SlideShare ist ein Scribd-Unternehmen logo
1 von 24
Downloaden Sie, um offline zu lesen
National Cybersecurity
Awareness Month 2020
CYBERSECURITY AWARENESS
MONTH 2021
What Is
Cybersecurity
Awareness Month?
Cybersecurity Awareness
Month raises awareness
about the importance of
cybersecurity across
our Nation.
Cybersecurity “So What?”
Did You Know?
Antivirus software is available for
mobile devices, which are an easy,
common target for hackers and
other bad actors.
Cybersecurity
Common Sense
 Being safe online isn’t so different from
being safe in the physical world!
 Keep Calm and Trust Your Gut!
Commonly
Used Terms
 Bad Actor
 Hacker
 Cyber Attack
3
There are currently an estimated
5.2 billion internet users or
63% of the world’s population.
Do Your Part.
#BeCyberSmart
Cybersecurity starts with
YOU and is everyone’s
responsibility.
4
CYBERCRIME
What is it?
Cybercrime is any crime which is committed
electronically.
This can include…
 Theft
 Fraud
 Sometimes even murder
Why should you care?
 Crime is a danger offline and on!
 Cyber self-defense basics can go a long way to
keeping you and your data out of the hands of
bad actors.
Examples
 Identity theft
 Child sexual abuse materials
 Financial theft
 Intellectual property violations
 Malware
 Malicious social engineering
5
MALWARE
What is it?
Any software intended to…
 Damage
 Disable
 Or give someone unauthorized access to your
computer or other internet-connected device
Why should you care?
 Most cybercrime begins with some sort of
malware. You, your family, and your personal
information is almost certainly at risk if malware
finds its way onto your computer or devices.
Examples
 Ransomware
 Adware
 Botnets
 Rootkits
 Spyware
 Viruses
 Worms
6
RANSOMWARE
What is it?
Malware designed to make data or hardware
inaccessible to the victim until a ransom is paid.
Why should you care?
 Often downloaded as malicious email links
 Damage to both financial stability and
reputation
 No guarantee that you will get your data back,
even if you pay
 Often used as a decoy for other malicious
activity
Examples
 Cryptolocker
 Winlock
 Cryptowall
 Reveton
 Bad rabbit
 Crysis
 Wannacry
7
BOTS
What is it?
Bots are a type of program used for automating
tasks on the internet.
Why should you care?
Malicious bots can:
 Gather passwords
 Log keystrokes
 Obtain financial information
 Hijack social media accounts
 Use your email to send spam
 Open back doors on the infected device
Did You Know?
Not all bots are bad. When you
use a search engine, these results
are made possible by the help of
bots “crawling” the internet and
indexing content. Chatbots like
Siri and Alexa are another
common type of “good” bot.
8
PHYSICAL CYBER ATTACKS
What is it?
Physical cyber attacks use hardware, external storage
devices, or other physical attack vectors to infect, damage, or
otherwise compromise digital systems. This can include…
 USB storage devices
 CD/DVD
 Internet of Things (IoT)
Why should you care?
 Easy to overlook
 Difficult to identify and detect
 Extremely difficult to remove
 Can do anything from installing ransomware, to sending
copies of or modifying information systems, to
dismantling networks
Did You Know?
Anything connected to the
internet is potentially
vulnerable, from e-
scooters to laptops to
cargo ships.
9
SOCIAL ENGINEERING
What is it?
 Cybercriminals can take advantage of you by using
information commonly available through…
 Social media platforms
 Location sharing
 In-person conversations
Why should you care?
 Your privacy isn’t just a luxury – it’s a security
measure
 Attacks can be successful with little to no
programming knowledge or ability
 Technological security measures can only protect
you so much – you are your best defense
Examples
 Phishing
 Pretexting
 Baiting
 Quid pro quo
 Tailgating
 Inside job
 Swatting
10
PHISHING
What is it?
Fake messages from a seemingly trusted or reputable
source designed to convince you to…
 Reveal information
 Give unauthorized access to a system
 Click on a link
 Commit to a financial transaction
Why should you care?
 Extremely common
