SlideShare a Scribd company logo
?? ?
?? ??
?
. . .
ashley123
3,400,523 views
Own IT. IT’s up to you.
Attackers will often goad people into making
quick decisions, hoping to take advantage
of your mistakes. Think fast, but
type slow, and they can’t touch you.
Who wants
to know? With archive sites, screencaps and the quick spread of information on social media,
the internet never forgets a mistake. You may dance like nobody’s watching, but
post like everyone is.
It’s tempting to share everything about
your life, but what you share can be used
by someone else. With that information, an
attacker can impersonate you or break into
your accounts on different sites.
There’s more than
three billion people on
the internet, and not all of them are
who they say they are. Keep your
your friends list small, and never
friend anyone you don’t know in
real life.
Take it slow
The internet never forgets
Sharing is not caring
© 2019 Infosec. All rights reserved.
Own IT. IT’s up to you.
Lockdown
A lock screen saves a lot of
trouble in the long run. Even if
your device is stolen, the attacker
likely won’t know your password.
Enable encryption so
that even if the lock screen
is subverted, the data is still
inaccessible.
A few good
friends
The best way to keep yourself and
your information safe is to limit
your friends list and restrict
what you post to your friends only.
25
Stacy Kingly
Friends
Friendbook
Georgie Red
Daryl Wentz
Turn off sync...
Sign out
Sync and personalize across
your devices
Syncing ship
Disabling auto-sync forces
someone who’s stolen your
account or device to enter your
password, which will stop an
attacker who doesn’t know it.
Bad share day
When you log into an account with a third-party app or
service, information is being shared between that service
and your account. Keep a lid on your data by using
your individual login and not installing extensions.
Location unknown
If your location is known and being tracked by the phone in
your pocket, then apps with that permission can access that
data and follow you. Keep yourself hidden by turning
off your location data.
© 2019 Infosec. All rights reserved.
Download on the
App Store
Deceptive site ahead
Attackers on this website might try to trick you into doing something dangerous like installing
software or revealing your personal information (for example, passwords, messages, or credit
cards).
Back to safetyDetails
Allow Candy Kracker to
take pictures, make recordings and
access your calendar, photos, files,
contacts, microphone, sensors,
storage, call logs and search history?
DENY ALLOW
5-star | 0 reviews
Make Quik Cash
Free Cash App!
Connect to your bank
and make money NOW!
Install now
Own IT. IT’s up to you.
Spot the scam
There are several signs that an app
might be a scam or a disguised
attack. If it has a lot of five-star
ratings but no reviews, it could be a
scam. If the creator is suspiciously
silent or refuses to promote their
app, then you should be
cautious.
Beware
permissions
When you install an app, what permissions does it ask
for? A tracking app may want to know your location, but
a beauty app doesn’t need that information. Never give
network permissions to anything that doesn’t need it.
Source smart
Whenever possible, choose apps
from a reputable creator and
download only from the official app store.
Vaccinate your device
Every device needs an antivirus. Even if you end up
downloading a dangerous app, or a previously safe
app becomes infected, an antivirus will help to
secure the device.
© 2019 Infosec. All rights reserved.
Irezumi
Coelophysis
jst4sm4llt0wngrl!lvnngn4l0nelyw0rld!!
t00kth3mdnghttr4ng0ng4nwh3r3!!!_
Ditch the digits?
While your own organization’s rules may be
different, new federal guidance has advised
that forcing users to include lots of symbols
and numbers doesn’t necessarily increase
password security. Focus on length and
memorability instead.
Longer and
stronger
Shorter passwords are easier
for hackers to break. NIST, the
National Institute for Standards
and Technology, recommends that
passwords be anywhere from
8 to 64 characters long.
Thinking in sentences
How do you remember a password that’s 64 characters long? Think in sentences,
not words. A phrase or a sentence is easier to recall than a nonsensical
combination of letters and numbers, and provides that all-important length to
make it harder to crack.
Mix and match
Do you like mixing languages or
making up your own words? If
so, then you have an easy way to
improve your password. If it only
makes sense to you, it’s less
likely to appear in the cracked lists of
passwords hackers use.
Secure IT. IT’s up to you.
© 2019 Infosec. All rights reserved.
Secure IT. IT’s up to you.
***********
1V305Bz
***********
Two locks
are better
than one
Having two or more authentication steps
makes it harder for attackers to breach
an account. Most apps, devices and services
have the option to enable multi-factor
authentication, and it’s always smart
to use it.
To have and have not
There are three different types of authentication: what you know, what you have and what
you are. Mixing authentication types will give you stronger protection. If someone
