Users Awareness
of
Cyber Security
Nice to Meet You!
Name: Kazi Sarwar Hossain Sagar
Manager-End Point Security Specialist
Dhaka Distributions
e-mail : kazi@dhakadistributions.com
Cell : +88-01711-488-097
+88-01705-405-998
Web : https://www.dhakadistributions.com
LinkedIn : https://www.linkedin.com/in/kazi-sagar/
Blog : http://kazisagar.blogspot.com/
Personal Web : http://kazisagar.com
What is the Objectives?
The objective of this programme is to educate and create
awareness amongst the people/employee of
organization on use of Technology, Internet Media and
its implications on possible Cyber Threat.
Some of the possible preventive measures, one can
avoid getting victimized for his/her personal as well as
organizational community.
Why this KnowledgeSharing Session?
• Information Security
• Educating Staff
• Awareness Building
• Protecting Information/Data
• Privacy Protection
• Saving
• Overall Knowledge Sharing
• Keep Safe and Help others to
be Safe.
• For You
• For your Organization.
For Whom?
For What?
• For your Safety
• For your Organization Safety.
Our Life:
When
technology is
integrating into
human life then
#cybersecurity
is just logical
consequences…
What is CyberCrime & Security/Online
Security:
Cyber Crime is a generic term that refers to all criminal
activities done using the medium of computers, the
internet, cyber space and the worldwide Web.
Cyber Security means protecting (Personal/Official)
Information, Equipment's, Devices, Computers,
Computer Resources, Communication Devices and
information stored therein from unauthorized access,
Use, Discloser, Disruption, Modification & Destructions.
Spreading Malware/Virus
• Computer viruses are small Malicious software known as Malware
programs are designed to spread from one computer to another computer
or one network to another network and perform harmful activities.
There are multiple ways can spread Malware:
* Email Messages
* Infected or Vulnerable Website
* Instant Messaging
* Network Protocols
* Open Share Machine
* By Device
Cyber Crime
Motivation:
• Money
• Curiosity
• Revenge
• Fun
• Praise Seeker
Cyber Crime Awareness
for People:
• Curiosity or revenge may be the
primary reasons for a people to get
motivated for a cyber crime.
• Most of the times, peoples are not
aware about the implications of
cyber crime.
• Girls are the most found victims of a
cyber crime.
Cyber Threat upward Trends:
• Huge increase in the use of internet & Smart Phone Usages.
• Individual Share personal and work-related information on internet.
• Critical & Sensitive information are shared on internet.
• Financial transactions take place on internet.
• Security controls are never 100% adequate.
• Bad Guys are always smarter than Good Guys.
Some KnownMalware/Virus:
• Adware
• Spyware
• Grayware
• DDos
• Exploit
• Trozan
• Worm
• Virus
•Key Logger
•Man in the Middle
•Phishing
•Rootkit
•Exploit
•Trojan Horse
•Spammer
•Spoofer
And many more
generating every
minute somewhere in
the world….
##Ransomware
or
Crypto locker
You Can Makethe Difference…
Possibleway of Threat:
• Through USB
• Through SPAM
• Through SPIM
• Through Network
• Through Social Media
• Through Smart Phone
• Through Internet
• Through Advertisement
• Through Online Games
• Social Media Games
• Entering in Open Network
(WIFI)
And many more way…
What should you do?
• Keep Personal Information Professional and Limited
• Keep Your Privacy Settings On
• Practice Safe Browsing
• Make Sure Your Internet Connection is Secure
• Beware before click on something.
• Be Careful What You Download
• Choose Strong Passwords
• Make Online Purchases From Secure Sites
• Be Careful What You Post
• Be Careful Who You Meet Online
• User authorized software/App
• Keep Your Malware Protection/Security Program Up To Date
10 Tips To Stay Safe Online…
•Create Complex Passwords.
•Boost Your Network Security.
•Use a Firewall.
•Click Smart.
•Be a Selective Sharer.
•Protect Your Mobile Life.
