Security Awareness Videos

Adobe, the National Cyber Security Alliance, and Speechless have partnered to bring you a series of security awareness videos for employees.

The first video of the video series is on passwords. The key points mentioned, if implemented throughout the organization can dramatically reduce the risk of compromise.

The use of data helps make our lives more convenient and streamlined which likely means the proliferation of online data and devices are here to stay. There is one best practice that each of us can apply that will help personal data stay more secure and only share on a need-to-know basis.

Information beyond name and email such as birthdate and address should not be provided freely as a best practice and you should only provide this information to trusted companies with which you have an established relationship.

Having something stolen from you tends to leave an indelible feeling of violation and injustice. If what is stolen is an electronic device (e.g. laptop, phone, flash drive), not only is the property gone but so is your data. Stolen data can be a more damaging long term than the loss of the physical device itself. The data could be personal or company data. If device is able to be used by the thief, there are many ways the device can become of value.

The most important best practice is to not leave devices unattended in public places. This includes a locked car. In many cities, car break-ins are extremely common. Even if you think your risk might be lower, don’t take a chance. Take your devices with you!

Phishing, we’ve heard of it, but what does it mean? In summary, it is a tool and method attackers use to try and coerce people into clicking on a malicious site or download, potentially leading to a security issue.

Ransomware is an especially dangerous consequence of falling for a phishing attempt. Ransomware is software that locks down data by encrypting it and won’t be unlocked through decryption until a ransom is paid. To protect yourself from ransomware:

1.Be wary of suspicious emails and look for the signs.

2. Make sure your antivirus software is up to date and running. It’ll help stop the ransomware in its tracks.

3. If ransomware is installed, then if you’ve backed up your data, you can ignore the threat and restore the data.

Unfortunately, in many cases and especially for large enterprises, the cost of the ransom is significantly less than the cost to restore the data, even if it’s backed up. Therefore, the first and second layers of protection are critical.

Removable media and devices are portable hardware. The most common is a USB flash drive but other forms could be an external hard drive or SD card. When it comes to cyber security best practices, removable media and devices must only be plugged or inserted into your computer if you trust or know the source.

“Vishing” which is defined as the fraudulent practice of making phone calls or leaving voice messages purporting to be from reputable companies in order to trick individuals to reveal personal information, such as bank details and credit card numbers.

Internet downloads. Only download reputable software from reputable sources. If you don’t know the source, or it looks suspicious, don’t risk it, head to the official source and go from there.

Public Wi-Fi is not secure and can put your device and data at risk.

Websitecyber related posts:

Caesars Massive Cyberattack

The casino giant Caesars confirmed that it had fallen victim to a massive ransomware cyberattack. Hackers hijacked critical data.

Cybersecurity Career Opportunities

Jobs in cybersecurity are growing at a rapid pace. The rapid rate of cybersecurity job growth is only expected to continue.

Shadow Fleet Fueling Russia’s War

Hundreds of vessels are part of a “shadow fleet” that’s allowed the Kremlin to dodge Western sanctions over its war on Ukraine.

Google Presents AI

Watch Google’s AI and Research teams talk about the fields of robotics, natural language understanding, accessibility, healthcare, and creativity.

Online Shopping Scams Cybercrime

Cybercrime is one of that fastest growing crime types in Australia with hundreds of millions of dollars lost each year. Learn about online shopping scams.

Artificial Intelligence Military Uses

Artificial Intelligence at Deepmind has been trained using StarCraft. What is concerning is that the AI has been trained to defeat its opponents.

ASIO Annual Threat Assessment 2022

The ASIO Director General of Security, Mr Mike Burgess, delivered his third annual threat assessment from ASIO headquarters in the Ben Chifley Building.

Defensive Security Podcast

Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, and malware infections.

Canada Cyber Security Program

Defence Minister Anita Anand announced that Canada would partner with the U.S. on establishing a cyber security certification for defence contractors.

Educating Employees About Mobile Cyber Threats

Nearly 9 in 10 companies rely on their employees to access critical business applications using their personal devices so you need to educate employees about mo...

Cyber Mind Hacker

Short film depicting a Cyber Mind Blackhat hacker compromising a target.

Will Artificial Intelligence Enhance or End Us?

The world is de-materialising, things are disappearing from tangible to digital. How long until we also merge with artificial intelligence?
Share Websitecyber