Duration – One Day
Overview and objective
Understanding what good cyber hygiene is and how best to promote it across institutions and society at large is a critical element in building cyber resilience.
This course will also demonstrate how a lack of good cyber hygiene leaves us all open to attacks. In exploring the ‘how’ we will consider elements of the psychology of good and bad habits, and the risks of using inadequate passwords, poorly configured computers and clicking on unsafe or fraudulent attachments.
We will also explore the basics of how malware is spread, drawing upon real world examples. After this course, the participant will be aware of the most common threats that we face while using information technology. They will be able to identify threats and thus behave more consciously in different threat situations.
Who is it for?
This cyber hygiene course is intended for everyone using modern communication tools. In addition to end users we can provide enhanced cyber hygiene training for management/decision makers and IT specialists, where some areas will be covered in more depth.
Course Outline – The main topics covered are:
- What threatens us?
- Who is attacking and why?
- The role of individual responsibility
- Protecting your data
- Data leaks and lost passwords
- Secure authentication
- E-mail threats
- BEC – Business Email Compromise
- Ransomware
- USB Threats
- Social Engineering
- Working in public spaces
- IoT – Internet of threats
- How media can amplify damage
- Managing damage limitation