Module 5: Implementation Tools – Cyber and Information Security – Indifi
Module 4: Top Internet Security Threats – Indifi
Do you remember the old childhood warning “Stranger Danger!”.
It stands good even today. However, its scope has expanded from merely a stranger across the street to online strangers across the world having easy access to your data. And if you’re not careful, you may very well be the target of malicious cyber attackers.
Today, most of our daily activities and interactions are internet-based, and we all know that the data on the internet is as safe as jewelry placed in an open locker.
We would therefore need to be extra careful when interacting and sharing information with unknown entities and people; especially the unverifiable ones.
Meaning, we need to take the same level of precaution when we did we did as children, when a stranger approached us with a bar of chocolate.
Why? Because if reports are to be believed, nearly one-third of the world’s computers are infected with some type of malware.
But what happens when you don’t pay heed to the childhood warning? What could go wrong if you share confidential organisation related and personal data with unauthorised and unverifiable sources?
Take the lessons in this module to find out, and don’t forget to take the quiz where applicable.
Happy Learning!
Module 3: Basic Information Security Measures – Indifi
Security and data breaches have been on the rise for a few years now.
In the current technological world, where it has become easier than ever to access data, every day brings news of more and more security breaches and compromised data. In fact, if reports are to be believed, 7 million data records are compromised every day.
While it’s true that the root of these data breaches may lie outside the organisation, don’t make the mistake of believing that the cause only lies outside; there are many instances where the cause lies within the organisation, possibly as a result of poor access control mechanism or malicious employees who might be the reason behind access control breaches. Most organisations deploy sophisticated access control systems to keep security breaches at bay. However, these systems can sometimes have loopholes that can be misused by bad actors.
But what are these access control breaches and how can we safeguard ourselves from such breaches?
Take the lessons in this module to find out and don’t forget to take the quiz where applicable.
Happy Learning!
Module 2: Cyber and Information Security – A Primer – Indifi
LinkedIn. Yahoo. Mimecast. Acer. Microsoft Exchange. Facebook.
What’s the common factor among these companies?
All of them have been targeted by malicious cyber attackers in the last few years, exposing company and client data to security breaches and data theft by malicious entities or bad actors.
But what is a security or a data breach and how does it impact organisations and their clients? Put simply, a security or data breach is a successful attempt by a malicious attacker to gain unauthorised access to an organisation’s systems.
As to how these attacks impact organisations and their clients, that’s a question we endeavour to answer in this course, which comprises bite-sized videos – each spanning three to five minutes – that you can take at your convenience.
Take the lessons in this module to learn more, and don’t forget to take the quiz where applicable.
Happy Learning!