Security Awareness Training

Published on
Embed video
Share video
Ask about this video

Scene 1 (0s)

By: Katlego Motlafe (ISRO). InfoSec Awareness Training.

Scene 2 (9s)

Information Security Awareness Training What is Information Security Goals for Today Purpose of training Social Engineering Phishing Password Security Ransomware Confidentiality Integrity Availability InfoSec Policies Gift Card Fraud.

Scene 3 (22s)

What is Information Security. Access to information should be restricted to only those who need access to it.

Scene 4 (52s)

Technology Process People. People Training and Awareness Organizational Culture Professional Skills and Qualifications Competent resources Process Governance Frameworks and Best practice Processes and procedures Assessments and IT Audits Technology Technological controls Tools and systems.

Scene 5 (1m 9s)

Purpose of training. To promote awareness of currently existing information security policies, procedures and standards. To answer any questions about information security requirements and procedures. To promote general computer security awareness.

Scene 6 (1m 28s)

Can you find the the mistake?. https://www.instagram.com.

Scene 7 (1m 37s)

Can you find the the mistake?. https://www.instagram.com.

Scene 8 (1m 44s)

Social Engineering. Distraction. and. Misdirection.

Scene 9 (1m 53s)

Phishing. When Scammers fool you to think they are someone you trust in order to make you do something..

Scene 10 (2m 4s)

Search. You may be surprised, but some of the top search results in Google are phishing links. Scammers also invest in search engine optimization and work hard to rank their scam sites in the top search results..

Scene 11 (2m 30s)

Social Media Scams. Social media is full of fake accounts. It could also be a fake account with the same name and photo as one of your real friends that will later try to scam you. Or a Compromised account.

Scene 12 (2m 45s)

QR Code Scams. Who thought a QR code could be dangerous? They are everywhere, especially in restaurants. Criminals can place their own sticker over the legitimate one. So that when you scan it, you will be redirected to a fake site..

Scene 13 (3m 5s)

Vishing (voice phishing) is a type of phishing attack made over the telephone. Scammers can spoof a phone number that looks identical to a known number, like your bank..

Scene 14 (3m 22s)

What Helps Protect You From Phishing Attacks?. If it’s urgent, don’t let the emotions cloud your judgment Call and verify! - Verify that you are talking to the correct person Check the address - Always check the email address and URL for spelling mistakes Enable Multi-Factor Authentication Look at the style of the message. If it’s odd, call and verify Ask questions.

Scene 15 (3m 41s)

What is Payment Fraud?. If you’re tricked into sending money to a fraudulent bank account, the bank may not be there to help you. After all, it’s you who transferred the money, not the criminal..

Scene 16 (4m 7s)

[image]. Verify that the bank info match the one on file.

Scene 17 (4m 25s)

[image] PASSWORD ACCOL_JNI blow. Don’t reuse passwords!.

Scene 18 (4m 37s)

7 characters < 1 Sec 1 minute 6 Minutes 8 characters 5 Seconds 1 hour 8 Hours 9 characters 2 Minutes 3-4 days 3 Weeks 10 characters 58 Minutes 7 months 5 Years 11 characters 1 day 40 year 400 Years 12 characters 3 weeks 2000 years 34 000 Years.

Scene 19 (4m 55s)

[image]. [image]. HOWEVER….. So even if you have a STRONG PASSWORD, it may still not be enough..

Scene 20 (5m 14s)

And That is Why…. [image]. [image] Security. This will help to protect your account if your password was stolen or leaked in a data breach..

Scene 21 (5m 27s)

Or even better yet, a physical USB key. What type of Multi-Factor Authentication to use?.

Scene 22 (5m 41s)

Ransomware. [image] YOUR PE SO AL FILES ARETENC! Make payment o will be dest 12 Hours TED key.

Scene 23 (5m 55s)

[image] YOUR PEFSO AL FILES ARETEWCf TED key Make payment o will be destro 12 Hours 01..

Scene 24 (6m 12s)

Encrypt the data on the USB device in case you lose it or it gets stolen..