SlideShare a Scribd company logo
CYBERSECURITY
AWARENESS 2022
CAP ROCK TELEPHONE COOPERATIVE, INC.
CONNECTING THE FUTURE
A MESSAGE
FROM
PATRICK
As a person whose mother
was targeted online by a
Texas prison inmate who
was given Internet privileges,
I have developed a deep
passion for cybersecurity
and all that it entails. I do
not claim to be an expert on
the subject (not yet anyway)
but my hope is that by
sharing what I do know will
help at least one person to
avoid what could be a life
altering cyber attack. The
effects can linger for the rest
of your life. SEC RITY is not
complete without U. Be safe
online, we are ALL
connected.
No Technology That’s Connected To
The Internet Is Unhackable.
“It takes 20 years to build a reputation and a few minutes
of cyber-incident to ruin it.”
– Stephane Nappo
Hackers Don’t Break In, They Login
Keep Personal
Information Professional
and Limited
Practice Safe Browsing
Make Sure Your Internet
Connection is Secure
(never bank over open
public Wi-Fi)
Be Careful What You
Download
Choose Strong Passwords
(phrases work best)
Make Online Purchases
From Secure Sites
Be Careful What You Post
(vacation posts can lead to
home break-ins)
Be Careful Who You Meet
Online
4 TYPES OF CYBERSECURITY THREATS
PHISHING
This type of threat is the practice of sending fraudulent
emails that resemble emails from legitimate sources.
The attacker aims to steal sensitive information like
credit card numbers and login information. It is by far
the most common type of cyber attack. Cap Rock has
an excellent filter solution but remember, all
technology connected to the Internet has the potential
to be hacked.
SOCIAL ENGINEERING
Social Engineering takes on a manipulative approach in
that the actor will try to “trick” you into revealing
personal or confidential information using authoritative
or urgent tactics. The actor will try to gain your trust to
get you to reveal Personally Identifiable Information
(PII). More damage can be done with just your cell
phone number than you realize.
MALWARE
Malicious Software (Malware) is a type of software
designed to gain unauthorized access to computer
systems often resulting in damage or failure. A
computer cannot judge intent therefore malware may
coincide with your computer’s normal functionality. To
sum it up; Malware is bad software. Think before you
click!
RANSOMWARE
Ransomware is one of many types of Malware. The
threat actors using this technique have taken things to
a new level of cyber crime; extortion. The actors will
block access to files by encrypting them one by one
while deleting the originals and demanding payment
(ransom) for the decryption key. Recent statistics show
that telecommunications has surpassed healthcare as
the most frequently targeted sector of Ransomware
hijackers. This is especially concerning for obvious
reasons. Help protect our livelihood!
NO MORE PASSWORDS?
The Fast Identity Online or FIDO Alliance and The World
Wide Web Consortium are on track to eliminate
passwords altogether. Giants like Google, Apple, and
Microsoft are forging this password-free future
together. This will be possible by utilizing a
cryptographic token called a passkey shared by your
cell phone and the website or app you are using. Logins
will be as simple as typing in your PIN, drawing a
pattern, or using biometrics; face recognition or
fingerprint. You might use these today, but you still
have a password.
-REMEMBER-
FREE SPEECH DOESN’T MEAN CARELESS
TALK!
What happens at Cap Rock stays at Cap Rock. One must
watch what is said in the office, around town, and at
home. Cybersecurity must be practiced daily to avoid
any slip-ups. Thank you for taking the time to complete
this presentation. Enjoy the rest of your day!
-Patrick

More Related Content

Similar to Cybersecurity Training 2022

Computer Security for Lawyers
Computer Security for LawyersComputer Security for Lawyers
Computer Security for Lawyers
Mark Lanterman
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet Security
Ashley Zimmerman
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet Security
JFashant
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Dipesh Waghela
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorism
Accenture
 
cyber terrorism
 cyber terrorism  cyber terrorism
cyber terrorism
Accenture
 
Security Primer
Security PrimerSecurity Primer
Security Primer
Alison Gianotto
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and security
Alisha Korpal
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Kushal Mondal
 
Getting users to care about security
Getting users to care about securityGetting users to care about security
Getting users to care about security
Alison Gianotto
 
Cyber Security Professionals in Demand
Cyber Security Professionals in DemandCyber Security Professionals in Demand
Cyber Security Professionals in Demand
Samidha Takle
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Tushar Nikam
 
A Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.comA Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.com
Business.com
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Md Mudassir
 
Name parul
Name parulName parul
Name parul
Parul231
 
Name parul
Name parulName parul
Name parul
Parul231
 
Sophos a-to-z
Sophos a-to-z Sophos a-to-z
Sophos a-to-z
Cheng Olayvar
 
Hamza
HamzaHamza
Hamza
HamzaBaqee
 
Ransomware all locked up book
Ransomware all locked up bookRansomware all locked up book
Ransomware all locked up book
Diego Souza
 
Cyber Crime & Security.pdf
Cyber Crime & Security.pdfCyber Crime & Security.pdf
Cyber Crime & Security.pdf
MohanPandey31
 

Similar to Cybersecurity Training 2022 (20)

Computer Security for Lawyers
Computer Security for LawyersComputer Security for Lawyers
Computer Security for Lawyers
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet Security
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet Security
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorism
 
cyber terrorism
 cyber terrorism  cyber terrorism
cyber terrorism
 
Security Primer
Security PrimerSecurity Primer
Security Primer
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Getting users to care about security
Getting users to care about securityGetting users to care about security
Getting users to care about security
 
Cyber Security Professionals in Demand
Cyber Security Professionals in DemandCyber Security Professionals in Demand
Cyber Security Professionals in Demand
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
A Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.comA Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.com
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Name parul
Name parulName parul
Name parul
 
Name parul
Name parulName parul
Name parul
 
Sophos a-to-z
Sophos a-to-z Sophos a-to-z
Sophos a-to-z
 
Hamza
HamzaHamza
Hamza
 
Ransomware all locked up book
Ransomware all locked up bookRansomware all locked up book
Ransomware all locked up book
 
Cyber Crime & Security.pdf
Cyber Crime & Security.pdfCyber Crime & Security.pdf
Cyber Crime & Security.pdf
 

More from CapRockTelephone

First Aid
First Aid First Aid
First Aid
CapRockTelephone
 
CPNI Training 2022.pptx
CPNI Training 2022.pptxCPNI Training 2022.pptx
CPNI Training 2022.pptx
CapRockTelephone
 
EMERGENCY OPERATIONS PLAN.pptx
EMERGENCY OPERATIONS PLAN.pptxEMERGENCY OPERATIONS PLAN.pptx
EMERGENCY OPERATIONS PLAN.pptx
CapRockTelephone
 
Step One National Preparedness Month 2022.pptx
Step One National Preparedness Month 2022.pptxStep One National Preparedness Month 2022.pptx
Step One National Preparedness Month 2022.pptx
CapRockTelephone
 
September 2022 Monthly Safety Presentation.pptx
September 2022 Monthly Safety Presentation.pptxSeptember 2022 Monthly Safety Presentation.pptx
September 2022 Monthly Safety Presentation.pptx
CapRockTelephone
 
Customer Homes 2022.pptx
Customer Homes 2022.pptxCustomer Homes 2022.pptx
Customer Homes 2022.pptx
CapRockTelephone
 
Wildfire Awareness
Wildfire AwarenessWildfire Awareness
Wildfire Awareness
CapRockTelephone
 
April 2022 -Safety Training
April 2022 -Safety TrainingApril 2022 -Safety Training
April 2022 -Safety Training
CapRockTelephone
 
April 2022 - Safety Training
April 2022 - Safety TrainingApril 2022 - Safety Training
April 2022 - Safety Training
CapRockTelephone
 
April 2022- Safety Training 1
April 2022- Safety Training 1April 2022- Safety Training 1
April 2022- Safety Training 1
CapRockTelephone
 
March - Ergonomics in the HOME office and STFs.pptx
March - Ergonomics in the HOME office and STFs.pptxMarch - Ergonomics in the HOME office and STFs.pptx
March - Ergonomics in the HOME office and STFs.pptx
CapRockTelephone
 
February Safety Training
February Safety TrainingFebruary Safety Training
February Safety Training
CapRockTelephone
 
January 2022 driving exposures
January 2022 driving exposuresJanuary 2022 driving exposures
January 2022 driving exposures
CapRockTelephone
 
Personal Protective Equip
Personal Protective EquipPersonal Protective Equip
Personal Protective Equip
CapRockTelephone
 
