SlideShare a Scribd company logo
1 of 12
Download to read offline
Its Easy to Stay Safe Online
Michael Enos
Sr Director Community & Platform
2 © TechSoup Global. All Rights Reserved.
Michael Enos
Senior Director of
Community and Platform
• Michael Enos is Senior Director of Community
and Platform for Techsoup Global. In his role,
Michael directs dev-ops, enterprise
infrastructure, information and technology
security, and software development teams
that build and support platform products and
services.
Today’s Topics
• Overview of Cyber Security Frameworks
• Multi-Factor Authentication.
• Privileged Access Management and Password
• Password Management.
• The importance of keeping systems up to date
• Security Awareness Training
4 © TechSoup Global. All Rights Reserved.
Phishing
Data Breach
Service
Disruption
Malware Ransomware
Cyber Threats NGOs Face
NGOs have specific types of data that if compromised, could impede our mission and lose the trust of the communities we serve
• Vulnerable Population’s Personal Information
• Donor Data
• Financial Information
NIST
Cybersecurity Framework
• What is the Framework?
• The Framework is voluntary guidance, based on
existing standards, guidelines, and practices for
organizations to better manage and reduce
cybersecurity risk. In addition to helping
organizations manage and reduce risks, it was
designed to foster risk and cybersecurity
management communications amongst both
internal and external organizational stakeholders.
Cyber Security
Framework version 1.1
Breakdown
7 © TechSoup Global. All Rights Reserved.
Multi-Factor Authentication
• One of the quickest and easiest ways to stay safe online: enable multi-factor authentication
on your accounts. This simple step takes just a few minutes per account, and you only have
to do it once. As soon as it's in place, it becomes twice as tough for hackers to gain access
to your accounts.
• What is multi-factor authentication (MFA)? Also known as two-factor authentication, this
widely available tool secures your accounts by requiring two pieces of information to log in.
One common example of two-factor authentication: entering your password and then typing
in a one-time code sent to your email address or smartphone.
• Other examples of a second step that may be used in two-factor authentication or 2FA
include:
• A security question (for example, "What was the name of your favorite teacher?")
• A biometric identifier such as your face or fingerprint.
• A temporary passcode you get via an authenticator application.
• You can typically enable multi-factor authentication by going to an account, going to settings
and looking under security. You then toggle multi-factor authentication to "on" and provide
any necessary information, such as your phone number or email address where you want a
code sent. For example, here's how to turn on 2FA on Facebook and on Google.
8 © TechSoup Global. All Rights Reserved.
Password Management
• Another top priority for online safety: Use strong passwords and a password
manager. If you can easily remember a password, chances are good that a
hacker could use a computer program to quickly guess it and get the keys
to your online kingdom.
• A strong password should be:
• Complex – with upper and lowercase letters, numbers, and symbols
• Long – at least 16 characters long to make it much harder to crack
• Hard to guess – no real words or personal details like names and birthdays
• But the same characteristics that make passwords hard to crack also make
them difficult to remember. That's why password managers are such a
handy tool.
• Password managers keep track of all your passwords in a secure online
vault, can generate strong passwords for you on demand, and can even
safeguard other important information such as your credit card numbers.
They can quickly and easily auto-fill your passwords for you when you go to
log into a site.
• Examples of popular password managers include Norton Password
Manager. You can get a free or paid password manager service depending
on your needs, number of devices you have, and the features you need.
.
9 © TechSoup Global. All Rights Reserved.
Password Management
• Another top priority for online safety: Use strong passwords and a password
manager. If you can easily remember a password, chances are good that a
hacker could use a computer program to quickly guess it and get the keys
to your online kingdom.
• A strong password should be:
• Complex – with upper and lowercase letters, numbers, and symbols
• Long – at least 16 characters long to make it much harder to crack
• Hard to guess – no real words or personal details like names and birthdays
• But the same characteristics that make passwords hard to crack also make
them difficult to remember. That's why password managers are such a
handy tool.
• Password managers keep track of all your passwords in a secure online
vault, can generate strong passwords for you on demand, and can even
safeguard other important information such as your credit card numbers.
They can quickly and easily auto-fill your passwords for you when you go to
log into a site.
• Examples of popular password managers include Norton Password
Manager. You can get a free or paid password manager service depending
on your needs, number of devices you have, and the features you need.
.
10 © TechSoup Global. All Rights Reserved.
Keeping Software Up To Date
• Keeping your software up to date is one the easiest and most important
things you can do to stay safe online. That's because software updates
often fix bugs or loopholes attackers can exploit to gain access to your data,
infect your device with malware or ransomware, and even remotely take over
your computer.
• Make sure to update your software on a regular schedule or whenever you
get an alert letting you know an update is available. Get in the habit of doing
software updates right away rather than putting them off for later. It's also
smart to get a reputable security program that can add an extra layer of
protection.
• Want to brush up on how to perform regular updates? Here's how to update
the software on an Android
and how to update the software on an iPhone or iPad. It's important to
regularly update your operating system as well as apps on your device. Not
only will regular updates help keep you safe online and shore up
your privacy, they'll also fix glitches and help your devices run more
smoothly.
• Quick "It's easy to stay safe online" task
• Take 15 minutes to check your devices for software updates and
get current. For convenience and speed, turn on automatic software
updates. If you prefer to update software manually, set up an alert to remind
you to check for updates once a month.
• .
.
11 © TechSoup Global. All Rights Reserved.
Security Awareness Training
• Learning to recognize and report phishing scams is a top step you can take
to stay safe online. Fortunately, it's fairly easy to do and doesn't take long at
all.
• What is a phishing scam? It's when a cybercriminal sends you a fake email,
direct message, text, or even a pop-up ad to try to trick you into taking an
action such as clicking a link, providing personal information, or making
a payment. A phishing message may be cleverly disguised to look like a real
message from a familiar company such as your bank.
• Learning to spot the telltale signs of phishing and to stop and think before
taking action on an email or other message can go a long way towards
keeping you safe from phishing scams. Here are some clues that can tip
you off to a phishing attack:
• Alarming "news" about an account.
• Attachments that look odd.
• Failure to address you by name.
• Grammar errors or misspellings.
• Offers for free gadgets, trips, or other items of value.
• Language that sounds just a little bit "off."
• Request to click a link or take urgent action.
.
Thank You!
Michael Enos
menos@techsoup.org

