SlideShare a Scribd company logo
1 of 14
Download to read offline
1
Cybersecurity
Awareness
Current state of Cybersecurity
2
Phishing attacks are still
number 1
Social Engineering is the
leading attack vector for
scams
Ransomware attacks are
on the rise
Cost of Cybersecurity Attacks
3
Phishing Attacks
4
Phishing emails
Smishing
Vishing
e.g. Computer technician call to
fix a virus on your machine
e.g. ATO text messages to claim a
tax refund
e.g. COVID 19 vaccines
Phishing Examples
Phishing Examples
Ransomware
7
Email
attachments
Website
downloads
Email links
Website links
Type of malware that encrypts data specifically
asking for payment in order to restore access.
How?
Regular backups
Updates
Verify emails
Protect Yourself
Don’t PAY!
Why is Cyber awareness so important?
8
• Everything is CONNECTED!
• Personal documents
• Identity
• Finances
• Digital footprint
How can I protect
myself?
• Long and strong. Passphrases
• Enable 2FA where possible
• Change default passwords
• Don’t reuse passwords across accounts
• Use a Password manager (LastPass is FREE)
Passwords
• Ensure all devices are on their latest updates.
• Turn on AUTOMATIC UPDATES
• Make time for updates
• Spring clean your apps regularly
Updates
1. Phishing - email
2. Vishing – phone call
3. Smishing – text messages
Look out for:
1. Urgency
2. Asking for personal/financial information
3. Unsolicited
4. Contain links and downloadable files
5. Bad grammar
6. Too good to be true
Be aware of Scams
• Privacy controls
• Be mindful of what you share
• Review app privacy collection
Search Yourself (Digital Footprint)
• Are my devices secure?
• Using VPN to access University systems?
• Beware of using FREE Wi-Fi
• Do I have anti virus installed?
• Am I backing up my important files? Cloud & Local
• Are my devices up to date?
• Enable two-factor authentication (2FA) where possible
• STOP. THINK BEFORE YOU CLICK.
Creating a Cyber secure home checklist

More Related Content

Similar to Cybersecurity Awareness Presentation.pdf

Malware Security
Malware SecurityMalware Security
Malware Security
Mike Ellis
 
csa2014 IBC
csa2014 IBCcsa2014 IBC
csa2014 IBC
apyn
 
Insurance Cyber Risks Presentation
Insurance  Cyber Risks PresentationInsurance  Cyber Risks Presentation
Insurance Cyber Risks Presentation
Neville Cartwright
 
Online reputation
Online reputationOnline reputation
Online reputation
esl2m
 
What are the biggest threats to a network in terms of security and w.pdf
What are the biggest threats to a network in terms of security and w.pdfWhat are the biggest threats to a network in terms of security and w.pdf
What are the biggest threats to a network in terms of security and w.pdf
info309708
 

Similar to Cybersecurity Awareness Presentation.pdf (20)

Unveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity postureUnveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity posture
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Viruses
VirusesViruses
Viruses
 
Malware Security
Malware SecurityMalware Security
Malware Security
 
csa2014 IBC
csa2014 IBCcsa2014 IBC
csa2014 IBC
 
Ransomware and email security ver - 1.3
Ransomware and email security   ver - 1.3Ransomware and email security   ver - 1.3
Ransomware and email security ver - 1.3
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
Cyber security
Cyber security Cyber security
Cyber security
 
Protecting Your Business From Cybercrime
Protecting Your Business From CybercrimeProtecting Your Business From Cybercrime
Protecting Your Business From Cybercrime
 
Insurance Cyber Risks Presentation
Insurance  Cyber Risks PresentationInsurance  Cyber Risks Presentation
Insurance Cyber Risks Presentation
 
E-Mail Crimes - Gurugram Cyber Crime Cell July 2017
E-Mail Crimes - Gurugram Cyber Crime Cell July 2017E-Mail Crimes - Gurugram Cyber Crime Cell July 2017
E-Mail Crimes - Gurugram Cyber Crime Cell July 2017
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS Working
 
negative implications of IT
negative implications of ITnegative implications of IT
negative implications of IT
 
Online reputation
Online reputationOnline reputation
Online reputation
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptx
 
It security,malware,phishing,information theft
It security,malware,phishing,information theftIt security,malware,phishing,information theft
It security,malware,phishing,information theft
 
cybersecurity and cyber crime
cybersecurity and cyber crimecybersecurity and cyber crime
cybersecurity and cyber crime
 
cybersecurity.pptx
cybersecurity.pptxcybersecurity.pptx
cybersecurity.pptx
 
What are the biggest threats to a network in terms of security and w.pdf
What are the biggest threats to a network in terms of security and w.pdfWhat are the biggest threats to a network in terms of security and w.pdf
What are the biggest threats to a network in terms of security and w.pdf
 
Ethical Hacking and Cyber Security
Ethical Hacking and Cyber SecurityEthical Hacking and Cyber Security
Ethical Hacking and Cyber Security
 

Recently uploaded

Production 2024 sunderland culture final - Copy.pptx
Production 2024 sunderland culture final - Copy.pptxProduction 2024 sunderland culture final - Copy.pptx
Production 2024 sunderland culture final - Copy.pptx
ChloeMeadows1
 
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkkaudience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
lolsDocherty
 

Recently uploaded (17)

I’ll See Y’All Motherfuckers In Game 7 Shirt
I’ll See Y’All Motherfuckers In Game 7 ShirtI’ll See Y’All Motherfuckers In Game 7 Shirt
I’ll See Y’All Motherfuckers In Game 7 Shirt
 
