ESET CYBERSECURITY
AWARENESS TRAINING
February 2022
Agenda
To show you best practices, tips and tricks to help you avoid
being compromised / attacked.
1 Threats Overview
2 Password Safety
3 Web Protection
4 Email Protection
2020/21 Cyber – What has happened?
ESET’s
Online Cybersecurity
Awareness Training
THREATS OVERVIEW
Root Cause of Data Breaches
Human Error
22%
System Glitch
22%
Malicious
57%
Ponemon Institute 2020 Cost of Data Breach Study: Global Analysis
Data Breach Breakdown
Malicious Breaches Overview
Verizon 2020 Data Breach Investigations Report – specifically: incidents involving credentials
Threats Overview
Malware Phishing Social
Engineering
Malware includes numerous threat
families, all with different names.
Rootkits
Viruses
Trojans
Ransomware
Bootkits
Worms
Growth of Malware
Is malware on Windows only?
Is malware on mobile phones?
How does my computer and mobile get infected?
Top Tips to Avoid Malware
1 Install ESET Antivirus
on all devices.
2 Be careful what you plug in.
3 Be careful what you click.
4 Get awareness training for
entire family.
Threats Overview
Phishing
Phishing Stats
36% of 16% of
people people
Open phishing messages Open attachments
(32% last year) (14% last year)
Verizon 2020 Data Breach Investigations Report
Phishing Examples
Not paypal.com
Phishing Examples
Top Tips to Avoid Phishing
1 Check who the email sender is.
2 Check the email for grammar and spelling
mistakes.
3 Mouse over the link to see where it goes.
4 Do not click the link – manually type it in.
Threats Overview
Social Engineering
Top Tips to Avoid Social Engineering
1 Be careful with the information
you disclose.
2 Verify credentials of contractors.
3 If you have any doubts on the
identity of callers, hang up and
call their official company
number back.
PASSWORD SAFETY
Poor Password Hygiene
Document or sticky
note with passwords
written on it
Poor Password Hygiene
Freely sharing password
with friends, family
members, colleagues
Poor Password Hygiene
8 characters = elephant
8 characters = elephant1
+ 1 number
8 characters = elephant1!
+ 1 number + 1 symbol
8 characters = Elephant1!
+ 1 number + 1 symbol + 1 capital
Poor Password Hygiene
elephant1!
! elephant2@
Change password elephant3#
every 90 days
elephant4$
Data breaches lead to password problems because…
• Passwords sometimes are extracted
• Very simple to try all alternative
options of password-base
Example
• Password that was stolen was elephant
• Password required by website is 8 characters 1 symbol
• 32 symbols on the computer(would take a human 5 minutes)
• Computers can carry out these tasks in fractions of a second
Password Managers
Password Hygiene Checkup
https://haveibeenpwned.com/
• Currently checks 530 websites
• 11.2 billion compromised accounts contained
Top Tips for Password Safety
1 Utilize unique passwords across
all websites/applications
2 Change your passwords often
3 Don’t share your password
INTERNET PROTECTION
Internet Protection Overview
Search Engine Safety
Top Tips for Search Engines
1 Stick to clicking on sites on the
first page of results.
2 Be careful when clicking on
non-name recognizable sites.
3 Malware commonly
masquerades as free things.
Internet Protection Overview
Web Content Filter
Top Tips for Web Content Filter
1 Increase employee productivity by
implementing a web filter.
2 Curb risky user behavior and reduce
malware exposure by implementing
a web filter.
3 Protect children’s mobile devices and
computers from displaying inappropriate
content with a web filter.
Internet Protection Overview
HTTPS
Top Tips for Secure Websites (HTTPS)
1 Before entering sensitive
information, check to see if the site
is secured by HTTPS.
2 Check to make sure this is a
reputable website before entering
credit card information; don’t just
depend on the HTTPS indicator.
Internet Protection Overview
Public Wi-Fi
Top Tips for Public Wi-Fi
1 Verify the Wi-Fi name with the
business owner prior to connecting.
2 Treat public Wi-Fi connections as
compromised (unsafe).
3 Utilize an anti-malware product to
help prevent against cyberattacks
while connected.
EMAIL PROTECTION
Email Protection Overview
Spam Protection