DICT-URS: Cybersecurity Awareness Webinar

Video Statistics and Information

Video
Captions Word Cloud
Reddit Comments
Captions
[Music] so [Music] so [Music] [Applause] [Music] [Music] [Music] [Music] [Music] [Music] [Applause] [Music] [Music] [Music] [Music] [Music] foreign [Music] and services to ensure total take holy satisfaction in instruction research extension [Music] production and dynamic administrative [Music] to satisfy all [Music] required cheetah [Music] research extension [Music] production and administrative support to continuously improve its cureless processes [Music] requirements [Music] commits excellent products and services to ensure total take all their satisfaction in instruction research accenture [Music] [Music] do the urs commits to deliver excellent products and services to ensure total take holder satisfaction instruction research extension production and dynamic administrative support and to continuously improve [Music] to [Music] to [Music] take all their satisfaction in instruction research extension [Music] production and dynamic administrative support and too [Music] requirements to do to [Music] and services to ensure take all their satisfaction in instruction research extension [Music] production and dynamic administrative support [Music] [Music] requirements two the urs commits to deliver excellent products and services to ensure total stakeholder satisfaction in instruction research extension [Music] production and dynamic administration [Music] processes to satisfy all the applicable [Music] requirements children [Music] excellent products and services today we are blessed and grateful that we are god for an important event must regard our perfection in the cyber space as such stipulated in the republic of number 10173 the state recognizes the vital role of information and communications technology initial and its inherent obligation to ensure that the personal information in the information and communications system in the government and the private sector are secured and protected i am professor marina arm canada from the university of the philippines from the university of citizens the department of information and communications technology on cyberspace cyber security awareness as part of the implementation of the forth theory of the security please be guided and reminded that this webinar is recorded for documentation purposes and will be posted on youtube or facebook turn off your microphone and camera do not share your screen or do any annotations observe proper decorum and etiquette use the chat box or qa q a form https column vit dot ly slash du you a cyber digipar certificates will be provided to those who have attended the full duration of webinar and answered the post evaluation form input valid and active email address when filling out the post evaluation form cut off time is tomorrow at 4 00 pm live stream or replay at url http colon www.youtube.com cybersec lc lc2 slash so we acknowledge our participants in doing so please have the attendance form filled out on https columns slash slash bit cyber the department of information and communications technology ti tict shall be the primary policy planning coordinating implementing an administrative entity of the executive branch of the government that will plan develop and promote the national ict development agenda ra10844 the programs and the projects are as follows 3y5 for all government emergency communication system the ict digital tv philippines tech for ed national grow the broadband plan national cyber security plan 2022 pbls central business portal philippine national pki digital ph national government portal gold.ph the university of resolve system mission the university of resale system is committed to nurture and produce upright and competent graduates and empowered community to relevant and sustainable higher professional and technical instruction research extension and production services to start the program man may i invite everyone to participate with all eyes and ears and let us now listen to our respectable and able director of the ict luzon regional cluster 2 engineer bullies are the most gentle [Music] advantage for their own purposes marginal hacking fishing ransomware identity and even viruses even if a guy took numerous devices like automatically capturing pictures and videos without us loading it that's why most companies are still imposing and implementing cyber security protocol let's have the firewalls straight violence updates and then white is the more website and devices like usb and storage devices even the most secure network there is the possibility in my compromise final report [Music] foreign [Music] personal devices in the entire internet i click and run the play especially for nasa public internet this is the reason why we are here today anything from the public on the back of cyborg and cyber crime because all of us are at least we need to be vigilant and mindful of what we are doing in the cyber landscape we should be on guard what we are doing especially if we are online beyond that of this webinar we cannot be totally confident and say in exploring the cyber landscape be informed be safe before you thank you engineer c for that at this point we will be hearing another message from our handsome and dynamic director of university of resound system dr alan e conde to our university president dr nancy t pascual to the director of the department of information and communications technology luzon from regional cluster 2 none other than engineer reynaldo tc and of course to mr carlo gabriella bond from the department of information and communications technology result provincial office two laboratory school principals from urs and urs and i main campus professor senior b canale and professor wilmer ivilia to engineer marvin s bakiran the head of urs management information system to our resource speakers who will be properly introduced later dear parents faculty and students ladies and gentlemen warm greetings to everyone in these times of pandemic and at all times we must practice protecting