•Practice Safe Surfing &
Shopping.
•Keep up to date of security
•Look out the latest scams
•Keep your guard up.
Security Awareness- Desktop& Laptop
• Ensure your Antivirus is updated and scans are configured
for a routine check
• Implement personal firewall
• Keep your Operating system updated with latest patches
• Avoid installing cracked software's
• Keep OS files and personal files in different HDD partition
• Factory Restore is the best option to clean your system
SecurityAwareness-
• Connect to ONLY authorized Wi-Fi access
• Use auto lock features
• Download apps from authorized app stores ONLY
• Use Privacy options provided by various mobile
Operating system
• Do NOT accept calls from weird numbers OR do not
give a call back
• Use License Security software.
Device(Smart Phone& Tab)
Security Awareness- Social Media
• Social Media (FB, LinkedIn,Twitter etc) is now an integral
part of our daily life
• Be sensitive in what you upload on your social networking
account (status, pics, etc)
• Use security and privacy options provided by social media
sites
• Use SMS based Two Factor Authentication
• Access control (who can see what)
• Block
• Keep your personal details, personal.
Security Awareness-PASSWORDS
• Passwords are the only and/or the primary option to ensure privacy of your
information
• Ensure Passwords are complex in nature
• Not as complex that you tend to forget it
• Include combination of upper & lower case, special charecter and numbers
• Not easy for others to guess (like your pet name, etc)
• Sensitive passwords should be changed frequently
• Do not write passwords
• Be extra careful of your passwords when using shared machines (like cyber
café)
• Avoid sharing your passwords to anyone
Password Example:
Example: Kazi.sagar%12
Alphabet(Uppercase) + Alphabet(Lowercase) + special
character + numeric
Security Awareness- Internet
• Internet use is a two-edge sword. Be SMART on using
Internet
• NEVER visit untrustedwebsites
• NEVER user referral links to visit a website. Instead type in
the URL address in the browser
• Always downloadsoftware from authorized / Trusted
sources
• Use Browser addons to get protected from known BAD sites
• Do Not Connect to unknown or unprotected wi-fi zones
• Ensure no one is shoulder surfing your key strokes
Attention: Management People
• Do not compromise with quality about security compliance issue.
• Please come out “Money is wasting by Investing in IT infrastructure &
Cyber Security” perception.
• Try to educated yourself what is new in technology and how to
benefited your company by implementing. Its easy coz you have
GOOGLE & YOUTUBE.
• Use full backup systems.
Attention: HR Dept.
• Please arrange different types of IT & Cyber Security
Training/Courses for IT Department.
Attention: IT Department
• Constant training for enrich your knowledge. Come out from “I know everything”
mentality.
• Do not be brand biased or only listen to the opposite side of table people, do PoC
then choose.
• Cross check the background of from whom/what company providing the
solutions.
• At least once in a month please arrange a thought sharing session with employee
and top management.
• Please implement constantmonitoring system office network.
• Please use dedicated Firewall Systems,Web Security, Email Security, Cloud and
offline backup solutions instead of consulted security systems.
• Do not compromise quality by saving money, sit with top management and have
an open discussion about end to end solution.
• Last but not the least, use the offline backup along with cloud backup systems.
Such Barracuda, Acronis etc.
Attention: Management
• Do not think about only tangible ROI always.There is some intangible ROI
exists also. Some ROI runs in background that you can not see but feel its
existence.
• At least once in quarter have meeting with IT People.
• Secure your business by secure your Network.
• Try to find out what’s in international trend. (Seek help from
google/YouTube)
• Do not compromise quality by saving money. Please come out from “Cheap
Solutions/That’s It/Run the Job/It did not take that long” Mentality.
• Prepare and allocate yearly budget for IT Department as you did for other
department coz its as important as other dept. Example: Sales and
Marketing Dept.
• Last but not the least, Business is yours. You build it by hard working and
dedications of years long. Secure your business with same efforts.
Remember...
So Who
Can
Prevent
This?
