Hyphenet Security Awareness Training

SEO Expert in San Diego à Jen Ruhman
5 Apr 2018
Hyphenet Security Awareness Training
Hyphenet Security Awareness Training
Hyphenet Security Awareness Training
Hyphenet Security Awareness Training
Hyphenet Security Awareness Training
Hyphenet Security Awareness Training
Hyphenet Security Awareness Training
Hyphenet Security Awareness Training
Hyphenet Security Awareness Training
Hyphenet Security Awareness Training
Hyphenet Security Awareness Training
Hyphenet Security Awareness Training
Hyphenet Security Awareness Training
Hyphenet Security Awareness Training
Hyphenet Security Awareness Training
Hyphenet Security Awareness Training
Hyphenet Security Awareness Training
Hyphenet Security Awareness Training
Hyphenet Security Awareness Training
Hyphenet Security Awareness Training
Hyphenet Security Awareness Training
Hyphenet Security Awareness Training
Hyphenet Security Awareness Training
Hyphenet Security Awareness Training
Hyphenet Security Awareness Training
Hyphenet Security Awareness Training
Hyphenet Security Awareness Training
Hyphenet Security Awareness Training
Hyphenet Security Awareness Training
Hyphenet Security Awareness Training
Hyphenet Security Awareness Training
Hyphenet Security Awareness Training
Hyphenet Security Awareness Training
Hyphenet Security Awareness Training
Hyphenet Security Awareness Training
Hyphenet Security Awareness Training
Hyphenet Security Awareness Training
Hyphenet Security Awareness Training
Hyphenet Security Awareness Training
Hyphenet Security Awareness Training
Hyphenet Security Awareness Training
Hyphenet Security Awareness Training
Hyphenet Security Awareness Training
Hyphenet Security Awareness Training
Hyphenet Security Awareness Training
Hyphenet Security Awareness Training
Hyphenet Security Awareness Training
Hyphenet Security Awareness Training
Hyphenet Security Awareness Training
Hyphenet Security Awareness Training
Hyphenet Security Awareness Training
Hyphenet Security Awareness Training
Hyphenet Security Awareness Training
Hyphenet Security Awareness Training
Hyphenet Security Awareness Training
Hyphenet Security Awareness Training
Hyphenet Security Awareness Training
Hyphenet Security Awareness Training
Hyphenet Security Awareness Training
Hyphenet Security Awareness Training
Hyphenet Security Awareness Training
Hyphenet Security Awareness Training
Hyphenet Security Awareness Training
Hyphenet Security Awareness Training
Hyphenet Security Awareness Training
1 sur 65

Contenu connexe

Tendances

Cyber Security AwarenessCyber Security Awareness
Cyber Security AwarenessRamiro Cid
Information Security Awareness Training by Wilfrid Laurier UniversityInformation Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier UniversityAtlantic Training, LLC.
Security Awareness Training by FortinetSecurity Awareness Training by Fortinet
Security Awareness Training by FortinetAtlantic Training, LLC.
Cybersecurity training seminars, courses, cybersecurity lawsCybersecurity training seminars, courses, cybersecurity laws
Cybersecurity training seminars, courses, cybersecurity lawsBryan Len
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Stephen Cobb
Information security and AttacksInformation security and Attacks
Information security and AttacksSachin Darekar

Similaire à Hyphenet Security Awareness Training

12990739.ppt12990739.ppt
12990739.pptMuhammadShahidulIsla8
Phish training finalPhish training final
Phish training finalJen Ruhman
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02amiinaaa
CYBER_SECURITY_BASICS_FINAL.pptxCYBER_SECURITY_BASICS_FINAL.pptx
CYBER_SECURITY_BASICS_FINAL.pptxQuiMo3
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptxCharithraaAR
Computer Security and safety Computer Security and safety
Computer Security and safety Sadaf Walliyani

