If you don't already have a security training program, this presentation is a great tool for a new hire orientation or company-wide meeting. It includes all of our top 10 tips, plus examples of relevant news stories to drive home the point. You can customize it to include your own tips or insert individual slides in other presentations.
Download a customizable PPT here: www.sophos.com/staysafe
Presentation at 5th Annual QED Conference on Cybersecurity on 22 June 2017: https://qed.eu/Events/5th%20Annual%20QED%20Conference%20on%20Cybersecurity%20/Bio/
Video available at: https://www.youtube.com/watch?v=y0vg231Bl6o&t=778s
A single email can cause a multi-million dollar breach if opened by an end-user with no security awareness, they may not even be aware of their mistake. The problem lies in the fact that only a few end-users are aware of the dangers of social engineering, much less how to detect it. It is a major issue in the business world today.
This document seeks to address the most common threats that can be posed to an entity and also recommend security measures that can be implemented to avoid such attacks.
Learn more at https://www.multinationalnetworks.com
Presentation at 5th Annual QED Conference on Cybersecurity on 22 June 2017: https://qed.eu/Events/5th%20Annual%20QED%20Conference%20on%20Cybersecurity%20/Bio/
Video available at: https://www.youtube.com/watch?v=y0vg231Bl6o&t=778s
A single email can cause a multi-million dollar breach if opened by an end-user with no security awareness, they may not even be aware of their mistake. The problem lies in the fact that only a few end-users are aware of the dangers of social engineering, much less how to detect it. It is a major issue in the business world today.
This document seeks to address the most common threats that can be posed to an entity and also recommend security measures that can be implemented to avoid such attacks.
Learn more at https://www.multinationalnetworks.com
Information Security Awareness for everyoneYasir Nafees
SAFE (which stands for Security Awareness For Everyone) is an information security awareness program designed to help organizations creating a well informed and risk-aware culture. SAFE focuses on learning to make it important for everyone to be fully informed and take responsibility to protect organization’s most important asset, “The Information”.
Information Security Awareness
Tips to improve infosec awareness in any organization
To learn more visit http://www.SnapComms.com/solutions/employee-security-awareness
Awareness Training on Information SecurityKen Holmes
We look at the potential risks to information security, how to minimise these when on the internet and how the ISO/IEC 27001 standard can play a part in doing so.
In a world so connected, cyber security awareness is key to a safe online experience, because the weakest information security link to any organisation is the users of technology. This presentation speaks to basic cyber security awareness for everyday internet users
14 tips to increase cybersecurity awarenessMichel Bitter
We used this presentation within our company to increase the cybersecurity awareness of our employees. These 14 tips should help everybody to protect themselves against the most obvious cyber attacks.
Information Security Awareness for everyoneYasir Nafees
SAFE (which stands for Security Awareness For Everyone) is an information security awareness program designed to help organizations creating a well informed and risk-aware culture. SAFE focuses on learning to make it important for everyone to be fully informed and take responsibility to protect organization’s most important asset, “The Information”.
Information Security Awareness
Tips to improve infosec awareness in any organization
To learn more visit http://www.SnapComms.com/solutions/employee-security-awareness
Awareness Training on Information SecurityKen Holmes
We look at the potential risks to information security, how to minimise these when on the internet and how the ISO/IEC 27001 standard can play a part in doing so.
In a world so connected, cyber security awareness is key to a safe online experience, because the weakest information security link to any organisation is the users of technology. This presentation speaks to basic cyber security awareness for everyday internet users
14 tips to increase cybersecurity awarenessMichel Bitter
We used this presentation within our company to increase the cybersecurity awareness of our employees. These 14 tips should help everybody to protect themselves against the most obvious cyber attacks.
Cyber Security Awareness Training by Win-ProRonald Soh
Businesses are becoming more vulnerable to Cyber Security Threats.Especially, Small and Medium Businesses (SMB) that may not have the huge budget to spend more security to protect their business. This cyber security presentation will help to understand and help SMB mitigate risks by making some changes in their business.
Top 10 cyber security tips Staying safe online while working from different places is super important. That's what cyber security for remote work is all about! It means making sure our work stuff, like emails and files, stays safe from bad guys who might try to hack on it. We use special codes called passwords to lock our work accounts and make them strong by mixing letters, numbers, and symbols. It's like having a secret code that only we know. We also use tools like VPNs to keep our internet connection super safe when we're working outside our office. Keeping everything updated and learning how to spot tricky things online are also part of staying safe in this remote work world. So Here are 10 personal Cyber Security tips..
