SlideShare a Scribd company logo
CYBERSECURITY AWARENESS
MONTH 2023
HOW TO STAY SAFE ONLINE
October is
Cybersecurity
Awareness Month
Topic: CYBERSECURITY IS A SHARED RESPONSIBILITY
In today's interconnected world, protecting ourselves
from cyber threats is no longer an individual
responsibility. It's a shared duty that requires
collaboration and awareness.
What is Cybersecurity?
▪ Defined as "the protection of computer systems and
networks from attacks by malicious actors that may
result in unauthorized information disclosure, theft
of, or damage to hardware, software, or data..."
▪ Wherever there is technology, there needs to be
cybersecurity.
Why is it Important?
▪ Implementing cybersecurity best practices is important
for individuals as well as organizations of all sizes to
protect personal, financial and sensitive information.
▪ For both government and private entities, developing
and implementing tailored cybersecurity plans and
processes is key to protecting and maintaining
business operations.
Feelings Toward Cybersecurity
▪ 78% of people consider staying secure online a priority
▪ 34% noted they often feel overwhelmed by information and, as a result,
minimize their online actions
▪ 46% felt frustrated while staying secure online
▪ 39% of users trying to keep safe felt information on how to stay secure online
is confusing
Findings from Oh Behave! The Annual Cybersecurity Attitudes and Behaviors Report 2022
Our Online Behaviors
▪ Only 33% of individuals create unique passwords for all accounts
▪ Only 18% of individuals have downloaded a password manager
▪ 43% of respondents have never heard of multifactor authentication (MFA)
▪ Out of the 57% of the participants who had heard about it:
▪ 79% applied it at least once and 94% of them reporting that they were still using MFA
▪ 92% of respondents took action after a security training
▪ 58% say they are better at recognizing phishing
▪ 45% started using strong and unique passwords
▪ 40% started using MFA
▪ 40% started regularly installing software updates
Findings from Oh Behave! The Annual Cybersecurity Attitudes and Behaviors Report 2022
4 Easy Ways to Stay Safe Online
Use Strong Passwords and a Password Manager
Turn on Multifactor Authentication
Recognize and Report Phishing Attacks​
Update Your Software​
Use Strong Passwords
CREATE STRONG PASSWORDS: • Long
• At least 16 characters
• Unique
• NEVER reuse passwords
• Complex
• Upper- and lower-case letters
• Numbers
• Special characters
• Spaces
Use a Password Manager
WHY USE A PASSWORD MANAGER?
• Stores your passwords
• Alerts you of duplicate passwords
• Generates strong new passwords
• Some automatically fill your login credentials
into website to make sign-in easy
Encryption ensures that password managers
never "know" what your passwords are,
keeping them safe from cyber attacks.
Turn on Multifactor Authentication
WHAT IS IT?
• A code sent to your phone or email
• An authenticator app
• A security key
• Biometrics
Fingerprint
Facial recognition
Turn on Multifactor Authentication
WHERE SHOULD YOU USE MFA?
• Email
• Accounts with financial information
Ex: Online store
• Accounts with personal information
Ex: Social media
Recognize and Report Phishing
PHISHING RED FLAGS:
• A tone that’s urgent or makes you scared
"Click this link immediately or your account will
be closed"
• Bad spellings, bad grammar
• Requests to send personal info
• Sender email address doesn’t match the
company it’s coming from
Ex: safetycomm.org vs. safetyc0mm.org
• An email you weren't expecting
Recognize and Report Phishing
WHAT TO DO
Do NOT
• Don't click any links
• Don't click any attachments
• Don't send personal info
Do
• Verify
• Contact that person directly if it's
someone you know
• Report it to your IT department
• DELETE IT
Update Your Software
WHY?
• Updates ensure your devices and
apps are protected from the latest
threats
• Don't click "remind me later", it could
leave you vulnerable to cyber threats
• Automatic updates are the easiest
way to stay secure
Update Your Software
WHERE TO FIND AVAILABLE UPDATES
• Check for notifications to your phone
or computer
• Look in your phone, browser or app
settings
• Check the upper corner of your
browser for any alerts
Ways to Get Involved
AT WORK
▪ Publicize resources and activities
▪ Intranet
▪ Website
▪ Emails to employees/customers
▪ Promotions
▪ Discounts
▪ Giveaways
▪ Hold a contest
▪ Phishing simulation
▪ Poster contest
AT HOME
▪ Share helpful tips and resources
▪ Kids
▪ Parents
▪ Friends
▪ Hold a family “tech talk”
▪ Discuss how each family member
can protect their devices, accounts,
and personal information.
▪ Create a culture of security in your
family
Ways to Get Involved Cont.
IN YOUR COMMUNITY
▪ Volunteer to teach others in your
community
▪ Reach out to
▪ Your kid's school
▪ Community center
▪ Senior center
▪ Place of worship
ONLINE
▪ Join on the conversation
on social media using
▪ #CybersecurityAwarenessMonth
▪ #SecureOurWorld
Building a Strong Cybersecurity Culture
▪ Use basic cybersecurity training. This helps familiarize staff with cybersecurity
concepts and activities associated with implementing cybersecurity best practices.
▪ Identify available cybersecurity training resources. Cybersecurity training
resources—on topics like phishing and good email practices—are available through
professional association, educational institutions, as well as private sector and
government sources.
▪ Stay current on cybersecurity events and incidents. This helps identify lessons
learned and helps to maintain vigilance and agility to cybersecurity trends.
▪ Encourage employees to make good choices online and learn about risks like
phishing and business email compromise.
THE END
Thank you