ourselves physically mentally emotionally and spiritually but with the advent of digital environment where everything can be processed on our fingertips with different systems networks and programs we must be aware from different digital attacks accessing changing or destroying our sensitive information extorting money from users or interrupting normal business processes with these ladies and gentlemen it is an honor and provide of the department of information and communications technology and the university of resound system in its collaborative effort to deliver its webinar on cyber security awareness please be with us in this very important activity protecting ourselves from digital attacks once again ladies and gentlemen a pleasant day to all thank you our vice president for academic affairs dr alex for that insightful message now we will listen to our beloved and blessed university president dr nancy pasquale for her message to our resource speaker engineer maria cena p abello today ict luzon regional cluster 2 director engineer reynold.tc to mr carlo gabriel abad from the dict risan provincial office to the urs vice president for academic affairs dr alan ikonde to the head of the management information system of uns engineering marvin bakiran the principal of the laboratory schools urs molong professor senior v canali the principal of the laboratory schools you are estani professor wilmer i bilia to the participants so this webinar good morning whether we like it or not we are now living in a highly technical world slowly but surely we shall migrate the virtual world for almost all transactions in our day-to-day lives from paying bills to enrollment in schools we are becoming more and more dependent on technology as we transition to a virtual community we are also faced with new emerging threats in the form of cyber crimes and cyber attacks it is therefore imperative that we act and respond accordingly to such threats we must prepare ourselves so we can safeguard our privacy and data integrity our identity and security is at stake thus we must ensure that we are aware of the potential threats and the possible measure we can employ to protect ourselves this webinar on cyber security is indeed very timely especially during this time of pandemic corbett 19 forced us to drastically employ online platforms in view of face-to-face interactions to the organizers of this webinar the department of information and communication technology thank you for spreading such an important awareness drive this will truly be a great use to all of us to our resource speaker thank you in advance for a lacking time from your busy schedule to share with our participants the necessary information on the subject matter for the participants i hope that you take this opportunity to gain more perspectives on cyber security to better protect yourselves and your institutions in the future once again good morning everyone and god bless us all thank you to our president dr nanchitik squad for that discerning and prudent message at this time again we welcome you all to our to our webinar on cyber security awareness our resource speaker is a registered electronics and communications engineer from the university of santo domas she has 14 years of professional experience in field of telecommunication and technology with skills focused on project implementation management pre-sales engineering and consulting before joining the government she worked in the private sector as customer solutions engineer and configuration management specialist conceptualizing project proposals for network design expansions managing last mile build out and system integration installations to clients she joined the government as an information technology officer one of the then dost icpod ict in 2016 and held various concurrent roles as oic provincial head of nueva ecila regional project focal for electronic business permits and licensing system and regional project focal for philippine national public key infrastructure currently she is the information technology officer one of the critical infrastructure evaluation and cyber security standards monitoring division of the dict cyber security bureau let us now welcome and give a warm round of applause to engineer maria cenapy abello hello hello i hope everyone can hear me by the way um miss reyna miranda thank you for the wonderful introduction [Music] cyber security awareness program which we are invited because uh we wanted to give awareness uh for our um school uh somalia success and as well as to those who are watching this um this webinar through the youtube i think uh we're also live in facebook um i'm not sure but um you can see them and then the replay uh replay of this webinar through those um social media sites now on the cyber security national cyber security plan of 2022 uh one of the imperatives of an ncsp is to give awareness that's the fourth key imperative of the nsc uh national cyber security plan of 2022. so um let me share in my slides i hope you will um stick with us until the end of this webinar uh and i hope i could impart some of um tips from you um regarding the awareness and also um how to be cyber safe um through this pandemics so okay i hope everybody can see my slides um can you please confirm kaitlyn if you're able to see the slides okay thank you carlo uh thank you everyone for um confirming so young presentation is not really technical in terms of the content but we would like to um to target as many origins as possible so this is only a cyber security 101 it's so basic but um there are some things that we have uh we need to learn like for example cyber threat after snapping and what are their weapons of choice when it comes in terms of cyber attack so okay let's okay so uh uh the usual way that we do our classes our our work our jobs um we were forced to put our lives to contain it in our homes so um i would i'd be presenting you uh some of the um statistics that um what drives you i think um these statistics are uh was uh we got the statistics from hootsuite we are social um in the philippines