Cybersecurity awareness. BEPC Inc.. Business Excellence Professional Consulting.
Definition. [image] A group of people looking at a digital screen AI generated content may be incorrect.
Cybersecurity at BEPC Inc.. Purpose:. Protect company technology and information assets.
BEPC Inc. personnel. [image] Una profesional de la seguridad que realiza un inventario de una variedad de cajas.
qUIZ. 1. What are the three core actions involved in cybersecurity? A. Preventing, detecting, responding B. Encrypting, deleting, restoring C. Monitoring, reporting, ignoring D. None of the above.
Understanding Cyber Threats. Phishing. [image]. The use of digital communications to trick people into revealing sensitive data or deploying malicious software..
What to Look Out For:. [image]. Suspicious emails.
qUIZ. 4. What is phishing? A. A method of encrypting data B. A type of firewall C. A trick to reveal sensitive data D. A secure messaging protocol.
Cyber Security Best Practices. Password Guidelines:.
Safe Internet Browsing. [image]. Only download software with proper authorization.
Email and Messaging Security. Secure communication practices.
Device and Asset Security. [image]. Protecting Company Assets.
Generative AI and Internet Use. Generative AI Guidelines.
Incident Response Plan. Steps for responding to incidents:.
qUIZ. 6. What should you do before leaving your workstation? A. Leave it open for others B. Logout and secure the device C. Share your password D. Store personal data.
Incident Response. What to Do During a Security Incident.
Your Role in Cybersecurity. Key Responsibilities.
Reporting and Accountability. Reporting Channels.
Consequences of Policy Violations. Disciplinary actions for breaches.
qUIZ. 9. What should you do if you suspect a security incident? A. Try to fix the issue yourself B. Shut down the system immediately C. Disconnect the affected system and report to IT D. Ignore it unless it happens again.
THANK YOU.