SlideShare a Scribd company logo
1 of 12
Download to read offline
Security awareness training
The 2019
The Essential Cyber Security
Checklist
The protection of confidential
information is vital for every
organization. The purpose of
security awareness training is
to develop competence and
company culture that saves
money and creates a human
firewall guarding against an
ever increasing threat of rep-
utational and actual damage
and data loss.
This is a list of the most common security threats that your
employees need to be aware of. There are of course more threats out
there. This is just a starting point with the most common ones that
should be the foundation of your training efforts.
Awareness raising must be interesting enough to get people’s atten-
tion and short enough to be remembered.
Security awareness is a compliance issue and is needed to accomdate
standards such as ISO27001, PCI-DSS and many country or state laws.
Security awareness is an essential part of employee training and is the
most effective way to keep companies safe from intruders and hacks.
We hope this list helps to identify at least some of the threats that are
around today.
Common Security Risks
Essentials
A modern company needs
informed employees who have a
basic understanding of
where security risks lie
Internet
Safe browsing and
understanding http or https,
phishing sites, and
common threats on the web
Working from home using a
laptop or even a phone can
cause a security risk if the employee
is not aware of the risks
Out of Office
Privacy
With increased regulations to
guard personally identifiable
information, mistakes
can be very expensive
Email
An understanding of phishing,
malicious attachments and
when it is proper to use email
and when not
At the Office
Handling confidential content,
printed or digital. Disposing of it
correctly and not leaving it laying
around are all risks
Social Awareness
Understanding where the risks
are and how social engineering
works is essential to securing
access to a workplace and data
Mobile
Mobile phones today are mini
computers that can hold
valuable information
A data leak is the intentional or
unintentional release of secure or private/
confidential information to an untrusted
environment. Failure to report a leak can have
severe consequences for the individual and
lead to hefty fines for the company.
Data Leaks
Ransomware is malware or a virus that
encrypts the data on your computer or in some
cases your whole network. You cannot access
your files or pictures until you pay the ransom,
or sometimes not even then.
Ransomware
Documents, memos, email, and contacts can
be stolen if you leave your phone unlocked.
It is important to guard the information.
Always keep your phone locked when you’re
not using it.
Phone Locking
Vishing is the telephone equivalent of
phishing. It is described as the act of using
the telephone in an attempt to scam the user
into surrendering private information that
will be used for identity theft.
Vishing
Essentials Privacy
Essentials Internet
Essentials Mobile
Mobile Social
Leaving your computer unlocked and
unattended can cause serious problems
if someone else has access to it.
Unattended Computer
Managing multiple passwords can be hard,
but it is essential to have different
passwords for different sensitive accounts.
Same Password
Email is still an important communication
tool for business organizations. Attachments
represent a potential security risk. They can
contain malicious content, open other
dangerous files, or launch applications, etc.
Malicious Attachments
Removable media is a common way to move
larger amounts of data. The risks are
numerous, including data loss, malware
threats and misplacement resulting in
reputational damage.
Removable Media
Essentials Internet Mobile
Out of office Privacy
A USB key drop is when a hacker leaves a
USB stick on the ground or in an open
space, hoping that someone will plug it
into their computer, giving access to their
computer and all files they have access
to on the network.
USB Key Drop
Social engineering is the use of a deception
to manipulate individuals into divulging
confidential or personal information that
may be used for fraudulent purposes often
tricking people into breaking normal
security procedures.
Social Engineering
Dumpster diving is a technique to
retrieve sensitive information that could be
used to access a computer network. It isn’t
limited to searching through the trash for
documents.
Dumpster Diving
Spyware and malware are types of software
that enables a hacker to obtain covert
information about another’s computer
activities by transmitting data from the
computer or
Spyware
Out of Office Social Awareness
Essentials Email Internet
