Highlights
- Reasons for cybersecurity
- Understanding risk and vulnerability
- Focus: how you use the internet – from web browsers and social media contenting to your mobile device and connectivity – information risk
- Security awareness for people working from home
- Strategies to Mitigate Risk / Counter-measures to potential cyberattacks: deterrent/preventive/avoidance control
- Report from Security Experts and Whistleblower: Edward Snowden
- Reactions / comments / Q&A
- Career in Cybersecurity
- Conclusion
Watch Live Streams on
My Social Media Handles
Instagram Page link: https://www.instagram.com/gjefspecials.co.uk/
Facebook Page link: https://www.facebook.com/gjefspecials
Reasons for cyber security awareness
- Protection of resources (especially your data) against threat agents/hackers. Hackers can exploit your data vulnerabilities (information gathering)
- Ever-increasing usage of social networks, apps, and emerging remote jobs across the globe poses the risk of a data breach
- Scammers, spammers, and Internet frauds are on the rise like never before – a reference to the dark web
- Your data is your asset – if it’s compromised, you’re not safe.
Understanding risk and vulnerability
- Risk – the probability of loss/exposure to danger.
- Vulnerability – weakness in a system that can be exploited.
- Lack of security awareness puts you at great risk due to vulnerabilities inherent in the Internet, mobile apps, networks, and social networks.
- See vulnerability as a Value – What is it going to cost you, your loved ones, your business, or the organization if it is exploited?
Focus of the cyber security awareness:
How you use the internet – from web browsers and social media contenting to your mobile device and connectivity – particularly information risk
- Web browsers and mobile apps have vulnerabilities that are constantly exploited by threat agents.
- Take caution while using third-party software apps. Some of them are designed primarily for data breaches – there are a countless number of them.
- Read terms and conditions of services carefully before you tick the ‘Agreement box’.
- Beware of giving authorization and/or permission to apps in accessing your device storage, camera, messages, and microphone.
Security awareness for people working from home
- Connectivity between your home network and that of your company cut across some distance. There’s a potential risk of interception by threat actors.
- Data exchange can be intercepted.
- Hackers can access your home network and further gain control of the organization’s network
- Risk of eavesdropping by neighbors, visitors, and relatives.
Strategies to Mitigate Risk / Counter-measures to Potential Cyberattacks: deterrent/preventive/avoidance control
For general users
- Use 2F/3F Authentication
- Avoid sharing personal information on social networks (esp. PII)
- Take caution while granting permission or authorization to apps requesting to access your device storage, messages, camera, and microphone.
- Avoid connecting to public free WiFi.
- Do not visit suspicious websites. Avoid clicking on links in spam emails.
- Shut down your WiFi, hotspot, or device when not in use esp. at night.
For remote workers
- Isolate your home office & dedicate it for work within working hours – not accessible by relatives or visitors.
- Separate your office network from a home network.
- Hide WiFi SSID and use the latest encryption technology with a strong password.
- Confirm your VPN tunnel is secured & well configured by the IT team.
- Monitor your network and ensure no one else is connected to it.
- Make sure no one is eavesdropping on your conversation.
- Use a dedicated device for work purposes only.
Careers in Cyber security
Considering a career in cyber security?
- There is significant demand for well-qualified information security/cybersecurity & IT risk professionals in Ireland (and globally) due to skill shortage. This means Increased salaries.
- Earn industry certifications to progress through the career ladder at a faster pace. It’s a highly dynamic industry. Which industry certifications are right for me?
- Key job roles in cybersecurity include Security Analyst, Security Engineer, Security Architect, Penetration Tester, Security Consultant, and Incident Responder.
In Conclusion
“They who can give up essential liberty to obtain a little temporary safety deserve neither liberty nor safety.”
– Benjamin Franklin
Everything is very open with a very clear explanation of the challenges. It was definitely informative. Your website is extremely helpful. Thank you for sharing!
I was excited to discover this website. I want to to thank you for your time for this wonderful read!! I definitely liked every part of it and i also have you book-marked to look at new things on your website.
Good post. I learn something totally new and challenging on blogs I stumbleupon every day. It will always be interesting to read through articles from other writers and use a little something from other sites.
I appreciate, cause I found just what I was looking for. You have ended my four day long hunt! God Bless you man. Have a great day. Bye
You made some nice points there. I did a search on the subject matter and found most persons will approve with your website.
Hello, you used to write great, but the last few posts have been kinda boring… I miss your great writings. Past few posts are just a bit out of track! come on!
Greetings! I know this is kind of off topic but I was wondering which blog platform are you using for this website? I’m getting tired of WordPress because I’ve had issues with hackers and I’m looking at options for another platform. I would be great if you could point me in the direction of a good platform.
Hi! Someone in my Myspace group shared this site with us so I came to take a look. I’m definitely enjoying the information. I’m bookmarking and will be tweeting this to my followers! Great blog and excellent style and design.
Hello! This is my 1st comment here so I just wanted to give a quick shout out and tell you I truly enjoy reading your blog posts. Can you recommend any other blogs/websites/forums that go over the same subjects? Many thanks!|
I was recommended this web site by means of my cousin. I am not certain whether this submit is written by him as no one else understand such distinctive approximately my trouble. You are amazing! Thanks!
I have read several good stuff here. Certainly worth bookmarking for revisiting. I surprise how much effort you put to make such a magnificent informative web site.
Excellent post. I was checking constantly this blog and I am impressed! Very useful information specifically the last part 🙂 I care for such information much. I was seeking this certain info for a long time. Thank you and good luck.|
excellent post, very informative. I ponder why the other experts of this sector don’t understand this. You must proceed your writing. I am sure, you’ve a huge readers’ base already!|
You are my inspiration , I own few web logs and rarely run out from to post .
Your place is valueble for me. Thanks!…
Generally I do not read post on blogs, but I wish to say that this write-up very compelled me to try and do so! Your writing style has been amazed me. Thanks, very great post.
You should take part in a contest for one of the best blogs on the web. I will recommend this site!