SlideShare a Scribd company logo
1 of 12
Download to read offline
Its Easy to Stay Safe Online
Michael Enos
Sr Director Community & Platform
2 © TechSoup Global. All Rights Reserved.
Michael Enos
Senior Director of
Community and Platform
• Michael Enos is Senior Director of Community
and Platform for Techsoup Global. In his role,
Michael directs dev-ops, enterprise
infrastructure, information and technology
security, and software development teams
that build and support platform products and
services.
Today’s Topics
• Overview of Cyber Security Frameworks
• Multi-Factor Authentication.
• Privileged Access Management and Password
• Password Management.
• The importance of keeping systems up to date
• Security Awareness Training
4 © TechSoup Global. All Rights Reserved.
Phishing
Data Breach
Service
Disruption
Malware Ransomware
Cyber Threats NGOs Face
NGOs have specific types of data that if compromised, could impede our mission and lose the trust of the communities we serve
• Vulnerable Population’s Personal Information
• Donor Data
• Financial Information
NIST
Cybersecurity Framework
• What is the Framework?
• The Framework is voluntary guidance, based on
existing standards, guidelines, and practices for
organizations to better manage and reduce
cybersecurity risk. In addition to helping
organizations manage and reduce risks, it was
designed to foster risk and cybersecurity
management communications amongst both
internal and external organizational stakeholders.
Cyber Security
Framework version 1.1
Breakdown
7 © TechSoup Global. All Rights Reserved.
Multi-Factor Authentication
• One of the quickest and easiest ways to stay safe online: enable multi-factor authentication
on your accounts. This simple step takes just a few minutes per account, and you only have
to do it once. As soon as it's in place, it becomes twice as tough for hackers to gain access
to your accounts.
• What is multi-factor authentication (MFA)? Also known as two-factor authentication, this
widely available tool secures your accounts by requiring two pieces of information to log in.
One common example of two-factor authentication: entering your password and then typing
in a one-time code sent to your email address or smartphone.
• Other examples of a second step that may be used in two-factor authentication or 2FA
include:
• A security question (for example, "What was the name of your favorite teacher?")
• A biometric identifier such as your face or fingerprint.
• A temporary passcode you get via an authenticator application.
• You can typically enable multi-factor authentication by going to an account, going to settings
and looking under security. You then toggle multi-factor authentication to "on" and provide
any necessary information, such as your phone number or email address where you want a
code sent. For example, here's how to turn on 2FA on Facebook and on Google.
8 © TechSoup Global. All Rights Reserved.
Password Management
• Another top priority for online safety: Use strong passwords and a password
manager. If you can easily remember a password, chances are good that a
hacker could use a computer program to quickly guess it and get the keys
to your online kingdom.
• A strong password should be:
• Complex – with upper and lowercase letters, numbers, and symbols
• Long – at least 16 characters long to make it much harder to crack
• Hard to guess – no real words or personal details like names and birthdays
• But the same characteristics that make passwords hard to crack also make
them difficult to remember. That's why password managers are such a
handy tool.
• Password managers keep track of all your passwords in a secure online
vault, can generate strong passwords for you on demand, and can even
safeguard other important information such as your credit card numbers.
They can quickly and easily auto-fill your passwords for you when you go to
log into a site.
• Examples of popular password managers include Norton Password
Manager. You can get a free or paid password manager service depending
on your needs, number of devices you have, and the features you need.
.
9 © TechSoup Global. All Rights Reserved.
Password Management
• Another top priority for online safety: Use strong passwords and a password
manager. If you can easily remember a password, chances are good that a
hacker could use a computer program to quickly guess it and get the keys
to your online kingdom.
• A strong password should be:
• Complex – with upper and lowercase letters, numbers, and symbols
• Long – at least 16 characters long to make it much harder to crack
• Hard to guess – no real words or personal details like names and birthdays
• But the same characteristics that make passwords hard to crack also make
them difficult to remember. That's why password managers are such a
handy tool.
• Password managers keep track of all your passwords in a secure online
vault, can generate strong passwords for you on demand, and can even
safeguard other important information such as your credit card numbers.
They can quickly and easily auto-fill your passwords for you when you go to
log into a site.
• Examples of popular password managers include Norton Password
Manager. You can get a free or paid password manager service depending
on your needs, number of devices you have, and the features you need.
.
10 © TechSoup Global. All Rights Reserved.
Keeping Software Up To Date
• Keeping your software up to date is one the easiest and most important
things you can do to stay safe online. That's because software updates
often fix bugs or loopholes attackers can exploit to gain access to your data,
infect your device with malware or ransomware, and even remotely take over
your computer.
• Make sure to update your software on a regular schedule or whenever you
get an alert letting you know an update is available. Get in the habit of doing
software updates right away rather than putting them off for later. It's also
smart to get a reputable security program that can add an extra layer of
protection.
• Want to brush up on how to perform regular updates? Here's how to update
the software on an Android
and how to update the software on an iPhone or iPad. It's important to
regularly update your operating system as well as apps on your device. Not
only will regular updates help keep you safe online and shore up
your privacy, they'll also fix glitches and help your devices run more
smoothly.
• Quick "It's easy to stay safe online" task
• Take 15 minutes to check your devices for software updates and
get current. For convenience and speed, turn on automatic software
updates. If you prefer to update software manually, set up an alert to remind
you to check for updates once a month.
• .
.
11 © TechSoup Global. All Rights Reserved.
Security Awareness Training
• Learning to recognize and report phishing scams is a top step you can take
to stay safe online. Fortunately, it's fairly easy to do and doesn't take long at
all.
• What is a phishing scam? It's when a cybercriminal sends you a fake email,
direct message, text, or even a pop-up ad to try to trick you into taking an
action such as clicking a link, providing personal information, or making
a payment. A phishing message may be cleverly disguised to look like a real
message from a familiar company such as your bank.
• Learning to spot the telltale signs of phishing and to stop and think before
taking action on an email or other message can go a long way towards
keeping you safe from phishing scams. Here are some clues that can tip
you off to a phishing attack:
• Alarming "news" about an account.
• Attachments that look odd.
• Failure to address you by name.
• Grammar errors or misspellings.
• Offers for free gadgets, trips, or other items of value.
• Language that sounds just a little bit "off."
• Request to click a link or take urgent action.
.
Thank You!
Michael Enos
menos@techsoup.org

