Module Three: Types of cybersecurity breaches

Cyber security - homepage
1
2
3
4
5

Module 3

Let's go phishing.

Key Points:

  • Money, data and wilful malicious behaviour are the key ways that cybersecurity breaches happen.
  • Small and medium businesses are more likely to have cybersecurity gaps, and are therefore vulnerable to attack.
  • Emails are often used for phishing exercises to access your personal data, more frequently now text and messaging is also being used. Take the time to consider if these are legit before opening.
  • Keep your network security strong, keep guest networks separate, encrypt systems, and update your firewalls.

Resources

Is your password hackable?
Next module