SlideShare une entreprise Scribd logo
1  sur  65
1. Activate Microsoft 365 Accounts
2. Back up & transfer files from google drive
to Microsoft One Drive
3. Discuss cybersecurity issues & concern
4. Secure social media accounts
3
LEGAL BASIS
OUA-OUT-011023010
Division Memo No. 068 series 2023
LEGAL BASIS
LEGAL BASIS
CHECK YOUR DEPED EMAIL
To activate your account and start taking advantage of the many features
of Microsoft 365, simply go to https://portal.office.com and log in using the
credentials below:
Set up new password and input code to activate Microsoft
Account
MICROSOFT 365 DASHBOARD
11
HOW TO BACK UP & TRANSFER FILES FROM
GOOGLE DRIVE TO MICROSOFT ONE DRIVE
STEP 1 – Set up Microsoft One Drive to your new user account
Open on your browser https://portal.office.com
Sign in your activated Microsoft Account
Install Microsoft One Drive
Open Microsoft One Drive online platform at
Microsoft 365 Dashboard
CLICK
STEP 2 – Open on your browser www.mover.io and click Login to Mover
STEP 3 – Sign in Microsoft Accounts
CLICK
STEP 4 – Click accept
CLICK
STEP 5 – Click Authorize New Connector in step 1
CLICK
STEP 6 – Click Authorize New Connector in step 2
CLICK
1
2
3
STEP 7 – Create folder to back up files from google
drive
CLICK
STEP 8 – Select created folder from google drive
then click start copy
CLICK
CLICK
STEP 9 – Wait to finish the process
STEP 10 – Check all your files in Microsoft One Drive Online
Platform
STEP 11 – Back up and sync all your files from PC to your Microsoft One
Drive Account.
Advantages of Microsoft 365 Adoption
1. Transfer Files from Google Drive to
Microsoft One Drive
2. Back up files up to 1TB
3. Synchronization of files from your PC to
Mobile Phones
4. Usage of Microsoft 365 Applications
5. Video Conference using Microsoft Teams
25
Cyber security - refers to every aspect of protecting
an organization and its employees and assets against
cyber threats.
Cyber Attack - Any kind of malicious activity that
attempts to collect, disrupt, deny, degrade, or destroy
information system resources or the information itself.
Hacking - the gaining of unauthorized access to data in
a system or computer.
DEFINITION OF TERMS
Hacker - is an individual who uses computer, networking
or other skills to overcome a technical problem. The term
also may refer to anyone who uses their abilities to gain
unauthorized access to systems or networks in order to
commit crimes.
3 main types of hackers
1. Black hat hackers - are cybercriminals that illegally crack systems with malicious intent.
2. White hat hackers - are ethical security hackers who identify and fix vulnerabilities.
3. Gray hat hackers - may not have the criminal or malicious intent of a black hat hacker, but they also
don’t have the prior knowledge or consent of those whose systems they hack into.
DEFINITION OF TERMS
Phishing Attack
OTP
CONTACT #
PASSWORD
EMAIL ADDRESS
IP ADDRESS
MAC ADDRESS
DEVICE ID
LOCATION ID
EMAIL ADDRESS
SOCMED NAME
CONTACT #
It is a type of social engineering attack wherein an attacker
impersonates to be a trusted contact and sends the victim fake
mails.
Email Address
Contact #
OTP
Password
Reconnaissance
- Forming the attack strategy.
Scan
- Searching for vulnerabilities.
Exploit
- Beginning the attack.
Access Maintenance
- Gathering as much data as possible.
Exfiltration
- Stealing sensitive data.
Identification Prevention
- Disguising presence to maintain access.
1
2
3
4
5
6
6 Stages
of a
Malicious
Cyber
Attack
10 Cyber Security
Commandments
10 Cyber Security Commandments
1. Anyone can be a target for
cyber criminals.
- First and foremost, never assume that
you won’t be hit by a cyber attack. If
you’re lucky, it will never happen, but
absolutely anyone can be a target,
because many attacks use automated
software, which doesn’t necessarily
discriminate. Small businesses may also
be more likely to fall victim to security
breaches, because criminals consider
them soft targets.
10 Cyber Security Commandments
2. Passwords should be strong
and unique
Although other forms of
authentication exist, such as
fingerprint scanners, passwords
remain the most common way of
logging into websites and systems.
Don’t make life easy for criminals by
using weak or easily guessed
passwords like ‘Pa$$w0rd’ or
