Categories
Valuable Information Webinars

Jottings from a Webinar on Cybersecurity – Cybersecurity while working remotely

Jottings from a webinar on CyberSecurity – Please Read, Learn and Share this Content

Written by Nkiruka Rosemary Iwu (Pinky)

My Notes From A Webinar…

Theme – CyberSecurity while working Remotely.

‘Stay Safe’ was the Most Common word for 2020 due to the COVID-19 Pandemic and it is Equally Important to Stay Safe Online while working Remotely.

Harmful Softwares used by Hackers have been Made centering around COVID-19.

Hackers may cause you to download a file harmful to your Computers or Devices.

A Word of Advice – Do not Use your Company’s device to watch X-rated Contents… This will pose a great risk for your Organization.

Using the same Passwords in Different Locations is Very Risky and Wrong… Example – Using the Same Passwords for Facebook, Twitter, LinkedIn, Zoom etc. This can make you prone to Hackers… Because once the Hackers can Access just one of your Accounts, they can Also try to Access Others.

Cyber-Criminals have access to loads of E-mail accounts and Also even Netflix Accounts.

Things to do while you work from Home:

“Think before You Click”

Hackers are Trying to Impersonate big Organizations like Microsoft, Like the WHO (World Health Organization), Like Facebook… All in a Bid to Put you in a Position at Risk.

Review Every Link before You Click on it.

Do not Click links directly in E-mails, Manually type out the Links in your Browser.

Cyber-Criminals are Distributing Malwares due to COVID-19

BEEF UP YOUR PASSWORDS!!

Your Passwords shouldn’t be less than 8 Characters.

Use a Combination of Upper and Lower Case Characters and Also Numbers and Special Characters.

Treat your Password like your Under Pants and Change it Frequently.

It is Important to Use a Unique Password for Every Platform you log on to.

Also is Multi-Factor Identification… Turn on Two-factor Identification for your Accounts to Beef Up Security.

Organizations Should Enforce Two-factor Verification for their Staffs’ E-mails.

To Avoid Data Loss, Assuming your Devices or Computer gets Stolen, Ensure you are Consistently Backing Up your Records, Data and Documents.

When you are in your Car, Your Laptop Should Always be in the Trunk of the Car… For Security Reasons

If your Device Gets Stolen, Have a Means to get your Data Wiped to Avoid your Data in the Wrong Hands… This is the Reason why you must Consistently Back Up.

It is Important not to use your Personal Device as your Work device. You Should have a Seperate device.

Another thing to do is to use a VPN.

A VPN software is Important.

Update your Softwares.

Make Sure you have an Anti-virus for your Computers and your Phones.

You need to have a Firewall.

Do not go into the Web without Protection.

It is important to ask your Recruiter or Employer for CyberSecurity Training and Awareness.

Do not Click on links or download attachments from Unsolicited E-mails – Even from People you know or Colleagues. Because it is Possible that the Person’s Account may have been Compromised.

Some Links are Very Very Harmful.

Do not Visit Unapproved Websites.

Cyber-Criminals just need one Person to access a Whole lot of People.

Think before You Click.

Beef Up the Security of your Passwords.

Turn on Multi-Factor Verification on Every App you use.

Again “Think before you Click.”

We need to be Extremely Careful about our CyberSecurity.

You need to Stay Safe online too.

Treat your Passwords like your Underpants cos you Do not want people to see them. Do not Give out your Passwords.

WEBINAR QUESTIONS.

Question 1 – What is the Best Strategy – Is it to have CyberSecurity in-house or Out-Source it?

Answer – it Depends on what works best for you the Organization. Organization can Out-Source it as it will reduce burden on the Company. Or they can have it in-house to Save Costs. CyberSecurity People Earn Higher than the Average Person.

Question 2 – How can one Secure the Website of an organization.

Answer – Install a Firewall to make Sure that there is Protection that Filters information to the Website.

WordPress is a Great Provider for a Website.