has stolen your password but not your cell phone, they’re out of luck!
The eyes have it
Biometric authentication, the “something you are” factor, can be anything from a signature
match to a fingerprint, palm or even iris scan. Consider implementing biometrics to
provide an extra layer of security.
© 2019 Infosec. All rights reserved.
Secure IT. IT’s up to you.
getmoneynow.com
https://
Click here
http://filledwithviruses.com/haxyouraccounts/
Bookmarks
Social Media
School
Business
Don’t reuse passwords
Passwords get cracked all the time, and each broken
password is added to a hacker’s database of passwords to
use in the future. Always use unique passwords.
Link and
you’ll miss it
Links on websites and in emails can
be spoofed, making you think you’re
going to a site you aren’t. Instead, use
bookmarks to ensure you’re going
right back to where you want to be.
Look for the S
These days, a legitimate shopping site is going to
be using HTTPS rather than HTTP. (The S stands for
“secure.”) Look in the upper corner of the screen for the
HTTPS and the lock icon.
Spot the scam
A product or service may look
good on the site, but how do
you know it’s legitimate before
you buy? Consumer watchdogs
like the Better Business
Bureau can help you check if a
business is on the level — before
you give them your credit card
number.
© 2019 Infosec. All rights reserved.
Protect IT. IT’s up to you.
Deceptive site ahead
Attackers on this website might try to trick you
into doing something dangerous like installing
software or revealing your personal informa
tion (for example, passwords, messages, or
credit cards).
Back to safety
DOWNLOAD NOW YOU’RE INFECTED
Always update Source matters
Only download software updates from official sources. If you don’t have the
option to automatically update, check the manufacturer’s site for updates
and patches; don’t trust browser warnings asking you to download things.
Click attack
A fake warning will ask you to download a file
or fill in a form, but a real browser warning
will only ask you to not do something: don’t
click ahead, don’t stay here.
License to fail
Never use cracked, pirated or
unlicensed versions of software or an
OS; these often contain malware and
cause more problems than they solve.
Shield your system
with auto-update
Legitimate programs will often give you the
option to enable auto-update. With this,
the software will automatically download
updates and patches when they become
available, taking the stress of updating off
your shoulders and ensuring that you’re
running the latest versions.
Updates fix bugs, patch insecurities
and keep your programs and devices
running smoothly. Remember, the
criminals are updating their attack
methods.
© 2019 Infosec. All rights reserved.
Protect IT. IT’s up to you.
Auto-Connect
Bob’s Cafe - FREE WIFI
Forget This Network
CHOOSE A NETWORK...
Poppin’ Pizza Parlor
poppin’ pizzza free wifi
Public has no privacy
Using public networks is always a risk. When
using a public network, such as in a coffee shop or an
airport, never access private information like your bank
or your email.
Auto-connect is not correct
Having a device automatically connect to known and
remembered networks is a fast ticket to malware.
Disable auto-connect and carefully choose the
network you want.
Spot the copycat
Hackers will sometimes create copycat networks with the same or similar names
to existing, legitimate networks. These copycats will lack password protection to
entice people into using them. When connecting to a network run by a person or
a business, always confirm exactly which network is theirs and whether it’s
supposed to be password-protected.
Password preferred
Public, unprotected networks are more likely to be run by hackers looking for an
easy target. When working remotely, always use the password-protected
networks controlled and monitored by the business owner.
© 2019 Infosec. All rights reserved.
Protect IT. IT’s up to you.
1100101100101111010101011110111000101010101010101
0101010101010101010101010111111010000101011010101
1101101101010010101010101001110101010111011101011
011101110101010101011101010101011010101101010
Less is more
The less data you have on
hand, the less can be lost in
the event of a data breach
and the less danger for
the customer.
By the book
It’s important to know the
policies for handling
customer data and be familiar
with your role in an emergency.
Lockdown
Customer information needs protection.
Physical copies should be locked up in a secure location;
digital information should be encrypted and kept under
strong passwords.
Sharing isn’t caring
Never let someone else access sensitive data unless
they are explicitly authorized and their identity has been proven.
Impostors may try to tell you a good story, but that data represents a
person’s life and safety.
Who goes there?
You need strong physical security
to protect data as well: locks,
badge checks and confirming that
personnel are authorized to
access the area.
Shred and buried
When customer data is no longer
needed, the records should
be destroyed. Papers should
be shredded or pulped, and devices
storing electronic records thoroughly
erased.
© 2019 Infosec. All rights reserved.

