2. WHAT IS CYBER SECURITY?
• Cyber Security is the practice of protecting systems, networks, and programs from
digital attacks.
• These cyberattacks are usually aimed at accessing, changing, or destroying sensitive
information; extorting money from users; or interrupting normal business
procedures.
3. WHY IS CYBER SECURITY
IMPORTANT?
• Cyberattacks are a serious risk for all businesses
• Out of 1,045 small and medium-sized businesses that contributed to this cyber
security survey conducted in 2018 by the Ponemon Institute:
1. 67% of respondents suffered a cyberattack in 2018 (compared to 61% the previous
year)
2. 60% of survey respondents that had a data breach said the cause was a negligent
employee or independent contractor
3. A significant majority of respondents experienced an exploit or malware that evaded
their company’s intrusion detection or antivirus software
4. Mobile devices were the most vulnerable entry points to companies’ computer
networks
4. WHAT IS CYBER SECURITY ALL
ABOUT?
• Users must understand and
comply with basic data security
principles such as choosing
strong passwords, being wary of
attachments in email, and
backing up data.
• Organizations must have a framework
for how they deal with both
attempted and successful cyber
attacks.
• One well-respected framework can
guide you. It explains how you can
identify attacks, protect systems,
detect and respond to threats, and
recover from successful attacks.
• Technology is essential to giving
organizations and individuals the
computer security tools needed to
protect themselves from cyber
attacks.
• Three main entities must be
protected: endpoint devices like
computers, smart devices, and
routers; networks; and the cloud.
6. Malware
A malware attack is a piece of malicious
software which takes over a person’s
computer in order to spread the bug
onto other people’s devices and profiles.
It can also infect a computer and turn it
into a botnet, which means the cyber
criminal can control the computer and
use it to send malware to others.
Phishing
Phishing attacks are designed to steal login
and password details so that the cyber
criminal can assume control of the victim’s
social network, email and online bank
accounts.
70% of internet users choose the same
password for almost every web service they
use. This is why phishing is so effective, as
the criminal, by using the same login details,
can access multiple private accounts and
manipulate them for their own good.
Spamming
Spamming is when a cyber criminal sends
emails designed to make a victim spend
money on counterfeit or fake goods.
Often advertising pharmaceutical
products or security software, which
people believe they need to solve
security issues which do not actually
exist.
7. Virus
A computer virus attaches itself to a
program or file enabling it to spread
from one computer to another, leaving
infections as it travels.
Worm
A worm is similar to a virus by design and
is considered to be a sub-class of a virus.
Worms spread from computer to
computer, but unlike a virus, it has the
capability to travel without any human
action.
A worm takes advantage of file or
information transport features on your
system, which is what allows it to travel
unaided.
Trojan Horse
A Trojan Horse is full of as much trickery
as the mythological Trojan Horse it was
named after.
The Trojan Horse, at first glance will
appear to be useful software but will
actually do damage once installed or run
on your computer.
Types of Malware
8. Adware
Adware is also known as advertising-supported
software. It is software which renders
advertisements for the purpose of generating
revenue for its author. The advertisements are
published on the screen presented to the user at
the time of installation. Adware is programmed
to examine which Internet sites, the user visits
frequently and to present and feature related
advertisements. Not all adware has malicious
intent, but it becomes a problem anyway
because it harms computer performance and
can be annoying.
Spyware
This type of malicious software, spies on you,
tracks your internet activities. It helps the
hacker in gathering information about the
victim’s system, without the consent of the
victim. This spyware’s presence is typically
hidden from the host and it is very difficult
to detect. Some spyware like keyloggers may
be installed intentionally in an organization
to monitor activities of employees.
Ransomware
Ransomware is an advanced type of malware
that restricts access to the computer system
until the user pays a fee. Your screen might
show a pop-up warning that your have been
locked out of your computer and that you
can access only after paying the
cybercriminal. The cybercriminal demands a
ransom to be paid in order for the restriction
to be removed.
Types of Malware
9. MAN-IN-THE-MIDDLE ATTACK
• A Man-in-the-Middle (MITM) attack happens when a hacker inserts themselves
between a user and a website. This kind of attack comes in several forms.
• For example, a fake banking website may be used to capture financial login
information. The fake site is “in the middle” between the user and the actual bank
website.
10. DENIAL-OF-SERVICE ATTACK
• Refers to events that render systems on a computer network temporarily unusable.
• Denials of service can happen accidentally as the result of actions taken by network users or
administrators, but often they are malicious DoS attacks.
• They may target servers, network routers or network communication links.
• They can cause computers and routers to shut down ("crash") and links to bog down.
• They usually do not cause permanent damage.
