Podcast
Questions and Answers
What are attackers frequently targeting to gain unauthorized access to a company's infrastructure and sensitive data?
What are attackers frequently targeting to gain unauthorized access to a company's infrastructure and sensitive data?
Who has a crucial part to play in protecting a company against cyber risks?
Who has a crucial part to play in protecting a company against cyber risks?
Which device could potentially be a security risk these days?
Which device could potentially be a security risk these days?
What was the key concern around cybersecurity in previous years?
What was the key concern around cybersecurity in previous years?
Signup and view all the answers
What will you learn from this presentation?
What will you learn from this presentation?
Signup and view all the answers
What term is often used to describe the use of unauthorized devices or software without the approval of the IT department?
What term is often used to describe the use of unauthorized devices or software without the approval of the IT department?
Signup and view all the answers
Which of the following actions can pose a threat to cyber security?
Which of the following actions can pose a threat to cyber security?
Signup and view all the answers
Why is the use of unauthorized devices or software a threat to cyber security?
Why is the use of unauthorized devices or software a threat to cyber security?
Signup and view all the answers
What should you do if you are unsure about installing a particular software on your work device?
What should you do if you are unsure about installing a particular software on your work device?
Signup and view all the answers
What is the company's stance on the installation of applications on company devices?
What is the company's stance on the installation of applications on company devices?
Signup and view all the answers
What can make widely used platforms, services, and applications insecure?
What can make widely used platforms, services, and applications insecure?
Signup and view all the answers
What should employees do with shadow technology that fulfills a highly desired need in the workplace?
What should employees do with shadow technology that fulfills a highly desired need in the workplace?
Signup and view all the answers
What technology should be used in the workplace and on work laptops?
What technology should be used in the workplace and on work laptops?
Signup and view all the answers
What is Phishing?
What is Phishing?
Signup and view all the answers
What does Vishing involve?
What does Vishing involve?
Signup and view all the answers
What is Social Engineering in the context of cybercrime?
What is Social Engineering in the context of cybercrime?
Signup and view all the answers
What percentage of data breaches is Phishing responsible for?
What percentage of data breaches is Phishing responsible for?
Signup and view all the answers
What is a common method used in both Phishing and Vishing attacks?
What is a common method used in both Phishing and Vishing attacks?
Signup and view all the answers
Study Notes
Unauthorized Access and Cybersecurity Risks
- Attackers frequently target a company's infrastructure and sensitive data to gain unauthorized access.
Cybersecurity Protection
- Employees play a crucial part in protecting a company against cyber risks.
Security Risks
- Personal devices can potentially be a security risk to a company's infrastructure.
Historical Cybersecurity Concerns
- In previous years, the key concern around cybersecurity was the threat of unauthorized devices and software.
Presentation Overview
- This presentation will teach you about cybersecurity risks and how to protect your company.
Unauthorized Devices and Software
- Shadow IT refers to the use of unauthorized devices or software without the approval of the IT department.
- Installing unauthorized software on work devices can pose a threat to cybersecurity.
- If unsure about installing software, employees should consult the IT department before doing so.
- The company prohibits the installation of unauthorized applications on company devices.
Insecure Platforms and Applications
- Outdated or unsupported platforms, services, and applications can make them insecure.
- Employees should use approved technology in the workplace and on work laptops.
Cyber Attacks
- Phishing involves using emails, text messages, or instant messages to trick victims into divulging sensitive information.
- Vishing involves using voice calls to trick victims into divulging sensitive information.
- Social Engineering is the use of psychological manipulation to deceive individuals into divulging sensitive information.
- Phishing is responsible for approximately 90% of data breaches.
- A common method used in both Phishing and Vishing attacks is the use of urgency to prompt the victim into taking action.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Description
Test your knowledge on cybersecurity awareness and best practices for employees in this quiz. Learn how to protect yourself and your company against cyber risks, including the latest tactics used by attackers. Discover the importance of securing all internet-connected devices and how to identify potential security threats.