Ans. is you…
Because…
So….Please…
•Any
Thank
You…
WithRegards
Kazi Sarwar Hossain Sagar

Users awarness programme for Online Privacy

  • 1.
  • 2.
    Nice to MeetYou! Name: Kazi Sarwar Hossain Sagar Manager-End Point Security Specialist Dhaka Distributions e-mail : kazi@dhakadistributions.com Cell : +88-01711-488-097 +88-01705-405-998 Web : https://www.dhakadistributions.com LinkedIn : https://www.linkedin.com/in/kazi-sagar/ Blog : http://kazisagar.blogspot.com/ Personal Web : http://kazisagar.com
  • 3.
    What is theObjectives? The objective of this programme is to educate and create awareness amongst the people/employee of organization on use of Technology, Internet Media and its implications on possible Cyber Threat. Some of the possible preventive measures, one can avoid getting victimized for his/her personal as well as organizational community.
  • 4.
    Why this KnowledgeSharingSession? • Information Security • Educating Staff • Awareness Building • Protecting Information/Data • Privacy Protection • Saving • Overall Knowledge Sharing • Keep Safe and Help others to be Safe.
  • 5.
    • For You •For your Organization. For Whom? For What? • For your Safety • For your Organization Safety.
  • 6.
  • 7.
    When technology is integrating into humanlife then #cybersecurity is just logical consequences…
  • 8.
    What is CyberCrime& Security/Online Security: Cyber Crime is a generic term that refers to all criminal activities done using the medium of computers, the internet, cyber space and the worldwide Web. Cyber Security means protecting (Personal/Official) Information, Equipment's, Devices, Computers, Computer Resources, Communication Devices and information stored therein from unauthorized access, Use, Discloser, Disruption, Modification & Destructions.
  • 9.
    Spreading Malware/Virus • Computerviruses are small Malicious software known as Malware programs are designed to spread from one computer to another computer or one network to another network and perform harmful activities. There are multiple ways can spread Malware: * Email Messages * Infected or Vulnerable Website * Instant Messaging * Network Protocols * Open Share Machine * By Device
  • 10.
    Cyber Crime Motivation: • Money •Curiosity • Revenge • Fun • Praise Seeker Cyber Crime Awareness for People: • Curiosity or revenge may be the primary reasons for a people to get motivated for a cyber crime. • Most of the times, peoples are not aware about the implications of cyber crime. • Girls are the most found victims of a cyber crime.
  • 11.
    Cyber Threat upwardTrends: • Huge increase in the use of internet & Smart Phone Usages. • Individual Share personal and work-related information on internet. • Critical & Sensitive information are shared on internet. • Financial transactions take place on internet. • Security controls are never 100% adequate. • Bad Guys are always smarter than Good Guys.
  • 12.
    Some KnownMalware/Virus: • Adware •Spyware • Grayware • DDos • Exploit • Trozan • Worm • Virus •Key Logger •Man in the Middle •Phishing •Rootkit •Exploit •Trojan Horse •Spammer •Spoofer And many more generating every minute somewhere in the world…. ##Ransomware or Crypto locker
  • 13.
    You Can MaketheDifference…
  • 14.
    Possibleway of Threat: •Through USB • Through SPAM • Through SPIM • Through Network • Through Social Media • Through Smart Phone • Through Internet • Through Advertisement • Through Online Games • Social Media Games • Entering in Open Network (WIFI) And many more way…
  • 15.
    What should youdo? • Keep Personal Information Professional and Limited • Keep Your Privacy Settings On • Practice Safe Browsing • Make Sure Your Internet Connection is Secure • Beware before click on something. • Be Careful What You Download • Choose Strong Passwords • Make Online Purchases From Secure Sites • Be Careful What You Post • Be Careful Who You Meet Online • User authorized software/App • Keep Your Malware Protection/Security Program Up To Date
  • 16.