 Can have severe consequences
 Devil‘s in the details
Examples
 Emails
 Text messages
 Phone calls
 Social media messages
and posts
 Suspicious hyperlinks
11
Would This
Email Fool You?
From
Subject
Legitimate-Looking-Source@notquiteyourworkemail.com
Ugent IT Update: Software Vulnerability
Software Update
Good afternoon Tom,
A vulneribility has been identified in “Big Name Software” that allows an attacker to
record calls and videos from your computer without your knowldge. Please install the
attacked update by the end of the day or your workstation will be locked.
We have also created app for all employees to determan if they been affected by this
vulnerability. Click here to run the app.
Sincerely,
BossMann
Your Company IT Department
www.fakewebsite.com/gotcha.exe
Click or tap to follow link.
REPLY
12
SWATTING
What is it?
An attack centered around location sharing in which bad actors
call the police claiming the victim has committed a crime…
 Bomb Threat
 Armed Intruder
 Violent Incident
Why should you care?
 Physical and immediate consequences
 Sometimes was intended merely as a prank
 Arrest and serious injury can result
 Reduce risk by sharing your location only with trusted
individuals, and share vacation photos only after you’ve
returned safely home
Examples
Your location is embedded
as metadata in every
picture you take with your
phone. Turn location
services off when you aren’t
using them to make it more
difficult for bad actors to
view this information.
13
OTHER AVENUES OF ATTACK
What is it?
 Internet of everything
 Any device connected to your network
 Information collection
 Remote access
 Bluetooth
 Open ports
Why should you care?
 Your network can be used to attack someone else
 Any device that stores information or is connected
to the internet can be a vulnerability
 Assume that you are vulnerable, and take measures
to understand and mitigate risk
 Don‘t be the “low-hanging fruit”
Examples
 Smart devices
 Mobile phone
 Thermostat
 Vehicles
 Gaming consoles
 Printers
 Medical equipment
 Industrial systems
14
How Can You Better
Protect Yourself Online?
Secure your networks.
Wireless routers are a way for
cybercriminals to access online devices.
If You Connect It, Protect It.
One proven defense against intrusion
is updating to the latest virus
protection software.
Stay up to date.
Keep software updated to the latest
versions and set security software to
run regular scans.
Double your login protection.
Enable multi-factor authentication
(MFA) to ensure that the only person
who has access to your account is you.
15
Password Tips
Use different passwords on different
systems and accounts
Use the longest password allowed
Use a mix of uppercase and lowercase
letter, numbers, and symbols
Reset your password every few months
Use a password manager
******
******
******
******
******
Did You Know?
Password or credential stuffing is a
cyberattack that tries “stuffing”
already comprised username and
passwords from one site into
another site in hopes that the user
uses the same login information
across platforms.
16
Cybersecurity
Awareness
Month Theme
Theme:
 Do Your Part.
#BeCyberSmart.
17
Cybersecurity Awareness Month 2021 Schedule
October 1:
Official Kick-off
WEEK 1:
Week of October 4
Be Cyber Smart.
WEEK 2:
Week of October 11
Fight the Phish!
WEEK 3:
Week of October 18
Explore. Experience.
Share. (Cybersecurity
Career Awareness
Week)
WEEK 4:
Week of October 25
Cybersecurity First
18
Week 1:
Be Cyber Smart.
19
Week 2:
Fight the Phish!
20
Week 3:
Explore.
Experience.
Share.
Cybersecurity
Career Awareness
Week
21
Week 4:
Cybersecurity
First.
22
Raise Awareness
and Get Involved
 Become a Cybersecurity Month Champion
 Promote Cybersecurity Awareness Month on social
media; use the #BeCyberSmart hashtag
 Volunteer to speak at Cybersecurity Awareness
Month Engagements
 Pass on cybersecurity tips to your friends, family,
and coworkers
23
For more information, contact
CyberAwareness@cisa.dhs.gov
Visit cisa.gov/cybersecurity-awareness-month or
staysafeonline.org/cybersecurity-awareness-month/
for more resources.
24

