SlideShare a Scribd company logo
1 of 25
COFENSE.COM
© Copyright 2018 Cofense™ All rights reserved.
General Cybersecurity
Awareness
© Copyright 2018 Cofense™ All rights reserved.
What is Cybersecurity?
Cyber security is the practice of
defending computers, servers, mobile
devices, electronic systems, networks,
and data from malicious attacks.
© Copyright 2018 Cofense™ All rights reserved.
Personal Cybersecurity Tips /
Best Practices
Use Strong
Passwords
Use a VPN
When
Necessary
Think Before
You Click
Update Your
Home Router
Update Your
Devices
Use Two-
Factor
Authentication
© Copyright 2018 Cofense™ All rights reserved.
Threats and Practices
Malware
Spear Phishing
Malicious Links
Passwords
Browsing in Public
Data Compromise
© Copyright 2018 Cofense™ All rights reserved.
Threat: Malware
• Software designed to compromise
a device/network
• Examples:
– Worm/virus
– Botnet
– Banking Trojan
– Ransomware
© Copyright 2018 Cofense™ All rights reserved.
Who is Targeted?
• It is estimated that ransomware
damages will cost more than $20
billion globally in 2020
• Encrypts/locks files
• Holds files for ransom
• Typically obtained via:
– Spam & phishing emails
– Unpatched security vulnerabilities
Ransomware
© Copyright 2018 Cofense™ All rights reserved.
Threat: Malware
Ransomware
1
2
© Copyright 2018 Cofense™ All rights reserved.
Best Practices: Malware
• Learn to identify phishing emails
• Exercise caution with links
• Do not download or click suspicious
links or files
• Keep software up-to-date
• Back files up regularly
© Copyright 2018 Cofense™ All rights reserved.
Threat: Spear Phishing
• Spear-phishing is a targeted attempt to
steal sensitive information such as
account credentials or financial
information from a specific victim, often for
malicious reasons.
• Common cause of data breaches
• Targeted emails
• Sent to small groups or individuals
• Use social engineering tactics
• 93 percent of incidents/breaches
© Copyright 2018 Cofense™ All rights reserved.
Example of a Spear Phishing Email
1
3
2
5
4
© Copyright 2018 Cofense™ All rights reserved.
Threat: Business Email Compromise
• Solicits wire transfer
• Impersonates executive,
vendor, or supplier
• Resembles spear phishing
• Targets financial officers
© Copyright 2018 Cofense™ All rights reserved.
Best Practices: Spear Phishing
• Check the sender
• Look out for warning signs
• Think before you click or take action
• Never hand over sensitive info
© Copyright 2018 Cofense™ All rights reserved.
Threat: Malicious Links
• Anchor may hide true destination
• Hacked landing pages
• Copycat domains (exampel.com)
• Shortened links
© Copyright 2018 Cofense™ All rights reserved.
Best Practices: Malicious Links
• Always check the destination
• Desktop: hover over anchor
• Mobile: hold for several seconds
See It In Action!
https://www.example.com/totally-legit.html
(http://www.example.com.some-other-site.co.uk/downloads/file.php)
© Copyright 2018 Cofense™ All rights reserved.
Threat: Password Security
• Susceptible to:
– Brute force
– Hacking
– Malware
– Phishing
– Data breach
© Copyright 2018 Cofense™ All rights reserved.
Best Practices: Password Security
9@kj*YbM25nGnl
Yes
• Effective passwords are:
– Long
– Complex
– Unique
– Rotating
• Enable MFA where possible
p@ssw0rd12
No
© Copyright 2018 Cofense™ All rights reserved.
Threat: Browsing in Public
• Unsecured networks
– “Man in the Middle”
• Visual hacking
• 44% of stolen devices were left in a
public place [3]
© Copyright 2018 Cofense™ All rights reserved.
Best Practices: Browsing in Public
• Avoid public wireless networks
• Use reputable VPN
• Be mindful of surroundings
• Precautionary apps
– “Find my phone”
– “Remote wipe”
© Copyright 2018 Cofense™ All rights reserved.
Threat: Data Compromise
• May result from:
– Spear phishing
– Hacking or malware
– Simple negligence
• Average cost: $3.86 MM [4]
© Copyright 2018 Cofense™ All rights reserved.
Best Practices: Data Compromise
• Storing sensitive information:
– Yes to encrypted devices
– No to removable media (flash drives)
• Sharing:
– Who is authorized?
– Check email CC’s
– Secured network?
• Destruction:
– Recycle bin is not enough!
© Copyright 2018 Cofense™ All rights reserved.
Cybersecurity Basics Checklist
• Keep all your software up-to-date
• Install a reliable antivirus solution
• Enhance your security with a product that can block
attacks antivirus can’t detect
• Use strong passwords and change them often
• Activate and use two step verification where available
• Avoid oversharing information on social media
• Back up your data. Do it often. Back up in several places
© Copyright 2018 Cofense™ All rights reserved.
Cybersecurity Basics Checklist
• Never open emails from unknown senders
• Never download or open attachments sent by unknown
senders
• Keep your financial information safe and don’t share it with
anyone
• Avoid untrusted websites and don’t click on suspicious
banners or links
• Adjust the privacy and security settings in your browser
and apps
© Copyright 2018 Cofense™ All rights reserved.
Let’s Recap
© Copyright 2018 Cofense™ All rights reserved.
Sources for Cybersecurity News
1. Forbes Cybersecurity offers daily cybersecurity-focused pieces from staff writers and
contributors.
2. WIRED SECURITY publishes content on cyberwarfare, dark web and global
cybersecurity news.
3. The New York Times Computer Security News shares breaking cybersecurity
news/stories.
4. U.S. News Cybersecurity covers the latest news items on cybersecurity and
cybercrime.
5. CNBC Tech | Cybersecurity shares relevant news on cybersecurity and privacy issues.
6. Technopedia offers a comprehensive glossary of cybersecurity terms and concepts.
QUESTIONS?