Dernier

Mule Meetup Calgary- API Governance & Conformance.pdfMule Meetup Calgary- API Governance & Conformance.pdf
Mule Meetup Calgary- API Governance & Conformance.pdfNithaJoseph4
Google Cloud Study Jams Info SessionGoogle Cloud Study Jams Info Session
Google Cloud Study Jams Info SessionGDSCPCCE
Easy Salesforce CI/CD with Open Source Only - Dreamforce 23Easy Salesforce CI/CD with Open Source Only - Dreamforce 23
Easy Salesforce CI/CD with Open Source Only - Dreamforce 23NicolasVuillamy1
Getting your enterprise ready for Microsoft 365 CopilotGetting your enterprise ready for Microsoft 365 Copilot
Getting your enterprise ready for Microsoft 365 CopilotVignesh Ganesan I Microsoft MVP
Future of SkillsFuture of Skills
Future of SkillsAlison B. Lowndes
Experts Live Europe 2023 - Ensure your compliance in Microsoft Teams with Mic...Experts Live Europe 2023 - Ensure your compliance in Microsoft Teams with Mic...
Experts Live Europe 2023 - Ensure your compliance in Microsoft Teams with Mic...Jasper Oosterveld

Hyphenet Security Awareness Training

Notes de l'éditeur

  1. First we will go through a threats overview, which is designed to bring awareness to the different security concerns surrounding specific threats. Next Password Safety that will run through some best practices not just when creating passwords but utilizing them. Then Web Protection, which will go through different things to know about when utilizing the internet Then Email Protection, which will focus on email borne threats and spam. Then finally we will finish up with preventative measures. Keep in mind throughout this webinar I will be giving tips and best practices not just for you to utilize in the business world, but at home as well
  2. Does this screen or others like this look familiar?
  3. How about this? This is extremely important in the conversation around passwords due to the fact that most passwords can be simply changed or reset by knowing a few answers to questions about yourself. Most of these answers can be commonly found on users’ social media accounts. So it is very important to not just practice good password policies but also strong security questions as well.
  4. So typically due to the complexity requirements of passwords usually users end up writing their passwords on sticky notes or in documents on their desktop.
  5. Others freely share their passwords with other users. We see this especially in organizations that require users to clock in at the beginning and end of the day. They do not want to be late again so they call their friend who is already at work and ask them to clock in for them.
  6. Current password policies that are often used today are not adequate at protecting users. As you can see this is what a typical user does. If a password requires 8 characters they might choose something like elephant. But if they go to another application or website and now it requires a number, they are not going to think of a brand new unique password, they are just going to tack on a 1 at the end. This continues when websites require a symbol, or capital. Users are re-using the exact same password base, which is Elephant.
  7. This leads to current password policies that typically have users change their password every 90 days or every 6 months. Users are not increasing your businesses security by changing their password on these scheduled intervals due to them doing the above. They are simply going to the next number and next symbol on the keyboard. In fact now NIST is recommending against having users change passwords every 90 days due to the above.
  8. So when data breaches occur passwords are sometimes extracted, it would be very easy for me to go to another website and figure out what your password is. For example if the password that was stolen was elephant, and I went to a website that required 8 characters and 1 symbol. There are only 32 symbols on the keyboard, therefore I only need to type in elephant and then try every symbol and see if I gain access into whatever system I am trying to break into.
  9. So a great resource to inform your users about is this website. which will check all of the databases of compromised credentials to see if your credentials are any of the ones that have been stolen. You can enter in your commonly used usernames or email address and it will let you know if there has been a breach and what was breached. If your password was stolen it is recommended to completely change your password, don’t just change the number or symbol!
  10. So Two-Factor is a solution that can prevent poor password policies, and ultimately turns the login process into requiring a User, Password, and a One time password. This one time password typically comes from a mobile device or hard token. So it turns the password authentication into something that the user knows (such as a password) and something they have (a cell phone). If you do not have both pieces of information you are unable to log in.