Weitere ähnliche Inhalte

Was ist angesagt?

Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and securitySharath Raj
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and securityAlisha Korpal
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentationA.S. Sabuj
 
Cyber Security: Threat and Prevention
Cyber Security: Threat and PreventionCyber Security: Threat and Prevention
Cyber Security: Threat and Preventionfmi_igf
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and securityAkash Dhiman
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Jay Nagar
 
Artificial Intelligence for Cyber Security
Artificial Intelligence for Cyber SecurityArtificial Intelligence for Cyber Security
Artificial Intelligence for Cyber SecurityPriyanshu Ratnakar
 
Employee Awareness in Cyber Security - Kloudlearn
Employee Awareness in Cyber Security - KloudlearnEmployee Awareness in Cyber Security - Kloudlearn
Employee Awareness in Cyber Security - KloudlearnKloudLearn
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Stephen Cobb
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security AwarenessRamiro Cid
 
Ransomware - The Growing Threat
Ransomware - The Growing ThreatRansomware - The Growing Threat
Ransomware - The Growing ThreatNick Miller
 

Was ist angesagt? (20)

Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and security
 
PHISHING attack
PHISHING attack PHISHING attack
PHISHING attack
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentation
 
Cyber Security: Threat and Prevention
Cyber Security: Threat and PreventionCyber Security: Threat and Prevention
Cyber Security: Threat and Prevention
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber security ppt
Cyber security pptCyber security ppt
Cyber security ppt
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
Security awareness
Security awarenessSecurity awareness
Security awareness
 
cyber security
cyber security cyber security
cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Artificial Intelligence for Cyber Security
Artificial Intelligence for Cyber SecurityArtificial Intelligence for Cyber Security
Artificial Intelligence for Cyber Security
 
Employee Awareness in Cyber Security - Kloudlearn
Employee Awareness in Cyber Security - KloudlearnEmployee Awareness in Cyber Security - Kloudlearn
Employee Awareness in Cyber Security - Kloudlearn
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Ransomware - The Growing Threat
Ransomware - The Growing ThreatRansomware - The Growing Threat
Ransomware - The Growing Threat
 

Ähnlich wie Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf

Guarding the Digital Fortress Unmasking 10 Common Types of Cybersecurity Thre...
Guarding the Digital Fortress Unmasking 10 Common Types of Cybersecurity Thre...Guarding the Digital Fortress Unmasking 10 Common Types of Cybersecurity Thre...
Guarding the Digital Fortress Unmasking 10 Common Types of Cybersecurity Thre...Mverve1
 
Guarding the Digital Fortress.pdf
Guarding the Digital Fortress.pdfGuarding the Digital Fortress.pdf
Guarding the Digital Fortress.pdfMverve1
 
Computer Security for Lawyers
Computer Security for LawyersComputer Security for Lawyers
Computer Security for LawyersMark Lanterman
 
Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?Symptai Consulting Limited
 
What-is-computer-security
What-is-computer-securityWhat-is-computer-security
What-is-computer-securityiamvishal2
 
Cybersecurity Interview Questions Part -2.pdf
Cybersecurity Interview Questions Part -2.pdfCybersecurity Interview Questions Part -2.pdf
Cybersecurity Interview Questions Part -2.pdfInfosec Train
 
Type of Security Threats and its Prevention
Type of Security Threats and its PreventionType of Security Threats and its Prevention
Type of Security Threats and its Preventionijsrd.com
 
Cyber Crime & Security.pdf
Cyber Crime & Security.pdfCyber Crime & Security.pdf
Cyber Crime & Security.pdfMohanPandey31
 
A Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.comA Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.comBusiness.com
 
Security Tips To Keep Your Laptop Safe
Security Tips To Keep Your Laptop SafeSecurity Tips To Keep Your Laptop Safe
Security Tips To Keep Your Laptop SafeNoida
 
IT security in 2021: Why Ransomware Is Still The Biggest Threat
IT security in 2021: Why Ransomware Is Still The Biggest ThreatIT security in 2021: Why Ransomware Is Still The Biggest Threat
IT security in 2021: Why Ransomware Is Still The Biggest ThreatETech 7
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of CybercrimeRubi Orbeta
 
Five habits that might be a cyber security risk
Five habits that might be a cyber security riskFive habits that might be a cyber security risk
Five habits that might be a cyber security riskK. A. M Lutfullah
 
Empowerment lesson 2.ppt
Empowerment lesson 2.pptEmpowerment lesson 2.ppt
Empowerment lesson 2.pptAndrew_Braza
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptBushra22
 
Cybersecurity - Poland.pdf
Cybersecurity - Poland.pdfCybersecurity - Poland.pdf
Cybersecurity - Poland.pdfPavelVtek3
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsMuhammadRobeel3
 
Top Positive and Negative Impacts of AI & ML on Cybersecurity
Top Positive and Negative Impacts of AI & ML on CybersecurityTop Positive and Negative Impacts of AI & ML on Cybersecurity
Top Positive and Negative Impacts of AI & ML on CybersecurityPixel Crayons
 

Ähnlich wie Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf (20)

Guarding the Digital Fortress Unmasking 10 Common Types of Cybersecurity Thre...
Guarding the Digital Fortress Unmasking 10 Common Types of Cybersecurity Thre...Guarding the Digital Fortress Unmasking 10 Common Types of Cybersecurity Thre...
Guarding the Digital Fortress Unmasking 10 Common Types of Cybersecurity Thre...
 
Guarding the Digital Fortress.pdf
Guarding the Digital Fortress.pdfGuarding the Digital Fortress.pdf
Guarding the Digital Fortress.pdf
 
Computer Security for Lawyers
Computer Security for LawyersComputer Security for Lawyers
Computer Security for Lawyers
 
cyber crime
 cyber crime cyber crime
cyber crime
 
Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?
 
What-is-computer-security
What-is-computer-securityWhat-is-computer-security
What-is-computer-security
 
Cybersecurity Interview Questions Part -2.pdf
Cybersecurity Interview Questions Part -2.pdfCybersecurity Interview Questions Part -2.pdf
Cybersecurity Interview Questions Part -2.pdf
 
Type of Security Threats and its Prevention
Type of Security Threats and its PreventionType of Security Threats and its Prevention
Type of Security Threats and its Prevention
 
Cyber Crime & Security.pdf
Cyber Crime & Security.pdfCyber Crime & Security.pdf
Cyber Crime & Security.pdf
 
A Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.comA Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.com
 
Security Tips To Keep Your Laptop Safe
Security Tips To Keep Your Laptop SafeSecurity Tips To Keep Your Laptop Safe
Security Tips To Keep Your Laptop Safe
 
IT security in 2021: Why Ransomware Is Still The Biggest Threat
IT security in 2021: Why Ransomware Is Still The Biggest ThreatIT security in 2021: Why Ransomware Is Still The Biggest Threat
IT security in 2021: Why Ransomware Is Still The Biggest Threat
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of Cybercrime
 
Five habits that might be a cyber security risk
Five habits that might be a cyber security riskFive habits that might be a cyber security risk
Five habits that might be a cyber security risk
 
Hamza
HamzaHamza
Hamza
 
Empowerment lesson 2.ppt
Empowerment lesson 2.pptEmpowerment lesson 2.ppt
Empowerment lesson 2.ppt
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cybersecurity - Poland.pdf
Cybersecurity - Poland.pdfCybersecurity - Poland.pdf
Cybersecurity - Poland.pdf
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
 