More Related Content

Similar to Executive Directors Chat:It's easy to stay safe online.pdf

Cyber Security Awareness Month 2017-Nugget 6
Cyber Security Awareness Month 2017-Nugget 6Cyber Security Awareness Month 2017-Nugget 6
Cyber Security Awareness Month 2017-Nugget 6Chinatu Uzuegbu
 
Webinar_Cybersecurity is a shared responsibility presentation
Webinar_Cybersecurity is a shared responsibility presentationWebinar_Cybersecurity is a shared responsibility presentation
Webinar_Cybersecurity is a shared responsibility presentation211 Check
 
5 ways to strengthen cybersecurity in the workplace
5 ways to strengthen cybersecurity in the workplace5 ways to strengthen cybersecurity in the workplace
5 ways to strengthen cybersecurity in the workplaceSameerShaik43
 
Phish training final
Phish training finalPhish training final
Phish training finalJen Ruhman
 
Cyber Security and Healthcare
Cyber Security and HealthcareCyber Security and Healthcare
Cyber Security and HealthcareJonathon Coulter
 
Internet security
Internet securityInternet security
Internet securityrfukunaga
 
CYBER_SECURITY_BASICS_FINAL.pptx
CYBER_SECURITY_BASICS_FINAL.pptxCYBER_SECURITY_BASICS_FINAL.pptx
CYBER_SECURITY_BASICS_FINAL.pptxQuiMo3
 
Working from home- How secure is it.pdf
Working from home- How secure is it.pdfWorking from home- How secure is it.pdf
Working from home- How secure is it.pdfFiyona Nourin
 
Cyber Security for Financial Planners
Cyber Security for Financial PlannersCyber Security for Financial Planners
Cyber Security for Financial PlannersMichael O'Phelan
 
5 Ways to Stay #CyberSecure
5 Ways to Stay #CyberSecure5 Ways to Stay #CyberSecure
5 Ways to Stay #CyberSecureMedia Sonar
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptxCharithraaAR
 
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONSIMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONSPreetiDevidas
 
The Human Side of Security
The Human Side of SecurityThe Human Side of Security
The Human Side of SecurityRandy Earl
 
Protecting Your Business From Cybercrime
Protecting Your Business From CybercrimeProtecting Your Business From Cybercrime
Protecting Your Business From CybercrimeDavid J Rosenthal
 

Similar to Executive Directors Chat:It's easy to stay safe online.pdf (20)