A chain mail attempts to convince the
recipient to pass it on to others. The risk is
that email addresses will be distributed to a
malicious person, and the email can include
links to malware.
Chain Mail
The CEO scam is when a hacker impersonates
executives and tricks employees into
sending sensitive information. This includes
using social engineering to manipulate
people and their actions.
CEO Scam
Maintaining a clean desk includes not
leaving sensitive documents on the desk,
not writing passwords on sticky notes,
cleaning sensitive information off a white
board, and not leaving an access card
where it might be stolen.
Clean Desk
Keep software up to date to defend
against serious issues. Viruses,
spyware, and other malware rely on
unpatched and outdated software.
Computer Installs
At the Office Email
Social Awareness Internet
At the Office Social Awareness
At the Office Internet
Choosing a good password is necessary.
Choose one that has at least 8-10 characters
and use at least one number, one uppercase
letter, one lowercase letter, and one special
symbol. Do not use any words that are in the
dictionary.
Password
Choosing a good password is just a start.
Use different passwords for different
accounts and don’t leave the password where
it can be found. Don’t send credentials by
email or store them in an unsecure location.
Password Handling
Printing documents and leaving them
in the printer can give unauthorized
persons access to confidential data.
Printouts
Private media is often not regulated and
sometimes unsecure. Understanding the
ways a hacker might gain access to
unauthorized data is important.
Confidential Material
Essentials
Essentials
Essentials At the Office
Tailgating, sometimes called piggybacking,
is a physical security breach where an
unauthorized person follows an authorized
one into a secure location.
Tailgating
Phishing is the fraudulent practice of
sending emails purporting to be from
reputable companies in order to induce
individuals to reveal personal information,
such as passwords and credit card numbers.
Phishing
Hypertext Transfer Protocol Secure
(HTTPS) is a variant of the standard web
transfer protocol (HTTP) that adds a layer
of security to the data in transit.
HTTPS
Spear Phishing is the practice of studying
individuals and their habits, and then using
that information to send specific emails
from a known or trusted sender’s address in
order to obtain confidential information.
Spear Phising
Essentials Email Social Awareness
Essentials Email Social Awareness
Shoulder surfing is a type of social
engineering technique used to obtain
information such as personal identification
numbers, passwords, and other confidential
data by looking over the victim’s shoulder.
Shoulder Surfing
People usually use free WiFi without thinking.
One of the most common open WiFi attacks
is called a Man-in-the-Middle (MitM) attack,
where a hacker can monitor all traffic and get
sensitive information.
Free WiFi
Home networks are often set up in a rush to
get connectivity ready as soon as possible.
Most people do not take any steps to secure
their home network, making them vulnerable
to hackers.
Home WiFi
A keylogger is a piece of malicious software
or hardware (a small device connected to the
computer keyboard) that records every key-
stroke you make on a keyboard.
Keylogger
Out of Office Internet
At the Office
Out of office Internet
This simple list is hopefully helpful for security personnel or data
protection officers in defending against cyber criminals and finding
potential security risks.
We try to update this list with new content as often as possible. If you
feel that anything is missing. Please let us know at
awarego@awarego.com.
We think of security awareness as a marketing campaign instead of a
training effort, and it should be enjoyable.
About the List
Ragnar experienced first hand the challenges orga-
nizations face when training employees on proper
security measures. He saw employees doze off and
lose complete interest during security awareness
training. That is why he started AwareGO in 2007:
there had to be a better way to bring the security
message to the masses and make workplaces safer.
Ragnar Sigurdsson
Ethical Hacker, CISSP
At AwareGO we use marketing principles and humor
to urge employees to become more aware and com-
pliant within today’s volatile organizations. AwareGO
follows what is happening in security today and pro-
vides organizations of all sizes with the tools they
need to train their employees to keep sensitive data
safe and secure.
AwareGO
Security Awareness and Compliance
Phone
+354 899 4370
Email
awarego@awarego.com
Address
AwareGO, Borgartun 27, 105 Reykjavik Iceland
Get In Touch

