Professional Documents
Culture Documents
Awareness
Hello!
I am Dun Vincent Bueno
Focal for Cybersecurity Management
Program at Department of
Information and Communications
Technology – Regional Cluster Office,
Luzon Cluster 1
2
What will
we learn
13
Adware
⬡ -Though not always malicious in nature, aggressive advertising
software can undermine your security just to serve you ads
14
3.
Cyber Criminal
Techniques
Common ways that cyber criminals damage
data and steal data
Do’s Dont’s
✓ Don’t use names of pets, family,
✓ Your password should be made up of ten (10) or
friends, etc.
more characters and includes combination of
capital letters, numbers and symbols. ✓ Avoid using letter or number
patterns. Example: 1234, abcd, 2468,
✓ Use passwords that are easy to remember. etc.
✓ Use different passwords for different accounts ✓ Refrain from using personal
✓ Different languages and dialects can also be used.
information such as birthday and
address.
Image ccto: techcrunch.com
36
Password Managers
⬡ A password manager can enable you to store your online
account usernames and passwords in one secure place.
Definition from:
37
https://us.norton.com/feature/password-manager
Private Browsing/ Incognito Browsing
⬡ Using the feature private browsing does not store your history
and login information.
Image ccto:
38
Use Trusted Software
⬡ -Make sure to read the user agreement
⬡ -Only download software that is legitimate
and has good reviews
Think
before
you click
Malicious links can do damage in
several different ways, so be sure
to inspect links and ensure they’re
from trusted senders before
clicking. 40
Use Two-Factor Authentication
⬡ This method provides two layers of security
41
Keep Track of Your Digital Footprint
⬡ Monitor your accounts, so you can catch suspicious activity. It’s
important to keep track of your digital footprint, including social
media, and to delete accounts you’re not using
44
Image ccto:
45
Antivirus Software
⬡ program used to prevent, detect, and remove malware.
47
Parental Controls
48
6.
Laws and Sanctions
52
DATA PRIVACY ACT OF 2012
[Republic Act No. 10173]
PENALTIES
Punishable Acts Imprisonment Fine (Pesos)
Unauthorized Processing 1yr to 3yrs – 3yrs to 6yrs 500k to 4m
56
Webinar Summary:
Netiquettes
⬡ Internet Etiquettes o Netiquettes are things
individuals should follow for safe and better
online environment.
⬡ Internet Etiquettes o Netiquettes are things
individuals should follow for safe and better
online environment.
• Be selective when adding friends
61