More Related Content

Similar to Executive Directors Chat:It's easy to stay safe online.pdf

Cyber Security Awareness Month 2017-Nugget 6
Cyber Security Awareness Month 2017-Nugget 6Cyber Security Awareness Month 2017-Nugget 6
Cyber Security Awareness Month 2017-Nugget 6Chinatu Uzuegbu
 
Webinar_Cybersecurity is a shared responsibility presentation
Webinar_Cybersecurity is a shared responsibility presentationWebinar_Cybersecurity is a shared responsibility presentation
Webinar_Cybersecurity is a shared responsibility presentation211 Check
 
5 ways to strengthen cybersecurity in the workplace
5 ways to strengthen cybersecurity in the workplace5 ways to strengthen cybersecurity in the workplace
5 ways to strengthen cybersecurity in the workplaceSameerShaik43
 
Phish training final
Phish training finalPhish training final
Phish training finalJen Ruhman
 
Cyber Security and Healthcare
Cyber Security and HealthcareCyber Security and Healthcare
Cyber Security and HealthcareJonathon Coulter
 
Internet security
Internet securityInternet security
Internet securityrfukunaga
 
CYBER_SECURITY_BASICS_FINAL.pptx
CYBER_SECURITY_BASICS_FINAL.pptxCYBER_SECURITY_BASICS_FINAL.pptx
CYBER_SECURITY_BASICS_FINAL.pptxQuiMo3
 
Working from home- How secure is it.pdf
Working from home- How secure is it.pdfWorking from home- How secure is it.pdf
Working from home- How secure is it.pdfFiyona Nourin
 
Cyber Security for Financial Planners
Cyber Security for Financial PlannersCyber Security for Financial Planners
Cyber Security for Financial PlannersMichael O'Phelan
 
5 Ways to Stay #CyberSecure
5 Ways to Stay #CyberSecure5 Ways to Stay #CyberSecure
5 Ways to Stay #CyberSecureMedia Sonar
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptxCharithraaAR
 
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONSIMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONSPreetiDevidas
 
The Human Side of Security
The Human Side of SecurityThe Human Side of Security
The Human Side of SecurityRandy Earl
 