perspective uh the device ownership of january 2021 um the percentage of internet users from six uh ages 16 to 64. um they owned 98 for 98.5 of smartphones now um and then well noted uh when loading is also the uh the ownership of the laptop or the stop computer uh i think this grows about around 15 from the past uh past year now january 2020 um almost 80 percent laptop or desktop and almost 100 of the filipinos have uh well in at least in the age 16 to 64. they own a um a smartphone no and then also well noted um well nothing for it is your tablet device um i think this was around um 22 from last year it grows to um 33.2 devices when we do our uh online online study or online work so um from 2021 the daily time spent on media um daily average time that we spent on internet is around 11 hours so it's almost half of our lives and then for those um 11 hours we spend watching our streaming three point 3.5 hours of our 11 hours and then we spent uh four hours and 15 minutes on social media so all in all um by just watching youtube um streaming netflix and um doing social media we spent of those 11 hours we spent around um seven to eight hours doing those um doing those activities and we're on um search of um of um public activities when listening to music streaming services like uh um spotify uh probably this the time spent listening to podcasts will also be on the rise then there is also a trend in listening to podcasts so and then uh let's uh let's put on new i think traffic i forgot i'm sorry so um this was captured by december 2020 and search engine device i search engine optimization i'm sorry so um this was captured in december 2020 um vsm rush it's a ceo company so my depending on on the top five websites that we visit um according to semrush is google facebook youtube wikipedia um pornhub.com but um going um diving deeper is um nandito see paper man and it is instagram and a roblox reddit c um abs-cbn and inquirer.net so nothing um on the internet now popular then [Music] h now um another another ceo company which is similar web and they have also their in their statistics on uh there they also have their statistics it is google facebook youtube twitter messenger and then we're floating on the number nine is sharpie number 10 is instagram number 11 [Music] online shopping and then wikipedia actually it's not a surprise anymore because uh when we had our luck vampire last year um also also um these are the traffic analyzed by alexa it's an amazon company number one two three four five google youtube a cbn inquirer.net facebook [Music] abs-cbn employer.net jeremynetwork.com so these are you website so there is a um on the online shopping as well and then netflix youtube on wikipedia.org because uh most probably our students um have been using the wikipedia.org as their references use also wikipedia.org at the spot number 14 and then serappler see amazon banjo shop the cost of alexa um alexa is a amazon um um websites so our data is more valuable than oil and it's most expensive asset in the world so if i'm done adding data and netflix you the social dilemma um online is not uh the commodity nowadays uh we are the commodity our data is the commodity now that the advertisers are paying as much as this behavior is nothing so believe or nothing when we are using the internet so um if you have time maybe this um long weekend you may watch the social dilemma on netflix so um cyber attacks of 2020 we've listed around uh three for this perro if you can see them reference nothing which you see or um they have uh they have listed around i think uh five or um they have reported you'll find finasteride ransomware attack so finance finance financial issues uh um operating in a fintech industry and then they have consumers around 130 and then they have reported a ransomware attack on its servers uh and then um cyber a payment for it to be able to uh decrypt all your um sensitive information but because of they have a proper backup on those um files they were able to restore those um files without even um [Music] um somewhere attacker also um i think most of us were we were able to uh to get this on use on the zoom app and they took so much of um when we were forced to get our um work done from the office in illinois from the school in illinois so i'm looking popular [Music] [Music] [Music] uh did is they employ a lot of cyber security experts to harden their systems uh this is a zoom app so um i suggest that you uh usually you you update your um your app your your apps um updates from the zoom so okay and then lastly um cyber attacks so your solar winds if you're familiar with solar means um the solar wind orion um the attack is um on a supply chain uh management so uh supply chain management systems this this attack is uh on on the level of cyber espionage espionage i'll discuss it later very massive destruction the question is um because of this um [Music] um the question is not if you're going to be a victim i have a definition of cyber security here um it was referring to the itu um definition also the the our definition of cyber security here is um adopted national cyber security plan of 2022. so uh this uh cyber security plan uh cyber security the definition is a collection of those policy security concepts security safeguards guidelines risk management approaches action training best practices assurance and technologies that can be used to protect the cyber environment and organization and user against our technology our society our our capability what is what is our capability and readiness uh to um for these attacks uh against our technology so and then the first step oh shampreka said [Music] what we are protecting ourselves from stabbing adams uh um if you have read the book um the art of war by sanshu sanchu is a um is that you have to know yourself before you engage in the work and also you have to know your enemy as well so if you know your enemy you know uh and then you know yourself you can be able to uh to maximize your your uh the cyber attack is a deliberate exploitation of computer systems uh technology dependent