More Related Content

What's hot

End User Security Awareness Presentation
End User Security Awareness PresentationEnd User Security Awareness Presentation
End User Security Awareness Presentation
Cristian Mihai
 
New Hire Information Security Awareness
New Hire Information Security AwarenessNew Hire Information Security Awareness
New Hire Information Security Awareness
hubbargf
 
Information Security Awareness Training Open
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training OpenFred Beck MBA, CPA
 
IT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.ppt
OoXair
 
14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness
Michel Bitter
 
Customer information security awareness training
Customer information security awareness trainingCustomer information security awareness training
Customer information security awareness training
AbdalrhmanTHassan
 
Cybersecurity Awareness Training
Cybersecurity Awareness TrainingCybersecurity Awareness Training
Cybersecurity Awareness Training
Dave Monahan
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101
mateenzero
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
Daniel P Wallace
 
Social engineering hacking attack
Social engineering hacking attackSocial engineering hacking attack
Social engineering hacking attack
Pankaj Dubey
 
Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...
Edureka!
 
End-User Security Awareness
End-User Security AwarenessEnd-User Security Awareness
End-User Security Awareness
Surya Bathulapalli
 
Security Awareness Training.pptx
Security Awareness Training.pptxSecurity Awareness Training.pptx
Security Awareness Training.pptx
MohammedYaseen638128
 
Building An Information Security Awareness Program
Building An Information Security Awareness ProgramBuilding An Information Security Awareness Program
Building An Information Security Awareness Program
Bill Gardner
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
TriCorps Technologies
 
Security awareness
Security awarenessSecurity awareness
Security awareness
Josh Chandler
 
Social Engineering new.pptx
Social Engineering new.pptxSocial Engineering new.pptx
Social Engineering new.pptx
Santhosh Prabhu
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness Training
Jen Ruhman
 
Security Awareness & Training
Security Awareness & TrainingSecurity Awareness & Training
Security Awareness & Training
novemberchild
 

What's hot (20)

End User Security Awareness Presentation
End User Security Awareness PresentationEnd User Security Awareness Presentation
End User Security Awareness Presentation
 
New Hire Information Security Awareness
New Hire Information Security AwarenessNew Hire Information Security Awareness
New Hire Information Security Awareness
 
Information Security Awareness Training Open
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training Open
 
IT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.ppt
 
14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness
 
Customer information security awareness training
Customer information security awareness trainingCustomer information security awareness training
Customer information security awareness training
 
Cybersecurity Awareness Training
Cybersecurity Awareness TrainingCybersecurity Awareness Training
Cybersecurity Awareness Training
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Social engineering hacking attack
Social engineering hacking attackSocial engineering hacking attack
Social engineering hacking attack
 
Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...
 
