Digital security

About this Course

Digital Security is the protection of one’s digital personality, as it represents the physical identity on the network you are operating on or the internet service in use. Digital Security includes the tools which one uses to secure his/her identity, assets, and technology in the online and mobile world. Simply put, let’s think of digital personality as the human body. We have a duty to protect our body from harm which we could term as ‘digital security’. There are a number of methods (tools) that we use to protect our bodies. We eat and live healthily and put ourselves out of harm’s way. The same applies to our digital personality.

Objectives

During this module, the participants will gain an understanding of the following key topics:

•What is Digital security

•Common myths and misconceptions

•Human behavioral limitations

•Psychosocial well-being

Tools Required

Trainer

These tools will be necessary for the trainer to prepare before conducting the training.

  • Laptop
  • Smartphone
  • Flip charts
  • Notebooks
  • Markers
  • Internet
  • Blue tack
  • Masking tape
  • Pens
  • Illustrations

Trainee

These tools will be necessary for the trainee to have during the training.

  • Laptop
  • Smartphone

Prerequisite Knowledge

Prior to participating in this training, the participants should at least have an understanding of:

  • Basic computer knowledge (how to use a laptop & smartphone)
  • How to use the Internet e.g. using browsers, accessing websites and social media platforms.

Definitions

Digital ecosystem: A digital ecosystem is the relationship between a person’s Online/ offline activities, and information technology resources that they interact with.

Digital Identity: A digital identity is a representation of a person’s social identity Online or offline. In short, it is information about a person stored on a computer.

Digital Assets: A digital asset is a digital entity owned by an individual or company. Examples include digital photos, videos, and songs. These assets are not tangible, meaning they have no physical presence. Instead, they are files that reside on a storage device, such as a local computer or a cloud-based storage network. Digital technology: Digital technology is any hardware or software that generates, stores, and processes data or content. Hardware like computers, mobile phones; and software like Microsoft Office, Social media networks like Facebook, etc.

Common Myths and Misconceptions

People nowadays do not pay much attention when they surf the web at home or at work. There are new data breaches and exploits on a daily basis, and not taking any precautions may result in catastrophic consequences.

Even the biggest corporations are paying millions of dollars so they can improve their cybersecurity and remain safe.

However, if you still believe in some of the cybersecurity myths you may put your own devices or even your entire organization at risk.

Here are the common myths and misconceptions about Digital Security:

Your organization is too small to be a victim of a cyber attack

This is one of the most prevalent digital security myths that need to be debunked. Most Small organizations think that they are safe from any kind of digital threats because they’re ‘off the radar’. That’s certainly not the case. Hackers don’t care about the scale of your organization to target it.

Of course, there are some who’d prefer to hack the United Nations, but most hackers would settle for smaller organizations. Always be cautious. Doesn’t matter if you have10 employees or 10,000, your organization is at risk of a cyber attack.

Anti-virus/Anti-malware is good enough

No anti-virus or anti-malware can keep your system safe from all types of digital attacks. These software rely on a large database that has information about all the malware/viruses out there. However, if the hackers use a new kind of malware to infect your network or computer then there’s a high chance that this anti-virus software won’t be able to detect those. So, don’t solely rely on such software. They are only the first line of defense for your system and you should always have multiple defending options available.

Only the IT department is responsible for digital security

It is not wrong to say that the IT department is responsible to implement new processes and policies to keep digital security in a top-notch state. However, they don’t have a magic wand to protect all of the computers in the network. In reality, each employee should be extremely careful when receiving and opening different e-mail messages from colleagues or third parties. It is dangerous since the infection can spread across all of the departments within the organization and this, for example, may cause a further data breach.

Our passwords are strong

Most people think that their regular passwords are strong enough to stand against multiple break-in attempts. However, that’s a wrong mentality right there. No password can be 100% secure, no matter how many numbers and special characters you use in your passwords, there’s always a possibility that they can be cracked or leaked in some way. This is why it’s very important to keep changing your passwords on a regular basis. It could be weekly, bi-weekly, or monthly, but you need to regularly change your passwords, and have your employees change theirs.

Threats are spread only through the Internet

Some users may think that disconnecting from the internet will prevent the threats from spreading around the network and they are completely wrong. An employee may plug in an infected flash drive and all of the computers in the network can get infected, resulting in the loss of valuable company information.

You could also have your information device stolen at a store. Threats are not only Online, but in our daily life and we need to be very careful and take care of our personal information.

Threats are carried out by external parties Most people will tell you that cybersecurity threats come from the outside. Some hackers sitting in a dark basement trying to hack into your organization’s network. In reality, research shows that nearly 75% of data breaches are a result of someone on the inside.

A disgruntled employee, an ex-employee with a grudge, or just an ignorant user on your network can grant access to your entire organization’s data resulting in a massive data breach. It’s always a good idea to train your employees and teach them about digital security threats.

I don’t have anything worth protecting

You might think your data isn’t worth anything. You might think because you’re broke, no one cares about your data. You might also think that since you have nothing to hide, there’s no point in protecting your identity or information. This so-called ‘petty data’ could be compiled and or analyzed to build a bigger profile to steal one’s identity.

In other circumstances ones device could be used for malicious purposes.

Why use paid applications when there are free ones available

There is nothing that is wholly free of charge.

When using free applications, you don’t have control and or accountability of the use of your personal data.

One’s personal data could very easily be distributed to third parties and used maliciously.

Quite a number of developers embed malware in free application.

It should be noted that not all free applications are dangerous i.e. ‘Signal’ is notably a secure messaging application. However, quite a number of unscrupulous developers target their victims through free applications.

Tips and Facts

Facts

There is a hacker attack every 39 seconds.

The global average cost of a data

breach is $3.9 million across small & medium businesses.

Since the Covid-19 outbreak, there has been a 300% increase in reported cybercrimes worldwide.

95% of cybersecurity breachesare due to human error.

Most companies take up to 6 months to detect a data breach.

Tips

  • Keep your software up to date. Turn on automatic system updates for your device, make sure your desktop web browser uses automatic security up-dates, and keep your web browser plugins updated.
  • Use anti-virus protection & firewall. These software block malware and other malicious viruses from entering your device and compromising your data.
  • Use Strong Passwords & Use a Password Management Tool. Opt for some-thing that is not complicated and is easy to remember. It should have at least 8 characters and a max. Length of 64 characters. Don’t use the same password twice.
  • Protect your sensitive Personal Identifiable Information, that can be used by a cybercriminal to identify or locate an individual. This includes name, address, phone numbers, date of birth, IP address, or any other physical or digital identity data.
  • Backup your data regularly. A recommended rule is the 3-2-1 backup, where you keep 3 copies of your data on 2 different types of media (local and external hard drive) and one copy in an off-site location (cloud stor-age).

• One should consider using two factor verification in their security protocol.

Course Content

Expand All
Lesson Content
0% Complete 0/2 Steps
Lesson Content
0% Complete 0/1 Steps
Lesson Content
0% Complete 0/2 Steps
Lesson Content
0% Complete 0/1 Steps
Lesson Content
0% Complete 0/1 Steps