Your personal and business information is a valuable asset. You store it carefully on your computer and then unless you keep your computer safe and secure you lose it all. Learn what it takes to keep your data and your computer safe and secure
Essential Technologies for PsychologistsBradnor444
Presentation at the 2013 Pennsylvania Psychological Association annual convention by Dr. Brad Norford. A survey in 2012 revealed that many psychologists do not use some of the basic technologies that would help to make their practices more electronically savvy and more electronically secure. This was part two of a three part presentation that also included presentations by Dr. Chris Royer and Dr. David Zehrung designed to present some of these technologies.
This presentation provides an overview of Sophos Wireless Protection. It will help you to:
- Understand the wireless networking market
- Learn more about Sophos' wireless solutions address
- And how those solutions can meet the needs you have today for secure wireless networking
Your Money or Your File! Highway Robbery with Blackhole and RansomwareSophos
Drive-by downloads—attacks that exploit a user’s browser to distribute malware and steal data—are nothing new. But today’s most popular drive-by malware, called Blackhole, is highly sophisticated. As an IT professional, you need to understand how cybercriminals use the Blackhole crimeware kit to attack your employees with rootkits and ransomware.
The 2013 Security Threat Report recaps what happened in data security in 2012, and what trends are ahead in 2013. For more information, visit: http://bit.ly/VcLfLa
With Sophos EndUser Protection you get endpoint security, mobile device management, web protection, protection for your data and email, and more—all in a single license.
For more on Sophos EndUser Protection, visit: http://www.sophos.com/en-us/why-sophos/endpoint.aspx
The 2013 Security Threat Report recaps what happened in data security in 2012, and what trends are ahead in 2013. For more information, visit: http://bit.ly/VcLfLa
Sophos Professional services reviews how to optimally configure your Sophos Endpoint Product.
This slide deck covers:
• Anti-virus policy live protection
• Anti-virus policy web protection
• Data control policy options to track files and removable storage
• Web control multi-browser inappropriate filtering and full web control
Simply preventing personal devices from accessing your network might not be the best option for your business. A well thought out BYOD policy and the proper wireless security strategy can empower your employees, save costs, and increase productivity while maintaining security and control.
This presentation covers:
• The security implications of BYOD
• Steps to prepare your network for BYOD
• Strategies for managing remote users, branch offices and wireless access
Find out more about BYOD here: http://bit.ly/Ob1Giz
Network security implementation has changed a lot in the last few years, but often the way we approach network security in general hasn’t changed much. This presentation takes a fresh look at network security to make sure you’re getting the most out of your firewall.
The firewall in our UTM appliance is easy to use. With an open, visual layout you can be as broad or as detailed as you need. Find out more here: http://bit.ly/YzzcbE
Businesses of all sizes face risks in the everyday acts of using digital technology and the Internet for legitimate purposes. This presentation outlines eight common threats that traditional antivirus alone won't stop, and explains how to protect your organization using endpoint security. For more, visit: http://bit.ly/8Threats_wp
This presentation discusses how money has become the leading motivator for cybercriminals to spread malware. From social media to SEO, malware is spreading at a faster rate every year. Learn more and find out what you can do to protect yourself and your data.
For more on the Money Behind Malware, visit: http://bit.ly/VnDhv4
The U.S. Dept of Education suggested in their 2010 National Technology Plan that schools begin to implement BYOD programs. But, a data security plan must be put in place for a BYOD program to be successful. Find out how Sophos UTM Wireless Protection can protect your school's network.
For more on Sophos UTM, visit: http://bit.ly/ULoBZV
Give your users the latest mobile technology while keeping your organization’s data safe. We help you secure, monitor and control mobile devices with over-the-air control. The self-service portal makes mobile management easy and stops Bring Your Own Device (BYOD) from becoming an IT nightmare. Choose the delivery model to suit your needs.
For more on Sophos Mobile Control, visit: http://bit.ly/SMC_solutions
This presentation focuses on the features of Sophos UTM that give you complete security, without complexity. UTM provides security solutions for every part of your business. Endpoint, Network, Data, Email, Web and Mobile.
Find out more about Sophos UTM here: http://bit.ly/ULoBZV
Sophos Complete Security give you solutions for every part of your business including Endpoint, Network, Data, Email, Web, and Mobile. Complete Security protects your users and their data wherever they are and whatever they're using.
Find out more about Sophos Complete Security here: http://bit.ly/115IInE
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
2. A note for you
We have created this presentation for you, the outstanding employee who has
IT security on the brain.