Protecting Your Business From Cybercrime
Protecting Your Business From CybercrimeProtecting Your Business From Cybercrime
Protecting Your Business From CybercrimeDavid J Rosenthal
 

Similar to Executive Directors Chat:It's easy to stay safe online.pdf (20)

Cybersecurity Training
Cybersecurity TrainingCybersecurity Training
Cybersecurity Training
 
Cyber Security Awareness Month 2017-Nugget 6
Cyber Security Awareness Month 2017-Nugget 6Cyber Security Awareness Month 2017-Nugget 6
Cyber Security Awareness Month 2017-Nugget 6
 
12990739.ppt
12990739.ppt12990739.ppt
12990739.ppt
 
Webinar_Cybersecurity is a shared responsibility presentation
Webinar_Cybersecurity is a shared responsibility presentationWebinar_Cybersecurity is a shared responsibility presentation
Webinar_Cybersecurity is a shared responsibility presentation
 
5 ways to strengthen cybersecurity in the workplace
5 ways to strengthen cybersecurity in the workplace5 ways to strengthen cybersecurity in the workplace
5 ways to strengthen cybersecurity in the workplace
 
Phish training final
Phish training finalPhish training final
Phish training final
 
Train Employees to Avoid Cybercrime
Train Employees to Avoid CybercrimeTrain Employees to Avoid Cybercrime
Train Employees to Avoid Cybercrime
 
Cyber Security and Healthcare
Cyber Security and HealthcareCyber Security and Healthcare
Cyber Security and Healthcare
 
Internet security
Internet securityInternet security
Internet security
 
CYBER_SECURITY_BASICS_FINAL.pptx
CYBER_SECURITY_BASICS_FINAL.pptxCYBER_SECURITY_BASICS_FINAL.pptx
CYBER_SECURITY_BASICS_FINAL.pptx
 
Working from home- How secure is it.pdf
Working from home- How secure is it.pdfWorking from home- How secure is it.pdf
Working from home- How secure is it.pdf
 
Cyber Security for Financial Planners
Cyber Security for Financial PlannersCyber Security for Financial Planners
Cyber Security for Financial Planners
 
5 Ways to Stay #CyberSecure
5 Ways to Stay #CyberSecure5 Ways to Stay #CyberSecure
5 Ways to Stay #CyberSecure
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptx
 
Assessing Your security
Assessing Your securityAssessing Your security
Assessing Your security
 
Information security
Information securityInformation security
Information security
 
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONSIMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
 
The Human Side of Security
The Human Side of SecurityThe Human Side of Security
The Human Side of Security
 
Protecting Your Business From Cybercrime
Protecting Your Business From CybercrimeProtecting Your Business From Cybercrime
Protecting Your Business From Cybercrime
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 

More from TechSoup

Introduction to TechSoup’s Digital Marketing Services and Use Cases
Introduction to TechSoup’s Digital Marketing  Services and Use CasesIntroduction to TechSoup’s Digital Marketing  Services and Use Cases
Introduction to TechSoup’s Digital Marketing Services and Use CasesTechSoup
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Executive Directors Chat Embracing Diversity and Cultural Differences
Executive Directors Chat  Embracing Diversity and Cultural DifferencesExecutive Directors Chat  Embracing Diversity and Cultural Differences
Executive Directors Chat Embracing Diversity and Cultural DifferencesTechSoup
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Building the Commons: Community Archiving & Decentralized Storage
Building the Commons: Community Archiving & Decentralized StorageBuilding the Commons: Community Archiving & Decentralized Storage
Building the Commons: Community Archiving & Decentralized StorageTechSoup
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
Welcome to TechSoup - New Member Orientation and Q & A (April 2024)
Welcome to TechSoup - New Member Orientation and Q & A (April 2024)Welcome to TechSoup - New Member Orientation and Q & A (April 2024)
Welcome to TechSoup - New Member Orientation and Q & A (April 2024)TechSoup
 
Executive Directors Chat Initiating Equity for Impact.pdf
Executive Directors Chat  Initiating Equity for Impact.pdfExecutive Directors Chat  Initiating Equity for Impact.pdf
Executive Directors Chat Initiating Equity for Impact.pdfTechSoup
 
Set the Path Forward with Smart Technology Decisions.pdf
Set the Path Forward with Smart Technology Decisions.pdfSet the Path Forward with Smart Technology Decisions.pdf
Set the Path Forward with Smart Technology Decisions.pdfTechSoup
 