More Related Content

What's hot

Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness TrainingJen Ruhman
 
Cybersecurity Awareness Training
Cybersecurity Awareness TrainingCybersecurity Awareness Training
Cybersecurity Awareness TrainingDave Monahan
 
IT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeIT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeAtlantic Training, LLC.
 
Employee Security Awareness Training
Employee Security Awareness TrainingEmployee Security Awareness Training
Employee Security Awareness TrainingDenis kisina
 
Cybersecurity Employee Training
Cybersecurity Employee TrainingCybersecurity Employee Training
Cybersecurity Employee TrainingPaige Rasid
 
IT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptOoXair
 
Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2NetLockSmith
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@R_Yanus
 
Cybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by AdamCybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by AdamMohammed Adam
 
Building An Information Security Awareness Program
Building An Information Security Awareness ProgramBuilding An Information Security Awareness Program
Building An Information Security Awareness ProgramBill Gardner
 
Information Security Awareness, Petronas Marketing Sudan
Information Security Awareness, Petronas Marketing SudanInformation Security Awareness, Petronas Marketing Sudan
Information Security Awareness, Petronas Marketing SudanAhmed Musaad
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Programdavidcurriecia
 
Information Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn HospitalInformation Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn HospitalAtlantic Training, LLC.
 
Customer information security awareness training
Customer information security awareness trainingCustomer information security awareness training
Customer information security awareness trainingAbdalrhmanTHassan
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Stephen Cobb
 

What's hot (20)

Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness Training
 
Security awareness
Security awarenessSecurity awareness
Security awareness
 
Cybersecurity Awareness Training
Cybersecurity Awareness TrainingCybersecurity Awareness Training
Cybersecurity Awareness Training
 
IT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeIT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community College
 
Employee Security Awareness Training
Employee Security Awareness TrainingEmployee Security Awareness Training
Employee Security Awareness Training
 
Cybersecurity Employee Training
Cybersecurity Employee TrainingCybersecurity Employee Training
Cybersecurity Employee Training
 
IT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.ppt
 
Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@
 
Cybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by AdamCybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by Adam
 
Basic Security Training for End Users
Basic Security Training for End UsersBasic Security Training for End Users
Basic Security Training for End Users
 
Building An Information Security Awareness Program
Building An Information Security Awareness ProgramBuilding An Information Security Awareness Program
Building An Information Security Awareness Program
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Information Security Awareness, Petronas Marketing Sudan
Information Security Awareness, Petronas Marketing SudanInformation Security Awareness, Petronas Marketing Sudan
Information Security Awareness, Petronas Marketing Sudan
 
Cyber security training
Cyber security trainingCyber security training
Cyber security training
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Program
 
Information Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn HospitalInformation Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn Hospital
 
Customer information security awareness training
Customer information security awareness trainingCustomer information security awareness training
Customer information security awareness training
 
Security Awareness Training.pptx
Security Awareness Training.pptxSecurity Awareness Training.pptx
Security Awareness Training.pptx
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
 

Similar to Cybersecurity Awareness Infographics

10 most important cyber security tips for your users
10 most important cyber security tips for your users10 most important cyber security tips for your users
10 most important cyber security tips for your usersSimpliv LLC
 
Five habits that might be a cyber security risk
Five habits that might be a cyber security riskFive habits that might be a cyber security risk
Five habits that might be a cyber security riskK. A. M Lutfullah
 
CYBERSPACE SAFETY TIPS FOR SMEs.ppt
CYBERSPACE SAFETY TIPS FOR SMEs.pptCYBERSPACE SAFETY TIPS FOR SMEs.ppt
CYBERSPACE SAFETY TIPS FOR SMEs.pptJOHN BABATUNDE LEE
 
