SlideShare ist ein Scribd-Unternehmen logo
1 von 6
CYBERSECURITY BEST
PRACTICES
 Cybersecurity is the responsibility of every employee
 Who in my organization is responsible for cybersecurity?
 What are the rules that govern my use of company resources (computers,
smartphones, tablets)? How can I be kept aware of updates to these
rules?
 If I suspect I have a cybersecurity issue (malware, spyware), who should I
contact within my organization?
 Does my organization have a policy on bringing personal devices into the
workplace?
 What am I allowed to connect to my company’s system and could my
device infect the system?
 Set strong passwords, change them regularly, and don’t
share them with anyone.
 Keep your operating system, browser, and other critical
software optimized by installing updates.
 Maintain an open dialogue with your friends, family, and
colleagues about Internet safety.
 Use privacy settings and limit the amount of personal
information you post online.
 Be cautious about offers online – if it sounds too good to be
true, it probably is.
 Only click through to trusted sources when conducting
searches, especially on topics with high attention
 Never update "media player," “codec," or “Flash” when
promoted by a site hosting videos or not affiliated with that
application
 Do not use P2P applications on business machines and be
cautious on home machines as well
 Do not click on links or attachments in spam email

Weitere ähnliche Inhalte

Was ist angesagt?

Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2NetLockSmith
 
2013 09 liberteks monthly security tips newsletter 518-452-0550
2013 09 liberteks monthly security tips newsletter 518-452-05502013 09 liberteks monthly security tips newsletter 518-452-0550
2013 09 liberteks monthly security tips newsletter 518-452-0550Liberteks
 
Phishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You SafePhishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You SafeCheapSSLsecurity
 
Students, the internet and COVID-19 by Ayush Chopra | MAY 2020 | Issue 1
Students, the internet and COVID-19 by Ayush Chopra | MAY 2020 | Issue 1Students, the internet and COVID-19 by Ayush Chopra | MAY 2020 | Issue 1
Students, the internet and COVID-19 by Ayush Chopra | MAY 2020 | Issue 1Ayush Chopra
 
Cyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena MishraCyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena MishraDevsena Mishra
 
Internet Safety Parent Presentation
Internet Safety Parent PresentationInternet Safety Parent Presentation
Internet Safety Parent Presentationshelbyfutures
 
Cyber Crime & Prevention
Cyber Crime & Prevention Cyber Crime & Prevention
Cyber Crime & Prevention RAUSHAN KUMAR
 
How safe are our children
How safe are our childrenHow safe are our children
How safe are our childrenstevewrightco
 
Protecting Yourself Online
Protecting Yourself OnlineProtecting Yourself Online
Protecting Yourself OnlineGary Wagnon
 
Phishing scams in banking ppt
Phishing scams in banking pptPhishing scams in banking ppt
Phishing scams in banking pptKrishma Sandesra
 
2016 Social Engineering Training
2016 Social Engineering Training2016 Social Engineering Training
2016 Social Engineering TrainingRob Valdez
 
Phishing awareness
Phishing awarenessPhishing awareness
Phishing awarenessPhishingBox
 
Train Employees to Avoid Inadvertent Cyber-Security Breaches
Train Employees to Avoid Inadvertent Cyber-Security BreachesTrain Employees to Avoid Inadvertent Cyber-Security Breaches
Train Employees to Avoid Inadvertent Cyber-Security BreachesHuman Resources & Payroll
 

Was ist angesagt? (20)

Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2
 
2013 09 liberteks monthly security tips newsletter 518-452-0550
2013 09 liberteks monthly security tips newsletter 518-452-05502013 09 liberteks monthly security tips newsletter 518-452-0550
2013 09 liberteks monthly security tips newsletter 518-452-0550
 
Phishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You SafePhishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You Safe
 
Students, the internet and COVID-19 by Ayush Chopra | MAY 2020 | Issue 1
Students, the internet and COVID-19 by Ayush Chopra | MAY 2020 | Issue 1Students, the internet and COVID-19 by Ayush Chopra | MAY 2020 | Issue 1
Students, the internet and COVID-19 by Ayush Chopra | MAY 2020 | Issue 1
 
Cybersecurity Awareness
Cybersecurity AwarenessCybersecurity Awareness
Cybersecurity Awareness
 
Cyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena MishraCyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena Mishra
 