11. SQL INJECTION
• SQL query is one way an application talks
to the database
• SQL injection occurs when an application
fails to sanitize untrusted data (such as
data in web form fields) in a database
query
• An attacker can use specially-crafted SQL
commands to trick the application into
asking the database to execute
unexpected commands
12. ZERO-DAY EXPLOIT
• “Zero-day” is a loose term for a recently
discovered vulnerability or exploit for a
vulnerability that hackers can use to attack
systems.
• These threats are incredibly dangerous
because only the attacker is aware of their
existence.
• Exploits can go unnoticed for years and are
often sold on the black market for large
sums of money.
13. CONSEQUENCES OF INACTION
• Loss or damage of electronic data
• Extra expenses to keep your business operating
• You may suffer a loss of income (i.e. a denial of
service attack forces you to shut down your business,
causing you to lose both income and customers)
• Loss of confidentiality, integrity and/or availability of
valuable patient information
• Network security and privacy lawsuits (i.e. if a cyber
thief steals data from your computer system and the
data belongs to another party, that party may sue
you)
• Allows attackers to covertly gather personal data,
including financial information and
usernames/passwords
15. RESPONSIBLE BROWSING
• Do not download/install/open
programs/executables without
consulting/reviewing with IT support.
• Beware of cloned websites that may appear
to be legitimate. Note that secure websites
start with https, not http.
• Beware of suspicious websites, even if they
are https://. Here is an example.
• https://www.bankofamerica.com
and https://www.bankofarnerica.com are
two different sites, one of them is trying to
steal your identity. (Please note how
cleverly ‘m’ was replaced by ‘rn’).
16. RESPONSIBLE EMAIL ACTIONS
• Do not click on suspicious links embedded
in emails. Hover over questionable links to
reveal the true destination before clicking.
• Don’t open attachments or click on URLs in
unsolicited emails, even from users you
know.
• Alert IT support immediately upon receiving
suspicious emails.
• Do not act on email-based requests for
sensitive personal information, money
movements, or trading. Directly verify all
requests with the clients and ask questions.
17. RESPONSIBLE USE OF EXTERNAL MEDIA
• Do not insert any USB drive or
CDs/DVDs that you’ve received from an
unknown/unreliable source.
• Do not install programs that was copied
from a USB drive, external drive and/or
found over the internet.
18. PASSWORDS
• Do not share your passwords at any cause.
They must not be shared with colleagues,
vendors and IT support.
• Change your passwords every 90 days.
When choosing a password:
• Make new passwords difficult to guess by
avoiding dictionary words, and mixing
letters, numbers and punctuation.
• Use a unique long and strong password for
each account to prevent a quick and
invasive attack on all of your accounts.
19. SOFTWARE UPDATES
• Updates - sometimes called patches - fix
problems and glitches with your operating
system (OS) (e.g., Windows) and software
programs (e.g., Microsoft Office
applications). Anti-virus software removes
viruses, quarantines and repairs infected
files, and can help prevent future viruses.
• Please ensure all software patches are
installed and kept up-to-date by your IT
department.
• To avoid computer problems caused by
viruses, please ensure that an anti-virus
program like Sophos is installed and kept
up to date.
20. WHAT CAN YOUR COMPANY DO?
• Use a Virtual Private Network (VPN) to encrypt your
web traffic. An encrypted VPN severely limits a
hacker’s ability to read or modify web traffic.
• Ensure your operating system is up-to-date.
• Must have anti-virus software installed onto your
system to scan the entire system at boot along with e-
mails and files as they are downloaded from the
Internet
• Network should have strong firewalls and protocols to
prevent unauthorized access.
• Secure your communications through encryption.
• Regularly talk to employees about cybersecurity.
21. COMMON TECHNOLOGY USED TO
PROTECT OUR RESOURCES
• Next-generation firewalls
• DNS filtering
• Malware protection
• Antivirus software
• Email security solutions
22. WHILE YOU MAKE THE
BEST EFFORT TO SECURE
THE COMPANY’S
INFRASTRUCTURE…
A SYSTEM IS ONLY AS
SECURE AS THE WEAKEST
LINK.
https://azprioritycare.com/wp-content/uploads/2019/06/2019-AZPC-Cyber-Security-Compliance-Training.pdf
https://www.webopedia.com/DidYouKnow/Internet/virus.asp
DO’S: Keep a backup of your data in a safe place so that no hacker attack can cause you to lose your data.
Always consult with IT support if you are suspicious of any emails, links or attachments.
DON’T’S: Do not click on suspicious links embedded in emails or open files attached in an email from unknown sources.
Do not download programs/executables from untrusty websites and from external media.
Do not save your passwords on your computer.
Do not visit websites that are not intended for work