Cybersecurity: It's Everyone's Responsibility. LAST UPDATED: JUNE 2023.
Cyber security threats are on the rise, and it is important that all employees are aware of the risks and how to mitigate them. We will also cover best practices for protecting our organization's data and systems. This includes strong password management, data backup, and safe browsing habits. We will provide you with practical tips and tools to keep your IT activities secure..
Main Cybersecurity Threats. In this section, we will provide an overview of the common cyber threats such as phishing, malware, and social engineering attacks: Email Spoofing Phishing Malware Data Security & Management Password Protection.
CYBERSECURITY. TRAINING DECK. It is the act of sending emails with a forged sender address . It tricks the recipient into thinking that someone they know, or trust sent them the email..
02 Different types of spoofing:. A type of email spoofing, in which only the email sender’s display name is forged . Somebody can do this by registering a new Gmail account with the same name as the contact you want to impersonate..
TRAINING DECK. CYBERSECURITY. https://pitch-assets-ccb95893-de3f-4266-973c-20049231b248.s3.eu-west-1.amazonaws.com/try-pitch-pdf-export-logo.svg.
TRAINING DECK. CYBERSECURITY. https://pitch-assets-ccb95893-de3f-4266-973c-20049231b248.s3.eu-west-1.amazonaws.com/try-pitch-pdf-export-logo.svg.
Outgoing Email:. Incoming Email:. TRAINING DECK. CYBERSECURITY.
How to identify spoofed emails?. CYBERSECURITY. TRAINING DECK.
TRAINING DECK. CYBERSECURITY. https://pitch-assets-ccb95893-de3f-4266-973c-20049231b248.s3.eu-west-1.amazonaws.com/try-pitch-pdf-export-logo.svg.
TRAINING DECK. 01 - Always check the sender’s email address before you download any document. All emails from GC should end with “ @gulfcraftinc.com ”.
If you suspect receiving such an email, please do not click on the links, do not download any attachments, and do not reply to it – just forward the original malicious email as an attachment to [email protected] and cc [email protected] so we can block it from getting to others..
After forwarding the email to helpdesk, you should block the sender on Outlook..
Phishing is where a cybercriminal sends a deceptive message that’s designed to fool a user into providing sensitive information such as credit card numbers or to launch malware on the user’s system, are on the rise. Phishing attacks frequently rely on email spoofing , where the email header—the from field—is forged to make the message appear as if it were sent by a trusted sender..
02 Different types of Phishing:. Most phishing attacks are sent by email. The crook will register a fake domain that mimics a genuine organisation and sends thousands of generic requests. The fake domain often involves character substitution, like using ‘r’ and ‘n’ next to each other to create ‘rn’ instead of ‘m’..
02 Different types of Phishing:. More sophisticated than email phishing, describes malicious emails sent to a specific person. Criminals who do this will already have some or all of the following information about the victim: Their name. Place of employment. Job title. Email address; and Specific information about their job role..
02 Different types of Phishing:. Whaling:. Whaling attacks are even more targeted, taking aim at senior executives. Although the end goal of whaling is the same as any other kind of phishing attack, the technique tends to be a lot subtler. Tricks such as fake links and malicious URLs aren’t helpful in this instance, as criminals are attempting to imitate senior staff..
02 Different types of Phishing:. Smishing and vishing:.
03 More cases of Phishing:. TRAINING DECK. CYBERSECURITY.
Malware is software designed to steal data or inflict damage on computer or software systems. There are 5 main types of Malware..
02 Different types of Malware:. Viruses are perhaps one of the most well-known malware types. They link their malicious code with clean code and wait for a user to execute it. They spread quickly through a variety of systems, affecting how they work..
02 Different types of Malware:. Spyware keeps track of what a user does on their computer. Even though spyware may not overtly damage your system, it still fits the malware definition. Spyware hides, like a spy, in the background of a user’s computer, collecting information without the user’s knowledge. This may include sensitive data like credit card details and passwords..
01. On Data Security & Management:. TRAINING DECK.
On Data Security & Management:. TRAINING DECK. CYBERSECURITY.
Creating strong passwords is essential for protecting sensitive data. By following best practices, we can help prevent unauthorized access to our accounts and protect against cyber attacks..
02 We don’t do rules, but guidelines. Never stick password on your desk/laptop. Never save your passwords/credentials to your browser. Don't use the same password over multiple sites. Use multi-factor authentication whenever possible. Do not share password with any other users. Log out from the desktop when you leave your desk. User is fully responsible for any loss caused by password leak and sharing of password..
TRAINING DECK. CYBERSECURITY. Strong Passwords:. https://external-media.api.pitch.com/provider/icons8/clouds/lock.svg.
https external media api pitch com provider icons8 fluent systems regular phone svg.
Thank you!. LAST UPDATED: JUNE 2023. MAINTAINED BY: IT DEPARTMENT.