SlideShare a Scribd company logo
Cyber Security Awareness
Advice for Individuals and Businesses
(based on training from the Digital Police Community Support Officer)
Presentation Contents
• Need for Cyber Security
• Threats:
• Hacking
• Malware
• Phishing
• Stay Secure
• Internet Shopping
• Internet Banking
• Personal Privacy
• Public Wi-Fi
• Passwords
• Router
• Internet of Things (IOT)
• QR Codes
• Support & Resources
Why is Cyber Awareness Important?
• Cyber crime is a growing trend
• Raise awareness of threats
• As with most crimes the police can’t tackle this
problem alone
• To encourage reporting
• Promote Government backed scheme ‘Cyber
Essentials’
• Cyber crime is massively under reported.
How Cyber crime affects the UK
• Approximately 12.5% of the UK economy is online which is one of
the biggest in the world.
• It poses a risk if the correct security measures aren’t taken.
• In 2016 49% of businesses were breached. It’s not a matter of if but
when.
• According to an Office for National Statistics Survey, there were
almost 6 million Cyber Crime and Fraud offences in 2016, which
means these crime types now make up half of all crime in England
and Wales. That’s 1/10 of people in England and Wales.
Who is doing the hacking?
Hacking
• Financial (theft, fraud, blackmail)
• Political /state (state level/ military)
• Fame/ kudos (fun/ status)
• Hacktivism (cause)
• Pen testers (legal hacking)
• Police
• Insider
• Business
Common threats - Ransomware
• Normally loaded onto a computer via a download/attachment/link
from an email or website.
• Will either lock the screen or encrypt your data.
• Once Ransomware is uploaded on your computer/tablet/phone it is
very difficult to remove without removing all of the data
• Wannacry attack 2017 - One of the biggest cyber attacks to occur.
• Is said to have hit 300,000 computers in 150 countries.
• Companies affected include; NHS, Renault, FedEx, Spanish telecoms
and gas companies, German railways.
Ransomware
• More than a third of NHS trusts in England and Wales were affected with over 6,800 operations
cancelled.
How to tackle Ransomware
• Back up- Keep a backed up copy of your data. Ensure its not
permanently connected to the network.
• Patch- Keep your software up to date. Wannacry was successful as
those affected computers hadn’t updated. The update contained a fix
for the problem.
• Attachments- Don’t click on links from emails/SMS as this could easily
be from an untrusted source and contain malware like Ransomware
Phishing
• Is the attempt to obtain sensitive information by deception.
• They will be after your login credentials, payment card details or to upload malware to your computer
• The email will normally impersonate a genuine company or person.
How to tackle the problem
• Don’t click any links on an email unless
you can guarantee who its from.
• Use a trusted method of contacting the
company via a phone number, app or
website.
• Mark the email as spam and contact the
organisation.
What to look out for when shopping on the
internet?
• Ensure you’re on the correct website
• HTTPS and the padlock- The ‘S’ stands for secure,
this means you have a secure connection to the
website. This should prevent a ‘man in the middle’
attack. It encrypts your data and the receiver will be
able to decrypt it but if it is a fraudulent website
they will still obtain your information.
• Use a credit card/ PayPal when conducting online
transactions.
Public Wi-Fi
• May not be trustworthy. They could share your information to other
companies who operate in countries without any data protection.
• You may not know who is watching you whilst you’re online.
What to do and not do to
• Don’t use online banking. Use your own data.
• Don’t conduct any purchases
• Use a virtual private network (VPN)
Passwords Advice
• Use 1 password per account.
• Three random words is the NCSC’s advice. Capitals, special characters
and numbers is your own choice.
• If you follow this advice your passwords security will be significantly
increased against a brute force attack.
• Password managers can be helpful to store your passwords.
Advice
• In the physical world we’re good at protecting ourselves and our
property, we need to replicate this in the digital world.
• 80% of cyber-crime is preventable.
• QR Codes
Advice
• Update and migrate
• Activate your firewall
• Staff awareness
• Data encryption
• User accounts privileges i.e admin
• Cyber insurance
• Prepare Plan
You are the best defence!
• Technology is only a small part of Cyber Defence
• You are the most important person – protect yourself
• For businesses the most important and best defence is Cyber Security
Aware employees – train your staff
Always be aware!
Always be on your guard!
What support is there for Businesses and
the Public?
Reporting Cybercrime
• Online fraud is to be reported to Action Fraud. They’re the national
reporting mechanism for fraud. Via;
www.actionfraud.police.uk
Or 0300 123 2040
• Can be reported 24/7 via the website.
Nation Cyber Security Centre (NCSC)
National Cyber Security Centre
https://www.ncsc.gov.uk/
https://www.ncsc.gov.uk/smallbusiness
Resources
•Cyber Aware (www.cyberaware.gov.uk)
Resources
• Get safe Online (www.getsafeonline.org)
Resources
• Cyber essentials (www.cyberaware.gov.uk/cyberessentials)
• Government back scheme created by NCSC
• Tick list and if followed will increase a companies online security
• Some governmental contracts require Cyber essential certification
Resources
WWW.NCSC.GOV.UK/CISP
CiSP is a joint industry and government initiative set up
to exchange cyber threat information in real time, in a
secure, confidential and dynamic environment,
increasing situational awareness and reducing the
impact on UK business.
We hope this information has been helpful.
Remember: You can find more guides and helpful websites on
the Tamworth Borough Council website.
(If you have not opened this presentation from the Cyber Awareness page, use the Search
function on the site to find more information; type: Cyber in the search box), or
Click here to open the Cyber Awareness page
Thank you