Cybersecurity Training
Cybersecurity TrainingCybersecurity Training
Cybersecurity Training
 
Cyber Security Awareness Month 2017-Nugget 6
Cyber Security Awareness Month 2017-Nugget 6Cyber Security Awareness Month 2017-Nugget 6
Cyber Security Awareness Month 2017-Nugget 6
 
12990739.ppt
12990739.ppt12990739.ppt
12990739.ppt
 
Webinar_Cybersecurity is a shared responsibility presentation
Webinar_Cybersecurity is a shared responsibility presentationWebinar_Cybersecurity is a shared responsibility presentation
Webinar_Cybersecurity is a shared responsibility presentation
 
5 ways to strengthen cybersecurity in the workplace
5 ways to strengthen cybersecurity in the workplace5 ways to strengthen cybersecurity in the workplace
5 ways to strengthen cybersecurity in the workplace
 
Phish training final
Phish training finalPhish training final
Phish training final
 
Train Employees to Avoid Cybercrime
Train Employees to Avoid CybercrimeTrain Employees to Avoid Cybercrime
Train Employees to Avoid Cybercrime
 
Cyber Security and Healthcare
Cyber Security and HealthcareCyber Security and Healthcare
Cyber Security and Healthcare
 
Internet security
Internet securityInternet security
Internet security
 
CYBER_SECURITY_BASICS_FINAL.pptx
CYBER_SECURITY_BASICS_FINAL.pptxCYBER_SECURITY_BASICS_FINAL.pptx
CYBER_SECURITY_BASICS_FINAL.pptx
 
Working from home- How secure is it.pdf
Working from home- How secure is it.pdfWorking from home- How secure is it.pdf
Working from home- How secure is it.pdf
 
Cyber Security for Financial Planners
Cyber Security for Financial PlannersCyber Security for Financial Planners
Cyber Security for Financial Planners
 
5 Ways to Stay #CyberSecure
5 Ways to Stay #CyberSecure5 Ways to Stay #CyberSecure
5 Ways to Stay #CyberSecure
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptx
 
Assessing Your security
Assessing Your securityAssessing Your security
Assessing Your security
 
Information security
Information securityInformation security
Information security
 
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONSIMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
 
The Human Side of Security
The Human Side of SecurityThe Human Side of Security
The Human Side of Security
 
Protecting Your Business From Cybercrime
Protecting Your Business From CybercrimeProtecting Your Business From Cybercrime
Protecting Your Business From Cybercrime
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 

More from TechSoup

Executive Directors Chat Embracing Diversity and Cultural Differences
Executive Directors Chat  Embracing Diversity and Cultural DifferencesExecutive Directors Chat  Embracing Diversity and Cultural Differences
Executive Directors Chat Embracing Diversity and Cultural DifferencesTechSoup
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Building the Commons: Community Archiving & Decentralized Storage
Building the Commons: Community Archiving & Decentralized StorageBuilding the Commons: Community Archiving & Decentralized Storage
Building the Commons: Community Archiving & Decentralized StorageTechSoup
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
Welcome to TechSoup - New Member Orientation and Q & A (April 2024)
Welcome to TechSoup - New Member Orientation and Q & A (April 2024)Welcome to TechSoup - New Member Orientation and Q & A (April 2024)
Welcome to TechSoup - New Member Orientation and Q & A (April 2024)TechSoup
 
Executive Directors Chat Initiating Equity for Impact.pdf
Executive Directors Chat  Initiating Equity for Impact.pdfExecutive Directors Chat  Initiating Equity for Impact.pdf
Executive Directors Chat Initiating Equity for Impact.pdfTechSoup
 
Set the Path Forward with Smart Technology Decisions.pdf
Set the Path Forward with Smart Technology Decisions.pdfSet the Path Forward with Smart Technology Decisions.pdf
Set the Path Forward with Smart Technology Decisions.pdfTechSoup
 
What is the Future of QuickBooks DeskTop?
What is the Future of QuickBooks DeskTop?What is the Future of QuickBooks DeskTop?
What is the Future of QuickBooks DeskTop?TechSoup
 
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdf
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdfMaximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdf
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdfTechSoup
 
Hitting the Inbox: Email Authentication Changes and What You Need to Know
Hitting the Inbox: Email Authentication Changes and What You Need to KnowHitting the Inbox: Email Authentication Changes and What You Need to Know
Hitting the Inbox: Email Authentication Changes and What You Need to KnowTechSoup
 
