SlideShare une entreprise Scribd logo
1  sur  33
Télécharger pour lire hors ligne
Users Awareness
of
Cyber Security
Nice to Meet You!
Name: Kazi Sarwar Hossain Sagar
Manager-End Point Security Specialist
Dhaka Distributions
e-mail : kazi@dhakadistributions.com
Cell : +88-01711-488-097
+88-01705-405-998
Web : https://www.dhakadistributions.com
LinkedIn : https://www.linkedin.com/in/kazi-sagar/
Blog : http://kazisagar.blogspot.com/
Personal Web : http://kazisagar.com
What is the Objectives?
The objective of this programme is to educate and create
awareness amongst the people/employee of
organization on use of Technology, Internet Media and
its implications on possible Cyber Threat.
Some of the possible preventive measures, one can
avoid getting victimized for his/her personal as well as
organizational community.
Why this KnowledgeSharing Session?
• Information Security
• Educating Staff
• Awareness Building
• Protecting Information/Data
• Privacy Protection
• Saving
• Overall Knowledge Sharing
• Keep Safe and Help others to
be Safe.
• For You
• For your Organization.
For Whom?
For What?
• For your Safety
• For your Organization Safety.
Our Life:
When
technology is
integrating into
human life then
#cybersecurity
is just logical
consequences…
What is CyberCrime & Security/Online
Security:
Cyber Crime is a generic term that refers to all criminal
activities done using the medium of computers, the
internet, cyber space and the worldwide Web.
Cyber Security means protecting (Personal/Official)
Information, Equipment's, Devices, Computers,
Computer Resources, Communication Devices and
information stored therein from unauthorized access,
Use, Discloser, Disruption, Modification & Destructions.
Spreading Malware/Virus
• Computer viruses are small Malicious software known as Malware
programs are designed to spread from one computer to another computer
or one network to another network and perform harmful activities.
There are multiple ways can spread Malware:
* Email Messages
* Infected or Vulnerable Website
* Instant Messaging
* Network Protocols
* Open Share Machine
* By Device
Cyber Crime
Motivation:
• Money
• Curiosity
• Revenge
• Fun
• Praise Seeker
Cyber Crime Awareness
for People:
• Curiosity or revenge may be the
primary reasons for a people to get
motivated for a cyber crime.
• Most of the times, peoples are not
aware about the implications of
cyber crime.
• Girls are the most found victims of a
cyber crime.
Cyber Threat upward Trends:
• Huge increase in the use of internet & Smart Phone Usages.
• Individual Share personal and work-related information on internet.
• Critical & Sensitive information are shared on internet.
• Financial transactions take place on internet.
• Security controls are never 100% adequate.
• Bad Guys are always smarter than Good Guys.
Some KnownMalware/Virus:
• Adware
• Spyware
• Grayware
• DDos
• Exploit
• Trozan
• Worm
• Virus
•Key Logger
•Man in the Middle
•Phishing
•Rootkit
•Exploit
•Trojan Horse
•Spammer
•Spoofer
And many more
generating every
minute somewhere in
the world….
##Ransomware
or
Crypto locker
You Can Makethe Difference…
Possibleway of Threat:
• Through USB
• Through SPAM
• Through SPIM
• Through Network
• Through Social Media
• Through Smart Phone
• Through Internet
• Through Advertisement
• Through Online Games
• Social Media Games
• Entering in Open Network
(WIFI)
And many more way…
What should you do?
• Keep Personal Information Professional and Limited
• Keep Your Privacy Settings On
• Practice Safe Browsing
• Make Sure Your Internet Connection is Secure
• Beware before click on something.
• Be Careful What You Download
• Choose Strong Passwords
• Make Online Purchases From Secure Sites
• Be Careful What You Post
• Be Careful Who You Meet Online
• User authorized software/App
• Keep Your Malware Protection/Security Program Up To Date
10 Tips To Stay Safe Online…
•Create Complex Passwords.
•Boost Your Network Security.
•Use a Firewall.
•Click Smart.
•Be a Selective Sharer.
•Protect Your Mobile Life.
•Practice Safe Surfing &
Shopping.
•Keep up to date of security
•Look out the latest scams
•Keep your guard up.
Security Awareness- Desktop& Laptop
• Ensure your Antivirus is updated and scans are configured
for a routine check
• Implement personal firewall
