- Reasons for cybersecurity
- Understanding risk and vulnerability
- Focus: how you use the internet – from web browsers and social media contenting to your mobile device and connectivity – information risk
- Security awareness for people working from home
- Strategies to Mitigate Risk / Counter-measures to potential cyberattacks: deterrent/preventive/avoidance control
- Report from Security Experts and Whistleblower: Edward Snowden
- Reactions / comments / Q&A
- Career in Cybersecurity
Watch Live Streams on
My Social Media Handles
Instagram Page link: https://www.instagram.com/gjefspecials.co.uk/
Facebook Page link: https://www.facebook.com/gjefspecials
Reasons for cyber security awareness
- Protection of resources (especially your data) against threat agents/hackers. Hackers can exploit your data vulnerabilities (information gathering)
- Ever-increasing usage of social networks, apps, and emerging remote jobs across the globe poses the risk of a data breach
- Scammers, spammers, and Internet frauds are on the rise like never before – a reference to the dark web
- Your data is your asset – if it’s compromised, you’re not safe.
Understanding risk and vulnerability
- Risk – the probability of loss/exposure to danger.
- Vulnerability – weakness in a system that can be exploited.
- Lack of security awareness puts you at great risk due to vulnerabilities inherent in the Internet, mobile apps, networks, and social networks.
- See vulnerability as a Value – What is it going to cost you, your loved ones, your business, or the organization if it is exploited?
Focus of the cyber security awareness:
How you use the internet – from web browsers and social media contenting to your mobile device and connectivity – particularly information risk
- Web browsers and mobile apps have vulnerabilities that are constantly exploited by threat agents.
- Take caution while using third-party software apps. Some of them are designed primarily for data breaches – there are a countless number of them.
- Read terms and conditions of services carefully before you tick the ‘Agreement box’.
- Beware of giving authorization and/or permission to apps in accessing your device storage, camera, messages, and microphone.
Security awareness for people working from home
- Connectivity between your home network and that of your company cut across some distance. There’s a potential risk of interception by threat actors.
- Data exchange can be intercepted.
- Hackers can access your home network and further gain control of the organization’s network
- Risk of eavesdropping by neighbors, visitors, and relatives.
Strategies to Mitigate Risk / Counter-measures to Potential Cyberattacks: deterrent/preventive/avoidance control
For general users
- Use 2F/3F Authentication
- Avoid sharing personal information on social networks (esp. PII)
- Take caution while granting permission or authorization to apps requesting to access your device storage, messages, camera, and microphone.
- Avoid connecting to public free WiFi.
- Do not visit suspicious websites. Avoid clicking on links in spam emails.
- Shut down your WiFi, hotspot, or device when not in use esp. at night.
For remote workers
- Isolate your home office & dedicate it for work within working hours – not accessible by relatives or visitors.
- Separate your office network from a home network.
- Hide WiFi SSID and use the latest encryption technology with a strong password.
- Confirm your VPN tunnel is secured & well configured by the IT team.
- Monitor your network and ensure no one else is connected to it.
- Make sure no one is eavesdropping on your conversation.
- Use a dedicated device for work purposes only.
Careers in Cyber security
Considering a career in cyber security?
- There is significant demand for well-qualified information security/cybersecurity & IT risk professionals in Ireland (and globally) due to skill shortage. This means Increased salaries.
- Earn industry certifications to progress through the career ladder at a faster pace. It’s a highly dynamic industry. Which industry certifications are right for me?
- Key job roles in cybersecurity include Security Analyst, Security Engineer, Security Architect, Penetration Tester, Security Consultant, and Incident Responder.
“They who can give up essential liberty to obtain a little temporary safety deserve neither liberty nor safety.”– Benjamin Franklin