Top Positive and Negative Impacts of AI & ML on Cybersecurity
Top Positive and Negative Impacts of AI & ML on CybersecurityTop Positive and Negative Impacts of AI & ML on Cybersecurity
Top Positive and Negative Impacts of AI & ML on Cybersecurity
 

Kürzlich hochgeladen

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 

Kürzlich hochgeladen (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 

Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf

  • 1. National Cybersecurity Awareness Month 2020 CYBERSECURITY AWARENESS MONTH 2021
  • 2. What Is Cybersecurity Awareness Month? Cybersecurity Awareness Month raises awareness about the importance of cybersecurity across our Nation.
  • 3. Cybersecurity “So What?” Did You Know? Antivirus software is available for mobile devices, which are an easy, common target for hackers and other bad actors. Cybersecurity Common Sense  Being safe online isn’t so different from being safe in the physical world!  Keep Calm and Trust Your Gut! Commonly Used Terms  Bad Actor  Hacker  Cyber Attack 3
  • 4. There are currently an estimated 5.2 billion internet users or 63% of the world’s population. Do Your Part. #BeCyberSmart Cybersecurity starts with YOU and is everyone’s responsibility. 4
  • 5. CYBERCRIME What is it? Cybercrime is any crime which is committed electronically. This can include…  Theft  Fraud  Sometimes even murder Why should you care?  Crime is a danger offline and on!  Cyber self-defense basics can go a long way to keeping you and your data out of the hands of bad actors. Examples  Identity theft  Child sexual abuse materials  Financial theft  Intellectual property violations  Malware  Malicious social engineering 5
  • 6. MALWARE What is it? Any software intended to…  Damage  Disable  Or give someone unauthorized access to your computer or other internet-connected device Why should you care?  Most cybercrime begins with some sort of malware. You, your family, and your personal information is almost certainly at risk if malware finds its way onto your computer or devices. Examples  Ransomware  Adware  Botnets  Rootkits  Spyware  Viruses  Worms 6
  • 7. RANSOMWARE What is it? Malware designed to make data or hardware inaccessible to the victim until a ransom is paid. Why should you care?  Often downloaded as malicious email links  Damage to both financial stability and reputation  No guarantee that you will get your data back, even if you pay  Often used as a decoy for other malicious activity Examples  Cryptolocker  Winlock  Cryptowall  Reveton  Bad rabbit  Crysis  Wannacry 7
  • 8. BOTS What is it? Bots are a type of program used for automating tasks on the internet. Why should you care? Malicious bots can:  Gather passwords  Log keystrokes  Obtain financial information  Hijack social media accounts  Use your email to send spam  Open back doors on the infected device Did You Know? Not all bots are bad. When you use a search engine, these results are made possible by the help of bots “crawling” the internet and indexing content. Chatbots like Siri and Alexa are another common type of “good” bot. 8
  • 9. PHYSICAL CYBER ATTACKS What is it? Physical cyber attacks use hardware, external storage devices, or other physical attack vectors to infect, damage, or otherwise compromise digital systems. This can include…  USB storage devices  CD/DVD  Internet of Things (IoT) Why should you care?  Easy to overlook  Difficult to identify and detect  Extremely difficult to remove  Can do anything from installing ransomware, to sending copies of or modifying information systems, to dismantling networks Did You Know? Anything connected to the internet is potentially vulnerable, from e- scooters to laptops to cargo ships. 9
  • 10. SOCIAL ENGINEERING What is it?  Cybercriminals can take advantage of you by using information commonly available through…  Social media platforms  Location sharing  In-person conversations Why should you care?  Your privacy isn’t just a luxury – it’s a security measure  Attacks can be successful with little to no programming knowledge or ability  Technological security measures can only protect you so much – you are your best defense Examples  Phishing  Pretexting  Baiting  Quid pro quo  Tailgating  Inside job  Swatting 10
