Cyber Security:
Tips and Tools to Properly Protect
Your Digital Assets
Samuel Ekele
DevOps / Cloud Engineer
@realsammy3
Content
➔ Introduction
Cybersecurity overview,
➔ Cybercrime
Cybercrime industry overview
➔ The most pervasive cyber attack vector
Social engineering, Ransomware, DDoS, etc
➔ Tips to staying safe
➔ Tools
VPN, Antivirus, Anti malware
➔ Q & A
,
What is Cybersecurity?
.
Cybersecurity is the art of protecting electronic
systems, networks, and data from unauthorized or
criminal access. It can also be called information
technology security or electronic information security.
Cybersecurity aims to ensure the
confidentiality, integrity and availability of
information and service in a connected
world
With an increasing number of people getting
connected to internet, the security threats
that causes massive harm are increasing also
Why is
Cybersecurity
important?
Cybersecurity is important because it protects all categories of
data from theft and damage.
Cybersecurity’s core function is to protect the devices we all use
(smartphones, laptops,tablet, and computers), and the services we
access-both online and at work- from theft or damage.
Cybercrime
Cybercrime is any criminal misconduct carried out through a network, technical gadgets or the
internet. While some are intended to cause harm to the victim, the vast majority are committed
for financial gain
Emerging trends in the cybercrime landscape
Cyberattacks are becoming more collaborative and specialized
Cybercriminals are forming alliances and sharing resources, tools and techniques to launch more effective
attacks. They are also developing niche skills and expertise to target specific sectors or technology
Cybercriminals are leveraging on advanced tools and techniques such as AI and ML,
botnets, and automated malware deployment.
The Computer as a Target: using a computer
to attack other computers
1
The Computer as a Weapon: using a computer to
commit real life crime
2
Categories:
The most pervasive cyber
attack vector
➔ Social engineering
Manipulates individuals to deceive and gain
unauthorized access to sensitive information or
systems. It exploits human psychology to trick
people into revealing confidential information,
performing actions, or accessing restricted areas.
➔ Ransomware
Ransomware is malicious software that encrypts
files or locks a victim's computer or network.
Attackers demand a ransom in exchange for
restoring access to the compromised system or
encrypted files
➔ DDoS
DDos is a type of cyberattack that aims to disrupt the
normal traffic of a targeted server, service or
network by overwhelming it with a flood of internet
traffic from multiple sources
Social Engineering Techniques
Phishing
Sending deceptive
emails,
message,websites that
mimic legitimate entity
Baiting
Using an object to trick
you into taking an action
that will expose you
Tailgating
Unauthorized person follow
authorized person closely to gain
access into a restricted area
Pretexting
False identity or
impersonation to
gain trust
1
Phishing techniques
Website
Main
website
Phishing
website
You enter your details
Email, Password, and other account details
like card information
The phisher takes your
credentials and login to
the main website
2
Four Ways to Prevent Social Engineering Attacks
r
Always be vigilant and to never let your guard
down
Tips to Staying Safe
Verify Source
Verify the source of every message, email
and website, check the URL before clicking
on any website
Use Strong Password
Management
Create strong and unique
passwords for each of your online
accounts
Backup Your Data
Regularly backup your important file
offline, in an external hard drive or
cloud.
Require Password
Use passwords for all laptops, tablets,
and smartphones. Don’t leave these
devices unattended in public places
Keep Your Software Updated
This includes your apps, web
browsers, and operating systems. Set
updates to happen automatically
Use Multifactor Authentication
Require multi-factor authentication to access
areas of your network with sensitive
information. This requires additional steps
beyond logging in with a password — like a
temporary code on a smartphone or a key
that’s inserted into a computer
Use secure Wi-Fi networks
Avoid using public Wi-Fi networks for sensitive
activities such as online banking or accessing
important accounts.
Be cautious about downloads and
attachments
Exercise caution when downloading files or opening
email attachments, particularly from unknown or
untrusted sources
Be mindful of social media privacy
settings
Review and adjust your privacy settings on social media
platforms to control who can access your personal
information
Antimalware
Malwarebytes, Adaware
Antivirus, Spybot Search &
Destroy,
SUPERAntiSpyware
VPN
ProtonVPN, Hotspot
Shield, GalaxyVPN
Password
Manager
LastPass,KeePass,Dashla
ne
Antivirus
Avast, AVG, Bitdender,
Avira, Karsparsky
Security
Tools You Need to Stay Safe
AI and ML are being utilized to enhance the capabilities of cybersecurity systems and improve threat detection
and response
Microsoft developed Microsoft Security Copilot, a tool that integrates with other Microsoft security solutions
like Azure Sentinel and Microsoft Defender to provide a comprehensive view of an organization's security
posture. The Security copilot leverages advanced machine learning algorithms to analyze large volumes of
data in real time, identifying potential threats and anomalies in network traffic, user behavior, and other key
areas.
As cyber threats become more sophisticated, there is an increasing focus on proactive and predictive
cybersecurity measures. Organizations are investing in threat intelligence, security analytics, and security
automation to identify and respond to threats in real-time.