Internet Safety Parent Presentation
Internet Safety Parent PresentationInternet Safety Parent Presentation
Internet Safety Parent Presentation
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Cyber Crime & Prevention
Cyber Crime & Prevention Cyber Crime & Prevention
Cyber Crime & Prevention
 
Cybersecurity tips
Cybersecurity tipsCybersecurity tips
Cybersecurity tips
 
How safe are our children
How safe are our childrenHow safe are our children
How safe are our children
 
Protecting Yourself Online
Protecting Yourself OnlineProtecting Yourself Online
Protecting Yourself Online
 
Phishing scams in banking ppt
Phishing scams in banking pptPhishing scams in banking ppt
Phishing scams in banking ppt
 
2016 Social Engineering Training
2016 Social Engineering Training2016 Social Engineering Training
2016 Social Engineering Training
 
Phishing awareness
Phishing awarenessPhishing awareness
Phishing awareness
 
Cyber security
Cyber securityCyber security
Cyber security
 
Computer 4 ict
Computer 4 ictComputer 4 ict
Computer 4 ict
 
Phishing & Pharming
Phishing & PharmingPhishing & Pharming
Phishing & Pharming
 
Train Employees to Avoid Inadvertent Cyber-Security Breaches
Train Employees to Avoid Inadvertent Cyber-Security BreachesTrain Employees to Avoid Inadvertent Cyber-Security Breaches
Train Employees to Avoid Inadvertent Cyber-Security Breaches
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 

Ähnlich wie 2 cybersecurity best practices

CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptxCYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptxBarakaMuyengi
 
Document safer online for nonprofits guide
Document safer online for nonprofits guideDocument safer online for nonprofits guide
Document safer online for nonprofits guideNguyen Xuan Quang
 
Privacy Online
Privacy OnlinePrivacy Online
Privacy OnlineJohn Curry
 
Cyber Security School Workshop
Cyber Security School WorkshopCyber Security School Workshop
Cyber Security School WorkshopRahul Nayan
 
Spyware.pdf
Spyware.pdfSpyware.pdf
Spyware.pdfDIU
 
Cyber security awareness for end users
Cyber security awareness for end usersCyber security awareness for end users
Cyber security awareness for end usersNetWatcher
 
Cybersecurity Awareness Month Tips
Cybersecurity Awareness Month TipsCybersecurity Awareness Month Tips
Cybersecurity Awareness Month TipsKevin Fream
 
In computer security, a vulnerability is a weakness which allows an .pdf
In computer security, a vulnerability is a weakness which allows an .pdfIn computer security, a vulnerability is a weakness which allows an .pdf
In computer security, a vulnerability is a weakness which allows an .pdfanandanand521251
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pestspeterhitch
 
Cyber Security and GDPR Made Easy
Cyber Security and GDPR Made EasyCyber Security and GDPR Made Easy
Cyber Security and GDPR Made EasyChristoanSmit
 
How to Bulletproof Your Data Defenses Locally & In the Cloud
How to Bulletproof Your Data Defenses Locally & In the CloudHow to Bulletproof Your Data Defenses Locally & In the Cloud
How to Bulletproof Your Data Defenses Locally & In the CloudNordic Backup
 
5 Ways to Stay #CyberSecure
5 Ways to Stay #CyberSecure5 Ways to Stay #CyberSecure
5 Ways to Stay #CyberSecureMedia Sonar
 
Cyber security threats and its solutions
Cyber security threats and its solutionsCyber security threats and its solutions
Cyber security threats and its solutionsmaryrowling
 
Ethics and safety measures in computing.pptx
Ethics and safety measures in computing.pptxEthics and safety measures in computing.pptx
Ethics and safety measures in computing.pptxAarush59
 

Ähnlich wie 2 cybersecurity best practices (20)

Securityguide
SecurityguideSecurityguide
Securityguide
 
IT Security
IT SecurityIT Security
IT Security
 
Building a culture of security
Building a culture of securityBuilding a culture of security
Building a culture of security
 
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptxCYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
 
Document safer online for nonprofits guide
Document safer online for nonprofits guideDocument safer online for nonprofits guide
Document safer online for nonprofits guide
 
Privacy Online
Privacy OnlinePrivacy Online
Privacy Online
 
Cyber Security School Workshop
Cyber Security School WorkshopCyber Security School Workshop
Cyber Security School Workshop
 
