Defending Your Digital Footprint: Debunking IT Security Myths
Fri, 03 Mar
|Virtual Training (VILT) | GRC-X Series
Uncover the truth about cybersecurity misconceptions and learn how to protect yourself from common attacks with hands-on demonstrations in our overview training. Experience first-hand how hackers manipulate and exploit your information and learn the best practices to stay secure.
Time & Location
03 Mar 2023, 9:00 am – 5:00 pm MYT
Virtual Training (VILT) | GRC-X Series
About the event
What You Will Learn
This overview training aims to educate attendees on common misconceptions in the fields of IT, IT Security, and Cybersecurity. It teaches them how to protect themselves from common attacks through live demonstrations. The attendees will learn about how hackers can manipulate and exploit their information for successful attacks and the various types of social engineering attacks, including Facebook-based attacks, with live demonstrations. They will also learn about the best practices for identifying and avoiding spam and phishing emails, as well as secure use of email and messaging software.
Objectives
After completing this workshop, participants will be able to:
- Understand the common myths in IT, IT Security and Cybersecurity
- Understand the Basics of Security and Attack Lifecycle
- Understand how hackers phish your data and use it against you
- Perform Best Practices to be aware and secure from attacks
Prerequisites
This workshop is for beginners and users who use the Internet, Computer, Mobile Phones, and Social Media.
Topic
CYBER SECURITY MYTHBUSTERS
This training helps attendees understand the common myths in IT, IT Security and Cybersecurity and teaches them how to defend themselves from common attacks. Each Scenario will be demonstrated with a Live Demo.
- Websites are fully secure once there is a HTTPS Green or Gold lock
- Antivirus will protect us from Viruses
- WiFi Hotspots are safe
- As long as I don’t download a file from Internet, I will not be infected
- iPhone is Secure
- Mobile Apps downloaded from Play Store are Secure
- My Business / Data is too small for a cyber attack
- Bringing my own Device is safe
- IT Will take care of everything, we don’t have to worry
- ‘From’ address in an Email confirms that the email is sent by the email user
- My Online business is safe using marketplaces
- Online shopping and Online payment are very safe
- USB devices are the safest storage medium : MIMIC USB Devices
SOCIAL ENGINEERING / HACKING HUMANS
Attendees will learn on how hackers manipulate and turn their mind and data against them for a successful attack. Attendees will also learn on different social engineering attacks including Facebook based attacks with LIVE DEMOS and Best practices on how to be aware and secure from these attacks. Attendees will also learn best practices for Email and Messaging software’s and how to distinguish spam and phishing emails from the genuine
- Drive by Download Attack
- USB / File attachment Attacks
- Phone Call & Sweet Talking (Vishing, Spoofcall)
- Phishing Attack
- Smishing Attack
- Email Spoofing Attack
- Facebook and social Media based attacks
- WhatsApp, Telegram and similar Messaging Systems security
- Best Practices for Email Security
- Best Practices for Messaging Software
- Best Practices for Safer Social Media Usage