•
•
•
•
•
•
Slide 4
Slide 5
Slide 6
•
•
•
•
•
•
•
Slide 7
Slide 8
▪
▪
▪
Slide 9
•
•
•
▪
▪
▪
▪
▪
Slide 14
Slide 15
Slide 16
•
•
•
•
•
•
Slide 20
▪
▪
▪
▪
Slide 22
Cyber security module 1 of 2.pptx
Cyber security module 1 of 2.pptx

Editor's Notes

  • #7 The most common used is Phishing, using social engineering techniques – jargon busting
  • #10 Are we backing up data to a secure location- client data etc?
  • #12 Also, not to my name- it should also prompt me to log onto my account- not click on a link!
  • #14 They will keep this up for days, so that you will trust them before asking for money, or sending you a link
  • #15 The 4 phases of social engineering
  • #16 The 4 phases of social engineering – social engineering can be used in a number of ways, we will look at a example next-
  • #17 Video
  • #18 For example- pretending to be your boss with an emergency – authority and urgency-
  • #19 They can Google a buisnress owner and find out as much about them as they can to make these emails sound like them, but it always better to be safe than sorry and check
  • #21 If you post on FB with your dog Monty, I will guess your password is Monty- but you are actually being hacked by bots, who will be searching for anything they can find about you
  • #22 All of these are really strong- don’t forget about old accounts- Amazon, Netflix, Boots, Banks, Emails etc- So if one account gets hacked, it won’t be all of them- Salting is mixing in the number, not dictionary words-miss-spell words
  • #23 I used the dirty dancing example here – if you can’t remember the last time you changed your password- change it!- Demo- if manging multiple account you may want to use Lastpass etc