SlideShare ist ein Scribd-Unternehmen logo
1 von 24
Aaron Labrum | CIO Services, LLC
Chief Executive Officer
2 in 3 organizations
fell victim
to a cyberattack in 2018
% of cyberattack victims that were hit by a ransomware attack
30%
hit by ransomware
30%
32%
27%
25%
13%
5%
43%
24%
38% 38%
49%
39% 38%
Average U.S. Canada Brazil Colombia Mexico U.K. France Germany Australia Japan India South Africa
1 in 2
hit in Japan
Ransomware is a type of malicious software that
cybercriminals use to extort money from their victims
How to-stay-protected-against-ransomware
₿£$¥€₹
WannaCry
RYUK
REVIL
BitPaymer
MegaCortex
Dharma
How to-stay-protected-against-ransomware
How to-stay-protected-against-ransomware
✔
How to Spot a
Phishing Email
✔
How to Identify a
Bogus Website Link
✔
How to Pick a
Proper Password
How to-stay-protected-against-ransomware
Phishing is any type of attempt to trick you into doing
something to benefit the crooks, usually through email.
12
What do these brands have in common?
3 Most Spoofed Brands in Phishing Attacks
How to-stay-protected-against-ransomware
How to-stay-protected-against-ransomware
JavaScript file disguised
as a text file
Shortcut file pretending
to be the actual files
16
Promises
Harassment
Instincts
Sense of Urgency
Hit DELETE
P
H
I
S
H
How to-stay-protected-against-ransomware
How to-stay-protected-against-ransomware
www.google.com www.g00gle.com
www.twitter.com www.twotter.com
www.facebook.com www.facebok.com
Picking proper P.a55,w0RdS!
✔
12
Characters
✔
UpPeR & LoWeR
cAse
✔
Special*
Ch@rac+ers!
✔
Keep it
Impersonal
How to-stay-protected-against-ransomware
Use a Password Manager
✔
1Password
✔
Dashlane
✔
LastPass
✔
KeePass
Sophos Home
• Business-grade AV Protection for the Home
• Artificial Intelligence Threat Detection
• Real-Time Threat Prevention
• Advanced Ransomware Security
• Advanced Malware Scan and Clean
• Remote Security Management
• FREE of Charge and No Ads!
Download now from
sophos.com/home
How to-stay-protected-against-ransomware

Weitere ähnliche Inhalte

Kürzlich hochgeladen

Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 

Kürzlich hochgeladen (20)

Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 

Empfohlen

How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Applitools
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at WorkGetSmarter
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...DevGAMM Conference
 
Barbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationBarbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationErica Santiago
 
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them wellGood Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them wellSaba Software
 
Introduction to C Programming Language
Introduction to C Programming LanguageIntroduction to C Programming Language
Introduction to C Programming LanguageSimplilearn
 

Empfohlen (20)

How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
 
Barbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationBarbie - Brand Strategy Presentation
Barbie - Brand Strategy Presentation
 
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them wellGood Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
 
Introduction to C Programming Language
Introduction to C Programming LanguageIntroduction to C Programming Language
Introduction to C Programming Language
 