More Related Content

What's hot

Endpoint Security Solutions
Endpoint Security SolutionsEndpoint Security Solutions
Endpoint Security SolutionsThe TNS Group
 
What is Social Engineering? An illustrated presentation.
What is Social Engineering?    An illustrated presentation.What is Social Engineering?    An illustrated presentation.
What is Social Engineering? An illustrated presentation.Pratum
 
Cybersecurity Awareness Training
Cybersecurity Awareness TrainingCybersecurity Awareness Training
Cybersecurity Awareness TrainingDave Monahan
 
Access_Control_Systems_and_methodology
Access_Control_Systems_and_methodologyAccess_Control_Systems_and_methodology
Access_Control_Systems_and_methodologyArti Ambokar
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awarenessJason Murray
 
Application Security - Your Success Depends on it
Application Security - Your Success Depends on itApplication Security - Your Success Depends on it
Application Security - Your Success Depends on itWSO2
 
Information Security vs IT - Key Roles & Responsibilities
Information Security vs IT - Key Roles & ResponsibilitiesInformation Security vs IT - Key Roles & Responsibilities
Information Security vs IT - Key Roles & ResponsibilitiesKroll
 
CISSP - Chapter 3 - Physical security
CISSP - Chapter 3  - Physical securityCISSP - Chapter 3  - Physical security
CISSP - Chapter 3 - Physical securityKarthikeyan Dhayalan
 
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...Edureka!
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and SecurityNoushad Hasan
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsKrishna Srikanth Manda
 
Information Security and Privacy - Public Sector actions, policies and regula...
Information Security and Privacy - Public Sector actions, policies and regula...Information Security and Privacy - Public Sector actions, policies and regula...
Information Security and Privacy - Public Sector actions, policies and regula...The University of Texas (UTRGV)
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness TrainingJen Ruhman
 
Introduction to cyber security
Introduction to cyber security Introduction to cyber security
Introduction to cyber security RaviPrashant5
 
Cybersecurity Awareness Training Presentation v1.3
Cybersecurity Awareness Training Presentation v1.3Cybersecurity Awareness Training Presentation v1.3
Cybersecurity Awareness Training Presentation v1.3DallasHaselhorst
 
14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awarenessMichel Bitter
 

What's hot (20)

Security Awareness Training by Fortinet
Security Awareness Training by FortinetSecurity Awareness Training by Fortinet
Security Awareness Training by Fortinet
 
Endpoint Security Solutions
Endpoint Security SolutionsEndpoint Security Solutions
Endpoint Security Solutions
 
What is Social Engineering? An illustrated presentation.
What is Social Engineering?    An illustrated presentation.What is Social Engineering?    An illustrated presentation.
What is Social Engineering? An illustrated presentation.
 
Cybersecurity Awareness Training
Cybersecurity Awareness TrainingCybersecurity Awareness Training
Cybersecurity Awareness Training
 
Access_Control_Systems_and_methodology
Access_Control_Systems_and_methodologyAccess_Control_Systems_and_methodology
Access_Control_Systems_and_methodology
 
Security awareness
Security awarenessSecurity awareness
Security awareness
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awareness
 
Application Security - Your Success Depends on it
Application Security - Your Success Depends on itApplication Security - Your Success Depends on it
Application Security - Your Success Depends on it
 
Information Security vs IT - Key Roles & Responsibilities
Information Security vs IT - Key Roles & ResponsibilitiesInformation Security vs IT - Key Roles & Responsibilities
Information Security vs IT - Key Roles & Responsibilities
 
CISSP - Chapter 3 - Physical security
CISSP - Chapter 3  - Physical securityCISSP - Chapter 3  - Physical security
CISSP - Chapter 3 - Physical security
 
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
 
Basic Security Training for End Users
Basic Security Training for End UsersBasic Security Training for End Users
Basic Security Training for End Users
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
 
Information Security and Privacy - Public Sector actions, policies and regula...
Information Security and Privacy - Public Sector actions, policies and regula...Information Security and Privacy - Public Sector actions, policies and regula...
Information Security and Privacy - Public Sector actions, policies and regula...
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness Training
 
Introduction to cyber security
Introduction to cyber security Introduction to cyber security
Introduction to cyber security
 
Cybersecurity Awareness Training Presentation v1.3
Cybersecurity Awareness Training Presentation v1.3Cybersecurity Awareness Training Presentation v1.3
Cybersecurity Awareness Training Presentation v1.3
 
