This document provides an overview of cybersecurity awareness and training. It discusses what cybersecurity awareness is, why it is important to build awareness, common threats like phishing, password attacks, and ransomware, and components of an awareness program. The key points are:
- Cybersecurity awareness educates employees on threats in cyberspace like phishing emails, malicious attachments, and cautious online interactions to prevent breaches.
- Building awareness aims to mitigate human error, create a security culture, strengthen security posture, and meet compliance requirements.
- Common threats include phishing (deceptive emails to obtain sensitive info or install malware), password attacks to maliciously access accounts, and ransomware that locks devices until
This document provides an overview of cybersecurity awareness and training. It discusses what cybersecurity awareness is, why it is important to build awareness, common threats like phishing, password attacks, and ransomware, and components of an awareness program. The key points are:
- Cybersecurity awareness educates employees on threats in cyberspace like phishing emails, malicious attachments, and cautious online interactions to prevent breaches.
- Building awareness aims to mitigate human error, create a security culture, strengthen security posture, and meet compliance requirements.
- Common threats include phishing (deceptive emails to obtain sensitive info or install malware), password attacks to maliciously access accounts, and ransomware that locks devices until
This document provides an overview of cybersecurity awareness and training. It discusses what cybersecurity awareness is, why it is important to build awareness, common threats like phishing, password attacks, and ransomware, and components of an awareness program. The key points are:
- Cybersecurity awareness educates employees on threats in cyberspace like phishing emails, malicious attachments, and cautious online interactions to prevent breaches.
- Building awareness aims to mitigate human error, create a security culture, strengthen security posture, and meet compliance requirements.
- Common threats include phishing (deceptive emails to obtain sensitive info or install malware), password attacks to maliciously access accounts, and ransomware that locks devices until
Training Awareness By Arunachalam TABLE OF CONTENTS
01 02 03 04
Cybersecurity Phishing Ransomware Password
Awareness Attack What is Cybersecurity Awareness? Cybersecurity awareness is an ongoing process of educating and training employees about the threats that exist in cyberspace. It aims to help individuals understand how to prevent security breaches and what actions to take in case of a security incident Why Build Awareness?
associated with visiting websites and clicking on links.
Email Safety: Understanding the dangers of
phishing emails and malicious attachments.
Online Interactions: Being cautious while
sharing sensitive information online. Common Threats
Phishing Password Attacks Ransomware
Phishing
Phishing is a form of social engineering
and scam where attackers deceive people into revealing sensitive information or installing malware such as ransomware Password Attack A password attack refers to any of the various methods used to maliciously authenticate into password-protected accounts. These attacks are typically facilitated through the use of software that expedites cracking or guessing passwords Ransomware Ransomware is a type of malware that locks a victim’s data or device and threatens to keep it locked—or worse— unless the victim pays a ransom to the attacker In 2021, 85% of data breaches involved human error, often through email attacks.
The average cost of a ransomware-caused data
breach was USD 4.54 million in 2022 Mitigation techniques 1. Avoid visiting malicious websites. Ex. Torrent etc
2. Avoid clicking on email links and attachments from unknown
senders
3. Do not open emails that seem too good to be true
How to Secure?
Password Policies Data Security Software
Length: 12+ characters Email Filtering Complexity: uses special DNS Filtering characters, numbers Change: once every 3 months Patch Management Implement MFA Use WPA3 Security for SSO, Captcha home Wi-Fi Q&A