Guide: Security Awareness Training

Guide: Security Awareness Training

1. Understanding Security Threats

Phishing Attacks

Phishing is when scammers attempt to deceive you into believing they are someone you trust, tricking you into sharing sensitive information or performing actions that benefit the attacker.

How to Protect Yourself:

  • Be cautious of urgency. Don’t let emotions cloud your judgment.

  • Verify before you act. Call and confirm requests from known contacts.

  • Check email addresses and URLs. Look for spelling mistakes or discrepancies.

  • Enable Multi-Factor Authentication (MFA). Adds an extra layer of security.

  • Assess message style. If something seems off, question it.

  • Never click on suspicious links. Hover over them first to verify authenticity.

2. Strong Passwords and Authentication

Password Security

  • Avoid password reuse. Each account should have a unique password.

  • Use password managers like KeePass. They generate and store secure passwords.

  • Create long, complex passwords. Use a mix of upper/lowercase letters, numbers, and symbols.

  • Enable Two-Factor Authentication (2FA). Whenever possible, use 2FA to secure accounts.

Protecting Your Credentials

  • Never store passwords in text files or spreadsheets.

  • Avoid sharing your passwords, even with colleagues.

  • Regularly update your passwords, especially after potential breaches.

3. Network Security and Safe Internet Practices

Public WiFi Safety

  • Avoid free or public WiFi for sensitive tasks. Cybercriminals can intercept your data.

  • Use a VPN. This encrypts your internet traffic and protects your privacy (avoid free VPNs, as some may be malicious).

  • Verify the WiFi network name. Ask the barista, receptionist, or official source.

  • Prefer mobile data over public WiFi for transactions or confidential work.

Firewall and Endpoint Protection

  • Enable your firewall. This acts as a barrier between your device and malicious threats.

  • Keep your system updated. Install security patches and updates regularly.

  • Use trusted antivirus software. Regularly scan your system for potential threats.

4. Avoiding Ransomware Attacks

What is Ransomware?

Ransomware is malware that locks your computer or data, demanding payment to regain access.

How to Protect Yourself:

  • Do not use company credentials for personal accounts.

  • Do not download files from unknown websites.

  • Back up important data regularly. Use offline or cloud backups.

  • Be cautious with email attachments. Avoid opening attachments from unknown sources.

5. USB and External Device Security

  • Avoid plugging unknown USB devices into your computer.

  • Encrypt USB storage devices in case of loss or theft.

  • Be cautious with public charging stations. They may contain malware.

6. Preventing Wire Fraud

Wire fraud occurs when attackers trick you into wiring money to fraudulent accounts.

Best Practices:

  • Verify banking details before transferring funds. Call a known contact from a previously verified number.

  • Be suspicious of sudden banking changes. Always confirm directly with the vendor.

  • Double-check email requests for fund transfers. Phishing attacks often target financial transactions.

7. Incident Response: What to Do If You Suspect a Security Breach

  • Report any suspicious activity immediately. Notify IT/security teams.

  • Change your passwords if you suspect compromise.

  • Disconnect from the internet if necessary. This can prevent further data loss.

  • Refer to the security team’s guidelines for further action.


Conclusion

Security is everyone’s responsibility. Stay vigilant, follow these best practices, and report any concerns immediately. By implementing these guidelines, we can create a more secure working environment for all.




    • Related Articles

    • Guide: IT-Setup

      IT Setup Guide Welcome! Follow this step-by-step guide to set up your new Windows computer. Important Notes Follow the steps one at a time. Complete this guide from start to finish. The order is flexible, but skipping steps may cause issues. 1. ...
    • Guide: Secure Password Management (KeePassXC) & Best Practices

      1. Why Use KeePassXC Instead of Saving Passwords in Your Browser? ❌ Why Storing Passwords in the Browser is Insecure Many users rely on built-in browser password managers, but this is not a secure practice for several reasons: Weak Encryption: ...
    • Guide to Workstation Requirements by Department

      This guide outlines the PC/MacBook workstation requirements for each department and the guidelines for replacing a workstation when needed. 1. Workstation Requirements by Department Marketing / Communication Manager Software Requirements: Office 365 ...
    • Troubleshooting Guide: Outlook Reading Pane Issues

      Introduction The Outlook Reading Pane allows users to preview emails without opening them fully. However, various issues may arise, such as errors, permission problems, or functionality disruptions. This guide provides troubleshooting steps to ...
    • (Troubleshoot) Guide: How to Check If Your Data Is Backed Up on OneDrive

      1. How to Check If My Data Is Saved in OneDrive? Step 1: Locate Your Important Data Where are your important files stored on your computer? Check if they are saved in Documents, Desktop, or Pictures folders. If you found your files, great! Now, let’s ...