BEPC Inc.

Published on
Embed video
Share video
Ask about this video

Scene 1 (0s)

Cybersecurity awareness. BEPC Inc.. Business Excellence Professional Consulting.

Scene 2 (9s)

Definition. [image] A group of people looking at a digital screen AI generated content may be incorrect.

Scene 3 (24s)

Cybersecurity at BEPC Inc.. Purpose:. Protect company technology and information assets.

Scene 4 (38s)

BEPC Inc. personnel. [image] Una profesional de la seguridad que realiza un inventario de una variedad de cajas.

Scene 5 (56s)

qUIZ. 1. What are the three core actions involved in cybersecurity? A. Preventing, detecting, responding B. Encrypting, deleting, restoring C. Monitoring, reporting, ignoring D. None of the above.

Scene 6 (1m 23s)

Understanding Cyber Threats. Phishing. [image]. The use of digital communications to trick people into revealing sensitive data or deploying malicious software..

Scene 7 (1m 38s)

What to Look Out For:. [image]. Suspicious emails.

Scene 8 (1m 48s)

qUIZ. 4. What is phishing? A. A method of encrypting data B. A type of firewall C. A trick to reveal sensitive data D. A secure messaging protocol.

Scene 9 (2m 6s)

Cyber Security Best Practices. Password Guidelines:.

Scene 10 (2m 18s)

Safe Internet Browsing. [image]. Only download software with proper authorization.

Scene 11 (2m 30s)

Email and Messaging Security. Secure communication practices.

Scene 12 (2m 49s)

Device and Asset Security. [image]. Protecting Company Assets.

Scene 13 (3m 5s)

Generative AI and Internet Use. Generative AI Guidelines.

Scene 14 (3m 24s)

Incident Response Plan. Steps for responding to incidents:.

Scene 15 (3m 40s)

qUIZ. 6. What should you do before leaving your workstation? A. Leave it open for others B. Logout and secure the device C. Share your password D. Store personal data.

Scene 16 (4m 7s)

Incident Response. What to Do During a Security Incident.

Scene 17 (4m 21s)

Your Role in Cybersecurity. Key Responsibilities.

Scene 18 (4m 34s)

Reporting and Accountability. Reporting Channels.

Scene 19 (4m 44s)

Consequences of Policy Violations. Disciplinary actions for breaches.

Scene 20 (4m 55s)

qUIZ. 9. What should you do if you suspect a security incident? A. Try to fix the issue yourself B. Shut down the system immediately C. Disconnect the affected system and report to IT D. Ignore it unless it happens again.

Scene 21 (5m 15s)

THANK YOU.