Train Employees to Avoid Inadvertent Cyber-Security Breaches
Train Employees to Avoid Inadvertent Cyber-Security BreachesTrain Employees to Avoid Inadvertent Cyber-Security Breaches
Train Employees to Avoid Inadvertent Cyber-Security BreachesHuman Resources & Payroll
 
Giarritano concept paper 4
Giarritano concept paper 4Giarritano concept paper 4
Giarritano concept paper 4leahg118
 
Internet Safety.pptx
Internet Safety.pptxInternet Safety.pptx
Internet Safety.pptxAljunMisa
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptxCharithraaAR
 
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptxCYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptxBarakaMuyengi
 
Cybersecurity Awareness Month Tips
Cybersecurity Awareness Month TipsCybersecurity Awareness Month Tips
Cybersecurity Awareness Month TipsKevin Fream
 
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdfCybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdfSoo Chin Hock
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Jesus Rances
 
S01.L06 - Internet Security
S01.L06 - Internet SecurityS01.L06 - Internet Security
S01.L06 - Internet Securityselcukca84
 
Cybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppCybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppWeSecureApp
 

Similar to Cybersecurity Awareness Infographics (20)

10 most important cyber security tips for your users
10 most important cyber security tips for your users10 most important cyber security tips for your users
10 most important cyber security tips for your users
 
Building a culture of security
Building a culture of securityBuilding a culture of security
Building a culture of security
 
Five habits that might be a cyber security risk
Five habits that might be a cyber security riskFive habits that might be a cyber security risk
Five habits that might be a cyber security risk
 
Securityguide
SecurityguideSecurityguide
Securityguide
 
CYBERSPACE SAFETY TIPS FOR SMEs.ppt
CYBERSPACE SAFETY TIPS FOR SMEs.pptCYBERSPACE SAFETY TIPS FOR SMEs.ppt
CYBERSPACE SAFETY TIPS FOR SMEs.ppt
 
Train Employees to Avoid Inadvertent Cyber-Security Breaches
Train Employees to Avoid Inadvertent Cyber-Security BreachesTrain Employees to Avoid Inadvertent Cyber-Security Breaches
Train Employees to Avoid Inadvertent Cyber-Security Breaches
 
Giarritano concept paper 4
Giarritano concept paper 4Giarritano concept paper 4
Giarritano concept paper 4
 
Internet Safety.pptx
Internet Safety.pptxInternet Safety.pptx
Internet Safety.pptx
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptx
 
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptxCYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
 
Cybersecurity Awareness Month Tips
Cybersecurity Awareness Month TipsCybersecurity Awareness Month Tips
Cybersecurity Awareness Month Tips
 
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdfCybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
 
Users guide
Users guideUsers guide
Users guide
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2
 
S01.L06 - Internet Security
S01.L06 - Internet SecurityS01.L06 - Internet Security
S01.L06 - Internet Security
 
Smartphone Security Article
Smartphone Security ArticleSmartphone Security Article
Smartphone Security Article
 
Securitytips
SecuritytipsSecuritytips
Securitytips
 
Cybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppCybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureApp
 
Emp tech las-week-2
Emp tech las-week-2Emp tech las-week-2
Emp tech las-week-2
 
Computer SOS
Computer SOSComputer SOS
Computer SOS
 

More from NetLockSmith

10 Clever Cybersecurity Awareness Posters
10 Clever Cybersecurity Awareness Posters10 Clever Cybersecurity Awareness Posters
10 Clever Cybersecurity Awareness PostersNetLockSmith
 
Cybersecurity Awareness Posters from OpenIDEO
Cybersecurity Awareness Posters from OpenIDEOCybersecurity Awareness Posters from OpenIDEO
Cybersecurity Awareness Posters from OpenIDEONetLockSmith
 
JP Cybersecurity Awareness Cartoons
JP Cybersecurity Awareness CartoonsJP Cybersecurity Awareness Cartoons
JP Cybersecurity Awareness CartoonsNetLockSmith
 
NCSC Social Engineering Awareness Posters
NCSC Social Engineering Awareness PostersNCSC Social Engineering Awareness Posters
NCSC Social Engineering Awareness PostersNetLockSmith
 
