Cybersecurity myths vs truths
Introduction to Cybersecurity Awareness.pdf
Lesson Summary
Introduction to Cybersecurity and Responsible Digital Citizenship
- Cyber Security Myths vs Truths
- Basic Cybersecurity concepts
- Prevalent Cyber Threats and Attacks
- Impacts of Cyber Attacks on Businesses
Cyber Security Myths vs Truths
- Everyone who uses technology is at risk of being a victim of Cybercrime
- Hanti-virus software is not enough to protect from cyber attacks
- Cybersecurity is the responsibility of everyone, not just tech people
- Using weak passwords across all online accounts is risky
- A strong password alone is not enough to protect from cyber attacks
- Cybercriminals are getting better at tricking people, so learning about cybersecurity is important
Basic Cybersecurity Concepts
- Cybersecurity refers to the application of technologies, processes, and controls to protect systems, networks, programs, devices, and data from cyber attacks
- A cyber attack is any attempt to gain unauthorized access to a computer, computing system, or computer network with the intent to cause damage
- Data breaches are security events where information is accessed, stolen, and used by a cybercriminal without authorization
- A cyber or cybersecurity threat is a harmful act that seeks to damage data, steal data, or disrupt digital life in general
- Cybercrime is a crime in which a computer is used as a tool to commit an offense, and criminals who perform these activities are cyber criminals
Prevalent Cyber Threats and Attacks
- Phishing/Smishing/Vishing, debit/credit card theft, identity theft, advance payment fraud, investment scams, cryptocurrency scams, etc.
- Ransomware
- Botnets
- Business Email Compromise
- Digital Extortion
Impacts of Cyber Attacks on Businesses
- Financial losses
- Loss of customer and business information
- Reputation damage
- Loss of productivity
- Legal liability
- Business continuity problems
Actionable Tips To Protect Yourself
- Know how to identify scam emails from legitimate ones
- Backup your files securely online and offline
- Strengthen your home network and avoid using public WiFi
- Use strong passwords
- Keep software updated
- Use 2-factor authentication
- Install and use a good antivirus
- Catch red flags such as unexplained urgency or changes to wire-instructions
- Don't download files, software, or apps from shady websites
Responsible Use of Digital
- Secure your secrets (online security and passwords)
- Share with care and caution
- Be kind online
- Don't fall for fake (online scams, fake news, etc.)
- When in doubt, verify
38 comments