Question 3 – How do we know if CyberSecurity is Breached?

Answer – You see that your Account has been logged into on Various Systems.

Keep an Eye on your Logs.

Hackers are Very Boastful. They like to Brag. They can Brag about the Information they got from your Device.

Do not have the Same Passwords because your Different E-mails can be Hacked Simultaneously.

Hackers will make Sure you no longer Have Access to your Accounts.

When you are Affected, Other People in your Business line Will also be Affected.

Be Very Intentional about CyberSecurity.

The Person who hacked your Account might try to have Access to Other People you know.

Most Hackers may be Quiet about It and Just Use your Information.

Question 4 – Any App or Software to Prevent you from Being Hacked?

Answer – There are Different Protections for Different Systems.

Protect your Device with an Anti-virus.

The Story of David and Goliath was Cited

Goliath had a Small hole at the middle of head and David aimed for that hole and that is how Goliath was Defeated.

Same thing is Applicable to Hacking. A Cyber-Criminal will leverage on a Loophole.

Although you must note that there is no Such thing as 100% Security but there is Something as Being Very Difficult to Hack.

Be Very Very Hard to Hack, so that Hackers will give Up on you.

About VPNs…

From the Movie – Money Heist, Between The Bank and The Professor, There was a Tunnel that they Built.

A Communication like a Tunnel helps to Guard you.

Using a VPN helps you to Send information in a Secured Tunnel.

Question 5 – Should Companies tell the Public when they are hacked?

Answer – This is in the Law!

Because when Hacking Occurs, Data are Exposed.

Give the Relevant information to your Customers on the Level of hacking that has taken place.

All Reputable Companies Should take Ownership for what has happened.

Question 6 – Is there any Cyber Forensics to make Sure Hackers are Punished?

Answer – There are Laws in Different Countries that Punish Cyber Crimes.

There is an Arm of CyberSecurity Called Forensics.

Walmart was Hacked a while ago. But From Assessments, It wasn’t the Fault of Walmart – A Vendor Made The Hackers to have Access to Walmart’s Information.

Forensics are Actually very Expensive and not every Organization can Afford it.

This is why you need to have Back Ups, Consistently Back Up your Information.

Hacking Can Potentially Kill your Business.

A good example of the Operations of Hackers is getting Friend Requests on Facebook from People you already have as Friends… This is what Hackers do.

Question 7 – Your View on Centralization of Data From Companies like Facebook or Apple.

Answer – For Companies, If anything happens to your Account… If your Account is Breached… The Company should tell you.

When Twitter was Hacked some time back… They Asked all its Users to Change their Passwords.

Companies Compromised in Data Breach Should take Responsibility and Own Up.

Companies Should Notify their Customers when there Is a Breach

And that Rounded Up the Facebook Webinar on CyberSecurity.

Follow me on Twitter: @Pinkys_Blog

FOR REGULAR UPDATES ON WEBINARS AND VALUABLE INFORMATION… FOLLOW PINKY’S BLOG ON SOCIAL MEDIA OR JOIN OUR GROUPS 

FACEBOOK PAGE

TWITTER

INSTAGRAM

WHATSAPP GROUP

TELEGRAM

FACEBOOK GROUP

Categories
Online Courses

Free Course: Introduction to Cybersecurity by Cisco Networking Academy (Updated)

Start the Free Course: Introduction to Cybersecurity by Cisco Networking Academy

This course is now updated and improved in a more engaging way!!

This course is part of the career pathway for Cybersecurity.

In this blog post; here are all the details contained:

What the Course is All About?

This is an introductory course and this course will give you an in-depth knowledge of the topic of Cybersecurity

You will be learning the basics of Cybersecurity and how you can protect your personal life online. You will also gain knowledge on the biggest security challenges that organizations, governments and educational institutions face in the present days.

It is worthy to note that Cybersecurity professionals who can apply their knowledge of Cybersecurity to protect and defend an organization’s internet presence are very much in great demand.