DoE Cybersecurity Awareness Posters
DoE Cybersecurity Awareness PostersDoE Cybersecurity Awareness Posters
DoE Cybersecurity Awareness PostersNetLockSmith
 
CDSE Cybsecurity Awareness Posters
CDSE Cybsecurity Awareness PostersCDSE Cybsecurity Awareness Posters
CDSE Cybsecurity Awareness PostersNetLockSmith
 
Nat'l Cyber Security Awareness Month (NCSAM) Posters
Nat'l Cyber Security Awareness Month (NCSAM) PostersNat'l Cyber Security Awareness Month (NCSAM) Posters
Nat'l Cyber Security Awareness Month (NCSAM) PostersNetLockSmith
 
Cybersecurity Awareness (Spanish) posters
Cybersecurity Awareness (Spanish) postersCybersecurity Awareness (Spanish) posters
Cybersecurity Awareness (Spanish) postersNetLockSmith
 
Cybersecurity awareness posters
Cybersecurity awareness postersCybersecurity awareness posters
Cybersecurity awareness postersNetLockSmith
 
NIST presentation on RMF 2.0 / SP 800-37 rev. 2
NIST presentation on RMF 2.0 / SP 800-37 rev. 2NIST presentation on RMF 2.0 / SP 800-37 rev. 2
NIST presentation on RMF 2.0 / SP 800-37 rev. 2NetLockSmith
 

More from NetLockSmith (10)

10 Clever Cybersecurity Awareness Posters
10 Clever Cybersecurity Awareness Posters10 Clever Cybersecurity Awareness Posters
10 Clever Cybersecurity Awareness Posters
 
Cybersecurity Awareness Posters from OpenIDEO
Cybersecurity Awareness Posters from OpenIDEOCybersecurity Awareness Posters from OpenIDEO
Cybersecurity Awareness Posters from OpenIDEO
 
JP Cybersecurity Awareness Cartoons
JP Cybersecurity Awareness CartoonsJP Cybersecurity Awareness Cartoons
JP Cybersecurity Awareness Cartoons
 
NCSC Social Engineering Awareness Posters
NCSC Social Engineering Awareness PostersNCSC Social Engineering Awareness Posters
NCSC Social Engineering Awareness Posters
 
DoE Cybersecurity Awareness Posters
DoE Cybersecurity Awareness PostersDoE Cybersecurity Awareness Posters
DoE Cybersecurity Awareness Posters
 
CDSE Cybsecurity Awareness Posters
CDSE Cybsecurity Awareness PostersCDSE Cybsecurity Awareness Posters
CDSE Cybsecurity Awareness Posters
 
Nat'l Cyber Security Awareness Month (NCSAM) Posters
Nat'l Cyber Security Awareness Month (NCSAM) PostersNat'l Cyber Security Awareness Month (NCSAM) Posters
Nat'l Cyber Security Awareness Month (NCSAM) Posters
 
Cybersecurity Awareness (Spanish) posters
Cybersecurity Awareness (Spanish) postersCybersecurity Awareness (Spanish) posters
Cybersecurity Awareness (Spanish) posters
 
Cybersecurity awareness posters
Cybersecurity awareness postersCybersecurity awareness posters
Cybersecurity awareness posters
 
NIST presentation on RMF 2.0 / SP 800-37 rev. 2
NIST presentation on RMF 2.0 / SP 800-37 rev. 2NIST presentation on RMF 2.0 / SP 800-37 rev. 2
NIST presentation on RMF 2.0 / SP 800-37 rev. 2
 

Recently uploaded

Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya HalderCustom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya HalderCzechDreamin
 
In-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsIn-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsExpeed Software
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
 
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...CzechDreamin
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...Elena Simperl
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
 
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Julian Hyde
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Product School
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...CzechDreamin
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyJohn Staveley
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Alison B. Lowndes
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaCzechDreamin
 
Optimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityOptimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityScyllaDB
 
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...CzechDreamin
 
UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2DianaGray10
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...Product School
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...Product School
 

Recently uploaded (20)

Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya HalderCustom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
 
In-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsIn-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT Professionals
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John Staveley
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara Laskowska
 
Optimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityOptimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through Observability
 
