Module 4: Top Internet Security Threats

Do you remember the old childhood warning “Stranger Danger!”.

It stands good even today. However, its scope has expanded from merely a stranger across the street to online strangers across the world having easy access to your data. And if you’re not careful, you may very well be the target of malicious cyber attackers.

Today, most of our daily activities and interactions are internet-based, and we all know that the data on the internet is as safe as jewelry placed in an open locker.

We would therefore need to be extra careful when interacting and sharing information with unknown entities and people; especially the unverifiable ones.

Meaning, we need to take the same level of precaution when we did we did as children, when a stranger approached us with a bar of chocolate.

Why? Because if reports are to be believed, nearly one-third of the world’s computers are infected with some type of malware.

But what happens when you don’t pay heed to the childhood warning? What could go wrong if you share confidential organisation related and personal data with unauthorised and unverifiable sources?

Take the lessons in this module to find out, and don’t forget to take the quiz where applicable.

Happy Learning!

Module 3: Basic Information Security Measures

Security and data breaches have been on the rise for a few years now.

In the current technological world, where it has become easier than ever to access data, every day brings news of more and more security breaches and compromised data. In fact, if reports are to be believed, 7 million data records are compromised every day.

While it’s true that the root of these data breaches may lie outside the organisation, don’t make the mistake of believing that the cause only lies outside; there are many instances where the cause lies within the organisation, possibly as a result of poor access control mechanism or malicious employees who might be the reason behind access control breaches. Most organisations deploy sophisticated access control systems to keep security breaches at bay. However, these systems can sometimes have loopholes that can be misused by bad actors.

But what are these access control breaches and how can we safeguard ourselves from such breaches?

Take the lessons in this module to find out and don’t forget to take the quiz where applicable.

Happy Learning!