More Related Content

Similar to Cybersecurity Awareness Overview.pptx

You think you are safe online. Are You?
You think you are safe online. Are You?You think you are safe online. Are You?
You think you are safe online. Are You?
TechGenie
 
IntroCyberv2.1_Chp2_Instructor_Supplemental_Material.pptx
IntroCyberv2.1_Chp2_Instructor_Supplemental_Material.pptxIntroCyberv2.1_Chp2_Instructor_Supplemental_Material.pptx
IntroCyberv2.1_Chp2_Instructor_Supplemental_Material.pptx
fuebf
 

Similar to Cybersecurity Awareness Overview.pptx (20)

Unveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity postureUnveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity posture
 
106 Threat defense and information security development trends
106 Threat defense and information security development trends106 Threat defense and information security development trends
106 Threat defense and information security development trends
 
Protecting Your Business From Cybercrime
Protecting Your Business From CybercrimeProtecting Your Business From Cybercrime
Protecting Your Business From Cybercrime
 
NEDMA18 Keynote: Cyber Security – what you need to know, what you need to do
NEDMA18 Keynote: Cyber Security – what you need to know, what you need to doNEDMA18 Keynote: Cyber Security – what you need to know, what you need to do
NEDMA18 Keynote: Cyber Security – what you need to know, what you need to do
 
Cybersecurity.pptx
Cybersecurity.pptxCybersecurity.pptx
Cybersecurity.pptx
 
iGCSE Theory Unit 6 – Effects of Using ICT
iGCSE Theory Unit 6 – Effects of Using ICTiGCSE Theory Unit 6 – Effects of Using ICT
iGCSE Theory Unit 6 – Effects of Using ICT
 
Cyberattacks.pptx
Cyberattacks.pptxCyberattacks.pptx
Cyberattacks.pptx
 
Cybercrime - Stealing in the Connected Age
Cybercrime - Stealing in the Connected AgeCybercrime - Stealing in the Connected Age
Cybercrime - Stealing in the Connected Age
 
Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016
 
You think you are safe online. Are You?
You think you are safe online. Are You?You think you are safe online. Are You?
You think you are safe online. Are You?
 