14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness
 

Similar to Security awareness-checklist 2019

cyber security.pptx
cyber security.pptxcyber security.pptx
cyber security.pptxTapan Khilar
 
Rothke Sia 2006
Rothke   Sia 2006Rothke   Sia 2006
Rothke Sia 2006Ben Rothke
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityNcell
 
Cybersecurity Awareness E-book by Propelled Technologies
Cybersecurity Awareness E-book by Propelled Technologies Cybersecurity Awareness E-book by Propelled Technologies
Cybersecurity Awareness E-book by Propelled Technologies Anwar CHFI, SSCP, ITIL
 
7 Types of Cyber Security Threats | The Lifesciences Magazine
7 Types of Cyber Security Threats | The Lifesciences Magazine7 Types of Cyber Security Threats | The Lifesciences Magazine
7 Types of Cyber Security Threats | The Lifesciences MagazineThe Lifesciences Magazine
 
The Emotional Lure of Social Engineering
The Emotional Lure of Social EngineeringThe Emotional Lure of Social Engineering
The Emotional Lure of Social EngineeringThe TNS Group
 
mobile security.pptx
mobile security.pptxmobile security.pptx
mobile security.pptxTapan Khilar
 
Customer information security awareness training
Customer information security awareness trainingCustomer information security awareness training
Customer information security awareness trainingAbdalrhmanTHassan
 
End user security awareness
End user security awarenessEnd user security awareness
End user security awarenessKanishk Raj
 
Cyber Privacy & Password Protection
Cyber Privacy & Password ProtectionCyber Privacy & Password Protection
Cyber Privacy & Password ProtectionNikhil D
 
Cybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppCybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppWeSecureApp
 
Cybersecurity tips for employees
Cybersecurity tips for employeesCybersecurity tips for employees
Cybersecurity tips for employeesPriscila Bernardes
 
Cybersecurity tips for employees
Cybersecurity tips for employeesCybersecurity tips for employees
Cybersecurity tips for employeesPriscila Bernardes
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber securityAnimesh Roy
 
How to Ensure Complete Data Protection at Work?
How to Ensure Complete Data Protection at Work?How to Ensure Complete Data Protection at Work?
How to Ensure Complete Data Protection at Work?XNSPY
 
Security and the Service Desk
Security and the Service DeskSecurity and the Service Desk
Security and the Service DeskNorthCoastHDI
 
Most Important Data Security Concerns Troubling Enterprises
Most Important Data Security Concerns Troubling EnterprisesMost Important Data Security Concerns Troubling Enterprises
Most Important Data Security Concerns Troubling EnterprisesBryTech INC
 

Similar to Security awareness-checklist 2019 (20)

cyber security.pptx
cyber security.pptxcyber security.pptx
cyber security.pptx
 
Rothke Sia 2006
Rothke   Sia 2006Rothke   Sia 2006
Rothke Sia 2006
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cybersecurity Awareness E-book by Propelled Technologies
Cybersecurity Awareness E-book by Propelled Technologies Cybersecurity Awareness E-book by Propelled Technologies
Cybersecurity Awareness E-book by Propelled Technologies
 
Mobile security
Mobile securityMobile security
Mobile security
 
Security Awareness Training.pptx
Security Awareness Training.pptxSecurity Awareness Training.pptx
Security Awareness Training.pptx
 
7 Types of Cyber Security Threats | The Lifesciences Magazine
7 Types of Cyber Security Threats | The Lifesciences Magazine7 Types of Cyber Security Threats | The Lifesciences Magazine
7 Types of Cyber Security Threats | The Lifesciences Magazine
 
The Emotional Lure of Social Engineering
The Emotional Lure of Social EngineeringThe Emotional Lure of Social Engineering
The Emotional Lure of Social Engineering
 
mobile security.pptx
mobile security.pptxmobile security.pptx
mobile security.pptx
 
Customer information security awareness training
Customer information security awareness trainingCustomer information security awareness training
Customer information security awareness training
 
Building a culture of security
Building a culture of securityBuilding a culture of security
Building a culture of security
 
End user security awareness
End user security awarenessEnd user security awareness
End user security awareness
 