‘12345678’, and don’t reuse your
passwords in different places.
10 Cyber Security Commandments
3. Keep all software and
hardware up to date
If possible, use automatic updates
to keep your IT solutions up to date.
Otherwise, ensure that you regularly
check for updates, particularly those
that include security patches. Cyber
criminals will be well aware of any
weaknesses, and they’ll waste no
time trying to exploit them.
10 Cyber Security Commandments
4. Report any and all
suspicious activity
It’s not necessary to report every
single dodgy email you get, as
long as they’re automatically
getting sent to your spam folder,
but if you see what you think
might be a phishing attempt and it
hasn’t been filtered out, tell your IT
people. By getting the word out,
you can make sure no one in your
business falls victim to a scam.
10 Cyber Security Commandments
5. Secure all devices including
smartphones
In the modern workplace, it’s not just
workstations and servers you need to
be concerned with; many workers
also carry phones and tablets that are
connected to the corporate network
via WiFi. These need to made secure
or limited to a guest network,
because they present a potential
entry point for hackers.
10 Cyber Security Commandments
6. Identify your security
weaknesses and fix them
All businesses should be aware of their
weak points. That could include many
things, including operating systems that
are no longer supported, people who
aren’t trained to spot phishing emails,
routers that don’t use the latest security
protocols and systems not configured to
deliver the maximum security benefits.
Arrange a security audit to gain clarity and
to plan ahead.
10 Cyber Security Commandments
7. Be careful when clicking links
or files in emails
Booby-trapped files and websites are
a favorite way for hackers to install
malware or to steal data, and email is
the most common way of getting
people to open them. If you receive an
email from someone you don’t know
and it’s urging you to download a file
or follow a link, stop and think about it
first.
10 Cyber Security Commandments
8. Lock your computer when
you’re away from it
This is especially important if you’re
using a laptop or other mobile device
and you’re not in the office, because
if criminals gain physical access to
your computer, it’s no problem for
them to install malware on it. To lock
your system, simply press the
Windows key and L. You’ll need your
password or PIN to log back in.
10 Cyber Security Commandments
9. Review your cyber security
measures every year
Cyber criminals are always looking
for new ways to rip people off, so
cyber security cannot be
considered as a one-off, static
purchase. At least once a year, you
should assess your current security
solutions, to see if they’re still up to
the task, and if they’re not, then you
need to upgrade.
10 Cyber Security Commandments
10. Make multiple backups,
with at least one kept off site
In the majority of cases, one
backup will be enough if your main
copy of data is damaged by
mechanical failure or human error,
but if you’re unlucky, your backup
could be lost at the same time. The
chances of your backups being
affected increase when malware
enters the equation.
44
SOCIAL MEDIA PLAFORMS
STEP 1 LOG IN FACEBOOK ACOUNTS
STEP 2 Go to Facebook Profile
STEP 3 Go to account settings & privacy
STEP 4 Go to account settings
STEP 5 Go to Personal Information/Contact
STEP 6 Go to contact info
STEP 7 Add/Change primary email and add
phone number
Change email add if your are using yahoo.com
Remove unused email address and phone numbers
STEP 8
Enter new email address and type facebook
password then type the confirmation code
being sent to the email address you added.
STEP 9 Enter phone number and type facebook
password then type the confirmation code
being sent to your phone number you added
56
STEP 1 Go to account settings & privacy
STEP 2 Go to account settings
STEP 3 Go to account settings & privacy
STEP 4 Go to account two-factor authentication
STEP 5 Select “Text message (SMS)
STEP 6 Type phone number and input 6-digit code
This window will appear if you log in your facebook
account to a new device
“There are no secrets better
kept than the secrets that
everybody guesses”.
- George Bernard Shaw
Thank you!