How to-stay-protected-against-ransomware

Hinweis der Redaktion

  1. Businesses and home users alike are under threat from increasingly aggressive and brutal ransomware attacks. Loss of access to critical files, followed by a demand for payment can cause massive disruption. But what does a typical attack look like? And what security solutions should be in place to give the best possible defense? This presentation highlights the commonly used techniques to deliver ransomware and outlines some security recommendations to help you stay secure. *Click to advance slide*
  2. Cyberattacks are becoming more prevalent than ever, and they are getting ever more crafty at getting round cybersecurity defenses. In a recent survey of 3,100 companies across 12 countries, 68% said that they had been the victim of a cyberattack that breached their network. So that’s two in three organizations hit by a cyberattack. It’s a huge issue – and we are all part of the solution. *Click to advance slide*
  3. 30% of the organizations hit by a cyberattack experienced a ransomware attack. However this global average masks some significant regional variations. Half (49%) of Japanese respondents said they experienced ransomware, followed by the UK on 43% So despite rumors of its demise, ransomware is still one of the most widespread and damaging threats that internet users face. *Click to advance slide*
  4. But what is ransomware? Ransomware is a type of malicious software that cybercriminals use to extort money from their victims *Click to advance slide*
  5. And its making the news nearly every single day in shape or form. *Click to animate* Cyber criminals are getting smarter and are evolving attacks constantly meaning ransomware isn’t going away anytime soon. *Click to advance slide*
  6. So how does a ransomware attack start and unfold? First of all, hackers, using a number of different methods, attempt to gain access to your computer and ultimately, your personal files and data. *Click once to animate the attack* Once they have achieved this, they install the ransomware. The ransomware then executes and encrypts your valuable files such as Word documents, Excel spreadsheets and sensitive data so that they can’t be used. Hackers them demand a ransom payment in return for access to your files. *Click to advance slide*
  7. But how do hackers get access to your computer in the first place? Attackers can get into your system in multiple ways. However, the 2 most common methods are via: Malicious attachments contained in Phishing Emails designed to look like legitimate communications Poisoned Websites redirecting you to malicious pages *Click to advance slide*
  8. Anti-ransomware technology has a key role in stopping it. But when it comes to IT security everyone has a part to play! Educating yourself is critical in spotting bogus emails and compromised websites both of which could give hackers an easy way into your network. *Click to advance slide*
  9. To help you identify and avoid ransomware we’ve put together a few quick tips that apply whether you’re in the office or at home. *Click once to animate tips* *Click to advance slide*
  10. So how can you spot a phishing email? Well, before you can spot a phishing email, its important to understand what phishing is. *Click to advance slide*
  11. *Click to advance slide*
  12. Now a question for you. What do these three brands have in common: *Click to animate* Apple, Amazon, Microsoft. *Click to animate* They are the three most-spoofed brands used in phishing attacks. Their global coverage and high brand recognition makes them ideal targets for cybercriminals in their phishing attacks.
  13. To the untrained eye, a mass phishing email can easily go undetected and provide hackers with swift access to your computer. Phishing emails will often: Look like they come from a company/people you work for or do business with *Click to animate* Contain suspicious looking attachments or links *Click to animate* Ask you, in an urgent tone, for personal information such as banking details or to click a link / open an attachment *Click to animate* *Click to advance slide*
  14. To spot a phishing email, always check the following: Email address – does the domain match to the company’s website? The ‘From’ name might be ‘Amazon.co.uk’ but more often or note, the email domain does not match this at all. *Click to animate* Look out for generic impersonalized language – phishing emails are often sent out in bulk. If you don’t spot your name, be suspicious! *Click to animate* Poor spelling & grammar and odd syntax – this isn’t always the case but more often or not is a telltale sign of a bogus email *Click to animate*
  15. In regards to attachments, watch out for file types that you aren’t familiar with or use in your day-to-day work. They are often disguised as other file types to fool you into clicking on them. If you aren’t sure about it, check with your IT department. *Click to advance slide*
  16. We know this is a lot of information to take in one go so we’ve created a handy checklist! This is aimed to be use when looking at an email to try and unpick the suspicious behavior and pick out those phishing emails. *Click* P: Promises unbelievable things? *Click* H: Harassment to get you to reply? *Click* I: Instincts does it ‘feel’ wrong? *Click* S: Sense of urgency? Insisting you do something? *Click* H: In that case, Hit delete! If in doubt, report it to your IT team and hit delete to make everyone else in the company aware of the phish! *Click to advance slide*
  17. How to spot bogus websites *Click to advance slide*
  18. The web is a fantastic place to find memes, but it’s also one of the key ways hackers are able to access your computer to install ransomware. *Click to advance slide*
  19. Make sure that links go to where you think they do. Often crooks will disguise a website address in order to make it look authentic. And sometimes they use a trick known as masking. This is where the link looks legitimate but when you click on it you’re taken somewhere completely different. However, if you hover over a link before you click on it you can see where it really goes. *Click to advance slide*
  20. A quick word on passwords. Pick a proper one! A weak password is an easy road in for a hacker to access your online accounts. We recommend: *Click to animate tip* Making them at LEAST 12 characters long *Click to animate tip* Utilizing a mix of upper and lowercase *Click to animate tip* Including special characters *Click to animate tip* Ensuring they are impersonal – avoid sentimental names. Hackers can derive these from you social media presence! *Click to animate tip* We also recommend using a unique password for each online account that you have. We do appreciate that this entails problems of its own however… *Click to advance slide*
  21. Using a password manager will put a stop to the issue of recalling innumerable unique passwords for multiple accounts. Rather than having to enter a password, the manager will: Recognize the username you are entering and then… Auto populate the password field for you. Furthermore, should you ever change your password, the manager will recognize this and amend its database automatically. You may feel a bit wary having all of your passwords stored in one central place, but any password manager worth its salt uses heavy-duty encryption to keep your information safe. In addition, many offer two factor authentication (2FA), adding another layer of security. We’ve thrown up 4 popular password on the slide but there are many options you can choose from. Most have a free version you can use, with some premium features you have to pay to unlock. 
  22. We hope you’ve found these security tips useful. So here’s one more. Sophos Home. It’s completely free and gives you advanced protection on your home PCs and Macs against ransomware, malware, viruses and more. Find out more at Sophos.com/home