End-User Security Awareness
End-User Security AwarenessEnd-User Security Awareness
End-User Security Awareness
 
Security Awareness Training.pptx
Security Awareness Training.pptxSecurity Awareness Training.pptx
Security Awareness Training.pptx
 
Building An Information Security Awareness Program
Building An Information Security Awareness ProgramBuilding An Information Security Awareness Program
Building An Information Security Awareness Program
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
 
Security awareness
Security awarenessSecurity awareness
Security awareness
 
Social Engineering new.pptx
Social Engineering new.pptxSocial Engineering new.pptx
Social Engineering new.pptx
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness Training
 
Security Awareness & Training
Security Awareness & TrainingSecurity Awareness & Training
Security Awareness & Training
 
Security Awareness Training by Fortinet
Security Awareness Training by FortinetSecurity Awareness Training by Fortinet
Security Awareness Training by Fortinet
 

Similar to Webinar_Cybersecurity is a shared responsibility presentation

Executive Directors Chat:It's easy to stay safe online.pdf
Executive Directors Chat:It's easy to stay safe online.pdfExecutive Directors Chat:It's easy to stay safe online.pdf
Executive Directors Chat:It's easy to stay safe online.pdf
TechSoup
 
Users awarness programme for Online Privacy
Users awarness programme for Online PrivacyUsers awarness programme for Online Privacy
Users awarness programme for Online Privacy
Kazi Sarwar Hossain
 
Unveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity postureUnveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity posture
Lourdes Paloma Gimenez
 
Cybersecurity awareness.pdf
Cybersecurity awareness.pdfCybersecurity awareness.pdf
Cybersecurity awareness.pdf
CRO Cyber Rights Organization
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Mohan Robert
 
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptxCYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
BarakaMuyengi
 
5 Security Tips to Protect Your Login Credentials and More
5 Security Tips to Protect Your Login Credentials and More5 Security Tips to Protect Your Login Credentials and More
5 Security Tips to Protect Your Login Credentials and More
Community IT Innovators
 
cybersecurity.pptx
cybersecurity.pptxcybersecurity.pptx
cybersecurity.pptx
xanparker
 
Masterclass_ Cybersecurity and Data Privacy Basics
Masterclass_ Cybersecurity and Data Privacy BasicsMasterclass_ Cybersecurity and Data Privacy Basics
Masterclass_ Cybersecurity and Data Privacy Basics
Excellence Foundation for South Sudan
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptx
CharithraaAR
 
Secure End User
Secure End UserSecure End User
Secure End User
Muhammad Salahuddien
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
Rayane Hazimeh
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital Age
Marian Merritt
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
Rayane Hazimeh
 
Digital Security and Hygiene.pptx
Digital Security and Hygiene.pptxDigital Security and Hygiene.pptx
Digital Security and Hygiene.pptx
Ultimate Multimedia Consult
 
Cybersecurity Awareness E-book by Propelled Technologies
Cybersecurity Awareness E-book by Propelled Technologies Cybersecurity Awareness E-book by Propelled Technologies
Cybersecurity Awareness E-book by Propelled Technologies
Anwar CHFI, SSCP, ITIL
 
Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things
The Center for Identity
 
Cyber security
Cyber securityCyber security
Cyber security
Sannith Reddy
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02amiinaaa
 
What is Cybercrime and How to Prevent Cybercrime?
What is Cybercrime and How to Prevent Cybercrime?What is Cybercrime and How to Prevent Cybercrime?
What is Cybercrime and How to Prevent Cybercrime?
Entrance Exam Info
 

Similar to Webinar_Cybersecurity is a shared responsibility presentation (20)

Executive Directors Chat:It's easy to stay safe online.pdf
Executive Directors Chat:It's easy to stay safe online.pdfExecutive Directors Chat:It's easy to stay safe online.pdf
Executive Directors Chat:It's easy to stay safe online.pdf
 
Users awarness programme for Online Privacy
Users awarness programme for Online PrivacyUsers awarness programme for Online Privacy
Users awarness programme for Online Privacy
 
Unveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity postureUnveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity posture
 
Cybersecurity awareness.pdf
Cybersecurity awareness.pdfCybersecurity awareness.pdf
Cybersecurity awareness.pdf
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptxCYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
 
5 Security Tips to Protect Your Login Credentials and More
5 Security Tips to Protect Your Login Credentials and More5 Security Tips to Protect Your Login Credentials and More
5 Security Tips to Protect Your Login Credentials and More
 
cybersecurity.pptx
cybersecurity.pptxcybersecurity.pptx
cybersecurity.pptx
 
Masterclass_ Cybersecurity and Data Privacy Basics
Masterclass_ Cybersecurity and Data Privacy BasicsMasterclass_ Cybersecurity and Data Privacy Basics
Masterclass_ Cybersecurity and Data Privacy Basics
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptx
 
Secure End User
Secure End UserSecure End User
Secure End User
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital Age
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Digital Security and Hygiene.pptx
Digital Security and Hygiene.pptxDigital Security and Hygiene.pptx
Digital Security and Hygiene.pptx
 
Cybersecurity Awareness E-book by Propelled Technologies
Cybersecurity Awareness E-book by Propelled Technologies Cybersecurity Awareness E-book by Propelled Technologies
Cybersecurity Awareness E-book by Propelled Technologies
 
Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things
 
Cyber security
Cyber securityCyber security
Cyber security
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
 
What is Cybercrime and How to Prevent Cybercrime?
What is Cybercrime and How to Prevent Cybercrime?What is Cybercrime and How to Prevent Cybercrime?
What is Cybercrime and How to Prevent Cybercrime?
 

