INTRODUCTION
• Cybersecurity threats,such as phishing and
malware, use deception to steal information or
install harmful software. Safe browsing habits,
like verifying websites, avoiding suspicious
links, and updating software, help prevent
these risks. Prevention also involves vigilance
with emails, strong passwords, and antivirus
protection.
PHISHING
• Sending fraudulentemails that appear
legitimate, aiming to trick users into
revealing sensitive details like login
credentials or credit card numbers by
clicking on malicious links or providing
information on fake login pages.
5.
MALWARE
• Malicious softwarelike viruses,
worms, Trojan horses, spyware, and
ransomware designed to infiltrate
systems, steal data, disrupt operations,
or extort money from users.
6.
Virus –A malicious program that attaches to a legitimate file and spreads when executed.
Worm – A self-replicating program that spreads across networks without user action.
Trojan – A disguised malicious program that appears legitimate but contains harmful code
Spyware – Software that secretly gathers user data, such as keystrokes and browsing habits.
Ransomware – Malware that encrypts files and demands a ransom for decryption.
7.
RAMSOMWARE
• A typeof malware that encrypts a victim's data,
demanding ransom payment to regain access.
Recognizing Phishing Attempts: Suspicious
sender addresses: Check if the email address
aligns with the purported sender.
Suspicious sender addresses:Check if the email
address aligns with the purported sender.
Urgent or threatening language: Phishers often
use urgency to pressure users into clicking links
without thinking.
Generic greetings: Emails addressing you as
"Dear Customer" instead of using your name are
red flags.
Suspicious links: Hovering over links to see the
actual destination URL before clicking.
Grammatical errors and typos: Poorly written
emails could indicate a phishing attempt.
Verify website legitimacy:Check for "HTTPS" in the URL,
indicating a secure connection.
Be cautious with attachments: Don't open attachments
from unknown senders, even if they seem legitimate.
Keep software updated: Regularly install software
updates to patch security vulnerabilities.
Use strong passwords: Create complex passwords with a
mix of upper/lowercase letters, numbers, and symbols,
and avoid reusing passwords across different platforms.
Enable two-factor authentication : Add an extra layer of
security by requiring a code from your phone to log in to
sensitive accounts.
Employee cybersecurity training:Educate employees
about phishing tactics and how to identify suspicious
emails.
Antivirus software: Install reputable antivirus software to
detect and block malware.
Email filtering: Utilize email filters to identify and block
phishing emails before they reach users.
Network firewalls: Implement network firewalls to monitor
and control incoming and outgoing network traffic.
Regular data backups: Regularly back up important data to
mitigate data loss in case of a cyberattack.