More Related Content

Similar to Cyber_Security_Awareness_Presentation.pptx

What is Cybercrime and How to Prevent Cybercrime?
What is Cybercrime and How to Prevent Cybercrime?What is Cybercrime and How to Prevent Cybercrime?
What is Cybercrime and How to Prevent Cybercrime?
Entrance Exam Info
 
Cybersecurity.pptx
Cybersecurity.pptxCybersecurity.pptx
Cybersecurity.pptx
NOUREDDINEOUNINISSE
 
Protecting Your Business From Cybercrime
Protecting Your Business From CybercrimeProtecting Your Business From Cybercrime
Protecting Your Business From Cybercrime
David J Rosenthal
 
Cyberattacks.pptx
Cyberattacks.pptxCyberattacks.pptx
Cyberattacks.pptx
SonakshiMundra
 
CCIAOR Cyber Security Forum
CCIAOR Cyber Security ForumCCIAOR Cyber Security Forum
CCIAOR Cyber Security Forum
CCIAOR
 
Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things
The Center for Identity
 
Updated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsUpdated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools Tactics
Ben Graybar
 
Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....
Abzetdin Adamov
 
Cyber Security Presentation - IT Will Never Happen To Me
Cyber Security Presentation - IT Will Never Happen To MeCyber Security Presentation - IT Will Never Happen To Me
Cyber Security Presentation - IT Will Never Happen To Me
Simon Salter
 
Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me"
Simon Salter
 
Cyphra - Cyber Security
Cyphra - Cyber SecurityCyphra - Cyber Security
Cyphra - Cyber Security
NICVA
 
Cyber - it's all now a matter of time!
Cyber - it's all now a matter of time!Cyber - it's all now a matter of time!
Cyber - it's all now a matter of time!
Gloucestershire Professionals
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptx
CharithraaAR
 
Small%20Business%20Presentation.pptx
Small%20Business%20Presentation.pptxSmall%20Business%20Presentation.pptx
Small%20Business%20Presentation.pptx
KENNEDY GITHAIGA
 
Cyber Law (Identity Theft)
Cyber Law (Identity Theft)Cyber Law (Identity Theft)
Cyber Law (Identity Theft)
Jermaine Smith
 
Cyber law (identity theft)
Cyber law (identity theft)Cyber law (identity theft)
Cyber law (identity theft)
Jermaine Smith
 
Cyber security
Cyber securityCyber security
Cyber security
Perfect Training Center
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Mohan Robert
 
Introduction to Cyber Security-- L01.pptx
Introduction to Cyber Security-- L01.pptxIntroduction to Cyber Security-- L01.pptx
Introduction to Cyber Security-- L01.pptx
somi12
 
DWP Cybersecurity 101 for Nonprofits
DWP Cybersecurity 101 for NonprofitsDWP Cybersecurity 101 for Nonprofits
DWP Cybersecurity 101 for Nonprofits
DWP Information Architects Inc.
 