• Keep your Operating system updated with latest patches
• Avoid installing cracked software's
• Keep OS files and personal files in different HDD partition
• Factory Restore is the best option to clean your system
SecurityAwareness-
• Connect to ONLY authorized Wi-Fi access
• Use auto lock features
• Download apps from authorized app stores ONLY
• Use Privacy options provided by various mobile
Operating system
• Do NOT accept calls from weird numbers OR do not
give a call back
• Use License Security software.
Device(Smart Phone& Tab)
Security Awareness- Social Media
• Social Media (FB, LinkedIn,Twitter etc) is now an integral
part of our daily life
• Be sensitive in what you upload on your social networking
account (status, pics, etc)
• Use security and privacy options provided by social media
sites
• Use SMS based Two Factor Authentication
• Access control (who can see what)
• Block
• Keep your personal details, personal.
Security Awareness-PASSWORDS
• Passwords are the only and/or the primary option to ensure privacy of your
information
• Ensure Passwords are complex in nature
• Not as complex that you tend to forget it
• Include combination of upper & lower case, special charecter and numbers
• Not easy for others to guess (like your pet name, etc)
• Sensitive passwords should be changed frequently
• Do not write passwords
• Be extra careful of your passwords when using shared machines (like cyber
café)
• Avoid sharing your passwords to anyone
Password Example:
Example: Kazi.sagar%12
Alphabet(Uppercase) + Alphabet(Lowercase) + special
character + numeric
Security Awareness- Internet
• Internet use is a two-edge sword. Be SMART on using
Internet
• NEVER visit untrustedwebsites
• NEVER user referral links to visit a website. Instead type in
the URL address in the browser
• Always downloadsoftware from authorized / Trusted
sources
• Use Browser addons to get protected from known BAD sites
• Do Not Connect to unknown or unprotected wi-fi zones
• Ensure no one is shoulder surfing your key strokes
Attention: Management People
• Do not compromise with quality about security compliance issue.
• Please come out “Money is wasting by Investing in IT infrastructure &
Cyber Security” perception.
• Try to educated yourself what is new in technology and how to
benefited your company by implementing. Its easy coz you have
GOOGLE & YOUTUBE.
• Use full backup systems.
Attention: HR Dept.
• Please arrange different types of IT & Cyber Security
Training/Courses for IT Department.
Attention: IT Department
• Constant training for enrich your knowledge. Come out from “I know everything”
mentality.
• Do not be brand biased or only listen to the opposite side of table people, do PoC
then choose.
• Cross check the background of from whom/what company providing the
solutions.
• At least once in a month please arrange a thought sharing session with employee
and top management.
• Please implement constantmonitoring system office network.
• Please use dedicated Firewall Systems,Web Security, Email Security, Cloud and
offline backup solutions instead of consulted security systems.
• Do not compromise quality by saving money, sit with top management and have
an open discussion about end to end solution.
• Last but not the least, use the offline backup along with cloud backup systems.
Such Barracuda, Acronis etc.
Attention: Management
• Do not think about only tangible ROI always.There is some intangible ROI
exists also. Some ROI runs in background that you can not see but feel its
existence.
• At least once in quarter have meeting with IT People.
• Secure your business by secure your Network.
• Try to find out what’s in international trend. (Seek help from
google/YouTube)
• Do not compromise quality by saving money. Please come out from “Cheap
Solutions/That’s It/Run the Job/It did not take that long” Mentality.
• Prepare and allocate yearly budget for IT Department as you did for other
department coz its as important as other dept. Example: Sales and
Marketing Dept.
• Last but not the least, Business is yours. You build it by hard working and
dedications of years long. Secure your business with same efforts.
Remember...
So Who
Can
Prevent
This?
Ans. is you…
Because…
So….Please…
•Any
Thank
You…
WithRegards
Kazi Sarwar Hossain Sagar