Emerging Trends in Cybersecurity
Q & A
@realsammy3
Thanks
@realsammy3

Cybersecurity : Tips and Tools to Properly Protect Your Digital Assets

  • 1.
    Cyber Security: Tips andTools to Properly Protect Your Digital Assets Samuel Ekele DevOps / Cloud Engineer @realsammy3
  • 2.
    Content ➔ Introduction Cybersecurity overview, ➔Cybercrime Cybercrime industry overview ➔ The most pervasive cyber attack vector Social engineering, Ransomware, DDoS, etc ➔ Tips to staying safe ➔ Tools VPN, Antivirus, Anti malware ➔ Q & A ,
  • 3.
    What is Cybersecurity? . Cybersecurityis the art of protecting electronic systems, networks, and data from unauthorized or criminal access. It can also be called information technology security or electronic information security. Cybersecurity aims to ensure the confidentiality, integrity and availability of information and service in a connected world With an increasing number of people getting connected to internet, the security threats that causes massive harm are increasing also
  • 4.
    Why is Cybersecurity important? Cybersecurity isimportant because it protects all categories of data from theft and damage. Cybersecurity’s core function is to protect the devices we all use (smartphones, laptops,tablet, and computers), and the services we access-both online and at work- from theft or damage.
  • 5.
    Cybercrime Cybercrime is anycriminal misconduct carried out through a network, technical gadgets or the internet. While some are intended to cause harm to the victim, the vast majority are committed for financial gain Emerging trends in the cybercrime landscape Cyberattacks are becoming more collaborative and specialized Cybercriminals are forming alliances and sharing resources, tools and techniques to launch more effective attacks. They are also developing niche skills and expertise to target specific sectors or technology Cybercriminals are leveraging on advanced tools and techniques such as AI and ML, botnets, and automated malware deployment. The Computer as a Target: using a computer to attack other computers 1 The Computer as a Weapon: using a computer to commit real life crime 2 Categories:
  • 8.
    The most pervasivecyber attack vector ➔ Social engineering Manipulates individuals to deceive and gain unauthorized access to sensitive information or systems. It exploits human psychology to trick people into revealing confidential information, performing actions, or accessing restricted areas. ➔ Ransomware Ransomware is malicious software that encrypts files or locks a victim's computer or network. Attackers demand a ransom in exchange for restoring access to the compromised system or encrypted files ➔ DDoS DDos is a type of cyberattack that aims to disrupt the normal traffic of a targeted server, service or network by overwhelming it with a flood of internet traffic from multiple sources
  • 9.
    Social Engineering Techniques Phishing Sendingdeceptive emails, message,websites that mimic legitimate entity Baiting Using an object to trick you into taking an action that will expose you Tailgating Unauthorized person follow authorized person closely to gain access into a restricted area Pretexting False identity or impersonation to gain trust
  • 10.
  • 11.
    Phishing techniques Website Main website Phishing website You enteryour details Email, Password, and other account details like card information The phisher takes your credentials and login to the main website 2
  • 12.
    Four Ways toPrevent Social Engineering Attacks r Always be vigilant and to never let your guard down
  • 13.
    Tips to StayingSafe Verify Source Verify the source of every message, email and website, check the URL before clicking on any website Use Strong Password Management Create strong and unique passwords for each of your online accounts Backup Your Data Regularly backup your important file offline, in an external hard drive or cloud. Require Password Use passwords for all laptops, tablets, and smartphones. Don’t leave these devices unattended in public places Keep Your Software Updated This includes your apps, web browsers, and operating systems. Set updates to happen automatically Use Multifactor Authentication Require multi-factor authentication to access areas of your network with sensitive information. This requires additional steps beyond logging in with a password — like a temporary code on a smartphone or a key that’s inserted into a computer Use secure Wi-Fi networks Avoid using public Wi-Fi networks for sensitive activities such as online banking or accessing important accounts. Be cautious about downloads and attachments Exercise caution when downloading files or opening email attachments, particularly from unknown or untrusted sources Be mindful of social media privacy settings Review and adjust your privacy settings on social media platforms to control who can access your personal information
  • 14.
    Antimalware Malwarebytes, Adaware Antivirus, SpybotSearch & Destroy, SUPERAntiSpyware VPN ProtonVPN, Hotspot Shield, GalaxyVPN Password Manager LastPass,KeePass,Dashla ne Antivirus Avast, AVG, Bitdender, Avira, Karsparsky Security Tools You Need to Stay Safe
  • 15.
    AI and MLare being utilized to enhance the capabilities of cybersecurity systems and improve threat detection and response Microsoft developed Microsoft Security Copilot, a tool that integrates with other Microsoft security solutions like Azure Sentinel and Microsoft Defender to provide a comprehensive view of an organization's security posture. The Security copilot leverages advanced machine learning algorithms to analyze large volumes of data in real time, identifying potential threats and anomalies in network traffic, user behavior, and other key areas. As cyber threats become more sophisticated, there is an increasing focus on proactive and predictive cybersecurity measures. Organizations are investing in threat intelligence, security analytics, and security automation to identify and respond to threats in real-time. Emerging Trends in Cybersecurity
  • 16.
  • 17.