    10 Tips ToStay Safe Online… •Create Complex Passwords. •Boost Your Network Security. •Use a Firewall. •Click Smart. •Be a Selective Sharer. •Protect Your Mobile Life. •Practice Safe Surfing & Shopping. •Keep up to date of security •Look out the latest scams •Keep your guard up.
  • 17.
    Security Awareness- Desktop&Laptop • Ensure your Antivirus is updated and scans are configured for a routine check • Implement personal firewall • Keep your Operating system updated with latest patches • Avoid installing cracked software's • Keep OS files and personal files in different HDD partition • Factory Restore is the best option to clean your system
  • 18.
    SecurityAwareness- • Connect toONLY authorized Wi-Fi access • Use auto lock features • Download apps from authorized app stores ONLY • Use Privacy options provided by various mobile Operating system • Do NOT accept calls from weird numbers OR do not give a call back • Use License Security software. Device(Smart Phone& Tab)
  • 19.
    Security Awareness- SocialMedia • Social Media (FB, LinkedIn,Twitter etc) is now an integral part of our daily life • Be sensitive in what you upload on your social networking account (status, pics, etc) • Use security and privacy options provided by social media sites • Use SMS based Two Factor Authentication • Access control (who can see what) • Block • Keep your personal details, personal.
  • 20.
    Security Awareness-PASSWORDS • Passwordsare the only and/or the primary option to ensure privacy of your information • Ensure Passwords are complex in nature • Not as complex that you tend to forget it • Include combination of upper & lower case, special charecter and numbers • Not easy for others to guess (like your pet name, etc) • Sensitive passwords should be changed frequently • Do not write passwords • Be extra careful of your passwords when using shared machines (like cyber café) • Avoid sharing your passwords to anyone
  • 21.
    Password Example: Example: Kazi.sagar%12 Alphabet(Uppercase)+ Alphabet(Lowercase) + special character + numeric
  • 22.
    Security Awareness- Internet •Internet use is a two-edge sword. Be SMART on using Internet • NEVER visit untrustedwebsites • NEVER user referral links to visit a website. Instead type in the URL address in the browser • Always downloadsoftware from authorized / Trusted sources • Use Browser addons to get protected from known BAD sites • Do Not Connect to unknown or unprotected wi-fi zones • Ensure no one is shoulder surfing your key strokes
  • 23.
    Attention: Management People •Do not compromise with quality about security compliance issue. • Please come out “Money is wasting by Investing in IT infrastructure & Cyber Security” perception. • Try to educated yourself what is new in technology and how to benefited your company by implementing. Its easy coz you have GOOGLE & YOUTUBE. • Use full backup systems. Attention: HR Dept. • Please arrange different types of IT & Cyber Security Training/Courses for IT Department.
  • 24.
    Attention: IT Department •Constant training for enrich your knowledge. Come out from “I know everything” mentality. • Do not be brand biased or only listen to the opposite side of table people, do PoC then choose. • Cross check the background of from whom/what company providing the solutions. • At least once in a month please arrange a thought sharing session with employee and top management. • Please implement constantmonitoring system office network. • Please use dedicated Firewall Systems,Web Security, Email Security, Cloud and offline backup solutions instead of consulted security systems. • Do not compromise quality by saving money, sit with top management and have an open discussion about end to end solution. • Last but not the least, use the offline backup along with cloud backup systems. Such Barracuda, Acronis etc.
  • 25.
    Attention: Management • Donot think about only tangible ROI always.There is some intangible ROI exists also. Some ROI runs in background that you can not see but feel its existence. • At least once in quarter have meeting with IT People. • Secure your business by secure your Network. • Try to find out what’s in international trend. (Seek help from google/YouTube) • Do not compromise quality by saving money. Please come out from “Cheap Solutions/That’s It/Run the Job/It did not take that long” Mentality. • Prepare and allocate yearly budget for IT Department as you did for other department coz its as important as other dept. Example: Sales and Marketing Dept. • Last but not the least, Business is yours. You build it by hard working and dedications of years long. Secure your business with same efforts.
  • 27.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.