More from 211 Check

Prebunking and Debunking in Fact-checking
Prebunking and Debunking in Fact-checkingPrebunking and Debunking in Fact-checking
Prebunking and Debunking in Fact-checking
211 Check
 
HOW TO WRITE A FACT-CHECK: Master the art of writing a fact-check
HOW TO WRITE A FACT-CHECK: Master the art of writing a fact-checkHOW TO WRITE A FACT-CHECK: Master the art of writing a fact-check
HOW TO WRITE A FACT-CHECK: Master the art of writing a fact-check
211 Check
 
211 CHECK ANNUAL IMPACT REPORT 2023
211 CHECK ANNUAL IMPACT REPORT 2023211 CHECK ANNUAL IMPACT REPORT 2023
211 CHECK ANNUAL IMPACT REPORT 2023
211 Check
 
Unmasking Disinformation and Misinformation in South Sudan_Understanding the ...
Unmasking Disinformation and Misinformation in South Sudan_Understanding the ...Unmasking Disinformation and Misinformation in South Sudan_Understanding the ...
Unmasking Disinformation and Misinformation in South Sudan_Understanding the ...
211 Check
 
Presentation: Unmasking Dis/Misinformation in South Sudan: Understanding the ...
Presentation: Unmasking Dis/Misinformation in South Sudan: Understanding the ...Presentation: Unmasking Dis/Misinformation in South Sudan: Understanding the ...
Presentation: Unmasking Dis/Misinformation in South Sudan: Understanding the ...
211 Check
 
Mental Health in Fact-checking and Journalism: Dealing with Stress and Trauma
Mental Health in Fact-checking and Journalism: Dealing with Stress and TraumaMental Health in Fact-checking and Journalism: Dealing with Stress and Trauma
Mental Health in Fact-checking and Journalism: Dealing with Stress and Trauma
211 Check
 
Penetration Testing for Cybersecurity Professionals
Penetration Testing for Cybersecurity ProfessionalsPenetration Testing for Cybersecurity Professionals
Penetration Testing for Cybersecurity Professionals
211 Check
 
Mapping, Researching and Documenting Hate Speech_Skills for Civil Society O...
Mapping, Researching and  Documenting Hate Speech_Skills for Civil Society  O...Mapping, Researching and  Documenting Hate Speech_Skills for Civil Society  O...
Mapping, Researching and Documenting Hate Speech_Skills for Civil Society O...
211 Check
 
Online Research_How to get the best out of internet searches
Online Research_How to get the best out of internet searchesOnline Research_How to get the best out of internet searches
Online Research_How to get the best out of internet searches
211 Check
 
Artificial Intelligence (AI)_ A Friend or Enemy in Combating Disinformation ...
Artificial Intelligence (AI)_  A Friend or Enemy in Combating Disinformation ...Artificial Intelligence (AI)_  A Friend or Enemy in Combating Disinformation ...
Artificial Intelligence (AI)_ A Friend or Enemy in Combating Disinformation ...
211 Check
 
Techniques and Tools for fact-checking
Techniques and Tools for fact-checkingTechniques and Tools for fact-checking
Techniques and Tools for fact-checking
211 Check
 
Discarding confusion: Navigating Information Disorder in South Sudan
Discarding confusion: Navigating Information Disorder in South SudanDiscarding confusion: Navigating Information Disorder in South Sudan
Discarding confusion: Navigating Information Disorder in South Sudan
211 Check
 
211 Check Profile August 2023
211 Check Profile August 2023211 Check Profile August 2023
211 Check Profile August 2023
211 Check
 

More from 211 Check (13)

Prebunking and Debunking in Fact-checking
Prebunking and Debunking in Fact-checkingPrebunking and Debunking in Fact-checking
Prebunking and Debunking in Fact-checking
 