Cyber Privacy & Password Protection
Cyber Privacy & Password ProtectionCyber Privacy & Password Protection
Cyber Privacy & Password Protection
 
Cybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppCybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureApp
 
Cybersecurity tips for employees
Cybersecurity tips for employeesCybersecurity tips for employees
Cybersecurity tips for employees
 
Cybersecurity tips for employees
Cybersecurity tips for employeesCybersecurity tips for employees
Cybersecurity tips for employees
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
 
How to Ensure Complete Data Protection at Work?
How to Ensure Complete Data Protection at Work?How to Ensure Complete Data Protection at Work?
How to Ensure Complete Data Protection at Work?
 
Security and the Service Desk
Security and the Service DeskSecurity and the Service Desk
Security and the Service Desk
 
Most Important Data Security Concerns Troubling Enterprises
Most Important Data Security Concerns Troubling EnterprisesMost Important Data Security Concerns Troubling Enterprises
Most Important Data Security Concerns Troubling Enterprises
 

More from Mustafa Kuğu

Marmara Üniversitesi Mx Yaratıcı Endüstriler Çalıştayı 2024 (1).pdf
Marmara Üniversitesi Mx Yaratıcı Endüstriler Çalıştayı 2024 (1).pdfMarmara Üniversitesi Mx Yaratıcı Endüstriler Çalıştayı 2024 (1).pdf
Marmara Üniversitesi Mx Yaratıcı Endüstriler Çalıştayı 2024 (1).pdfMustafa Kuğu
 
KVKK v.2.0 Güncel Yasa Değişiklikleri Notu.pdf
KVKK v.2.0 Güncel Yasa Değişiklikleri Notu.pdfKVKK v.2.0 Güncel Yasa Değişiklikleri Notu.pdf
KVKK v.2.0 Güncel Yasa Değişiklikleri Notu.pdfMustafa Kuğu
 
PrismCRM-RealEstate-SalesCRM_byCode5Company
PrismCRM-RealEstate-SalesCRM_byCode5CompanyPrismCRM-RealEstate-SalesCRM_byCode5Company
PrismCRM-RealEstate-SalesCRM_byCode5CompanyMustafa Kuğu
 
CenturyDX-IT-Company
CenturyDX-IT-CompanyCenturyDX-IT-Company
CenturyDX-IT-CompanyMustafa Kuğu
 
Dataliva Company Brief 2024
Dataliva Company Brief 2024Dataliva Company Brief 2024
Dataliva Company Brief 2024Mustafa Kuğu
 
Right Consulting Turkiye - Eng.pptx
Right Consulting Turkiye - Eng.pptxRight Consulting Turkiye - Eng.pptx
Right Consulting Turkiye - Eng.pptxMustafa Kuğu
 
Three-S Retail Automation (AcilimSoft Product)
Three-S Retail Automation (AcilimSoft Product)Three-S Retail Automation (AcilimSoft Product)
Three-S Retail Automation (AcilimSoft Product)Mustafa Kuğu
 
Eng Three-S Hq (AcilimSoft Product)
Eng Three-S Hq (AcilimSoft Product)Eng Three-S Hq (AcilimSoft Product)
Eng Three-S Hq (AcilimSoft Product)Mustafa Kuğu
 
Telenity Solutions Brief
Telenity Solutions BriefTelenity Solutions Brief
Telenity Solutions BriefMustafa Kuğu
 
Netmera Presentation.pdf
Netmera Presentation.pdfNetmera Presentation.pdf
Netmera Presentation.pdfMustafa Kuğu
 
NTGapps NTG LowCode Platform
NTGapps NTG LowCode Platform NTGapps NTG LowCode Platform
NTGapps NTG LowCode Platform Mustafa Kuğu
 
NTGapps DTB Platform.pdf
NTGapps DTB Platform.pdfNTGapps DTB Platform.pdf
NTGapps DTB Platform.pdfMustafa Kuğu
 
PRISMCRM_ENG_Real-Estate-CRM
PRISMCRM_ENG_Real-Estate-CRMPRISMCRM_ENG_Real-Estate-CRM
PRISMCRM_ENG_Real-Estate-CRMMustafa Kuğu
 