Welcome to TechSoup New Member Orientation March 2024
Welcome to TechSoup New Member Orientation March 2024Welcome to TechSoup New Member Orientation March 2024
Welcome to TechSoup New Member Orientation March 2024TechSoup
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
 
Celebrate National Library Lovers Month with TechSoup! We love libraries!.pdf
Celebrate National Library Lovers Month with TechSoup! We love libraries!.pdfCelebrate National Library Lovers Month with TechSoup! We love libraries!.pdf
Celebrate National Library Lovers Month with TechSoup! We love libraries!.pdfTechSoup
 
Google Ad Grants Services at TechSoup.pdf
Google Ad Grants Services at TechSoup.pdfGoogle Ad Grants Services at TechSoup.pdf
Google Ad Grants Services at TechSoup.pdfTechSoup
 
Techsoup_ Prompt Strategy _ Template.docx.pdf
Techsoup_ Prompt Strategy _ Template.docx.pdfTechsoup_ Prompt Strategy _ Template.docx.pdf
Techsoup_ Prompt Strategy _ Template.docx.pdfTechSoup
 
Ask the Exerts - Focus on AI Prompt Engineering.pdf
Ask the Exerts - Focus on AI Prompt Engineering.pdfAsk the Exerts - Focus on AI Prompt Engineering.pdf
Ask the Exerts - Focus on AI Prompt Engineering.pdfTechSoup
 
Introduction to TechSoup’s Digital Marketing Services and Use Cases
Introduction to TechSoup’s Digital Marketing  Services and Use CasesIntroduction to TechSoup’s Digital Marketing  Services and Use Cases
Introduction to TechSoup’s Digital Marketing Services and Use CasesTechSoup
 
Grantseeking Solo- Securing Awards with Limited Staff PDF.pdf
Grantseeking Solo- Securing Awards with Limited Staff  PDF.pdfGrantseeking Solo- Securing Awards with Limited Staff  PDF.pdf
Grantseeking Solo- Securing Awards with Limited Staff PDF.pdfTechSoup
 
Welcome to TechSoup New Member Orientation and Q & A (February 2024)
Welcome to TechSoup New Member Orientation and Q & A (February 2024)Welcome to TechSoup New Member Orientation and Q & A (February 2024)
Welcome to TechSoup New Member Orientation and Q & A (February 2024)TechSoup
 
Choosing the Right CRM for your Website, Fundraising, and Marketing _ TechSou...
Choosing the Right CRM for your Website, Fundraising, and Marketing _ TechSou...Choosing the Right CRM for your Website, Fundraising, and Marketing _ TechSou...
Choosing the Right CRM for your Website, Fundraising, and Marketing _ TechSou...TechSoup
 

More from TechSoup (20)

Executive Directors Chat Embracing Diversity and Cultural Differences
Executive Directors Chat  Embracing Diversity and Cultural DifferencesExecutive Directors Chat  Embracing Diversity and Cultural Differences
Executive Directors Chat Embracing Diversity and Cultural Differences
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Building the Commons: Community Archiving & Decentralized Storage
Building the Commons: Community Archiving & Decentralized StorageBuilding the Commons: Community Archiving & Decentralized Storage
Building the Commons: Community Archiving & Decentralized Storage
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
Welcome to TechSoup - New Member Orientation and Q & A (April 2024)
Welcome to TechSoup - New Member Orientation and Q & A (April 2024)Welcome to TechSoup - New Member Orientation and Q & A (April 2024)
Welcome to TechSoup - New Member Orientation and Q & A (April 2024)
 
Executive Directors Chat Initiating Equity for Impact.pdf
Executive Directors Chat  Initiating Equity for Impact.pdfExecutive Directors Chat  Initiating Equity for Impact.pdf
Executive Directors Chat Initiating Equity for Impact.pdf
 
Set the Path Forward with Smart Technology Decisions.pdf
Set the Path Forward with Smart Technology Decisions.pdfSet the Path Forward with Smart Technology Decisions.pdf
Set the Path Forward with Smart Technology Decisions.pdf
 
What is the Future of QuickBooks DeskTop?
What is the Future of QuickBooks DeskTop?What is the Future of QuickBooks DeskTop?
What is the Future of QuickBooks DeskTop?
 