  • 11. PHISHING What is it? Fake messages from a seemingly trusted or reputable source designed to convince you to…  Reveal information  Give unauthorized access to a system  Click on a link  Commit to a financial transaction Why should you care?  Extremely common  Can have severe consequences  Devil‘s in the details Examples  Emails  Text messages  Phone calls  Social media messages and posts  Suspicious hyperlinks 11
  • 12. Would This Email Fool You? From Subject Legitimate-Looking-Source@notquiteyourworkemail.com Ugent IT Update: Software Vulnerability Software Update Good afternoon Tom, A vulneribility has been identified in “Big Name Software” that allows an attacker to record calls and videos from your computer without your knowldge. Please install the attacked update by the end of the day or your workstation will be locked. We have also created app for all employees to determan if they been affected by this vulnerability. Click here to run the app. Sincerely, BossMann Your Company IT Department www.fakewebsite.com/gotcha.exe Click or tap to follow link. REPLY 12
  • 13. SWATTING What is it? An attack centered around location sharing in which bad actors call the police claiming the victim has committed a crime…  Bomb Threat  Armed Intruder  Violent Incident Why should you care?  Physical and immediate consequences  Sometimes was intended merely as a prank  Arrest and serious injury can result  Reduce risk by sharing your location only with trusted individuals, and share vacation photos only after you’ve returned safely home Examples Your location is embedded as metadata in every picture you take with your phone. Turn location services off when you aren’t using them to make it more difficult for bad actors to view this information. 13
  • 14. OTHER AVENUES OF ATTACK What is it?  Internet of everything  Any device connected to your network  Information collection  Remote access  Bluetooth  Open ports Why should you care?  Your network can be used to attack someone else  Any device that stores information or is connected to the internet can be a vulnerability  Assume that you are vulnerable, and take measures to understand and mitigate risk  Don‘t be the “low-hanging fruit” Examples  Smart devices  Mobile phone  Thermostat  Vehicles  Gaming consoles  Printers  Medical equipment  Industrial systems 14
  • 15. How Can You Better Protect Yourself Online? Secure your networks. Wireless routers are a way for cybercriminals to access online devices. If You Connect It, Protect It. One proven defense against intrusion is updating to the latest virus protection software. Stay up to date. Keep software updated to the latest versions and set security software to run regular scans. Double your login protection. Enable multi-factor authentication (MFA) to ensure that the only person who has access to your account is you. 15
  • 16. Password Tips Use different passwords on different systems and accounts Use the longest password allowed Use a mix of uppercase and lowercase letter, numbers, and symbols Reset your password every few months Use a password manager ****** ****** ****** ****** ****** Did You Know? Password or credential stuffing is a cyberattack that tries “stuffing” already comprised username and passwords from one site into another site in hopes that the user uses the same login information across platforms. 16
  • 18. Cybersecurity Awareness Month 2021 Schedule October 1: Official Kick-off WEEK 1: Week of October 4 Be Cyber Smart. WEEK 2: Week of October 11 Fight the Phish! WEEK 3: Week of October 18 Explore. Experience. Share. (Cybersecurity Career Awareness Week) WEEK 4: Week of October 25 Cybersecurity First 18
  • 19. Week 1: Be Cyber Smart. 19
  • 20. Week 2: Fight the Phish! 20
  • 23. Raise Awareness and Get Involved  Become a Cybersecurity Month Champion  Promote Cybersecurity Awareness Month on social media; use the #BeCyberSmart hashtag  Volunteer to speak at Cybersecurity Awareness Month Engagements  Pass on cybersecurity tips to your friends, family, and coworkers 23
  • 24. For more information, contact CyberAwareness@cisa.dhs.gov Visit cisa.gov/cybersecurity-awareness-month or staysafeonline.org/cybersecurity-awareness-month/ for more resources. 24