enterprise and networks so sometimes or most of the time this cyber attacks they usually use malicious code to alter computer code but sometimes in the laggy computer um uh i'm cyber attacked there can be also a uh social engineering uh component on that one we'll discuss it later for a new uh social engineering and so um they use malicious code and the other computer called logic data resulting to destructive consequence that can compromise data and lead to cyber times such as information and identity theft so nothing so i have listed here um um one two three four five six six um cyber threat actors some of them destructive um human error they can be as destructive as young samana so number one is the internal use mr errors um these are not really um this cyber that occurs it's not really malicious in nature because of human error and they could cause a lot of damage and their their damage is can be can be massive on those systems um one example is that is human employees now employees employees um companies like power companies they are working on the substation of [Music] um because of human error and negligence now uh number two is sleep tvs uh these are not skilled hackers uh descriptives um and then they get a code from the internet um popular and then [Music] that this code is malicious enough to um shut down your network or or we have to isolate them at least isolated network also number three is the insiders these are like um internal users user errors but and these insiders are company company nsla company company employees that they wanted to um they wanted to malign or they wanted to to like uh for example they would like to have a nasty threat um they would like to delete some of the sensitive information and then they also um parenting vandalization [Music] on an incident management um [Music] perspective uh if your asset or nothing is not then they need to have um these are motivated by ideological um um activism mostly this um this activities um they do not want to cause damage system like for example websites but they wanted to uh expose the truth uh and then let's say converter that on what they call this damaging and sometimes this activist they wanted to prove a point that um they have hacker system uh number five is the organized crime the cyber criminals they wanted to steal um sensitive data and personal information for their financial gain information the personal or sensitive data and then [Music] [Music] and then lastly is the state sponsor these are funded there that are sponsored by a nation um a cyber espionage so um we had um briefing session with uh one of our um um but when you engage in a cyber attack or [Music] um if you have human cyber threat uh maps um i think in um google google it i think one of them is fire eye um [Music] um foreign anyone [Music] yes okay so my verse are common weapons of the cyber criminals what about hacking um yes this can also be a uh young weapon of choice now but not as much as the activists you the weapon of choice of the activities is hacking um and the cyber terminals yes um but at a minimum level uh hacking is a weapon of choice of the act like this okay and then social engineering we know what social engineering is the social engineering is a psychology manipulation of people performing actions or divulging confidential information let's say for example they trick you in giving you your passwords or so they have uh the hard drive to listen up not access um doing that or they uh trick the person like for example if you if you have uh watching video jimmy kimmel they walked through the streets of hollywood and then they asked a random person to give their password chevrolet now uh random random random personal password but because of you the little interrogation you know politically in the questioning and probing of the interviewer but we also have other cyber threat attacks so um somewhere um and these are the they typically include your your your data and they demand a payment for the ransom data to be depleted and to be returned to the um let us be aware now sometimes this data that they somewhere so anyone from the chat box and by the way google me so usually ransomware is a weapon of choice of the um cyber criminals yes they demand a payment um the cyber criminals um they have they have they wanted they infiltrate a system they cost damage the system for their financial gain so gonna negotiate cyber um criminals nothing also number two so this attack is when an attacker is intercept the communication between two parties to instruct young conversation or to deny the traffic between login for information and credentials of personal information spy on the victim and submit sabotage communication or corrupt data so i have a video how they do demonstrate young man in the middle uh not in the middle um they use a router to sniff you information so um if i can share it to you so let's [Music] let's see okay i'm gonna share it to you okay this is a man in the middle attack so let's see how easy it is to hack into a computer so this is my personal computer so in this attack we will pretend to be a wireless access point that you normally connect that you so you want to click on the download button because it's not convincing you to do this and once you've executed that's it your your razor has been exploited i can i can see it here it says macbook let's say if i want to take a screenshot of your of your webcam right so i have a special command here for essentially accessing your little camera right here i say execute there we go i just saw a green light pop up there for a second for a second but now it's already too late and i already know what's going on around here oh wow this particular attack it recorded the picture but you can actually record the video you can also record sound if you wanted to that's really just you you can execute things on the behalf so what i'm going to try to do is actually open the calculator application here's i can basically execute any types of commands i want on your behalf so what can people do to protect themselves you should sort