We want to help you spread the word about IT security, so we’re giving you our
top 10 IT Security DOs and DON’Ts to help you in that effort.
Take this content and tailor it to your business. Use it for new employee
training, quarterly IT updates, or even general company meetings. It’s up to you.
And we’d love to hear your feedback on how we can make this better.
Visit www.sophos.com/staysafefeedback
Your friends @ SOPHOS
3. 1. Don’t be tricked into giving
away confidential information
• Don’t respond to emails or phone calls requesting
confidential company information
• Always keep in mind that bad guys are successful
because they are convincing.
• Recent news stories out of Canada reported scammers
were tricking people into giving away information with
fake tech support calls claiming to help.
• Keep on guard and report any
suspicious activity to IT.
Video tip 1: Don’t get tricked
4. 2. Don’t use an unprotected
computer
• When you access sensitive information from a non-secure
computer you put the information you’re viewing at risk.
• Malicious software exists that allows people to easily
snoop on what you’re doing online when accessing
unprotected sites.
• If you’re unsure if the computer you’re using
is safe, don’t use it to access corporate or
sensitive data.
Keep your personal computer safe with
Sophos Virus Removal Tool or
Sophos Anti-virus for Mac Home Edition
Video tip 2: Stay secure
5. 3. Don’t leave sensitive info lying
around the office
• Don’t leave printouts containing private information on your
desk. It’s easy for a visitor to glance at your desk and see
sensitive documents.
• Keep your desk tidy and documents locked away or
shredded when no longer needed.
• It makes the office look more organized, and reduces the
risk of information leaks.
Video tip 3: Put things away
6. 4. Lock your computer and
mobile phone when not in use
• Always lock your computer and mobile phone when you’re
not using them. You work on important things, and we want
to make sure they stay safe and secure.
• Locking these devices keeps both your personal
information and the company’s data and contacts safe
from prying eyes.
Video tip 4: Lock it
7. 5. Stay alert and report suspicious
activity
• Sometimes suspicious activity isn’t as obvious as we think.
• A recent news story reported that a supermarket manager,
who was randomly befriended by a mysterious woman on
Facebook, ended up on a “date” with two men who
overpowered him and robbed his store.
• Be cautious of people you don't know
asking for things, especially online.
• Always report any suspicious activity
to IT. If something goes wrong, the
faster we know about it, the faster we
can deal with it.
Video tip 5: Stay alert
8. 6. Password-protect sensitive
files and devices
• Always password-protect sensitive files on your
computer, USB flash drive, smartphone, laptop, etc.
• Losing a device can happen to anyone. But by protecting
your device with strong passwords, you make it difficult for
someone to break in and steal data.
Video tip 6: Protect it
9. 7. Always use hard-to-guess
passwords
• Many people use obvious passwords like “password,” “cat,”
or obvious character sequences on the qwerty keyboard
like “asdfg.”
• Create complex passwords by including different letter
cases, numbers, and even punctuation.
• Try to use different passwords for
different websites and computers.
So if one gets hacked,
your other accounts aren’t
compromised.
Video tip 7: Use strong passwords
10. 8. Be cautious of suspicious
emails and links
• Hackers try to steal email lists from companies, which
happened recently to Toshiba. Company email addresses
are valuable to attackers, allowing them to create fake
emails from "real people.“
• Always delete suspicious emails from people you don't
know. And never click on the links.
• Opening these emails or clicking on
links in them can compromise your
computer without you ever knowing it.
Video tip 8: Think first
11. 9. Don’t plug in personal devices
without the OK from IT
• Don’t plug in personal devices such as USBs, MP3 players
and smartphones without permission from IT.
• Even a brand new iPod or USB flash drive could be
infected with a nasty virus.
• These devices can be compromised
with code waiting to launch
as soon as you plug them into
a computer.
• Talk to IT about your devices and
Protect your personal Android device with
let them make the call. Sophos Mobile Security Free Edition
Video tip 9: Don't plug it in
12. 10. Don’t install unauthorized
programs on your work computer
• Malicious applications often pose as legitimate programs
like games, tools or even antivirus software.
• They aim to fool you into infecting your computer
or network.
• If you like an application and think it will be useful,
contact us and we’ll look into it for you.
Video tip 10: Don’t install it
13. Get more
IT Security DOs and DON’Ts
View the online handbook at www.sophos.com/securitytips
Get quick tips to create strong passwords
Connect with us:
facebook.com/securitybysophos
twitter.com/Sophos_News
Sophos on Google+
linkedin.com/company/sophos