Inypay Pitch Deck - March 2023-Latest copy 2.pdf
Inypay Pitch Deck - March 2023-Latest copy 2.pdfInypay Pitch Deck - March 2023-Latest copy 2.pdf
Inypay Pitch Deck - March 2023-Latest copy 2.pdfMustafa Kuğu
 
Açık-Kaynak-Kod-Geçiş-Rehberi-2023.pdf
Açık-Kaynak-Kod-Geçiş-Rehberi-2023.pdfAçık-Kaynak-Kod-Geçiş-Rehberi-2023.pdf
Açık-Kaynak-Kod-Geçiş-Rehberi-2023.pdfMustafa Kuğu
 
Startup Business Models
Startup Business ModelsStartup Business Models
Startup Business ModelsMustafa Kuğu
 
Navigating VC Negotiations
Navigating VC NegotiationsNavigating VC Negotiations
Navigating VC NegotiationsMustafa Kuğu
 
Quantum Computing Market Report
Quantum Computing Market ReportQuantum Computing Market Report
Quantum Computing Market ReportMustafa Kuğu
 

More from Mustafa Kuğu (20)

Marmara Üniversitesi Mx Yaratıcı Endüstriler Çalıştayı 2024 (1).pdf
Marmara Üniversitesi Mx Yaratıcı Endüstriler Çalıştayı 2024 (1).pdfMarmara Üniversitesi Mx Yaratıcı Endüstriler Çalıştayı 2024 (1).pdf
Marmara Üniversitesi Mx Yaratıcı Endüstriler Çalıştayı 2024 (1).pdf
 
KVKK v.2.0 Güncel Yasa Değişiklikleri Notu.pdf
KVKK v.2.0 Güncel Yasa Değişiklikleri Notu.pdfKVKK v.2.0 Güncel Yasa Değişiklikleri Notu.pdf
KVKK v.2.0 Güncel Yasa Değişiklikleri Notu.pdf
 
PrismCRM-RealEstate-SalesCRM_byCode5Company
PrismCRM-RealEstate-SalesCRM_byCode5CompanyPrismCRM-RealEstate-SalesCRM_byCode5Company
PrismCRM-RealEstate-SalesCRM_byCode5Company
 
KVKK-Kararlar.pdf
KVKK-Kararlar.pdfKVKK-Kararlar.pdf
KVKK-Kararlar.pdf
 
CenturyDX-IT-Company
CenturyDX-IT-CompanyCenturyDX-IT-Company
CenturyDX-IT-Company
 
Dataliva Company Brief 2024
Dataliva Company Brief 2024Dataliva Company Brief 2024
Dataliva Company Brief 2024
 
Right Consulting Turkiye - Eng.pptx
Right Consulting Turkiye - Eng.pptxRight Consulting Turkiye - Eng.pptx
Right Consulting Turkiye - Eng.pptx
 
Three-S Retail Automation (AcilimSoft Product)
Three-S Retail Automation (AcilimSoft Product)Three-S Retail Automation (AcilimSoft Product)
Three-S Retail Automation (AcilimSoft Product)
 
Eng Three-S Hq (AcilimSoft Product)
Eng Three-S Hq (AcilimSoft Product)Eng Three-S Hq (AcilimSoft Product)
Eng Three-S Hq (AcilimSoft Product)
 
Telenity Solutions Brief
Telenity Solutions BriefTelenity Solutions Brief
Telenity Solutions Brief
 
Netmera Presentation.pdf
Netmera Presentation.pdfNetmera Presentation.pdf
Netmera Presentation.pdf
 
NTGapps NTG LowCode Platform
NTGapps NTG LowCode Platform NTGapps NTG LowCode Platform
NTGapps NTG LowCode Platform
 
NTGapps DTB Platform.pdf
NTGapps DTB Platform.pdfNTGapps DTB Platform.pdf
NTGapps DTB Platform.pdf
 
PRISMCRM_ENG_Real-Estate-CRM
PRISMCRM_ENG_Real-Estate-CRMPRISMCRM_ENG_Real-Estate-CRM
PRISMCRM_ENG_Real-Estate-CRM
 