Cyber Security Services Unveiled: Strategies to Secure Your Digital Presence
Cyber Security Services Unveiled: Strategies to Secure Your Digital PresenceCyber Security Services Unveiled: Strategies to Secure Your Digital Presence
Cyber Security Services Unveiled: Strategies to Secure Your Digital Presence
 
Pvtaan Social media marketing proposal.pdf
Pvtaan Social media marketing proposal.pdfPvtaan Social media marketing proposal.pdf
Pvtaan Social media marketing proposal.pdf
 
TORTOGEL TELAH MENJADI SALAH SATU PLATFORM PERMAINAN PALING FAVORIT.
TORTOGEL TELAH MENJADI SALAH SATU PLATFORM PERMAINAN PALING FAVORIT.TORTOGEL TELAH MENJADI SALAH SATU PLATFORM PERMAINAN PALING FAVORIT.
TORTOGEL TELAH MENJADI SALAH SATU PLATFORM PERMAINAN PALING FAVORIT.
 
Thank You Luv I’ll Never Walk Alone Again T shirts
Thank You Luv I’ll Never Walk Alone Again T shirtsThank You Luv I’ll Never Walk Alone Again T shirts
Thank You Luv I’ll Never Walk Alone Again T shirts
 
iThome_CYBERSEC2024_Drive_Into_the_DarkWeb
iThome_CYBERSEC2024_Drive_Into_the_DarkWebiThome_CYBERSEC2024_Drive_Into_the_DarkWeb
iThome_CYBERSEC2024_Drive_Into_the_DarkWeb
 
The Use of AI in Indonesia Election 2024: A Case Study
The Use of AI in Indonesia Election 2024: A Case StudyThe Use of AI in Indonesia Election 2024: A Case Study
The Use of AI in Indonesia Election 2024: A Case Study
 
Development Lifecycle.pptx for the secure development of apps
Development Lifecycle.pptx for the secure development of appsDevelopment Lifecycle.pptx for the secure development of apps
Development Lifecycle.pptx for the secure development of apps
 
GOOGLE Io 2024 At takes center stage.pdf
GOOGLE Io 2024 At takes center stage.pdfGOOGLE Io 2024 At takes center stage.pdf
GOOGLE Io 2024 At takes center stage.pdf
 
Free scottie t shirts Free scottie t shirts
Free scottie t shirts Free scottie t shirtsFree scottie t shirts Free scottie t shirts
Free scottie t shirts Free scottie t shirts
 
Production 2024 sunderland culture final - Copy.pptx
Production 2024 sunderland culture final - Copy.pptxProduction 2024 sunderland culture final - Copy.pptx
Production 2024 sunderland culture final - Copy.pptx
 
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkkaudience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
 
Bug Bounty Blueprint : A Beginner's Guide
Bug Bounty Blueprint : A Beginner's GuideBug Bounty Blueprint : A Beginner's Guide
Bug Bounty Blueprint : A Beginner's Guide
 
How Do I Begin the Linksys Velop Setup Process?
How Do I Begin the Linksys Velop Setup Process?How Do I Begin the Linksys Velop Setup Process?
How Do I Begin the Linksys Velop Setup Process?
 
Reggie miller choke t shirtsReggie miller choke t shirts
Reggie miller choke t shirtsReggie miller choke t shirtsReggie miller choke t shirtsReggie miller choke t shirts
Reggie miller choke t shirtsReggie miller choke t shirts
 
Premier Mobile App Development Agency in USA.pdf
Premier Mobile App Development Agency in USA.pdfPremier Mobile App Development Agency in USA.pdf
Premier Mobile App Development Agency in USA.pdf
 
Statistical Analysis of DNS Latencies.pdf
Statistical Analysis of DNS Latencies.pdfStatistical Analysis of DNS Latencies.pdf
Statistical Analysis of DNS Latencies.pdf
 

Cybersecurity Awareness Presentation.pdf

  • 2. Current state of Cybersecurity 2 Phishing attacks are still number 1 Social Engineering is the leading attack vector for scams Ransomware attacks are on the rise
  • 4. Phishing Attacks 4 Phishing emails Smishing Vishing e.g. Computer technician call to fix a virus on your machine e.g. ATO text messages to claim a tax refund e.g. COVID 19 vaccines
  • 7. Ransomware 7 Email attachments Website downloads Email links Website links Type of malware that encrypts data specifically asking for payment in order to restore access. How? Regular backups Updates Verify emails Protect Yourself Don’t PAY!
  • 8. Why is Cyber awareness so important? 8 • Everything is CONNECTED! • Personal documents • Identity • Finances • Digital footprint
  • 9. How can I protect myself?
  • 10. • Long and strong. Passphrases • Enable 2FA where possible • Change default passwords • Don’t reuse passwords across accounts • Use a Password manager (LastPass is FREE) Passwords
  • 11. • Ensure all devices are on their latest updates. • Turn on AUTOMATIC UPDATES • Make time for updates • Spring clean your apps regularly Updates
  • 12. 1. Phishing - email 2. Vishing – phone call 3. Smishing – text messages Look out for: 1. Urgency 2. Asking for personal/financial information 3. Unsolicited 4. Contain links and downloadable files 5. Bad grammar 6. Too good to be true Be aware of Scams
  • 13. • Privacy controls • Be mindful of what you share • Review app privacy collection Search Yourself (Digital Footprint)
  • 14. • Are my devices secure? • Using VPN to access University systems? • Beware of using FREE Wi-Fi • Do I have anti virus installed? • Am I backing up my important files? Cloud & Local • Are my devices up to date? • Enable two-factor authentication (2FA) where possible • STOP. THINK BEFORE YOU CLICK. Creating a Cyber secure home checklist