Security Awareness Essentials

Use the arrow keys or on-screen arrows to navigate.

Cyberattacks come in all shapes and sizes.

A hacking tool

This module will teach you why they happen and how to respond to them.

Attackers are after value

But what is valuable to attackers?

Money

A spreadsheet with credit card details

Credit Card Numbers, Crypto Currency data or Bank Account Information are the most obvious targets.

Trade Secrets

Source Code

Source Code, Blueprints and other proprietary information can be very valuable to a business's competitors.

Business Information

Stock information

Any information that allows attackers to predict the future performance of a company can be abused for insider trading on the stock markets.

Reputation Damage

A defaced website

Caused by simple attacks like defacing a website...

Reputation Damage

Customer data

...or the leaking of customer information.

Ransomware

An encrypted laptop

Encrypting files on compromised systems allows attackers to demand ransoms from affected organizations to restore their data.

In short, cyber criminals aim to either acquire or destroy value in the form of money, information or reputation.

Let's put what you've learned into practice

Click on all elements that apply.

Click on all things valuable to an attacker. (0 of 6)

Labeled squares Payment Methods Confidential Financial Information Customer Data Private Source Code Access to Staff Computers Changing the Website

Who is responsible for cyber security?

Many employees and managers make the mistake of thinking that the various security or IT teams are solely responsible for protecting the organization from attacks.

 

However, the work of all staff is required to keep an organization secure.

Some users are the weakest or least secure links in IT systems.

An office

Attackers know this. Therefore, most common cyber attacks target people rather than computers.

What you can do.

In 7 easy steps.

(1) Exercise Caution

An email pretending to come from a coworker with an external link

Always exercise caution. Never trust something just because it seems to come from someone you know. Never take risks in the office while counting on the IT team or antivirus software to protect you.

(2) Ask and Report

Two puzzle pieces

If you are unsure about something, ask the IT or security team. If you see suspicious behavior or scams, report them. These specialized teams rely on you for this critical information. Always lean on the side of safety.

(3) Never Hide Mistakes

Clicking on a malicious file or making a coding mistake is always scary. Your first impulse may be to hush it up. However, please do not do so.

IT Security teams can only defend against threats they know about. The sooner they know, the faster they can stop an attack.

You are unlikely to be punished for making mistakes. However, hiding security mistakes that then lead to damage to the organization is likely to have severe consequences.

(4) Shutdown and Disconnect

When your computer starts behaving oddly, shut it down immediately.

A laptop's off button

For laptops, press and hold the power button for several seconds until the machine turns completely off.

A desktop's plugged in power cord

For desktop computers, unplug the power cable.

A desktop's plugged in ethernet cable

Network cards may draw power from the network cable, so you should also disconnect them.

(5) Apply Patches and Updates

Patches and updates can be bothersome and interrupt your workflow. This is especially true for updates that require rebooting your computer.

The Windows update dialog

However, it is still critical that you apply patches as soon as they are released to keep your computer safe.

(6) Keep your antivirus definitions updated

Antivirus software works by comparing files to known instances of malware.

Antivirus showing that it is up to date

This is why it is critical that you keep your antivirus definitions updated. Without current virus definitions, there is nothing your antivirus software can do to protect you against recent malware.

Luckily, this process is automatic with most antivirus software.

(7) Observe E-Mail Etiquette

Emails are one of the most common reasons for accidental data leaks. It is therefore important that you exercise caution when sending them.

Always double-check the recipients and everyone included in the CC and BCC before sending an email.

Never send confidential files over email without encrypting them first.

Always double check that the file you have attached is the correct one by opening it after it has been attached.

Let's put what you've learned into practice

Click on all elements that apply.

Click on everyone responsible for IT security. (0 of 6)

Labeled figures Users Employees IT Security Government Police

Your laptop is behaving oddly. What do you do?

A laptop

Your desktop is behaving oddly. What do you do? (0 of 2)

A desktop The power cord The ethernet cable

End of Module

Click here to return to the main menu.
© 2024 Reflare Ltd, and/or its Affiliates. All Rights Reserved.