Similar to Cyber_Security_Awareness_Presentation.pptx (20)

What is Cybercrime and How to Prevent Cybercrime?
What is Cybercrime and How to Prevent Cybercrime?What is Cybercrime and How to Prevent Cybercrime?
What is Cybercrime and How to Prevent Cybercrime?
 
Cybersecurity.pptx
Cybersecurity.pptxCybersecurity.pptx
Cybersecurity.pptx
 
Protecting Your Business From Cybercrime
Protecting Your Business From CybercrimeProtecting Your Business From Cybercrime
Protecting Your Business From Cybercrime
 
Cyberattacks.pptx
Cyberattacks.pptxCyberattacks.pptx
Cyberattacks.pptx
 
CCIAOR Cyber Security Forum
CCIAOR Cyber Security ForumCCIAOR Cyber Security Forum
CCIAOR Cyber Security Forum
 
Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things
 
Updated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsUpdated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools Tactics
 
Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....
 
Cyber Security Presentation - IT Will Never Happen To Me
Cyber Security Presentation - IT Will Never Happen To MeCyber Security Presentation - IT Will Never Happen To Me
Cyber Security Presentation - IT Will Never Happen To Me
 
Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me"
 
Cyphra - Cyber Security
Cyphra - Cyber SecurityCyphra - Cyber Security
Cyphra - Cyber Security
 
Cyber - it's all now a matter of time!
Cyber - it's all now a matter of time!Cyber - it's all now a matter of time!
Cyber - it's all now a matter of time!
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptx
 
Small%20Business%20Presentation.pptx
Small%20Business%20Presentation.pptxSmall%20Business%20Presentation.pptx
Small%20Business%20Presentation.pptx
 
Cyber Law (Identity Theft)
Cyber Law (Identity Theft)Cyber Law (Identity Theft)
Cyber Law (Identity Theft)
 
Cyber law (identity theft)
Cyber law (identity theft)Cyber law (identity theft)
Cyber law (identity theft)
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Introduction to Cyber Security-- L01.pptx
Introduction to Cyber Security-- L01.pptxIntroduction to Cyber Security-- L01.pptx
Introduction to Cyber Security-- L01.pptx
 
DWP Cybersecurity 101 for Nonprofits
DWP Cybersecurity 101 for NonprofitsDWP Cybersecurity 101 for Nonprofits
DWP Cybersecurity 101 for Nonprofits
 

Recently uploaded

Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
davidjhones387
 
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
uehowe
 
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
k4ncd0z
 
HijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process HollowingHijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process Hollowing
Donato Onofri
 
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
fovkoyb
 
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaalmanuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
wolfsoftcompanyco
 
Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
Paul Walk
 
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
3a0sd7z3
 
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
rtunex8r
 
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
uehowe
 
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
uehowe
 
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
ysasp1
 
Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!
Toptal Tech
 
Bengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal BrandingBengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal Branding
Tarandeep Singh
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
xjq03c34
 
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
3a0sd7z3
 

Recently uploaded (16)

Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
 
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
 
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
 
HijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process HollowingHijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process Hollowing
 
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
 
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaalmanuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
 
Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
 
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
 
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
 
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
 
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
 
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
 
Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!
 
Bengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal BrandingBengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal Branding
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
 
