a malware infection, report to your IT security team immediately before the problem gets worst! • This protection is a must-have first step in keeping your computer virus free. • Ensure that you keep your software up to date too.
  • 21. What is Mobile Security? Also known as wireless security. Serves as a protection of smartphones, tablets, laptops and other portable computing devices and the networks they connect to from threats and vulnerabilities. A means by which a mobile device can authenticate users and protect or restrict access to data stored on the device. Common Mobile Devices in the Workplace Laptops Bluetooth devices Smartphone BYOD (Bring Your Own Device) Tablets
  • 22. Common Attacks Theft / Gaining Physical Access Data Interception Insider Threats Malware Eavesdropping
  • 23. Ways to reduce the risk of mobile security attacks What can we do? Use Strong Passwords. Enable remote wipe function and consider the “Find Your Device Option”. Backup and protect your data. Don’t connect to a work system or the network unless you have permission to do so. Download only secure applications. Be cautious about what you share – text is not inherently secure. Don’t ‘jailbreak’ or ‘root’ your device. Report anything suspicious to the security team.
  • 25. What is Responsible Browsing? Browsing habits that protect your personal information and online activity from cyber criminals, while being accountable for the impacts of your browsing habits towards Axiata's information security. What are Safe Browsing Practices? • All information shared on the internet are easily accessed by the public within a single click, which makes the internet a risky place. • Cyber criminals often lurk behind the scenes while internet users browse online, prying to steal sensitive information and execute other malicious activities. • Hence, it is important to understand and follow certain safeguards in order to defend ourselves from the schemes of cyber criminals. • These safeguards are known as safe browsing practices, which are simple tips you can take to keep your online activity safe from cyber criminals. • The next few pages show some examples of safe browsing practices.
  • 26. Create Secure & Unique Passwords. • Creating strong passwords make it difficult for cyber criminals to crack the password. A strong password should have a mix of the following: • Upper case; • Lower case; • Number; and • Special character. • Example of a weak password versus a strong password is as below: Weak Password Strong Password • ThisPasswordIsStrong Th1sPa55wordisStr0ng
  • 27. Staying Safe while using Public Wi-Fi • Verify your connection. • Be sure to ask the employee what the actual public Wi-Fi is to avoid connecting to a bogus network. • Avoid checking sensitive data. • Hold off on login to your social media, email and especially your financial accounts while on public Wi-Fi. • Turn off sharing. • Be sure to turn off sharing while you are on public Wi-Fi. If you leave it on while in a public place, cyber criminals can easily gain access to sensitive personal information and fields. • Use a VPN. • If you need to check sensitive data like your banking account while on public Wi-Fi, use a virtual private network or a VPN. Even if a cyber criminal positions himself in the middle of your connection, your data will be strongly encrypted. • Turn your Wi-Fi off when you’re done. • Even if you haven't actively connected to your network, the Wi-Fi hardware and your computer can still be transmitting data with any network in range. If you are through using the internet, ensure that your Wi-Fi is turned off.
  • 28. Avoid Unsecured Websites • Websites with secured connection will have URLs that start with “https.” instead of “http://”. • The “s” suffix indicate that the website information is secured and encrypted. This security is provided by a SSL certificate, which certifies that sensitive information entered into that site is secured. • Without a SSL certificate, that information is highly vulnerable to be exposed and easily accessible by cybercriminals. • Identify a padlock symbol in the browser window frame, which appears when you attempt to log in to your existing accounts or register new accounts. You can click on the padlock icon to verify that your connection is secure.
  • 29. Keep Browser Up-to-date • Most updates will include security patches. New patches are often released to fix existing vulnerabilities in browser software, so having the most up-to- date versions is critical. • If you're not installing those updates, you may leave yourself and Axiata vulnerable to new threats that pop up constantly. • Therefore, always make it a point to update your browser and leave no room for any form of security vulnerabilities.
  • 30. Importance of Responsible Browsing • Browsing without caution can put Axiata at risk of all sorts of dangers, which includes identity theft, data theft and even computer damage. • Sensitive information (e.g. credit card number, bank accounts, IC number & mobile number) could be stolen & used for malicious purposes. • It can be used to make fraudulent purchases, sign up new credit cards, and even apply for government benefits. IDENTITY THEFT • Files from your computer such as photographs, videos and documents are stolen & then sold for illicit purposes. DATA THEFT • Viruses are sent to computers to cause damage and make them inoperable. COMPUTER DAMAGE • Experiencing data breach will not only give us a bad reputation and affect our business operations, it will also compromise our customer’s trust towards us. • Losing our customer’s trust is the last thing we want to see happening, which is why everyone in Axiata play an essential role in practicing browsing habits that will improve the security of your online activities.