1 / 15

A Guide to Cyber Etiquette

In today's digital world, cybersecurity and Information security has become an essential concern for every organization. Irrespective of the size and strength of an organization, a minor cyber attack can cost millions to recover. This informative blog includes the Dos and Don'ts of Internet security that help understand the best cybersecurity practices.<br><br>

Download Presentation

A Guide to Cyber Etiquette

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. A Guide to Cyber Etiquette www.infosectrain.com | sales@infosectrain.com

  2. In today's digital world, cybersecurity and Information security has become an essential concern for every organization. Irrespective of the size and strength of an organization, a minor cyber attack can cost millions to recover. This informative blog includes the Dos and Don'ts of Internet security that help understand the best cybersecurity practices. and Information security has become an essential concern for every organization. Irrespective of the size and strength of an organization, a minor cyber attack can cost millions to recover. This informative blog includes the Dos and Don'ts of Internet security that help understand the best www.infosectrain.com | sales@infosectrain.com

  3. Slide 2 b1 b2 bhavika.official@outlook.com, 3/8/2021 Please add more slides for - 1.-Course content as we did in InfosecTrain PPT Template 2-Summary slides 3-Questions Slides 4-Thank you slide bhavika.official@outlook.com, 3/8/2021

  4. What is Cyber Etiquette? Cyber etiquette is a code of conduct or behavior required to follow while using the Internet to perform various tasks. It is also referred to as Cyber Netiquette. It consists of acceptable norms and rules to ensure secure communication over the Internet. These rules help to get aware of cyber threats associated with the Internet and prevent wrongdoings. The Do's of Internet Security Use of HTTPS sites While surfing for banking and shopping websites or paying the bills online, check whether the website's URL begins with 'HTTPS.' Also, check for the padlock icon, which indicates a secure connection between the website and the server. which indicates a secure connection between the website and the server. Use of strong password Always use unique and hard-to-guess passwords. Create a password with special characters, symbols, numbers, uppercase, and lowercase letters. Do not use the same passwords for all online accounts. Must Logout of accounts Logging into an online account creates a session with you and your website. If this session remains active, it might allow attackers to exploit your session, leading to a session hijacking. Ensure you log out of all your online accounts when you are done, especially when using a public computer. Cyber etiquette is a code of conduct or behavior required to follow while using the Internet to perform various tasks. It is also referred to as Cyber Netiquette. It consists of acceptable norms and rules to ensure secure communication over the Internet. These rules help to get aware of cyber threats associated with the Internet and While surfing for banking and shopping websites or paying the bills online, check whether the website's URL begins with 'HTTPS.' Also, check for the padlock icon, which indicates a secure connection between the website and the server. which indicates a secure connection between the website and the server. guess passwords. Create a password with special characters, symbols, numbers, uppercase, and lowercase letters. Do not use the same Logging into an online account creates a session with you and your website. If this session remains active, it might allow attackers to exploit your session, leading to a session hijacking. Ensure you log out of all your online accounts when you are done, www.infosectrain.com | sales@infosectrain.com

  5. Slide 3 b1 b2 bhavika.official@outlook.com, 3/8/2021 Please add more slides for - 1.-Course content as we did in InfosecTrain PPT Template 2-Summary slides 3-Questions Slides 4-Thank you slide bhavika.official@outlook.com, 3/8/2021

  6. Use verified software or websites Check whether the software or website is secured and verified before downloading them into your system. Enter the URL of the banking website manually Access your bank's website manually by typing its URL in the search bar. Never use the links in your email or text message, which can lead to malware attacks. Secure Backup regularly Take regular backup of all your essential files. Having backup files on a hard drive or using trusted cloud-based backup services is necessary, and it helps to recover the data quickly. the data quickly. Check whether the software or website is secured and verified before Access your bank's website manually by typing its URL in the search bar. Never use the links in your email or text message, which can lead to malware attacks. Take regular backup of all your essential files. Having backup files on a hard drive based backup services is necessary, and it helps to recover The Don'ts of Internet Security Never enable 'Keep me logged In' and 'Remember me' checkboxes Avoid enabling 'Keep me logged in' or 'Remember me' checkboxes on public computers. It can save and manage your credentials in the system leading to cyber attacks. Avoid responding to pop-up messages Never respond to pop-up ads, as it can redirect you to an illegitimate website that makes you enter your credentials, leading to malware attacks. Close all kinds of pop-up screens using the task manager. Never enable 'Keep me logged In' and 'Remember me' checkboxes Avoid enabling 'Keep me logged in' or 'Remember me' checkboxes on public computers. It can save and manage your credentials in the system leading to up ads, as it can redirect you to an illegitimate website that makes you enter your credentials, leading to malware attacks. Close all kinds www.infosectrain.com | sales@infosectrain.com