Contenu connexe

Similaire à ORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptx

DTI_Information Security Trainig_07-12-2020.pptx
DTI_Information Security Trainig_07-12-2020.pptxDTI_Information Security Trainig_07-12-2020.pptx
DTI_Information Security Trainig_07-12-2020.pptx
abhishekkumar807235
 
eForensics Magazine - HOW TO STEAL GMAIL CREDENTIALS USING SE-TOOLKIT – A CA...
eForensics Magazine - HOW TO STEAL GMAIL CREDENTIALS  USING SE-TOOLKIT – A CA...eForensics Magazine - HOW TO STEAL GMAIL CREDENTIALS  USING SE-TOOLKIT – A CA...
eForensics Magazine - HOW TO STEAL GMAIL CREDENTIALS USING SE-TOOLKIT – A CA...
Kevin M. Moker, CFE, CISSP, ISSMP, CISM
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
amiinaaa
 
LESSON 2.pptx
LESSON 2.pptxLESSON 2.pptx
LESSON 2.pptx
EchelleOgatis
 

Similaire à ORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptx (20)

6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back
 
Cyber Security Seminar
Cyber Security SeminarCyber Security Seminar
Cyber Security Seminar
 
How to Bulletproof Your Data Defenses Locally & In the Cloud
How to Bulletproof Your Data Defenses Locally & In the CloudHow to Bulletproof Your Data Defenses Locally & In the Cloud
How to Bulletproof Your Data Defenses Locally & In the Cloud
 
7 steps you can take now to protect your data
7 steps you can take now to protect your data7 steps you can take now to protect your data
7 steps you can take now to protect your data
 
User security awareness
User security awarenessUser security awareness
User security awareness
 
A Guide to Cyber Etiquette.pdf
A Guide to Cyber Etiquette.pdfA Guide to Cyber Etiquette.pdf
A Guide to Cyber Etiquette.pdf
 
DTI_Information Security Trainig_07-12-2020.pptx
DTI_Information Security Trainig_07-12-2020.pptxDTI_Information Security Trainig_07-12-2020.pptx
DTI_Information Security Trainig_07-12-2020.pptx
 
5 ways to strengthen cybersecurity in the workplace
5 ways to strengthen cybersecurity in the workplace5 ways to strengthen cybersecurity in the workplace
5 ways to strengthen cybersecurity in the workplace
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
eForensics Magazine - HOW TO STEAL GMAIL CREDENTIALS USING SE-TOOLKIT – A CA...
eForensics Magazine - HOW TO STEAL GMAIL CREDENTIALS  USING SE-TOOLKIT – A CA...eForensics Magazine - HOW TO STEAL GMAIL CREDENTIALS  USING SE-TOOLKIT – A CA...
eForensics Magazine - HOW TO STEAL GMAIL CREDENTIALS USING SE-TOOLKIT – A CA...
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
 
I’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take NextI’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take Next
 
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptxCYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
 
Malware Attacks | How To Defend Organizations From It?
Malware Attacks | How To Defend Organizations From It?Malware Attacks | How To Defend Organizations From It?
Malware Attacks | How To Defend Organizations From It?
 
LESSON 2.pptx
LESSON 2.pptxLESSON 2.pptx
LESSON 2.pptx
 
Survey Presentation About Application Security
Survey Presentation About Application SecuritySurvey Presentation About Application Security
Survey Presentation About Application Security
 
Top Network Security Interview Questions That You Should Know.pptx
Top Network Security Interview Questions That You Should Know.pptxTop Network Security Interview Questions That You Should Know.pptx
Top Network Security Interview Questions That You Should Know.pptx
 
Cybersecurity…real world solutions
Cybersecurity…real world solutions Cybersecurity…real world solutions
Cybersecurity…real world solutions
 
How to Secure Web Apps — A Web App Security Checklist
How to Secure Web Apps — A Web App Security ChecklistHow to Secure Web Apps — A Web App Security Checklist
How to Secure Web Apps — A Web App Security Checklist
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 

Dernier

會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
中 央社
 
ppt your views.ppt your views of your college in your eyes
ppt your views.ppt your views of your college in your eyesppt your views.ppt your views of your college in your eyes
ppt your views.ppt your views of your college in your eyes
ashishpaul799
 