Contenu connexe

Tendances

3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security
Ana Meskovska
 
Mobile Security Basics
Mobile Security BasicsMobile Security Basics
Mobile Security Basics
anandraje
 

Tendances (20)

Experience Sharing on School Pentest Project (Updated)
Experience Sharing on School Pentest Project (Updated)Experience Sharing on School Pentest Project (Updated)
Experience Sharing on School Pentest Project (Updated)
 
Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....
 
Competitive cyber security
Competitive cyber securityCompetitive cyber security
Competitive cyber security
 
TalTech Luncheon Talk on Cybersecurity and Healthcare
TalTech Luncheon Talk on Cybersecurity and HealthcareTalTech Luncheon Talk on Cybersecurity and Healthcare
TalTech Luncheon Talk on Cybersecurity and Healthcare
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Internet security
Internet securityInternet security
Internet security
 
Security best practices for regular users
Security best practices for regular usersSecurity best practices for regular users
Security best practices for regular users
 
Information security
Information securityInformation security
Information security
 
Lock it or Lose It: Why Every Company Should be Concerned About Data Security
Lock it or Lose It: Why Every Company Should be Concerned About Data SecurityLock it or Lose It: Why Every Company Should be Concerned About Data Security
Lock it or Lose It: Why Every Company Should be Concerned About Data Security
 
Webinar: 12 Tips to Stay Safer Online - 2018-10-16
Webinar: 12 Tips to Stay Safer Online - 2018-10-16Webinar: 12 Tips to Stay Safer Online - 2018-10-16
Webinar: 12 Tips to Stay Safer Online - 2018-10-16
 
Cyber Hygiene
Cyber HygieneCyber Hygiene
Cyber Hygiene
 
Backups and Disaster Recovery for Nonprofits
Backups and Disaster Recovery for NonprofitsBackups and Disaster Recovery for Nonprofits
Backups and Disaster Recovery for Nonprofits
 
Basic concepts in computer security
Basic concepts in computer securityBasic concepts in computer security
Basic concepts in computer security
 
Free Libre Open Source Software Development
Free Libre Open Source Software DevelopmentFree Libre Open Source Software Development
Free Libre Open Source Software Development
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security
 
Reducing the Impact of Cyber Attacks
Reducing the Impact of Cyber AttacksReducing the Impact of Cyber Attacks
Reducing the Impact of Cyber Attacks
 
Mobile Security Basics
Mobile Security BasicsMobile Security Basics
Mobile Security Basics
 
Web browser week5 presentation
Web browser week5 presentationWeb browser week5 presentation
Web browser week5 presentation
 
Personal Digital Hygiene
Personal Digital HygienePersonal Digital Hygiene
Personal Digital Hygiene
 

Similaire à Users awarness programme for Online Privacy

Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
amiinaaa
 
Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety
Sadaf Walliyani
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness Training
Randy Bowman
 
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdfitsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
MansoorAhmed57263
 

Similaire à Users awarness programme for Online Privacy (20)

Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
 
Secure End User
Secure End UserSecure End User
Secure End User
 
Personal Internet Security Practice
Personal Internet Security PracticePersonal Internet Security Practice
Personal Internet Security Practice
 
Wfh security risks - Ed Adams, President, Security Innovation
Wfh security risks  - Ed Adams, President, Security InnovationWfh security risks  - Ed Adams, President, Security Innovation
Wfh security risks - Ed Adams, President, Security Innovation
 
How to-become-secure-and-stay-secure
How to-become-secure-and-stay-secureHow to-become-secure-and-stay-secure
How to-become-secure-and-stay-secure
 
Basic Security Training for End Users
Basic Security Training for End UsersBasic Security Training for End Users
Basic Security Training for End Users
 
Security Best Practices for Regular Users
Security Best Practices for Regular UsersSecurity Best Practices for Regular Users
Security Best Practices for Regular Users
 
Executive Directors Chat:It's easy to stay safe online.pdf
Executive Directors Chat:It's easy to stay safe online.pdfExecutive Directors Chat:It's easy to stay safe online.pdf
Executive Directors Chat:It's easy to stay safe online.pdf
 
Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety
 
Keynote Information Security days Luxembourg 2015
Keynote Information Security days Luxembourg 2015Keynote Information Security days Luxembourg 2015
Keynote Information Security days Luxembourg 2015
 
It security the condensed version
It security  the condensed version It security  the condensed version
It security the condensed version
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness Training
 
Iron Bastion: How to Manage Your Clients' Data Responsibly
Iron Bastion: How to Manage Your Clients' Data ResponsiblyIron Bastion: How to Manage Your Clients' Data Responsibly
Iron Bastion: How to Manage Your Clients' Data Responsibly
 
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdfitsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
 
