0% found this document useful (0 votes)
0 views14 pages

Cyber Security Presentation (1)

Presentation

Uploaded by

Ron Ramos
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
0 views14 pages

Cyber Security Presentation (1)

Presentation

Uploaded by

Ron Ramos
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

CYBER

SECURITY
CEBUANA CONGRESS 2025

cybersecurity@pjlhuillier.com
WHAT IS
It involves recognizing dangers like
CYBER SECURITY phishing emails, malware, and scams,
AWARENESS? and knowing how to respond to them
appropriately.
The understanding of
potential cyber threats.
The knowledge of safe
practices to protect data,
systems, and networks.
WHY IS CYBER SECURITY
IMPORTANT?

Protects personal and Helps maintain trust


sensitive information in digital systems

Reduces the risk of Supports organizational


data breaches security policies and
compliance

Prevents financial
losses.
SOCIAL ENGINEERING

A tactic of manipulating,
HOW TO PROTECT YOURSELF?
influencing, or deceiving
a victim by using 1. Be suspicious of unsolicited messages.
psychological 2. Verify information through official channels.
manipulation in order to 3. Complete Security Awareness Training
gain control over a (CLAO) and CS Trainings.
computer system, or to 4. Strengthen your defenses. (Passwords, MFA,
steal personal and Anti-Malware).
financial information.
TYPES OF PHISHING

Email Phishing Impersonation Ransomware


Attackers send fake emails Refers to a cyberattack Encrypts a victim's files and
that mimic trusted sources technique where attackers demands a ransom for
to deceive recipients. pretend to be someone else decryption.

Smishing Vishing Whaling


Text messages are used to Phone scams involve Impersonate trusted sources
impersonate trusted attackers impersonating to steal sensitive information
sources and trick recipients trusted figures to steal or funds, often targeting high-
into clicking harmful links. sensitive information. profile individuals.
DEVICE SECURITY
LAPTOP AND MOBILE PHONES SECURITY GUIDE

Lock your device/s properly

Never leave your device unattended

Keep Your OS & Apps Updated


PASSWORD SECURITY:
WHAT EVERYONE SHOULD KNOW.

Use strong, unique passwords

Use a Password Manager

Enable two-factor
authentication (2FA).
SOCIAL MEDIA
HOW TO BE SECURE ON SOCIAL MEDIA

Control Tagging, Mentions & Face


Recognition

Avoid oversharing Personal


Information

Limit Location Sharing


SAFE INTERNET SECURITY
TOP INTERNET SECURITY TIPS

Secure Your Wi-Fi

VPN
(Virtual Private Network)

Think like an
Attacker
BEST PRACTICES
TO HELP PROTECT YOUR DATA

STRONG PASSWORDS BE CAUTIOUS WITH LINKS


Use complex, unique Avoid clicking on suspicious
passwords for each links or attachments,
account. especially from unknown
senders.

EMPLOYEE AWARENESS ACCESS CONTROL


Train individuals to Ensures that only authorized
users can access sensitive
recognize phishing scams
data, applications, or
and suspicious activity. systems.
OUR VISION
OUR VISION OUR MISSION
The Cyber Security Division aims
Our vision is to create a secure to protect digital assets, ensure
and trustworthy digital data privacy, and safeguard
ecosystem where PJLI can systems from cyber threats
operate business with minimized through proactive security
risk of cyber threats. measures, innovative process and
technologies, and continuous risk
assessment.
CYBER SECURITY
DIVISION
GOVERNANCE
SECURITY ENGINEERING
SOC DEPARTMENT

IDENTITY PRIVILEGED
COMPLIANCE ACCESS MANAGEMENT
SECURITY TESTING
THANK YOU,
KA-CEBUANA!
CEBUANA CONGRESS 2025

cybersecurity@pjlhuillier.com

You might also like