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdf
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdfMaximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdf
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdf
 
Hitting the Inbox: Email Authentication Changes and What You Need to Know
Hitting the Inbox: Email Authentication Changes and What You Need to KnowHitting the Inbox: Email Authentication Changes and What You Need to Know
Hitting the Inbox: Email Authentication Changes and What You Need to Know
 
Welcome to TechSoup New Member Orientation March 2024
Welcome to TechSoup New Member Orientation March 2024Welcome to TechSoup New Member Orientation March 2024
Welcome to TechSoup New Member Orientation March 2024
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Celebrate National Library Lovers Month with TechSoup! We love libraries!.pdf
Celebrate National Library Lovers Month with TechSoup! We love libraries!.pdfCelebrate National Library Lovers Month with TechSoup! We love libraries!.pdf
Celebrate National Library Lovers Month with TechSoup! We love libraries!.pdf
 
Google Ad Grants Services at TechSoup.pdf
Google Ad Grants Services at TechSoup.pdfGoogle Ad Grants Services at TechSoup.pdf
Google Ad Grants Services at TechSoup.pdf
 
Techsoup_ Prompt Strategy _ Template.docx.pdf
Techsoup_ Prompt Strategy _ Template.docx.pdfTechsoup_ Prompt Strategy _ Template.docx.pdf
Techsoup_ Prompt Strategy _ Template.docx.pdf
 
Ask the Exerts - Focus on AI Prompt Engineering.pdf
Ask the Exerts - Focus on AI Prompt Engineering.pdfAsk the Exerts - Focus on AI Prompt Engineering.pdf
Ask the Exerts - Focus on AI Prompt Engineering.pdf
 
Introduction to TechSoup’s Digital Marketing Services and Use Cases
Introduction to TechSoup’s Digital Marketing  Services and Use CasesIntroduction to TechSoup’s Digital Marketing  Services and Use Cases
Introduction to TechSoup’s Digital Marketing Services and Use Cases
 
Grantseeking Solo- Securing Awards with Limited Staff PDF.pdf
Grantseeking Solo- Securing Awards with Limited Staff  PDF.pdfGrantseeking Solo- Securing Awards with Limited Staff  PDF.pdf
Grantseeking Solo- Securing Awards with Limited Staff PDF.pdf
 
Welcome to TechSoup New Member Orientation and Q & A (February 2024)
Welcome to TechSoup New Member Orientation and Q & A (February 2024)Welcome to TechSoup New Member Orientation and Q & A (February 2024)
Welcome to TechSoup New Member Orientation and Q & A (February 2024)
 
Choosing the Right CRM for your Website, Fundraising, and Marketing _ TechSou...
Choosing the Right CRM for your Website, Fundraising, and Marketing _ TechSou...Choosing the Right CRM for your Website, Fundraising, and Marketing _ TechSou...
Choosing the Right CRM for your Website, Fundraising, and Marketing _ TechSou...
 

Recently uploaded

Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 

Recently uploaded (20)

Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 

Executive Directors Chat:It's easy to stay safe online.pdf

  • 1. Its Easy to Stay Safe Online Michael Enos Sr Director Community & Platform
  • 2. 2 © TechSoup Global. All Rights Reserved. Michael Enos Senior Director of Community and Platform • Michael Enos is Senior Director of Community and Platform for Techsoup Global. In his role, Michael directs dev-ops, enterprise infrastructure, information and technology security, and software development teams that build and support platform products and services.
  • 3. Today’s Topics • Overview of Cyber Security Frameworks • Multi-Factor Authentication. • Privileged Access Management and Password • Password Management. • The importance of keeping systems up to date • Security Awareness Training
  • 4. 4 © TechSoup Global. All Rights Reserved. Phishing Data Breach Service Disruption Malware Ransomware Cyber Threats NGOs Face NGOs have specific types of data that if compromised, could impede our mission and lose the trust of the communities we serve • Vulnerable Population’s Personal Information • Donor Data • Financial Information
  • 5. NIST Cybersecurity Framework • What is the Framework? • The Framework is voluntary guidance, based on existing standards, guidelines, and practices for organizations to better manage and reduce cybersecurity risk. In addition to helping organizations manage and reduce risks, it was designed to foster risk and cybersecurity management communications amongst both internal and external organizational stakeholders.
  • 7. 7 © TechSoup Global. All Rights Reserved. Multi-Factor Authentication • One of the quickest and easiest ways to stay safe online: enable multi-factor authentication on your accounts. This simple step takes just a few minutes per account, and you only have to do it once. As soon as it's in place, it becomes twice as tough for hackers to gain access to your accounts. • What is multi-factor authentication (MFA)? Also known as two-factor authentication, this widely available tool secures your accounts by requiring two pieces of information to log in. One common example of two-factor authentication: entering your password and then typing in a one-time code sent to your email address or smartphone. • Other examples of a second step that may be used in two-factor authentication or 2FA include: • A security question (for example, "What was the name of your favorite teacher?") • A biometric identifier such as your face or fingerprint. • A temporary passcode you get via an authenticator application. • You can typically enable multi-factor authentication by going to an account, going to settings and looking under security. You then toggle multi-factor authentication to "on" and provide any necessary information, such as your phone number or email address where you want a code sent. For example, here's how to turn on 2FA on Facebook and on Google.
  • 8. 8 © TechSoup Global. All Rights Reserved. Password Management • Another top priority for online safety: Use strong passwords and a password manager. If you can easily remember a password, chances are good that a hacker could use a computer program to quickly guess it and get the keys to your online kingdom. • A strong password should be: • Complex – with upper and lowercase letters, numbers, and symbols • Long – at least 16 characters long to make it much harder to crack • Hard to guess – no real words or personal details like names and birthdays • But the same characteristics that make passwords hard to crack also make them difficult to remember. That's why password managers are such a handy tool. • Password managers keep track of all your passwords in a secure online vault, can generate strong passwords for you on demand, and can even safeguard other important information such as your credit card numbers. They can quickly and easily auto-fill your passwords for you when you go to log into a site. • Examples of popular password managers include Norton Password Manager. You can get a free or paid password manager service depending on your needs, number of devices you have, and the features you need. .
  • 9. 9 © TechSoup Global. All Rights Reserved. Password Management • Another top priority for online safety: Use strong passwords and a password manager. If you can easily remember a password, chances are good that a hacker could use a computer program to quickly guess it and get the keys to your online kingdom. • A strong password should be: • Complex – with upper and lowercase letters, numbers, and symbols • Long – at least 16 characters long to make it much harder to crack • Hard to guess – no real words or personal details like names and birthdays • But the same characteristics that make passwords hard to crack also make them difficult to remember. That's why password managers are such a handy tool. • Password managers keep track of all your passwords in a secure online vault, can generate strong passwords for you on demand, and can even safeguard other important information such as your credit card numbers. They can quickly and easily auto-fill your passwords for you when you go to log into a site. • Examples of popular password managers include Norton Password Manager. You can get a free or paid password manager service depending on your needs, number of devices you have, and the features you need. .
  • 10. 10 © TechSoup Global. All Rights Reserved. Keeping Software Up To Date • Keeping your software up to date is one the easiest and most important things you can do to stay safe online. That's because software updates often fix bugs or loopholes attackers can exploit to gain access to your data, infect your device with malware or ransomware, and even remotely take over your computer. • Make sure to update your software on a regular schedule or whenever you get an alert letting you know an update is available. Get in the habit of doing software updates right away rather than putting them off for later. It's also smart to get a reputable security program that can add an extra layer of protection. • Want to brush up on how to perform regular updates? Here's how to update the software on an Android and how to update the software on an iPhone or iPad. It's important to regularly update your operating system as well as apps on your device. Not only will regular updates help keep you safe online and shore up your privacy, they'll also fix glitches and help your devices run more smoothly. • Quick "It's easy to stay safe online" task • Take 15 minutes to check your devices for software updates and get current. For convenience and speed, turn on automatic software updates. If you prefer to update software manually, set up an alert to remind you to check for updates once a month. • . .
  • 11. 11 © TechSoup Global. All Rights Reserved. Security Awareness Training • Learning to recognize and report phishing scams is a top step you can take to stay safe online. Fortunately, it's fairly easy to do and doesn't take long at all. • What is a phishing scam? It's when a cybercriminal sends you a fake email, direct message, text, or even a pop-up ad to try to trick you into taking an action such as clicking a link, providing personal information, or making a payment. A phishing message may be cleverly disguised to look like a real message from a familiar company such as your bank. • Learning to spot the telltale signs of phishing and to stop and think before taking action on an email or other message can go a long way towards keeping you safe from phishing scams. Here are some clues that can tip you off to a phishing attack: • Alarming "news" about an account. • Attachments that look odd. • Failure to address you by name. • Grammar errors or misspellings. • Offers for free gadgets, trips, or other items of value. • Language that sounds just a little bit "off." • Request to click a link or take urgent action. .