Cybersecurity Awareness

AwestruckRetinalite avatar
AwestruckRetinalite
·
·
Download

Start Quiz

Study Flashcards

18 Questions

What are attackers frequently targeting to gain unauthorized access to a company's infrastructure and sensitive data?

Company's employees

Who has a crucial part to play in protecting a company against cyber risks?

Every employee

Which device could potentially be a security risk these days?

Every device that connects to the internet

What was the key concern around cybersecurity in previous years?

Desktop antivirus software performance and slowdown

What will you learn from this presentation?

Practical strategies for protecting your company and yourself from common cybersecurity threats

What term is often used to describe the use of unauthorized devices or software without the approval of the IT department?

Shadow IT

Which of the following actions can pose a threat to cyber security?

Transferring corporate data to personally managed cloud storage accounts

Why is the use of unauthorized devices or software a threat to cyber security?

Because they are not under the control of the IT department

What should you do if you are unsure about installing a particular software on your work device?

Consult the IT Department

What is the company's stance on the installation of applications on company devices?

Employees should only install applications related to their job functions

What can make widely used platforms, services, and applications insecure?

Lack of visibility and control by the corporate IT department

What should employees do with shadow technology that fulfills a highly desired need in the workplace?

Advocate for its official adoption

What technology should be used in the workplace and on work laptops?

Only technology approved by the IT Department

What is Phishing?

A method of using fake emails to compromise accounts and steal data

What does Vishing involve?

Launching attacks via phone calls or text messages

What is Social Engineering in the context of cybercrime?

The act of convincing an employee to provide confidential information

What percentage of data breaches is Phishing responsible for?

33%

What is a common method used in both Phishing and Vishing attacks?

Social engineering

Study Notes

Unauthorized Access and Cybersecurity Risks

  • Attackers frequently target a company's infrastructure and sensitive data to gain unauthorized access.

Cybersecurity Protection

  • Employees play a crucial part in protecting a company against cyber risks.

Security Risks

  • Personal devices can potentially be a security risk to a company's infrastructure.

Historical Cybersecurity Concerns

  • In previous years, the key concern around cybersecurity was the threat of unauthorized devices and software.

Presentation Overview

  • This presentation will teach you about cybersecurity risks and how to protect your company.

Unauthorized Devices and Software

  • Shadow IT refers to the use of unauthorized devices or software without the approval of the IT department.
  • Installing unauthorized software on work devices can pose a threat to cybersecurity.
  • If unsure about installing software, employees should consult the IT department before doing so.
  • The company prohibits the installation of unauthorized applications on company devices.

Insecure Platforms and Applications

  • Outdated or unsupported platforms, services, and applications can make them insecure.
  • Employees should use approved technology in the workplace and on work laptops.

Cyber Attacks

  • Phishing involves using emails, text messages, or instant messages to trick victims into divulging sensitive information.
  • Vishing involves using voice calls to trick victims into divulging sensitive information.
  • Social Engineering is the use of psychological manipulation to deceive individuals into divulging sensitive information.
  • Phishing is responsible for approximately 90% of data breaches.
  • A common method used in both Phishing and Vishing attacks is the use of urgency to prompt the victim into taking action.

Test your knowledge on cybersecurity awareness and best practices for employees in this quiz. Learn how to protect yourself and your company against cyber risks, including the latest tactics used by attackers. Discover the importance of securing all internet-connected devices and how to identify potential security threats.

Make Your Own Quizzes and Flashcards

Convert your notes into interactive study material.

Get started for free

More Quizzes Like This

Use Quizgecko on...
Browser
Browser