IT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.ppt
 
Securing your cyberspace_Watson
Securing your cyberspace_WatsonSecuring your cyberspace_Watson
Securing your cyberspace_Watson
 
Cyber Security Seminar
Cyber Security SeminarCyber Security Seminar
Cyber Security Seminar
 
Boca Chamber and Simplitfy - Work From Home Game Plan
Boca Chamber and Simplitfy - Work From Home Game PlanBoca Chamber and Simplitfy - Work From Home Game Plan
Boca Chamber and Simplitfy - Work From Home Game Plan
 
Digital Security and Hygiene.pptx
Digital Security and Hygiene.pptxDigital Security and Hygiene.pptx
Digital Security and Hygiene.pptx
 
Keynote at the Cyber Security Summit Prague 2015
Keynote at the Cyber Security Summit Prague 2015Keynote at the Cyber Security Summit Prague 2015
Keynote at the Cyber Security Summit Prague 2015
 

Dernier

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Dernier (20)

Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 

Users awarness programme for Online Privacy

  • 2. Nice to Meet You! Name: Kazi Sarwar Hossain Sagar Manager-End Point Security Specialist Dhaka Distributions e-mail : kazi@dhakadistributions.com Cell : +88-01711-488-097 +88-01705-405-998 Web : https://www.dhakadistributions.com LinkedIn : https://www.linkedin.com/in/kazi-sagar/ Blog : http://kazisagar.blogspot.com/ Personal Web : http://kazisagar.com
  • 3. What is the Objectives? The objective of this programme is to educate and create awareness amongst the people/employee of organization on use of Technology, Internet Media and its implications on possible Cyber Threat. Some of the possible preventive measures, one can avoid getting victimized for his/her personal as well as organizational community.
  • 4. Why this KnowledgeSharing Session? • Information Security • Educating Staff • Awareness Building • Protecting Information/Data • Privacy Protection • Saving • Overall Knowledge Sharing • Keep Safe and Help others to be Safe.
  • 5. • For You • For your Organization. For Whom? For What? • For your Safety • For your Organization Safety.
  • 7. When technology is integrating into human life then #cybersecurity is just logical consequences…
  • 8. What is CyberCrime & Security/Online Security: Cyber Crime is a generic term that refers to all criminal activities done using the medium of computers, the internet, cyber space and the worldwide Web. Cyber Security means protecting (Personal/Official) Information, Equipment's, Devices, Computers, Computer Resources, Communication Devices and information stored therein from unauthorized access, Use, Discloser, Disruption, Modification & Destructions.
  • 9. Spreading Malware/Virus • Computer viruses are small Malicious software known as Malware programs are designed to spread from one computer to another computer or one network to another network and perform harmful activities. There are multiple ways can spread Malware: * Email Messages * Infected or Vulnerable Website * Instant Messaging * Network Protocols * Open Share Machine * By Device
  • 10. Cyber Crime Motivation: • Money • Curiosity • Revenge • Fun • Praise Seeker Cyber Crime Awareness for People: • Curiosity or revenge may be the primary reasons for a people to get motivated for a cyber crime. • Most of the times, peoples are not aware about the implications of cyber crime. • Girls are the most found victims of a cyber crime.
  • 11. Cyber Threat upward Trends: • Huge increase in the use of internet & Smart Phone Usages. • Individual Share personal and work-related information on internet. • Critical & Sensitive information are shared on internet. • Financial transactions take place on internet. • Security controls are never 100% adequate. • Bad Guys are always smarter than Good Guys.
  • 12. Some KnownMalware/Virus: • Adware • Spyware • Grayware • DDos • Exploit • Trozan • Worm • Virus •Key Logger •Man in the Middle •Phishing •Rootkit •Exploit •Trojan Horse •Spammer •Spoofer And many more generating every minute somewhere in the world…. ##Ransomware or Crypto locker
  • 13. You Can Makethe Difference…
  • 14. Possibleway of Threat: • Through USB • Through SPAM • Through SPIM • Through Network • Through Social Media • Through Smart Phone • Through Internet • Through Advertisement • Through Online Games • Social Media Games • Entering in Open Network (WIFI) And many more way…
  • 15. What should you do? • Keep Personal Information Professional and Limited • Keep Your Privacy Settings On • Practice Safe Browsing • Make Sure Your Internet Connection is Secure • Beware before click on something. • Be Careful What You Download • Choose Strong Passwords • Make Online Purchases From Secure Sites • Be Careful What You Post • Be Careful Who You Meet Online • User authorized software/App • Keep Your Malware Protection/Security Program Up To Date
