Search Header Logo
Cyber Security Awareness 2.0

Cyber Security Awareness 2.0

Assessment

Presentation

Professional Development

Professional Development

Easy

Created by

NTM Quizziz

Used 18+ times

FREE Resource

15 Slides • 6 Questions

1

Cyber Security Awareness

​By : EDP

2

media

3

What is Cyber Security

Cybersecurity is a way of  protecting the email , network , computers , and other electronic gadgets from cybercriminals . The malicious attackers delete , modify or leak confidential information posing a huge threat to a business or an individual . Cybersecurity helps keep the data out of reach from attackers by ensuring the integrity , confidentiality and availability of data .

4

media

​Email

5

Email

Email is the preferred form of business communication . The average person receives so many emails every single day . With that many emails , it stands to reason that some are scams . Open an unknow email or an attachment inside an email , can release a virus that gives cybercriminals a backdoor into company’s digital home .

6

media

7

Password (Having Weak Login Credentials)

Password are the keys to our digital kingdom . They allow access to our online accounts and digital identities . We use them on a daily basis – to unlock our devices , access our bank account , read emails and daily work . And yet we are not fully aware of the need for good password hygiene

8

Password

Toughen Them Up

Make your passwords difficult to guess and hard to crack . Use passphrases! They are really strong and more friendly to use .

Make Them Unique

Any password is insecure when used across different sites . if one gets compromised , all your other accounts become exposed .

Keep Them Secret

Nobody else should know your password , not even people you trust . It’s a responsibility you should not force on anyone .​

9

Password

Turn On 2FA

Add an extra layer of security by enabling a second factor of authentication , such as entering a code sent to your phone .

Use Them Securely

Don’t enter your passwords in public or shared computers . They may be infected or insecure and expose your accounts .

It’s Change O’Clock

Change your passwords whenever you believe they might have been exposed or compromised .​

10

Multiple Choice

Question image

1. “abc@123” is this a weak password?

1
2

11

Multiple Choice

Question image

2. All employees must use strong and unique passwords ?

1
2

12

Multiple Choice

Question image

3. you can share your password with others?

1
2

13

media

14

Phishing

Phishing attacks have become highly targeted and sophisticated . Messages usually involve some sort of “social engineering”, in which scammers try to trick you into trusting them for fraudulent purpose , often by pretending to be a legitimate person or business . The goal is to get you to click on a link , open a file , give away information or make a payment.

15

Phishing

Who Are You?

Verify the sender’s address , but never rule out the possibility of an email account having been compromised or spoofed .

Link Alert!

Before clicking on a link always check where it will take you by hovering over it with your mouse . When in doubt, simply don’t click .

Beware Of That File

Don’t open any attachment that you are not expecting or that have suspicious extensions such as .exe or zip files .

Keep Calm & Think Twice

Phishing emails tend to create a sense of urgency , rushing you into taking an action without giving it enough thought .

16

Phishing

Trust But Verify

An email may look legitimate and still be a scam , even if it includes real information about you or your company .

Don’t Spill The Beans

Be wary of requests to disclose passwords , financial information or other PNC and sensitive data .

Report

Report any suspicious email to your IT team . This will help avoid other people falling victim to phishing scams .

Use Safe Networks

Avoid using public or unsecured networks to send or receive sensitive information .​

17

Multiple Choice

Question image

4. Is it necessary to check the email address first before opening the attached file?

1
2

18

Multiple Choice

Question image

5. Avoid use public devices (cybercafe) or unsecured network to access and check your email.

1
2

19

media

Image for Question 6.

20

Multiple Choice

Question image

6. Determine type of email in the previous image?

1

Phishing Email

2

Genuine Email

21

Thank You.

Cyber Security Awareness

​By : EDP

Show answer

Auto Play

Slide 1 / 21

SLIDE