Spyware.pdf
Spyware.pdfSpyware.pdf
Spyware.pdf
 
Cyber security awareness for end users
Cyber security awareness for end usersCyber security awareness for end users
Cyber security awareness for end users
 
Cybersecurity Awareness Month Tips
Cybersecurity Awareness Month TipsCybersecurity Awareness Month Tips
Cybersecurity Awareness Month Tips
 
In computer security, a vulnerability is a weakness which allows an .pdf
In computer security, a vulnerability is a weakness which allows an .pdfIn computer security, a vulnerability is a weakness which allows an .pdf
In computer security, a vulnerability is a weakness which allows an .pdf
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pests
 
Cyber Security and GDPR Made Easy
Cyber Security and GDPR Made EasyCyber Security and GDPR Made Easy
Cyber Security and GDPR Made Easy
 
How to Bulletproof Your Data Defenses Locally & In the Cloud
How to Bulletproof Your Data Defenses Locally & In the CloudHow to Bulletproof Your Data Defenses Locally & In the Cloud
How to Bulletproof Your Data Defenses Locally & In the Cloud
 
5 Ways to Stay #CyberSecure
5 Ways to Stay #CyberSecure5 Ways to Stay #CyberSecure
5 Ways to Stay #CyberSecure
 
Cyber security threats and its solutions
Cyber security threats and its solutionsCyber security threats and its solutions
Cyber security threats and its solutions
 
Security policy.pdf
Security policy.pdfSecurity policy.pdf
Security policy.pdf
 
Spyware.
Spyware.Spyware.
Spyware.
 
Spyware.
Spyware.Spyware.
Spyware.
 
Ethics and safety measures in computing.pptx
Ethics and safety measures in computing.pptxEthics and safety measures in computing.pptx
Ethics and safety measures in computing.pptx
 

Mehr von mohamad Hamizi

6 protecting your computer
6   protecting your computer 6   protecting your computer
6 protecting your computer mohamad Hamizi
 
5 instant messaging and email
5   instant messaging and email 5   instant messaging and email
5 instant messaging and email mohamad Hamizi
 
4 mobile and remote best practices
4   mobile and remote best practices 4   mobile and remote best practices
4 mobile and remote best practices mohamad Hamizi
 
3 ensuring physical and data security
3   ensuring physical and data security 3   ensuring physical and data security
3 ensuring physical and data security mohamad Hamizi
 
1 understanding cyber threats
1   understanding cyber threats 1   understanding cyber threats
1 understanding cyber threats mohamad Hamizi
 

Mehr von mohamad Hamizi (6)

8 login passwords
8   login passwords 8   login passwords
8 login passwords
 
6 protecting your computer
6   protecting your computer 6   protecting your computer
6 protecting your computer
 
5 instant messaging and email
5   instant messaging and email 5   instant messaging and email
5 instant messaging and email
 
4 mobile and remote best practices
4   mobile and remote best practices 4   mobile and remote best practices
4 mobile and remote best practices
 
3 ensuring physical and data security
3   ensuring physical and data security 3   ensuring physical and data security
3 ensuring physical and data security
 
1 understanding cyber threats
1   understanding cyber threats 1   understanding cyber threats
1 understanding cyber threats
 

Kürzlich hochgeladen

The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxShobhayan Kirtania
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 

Kürzlich hochgeladen (20)

The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptx
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 

2 cybersecurity best practices

  • 2.  Cybersecurity is the responsibility of every employee  Who in my organization is responsible for cybersecurity?  What are the rules that govern my use of company resources (computers, smartphones, tablets)? How can I be kept aware of updates to these rules?  If I suspect I have a cybersecurity issue (malware, spyware), who should I contact within my organization?  Does my organization have a policy on bringing personal devices into the workplace?  What am I allowed to connect to my company’s system and could my device infect the system?
  • 3.
  • 4.  Set strong passwords, change them regularly, and don’t share them with anyone.  Keep your operating system, browser, and other critical software optimized by installing updates.
  • 5.  Maintain an open dialogue with your friends, family, and colleagues about Internet safety.  Use privacy settings and limit the amount of personal information you post online.  Be cautious about offers online – if it sounds too good to be true, it probably is.
  • 6.  Only click through to trusted sources when conducting searches, especially on topics with high attention  Never update "media player," “codec," or “Flash” when promoted by a site hosting videos or not affiliated with that application  Do not use P2P applications on business machines and be cautious on home machines as well  Do not click on links or attachments in spam email