  • 16. 10 Tips To Stay Safe Online… •Create Complex Passwords. •Boost Your Network Security. •Use a Firewall. •Click Smart. •Be a Selective Sharer. •Protect Your Mobile Life. •Practice Safe Surfing & Shopping. •Keep up to date of security •Look out the latest scams •Keep your guard up.
  • 17. Security Awareness- Desktop& Laptop • Ensure your Antivirus is updated and scans are configured for a routine check • Implement personal firewall • Keep your Operating system updated with latest patches • Avoid installing cracked software's • Keep OS files and personal files in different HDD partition • Factory Restore is the best option to clean your system
  • 18. SecurityAwareness- • Connect to ONLY authorized Wi-Fi access • Use auto lock features • Download apps from authorized app stores ONLY • Use Privacy options provided by various mobile Operating system • Do NOT accept calls from weird numbers OR do not give a call back • Use License Security software. Device(Smart Phone& Tab)
  • 19. Security Awareness- Social Media • Social Media (FB, LinkedIn,Twitter etc) is now an integral part of our daily life • Be sensitive in what you upload on your social networking account (status, pics, etc) • Use security and privacy options provided by social media sites • Use SMS based Two Factor Authentication • Access control (who can see what) • Block • Keep your personal details, personal.
  • 20. Security Awareness-PASSWORDS • Passwords are the only and/or the primary option to ensure privacy of your information • Ensure Passwords are complex in nature • Not as complex that you tend to forget it • Include combination of upper & lower case, special charecter and numbers • Not easy for others to guess (like your pet name, etc) • Sensitive passwords should be changed frequently • Do not write passwords • Be extra careful of your passwords when using shared machines (like cyber café) • Avoid sharing your passwords to anyone
  • 21. Password Example: Example: Kazi.sagar%12 Alphabet(Uppercase) + Alphabet(Lowercase) + special character + numeric
  • 22. Security Awareness- Internet • Internet use is a two-edge sword. Be SMART on using Internet • NEVER visit untrustedwebsites • NEVER user referral links to visit a website. Instead type in the URL address in the browser • Always downloadsoftware from authorized / Trusted sources • Use Browser addons to get protected from known BAD sites • Do Not Connect to unknown or unprotected wi-fi zones • Ensure no one is shoulder surfing your key strokes
  • 23. Attention: Management People • Do not compromise with quality about security compliance issue. • Please come out “Money is wasting by Investing in IT infrastructure & Cyber Security” perception. • Try to educated yourself what is new in technology and how to benefited your company by implementing. Its easy coz you have GOOGLE & YOUTUBE. • Use full backup systems. Attention: HR Dept. • Please arrange different types of IT & Cyber Security Training/Courses for IT Department.
  • 24. Attention: IT Department • Constant training for enrich your knowledge. Come out from “I know everything” mentality. • Do not be brand biased or only listen to the opposite side of table people, do PoC then choose. • Cross check the background of from whom/what company providing the solutions. • At least once in a month please arrange a thought sharing session with employee and top management. • Please implement constantmonitoring system office network. • Please use dedicated Firewall Systems,Web Security, Email Security, Cloud and offline backup solutions instead of consulted security systems. • Do not compromise quality by saving money, sit with top management and have an open discussion about end to end solution. • Last but not the least, use the offline backup along with cloud backup systems. Such Barracuda, Acronis etc.
  • 25. Attention: Management • Do not think about only tangible ROI always.There is some intangible ROI exists also. Some ROI runs in background that you can not see but feel its existence. • At least once in quarter have meeting with IT People. • Secure your business by secure your Network. • Try to find out what’s in international trend. (Seek help from google/YouTube) • Do not compromise quality by saving money. Please come out from “Cheap Solutions/That’s It/Run the Job/It did not take that long” Mentality. • Prepare and allocate yearly budget for IT Department as you did for other department coz its as important as other dept. Example: Sales and Marketing Dept. • Last but not the least, Business is yours. You build it by hard working and dedications of years long. Secure your business with same efforts.
  • 26.
  • 28.