Podcast
Questions and Answers
What are attackers frequently targeting to gain unauthorized access to a company's infrastructure and sensitive data?
What are attackers frequently targeting to gain unauthorized access to a company's infrastructure and sensitive data?
- Company's financial resources
- Company's infrastructure
- Company's physical assets
- Company's employees (correct)
Who has a crucial part to play in protecting a company against cyber risks?
Who has a crucial part to play in protecting a company against cyber risks?
- IT department
- Every employee (correct)
- Company's management
- Security personnel
Which device could potentially be a security risk these days?
Which device could potentially be a security risk these days?
- Only company-owned devices
- Only personal mobile devices
- Only desktop computers
- Every device that connects to the internet (correct)
What was the key concern around cybersecurity in previous years?
What was the key concern around cybersecurity in previous years?
What will you learn from this presentation?
What will you learn from this presentation?
What term is often used to describe the use of unauthorized devices or software without the approval of the IT department?
What term is often used to describe the use of unauthorized devices or software without the approval of the IT department?
Which of the following actions can pose a threat to cyber security?
Which of the following actions can pose a threat to cyber security?
Why is the use of unauthorized devices or software a threat to cyber security?
Why is the use of unauthorized devices or software a threat to cyber security?
What should you do if you are unsure about installing a particular software on your work device?
What should you do if you are unsure about installing a particular software on your work device?
What is the company's stance on the installation of applications on company devices?
What is the company's stance on the installation of applications on company devices?
What can make widely used platforms, services, and applications insecure?
What can make widely used platforms, services, and applications insecure?
What should employees do with shadow technology that fulfills a highly desired need in the workplace?
What should employees do with shadow technology that fulfills a highly desired need in the workplace?
What technology should be used in the workplace and on work laptops?
What technology should be used in the workplace and on work laptops?
What is Phishing?
What is Phishing?
What does Vishing involve?
What does Vishing involve?
What is Social Engineering in the context of cybercrime?
What is Social Engineering in the context of cybercrime?
What percentage of data breaches is Phishing responsible for?
What percentage of data breaches is Phishing responsible for?
What is a common method used in both Phishing and Vishing attacks?
What is a common method used in both Phishing and Vishing attacks?
Flashcards
Employee Vulnerability
Employee Vulnerability
Employees are often targeted by attackers to gain unauthorized access to a company's infrastructure and sensitive data.
Employee Responsibility
Employee Responsibility
Every employee plays a crucial role in protecting a company from cyber risks.
Internet-Connected Devices
Internet-Connected Devices
Any device connecting to the internet can potentially be a security risk.
Shadow IT
Shadow IT
Signup and view all the flashcards
Personal Cloud Storage
Personal Cloud Storage
Signup and view all the flashcards
Unauthorized Software and Devices
Unauthorized Software and Devices
Signup and view all the flashcards
Software Installation Policy
Software Installation Policy
Signup and view all the flashcards
Application Installation Guidelines
Application Installation Guidelines
Signup and view all the flashcards
Lack of IT Visibility and Control
Lack of IT Visibility and Control
Signup and view all the flashcards
Advocate for Shadow Technology Adoption
Advocate for Shadow Technology Adoption
Signup and view all the flashcards
IT Approved Technology
IT Approved Technology
Signup and view all the flashcards
Phishing
Phishing
Signup and view all the flashcards
Vishing
Vishing
Signup and view all the flashcards
Social Engineering
Social Engineering
Signup and view all the flashcards
Phishing Breach Statistics
Phishing Breach Statistics
Signup and view all the flashcards
Social Engineering in Phishing and Vishing
Social Engineering in Phishing and Vishing
Signup and view all the flashcards
Study Notes
Unauthorized Access and Cybersecurity Risks
- Attackers frequently target a company's infrastructure and sensitive data to gain unauthorized access.
Cybersecurity Protection
- Employees play a crucial part in protecting a company against cyber risks.
Security Risks
- Personal devices can potentially be a security risk to a company's infrastructure.
Historical Cybersecurity Concerns
- In previous years, the key concern around cybersecurity was the threat of unauthorized devices and software.
Presentation Overview
- This presentation will teach you about cybersecurity risks and how to protect your company.
Unauthorized Devices and Software
- Shadow IT refers to the use of unauthorized devices or software without the approval of the IT department.
- Installing unauthorized software on work devices can pose a threat to cybersecurity.
- If unsure about installing software, employees should consult the IT department before doing so.
- The company prohibits the installation of unauthorized applications on company devices.
Insecure Platforms and Applications
- Outdated or unsupported platforms, services, and applications can make them insecure.
- Employees should use approved technology in the workplace and on work laptops.
Cyber Attacks
- Phishing involves using emails, text messages, or instant messages to trick victims into divulging sensitive information.
- Vishing involves using voice calls to trick victims into divulging sensitive information.
- Social Engineering is the use of psychological manipulation to deceive individuals into divulging sensitive information.
- Phishing is responsible for approximately 90% of data breaches.
- A common method used in both Phishing and Vishing attacks is the use of urgency to prompt the victim into taking action.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.