Cybersecurity myths vs truths

Introduction to Cybersecurity Awareness.pdf

Lesson Summary

Introduction to Cybersecurity and Responsible Digital Citizenship

  • Cyber Security Myths vs Truths
  • Basic Cybersecurity concepts
  • Prevalent Cyber Threats and Attacks
  • Impacts of Cyber Attacks on Businesses

Cyber Security Myths vs Truths

  • Everyone who uses technology is at risk of being a victim of Cybercrime
  • Hanti-virus software is not enough to protect from cyber attacks
  • Cybersecurity is the responsibility of everyone, not just tech people
  • Using weak passwords across all online accounts is risky
  • A strong password alone is not enough to protect from cyber attacks
  • Cybercriminals are getting better at tricking people, so learning about cybersecurity is important

Basic Cybersecurity Concepts

  • Cybersecurity refers to the application of technologies, processes, and controls to protect systems, networks, programs, devices, and data from cyber attacks
  • A cyber attack is any attempt to gain unauthorized access to a computer, computing system, or computer network with the intent to cause damage
  • Data breaches are security events where information is accessed, stolen, and used by a cybercriminal without authorization
  • A cyber or cybersecurity threat is a harmful act that seeks to damage data, steal data, or disrupt digital life in general
  • Cybercrime is a crime in which a computer is used as a tool to commit an offense, and criminals who perform these activities are cyber criminals

Prevalent Cyber Threats and Attacks

  • Phishing/Smishing/Vishing, debit/credit card theft, identity theft, advance payment fraud, investment scams, cryptocurrency scams, etc.
  • Ransomware
  • Botnets
  • Business Email Compromise
  • Digital Extortion

Impacts of Cyber Attacks on Businesses

  • Financial losses
  • Loss of customer and business information
  • Reputation damage
  • Loss of productivity
  • Legal liability
  • Business continuity problems

Actionable Tips To Protect Yourself

  1. Know how to identify scam emails from legitimate ones
  2. Backup your files securely online and offline
  3. Strengthen your home network and avoid using public WiFi
  4. Use strong passwords
  5. Keep software updated
  6. Use 2-factor authentication
  7. Install and use a good antivirus
  8. Catch red flags such as unexplained urgency or changes to wire-instructions
  9. Don't download files, software, or apps from shady websites

Responsible Use of Digital

  • Secure your secrets (online security and passwords)
  • Share with care and caution
  • Be kind online
  • Don't fall for fake (online scams, fake news, etc.)
  • When in doubt, verify

Complete and Continue  
Discussion

38 comments