Neurulation and the formation of the neural tube
Neurulation and the formation of the neural tubeNeurulation and the formation of the neural tube
Neurulation and the formation of the neural tube
SaadHumayun7
 

Dernier (20)

Capitol Tech Univ Doctoral Presentation -May 2024
Capitol Tech Univ Doctoral Presentation -May 2024Capitol Tech Univ Doctoral Presentation -May 2024
Capitol Tech Univ Doctoral Presentation -May 2024
 
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
 
[GDSC YCCE] Build with AI Online Presentation
[GDSC YCCE] Build with AI Online Presentation[GDSC YCCE] Build with AI Online Presentation
[GDSC YCCE] Build with AI Online Presentation
 
Post Exam Fun(da) Intra UEM General Quiz 2024 - Prelims q&a.pdf
Post Exam Fun(da) Intra UEM General Quiz 2024 - Prelims q&a.pdfPost Exam Fun(da) Intra UEM General Quiz 2024 - Prelims q&a.pdf
Post Exam Fun(da) Intra UEM General Quiz 2024 - Prelims q&a.pdf
 
slides CapTechTalks Webinar May 2024 Alexander Perry.pptx
slides CapTechTalks Webinar May 2024 Alexander Perry.pptxslides CapTechTalks Webinar May 2024 Alexander Perry.pptx
slides CapTechTalks Webinar May 2024 Alexander Perry.pptx
 
Word Stress rules esl .pptx
Word Stress rules esl               .pptxWord Stress rules esl               .pptx
Word Stress rules esl .pptx
 
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
 
2024_Student Session 2_ Set Plan Preparation.pptx
2024_Student Session 2_ Set Plan Preparation.pptx2024_Student Session 2_ Set Plan Preparation.pptx
2024_Student Session 2_ Set Plan Preparation.pptx
 
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdfDanh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
 
factors influencing drug absorption-final-2.pptx
factors influencing drug absorption-final-2.pptxfactors influencing drug absorption-final-2.pptx
factors influencing drug absorption-final-2.pptx
 
Incoming and Outgoing Shipments in 2 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 2 STEPS Using Odoo 17Incoming and Outgoing Shipments in 2 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 2 STEPS Using Odoo 17
 
Championnat de France de Tennis de table/
Championnat de France de Tennis de table/Championnat de France de Tennis de table/
Championnat de France de Tennis de table/
 
ppt your views.ppt your views of your college in your eyes
ppt your views.ppt your views of your college in your eyesppt your views.ppt your views of your college in your eyes
ppt your views.ppt your views of your college in your eyes
 
Neurulation and the formation of the neural tube
Neurulation and the formation of the neural tubeNeurulation and the formation of the neural tube
Neurulation and the formation of the neural tube
 
How to Manage Notification Preferences in the Odoo 17
How to Manage Notification Preferences in the Odoo 17How to Manage Notification Preferences in the Odoo 17
How to Manage Notification Preferences in the Odoo 17
 
Mbaye_Astou.Education Civica_Human Rights.pptx
Mbaye_Astou.Education Civica_Human Rights.pptxMbaye_Astou.Education Civica_Human Rights.pptx
Mbaye_Astou.Education Civica_Human Rights.pptx
 
Application of Matrices in real life. Presentation on application of matrices
Application of Matrices in real life. Presentation on application of matricesApplication of Matrices in real life. Presentation on application of matrices
Application of Matrices in real life. Presentation on application of matrices
 
Post Exam Fun(da) Intra UEM General Quiz - Finals.pdf
Post Exam Fun(da) Intra UEM General Quiz - Finals.pdfPost Exam Fun(da) Intra UEM General Quiz - Finals.pdf
Post Exam Fun(da) Intra UEM General Quiz - Finals.pdf
 
Salient features of Environment protection Act 1986.pptx
Salient features of Environment protection Act 1986.pptxSalient features of Environment protection Act 1986.pptx
Salient features of Environment protection Act 1986.pptx
 