Data security best practices for risk awareness and mitigation
Data security best practices for risk awareness and mitigationData security best practices for risk awareness and mitigation
Data security best practices for risk awareness and mitigation
 
Defending Your IBM i Against Malware
Defending Your IBM i Against MalwareDefending Your IBM i Against Malware
Defending Your IBM i Against Malware
 
Cybersecurity for CRM v0219-3
Cybersecurity for CRM v0219-3Cybersecurity for CRM v0219-3
Cybersecurity for CRM v0219-3
 
Cyber
CyberCyber
Cyber
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
Cybersecurity: Malware & Protecting Your Business From Cyberthreats
Cybersecurity: Malware & Protecting Your Business From CyberthreatsCybersecurity: Malware & Protecting Your Business From Cyberthreats
Cybersecurity: Malware & Protecting Your Business From Cyberthreats
 
Cyber security
Cyber securityCyber security
Cyber security
 
IntroCyberv2.1_Chp2_Instructor_Supplemental_Material.pptx
IntroCyberv2.1_Chp2_Instructor_Supplemental_Material.pptxIntroCyberv2.1_Chp2_Instructor_Supplemental_Material.pptx
IntroCyberv2.1_Chp2_Instructor_Supplemental_Material.pptx
 
Leveraging Compliance to “Help” Prevent a Future Breach
Leveraging Compliance to “Help” Prevent a Future BreachLeveraging Compliance to “Help” Prevent a Future Breach
Leveraging Compliance to “Help” Prevent a Future Breach
 
OWASP Poland Day 2018 - Amir Shladovsky - Crypto-mining
OWASP Poland Day 2018 - Amir Shladovsky - Crypto-miningOWASP Poland Day 2018 - Amir Shladovsky - Crypto-mining
OWASP Poland Day 2018 - Amir Shladovsky - Crypto-mining
 

Recently uploaded

如何办理澳洲悉尼大学毕业证(USYD毕业证书)学位证书成绩单原版一比一
如何办理澳洲悉尼大学毕业证(USYD毕业证书)学位证书成绩单原版一比一如何办理澳洲悉尼大学毕业证(USYD毕业证书)学位证书成绩单原版一比一
如何办理澳洲悉尼大学毕业证(USYD毕业证书)学位证书成绩单原版一比一
w7jl3eyno
 
Exploratory Data Analysis - Dilip S.pptx
Exploratory Data Analysis - Dilip S.pptxExploratory Data Analysis - Dilip S.pptx
Exploratory Data Analysis - Dilip S.pptx
DilipVasan
 
如何办理哥伦比亚大学毕业证(Columbia毕业证)成绩单原版一比一
如何办理哥伦比亚大学毕业证(Columbia毕业证)成绩单原版一比一如何办理哥伦比亚大学毕业证(Columbia毕业证)成绩单原版一比一
如何办理哥伦比亚大学毕业证(Columbia毕业证)成绩单原版一比一
fztigerwe
 
Data Analytics for Digital Marketing Lecture for Advanced Digital & Social Me...
Data Analytics for Digital Marketing Lecture for Advanced Digital & Social Me...Data Analytics for Digital Marketing Lecture for Advanced Digital & Social Me...
Data Analytics for Digital Marketing Lecture for Advanced Digital & Social Me...
Valters Lauzums
 
Abortion pills in Dammam Saudi Arabia// +966572737505 // buy cytotec
Abortion pills in Dammam Saudi Arabia// +966572737505 // buy cytotecAbortion pills in Dammam Saudi Arabia// +966572737505 // buy cytotec
Abortion pills in Dammam Saudi Arabia// +966572737505 // buy cytotec
Abortion pills in Riyadh +966572737505 get cytotec
 
Fuzzy Sets decision making under information of uncertainty
Fuzzy Sets decision making under information of uncertaintyFuzzy Sets decision making under information of uncertainty
Fuzzy Sets decision making under information of uncertainty
RafigAliyev2
 
一比一原版阿德莱德大学毕业证成绩单如何办理
一比一原版阿德莱德大学毕业证成绩单如何办理一比一原版阿德莱德大学毕业证成绩单如何办理
一比一原版阿德莱德大学毕业证成绩单如何办理
pyhepag
 
Audience Researchndfhcvnfgvgbhujhgfv.pptx
Audience Researchndfhcvnfgvgbhujhgfv.pptxAudience Researchndfhcvnfgvgbhujhgfv.pptx
Audience Researchndfhcvnfgvgbhujhgfv.pptx
Stephen266013
 
一比一原版加利福尼亚大学尔湾分校毕业证成绩单如何办理
一比一原版加利福尼亚大学尔湾分校毕业证成绩单如何办理一比一原版加利福尼亚大学尔湾分校毕业证成绩单如何办理
一比一原版加利福尼亚大学尔湾分校毕业证成绩单如何办理
pyhepag
 