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
 
UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 

Cybersecurity Awareness Infographics

  • 1. ?? ? ?? ?? ? . . . ashley123 3,400,523 views Own IT. IT’s up to you. Attackers will often goad people into making quick decisions, hoping to take advantage of your mistakes. Think fast, but type slow, and they can’t touch you. Who wants to know? With archive sites, screencaps and the quick spread of information on social media, the internet never forgets a mistake. You may dance like nobody’s watching, but post like everyone is. It’s tempting to share everything about your life, but what you share can be used by someone else. With that information, an attacker can impersonate you or break into your accounts on different sites. There’s more than three billion people on the internet, and not all of them are who they say they are. Keep your your friends list small, and never friend anyone you don’t know in real life. Take it slow The internet never forgets Sharing is not caring © 2019 Infosec. All rights reserved.
  • 2. Own IT. IT’s up to you. Lockdown A lock screen saves a lot of trouble in the long run. Even if your device is stolen, the attacker likely won’t know your password. Enable encryption so that even if the lock screen is subverted, the data is still inaccessible. A few good friends The best way to keep yourself and your information safe is to limit your friends list and restrict what you post to your friends only. 25 Stacy Kingly Friends Friendbook Georgie Red Daryl Wentz Turn off sync... Sign out Sync and personalize across your devices Syncing ship Disabling auto-sync forces someone who’s stolen your account or device to enter your password, which will stop an attacker who doesn’t know it. Bad share day When you log into an account with a third-party app or service, information is being shared between that service and your account. Keep a lid on your data by using your individual login and not installing extensions. Location unknown If your location is known and being tracked by the phone in your pocket, then apps with that permission can access that data and follow you. Keep yourself hidden by turning off your location data. © 2019 Infosec. All rights reserved.
  • 3. Download on the App Store Deceptive site ahead Attackers on this website might try to trick you into doing something dangerous like installing software or revealing your personal information (for example, passwords, messages, or credit cards). Back to safetyDetails Allow Candy Kracker to take pictures, make recordings and access your calendar, photos, files, contacts, microphone, sensors, storage, call logs and search history? DENY ALLOW 5-star | 0 reviews Make Quik Cash Free Cash App! Connect to your bank and make money NOW! Install now Own IT. IT’s up to you. Spot the scam There are several signs that an app might be a scam or a disguised attack. If it has a lot of five-star ratings but no reviews, it could be a scam. If the creator is suspiciously silent or refuses to promote their app, then you should be cautious. Beware permissions When you install an app, what permissions does it ask for? A tracking app may want to know your location, but a beauty app doesn’t need that information. Never give network permissions to anything that doesn’t need it. Source smart Whenever possible, choose apps from a reputable creator and download only from the official app store. Vaccinate your device Every device needs an antivirus. Even if you end up downloading a dangerous app, or a previously safe app becomes infected, an antivirus will help to secure the device. © 2019 Infosec. All rights reserved.
  • 4. Irezumi Coelophysis jst4sm4llt0wngrl!lvnngn4l0nelyw0rld!! t00kth3mdnghttr4ng0ng4nwh3r3!!!_ Ditch the digits? While your own organization’s rules may be different, new federal guidance has advised that forcing users to include lots of symbols and numbers doesn’t necessarily increase password security. Focus on length and memorability instead. Longer and stronger Shorter passwords are easier for hackers to break. NIST, the National Institute for Standards and Technology, recommends that passwords be anywhere from 8 to 64 characters long. Thinking in sentences How do you remember a password that’s 64 characters long? Think in sentences, not words. A phrase or a sentence is easier to recall than a nonsensical combination of letters and numbers, and provides that all-important length to make it harder to crack. Mix and match Do you like mixing languages or making up your own words? If so, then you have an easy way to improve your password. If it only makes sense to you, it’s less likely to appear in the cracked lists of passwords hackers use. Secure IT. IT’s up to you. © 2019 Infosec. All rights reserved.
  • 5. Secure IT. IT’s up to you. *********** 1V305Bz *********** Two locks are better than one Having two or more authentication steps makes it harder for attackers to breach an account. Most apps, devices and services have the option to enable multi-factor authentication, and it’s always smart to use it. To have and have not There are three different types of authentication: what you know, what you have and what you are. Mixing authentication types will give you stronger protection. If someone has stolen your password but not your cell phone, they’re out of luck! The eyes have it Biometric authentication, the “something you are” factor, can be anything from a signature match to a fingerprint, palm or even iris scan. Consider implementing biometrics to provide an extra layer of security. © 2019 Infosec. All rights reserved.