of be on the lookout for anytime you sort of do an action and then the computer asks you to do something on your behalf like you know you downloaded something and said hey please enter your password you know if you didn't expect that to happen maybe you should kind of send back a little bit and say well does it normally happen when i log into a wi-fi access point or if you are logging into a network and you didn't expect to be redirected to an update page you know you should kind of stand back a little bit and say actually i'm not going to download this until i go home and i can trust my wi-fi well thank you so much great to see this i'm glad to have the opportunity machine hey there thanks for nick i okay so i hope everybody can hear me so i hope that um everybody was able to gain knowledge on how the uh a hacker can infiltrate your um your personal device so by connecting to a suspicious router or malicious a malicious router they'd be able to gain access on your laptop controlling also your camera and then um install a malware on your on your device so um they could uh get your login credentials um actually we had this uh uh exercise when i attended the indus indo-pacific um cyber security week tv you have human default devices like for example um username and password and cctv camera we were able to um to go in and then cctv uh whiteboard which um so moving forward okay number three is anyone um a dictionary attack this is a dictionary of common passwords and password one two [Music] a list of those passwords previously we encourage nothing or we suggest that you change your password um often and then when you change your password um please do not use your previous passwords most of the time um they have a list also one name password number three this is a password so it relies on a piece of malware so i'm very careful not this amount certainly keyboard um keyboard strokes and password or username devices okay next um password so how does it take how long does it takes to crack a password um this is a a and then you do not use the alphanumeric plus the special special uh what they call this uh special characters and i know but simple is the hackers or the the the cyber threat actors can can guess your password in as fast as 10 minutes simple but if you employ your iphone every kind of person special characters and um uppercase and lowercase uh the your seven kind of per password can be um can be guessed as uh as as fast as one month and two weeks comparing them to 10 10 minutes no but if you um employ a much longer password let's say i'm sorry let's say for example um you employed uh by the way can you see my screen no no um i'll i'll share again my screen i'm sorry i'm i'm i was not able to [Music] share my screen okay um going back on statistics on how does it take to crack your password so sub command when it's versus versus um complex um i'm a seven seven character password without the uh the alphanumeric and the upper and lowercase it can be cracked as fast as 9.5 to 10 minutes so if you employ a special character and you have employed also the upper case and the lower case the seven the seven character password can be tracked as fast as one month and two weeks but if you um if you use a longer password let's say for example a 12 character password [Music] and then you employ only simple um simple password without the uppercase the lowercase the alphanumeric uh characters without the special characters your 12 12 character password can be attract as slow uh as fast as two centuries so uh imagine that if copenhagen happened and brute force attack they could be able to for a long you special with special characters also with high-end um [Music] lowercase and uppercase and then you also have um employed the special kind of person your password can be cracked enough if fifteen thousand millennia so um in your lifetime fifteen thousand [Music] we suggest that we employ a 12 character password and then use uh use alphanumeric plus special characters okay another cyber threat is phishing excuse me so fascinating this uh they three users into clicking on malicious links and opening unknown attachments um usually they use its emails [Music] to trick the person on um clicking that link and getting those information um usually this um the bus um many have reported yo mama banks nothing like for example um they trick assume emails please please remind me reminded or take note that bas do not they do not want to um get their passwords um [Music] [Music] and then number five uh the ddos or or the dos attack uh this typically uses computer and internet connection um to flood your target uh system nothing this is a um this is a weapon of choice website and if it takes a lot of time to load your website probably you've been attacked by um um um you usually um go to that website and then it takes a lot of time to load your website and compared to um your previous experiences before an ambulance [Music] um attacks okay so cyber time so cyber time is also known as a computer related kind uh it involves a computer and a network and the computer may have been used in commissioning in the commission of a crime or it may be targeted so um usually these cyber crimes uh you know um usually activity and ismaron somewhere in malware and then um they again um they wanted a financial gain um about an unbeliever and activity so the term uh it was first coined by william gibson in 1982 and it's not popularized by his 1984 novel neuromancer so i hope uh actually um probably i'll i'll read that in the future for another um for a reference okay so moving forward um these are the cyber threat attacks um threats in the philippines during pandemic uh these are the common cyber threats in the philippines so we have listed three so my fake news social media scam and phishing so on the fake news um we the cyber security bureau has um provided an advisory this the spreading of fake news is a crime so we have a law on that it's a republic act 11 469 it penalized those individuals or creating perpetrating or spreading false information regarding kovig 