一比一原版纽卡斯尔大学毕业证成绩单如何办理
一比一原版纽卡斯尔大学毕业证成绩单如何办理一比一原版纽卡斯尔大学毕业证成绩单如何办理
一比一原版纽卡斯尔大学毕业证成绩单如何办理
cyebo
 
edited gordis ebook sixth edition david d.pdf
edited gordis ebook sixth edition david d.pdfedited gordis ebook sixth edition david d.pdf
edited gordis ebook sixth edition david d.pdf
great91
 
Toko Jual Viagra Asli Di Malang 081229400522 COD Obat Kuat Viagra Malang
Toko Jual Viagra Asli Di Malang 081229400522 COD Obat Kuat Viagra MalangToko Jual Viagra Asli Di Malang 081229400522 COD Obat Kuat Viagra Malang
Toko Jual Viagra Asli Di Malang 081229400522 COD Obat Kuat Viagra Malang
adet6151
 
一比一原版西悉尼大学毕业证成绩单如何办理
一比一原版西悉尼大学毕业证成绩单如何办理一比一原版西悉尼大学毕业证成绩单如何办理
一比一原版西悉尼大学毕业证成绩单如何办理
pyhepag
 

Recently uploaded (20)

ℂall Girls Balbir Nagar ℂall Now Chhaya ☎ 9899900591 WhatsApp Number 24/7
ℂall Girls Balbir Nagar ℂall Now Chhaya ☎ 9899900591 WhatsApp  Number 24/7ℂall Girls Balbir Nagar ℂall Now Chhaya ☎ 9899900591 WhatsApp  Number 24/7
ℂall Girls Balbir Nagar ℂall Now Chhaya ☎ 9899900591 WhatsApp Number 24/7
 
如何办理澳洲悉尼大学毕业证(USYD毕业证书)学位证书成绩单原版一比一
如何办理澳洲悉尼大学毕业证(USYD毕业证书)学位证书成绩单原版一比一如何办理澳洲悉尼大学毕业证(USYD毕业证书)学位证书成绩单原版一比一
如何办理澳洲悉尼大学毕业证(USYD毕业证书)学位证书成绩单原版一比一
 
Exploratory Data Analysis - Dilip S.pptx
Exploratory Data Analysis - Dilip S.pptxExploratory Data Analysis - Dilip S.pptx
Exploratory Data Analysis - Dilip S.pptx
 
社内勉強会資料  Mamba - A new era or ephemeral
社内勉強会資料   Mamba - A new era or ephemeral社内勉強会資料   Mamba - A new era or ephemeral
社内勉強会資料  Mamba - A new era or ephemeral
 
如何办理哥伦比亚大学毕业证(Columbia毕业证)成绩单原版一比一
如何办理哥伦比亚大学毕业证(Columbia毕业证)成绩单原版一比一如何办理哥伦比亚大学毕业证(Columbia毕业证)成绩单原版一比一
如何办理哥伦比亚大学毕业证(Columbia毕业证)成绩单原版一比一
 
Data Analytics for Digital Marketing Lecture for Advanced Digital & Social Me...
Data Analytics for Digital Marketing Lecture for Advanced Digital & Social Me...Data Analytics for Digital Marketing Lecture for Advanced Digital & Social Me...
Data Analytics for Digital Marketing Lecture for Advanced Digital & Social Me...
 
Abortion pills in Dammam Saudi Arabia// +966572737505 // buy cytotec
Abortion pills in Dammam Saudi Arabia// +966572737505 // buy cytotecAbortion pills in Dammam Saudi Arabia// +966572737505 // buy cytotec
Abortion pills in Dammam Saudi Arabia// +966572737505 // buy cytotec
 
Fuzzy Sets decision making under information of uncertainty
Fuzzy Sets decision making under information of uncertaintyFuzzy Sets decision making under information of uncertainty
Fuzzy Sets decision making under information of uncertainty
 
AI Imagen for data-storytelling Infographics.pdf
AI Imagen for data-storytelling Infographics.pdfAI Imagen for data-storytelling Infographics.pdf
AI Imagen for data-storytelling Infographics.pdf
 
一比一原版阿德莱德大学毕业证成绩单如何办理
一比一原版阿德莱德大学毕业证成绩单如何办理一比一原版阿德莱德大学毕业证成绩单如何办理
一比一原版阿德莱德大学毕业证成绩单如何办理
 