HOW TO WRITE A FACT-CHECK: Master the art of writing a fact-check
HOW TO WRITE A FACT-CHECK: Master the art of writing a fact-checkHOW TO WRITE A FACT-CHECK: Master the art of writing a fact-check
HOW TO WRITE A FACT-CHECK: Master the art of writing a fact-check
 
211 CHECK ANNUAL IMPACT REPORT 2023
211 CHECK ANNUAL IMPACT REPORT 2023211 CHECK ANNUAL IMPACT REPORT 2023
211 CHECK ANNUAL IMPACT REPORT 2023
 
Unmasking Disinformation and Misinformation in South Sudan_Understanding the ...
Unmasking Disinformation and Misinformation in South Sudan_Understanding the ...Unmasking Disinformation and Misinformation in South Sudan_Understanding the ...
Unmasking Disinformation and Misinformation in South Sudan_Understanding the ...
 
Presentation: Unmasking Dis/Misinformation in South Sudan: Understanding the ...
Presentation: Unmasking Dis/Misinformation in South Sudan: Understanding the ...Presentation: Unmasking Dis/Misinformation in South Sudan: Understanding the ...
Presentation: Unmasking Dis/Misinformation in South Sudan: Understanding the ...
 
Mental Health in Fact-checking and Journalism: Dealing with Stress and Trauma
Mental Health in Fact-checking and Journalism: Dealing with Stress and TraumaMental Health in Fact-checking and Journalism: Dealing with Stress and Trauma
Mental Health in Fact-checking and Journalism: Dealing with Stress and Trauma
 
Penetration Testing for Cybersecurity Professionals
Penetration Testing for Cybersecurity ProfessionalsPenetration Testing for Cybersecurity Professionals
Penetration Testing for Cybersecurity Professionals
 
Mapping, Researching and Documenting Hate Speech_Skills for Civil Society O...
Mapping, Researching and  Documenting Hate Speech_Skills for Civil Society  O...Mapping, Researching and  Documenting Hate Speech_Skills for Civil Society  O...
Mapping, Researching and Documenting Hate Speech_Skills for Civil Society O...
 
Online Research_How to get the best out of internet searches
Online Research_How to get the best out of internet searchesOnline Research_How to get the best out of internet searches
Online Research_How to get the best out of internet searches
 
Artificial Intelligence (AI)_ A Friend or Enemy in Combating Disinformation ...
Artificial Intelligence (AI)_  A Friend or Enemy in Combating Disinformation ...Artificial Intelligence (AI)_  A Friend or Enemy in Combating Disinformation ...
Artificial Intelligence (AI)_ A Friend or Enemy in Combating Disinformation ...
 
Techniques and Tools for fact-checking
Techniques and Tools for fact-checkingTechniques and Tools for fact-checking
Techniques and Tools for fact-checking
 
Discarding confusion: Navigating Information Disorder in South Sudan
Discarding confusion: Navigating Information Disorder in South SudanDiscarding confusion: Navigating Information Disorder in South Sudan
Discarding confusion: Navigating Information Disorder in South Sudan
 
211 Check Profile August 2023
211 Check Profile August 2023211 Check Profile August 2023
211 Check Profile August 2023
 

Recently uploaded

A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
deeptiverma2406
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
kimdan468
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
Marketing internship report file for MBA
Marketing internship report file for MBAMarketing internship report file for MBA
Marketing internship report file for MBA
gb193092
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
chanes7
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 

Recently uploaded (20)

A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
Marketing internship report file for MBA
Marketing internship report file for MBAMarketing internship report file for MBA
Marketing internship report file for MBA
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 

