2. NAME OR LOGO
What is Cybersecurity?
Cybersecurity refers to safety processes and
practices to protect online activities from being
at risk to unfair activities.
Since our reliance on the online space continues
to grow so to does the risk of becoming victims
of cybercrime.
The best protection is education. Educating
ourselves and those around us is key to
combatting unjust activities and protecting our
online activities.
Learning about online
safety is a Priority
2
This Photo by Unknown Author is licensed under CC BY
Stay safe in Cyberspace
3. NAME OR LOGO
Identifying the Risks
Malware
Installing software that
performs harmful actions
to your device or steals
information from your pc.
Cyberbullying
Cyberbullying entails sharing of
derogatory, harmful, untrue
information about people online
and via social media platforms.
This includes circulating private
information and is disrespectful
and a criminal offence.
Limit you Share
Sharing your location,
phone number, and
other personal
information places can
mean you are at a
greater risk of identity
theft, prowling and
harassment.
Phishing/Online
scams
Phishing the use of
emails that try to entice
people into sharing
information online,
clicking on malicious
links or attachments
Third Party
exposure
Third party risk is the
potential threat presented
to organizations'
employee and customer
data, financial information
and operations from the
organization's supply-
chain or network.
3
This Photo by Unknown Author is
licensed under CC BY-NC-ND This Photo by Unknown Author is
licensed under CC BY-NC-ND
4. NAME OR LOGO
Solution
It is integral to stay up to date with
cybersecurity tips and trends to minimize the risk
when working online.
Prioritize
Training and learning
about online security,
risks and scams to
protect your work and
personal online
presence.
Protect
Protect personal
information. Do not
overshare information
on social media. Use
passwords to protect
devices.
Patch (software
updates)
Ensure security
patches are up to
date. They protect
devices from trending
security breaches.
4
This Photo by Unknown Author is licensed under CC BY-SA-NC
5. NAME OR LOGO
Online Security Tips
Become wise on best practices to secure online
activities and data.
Think before you
click, like and share!
Lorem ipsum dolor
sit amet
Online Safety begins
at home
Lorem ipsum dolor
sit amet
Be cybersmart
Lorem ipsum dolor
sit amet
Protect your devices
Lorem ipsum dolor
sit amet
5
This Photo by Unknown Author is licensed under CC BY-SA-NC
7. NAME OR LOGO
○ Password protect accounts and devices.
○ Stay up to date with cybersecurity
trends.
○ Monitor children and teenagers online
activity. Use suitable applications to
block inappropriate content.
○ Think before you share information
online – this includes both company
information and private information.
○ Refrain from commenting inappropriately
– this can lead to cyberbullying.
Summary
Cybersecurity in a nutshell
7
This Photo by Unknown Author is licensed under CC BY-SA-NC
9. NAME OR LOGO
References
○ The 3 P’s of Cybersecurity — How to Put These Basic Fundamentals to Work for Your. . . (2018, July 3). CMIT
Solutions. Retrieved October 15, 2022, from https://cmitsolutions.com/blog/3-ps-cybersecurity-put-basic-
fundamentals-work-business/
○ ArculusTM. (2022, October 3). Personal Cybersecurity Tips for Everyday Users [Video]. YouTube. Retrieved
October 15, 2022, from https://www.youtube.com/watch?v=AvElIS1ZyO4
○ nidirect. (2021, November 4). Staying safe online [Video]. Nidirect. Retrieved October 15, 2022, from
https://www.nidirect.gov.uk/articles/staying-safe-online
○ Online Safety (for Kids) - Nemours KidsHealth. (n.d.). [Video]. Retrieved October 15, 2022, from
https://kidshealth.org/en/kids/online-id.html
9
Editor's Notes
Installing software that performs harmful actions to your device or steals information from your pc.
What is third party exposure in cyber security?
Third party risk is the potential threat presented to organizations' employee and customer data, financial information and operations from the organization's supply-chain and other outside parties that provide products and/or services and have access to privileged systems.28