Audience Researchndfhcvnfgvgbhujhgfv.pptx
Audience Researchndfhcvnfgvgbhujhgfv.pptxAudience Researchndfhcvnfgvgbhujhgfv.pptx
Audience Researchndfhcvnfgvgbhujhgfv.pptx
 
ℂall Girls Kashmiri Gate ℂall Now Chhaya ☎ 9899900591 WhatsApp Number 24/7
ℂall Girls Kashmiri Gate ℂall Now Chhaya ☎ 9899900591 WhatsApp  Number 24/7ℂall Girls Kashmiri Gate ℂall Now Chhaya ☎ 9899900591 WhatsApp  Number 24/7
ℂall Girls Kashmiri Gate ℂall Now Chhaya ☎ 9899900591 WhatsApp Number 24/7
 
NOAM AAUG Adobe Summit 2024: Summit Slam Dunks
NOAM AAUG Adobe Summit 2024: Summit Slam DunksNOAM AAUG Adobe Summit 2024: Summit Slam Dunks
NOAM AAUG Adobe Summit 2024: Summit Slam Dunks
 
一比一原版加利福尼亚大学尔湾分校毕业证成绩单如何办理
一比一原版加利福尼亚大学尔湾分校毕业证成绩单如何办理一比一原版加利福尼亚大学尔湾分校毕业证成绩单如何办理
一比一原版加利福尼亚大学尔湾分校毕业证成绩单如何办理
 
一比一原版纽卡斯尔大学毕业证成绩单如何办理
一比一原版纽卡斯尔大学毕业证成绩单如何办理一比一原版纽卡斯尔大学毕业证成绩单如何办理
一比一原版纽卡斯尔大学毕业证成绩单如何办理
 
edited gordis ebook sixth edition david d.pdf
edited gordis ebook sixth edition david d.pdfedited gordis ebook sixth edition david d.pdf
edited gordis ebook sixth edition david d.pdf
 
Toko Jual Viagra Asli Di Malang 081229400522 COD Obat Kuat Viagra Malang
Toko Jual Viagra Asli Di Malang 081229400522 COD Obat Kuat Viagra MalangToko Jual Viagra Asli Di Malang 081229400522 COD Obat Kuat Viagra Malang
Toko Jual Viagra Asli Di Malang 081229400522 COD Obat Kuat Viagra Malang
 
一比一原版西悉尼大学毕业证成绩单如何办理
一比一原版西悉尼大学毕业证成绩单如何办理一比一原版西悉尼大学毕业证成绩单如何办理
一比一原版西悉尼大学毕业证成绩单如何办理
 
Genuine love spell caster )! ,+27834335081) Ex lover back permanently in At...
Genuine love spell caster )! ,+27834335081)   Ex lover back permanently in At...Genuine love spell caster )! ,+27834335081)   Ex lover back permanently in At...
Genuine love spell caster )! ,+27834335081) Ex lover back permanently in At...
 
Easy and simple project file on mp online
Easy and simple project file on mp onlineEasy and simple project file on mp online
Easy and simple project file on mp online
 