  • 6. Secure IT. IT’s up to you. getmoneynow.com https:// Click here http://filledwithviruses.com/haxyouraccounts/ Bookmarks Social Media School Business Don’t reuse passwords Passwords get cracked all the time, and each broken password is added to a hacker’s database of passwords to use in the future. Always use unique passwords. Link and you’ll miss it Links on websites and in emails can be spoofed, making you think you’re going to a site you aren’t. Instead, use bookmarks to ensure you’re going right back to where you want to be. Look for the S These days, a legitimate shopping site is going to be using HTTPS rather than HTTP. (The S stands for “secure.”) Look in the upper corner of the screen for the HTTPS and the lock icon. Spot the scam A product or service may look good on the site, but how do you know it’s legitimate before you buy? Consumer watchdogs like the Better Business Bureau can help you check if a business is on the level — before you give them your credit card number. © 2019 Infosec. All rights reserved.
  • 7.
  • 8. Protect IT. IT’s up to you. Deceptive site ahead Attackers on this website might try to trick you into doing something dangerous like installing software or revealing your personal informa tion (for example, passwords, messages, or credit cards). Back to safety DOWNLOAD NOW YOU’RE INFECTED Always update Source matters Only download software updates from official sources. If you don’t have the option to automatically update, check the manufacturer’s site for updates and patches; don’t trust browser warnings asking you to download things. Click attack A fake warning will ask you to download a file or fill in a form, but a real browser warning will only ask you to not do something: don’t click ahead, don’t stay here. License to fail Never use cracked, pirated or unlicensed versions of software or an OS; these often contain malware and cause more problems than they solve. Shield your system with auto-update Legitimate programs will often give you the option to enable auto-update. With this, the software will automatically download updates and patches when they become available, taking the stress of updating off your shoulders and ensuring that you’re running the latest versions. Updates fix bugs, patch insecurities and keep your programs and devices running smoothly. Remember, the criminals are updating their attack methods. © 2019 Infosec. All rights reserved.
  • 9. Protect IT. IT’s up to you. Auto-Connect Bob’s Cafe - FREE WIFI Forget This Network CHOOSE A NETWORK... Poppin’ Pizza Parlor poppin’ pizzza free wifi Public has no privacy Using public networks is always a risk. When using a public network, such as in a coffee shop or an airport, never access private information like your bank or your email. Auto-connect is not correct Having a device automatically connect to known and remembered networks is a fast ticket to malware. Disable auto-connect and carefully choose the network you want. Spot the copycat Hackers will sometimes create copycat networks with the same or similar names to existing, legitimate networks. These copycats will lack password protection to entice people into using them. When connecting to a network run by a person or a business, always confirm exactly which network is theirs and whether it’s supposed to be password-protected. Password preferred Public, unprotected networks are more likely to be run by hackers looking for an easy target. When working remotely, always use the password-protected networks controlled and monitored by the business owner. © 2019 Infosec. All rights reserved.
  • 10. Protect IT. IT’s up to you. 1100101100101111010101011110111000101010101010101 0101010101010101010101010111111010000101011010101 1101101101010010101010101001110101010111011101011 011101110101010101011101010101011010101101010 Less is more The less data you have on hand, the less can be lost in the event of a data breach and the less danger for the customer. By the book It’s important to know the policies for handling customer data and be familiar with your role in an emergency. Lockdown Customer information needs protection. Physical copies should be locked up in a secure location; digital information should be encrypted and kept under strong passwords. Sharing isn’t caring Never let someone else access sensitive data unless they are explicitly authorized and their identity has been proven. Impostors may try to tell you a good story, but that data represents a person’s life and safety. Who goes there? You need strong physical security to protect data as well: locks, badge checks and confirming that personnel are authorized to access the area. Shred and buried When customer data is no longer needed, the records should be destroyed. Papers should be shredded or pulped, and devices storing electronic records thoroughly erased. © 2019 Infosec. All rights reserved.