IT Security Awareness

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 23
At a glance
Powered by AI
The key takeaways from the training are to be aware of phishing attacks, strengthen password security, and know how to protect against ransomware infections.

Some social engineering techniques hackers use include trickery, influencing, and deception to exploit weaknesses and manipulate victims like puppets on a string. Specific techniques mentioned are phishing attacks and spreading ransomware.

The main methods of ransomware infection mentioned are visiting unsafe websites, opening emails and email attachments, and clicking on malicious links shared on social media like Facebook and Twitter.

IT SECURITY

AWARENESS
Training
AGENDA
▪ IT Security – Why?
▪ Security Awareness Survey
▪ Social Engineering
▪ PHISHING
▪ RANSOMWARE
▪ Passwords
▪ Summary
▪ Q &A
IT SECURITY - WHY?
Protect Our Identity

Data Integrity Raise Our Collective Awareness

Protect Privacy
Everyone’s Responsibility

Together we can create a more secure working environment


IT Security Awareness Survey

• 115 Completed Survey (Thanks to those who


completed it)

• This Security awareness training is a result of


the information gathered from the survey

• Main Area Of Concern?


SOCIAL ENGINEERING
Techniques used by hackers include;

Trickery Influencing Deception

To exploit your weaknesses

• PHISHING ATTACK
• RANSOMWARE

The hackers see us as a… Puppet on their string


PHISHING
Scam Link, Incorrect Domain Name, NO Https & NO Padlock

Legitimate Link, Correct Domain Name, Https & The Padlock


www.facebook.com

www.facebook.com

www.facebook.com
RANSOMWARE

The Day The NHS Stop


ped
RANSOMWARE
Malicious Code Created
Users Targeted Through Emails & Attachments
Encrypts Your Files
Bitcoin Payments Requested To Decrypt Files
Bitcoin Payment Made
Not Guaranteed

Only 42% of ransomware victims


recovered their data
Ransomware Infection Methods

• Visiting unsafe, suspicious, or fake websites.

• Emails & Email attachments

• Malicious Links on Facebook, Twitter, etc


AND FINALLY…
PASSWORDS
▪ Never share your passwords with anyone
▪ Change password immediately if you discover someone's aware of your
account details
▪ Change your password frequently
▪ Never write your password down
▪ Avoid using known facts e.g. Date of birth, Pets names, Children's names
▪ Never use the same password for your work and personal accounts
▪ Try using Passphrases, easy to remember.
▪ Password memory test – Research…
Length: 17
Strength: Strong - This
password is typically
good enough to safely
guard sensitive
information like financial
records.
Mydoghasbigbricks Entropy: 81.1 bits

F0rtun4t3! Length: 10
Strength: Reasonable -
This password is fairly
secure cryptographically
and skilled hackers may
need some good
computing power to
crack it. (Depends
greatly on
implementation!)
Entropy: 44.9 bits
TO SUMMARISE
IT Security – Why?
Is everyone's responsibility. Raise a collective awareness. Be
safe online. Use common sense.

Phishing
Check sender address, Suspicious links, hover over links/buttons to check URL

Ransomware
Check sender address, Suspicious links, hover over links/buttons to check URL.
Only open attachments that you’re expecting.

Password Housekeeping
Never give your password out. Use different passwords. Consider using passphrases for your password.
If in doubt contact IT Services
Call EXT: 300
Email – Service.desk@LSEC.ac.uk
Q&A
DO YOU WANT TO WIN
£20?

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy