SlideShare a Scribd company logo
Cyber Security Awareness
Advice for Individuals and Businesses
(based on training from the Digital Police Community Support Officer)
Presentation Contents
• Need for Cyber Security
• Threats:
• Hacking
• Malware
• Phishing
• Stay Secure
• Internet Shopping
• Internet Banking
• Personal Privacy
• Public Wi-Fi
• Passwords
• Router
• Internet of Things (IOT)
• QR Codes
• Support & Resources
Why is Cyber Awareness Important?
• Cyber crime is a growing trend
• Raise awareness of threats
• As with most crimes the police can’t tackle this
problem alone
• To encourage reporting
• Promote Government backed scheme ‘Cyber
Essentials’
• Cyber crime is massively under reported.
How Cyber crime affects the UK
• Approximately 12.5% of the UK economy is online which is one of
the biggest in the world.
• It poses a risk if the correct security measures aren’t taken.
• In 2016 49% of businesses were breached. It’s not a matter of if but
when.
• According to an Office for National Statistics Survey, there were
almost 6 million Cyber Crime and Fraud offences in 2016, which
means these crime types now make up half of all crime in England
and Wales. That’s 1/10 of people in England and Wales.
Who is doing the hacking?
Hacking
• Financial (theft, fraud, blackmail)
• Political /state (state level/ military)
• Fame/ kudos (fun/ status)
• Hacktivism (cause)
• Pen testers (legal hacking)
• Police
• Insider
• Business
Common threats - Ransomware
• Normally loaded onto a computer via a download/attachment/link
from an email or website.
• Will either lock the screen or encrypt your data.
• Once Ransomware is uploaded on your computer/tablet/phone it is
very difficult to remove without removing all of the data
• Wannacry attack 2017 - One of the biggest cyber attacks to occur.
• Is said to have hit 300,000 computers in 150 countries.
• Companies affected include; NHS, Renault, FedEx, Spanish telecoms
and gas companies, German railways.
Ransomware
• More than a third of NHS trusts in England and Wales were affected with over 6,800 operations
cancelled.
How to tackle Ransomware
• Back up- Keep a backed up copy of your data. Ensure its not
permanently connected to the network.
• Patch- Keep your software up to date. Wannacry was successful as
those affected computers hadn’t updated. The update contained a fix
for the problem.
• Attachments- Don’t click on links from emails/SMS as this could easily
be from an untrusted source and contain malware like Ransomware
Phishing
• Is the attempt to obtain sensitive information by deception.
• They will be after your login credentials, payment card details or to upload malware to your computer
• The email will normally impersonate a genuine company or person.
How to tackle the problem
• Don’t click any links on an email unless
you can guarantee who its from.
• Use a trusted method of contacting the
company via a phone number, app or
website.
• Mark the email as spam and contact the
organisation.
What to look out for when shopping on the
internet?
• Ensure you’re on the correct website
• HTTPS and the padlock- The ‘S’ stands for secure,
this means you have a secure connection to the
website. This should prevent a ‘man in the middle’
attack. It encrypts your data and the receiver will be
able to decrypt it but if it is a fraudulent website
they will still obtain your information.
• Use a credit card/ PayPal when conducting online
transactions.
Public Wi-Fi
• May not be trustworthy. They could share your information to other
companies who operate in countries without any data protection.
• You may not know who is watching you whilst you’re online.
What to do and not do to
• Don’t use online banking. Use your own data.
• Don’t conduct any purchases
• Use a virtual private network (VPN)
Passwords Advice
• Use 1 password per account.
• Three random words is the NCSC’s advice. Capitals, special characters
and numbers is your own choice.
• If you follow this advice your passwords security will be significantly
increased against a brute force attack.
• Password managers can be helpful to store your passwords.
Advice
• In the physical world we’re good at protecting ourselves and our
property, we need to replicate this in the digital world.
• 80% of cyber-crime is preventable.
• QR Codes
Advice
• Update and migrate
• Activate your firewall
• Staff awareness
• Data encryption
• User accounts privileges i.e admin
• Cyber insurance
• Prepare Plan
You are the best defence!
• Technology is only a small part of Cyber Defence
• You are the most important person – protect yourself
• For businesses the most important and best defence is Cyber Security
Aware employees – train your staff
Always be aware!
Always be on your guard!
What support is there for Businesses and
the Public?
Reporting Cybercrime
• Online fraud is to be reported to Action Fraud. They’re the national
reporting mechanism for fraud. Via;
www.actionfraud.police.uk
Or 0300 123 2040
• Can be reported 24/7 via the website.
Nation Cyber Security Centre (NCSC)
National Cyber Security Centre
https://www.ncsc.gov.uk/
https://www.ncsc.gov.uk/smallbusiness
Resources
•Cyber Aware (www.cyberaware.gov.uk)
Resources
• Get safe Online (www.getsafeonline.org)
Resources
• Cyber essentials (www.cyberaware.gov.uk/cyberessentials)
• Government back scheme created by NCSC
• Tick list and if followed will increase a companies online security
• Some governmental contracts require Cyber essential certification
Resources
WWW.NCSC.GOV.UK/CISP
CiSP is a joint industry and government initiative set up
to exchange cyber threat information in real time, in a
secure, confidential and dynamic environment,
increasing situational awareness and reducing the
impact on UK business.
We hope this information has been helpful.
Remember: You can find more guides and helpful websites on
the Tamworth Borough Council website.
(If you have not opened this presentation from the Cyber Awareness page, use the Search
function on the site to find more information; type: Cyber in the search box), or
Click here to open the Cyber Awareness page
Thank you