Jan 2020 - Safety Training Powerpoint
Jan 2020 - Safety Training PowerpointJan 2020 - Safety Training Powerpoint
Jan 2020 - Safety Training Powerpoint
CapRockTelephone
 
Brown recluse spider (1)
Brown recluse spider (1)Brown recluse spider (1)
Brown recluse spider (1)
CapRockTelephone
 
Bites and stings April 2019
Bites and stings April 2019Bites and stings April 2019
Bites and stings April 2019
CapRockTelephone
 
Respiratory Protection
Respiratory ProtectionRespiratory Protection
Respiratory Protection
CapRockTelephone
 
Slips, Trips and Falls
Slips, Trips and FallsSlips, Trips and Falls
Slips, Trips and Falls
CapRockTelephone
 
Drunk Driving Awareness
Drunk Driving AwarenessDrunk Driving Awareness
Drunk Driving Awareness
CapRockTelephone
 

More from CapRockTelephone (20)

First Aid
First Aid First Aid
First Aid
 
CPNI Training 2022.pptx
CPNI Training 2022.pptxCPNI Training 2022.pptx
CPNI Training 2022.pptx
 
EMERGENCY OPERATIONS PLAN.pptx
EMERGENCY OPERATIONS PLAN.pptxEMERGENCY OPERATIONS PLAN.pptx
EMERGENCY OPERATIONS PLAN.pptx
 
Step One National Preparedness Month 2022.pptx
Step One National Preparedness Month 2022.pptxStep One National Preparedness Month 2022.pptx
Step One National Preparedness Month 2022.pptx
 
September 2022 Monthly Safety Presentation.pptx
September 2022 Monthly Safety Presentation.pptxSeptember 2022 Monthly Safety Presentation.pptx
September 2022 Monthly Safety Presentation.pptx
 
Customer Homes 2022.pptx
Customer Homes 2022.pptxCustomer Homes 2022.pptx
Customer Homes 2022.pptx
 
Wildfire Awareness
Wildfire AwarenessWildfire Awareness
Wildfire Awareness
 
April 2022 -Safety Training
April 2022 -Safety TrainingApril 2022 -Safety Training
April 2022 -Safety Training
 
April 2022 - Safety Training
April 2022 - Safety TrainingApril 2022 - Safety Training
April 2022 - Safety Training
 
April 2022- Safety Training 1
April 2022- Safety Training 1April 2022- Safety Training 1
April 2022- Safety Training 1
 
March - Ergonomics in the HOME office and STFs.pptx
March - Ergonomics in the HOME office and STFs.pptxMarch - Ergonomics in the HOME office and STFs.pptx
March - Ergonomics in the HOME office and STFs.pptx
 
February Safety Training
February Safety TrainingFebruary Safety Training
February Safety Training
 
January 2022 driving exposures
January 2022 driving exposuresJanuary 2022 driving exposures
January 2022 driving exposures
 
Personal Protective Equip
Personal Protective EquipPersonal Protective Equip
Personal Protective Equip
 
Jan 2020 - Safety Training Powerpoint
Jan 2020 - Safety Training PowerpointJan 2020 - Safety Training Powerpoint
Jan 2020 - Safety Training Powerpoint
 
Brown recluse spider (1)
Brown recluse spider (1)Brown recluse spider (1)
Brown recluse spider (1)
 
Bites and stings April 2019
Bites and stings April 2019Bites and stings April 2019
Bites and stings April 2019
 
Respiratory Protection
Respiratory ProtectionRespiratory Protection
Respiratory Protection
 
Slips, Trips and Falls
Slips, Trips and FallsSlips, Trips and Falls
Slips, Trips and Falls
 
Drunk Driving Awareness
Drunk Driving AwarenessDrunk Driving Awareness
Drunk Driving Awareness
 

Recently uploaded

manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaalmanuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
wolfsoftcompanyco
 
Azure EA Sponsorship - Customer Guide.pdf
Azure EA Sponsorship - Customer Guide.pdfAzure EA Sponsorship - Customer Guide.pdf
Azure EA Sponsorship - Customer Guide.pdf
AanSulistiyo
 
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
uehowe
 
Gen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needsGen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needs
Laura Szabó
 
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
zyfovom
 
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
bseovas
 
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
cuobya
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
xjq03c34
 
