cybersecurity

CYBERCRIME | MALWARE | RANSOMWARE | BOTS
PHYSICAL CYBER ATTACKS | SOCIAL ENGINEERING | PHISHING | SWATTING

Cybersecurity starts with you and is everyone’s responsibility. According to the National Cybersecurity Alliance, there are currently an estimated 4.8 billion internet users or 62% of the world’s population. Educating yourself and your employees will help better protect yourself online.

 
 

CYBERCRIME

What is cybercrime?

Cybercrime is any crime which is committed electronically.

This can include…

  • Theft

  • Fraud

  • Sometimes even murder

Why should you care?

  • Crime is a danger offline and on!

  • Cyber self-defense basics can go a long way to keep you and your data out of the hands of bad actors.

Cybercrime.jpg

Malware Examples.png

What is malware?

Any software intended to…

  • Damage

  • Disable

  • or give someone unauthorized access to your computer or other internet-connected device

Why should you care?

Most cybercrime begins with sort of malware. You, your family, and your personal information is almost certainly at risk if malware finds its way onto your computer or devices.

 
Ransomware examples.png

What is ransomware?

Malware designed to make data or hardware inaccessible to the victim until a ransom is paid.

Why should you care?

  • Often downloaded as malicious email links

  • Damage to both financial stability and reputation

  • No guarantee that you will get your data back, even if you pay

  • Often used as a decoy for other malicious activity


What is a bot?

Bots are a type of program used for automating tasks on the internet.

Why should you care?

  • Often downloaded as malicious email links

  • Damage to both financial stability and reputation

  • No guarantee that you will get your data back, even if you pay

  • Often used as a decoy for other malicious activity


What is a physical cyber attack?

Physical cyber attacks use hardware, external storage devices, or other physical attack vectors to infect, damage, or otherwise compromise digital systems. This can include…

  • USB storage devices

  • CD/DVD

  • Internet of Things (IoT)

Why should you care?

  • Easy to overlook

  • Difficult to identify and detect

  • Extremely difficult to remove

  • Can do anything from installing ransomware to sending copies or modifying information systems, to dismantling networks


What is social engineering?

Cybercriminals can take advantage of you by using information commonly available through:

  • Social media platforms

  • Location sharing

  • In-person conversations

Why should you care?

  • Your privacy isn’t just a luxury - it’s a security measure

  • Attacks can be successful with little to no programming knowledge or ability

  • Technological security measures can only protect you so much - you are your best defense