Inypay Pitch Deck - March 2023-Latest copy 2.pdf
Inypay Pitch Deck - March 2023-Latest copy 2.pdfInypay Pitch Deck - March 2023-Latest copy 2.pdf
Inypay Pitch Deck - March 2023-Latest copy 2.pdf
 
Açık-Kaynak-Kod-Geçiş-Rehberi-2023.pdf
Açık-Kaynak-Kod-Geçiş-Rehberi-2023.pdfAçık-Kaynak-Kod-Geçiş-Rehberi-2023.pdf
Açık-Kaynak-Kod-Geçiş-Rehberi-2023.pdf
 
Startup Business Models
Startup Business ModelsStartup Business Models
Startup Business Models
 
Navigating VC Negotiations
Navigating VC NegotiationsNavigating VC Negotiations
Navigating VC Negotiations
 
Quantum Computing Market Report
Quantum Computing Market ReportQuantum Computing Market Report
Quantum Computing Market Report
 
Product Metrics
Product MetricsProduct Metrics
Product Metrics
 

Recently uploaded

Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 

Recently uploaded (20)

Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 

Security awareness-checklist 2019

  • 1. Security awareness training The 2019 The Essential Cyber Security Checklist
  • 2. The protection of confidential information is vital for every organization. The purpose of security awareness training is to develop competence and company culture that saves money and creates a human firewall guarding against an ever increasing threat of rep- utational and actual damage and data loss. This is a list of the most common security threats that your employees need to be aware of. There are of course more threats out there. This is just a starting point with the most common ones that should be the foundation of your training efforts. Awareness raising must be interesting enough to get people’s atten- tion and short enough to be remembered. Security awareness is a compliance issue and is needed to accomdate standards such as ISO27001, PCI-DSS and many country or state laws. Security awareness is an essential part of employee training and is the most effective way to keep companies safe from intruders and hacks. We hope this list helps to identify at least some of the threats that are around today. Common Security Risks
  • 3. Essentials A modern company needs informed employees who have a basic understanding of where security risks lie Internet Safe browsing and understanding http or https, phishing sites, and common threats on the web Working from home using a laptop or even a phone can cause a security risk if the employee is not aware of the risks Out of Office Privacy With increased regulations to guard personally identifiable information, mistakes can be very expensive Email An understanding of phishing, malicious attachments and when it is proper to use email and when not At the Office Handling confidential content, printed or digital. Disposing of it correctly and not leaving it laying around are all risks Social Awareness Understanding where the risks are and how social engineering works is essential to securing access to a workplace and data Mobile Mobile phones today are mini computers that can hold valuable information
  • 4. A data leak is the intentional or unintentional release of secure or private/ confidential information to an untrusted environment. Failure to report a leak can have severe consequences for the individual and lead to hefty fines for the company. Data Leaks Ransomware is malware or a virus that encrypts the data on your computer or in some cases your whole network. You cannot access your files or pictures until you pay the ransom, or sometimes not even then. Ransomware Documents, memos, email, and contacts can be stolen if you leave your phone unlocked. It is important to guard the information. Always keep your phone locked when you’re not using it. Phone Locking Vishing is the telephone equivalent of phishing. It is described as the act of using the telephone in an attempt to scam the user into surrendering private information that will be used for identity theft. Vishing Essentials Privacy Essentials Internet Essentials Mobile Mobile Social
  • 5. Leaving your computer unlocked and unattended can cause serious problems if someone else has access to it. Unattended Computer Managing multiple passwords can be hard, but it is essential to have different passwords for different sensitive accounts. Same Password Email is still an important communication tool for business organizations. Attachments represent a potential security risk. They can contain malicious content, open other dangerous files, or launch applications, etc. Malicious Attachments Removable media is a common way to move larger amounts of data. The risks are numerous, including data loss, malware threats and misplacement resulting in reputational damage. Removable Media Essentials Internet Mobile Out of office Privacy