19. we have those contact numbers here uh science.gov we have also have your email address and um we have also some hotline numbers here uh you may wanted to get a screenshot or get a copy by using your phone to um to take a picture and then we also have the facebook and the twitter and uh the cybersec.gov that we each so it promotes so is social media scam so the cyber security advice uh cyber security guru uh were able to provide human um advisory network uh there have been further further land practice of social media um and the cyber security bureau or just the public officer following cyber security tips so later on we'll discuss your cyber security tips but um let me show you another video um about the social media scam actually i got this some video to be able to illustrate to you how does the social media scam work and how does it affect your attentional organization so uh let me share to you again another another another video i hope you can hear [Music] oh you look good i gotta have you oh you're fantastic all right and this glass guy i don't remember you but i'll add you anyway all right so i've got a bunch of project managers a few marketing managers and one account director and my network is growing like crazy soon my career is going to take off what you don't believe me all right check this out do you know who ron ferguson is he added me to his network think about it i'm rick ferguson no relation to wrong and certainly no relation to this guy he's a criminal hiding behind a fake profile to collect valuable information this is dave you may have noticed he's really happy to extend his social network he's reckless though he accepts almost every invitation including ron's fake one this is pretty basic stuff anyone can do it ron's looking through dave's posts comments and photos you can see where he went to school and who with who he socializes with what he does in his free time even what projects he's working on dave's profile is an open book ron can see whatever he needs and use it to his advantage dave is an attacker's dream he's almost addicted to sharing every detail of his life with hundreds of strangers sound like anyone you know we all use social networks and if you're careless it becomes very easy to gather this much data dave might think it's fun sharing everything that he does but to people like ron it's a golden opportunity they take advantage of your over sharing before you know it they have access to your entire life and even though you're giving it away for free you may well end up paying for [Music] it [Music] ron gathers intelligence on an organization through its employees and uses it to his advantage right now he's writing an email to dave's boss with a very interesting proposition a simple online search has also turned up documents which reveal exactly which version of office software the target organization is using embedding malicious code in this fake spreadsheet is the work of seconds in fact there's an app for that you might think this kind of thing only happens in films but in reality most attacks use social engineering creating a credible pretext to fool the victim into doing something unwise a momentary lapse of judgment and ron has the access that he needed he moves carefully through the network searching for more systems and data this won't be a quick hack ron wants long-term access to sensitive data that he can sell on the criminal underground maybe it's a credit card database maybe it's a project in which the company is heavily invested in the end it doesn't matter what matters is that it could have been prevented unfortunately for dave the investigation discovered his social media posts and followed the trail of evidence that led to the breach remember you're just as responsible for the security of your company's data as you are for your home building your social network can of course be valuable but don't connect with just anyone think twice before you post if you wouldn't be happy shouting it in the middle of a crowded street then don't post it online and when you do share make sure you tightly control the audience follow your company's security policies and of course be careful of unsolicited messages or content that you receive most important of all just use your head don't be a dave i'm rick ferguson from trend micro thanks for watching [Music] hello uh just use your head um be able to have a disturbance because as all you know you know over sharing that in this facebook or some social media sites nothing it could lead to a is confidential information like your username and password so you do not suggest username and password um as well as we are just you are just responsible as young company when in terms of the cyber security um and then okay so so um also the cyber security bureau has been uh able to to do an advisory young uh actually i have one uh another another um video but they probably show up on a video i have one um um okay i hope everybody can hear this and able to view the video this confirmed friday is rob's favorite day of the week well usually it is it'll take him hours to get through all those blasted emails problem problem problem couldn't just one email be about something else wait what's this miracle hair growth cream have rob's dreams finally come true all rob needs to do is follow the link and give up all his personal information and a little selfie inside the office ah not quite quick enough my poor chap a full head of hair eludes you once again [Music] well it's time for home now rob may not have won but at least he doesn't have anything to worry about for monday morning rob is ready to take on another week of work josie doesn't look quite so happy though what's this a data breach someone gave up all their personal information to a cyber criminal surely it couldn't have been from a miracle hair growth quiz oh dear let's rewind a bit and see what went wrong rob received an unexpected email but didn't stop to think the email wasn't from a misunderstood genius behind a miracle cream at all but from a cyber criminal a criminal that sends out fake emails to try