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
ukwwuq
 
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
vmemo1
 
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
zoowe
 
Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!
Toptal Tech
 
Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
Paul Walk
 
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
cuobya
 
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
bseovas
 
Design Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptxDesign Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptx
saathvikreddy2003
 
Explore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories SecretlyExplore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories Secretly
Trending Blogers
 
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
uehowe
 
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
uehowe
 
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
ysasp1
 

Recently uploaded (20)

manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaalmanuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
 
Azure EA Sponsorship - Customer Guide.pdf
Azure EA Sponsorship - Customer Guide.pdfAzure EA Sponsorship - Customer Guide.pdf
Azure EA Sponsorship - Customer Guide.pdf
 
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
 
Gen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needsGen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needs
 
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
 
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
 
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
 
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
 
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
 
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
 
Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!
 
Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
 
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
 
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
 
Design Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptxDesign Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptx
 
Explore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories SecretlyExplore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories Secretly
 
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
 
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
 
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
 

Cybersecurity Training 2022

  • 1. CYBERSECURITY AWARENESS 2022 CAP ROCK TELEPHONE COOPERATIVE, INC. CONNECTING THE FUTURE
  • 2. A MESSAGE FROM PATRICK As a person whose mother was targeted online by a Texas prison inmate who was given Internet privileges, I have developed a deep passion for cybersecurity and all that it entails. I do not claim to be an expert on the subject (not yet anyway) but my hope is that by sharing what I do know will help at least one person to avoid what could be a life altering cyber attack. The effects can linger for the rest of your life. SEC RITY is not complete without U. Be safe online, we are ALL connected.
  • 3. No Technology That’s Connected To The Internet Is Unhackable. “It takes 20 years to build a reputation and a few minutes of cyber-incident to ruin it.” – Stephane Nappo
  • 4. Hackers Don’t Break In, They Login Keep Personal Information Professional and Limited Practice Safe Browsing Make Sure Your Internet Connection is Secure (never bank over open public Wi-Fi) Be Careful What You Download Choose Strong Passwords (phrases work best) Make Online Purchases From Secure Sites Be Careful What You Post (vacation posts can lead to home break-ins) Be Careful Who You Meet Online
  • 5. 4 TYPES OF CYBERSECURITY THREATS
  • 6. PHISHING This type of threat is the practice of sending fraudulent emails that resemble emails from legitimate sources. The attacker aims to steal sensitive information like credit card numbers and login information. It is by far the most common type of cyber attack. Cap Rock has an excellent filter solution but remember, all technology connected to the Internet has the potential to be hacked.
  • 7. SOCIAL ENGINEERING Social Engineering takes on a manipulative approach in that the actor will try to “trick” you into revealing personal or confidential information using authoritative or urgent tactics. The actor will try to gain your trust to get you to reveal Personally Identifiable Information (PII). More damage can be done with just your cell phone number than you realize.
  • 8. MALWARE Malicious Software (Malware) is a type of software designed to gain unauthorized access to computer systems often resulting in damage or failure. A computer cannot judge intent therefore malware may coincide with your computer’s normal functionality. To sum it up; Malware is bad software. Think before you click!
  • 9. RANSOMWARE Ransomware is one of many types of Malware. The threat actors using this technique have taken things to a new level of cyber crime; extortion. The actors will block access to files by encrypting them one by one while deleting the originals and demanding payment (ransom) for the decryption key. Recent statistics show that telecommunications has surpassed healthcare as the most frequently targeted sector of Ransomware hijackers. This is especially concerning for obvious reasons. Help protect our livelihood!
  • 10. NO MORE PASSWORDS? The Fast Identity Online or FIDO Alliance and The World Wide Web Consortium are on track to eliminate passwords altogether. Giants like Google, Apple, and Microsoft are forging this password-free future together. This will be possible by utilizing a cryptographic token called a passkey shared by your cell phone and the website or app you are using. Logins will be as simple as typing in your PIN, drawing a pattern, or using biometrics; face recognition or fingerprint. You might use these today, but you still have a password.
  • 11. -REMEMBER- FREE SPEECH DOESN’T MEAN CARELESS TALK! What happens at Cap Rock stays at Cap Rock. One must watch what is said in the office, around town, and at home. Cybersecurity must be practiced daily to avoid any slip-ups. Thank you for taking the time to complete this presentation. Enjoy the rest of your day! -Patrick