  • 6. A USB key drop is when a hacker leaves a USB stick on the ground or in an open space, hoping that someone will plug it into their computer, giving access to their computer and all files they have access to on the network. USB Key Drop Social engineering is the use of a deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes often tricking people into breaking normal security procedures. Social Engineering Dumpster diving is a technique to retrieve sensitive information that could be used to access a computer network. It isn’t limited to searching through the trash for documents. Dumpster Diving Spyware and malware are types of software that enables a hacker to obtain covert information about another’s computer activities by transmitting data from the computer or Spyware Out of Office Social Awareness Essentials Email Internet
  • 7. A chain mail attempts to convince the recipient to pass it on to others. The risk is that email addresses will be distributed to a malicious person, and the email can include links to malware. Chain Mail The CEO scam is when a hacker impersonates executives and tricks employees into sending sensitive information. This includes using social engineering to manipulate people and their actions. CEO Scam Maintaining a clean desk includes not leaving sensitive documents on the desk, not writing passwords on sticky notes, cleaning sensitive information off a white board, and not leaving an access card where it might be stolen. Clean Desk Keep software up to date to defend against serious issues. Viruses, spyware, and other malware rely on unpatched and outdated software. Computer Installs At the Office Email Social Awareness Internet At the Office Social Awareness At the Office Internet
  • 8. Choosing a good password is necessary. Choose one that has at least 8-10 characters and use at least one number, one uppercase letter, one lowercase letter, and one special symbol. Do not use any words that are in the dictionary. Password Choosing a good password is just a start. Use different passwords for different accounts and don’t leave the password where it can be found. Don’t send credentials by email or store them in an unsecure location. Password Handling Printing documents and leaving them in the printer can give unauthorized persons access to confidential data. Printouts Private media is often not regulated and sometimes unsecure. Understanding the ways a hacker might gain access to unauthorized data is important. Confidential Material Essentials Essentials Essentials At the Office
  • 9. Tailgating, sometimes called piggybacking, is a physical security breach where an unauthorized person follows an authorized one into a secure location. Tailgating Phishing is the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers. Phishing Hypertext Transfer Protocol Secure (HTTPS) is a variant of the standard web transfer protocol (HTTP) that adds a layer of security to the data in transit. HTTPS Spear Phishing is the practice of studying individuals and their habits, and then using that information to send specific emails from a known or trusted sender’s address in order to obtain confidential information. Spear Phising Essentials Email Social Awareness Essentials Email Social Awareness
  • 10. Shoulder surfing is a type of social engineering technique used to obtain information such as personal identification numbers, passwords, and other confidential data by looking over the victim’s shoulder. Shoulder Surfing People usually use free WiFi without thinking. One of the most common open WiFi attacks is called a Man-in-the-Middle (MitM) attack, where a hacker can monitor all traffic and get sensitive information. Free WiFi Home networks are often set up in a rush to get connectivity ready as soon as possible. Most people do not take any steps to secure their home network, making them vulnerable to hackers. Home WiFi A keylogger is a piece of malicious software or hardware (a small device connected to the computer keyboard) that records every key- stroke you make on a keyboard. Keylogger Out of Office Internet At the Office Out of office Internet
  • 11. This simple list is hopefully helpful for security personnel or data protection officers in defending against cyber criminals and finding potential security risks. We try to update this list with new content as often as possible. If you feel that anything is missing. Please let us know at awarego@awarego.com. We think of security awareness as a marketing campaign instead of a training effort, and it should be enjoyable. About the List Ragnar experienced first hand the challenges orga- nizations face when training employees on proper security measures. He saw employees doze off and lose complete interest during security awareness training. That is why he started AwareGO in 2007: there had to be a better way to bring the security message to the masses and make workplaces safer. Ragnar Sigurdsson Ethical Hacker, CISSP At AwareGO we use marketing principles and humor to urge employees to become more aware and com- pliant within today’s volatile organizations. AwareGO follows what is happening in security today and pro- vides organizations of all sizes with the tools they need to train their employees to keep sensitive data safe and secure. AwareGO Security Awareness and Compliance
  • 12. Phone +354 899 4370 Email awarego@awarego.com Address AwareGO, Borgartun 27, 105 Reykjavik Iceland Get In Touch