Morse OER Some Benefits and Challenges.pptx
Morse OER Some Benefits and Challenges.pptxMorse OER Some Benefits and Challenges.pptx
Morse OER Some Benefits and Challenges.pptx
 

ORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptx

  • 1.
  • 2. 1. Activate Microsoft 365 Accounts 2. Back up & transfer files from google drive to Microsoft One Drive 3. Discuss cybersecurity issues & concern 4. Secure social media accounts
  • 3. 3
  • 8. To activate your account and start taking advantage of the many features of Microsoft 365, simply go to https://portal.office.com and log in using the credentials below:
  • 9. Set up new password and input code to activate Microsoft Account
  • 11. 11
  • 12. HOW TO BACK UP & TRANSFER FILES FROM GOOGLE DRIVE TO MICROSOFT ONE DRIVE
  • 13. STEP 1 – Set up Microsoft One Drive to your new user account Open on your browser https://portal.office.com Sign in your activated Microsoft Account Install Microsoft One Drive Open Microsoft One Drive online platform at Microsoft 365 Dashboard
  • 14. CLICK STEP 2 – Open on your browser www.mover.io and click Login to Mover
  • 15. STEP 3 – Sign in Microsoft Accounts CLICK
  • 16. STEP 4 – Click accept CLICK
  • 17. STEP 5 – Click Authorize New Connector in step 1 CLICK
  • 18. STEP 6 – Click Authorize New Connector in step 2 CLICK 1 2 3
  • 19. STEP 7 – Create folder to back up files from google drive CLICK
  • 20. STEP 8 – Select created folder from google drive then click start copy CLICK CLICK
  • 21. STEP 9 – Wait to finish the process
  • 22. STEP 10 – Check all your files in Microsoft One Drive Online Platform
  • 23. STEP 11 – Back up and sync all your files from PC to your Microsoft One Drive Account.
  • 24. Advantages of Microsoft 365 Adoption 1. Transfer Files from Google Drive to Microsoft One Drive 2. Back up files up to 1TB 3. Synchronization of files from your PC to Mobile Phones 4. Usage of Microsoft 365 Applications 5. Video Conference using Microsoft Teams
  • 25. 25
  • 26.
  • 27. Cyber security - refers to every aspect of protecting an organization and its employees and assets against cyber threats. Cyber Attack - Any kind of malicious activity that attempts to collect, disrupt, deny, degrade, or destroy information system resources or the information itself. Hacking - the gaining of unauthorized access to data in a system or computer. DEFINITION OF TERMS
  • 28. Hacker - is an individual who uses computer, networking or other skills to overcome a technical problem. The term also may refer to anyone who uses their abilities to gain unauthorized access to systems or networks in order to commit crimes. 3 main types of hackers 1. Black hat hackers - are cybercriminals that illegally crack systems with malicious intent. 2. White hat hackers - are ethical security hackers who identify and fix vulnerabilities. 3. Gray hat hackers - may not have the criminal or malicious intent of a black hat hacker, but they also don’t have the prior knowledge or consent of those whose systems they hack into. DEFINITION OF TERMS
  • 29.
  • 30.
  • 31. Phishing Attack OTP CONTACT # PASSWORD EMAIL ADDRESS IP ADDRESS MAC ADDRESS DEVICE ID LOCATION ID EMAIL ADDRESS SOCMED NAME CONTACT # It is a type of social engineering attack wherein an attacker impersonates to be a trusted contact and sends the victim fake mails. Email Address Contact # OTP Password
  • 32. Reconnaissance - Forming the attack strategy. Scan - Searching for vulnerabilities. Exploit - Beginning the attack. Access Maintenance - Gathering as much data as possible. Exfiltration - Stealing sensitive data. Identification Prevention - Disguising presence to maintain access. 1 2 3 4 5 6 6 Stages of a Malicious Cyber Attack
  • 34. 10 Cyber Security Commandments 1. Anyone can be a target for cyber criminals. - First and foremost, never assume that you won’t be hit by a cyber attack. If you’re lucky, it will never happen, but absolutely anyone can be a target, because many attacks use automated software, which doesn’t necessarily discriminate. Small businesses may also be more likely to fall victim to security breaches, because criminals consider them soft targets.
  • 35. 10 Cyber Security Commandments 2. Passwords should be strong and unique Although other forms of authentication exist, such as fingerprint scanners, passwords remain the most common way of logging into websites and systems. Don’t make life easy for criminals by using weak or easily guessed passwords like ‘Pa$$w0rd’ or ‘12345678’, and don’t reuse your passwords in different places.