Cybersecurity Awareness Overview.pptx

  • 1. COFENSE.COM © Copyright 2018 Cofense™ All rights reserved. General Cybersecurity Awareness
  • 2. © Copyright 2018 Cofense™ All rights reserved. What is Cybersecurity? Cyber security is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
  • 3. © Copyright 2018 Cofense™ All rights reserved. Personal Cybersecurity Tips / Best Practices Use Strong Passwords Use a VPN When Necessary Think Before You Click Update Your Home Router Update Your Devices Use Two- Factor Authentication
  • 4. © Copyright 2018 Cofense™ All rights reserved. Threats and Practices Malware Spear Phishing Malicious Links Passwords Browsing in Public Data Compromise
  • 5. © Copyright 2018 Cofense™ All rights reserved. Threat: Malware • Software designed to compromise a device/network • Examples: – Worm/virus – Botnet – Banking Trojan – Ransomware
  • 6. © Copyright 2018 Cofense™ All rights reserved. Who is Targeted? • It is estimated that ransomware damages will cost more than $20 billion globally in 2020 • Encrypts/locks files • Holds files for ransom • Typically obtained via: – Spam & phishing emails – Unpatched security vulnerabilities Ransomware
  • 7. © Copyright 2018 Cofense™ All rights reserved. Threat: Malware Ransomware 1 2
  • 8. © Copyright 2018 Cofense™ All rights reserved. Best Practices: Malware • Learn to identify phishing emails • Exercise caution with links • Do not download or click suspicious links or files • Keep software up-to-date • Back files up regularly
  • 9. © Copyright 2018 Cofense™ All rights reserved. Threat: Spear Phishing • Spear-phishing is a targeted attempt to steal sensitive information such as account credentials or financial information from a specific victim, often for malicious reasons. • Common cause of data breaches • Targeted emails • Sent to small groups or individuals • Use social engineering tactics • 93 percent of incidents/breaches
  • 10. © Copyright 2018 Cofense™ All rights reserved. Example of a Spear Phishing Email 1 3 2 5 4
  • 11. © Copyright 2018 Cofense™ All rights reserved. Threat: Business Email Compromise • Solicits wire transfer • Impersonates executive, vendor, or supplier • Resembles spear phishing • Targets financial officers
  • 12. © Copyright 2018 Cofense™ All rights reserved. Best Practices: Spear Phishing • Check the sender • Look out for warning signs • Think before you click or take action • Never hand over sensitive info
  • 13. © Copyright 2018 Cofense™ All rights reserved. Threat: Malicious Links • Anchor may hide true destination • Hacked landing pages • Copycat domains (exampel.com) • Shortened links
  • 14. © Copyright 2018 Cofense™ All rights reserved. Best Practices: Malicious Links • Always check the destination • Desktop: hover over anchor • Mobile: hold for several seconds See It In Action! https://www.example.com/totally-legit.html (http://www.example.com.some-other-site.co.uk/downloads/file.php)
  • 15. © Copyright 2018 Cofense™ All rights reserved. Threat: Password Security • Susceptible to: – Brute force – Hacking – Malware – Phishing – Data breach
  • 16. © Copyright 2018 Cofense™ All rights reserved. Best Practices: Password Security 9@kj*YbM25nGnl Yes • Effective passwords are: – Long – Complex – Unique – Rotating • Enable MFA where possible p@ssw0rd12 No
  • 17. © Copyright 2018 Cofense™ All rights reserved. Threat: Browsing in Public • Unsecured networks – “Man in the Middle” • Visual hacking • 44% of stolen devices were left in a public place [3]
  • 18. © Copyright 2018 Cofense™ All rights reserved. Best Practices: Browsing in Public • Avoid public wireless networks • Use reputable VPN • Be mindful of surroundings • Precautionary apps – “Find my phone” – “Remote wipe”
  • 19. © Copyright 2018 Cofense™ All rights reserved. Threat: Data Compromise • May result from: – Spear phishing – Hacking or malware – Simple negligence • Average cost: $3.86 MM [4]
  • 20. © Copyright 2018 Cofense™ All rights reserved. Best Practices: Data Compromise • Storing sensitive information: – Yes to encrypted devices – No to removable media (flash drives) • Sharing: – Who is authorized? – Check email CC’s – Secured network? • Destruction: – Recycle bin is not enough!
  • 21. © Copyright 2018 Cofense™ All rights reserved. Cybersecurity Basics Checklist • Keep all your software up-to-date • Install a reliable antivirus solution • Enhance your security with a product that can block attacks antivirus can’t detect • Use strong passwords and change them often • Activate and use two step verification where available • Avoid oversharing information on social media • Back up your data. Do it often. Back up in several places
  • 22. © Copyright 2018 Cofense™ All rights reserved. Cybersecurity Basics Checklist • Never open emails from unknown senders • Never download or open attachments sent by unknown senders • Keep your financial information safe and don’t share it with anyone • Avoid untrusted websites and don’t click on suspicious banners or links • Adjust the privacy and security settings in your browser and apps
  • 23. © Copyright 2018 Cofense™ All rights reserved. Let’s Recap
  • 24. © Copyright 2018 Cofense™ All rights reserved. Sources for Cybersecurity News 1. Forbes Cybersecurity offers daily cybersecurity-focused pieces from staff writers and contributors. 2. WIRED SECURITY publishes content on cyberwarfare, dark web and global cybersecurity news. 3. The New York Times Computer Security News shares breaking cybersecurity news/stories. 4. U.S. News Cybersecurity covers the latest news items on cybersecurity and cybercrime. 5. CNBC Tech | Cybersecurity shares relevant news on cybersecurity and privacy issues. 6. Technopedia offers a comprehensive glossary of cybersecurity terms and concepts.