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
 

Cyber_Security_Awareness_Presentation.pptx

  • 1. Cyber Security Awareness Advice for Individuals and Businesses (based on training from the Digital Police Community Support Officer)
  • 2. Presentation Contents • Need for Cyber Security • Threats: • Hacking • Malware • Phishing • Stay Secure • Internet Shopping • Internet Banking • Personal Privacy • Public Wi-Fi • Passwords • Router • Internet of Things (IOT) • QR Codes • Support & Resources
  • 3. Why is Cyber Awareness Important? • Cyber crime is a growing trend • Raise awareness of threats • As with most crimes the police can’t tackle this problem alone • To encourage reporting • Promote Government backed scheme ‘Cyber Essentials’ • Cyber crime is massively under reported.
  • 4. How Cyber crime affects the UK • Approximately 12.5% of the UK economy is online which is one of the biggest in the world. • It poses a risk if the correct security measures aren’t taken. • In 2016 49% of businesses were breached. It’s not a matter of if but when. • According to an Office for National Statistics Survey, there were almost 6 million Cyber Crime and Fraud offences in 2016, which means these crime types now make up half of all crime in England and Wales. That’s 1/10 of people in England and Wales.
  • 5. Who is doing the hacking?
  • 6. Hacking • Financial (theft, fraud, blackmail) • Political /state (state level/ military) • Fame/ kudos (fun/ status) • Hacktivism (cause) • Pen testers (legal hacking) • Police • Insider • Business
  • 7. Common threats - Ransomware • Normally loaded onto a computer via a download/attachment/link from an email or website. • Will either lock the screen or encrypt your data. • Once Ransomware is uploaded on your computer/tablet/phone it is very difficult to remove without removing all of the data • Wannacry attack 2017 - One of the biggest cyber attacks to occur. • Is said to have hit 300,000 computers in 150 countries. • Companies affected include; NHS, Renault, FedEx, Spanish telecoms and gas companies, German railways.
  • 8. Ransomware • More than a third of NHS trusts in England and Wales were affected with over 6,800 operations cancelled.
  • 9. How to tackle Ransomware • Back up- Keep a backed up copy of your data. Ensure its not permanently connected to the network. • Patch- Keep your software up to date. Wannacry was successful as those affected computers hadn’t updated. The update contained a fix for the problem. • Attachments- Don’t click on links from emails/SMS as this could easily be from an untrusted source and contain malware like Ransomware
  • 10. Phishing • Is the attempt to obtain sensitive information by deception. • They will be after your login credentials, payment card details or to upload malware to your computer • The email will normally impersonate a genuine company or person. How to tackle the problem • Don’t click any links on an email unless you can guarantee who its from. • Use a trusted method of contacting the company via a phone number, app or website. • Mark the email as spam and contact the organisation.
  • 11. What to look out for when shopping on the internet? • Ensure you’re on the correct website • HTTPS and the padlock- The ‘S’ stands for secure, this means you have a secure connection to the website. This should prevent a ‘man in the middle’ attack. It encrypts your data and the receiver will be able to decrypt it but if it is a fraudulent website they will still obtain your information. • Use a credit card/ PayPal when conducting online transactions.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16. Public Wi-Fi • May not be trustworthy. They could share your information to other companies who operate in countries without any data protection. • You may not know who is watching you whilst you’re online. What to do and not do to • Don’t use online banking. Use your own data. • Don’t conduct any purchases • Use a virtual private network (VPN)
  • 17.
  • 18.
  • 19.
  • 20. Passwords Advice • Use 1 password per account. • Three random words is the NCSC’s advice. Capitals, special characters and numbers is your own choice. • If you follow this advice your passwords security will be significantly increased against a brute force attack. • Password managers can be helpful to store your passwords.
  • 21. Advice • In the physical world we’re good at protecting ourselves and our property, we need to replicate this in the digital world. • 80% of cyber-crime is preventable. • QR Codes
  • 22. Advice • Update and migrate • Activate your firewall • Staff awareness • Data encryption • User accounts privileges i.e admin • Cyber insurance • Prepare Plan
  • 23. You are the best defence! • Technology is only a small part of Cyber Defence • You are the most important person – protect yourself • For businesses the most important and best defence is Cyber Security Aware employees – train your staff Always be aware! Always be on your guard!
  • 24. What support is there for Businesses and the Public?
  • 25. Reporting Cybercrime • Online fraud is to be reported to Action Fraud. They’re the national reporting mechanism for fraud. Via; www.actionfraud.police.uk Or 0300 123 2040 • Can be reported 24/7 via the website.
  • 26. Nation Cyber Security Centre (NCSC) National Cyber Security Centre https://www.ncsc.gov.uk/ https://www.ncsc.gov.uk/smallbusiness
  • 28. Resources • Get safe Online (www.getsafeonline.org)
  • 29. Resources • Cyber essentials (www.cyberaware.gov.uk/cyberessentials) • Government back scheme created by NCSC • Tick list and if followed will increase a companies online security • Some governmental contracts require Cyber essential certification
  • 30. Resources WWW.NCSC.GOV.UK/CISP CiSP is a joint industry and government initiative set up to exchange cyber threat information in real time, in a secure, confidential and dynamic environment, increasing situational awareness and reducing the impact on UK business.
  • 31. We hope this information has been helpful. Remember: You can find more guides and helpful websites on the Tamworth Borough Council website. (If you have not opened this presentation from the Cyber Awareness page, use the Search function on the site to find more information; type: Cyber in the search box), or Click here to open the Cyber Awareness page Thank you