  7. Slide 4 b24 b25 bhavika.official@outlook.com, 3/8/2021 Please add more slides for - 1.-Course content as we did in InfosecTrain PPT Template 2-Summary slides 3-Questions Slides 4-Thank you slide bhavika.official@outlook.com, 3/8/2021

  8. Never use free and public Internet sources Avoid using free, unsecured Wi-Fi, especially for shopping or banking on the Internet. Do not log into your social media profiles, as it can reveal your account credentials, and the attacker can hack your social media profile. Do not share your confidential information. Never share your personal/bank details over a phone, email, or SMS, even if the caller/sender seems genuine, and it can lead to a Vishing Personal Identifiable Information (PII), such as an Aadhar card number or SSN, is a unique number that connects with all your Bank, Health, and other services. If it is required to share your Aadhaar card details or SSN details, share the masked Aadhaar number or SSN to avoid cyber attacks. share the masked Aadhaar number or SSN to avoid cyber attacks. Do not use unsecured websites. Never use or visit unsecured websites which are not protected and verified. Some websites allow entering even if it is not secure using the Advanced option, and they might be legitimate or illegitimate websites. So do not enter into such unsecure websites. InfosecTrain is one of the best training and consultancy services that offers instructor-led training on a wide range of Cybersecurity, Information security, and Cloud security domains. Our training program helps you to enhance your professional career to the next level. Check out our courses, choose your best suitable training program, and enroll now. Fi, especially for shopping or banking on the Internet. Do not log into your social media profiles, as it can reveal your account credentials, and the attacker can hack your social media profile. Never share your personal/bank details over a phone, email, or SMS, even if attack. card number or SSN, is a unique number that connects with all your Bank, Health, and other card details or SSN details, number or SSN to avoid cyber attacks. number or SSN to avoid cyber attacks. Never use or visit unsecured websites which are not protected and verified. Some websites allow entering even if it is not secure using the Advanced option, and they might be legitimate or illegitimate websites. So do not enter is one of the best training and consultancy services that offers , Information security, and Cloud security domains. Our training program helps you to enhance your professional career to the next level. Check out our courses, choose your best www.infosectrain.com | sales@infosectrain.com

  9. Slide 5 b1 b2 bhavika.official@outlook.com, 3/8/2021 Please add more slides for - 1.-Course content as we did in InfosecTrain PPT Template 2-Summary slides 3-Questions Slides 4-Thank you slide bhavika.official@outlook.com, 3/8/2021

  10. About InfosecTrain Established in 2016, we are one of the finest Security and Technology Training and Consulting company Wide range of professional training programs, certifications & consulting services in the IT certifications & consulting services in the IT and Cyber Security domain Wide range of professional training programs, High-quality technical services, certifications or customized training programs curated with professionals of over 15 years of combined experience in the domain quality technical services, certifications or customized training programs curated with www.infosectrain.com | sales@infosectrain.com

  11. Our Endorsements Our Endorsements www.infosectrain.com | sales@infosectrain.com

  12. Why InfosecTrain Global Learning Partners Access to the recorded sessions sessions Access to the recorded Certified and Experienced Instructors Flexible modes of Training Post training completion Tailor Made Training www.infosectrain.com | sales@infosectrain.com

  13. Our Trusted Clients Our Trusted Clients www.infosectrain.com | sales@infosectrain.com

  14. Contact us Get your workforce reskilled by our certified and experienced instructors! IND: 1800 UK : +44 7451 208413 UK : +44 7451 208413 IND: 1800-843-7890 (Toll Free) / US: +1 657-722-11127 / sales@infosectrain.com sales@infosectrain.com www.infosectrain.com www.infosectrain.com

More Related