  • 36. 10 Cyber Security Commandments 3. Keep all software and hardware up to date If possible, use automatic updates to keep your IT solutions up to date. Otherwise, ensure that you regularly check for updates, particularly those that include security patches. Cyber criminals will be well aware of any weaknesses, and they’ll waste no time trying to exploit them.
  • 37. 10 Cyber Security Commandments 4. Report any and all suspicious activity It’s not necessary to report every single dodgy email you get, as long as they’re automatically getting sent to your spam folder, but if you see what you think might be a phishing attempt and it hasn’t been filtered out, tell your IT people. By getting the word out, you can make sure no one in your business falls victim to a scam.
  • 38. 10 Cyber Security Commandments 5. Secure all devices including smartphones In the modern workplace, it’s not just workstations and servers you need to be concerned with; many workers also carry phones and tablets that are connected to the corporate network via WiFi. These need to made secure or limited to a guest network, because they present a potential entry point for hackers.
  • 39. 10 Cyber Security Commandments 6. Identify your security weaknesses and fix them All businesses should be aware of their weak points. That could include many things, including operating systems that are no longer supported, people who aren’t trained to spot phishing emails, routers that don’t use the latest security protocols and systems not configured to deliver the maximum security benefits. Arrange a security audit to gain clarity and to plan ahead.
  • 40. 10 Cyber Security Commandments 7. Be careful when clicking links or files in emails Booby-trapped files and websites are a favorite way for hackers to install malware or to steal data, and email is the most common way of getting people to open them. If you receive an email from someone you don’t know and it’s urging you to download a file or follow a link, stop and think about it first.
  • 41. 10 Cyber Security Commandments 8. Lock your computer when you’re away from it This is especially important if you’re using a laptop or other mobile device and you’re not in the office, because if criminals gain physical access to your computer, it’s no problem for them to install malware on it. To lock your system, simply press the Windows key and L. You’ll need your password or PIN to log back in.
  • 42. 10 Cyber Security Commandments 9. Review your cyber security measures every year Cyber criminals are always looking for new ways to rip people off, so cyber security cannot be considered as a one-off, static purchase. At least once a year, you should assess your current security solutions, to see if they’re still up to the task, and if they’re not, then you need to upgrade.
  • 43. 10 Cyber Security Commandments 10. Make multiple backups, with at least one kept off site In the majority of cases, one backup will be enough if your main copy of data is damaged by mechanical failure or human error, but if you’re unlucky, your backup could be lost at the same time. The chances of your backups being affected increase when malware enters the equation.
  • 44. 44
  • 46.
  • 47. STEP 1 LOG IN FACEBOOK ACOUNTS
  • 48. STEP 2 Go to Facebook Profile
  • 49. STEP 3 Go to account settings & privacy
  • 50. STEP 4 Go to account settings
  • 51. STEP 5 Go to Personal Information/Contact
  • 52. STEP 6 Go to contact info
  • 53. STEP 7 Add/Change primary email and add phone number Change email add if your are using yahoo.com Remove unused email address and phone numbers
  • 54. STEP 8 Enter new email address and type facebook password then type the confirmation code being sent to the email address you added.
  • 55. STEP 9 Enter phone number and type facebook password then type the confirmation code being sent to your phone number you added
  • 56. 56
  • 57. STEP 1 Go to account settings & privacy
  • 58. STEP 2 Go to account settings
  • 59. STEP 3 Go to account settings & privacy
  • 60. STEP 4 Go to account two-factor authentication
  • 61. STEP 5 Select “Text message (SMS)
  • 62. STEP 6 Type phone number and input 6-digit code
  • 63. This window will appear if you log in your facebook account to a new device
  • 64. “There are no secrets better kept than the secrets that everybody guesses”. - George Bernard Shaw