Webinar_Cybersecurity is a shared responsibility presentation

  • 3. Topic: CYBERSECURITY IS A SHARED RESPONSIBILITY In today's interconnected world, protecting ourselves from cyber threats is no longer an individual responsibility. It's a shared duty that requires collaboration and awareness.
  • 4. What is Cybersecurity? ▪ Defined as "the protection of computer systems and networks from attacks by malicious actors that may result in unauthorized information disclosure, theft of, or damage to hardware, software, or data..." ▪ Wherever there is technology, there needs to be cybersecurity.
  • 5. Why is it Important? ▪ Implementing cybersecurity best practices is important for individuals as well as organizations of all sizes to protect personal, financial and sensitive information. ▪ For both government and private entities, developing and implementing tailored cybersecurity plans and processes is key to protecting and maintaining business operations.
  • 6. Feelings Toward Cybersecurity ▪ 78% of people consider staying secure online a priority ▪ 34% noted they often feel overwhelmed by information and, as a result, minimize their online actions ▪ 46% felt frustrated while staying secure online ▪ 39% of users trying to keep safe felt information on how to stay secure online is confusing Findings from Oh Behave! The Annual Cybersecurity Attitudes and Behaviors Report 2022
  • 7. Our Online Behaviors ▪ Only 33% of individuals create unique passwords for all accounts ▪ Only 18% of individuals have downloaded a password manager ▪ 43% of respondents have never heard of multifactor authentication (MFA) ▪ Out of the 57% of the participants who had heard about it: ▪ 79% applied it at least once and 94% of them reporting that they were still using MFA ▪ 92% of respondents took action after a security training ▪ 58% say they are better at recognizing phishing ▪ 45% started using strong and unique passwords ▪ 40% started using MFA ▪ 40% started regularly installing software updates Findings from Oh Behave! The Annual Cybersecurity Attitudes and Behaviors Report 2022
  • 8. 4 Easy Ways to Stay Safe Online Use Strong Passwords and a Password Manager Turn on Multifactor Authentication Recognize and Report Phishing Attacks​ Update Your Software​
  • 9. Use Strong Passwords CREATE STRONG PASSWORDS: • Long • At least 16 characters • Unique • NEVER reuse passwords • Complex • Upper- and lower-case letters • Numbers • Special characters • Spaces
  • 10. Use a Password Manager WHY USE A PASSWORD MANAGER? • Stores your passwords • Alerts you of duplicate passwords • Generates strong new passwords • Some automatically fill your login credentials into website to make sign-in easy Encryption ensures that password managers never "know" what your passwords are, keeping them safe from cyber attacks.
  • 11. Turn on Multifactor Authentication WHAT IS IT? • A code sent to your phone or email • An authenticator app • A security key • Biometrics Fingerprint Facial recognition
  • 12. Turn on Multifactor Authentication WHERE SHOULD YOU USE MFA? • Email • Accounts with financial information Ex: Online store • Accounts with personal information Ex: Social media
  • 13. Recognize and Report Phishing PHISHING RED FLAGS: • A tone that’s urgent or makes you scared "Click this link immediately or your account will be closed" • Bad spellings, bad grammar • Requests to send personal info • Sender email address doesn’t match the company it’s coming from Ex: safetycomm.org vs. safetyc0mm.org • An email you weren't expecting
  • 14. Recognize and Report Phishing WHAT TO DO Do NOT • Don't click any links • Don't click any attachments • Don't send personal info Do • Verify • Contact that person directly if it's someone you know • Report it to your IT department • DELETE IT
  • 15. Update Your Software WHY? • Updates ensure your devices and apps are protected from the latest threats • Don't click "remind me later", it could leave you vulnerable to cyber threats • Automatic updates are the easiest way to stay secure
  • 16. Update Your Software WHERE TO FIND AVAILABLE UPDATES • Check for notifications to your phone or computer • Look in your phone, browser or app settings • Check the upper corner of your browser for any alerts
  • 17. Ways to Get Involved AT WORK ▪ Publicize resources and activities ▪ Intranet ▪ Website ▪ Emails to employees/customers ▪ Promotions ▪ Discounts ▪ Giveaways ▪ Hold a contest ▪ Phishing simulation ▪ Poster contest AT HOME ▪ Share helpful tips and resources ▪ Kids ▪ Parents ▪ Friends ▪ Hold a family “tech talk” ▪ Discuss how each family member can protect their devices, accounts, and personal information. ▪ Create a culture of security in your family
  • 18. Ways to Get Involved Cont. IN YOUR COMMUNITY ▪ Volunteer to teach others in your community ▪ Reach out to ▪ Your kid's school ▪ Community center ▪ Senior center ▪ Place of worship ONLINE ▪ Join on the conversation on social media using ▪ #CybersecurityAwarenessMonth ▪ #SecureOurWorld
  • 19. Building a Strong Cybersecurity Culture ▪ Use basic cybersecurity training. This helps familiarize staff with cybersecurity concepts and activities associated with implementing cybersecurity best practices. ▪ Identify available cybersecurity training resources. Cybersecurity training resources—on topics like phishing and good email practices—are available through professional association, educational institutions, as well as private sector and government sources. ▪ Stay current on cybersecurity events and incidents. This helps identify lessons learned and helps to maintain vigilance and agility to cybersecurity trends. ▪ Encourage employees to make good choices online and learn about risks like phishing and business email compromise.