What is the Future of QuickBooks DeskTop?
What is the Future of QuickBooks DeskTop?What is the Future of QuickBooks DeskTop?
What is the Future of QuickBooks DeskTop?TechSoup
 
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdf
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdfMaximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdf
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdfTechSoup
 
Hitting the Inbox: Email Authentication Changes and What You Need to Know
Hitting the Inbox: Email Authentication Changes and What You Need to KnowHitting the Inbox: Email Authentication Changes and What You Need to Know
Hitting the Inbox: Email Authentication Changes and What You Need to KnowTechSoup
 
Welcome to TechSoup New Member Orientation March 2024
Welcome to TechSoup New Member Orientation March 2024Welcome to TechSoup New Member Orientation March 2024
Welcome to TechSoup New Member Orientation March 2024TechSoup
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
 
Celebrate National Library Lovers Month with TechSoup! We love libraries!.pdf
Celebrate National Library Lovers Month with TechSoup! We love libraries!.pdfCelebrate National Library Lovers Month with TechSoup! We love libraries!.pdf
Celebrate National Library Lovers Month with TechSoup! We love libraries!.pdfTechSoup
 
Google Ad Grants Services at TechSoup.pdf
Google Ad Grants Services at TechSoup.pdfGoogle Ad Grants Services at TechSoup.pdf
Google Ad Grants Services at TechSoup.pdfTechSoup
 
Techsoup_ Prompt Strategy _ Template.docx.pdf
Techsoup_ Prompt Strategy _ Template.docx.pdfTechsoup_ Prompt Strategy _ Template.docx.pdf
Techsoup_ Prompt Strategy _ Template.docx.pdfTechSoup
 
Ask the Exerts - Focus on AI Prompt Engineering.pdf
Ask the Exerts - Focus on AI Prompt Engineering.pdfAsk the Exerts - Focus on AI Prompt Engineering.pdf
Ask the Exerts - Focus on AI Prompt Engineering.pdfTechSoup
 
Introduction to TechSoup’s Digital Marketing Services and Use Cases
Introduction to TechSoup’s Digital Marketing  Services and Use CasesIntroduction to TechSoup’s Digital Marketing  Services and Use Cases
Introduction to TechSoup’s Digital Marketing Services and Use CasesTechSoup
 
Grantseeking Solo- Securing Awards with Limited Staff PDF.pdf
Grantseeking Solo- Securing Awards with Limited Staff  PDF.pdfGrantseeking Solo- Securing Awards with Limited Staff  PDF.pdf
Grantseeking Solo- Securing Awards with Limited Staff PDF.pdfTechSoup
 

More from TechSoup (20)

Introduction to TechSoup’s Digital Marketing Services and Use Cases
Introduction to TechSoup’s Digital Marketing  Services and Use CasesIntroduction to TechSoup’s Digital Marketing  Services and Use Cases
Introduction to TechSoup’s Digital Marketing Services and Use Cases
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Executive Directors Chat Embracing Diversity and Cultural Differences
Executive Directors Chat  Embracing Diversity and Cultural DifferencesExecutive Directors Chat  Embracing Diversity and Cultural Differences
Executive Directors Chat Embracing Diversity and Cultural Differences
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Building the Commons: Community Archiving & Decentralized Storage
Building the Commons: Community Archiving & Decentralized StorageBuilding the Commons: Community Archiving & Decentralized Storage
Building the Commons: Community Archiving & Decentralized Storage
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
Welcome to TechSoup - New Member Orientation and Q & A (April 2024)
Welcome to TechSoup - New Member Orientation and Q & A (April 2024)Welcome to TechSoup - New Member Orientation and Q & A (April 2024)
Welcome to TechSoup - New Member Orientation and Q & A (April 2024)
 
Executive Directors Chat Initiating Equity for Impact.pdf
Executive Directors Chat  Initiating Equity for Impact.pdfExecutive Directors Chat  Initiating Equity for Impact.pdf
Executive Directors Chat Initiating Equity for Impact.pdf
 
Set the Path Forward with Smart Technology Decisions.pdf
Set the Path Forward with Smart Technology Decisions.pdfSet the Path Forward with Smart Technology Decisions.pdf
Set the Path Forward with Smart Technology Decisions.pdf
 
What is the Future of QuickBooks DeskTop?
What is the Future of QuickBooks DeskTop?What is the Future of QuickBooks DeskTop?
What is the Future of QuickBooks DeskTop?
 
