The document discusses security awareness and its importance for companies. It outlines three aspects of information security: confidentiality, integrity, and availability. The document also lists reasons why security awareness is important, such as ransomware being a main threat and phishing dominating digital scams. Additionally, the document provides an overview of threats including social engineering and examples of phishing through email, spear phishing, web phishing, whaling, smishing, and vishing. It concludes with recommendations to enhance device security, pay attention to email senders, avoid random links, use official software, be careful sharing info, and follow latest phishing information.
The document discusses security awareness and its importance for companies. It outlines three aspects of information security: confidentiality, integrity, and availability. The document also lists reasons why security awareness is important, such as ransomware being a main threat and phishing dominating digital scams. Additionally, the document provides an overview of threats including social engineering and examples of phishing through email, spear phishing, web phishing, whaling, smishing, and vishing. It concludes with recommendations to enhance device security, pay attention to email senders, avoid random links, use official software, be careful sharing info, and follow latest phishing information.
The document discusses security awareness and its importance for companies. It outlines three aspects of information security: confidentiality, integrity, and availability. The document also lists reasons why security awareness is important, such as ransomware being a main threat and phishing dominating digital scams. Additionally, the document provides an overview of threats including social engineering and examples of phishing through email, spear phishing, web phishing, whaling, smishing, and vishing. It concludes with recommendations to enhance device security, pay attention to email senders, avoid random links, use official software, be careful sharing info, and follow latest phishing information.
The document discusses security awareness and its importance for companies. It outlines three aspects of information security: confidentiality, integrity, and availability. The document also lists reasons why security awareness is important, such as ransomware being a main threat and phishing dominating digital scams. Additionally, the document provides an overview of threats including social engineering and examples of phishing through email, spear phishing, web phishing, whaling, smishing, and vishing. It concludes with recommendations to enhance device security, pay attention to email senders, avoid random links, use official software, be careful sharing info, and follow latest phishing information.
Cyber Threats and Information Security Awareness 2
“The reasons why security awareness is important for companies “
1. Ransomware becomes the main threat
2. Phishing Dominates Digital Scams 3. CEO Fraud / W-2 Scams Ranked Second 4. Phone Scams 5. Antivirus is Increasingly Ineffective 6. Relying Too Much on Web-Services
Cyber Threats and Information Security Awareness 3
Threats Overview Social Engineering
Cyber Threats and Information Security Awareness 4
Phising
Cyber Threats and Information Security Awareness 5
Examples of Phising Email Phising
Cyber Threats and Information Security Awareness 6
Examples of Phising Spear Phising
Cyber Threats and Information Security Awareness 7
Examples of Phising Web Phising
Cyber Threats and Information Security Awareness 8
Examples of Phising Whaling
Cyber Threats and Information Security Awareness 9
Examples of Phising Smishing and Vishing
Cyber Threats and Information Security Awareness 10
Examples of Phising Angler Phising
Cyber Threats and Information Security Awareness 11
Defense Recommendation
1. Enhance your device's security
2. Pay Attention to the Email Sender 3. Don't Click on Random Links 4. Use Official Software 5. Be Careful When Sharing Info 6. Follow the Latest Info About Phishing
Cyber Threats and Information Security Awareness 12
Defense Recommendation
Cyber Threats and Information Security Awareness 13
Safety start with awareness, Awareness start with YOU