A Guide to Cyber Etiquette - PowerPoint PPT Presentation

About This Presentation
Title:

A Guide to Cyber Etiquette

Description:

In today's digital world, cybersecurity and Information security has become an essential concern for every organization. Irrespective of the size and strength of an organization, a minor cyber attack can cost millions to recover. This informative blog includes the Dos and Don'ts of Internet security that help understand the best cybersecurity practices. – PowerPoint PPT presentation

Number of Views:2
Slides: 12
Provided by: infosectrain
Tags:

less

Transcript and Presenter's Notes

Title: A Guide to Cyber Etiquette


1
A Guide to Cyber Etiquette
www.infosectrain.com sales_at_infosectrain.com
2
In today's digital world, cybersecurity and
Information security has become an essential
concern for every organization. Irrespective of
the size and strength of an organization, a minor
cyber attack can cost millions to recover. This
informative blog includes the Dos and Don'ts of
Internet security that help understand the best
cybersecurity practices.
www.infosectrain.com sales_at_infosectrain.com
3

What is Cyber Etiquette? Cyber etiquette is a
code of conduct or behavior required to follow
while using the Internet to perform various
tasks. It is also referred to as Cyber
Netiquette. It consists of acceptable norms and
rules to ensure secure communication over the
Internet. These rules help to get aware of cyber
threats associated with the Internet and prevent
wrongdoings. The Do's of Internet Security 1. Use
of HTTPS sites While surfing for banking and
shopping websites or paying the bills online,
check whether the website's URL begins with
'HTTPS.' Also, check for the padlock icon, which
indicates a secure connection between the website
and the server. 2. Use of strong password Always
use unique and hard-to-guess passwords. Create a
password with special characters, symbols,
numbers, uppercase, and lowercase letters. Do not
use the same passwords for all online
accounts. 3. Must Logout of accounts Logging into
an online account creates a session with you and
your website. If this session remains active, it
might allow attackers to exploit your session,
leading to a session hijacking. Ensure you log
out of all your online accounts when you are
done, especially when using a public computer.

www.infosectrain.com sales_at_infosectrain.com
4

4. Use verified software or websites Check
whether the software or website is secured and
verified before downloading them into your
system. 5. Enter the URL of the banking website
manually Access your bank's website manually by
typing its URL in the search bar. Never use the
links in your email or text message, which can
lead to malware attacks. 6. Secure Backup
regularly Take regular backup of all your
essential files. Having backup files on a hard
drive or using trusted cloud-based backup
services is necessary, and it helps to recover
the data quickly. The Don'ts of Internet
Security 1. Never enable 'Keep me logged In' and
'Remember me' checkboxes Avoid enabling 'Keep me
logged in' or 'Remember me' checkboxes on public
computers. It can save and manage your
credentials in the system leading to cyber
attacks. 2. Avoid responding to pop-up
messages Never respond to pop-up ads, as it can
redirect you to an illegitimate website that
makes you enter your credentials, leading to
malware attacks. Close all kinds of pop-up
screens using the task manager.

www.infosectrain.com sales_at_infosectrain.com
5
3. Never use free and public Internet
sources Avoid using free, unsecured Wi-Fi,
especially for shopping or banking on the
Internet. Do not log into your social media
profiles, as it can reveal your account
credentials, and the attacker can hack your
social media profile. 4. Do not share your
confidential information. Never share your
personal/bank details over a phone, email, or
SMS, even if the caller/sender seems genuine, and
it can lead to a Vishing attack. Personal
Identifiable Information (PII), such as an Aadhar
card number or SSN, is a unique number that
connects with all your Bank, Health, and other
services. If it is required to share your Aadhaar
card details or SSN details, share the masked
Aadhaar number or SSN to avoid cyber
attacks. 5. Do not use unsecured websites. Never
use or visit unsecured websites which are not
protected and verified. Some websites allow
entering even if it is not secure using the
Advanced option, and they might be legitimate or
illegitimate websites. So do not enter into such
unsecure websites. InfosecTrain is one of the
best training and consultancy services that
offers instructor-led training on a wide range of
Cybersecurity, Information security, and Cloud
security domains. Our training program helps you
to enhance your professional career to the next
level. Check out our courses, choose your best
suitable training program, and enroll now.  
www.infosectrain.com sales_at_infosectrain.com
6
About InfosecTrain
  • Established in 2016, we are one of the finest
    Security and Technology Training and Consulting
    company
  • Wide range of professional training programs,
    certifications consulting services in the IT
    and Cyber Security domain
  • High-quality technical services, certifications
    or customized training programs curated with
    professionals of over 15 years of combined
    experience in the domain

www.infosectrain.com sales_at_infosectrain.com
7
Our Endorsements
www.infosectrain.com sales_at_infosectrain.com
8
Why InfosecTrain
Global Learning Partners
Access to the recorded sessions
Certified and Experienced Instructors
Flexible modes of Training
Tailor Made Training
Post training completion
www.infosectrain.com sales_at_infosectrain.com
9
Our Trusted Clients
www.infosectrain.com sales_at_infosectrain.com
10
(No Transcript)
11
Contact us
Get your workforce reskilled by our certified and
experienced instructors!
IND 1800-843-7890 (Toll Free) / US 1
657-722-11127 / UK 44 7451 208413
sales_at_infosectrain.com
www.infosectrain.com
Write a Comment
User Comments (0)
About PowerShow.com