and fish for credentials or private information this is called phishing the information can then be used to impersonate you access private data or send out further phishing emails to your colleagues but how could rob have known it was a phishing email let's take a closer look any unexpected email you receive should be analyzed with caution check the domain name of the email to see if it looks like the email is from a legitimate source look out for mistakes or misspelling in the email a rare recurrence in emails from legitimate companies it's not looking good is it rob anytime you're asked to give up personal details exercise a high level of caution think about whether you trust who you are giving this information to if an email claims to be very urgent or important you should take a step back and consider whether it is trying to get you to overlook your normal good judgment and if you're ever not completely sure if an email is legitimate it never hurts to double check with the i t department they'll be there to help you whenever you need them [Music] phishing emails are fake emails created by cyber criminals that are disguised as legitimate communication from real people or companies cyber criminals send out phishing emails in an attempt to make you hand over private information or credentials falling for a phishing email could give a cyber criminal access to your company's data systems or network an illegitimate domain name and incorrect spelling are some of the common telling signs of phishing emails most importantly you should think twice whenever an email tries to create a sense of urgency or asks you to hand over any information user names or passwords okay so the passing of them [Music] because inclusion emails but they wanted us to upon it urgently and then because um those companies love the name legit ones they do not want that you know reputation i would be online uh no reputation they do not want to damage their reputation so okay moving forward the rushing and lack of awareness it makes a perfect setting of a cyber attack or a cyber crime so um uh when um acting on these sales or some um how they were able to recover is they have a backup of their files so usually ransomware um to be able to stop young cyber attackmen or their behavior and you have to have a backup and then we have a three two one rule and you you you you get three copies of your um data you store it to two locations and then you keep one for yourself also number two is uh do secure browsing um please um make sure that la lunas transactions sensitive data these use your secured um browsing you mean https and then metal push up um address bar okay and the number three is use vpn um actually the vpn um this can be costly but on a organizational setting um let's say foreign but usually [Music] the best antivirus is what you have now the patch that you had last year may not be able to uh work today but what you have passionately last year in 2020 might not work today um last year um these are probably these firewalls um these are um we recommend to use you this from the organization standpoint at least [Music] yeah and then number six i use from password as i've mentioned earlier um this is a strong password uh try to have a password that is i'm sorry sorry okay okay so we are number six now and then you employ also the alphanumeric and the uh and the uppercase and the lowercase uh they could be tracked as fast as 15 000 million yeah also secure devices so kanina i've mentioned earlier that you the the the devices that we own from 16 to 64 uh internet users that we have a 90 90 per 98 uh 98 of us uh owns a smartphone and then 77 of us owns a laptop or a desktop device so secure our devices so be careful what you plug into your devices as i've mentioned earlier the the usb that you uh you plug into your devices may might have a malware and then you're not in the lab and not installing starting system um also don't mind this install third-party apps uh directly from the internet as much as possible you uh review your humana reviews let's say app store or google play uh manchester united stars and the meron shaman reviews as much as possible before you install those apps make sure to read your comments and comments uh so um please take note of that and also legit man let's say for example facebook facebook doesn't want to 2020 the threats of 2021 might not filter out you uh threats now no 2020 updated uh purchasing so you have to update as well your [Music] uh your ongoing threats now so you have to update your um your operating systems literally be mindful in connecting to free public uh wi-fi networks assignments as i presented earlier information and then usually video is if you um so um on our online accounts like for example email and your social media accounts nothing most of them have the multi-factor authentication please make use of that at least [Music] this [Music] only um so let us see uh do not do atm but if you have monies uh what i meant on the atm is uh do not do at the moment just say [Music] this is the urge after your uh your trip let's say for example um number nine okay privacy and decency um sometimes um the previous very missing and decency now um as much as possible we wanted your internet not to have humongous classes [Music] netflix um what we call this yo the circle um actually it's a series um [Music] and momentarily lapse of judgment could lead into a attack but it could have been prevented or foreign i would like you to get a screen uh stream capture of this uh if you have your phones you may you may get a picture of this um these are young cyber complaint points of contact then um there is the ict national computer emergency response team they have their facebook page their email and then their contact numbers also mandatory nc philippine national police and the cyber crime group so they have their contact numbers as well um the national bureau of investigation is cyber time division so they have their contact numbers the national privacy commission um i hope sana one of these days uh go ahead and find another webinar