InfoSec Awareness Training for
JSW Shakti Foundation Employees
Protecting Our Data Together
Introduction to Information
Security
• What is InfoSec?
• - Protecting data from unauthorized access,
disclosure, alteration, and destruction.
• Why it matters
• - Data breaches can lead to financial loss,
reputational damage, and legal consequences.
Common Cyber Threats
• Phishing: Fake emails or messages tricking
users into revealing sensitive information.
• Malware: Malicious software like viruses,
ransomware, and spyware.
• Social Engineering: Manipulating people into
giving up confidential information.
• Password Attacks: Guessing or stealing
passwords to access systems.
Safe Email and Internet Use
• Think Before You Click: Don’t open suspicious
links or attachments.
• Verify Senders: Check email addresses
carefully.
• Use Secure Websites: Look for HTTPS and a
padlock icon in the browser.
Password Best Practices
• Use strong, unique passwords for each
account.
• Enable multi-factor authentication (MFA).
• Avoid using personal information in
passwords.
Device and Data Protection
• Lock your screen when away.
• Keep software and antivirus up to date.
• Don’t use public Wi-Fi for sensitive tasks.
• Back up important data regularly.
Reporting and Response
• Report suspicious emails or activity to
IT/security team immediately.
• Don’t try to investigate or fix security issues
yourself.
• Follow your organization’s incident response
procedures.
Interactive Activities
• Phishing Quiz: Identify real vs. fake emails.
• Password Strength Test: Evaluate and improve
password choices.
• Scenario Roleplay: Practice responding to a
suspected breach.
Quick Reference Sheet
• Do’s and Don’ts of Cybersecurity
• Contact info for reporting incidents
• Top 5 daily security habits
Target Data Breach (2013)
• Description: In 2013, Target faced a massive
data breach where hackers accessed credit
card and personal data of 40 million
customers.
• Impact: Financial loss, reputational damage,
and legal consequences.
• Lesson Learned: Importance of robust security
measures and timely detection.
WannaCry Ransomware Attack
(2017)
• Description: WannaCry ransomware affected
computers worldwide, encrypting data and
demanding ransom payments.
• Impact: Disruption of services, financial loss,
and data loss.
• Lesson Learned: Need for regular software
updates and backups.
Equifax Data Breach (2017)
• Description: Equifax suffered a data breach
exposing sensitive information of 147 million
people.
• Impact: Loss of trust, financial penalties, and
identity theft.
• Lesson Learned: Criticality of patch
management and data protection.
Yahoo Data Breach (2013-2014)
• Description: Yahoo experienced two major
data breaches compromising 3 billion
accounts.
• Impact: Loss of user trust, financial loss, and
legal issues.
• Lesson Learned: Importance of encryption and
proactive security measures.
Marriott Data Breach (2018)
• Description: Marriott's Starwood database
was hacked, exposing data of 500 million
guests.
• Impact: Loss of customer trust, financial
penalties, and legal consequences.
• Lesson Learned: Need for continuous
monitoring and incident response.

InfoSec_Awareness_Training_chat_gpt.pptx

  • 1.
    InfoSec Awareness Trainingfor JSW Shakti Foundation Employees Protecting Our Data Together
  • 2.
    Introduction to Information Security •What is InfoSec? • - Protecting data from unauthorized access, disclosure, alteration, and destruction. • Why it matters • - Data breaches can lead to financial loss, reputational damage, and legal consequences.
  • 3.
    Common Cyber Threats •Phishing: Fake emails or messages tricking users into revealing sensitive information. • Malware: Malicious software like viruses, ransomware, and spyware. • Social Engineering: Manipulating people into giving up confidential information. • Password Attacks: Guessing or stealing passwords to access systems.
  • 4.
    Safe Email andInternet Use • Think Before You Click: Don’t open suspicious links or attachments. • Verify Senders: Check email addresses carefully. • Use Secure Websites: Look for HTTPS and a padlock icon in the browser.
  • 5.
    Password Best Practices •Use strong, unique passwords for each account. • Enable multi-factor authentication (MFA). • Avoid using personal information in passwords.
  • 6.
    Device and DataProtection • Lock your screen when away. • Keep software and antivirus up to date. • Don’t use public Wi-Fi for sensitive tasks. • Back up important data regularly.
  • 7.
    Reporting and Response •Report suspicious emails or activity to IT/security team immediately. • Don’t try to investigate or fix security issues yourself. • Follow your organization’s incident response procedures.
  • 8.
    Interactive Activities • PhishingQuiz: Identify real vs. fake emails. • Password Strength Test: Evaluate and improve password choices. • Scenario Roleplay: Practice responding to a suspected breach.
  • 9.
    Quick Reference Sheet •Do’s and Don’ts of Cybersecurity • Contact info for reporting incidents • Top 5 daily security habits
  • 10.
    Target Data Breach(2013) • Description: In 2013, Target faced a massive data breach where hackers accessed credit card and personal data of 40 million customers. • Impact: Financial loss, reputational damage, and legal consequences. • Lesson Learned: Importance of robust security measures and timely detection.
  • 11.
    WannaCry Ransomware Attack (2017) •Description: WannaCry ransomware affected computers worldwide, encrypting data and demanding ransom payments. • Impact: Disruption of services, financial loss, and data loss. • Lesson Learned: Need for regular software updates and backups.
  • 12.
    Equifax Data Breach(2017) • Description: Equifax suffered a data breach exposing sensitive information of 147 million people. • Impact: Loss of trust, financial penalties, and identity theft. • Lesson Learned: Criticality of patch management and data protection.
  • 13.
    Yahoo Data Breach(2013-2014) • Description: Yahoo experienced two major data breaches compromising 3 billion accounts. • Impact: Loss of user trust, financial loss, and legal issues. • Lesson Learned: Importance of encryption and proactive security measures.
  • 14.
    Marriott Data Breach(2018) • Description: Marriott's Starwood database was hacked, exposing data of 500 million guests. • Impact: Loss of customer trust, financial penalties, and legal consequences. • Lesson Learned: Need for continuous monitoring and incident response.