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdf
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdfMaximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdf
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdf
 
Hitting the Inbox: Email Authentication Changes and What You Need to Know
Hitting the Inbox: Email Authentication Changes and What You Need to KnowHitting the Inbox: Email Authentication Changes and What You Need to Know
Hitting the Inbox: Email Authentication Changes and What You Need to Know
 
Welcome to TechSoup New Member Orientation March 2024
Welcome to TechSoup New Member Orientation March 2024Welcome to TechSoup New Member Orientation March 2024
Welcome to TechSoup New Member Orientation March 2024
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Celebrate National Library Lovers Month with TechSoup! We love libraries!.pdf
Celebrate National Library Lovers Month with TechSoup! We love libraries!.pdfCelebrate National Library Lovers Month with TechSoup! We love libraries!.pdf
Celebrate National Library Lovers Month with TechSoup! We love libraries!.pdf
 
Google Ad Grants Services at TechSoup.pdf
Google Ad Grants Services at TechSoup.pdfGoogle Ad Grants Services at TechSoup.pdf
Google Ad Grants Services at TechSoup.pdf
 
Techsoup_ Prompt Strategy _ Template.docx.pdf
Techsoup_ Prompt Strategy _ Template.docx.pdfTechsoup_ Prompt Strategy _ Template.docx.pdf
Techsoup_ Prompt Strategy _ Template.docx.pdf
 
Ask the Exerts - Focus on AI Prompt Engineering.pdf
Ask the Exerts - Focus on AI Prompt Engineering.pdfAsk the Exerts - Focus on AI Prompt Engineering.pdf
Ask the Exerts - Focus on AI Prompt Engineering.pdf
 
Introduction to TechSoup’s Digital Marketing Services and Use Cases
Introduction to TechSoup’s Digital Marketing  Services and Use CasesIntroduction to TechSoup’s Digital Marketing  Services and Use Cases
Introduction to TechSoup’s Digital Marketing Services and Use Cases
 
Grantseeking Solo- Securing Awards with Limited Staff PDF.pdf
Grantseeking Solo- Securing Awards with Limited Staff  PDF.pdfGrantseeking Solo- Securing Awards with Limited Staff  PDF.pdf
Grantseeking Solo- Securing Awards with Limited Staff PDF.pdf
 

Recently uploaded

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdfssuserdda66b
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxDr. Sarita Anand
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseAnaAcapella
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701bronxfugly43
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 

Recently uploaded (20)