More Related Content

Similar to Cyber_Security_Awareness_Presentation.pdf

What is Cybercrime and How to Prevent Cybercrime?
What is Cybercrime and How to Prevent Cybercrime?What is Cybercrime and How to Prevent Cybercrime?
What is Cybercrime and How to Prevent Cybercrime?
Entrance Exam Info
 
Cybersecurity.pptx
Cybersecurity.pptxCybersecurity.pptx
Cybersecurity.pptx
NOUREDDINEOUNINISSE
 
Protecting Your Business From Cybercrime
Protecting Your Business From CybercrimeProtecting Your Business From Cybercrime
Protecting Your Business From Cybercrime
David J Rosenthal
 
Cyberattacks.pptx
Cyberattacks.pptxCyberattacks.pptx
Cyberattacks.pptx
SonakshiMundra
 
CCIAOR Cyber Security Forum
CCIAOR Cyber Security ForumCCIAOR Cyber Security Forum
CCIAOR Cyber Security Forum
CCIAOR
 
Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things
The Center for Identity
 
Updated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsUpdated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsBen Graybar
 
Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....
Abzetdin Adamov
 
Cyber Security Presentation - IT Will Never Happen To Me
Cyber Security Presentation - IT Will Never Happen To MeCyber Security Presentation - IT Will Never Happen To Me
Cyber Security Presentation - IT Will Never Happen To MeSimon Salter
 
Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me"
Simon Salter
 
Cyphra - Cyber Security
Cyphra - Cyber SecurityCyphra - Cyber Security
Cyphra - Cyber Security
NICVA
 
Cyber - it's all now a matter of time!
Cyber - it's all now a matter of time!Cyber - it's all now a matter of time!
Cyber - it's all now a matter of time!
Gloucestershire Professionals
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptx
CharithraaAR
 
Small%20Business%20Presentation.pptx
Small%20Business%20Presentation.pptxSmall%20Business%20Presentation.pptx
Small%20Business%20Presentation.pptx
KENNEDY GITHAIGA
 
Cyber Law (Identity Theft)
Cyber Law (Identity Theft)Cyber Law (Identity Theft)
Cyber Law (Identity Theft)Jermaine Smith
 
Cyber law (identity theft)
Cyber law (identity theft)Cyber law (identity theft)
Cyber law (identity theft)
Jermaine Smith
 
Cyber security
Cyber securityCyber security
Cyber security
Perfect Training Center
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Mohan Robert
 
Introduction to Cyber Security-- L01.pptx
Introduction to Cyber Security-- L01.pptxIntroduction to Cyber Security-- L01.pptx
Introduction to Cyber Security-- L01.pptx
somi12
 
DWP Cybersecurity 101 for Nonprofits
DWP Cybersecurity 101 for NonprofitsDWP Cybersecurity 101 for Nonprofits
DWP Cybersecurity 101 for Nonprofits
DWP Information Architects Inc.
 

Similar to Cyber_Security_Awareness_Presentation.pdf (20)

What is Cybercrime and How to Prevent Cybercrime?
What is Cybercrime and How to Prevent Cybercrime?What is Cybercrime and How to Prevent Cybercrime?
What is Cybercrime and How to Prevent Cybercrime?
 
Cybersecurity.pptx
Cybersecurity.pptxCybersecurity.pptx
Cybersecurity.pptx
 
Protecting Your Business From Cybercrime
Protecting Your Business From CybercrimeProtecting Your Business From Cybercrime
Protecting Your Business From Cybercrime
 
Cyberattacks.pptx
Cyberattacks.pptxCyberattacks.pptx
Cyberattacks.pptx
 
CCIAOR Cyber Security Forum
CCIAOR Cyber Security ForumCCIAOR Cyber Security Forum
CCIAOR Cyber Security Forum
 
Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things
 
Updated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsUpdated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools Tactics
 
Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....
 
Cyber Security Presentation - IT Will Never Happen To Me
Cyber Security Presentation - IT Will Never Happen To MeCyber Security Presentation - IT Will Never Happen To Me
Cyber Security Presentation - IT Will Never Happen To Me
 
Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me"
 
Cyphra - Cyber Security
Cyphra - Cyber SecurityCyphra - Cyber Security
Cyphra - Cyber Security
 
Cyber - it's all now a matter of time!
Cyber - it's all now a matter of time!Cyber - it's all now a matter of time!
Cyber - it's all now a matter of time!
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptx
 
Small%20Business%20Presentation.pptx
Small%20Business%20Presentation.pptxSmall%20Business%20Presentation.pptx
Small%20Business%20Presentation.pptx
 
Cyber Law (Identity Theft)
Cyber Law (Identity Theft)Cyber Law (Identity Theft)
Cyber Law (Identity Theft)
 
Cyber law (identity theft)
Cyber law (identity theft)Cyber law (identity theft)
Cyber law (identity theft)
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Introduction to Cyber Security-- L01.pptx
Introduction to Cyber Security-- L01.pptxIntroduction to Cyber Security-- L01.pptx
Introduction to Cyber Security-- L01.pptx
 
DWP Cybersecurity 101 for Nonprofits
DWP Cybersecurity 101 for NonprofitsDWP Cybersecurity 101 for Nonprofits
DWP Cybersecurity 101 for Nonprofits
 

Recently uploaded

Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
CarlosHernanMontoyab2
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 

Recently uploaded (20)

Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 

Cyber_Security_Awareness_Presentation.pdf

  • 1. Cyber Security Awareness Advice for Individuals and Businesses (based on training from the Digital Police Community Support Officer)
  • 2. Presentation Contents • Need for Cyber Security • Threats: • Hacking • Malware • Phishing • Stay Secure • Internet Shopping • Internet Banking • Personal Privacy • Public Wi-Fi • Passwords • Router • Internet of Things (IOT) • QR Codes • Support & Resources
  • 3. Why is Cyber Awareness Important? • Cyber crime is a growing trend • Raise awareness of threats • As with most crimes the police can’t tackle this problem alone • To encourage reporting • Promote Government backed scheme ‘Cyber Essentials’ • Cyber crime is massively under reported.
  • 4. How Cyber crime affects the UK • Approximately 12.5% of the UK economy is online which is one of the biggest in the world. • It poses a risk if the correct security measures aren’t taken. • In 2016 49% of businesses were breached. It’s not a matter of if but when. • According to an Office for National Statistics Survey, there were almost 6 million Cyber Crime and Fraud offences in 2016, which means these crime types now make up half of all crime in England and Wales. That’s 1/10 of people in England and Wales.
  • 5. Who is doing the hacking?
  • 6. Hacking • Financial (theft, fraud, blackmail) • Political /state (state level/ military) • Fame/ kudos (fun/ status) • Hacktivism (cause) • Pen testers (legal hacking) • Police • Insider • Business
  • 7. Common threats - Ransomware • Normally loaded onto a computer via a download/attachment/link from an email or website. • Will either lock the screen or encrypt your data. • Once Ransomware is uploaded on your computer/tablet/phone it is very difficult to remove without removing all of the data • Wannacry attack 2017 - One of the biggest cyber attacks to occur. • Is said to have hit 300,000 computers in 150 countries. • Companies affected include; NHS, Renault, FedEx, Spanish telecoms and gas companies, German railways.
  • 8. Ransomware • More than a third of NHS trusts in England and Wales were affected with over 6,800 operations cancelled.
  • 9. How to tackle Ransomware • Back up- Keep a backed up copy of your data. Ensure its not permanently connected to the network. • Patch- Keep your software up to date. Wannacry was successful as those affected computers hadn’t updated. The update contained a fix for the problem. • Attachments- Don’t click on links from emails/SMS as this could easily be from an untrusted source and contain malware like Ransomware
  • 10. Phishing • Is the attempt to obtain sensitive information by deception. • They will be after your login credentials, payment card details or to upload malware to your computer • The email will normally impersonate a genuine company or person. How to tackle the problem • Don’t click any links on an email unless you can guarantee who its from. • Use a trusted method of contacting the company via a phone number, app or website. • Mark the email as spam and contact the organisation.
  • 11. What to look out for when shopping on the internet? • Ensure you’re on the correct website • HTTPS and the padlock- The ‘S’ stands for secure, this means you have a secure connection to the website. This should prevent a ‘man in the middle’ attack. It encrypts your data and the receiver will be able to decrypt it but if it is a fraudulent website they will still obtain your information. • Use a credit card/ PayPal when conducting online transactions.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16. Public Wi-Fi • May not be trustworthy. They could share your information to other companies who operate in countries without any data protection. • You may not know who is watching you whilst you’re online. What to do and not do to • Don’t use online banking. Use your own data. • Don’t conduct any purchases • Use a virtual private network (VPN)
  • 17.
  • 18.
  • 19.
  • 20. Passwords Advice • Use 1 password per account. • Three random words is the NCSC’s advice. Capitals, special characters and numbers is your own choice. • If you follow this advice your passwords security will be significantly increased against a brute force attack. • Password managers can be helpful to store your passwords.
  • 21. Advice • In the physical world we’re good at protecting ourselves and our property, we need to replicate this in the digital world. • 80% of cyber-crime is preventable. • QR Codes
  • 22. Advice • Update and migrate • Activate your firewall • Staff awareness • Data encryption • User accounts privileges i.e admin • Cyber insurance • Prepare Plan
  • 23. You are the best defence! • Technology is only a small part of Cyber Defence • You are the most important person – protect yourself • For businesses the most important and best defence is Cyber Security Aware employees – train your staff Always be aware! Always be on your guard!
  • 24. What support is there for Businesses and the Public?
  • 25. Reporting Cybercrime • Online fraud is to be reported to Action Fraud. They’re the national reporting mechanism for fraud. Via; www.actionfraud.police.uk Or 0300 123 2040 • Can be reported 24/7 via the website.
  • 26. Nation Cyber Security Centre (NCSC) National Cyber Security Centre https://www.ncsc.gov.uk/ https://www.ncsc.gov.uk/smallbusiness
  • 28. Resources • Get safe Online (www.getsafeonline.org)
  • 29. Resources • Cyber essentials (www.cyberaware.gov.uk/cyberessentials) • Government back scheme created by NCSC • Tick list and if followed will increase a companies online security • Some governmental contracts require Cyber essential certification
  • 30. Resources WWW.NCSC.GOV.UK/CISP CiSP is a joint industry and government initiative set up to exchange cyber threat information in real time, in a secure, confidential and dynamic environment, increasing situational awareness and reducing the impact on UK business.
  • 31. We hope this information has been helpful. Remember: You can find more guides and helpful websites on the Tamworth Borough Council website. (If you have not opened this presentation from the Cyber Awareness page, use the Search function on the site to find more information; type: Cyber in the search box), or Click here to open the Cyber Awareness page Thank you