ORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptx
1.
2. 1. Activate Microsoft 365 Accounts
2. Back up & transfer files from google drive
to Microsoft One Drive
3. Discuss cybersecurity issues & concern
4. Secure social media accounts
8. To activate your account and start taking advantage of the many features
of Microsoft 365, simply go to https://portal.office.com and log in using the
credentials below:
9. Set up new password and input code to activate Microsoft
Account
12. HOW TO BACK UP & TRANSFER FILES FROM
GOOGLE DRIVE TO MICROSOFT ONE DRIVE
13. STEP 1 – Set up Microsoft One Drive to your new user account
Open on your browser https://portal.office.com
Sign in your activated Microsoft Account
Install Microsoft One Drive
Open Microsoft One Drive online platform at
Microsoft 365 Dashboard
14. CLICK
STEP 2 – Open on your browser www.mover.io and click Login to Mover
22. STEP 10 – Check all your files in Microsoft One Drive Online
Platform
23. STEP 11 – Back up and sync all your files from PC to your Microsoft One
Drive Account.
24. Advantages of Microsoft 365 Adoption
1. Transfer Files from Google Drive to
Microsoft One Drive
2. Back up files up to 1TB
3. Synchronization of files from your PC to
Mobile Phones
4. Usage of Microsoft 365 Applications
5. Video Conference using Microsoft Teams
27. Cyber security - refers to every aspect of protecting
an organization and its employees and assets against
cyber threats.
Cyber Attack - Any kind of malicious activity that
attempts to collect, disrupt, deny, degrade, or destroy
information system resources or the information itself.
Hacking - the gaining of unauthorized access to data in
a system or computer.
DEFINITION OF TERMS
28. Hacker - is an individual who uses computer, networking
or other skills to overcome a technical problem. The term
also may refer to anyone who uses their abilities to gain
unauthorized access to systems or networks in order to
commit crimes.
3 main types of hackers
1. Black hat hackers - are cybercriminals that illegally crack systems with malicious intent.
2. White hat hackers - are ethical security hackers who identify and fix vulnerabilities.
3. Gray hat hackers - may not have the criminal or malicious intent of a black hat hacker, but they also
don’t have the prior knowledge or consent of those whose systems they hack into.
DEFINITION OF TERMS
29.
30.
31. Phishing Attack
OTP
CONTACT #
PASSWORD
EMAIL ADDRESS
IP ADDRESS
MAC ADDRESS
DEVICE ID
LOCATION ID
EMAIL ADDRESS
SOCMED NAME
CONTACT #
It is a type of social engineering attack wherein an attacker
impersonates to be a trusted contact and sends the victim fake
mails.
Email Address
Contact #
OTP
Password
32. Reconnaissance
- Forming the attack strategy.
Scan
- Searching for vulnerabilities.
Exploit
- Beginning the attack.
Access Maintenance
- Gathering as much data as possible.
Exfiltration
- Stealing sensitive data.
Identification Prevention
- Disguising presence to maintain access.
1
2
3
4
5
6
6 Stages
of a
Malicious
Cyber
Attack
34. 10 Cyber Security Commandments
1. Anyone can be a target for
cyber criminals.
- First and foremost, never assume that
you won’t be hit by a cyber attack. If
you’re lucky, it will never happen, but
absolutely anyone can be a target,
because many attacks use automated
software, which doesn’t necessarily
discriminate. Small businesses may also
be more likely to fall victim to security
breaches, because criminals consider
them soft targets.
35. 10 Cyber Security Commandments
2. Passwords should be strong
and unique
Although other forms of
authentication exist, such as
fingerprint scanners, passwords
remain the most common way of
logging into websites and systems.
Don’t make life easy for criminals by
using weak or easily guessed
passwords like ‘Pa$$w0rd’ or
‘12345678’, and don’t reuse your
passwords in different places.
36. 10 Cyber Security Commandments
3. Keep all software and
hardware up to date
If possible, use automatic updates
to keep your IT solutions up to date.
Otherwise, ensure that you regularly
check for updates, particularly those
that include security patches. Cyber
criminals will be well aware of any
weaknesses, and they’ll waste no
time trying to exploit them.
37. 10 Cyber Security Commandments
4. Report any and all
suspicious activity
It’s not necessary to report every
single dodgy email you get, as
long as they’re automatically
getting sent to your spam folder,
but if you see what you think
might be a phishing attempt and it
hasn’t been filtered out, tell your IT
people. By getting the word out,
you can make sure no one in your
business falls victim to a scam.
38. 10 Cyber Security Commandments
5. Secure all devices including
smartphones
In the modern workplace, it’s not just
workstations and servers you need to
be concerned with; many workers
also carry phones and tablets that are
connected to the corporate network
via WiFi. These need to made secure
or limited to a guest network,
because they present a potential
entry point for hackers.
39. 10 Cyber Security Commandments
6. Identify your security
weaknesses and fix them
All businesses should be aware of their
weak points. That could include many
things, including operating systems that
are no longer supported, people who
aren’t trained to spot phishing emails,
routers that don’t use the latest security
protocols and systems not configured to
deliver the maximum security benefits.
Arrange a security audit to gain clarity and
to plan ahead.
40. 10 Cyber Security Commandments
7. Be careful when clicking links
or files in emails
Booby-trapped files and websites are
a favorite way for hackers to install
malware or to steal data, and email is
the most common way of getting
people to open them. If you receive an
email from someone you don’t know
and it’s urging you to download a file
or follow a link, stop and think about it
first.
41. 10 Cyber Security Commandments
8. Lock your computer when
you’re away from it
This is especially important if you’re
using a laptop or other mobile device
and you’re not in the office, because
if criminals gain physical access to
your computer, it’s no problem for
them to install malware on it. To lock
your system, simply press the
Windows key and L. You’ll need your
password or PIN to log back in.
42. 10 Cyber Security Commandments
9. Review your cyber security
measures every year
Cyber criminals are always looking
for new ways to rip people off, so
cyber security cannot be
considered as a one-off, static
purchase. At least once a year, you
should assess your current security
solutions, to see if they’re still up to
the task, and if they’re not, then you
need to upgrade.
43. 10 Cyber Security Commandments
10. Make multiple backups,
with at least one kept off site
In the majority of cases, one
backup will be enough if your main
copy of data is damaged by
mechanical failure or human error,
but if you’re unlucky, your backup
could be lost at the same time. The
chances of your backups being
affected increase when malware
enters the equation.