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 

Executive Directors Chat:It's easy to stay safe online.pdf

  • 1. Its Easy to Stay Safe Online Michael Enos Sr Director Community & Platform
  • 2. 2 © TechSoup Global. All Rights Reserved. Michael Enos Senior Director of Community and Platform • Michael Enos is Senior Director of Community and Platform for Techsoup Global. In his role, Michael directs dev-ops, enterprise infrastructure, information and technology security, and software development teams that build and support platform products and services.
  • 3. Today’s Topics • Overview of Cyber Security Frameworks • Multi-Factor Authentication. • Privileged Access Management and Password • Password Management. • The importance of keeping systems up to date • Security Awareness Training
  • 4. 4 © TechSoup Global. All Rights Reserved. Phishing Data Breach Service Disruption Malware Ransomware Cyber Threats NGOs Face NGOs have specific types of data that if compromised, could impede our mission and lose the trust of the communities we serve • Vulnerable Population’s Personal Information • Donor Data • Financial Information
  • 5. NIST Cybersecurity Framework • What is the Framework? • The Framework is voluntary guidance, based on existing standards, guidelines, and practices for organizations to better manage and reduce cybersecurity risk. In addition to helping organizations manage and reduce risks, it was designed to foster risk and cybersecurity management communications amongst both internal and external organizational stakeholders.
  • 7. 7 © TechSoup Global. All Rights Reserved. Multi-Factor Authentication • One of the quickest and easiest ways to stay safe online: enable multi-factor authentication on your accounts. This simple step takes just a few minutes per account, and you only have to do it once. As soon as it's in place, it becomes twice as tough for hackers to gain access to your accounts. • What is multi-factor authentication (MFA)? Also known as two-factor authentication, this widely available tool secures your accounts by requiring two pieces of information to log in. One common example of two-factor authentication: entering your password and then typing in a one-time code sent to your email address or smartphone. • Other examples of a second step that may be used in two-factor authentication or 2FA include: • A security question (for example, "What was the name of your favorite teacher?") • A biometric identifier such as your face or fingerprint. • A temporary passcode you get via an authenticator application. • You can typically enable multi-factor authentication by going to an account, going to settings and looking under security. You then toggle multi-factor authentication to "on" and provide any necessary information, such as your phone number or email address where you want a code sent. For example, here's how to turn on 2FA on Facebook and on Google.
  • 8. 8 © TechSoup Global. All Rights Reserved. Password Management • Another top priority for online safety: Use strong passwords and a password manager. If you can easily remember a password, chances are good that a hacker could use a computer program to quickly guess it and get the keys to your online kingdom. • A strong password should be: • Complex – with upper and lowercase letters, numbers, and symbols • Long – at least 16 characters long to make it much harder to crack • Hard to guess – no real words or personal details like names and birthdays • But the same characteristics that make passwords hard to crack also make them difficult to remember. That's why password managers are such a handy tool. • Password managers keep track of all your passwords in a secure online vault, can generate strong passwords for you on demand, and can even safeguard other important information such as your credit card numbers. They can quickly and easily auto-fill your passwords for you when you go to log into a site. • Examples of popular password managers include Norton Password Manager. You can get a free or paid password manager service depending on your needs, number of devices you have, and the features you need. .
  • 9. 9 © TechSoup Global. All Rights Reserved. Password Management • Another top priority for online safety: Use strong passwords and a password manager. If you can easily remember a password, chances are good that a hacker could use a computer program to quickly guess it and get the keys to your online kingdom. • A strong password should be: • Complex – with upper and lowercase letters, numbers, and symbols • Long – at least 16 characters long to make it much harder to crack • Hard to guess – no real words or personal details like names and birthdays • But the same characteristics that make passwords hard to crack also make them difficult to remember. That's why password managers are such a handy tool. • Password managers keep track of all your passwords in a secure online vault, can generate strong passwords for you on demand, and can even safeguard other important information such as your credit card numbers. They can quickly and easily auto-fill your passwords for you when you go to log into a site. • Examples of popular password managers include Norton Password Manager. You can get a free or paid password manager service depending on your needs, number of devices you have, and the features you need. .
  • 10. 10 © TechSoup Global. All Rights Reserved. Keeping Software Up To Date • Keeping your software up to date is one the easiest and most important things you can do to stay safe online. That's because software updates often fix bugs or loopholes attackers can exploit to gain access to your data, infect your device with malware or ransomware, and even remotely take over your computer. • Make sure to update your software on a regular schedule or whenever you get an alert letting you know an update is available. Get in the habit of doing software updates right away rather than putting them off for later. It's also smart to get a reputable security program that can add an extra layer of protection. • Want to brush up on how to perform regular updates? Here's how to update the software on an Android and how to update the software on an iPhone or iPad. It's important to regularly update your operating system as well as apps on your device. Not only will regular updates help keep you safe online and shore up your privacy, they'll also fix glitches and help your devices run more smoothly. • Quick "It's easy to stay safe online" task • Take 15 minutes to check your devices for software updates and get current. For convenience and speed, turn on automatic software updates. If you prefer to update software manually, set up an alert to remind you to check for updates once a month. • . .
  • 11. 11 © TechSoup Global. All Rights Reserved. Security Awareness Training • Learning to recognize and report phishing scams is a top step you can take to stay safe online. Fortunately, it's fairly easy to do and doesn't take long at all. • What is a phishing scam? It's when a cybercriminal sends you a fake email, direct message, text, or even a pop-up ad to try to trick you into taking an action such as clicking a link, providing personal information, or making a payment. A phishing message may be cleverly disguised to look like a real message from a familiar company such as your bank. • Learning to spot the telltale signs of phishing and to stop and think before taking action on an email or other message can go a long way towards keeping you safe from phishing scams. Here are some clues that can tip you off to a phishing attack: • Alarming "news" about an account. • Attachments that look odd. • Failure to address you by name. • Grammar errors or misspellings. • Offers for free gadgets, trips, or other items of value. • Language that sounds just a little bit "off." • Request to click a link or take urgent action. .