Some Important Elements for this Course

  • It is totally free to enroll for this course. You will not be required to pay for this course at any time.
  • Duration of the course – This course will last about 6 hours as a rough estimate. We have calculated that you will spend approximately 6 hours to complete the course. But there is no rush; you can finish the course when you want. It is a self-paced learning.
  • Level of hardness for this course – this course is majorly for beginners. So, without any knowledge of Cybersecurity, you can enroll and take this course.
  • Language used for the course – The course is in English Language

To Get Started and enter your window to new opportunities, Click Start Course – Introduction to CyberSecurity

Things you will achieve with this course – Achievements for Free Course: Introduction to CyberSecurity by Cisco Networking Academy

  1. Cybersecurity Administration

You will become familiar with the field of Cybersecurity and understand how Cybersecurity problems affect everybody.

2. Threat Analysis

You will become more aware of the ever-changing internet threat landscape, you will gain knowledge on the characteristics of cyber attacks, malware and also cryptocurrency.

3. System Safeguards

You will gain knowledge on how to protect your data and information systems using authentication, encryption and backup.

4. Network Defense

You will understand the various types of security measures you will need to protect your networks. That is, from infrastructure to devices to data.

5. Resource Specialist

You will become familiar with legal and ethical issues within Cybersecurity and you will know more about opportunities in taking the Cybersecurity path, you will know about credentials and work roles.

6. Course Badge in Free Course: Introduction to Cybersecurity by Cisco Networking Academy

You will gain verified introductory understanding of Cybersecurity… This will include – the outcome of threats and the reasons why Cybersecurity is quickly becoming a growing profession.

CONTENTS OF THE COURSE – Free Course: Introduction to CyberSecurity by Cisco Networking Academy

Part 1 –  This section looks at the need for Cybersecurity, who are those who attack Cybersecurity, the value of data to everyone and organizations in a bid to protect against attacks.

Part 2 – This section looks at attacks via malware, social engineering and attacks that targets apps. It also explains the susceptibility of a system and various threats that can work against them.

Part 3 – In today’s global world, information security is very important. When information flows easily among users, organizations and businesses, how does the data stay secured so it doesn’t get into the wrong hands.

Part 4 – Any organization can achieve security by implementing the security features that are available on a network’s hardware. This section looks at firewalls, IDS/IPS’s and other security apps that can detect cyber attacks.

Part 5 – The rate of cyber crime in the society is causing a greater need for Cybersecurity professionals. Job opportunities in Cybersecurity are available in both public and private sectors. Cybersecurity professionals need a marriage of computer expertise and Cybersecurity education.

THE CAREER PATH for Free Course: Introduction to CyberSecurity by Cisco Networking Academy

Cyber attacks are on the increase with every digital connection all around the world.

The pathway centers on the protection of computerized systems

  1. Introduction to Cybersecurity
  2. A future-proof career
  3. The Cybersecurity threat landscape
  4. The anatomy of an attacker
  5. Networking essentials
  6. Cybersecurity essentials
  7. A day in the life of a cybersecurity professional
  8. Connection to jobs
  9. The bridge between talent and employment

To learn more about the Cybersecurity Career… Please Visit HERE

This is a fantastic opportunity for you. Do seize it now!! Start your learning immediately.

TO START YOUR COURSE, PLEASE CLICK ON THIS

Access your progress and customize your experience by visiting the My Learning page.

This is a great opportunity for you… Please start today!

                  

Free Course: Introduction to Cybersecurity by Cisco Networking Academy


To view inspirational quotes and educational photos on this blog… Please click on Photos Gallery & Quotes


FOR MORE UPDATES ON GREAT COURSES YOU CAN TAKE… PLEASE JOIN THE PINKY’S BLOG SOCIAL MEDIA PLATFORMS 👇👇

WHATSAPP GROUP

TELEGRAM GROUP

FACEBOOK GROUP

LINKEDIN PAGE

TWITTER

FACEBOOK PAGE

INSTAGRAM