and this about the data that i receive so these are the uh numbers on the national privacy commission and also is interconnected everyone shares the responsibility of uh securing cyber space and then cyber security is not an expensive compared to the cost of the of cyber attacks so we hope i hope that uh you have learned um for about one and a half hour already so thank you very much and have a good day uh have a meaningful and long weekend thank you very much thank you so much engineer abella for that at this point we will be uh we will be proceeding with our q a portion so if there are questions that you would like to ask to our to our intelligent resource person well versed with the topic you may now have the questions raised to her actually there are questions in the chat box that uh that are posted so one of the questions from from professor padilla she has here how effective is our cyber security strategy at addressing um business risks that's one of her questions mama mama bello okay how effective is our serviceability strategy at addressing businesses it depends on the uh what you call this it depends on the organization but in in this one of our mandates is to um organize or engage with our um critical infrastructure operators not to have their own incident management response team as well and then they will uh this is um incident response team and their computer emergency response team will be connected to many sectoral leads emergency response team under the cyber security guru so on the matter of the reporting or the reporting level at least on this industry or in their sector in the sea or in the water industry or in the bpo industry so far reporting on what um ci operators then they could elevate it to the national uh computer emergency response team so employ your strategy government uh on um securing our uh cyber's facebook okay thank you for thank you mom abel for the response actually that question came from one of the viewers on youtube okay now um there's another question um by don ramos i don't know if this really if this is uh if this question really comes from him or because it's in it's on the chat box so it says here what is your what is your suggested app for anti-virus home views especially that are that are for always who are online okay so as i've mentioned earlier what is the best antivirus um the best antivirus is what you have now um versus antivirus so if you do not have you have to shell out this money to buy antivirus to be updated so uh let's say forever you're using your windows 10 device marathon windows defender and they could be suffice enough to be able to have your antivirus not then um um [Music] [Music] [Music] with your sharing which is a very informative and educative one i think everything is clear now as a regards how we can protect ourselves from cyber attacks or cyber threats now for our participants if you are if you still have questions in mind feel free to use uh the q and a form at the url https cyber digipar thank you so much engineer rebellion so you really deserve a warm round of applause thank you so very much at this point we will now be hearing the closing remarks from our dear and supportive principal of the laboratory schools of university of results system around professor sinhabi kanale to our university president dr nancy t pascual our vice president for academic affairs dr alan e conde professor wilmer vilia principal of laboratory schools tonight engineer marvin bakiran our university mis engineer reynaldo tc director the ict luzon regional cluster 2 mr carlo gabriel abad from the ict resolve provincial office engineer maria cena abella our guest speaker the dict team our urs family ladies and gentlemen good morning today we are very blessed because we are given the opportunity to become knowledgeable on the importance of cyber security our speaker and the dict empowered us and helped us to be protected in cyberspace especially nowadays that we are adopting the online classes for this school year and maybe by next school year with a very informative lecture of our speaker i know that we are smart enough to face the challenges of cyber security and no one from you be left behind on the information learned are acquired from our speaker with that we would like to thank the urs family headed by our university president dr nancy t pascual and of course the dict team headed by engineer reynaldo tc for giving us the opportunity to be part of this activity from the bottom of our hearts thank you hoping for a more fruitful partnership in the future to our learners specifically to the young generations again thank you mom at this juncture another closing remarks will be given to us by the zelus and able provincial head of the ict rizal engineer carlos gabriel thank you good morning to all our participants and viewers i would like to thank all of you for attending today's webinar i would like to acknowledge dr nancy pasquale university president and dr alan conde vice president for academic affairs of the university of resell system thank you very much for supporting this webinar also our special thanks to our resource speaker engineer maria cena for sharing her knowledge about cyber security awareness [Music] websites please like and share the official facebook page of the result provincial office for upcoming activities and webinars i hope that each of us will be responsible netizen once again thank you and good morning to all stay healthy and stay safe thank you thank you engineer bud participants please be guided and reminded about this certificates will be provided to those who have attended the full duration of webinar and answer the post evaluation form input valid and active email address when filling out the post evaluation form cut off time is tomorrow at four o'clock p.m replay at url http colon youtube.com cybersec lc2 so make sure you have filled out the attendance form at https colon slash bit dot l y slash d u dash att cyber so for the post evaluation form make sure you have answered this http http colon slash bit dot ly slash du dash eval dash cyber so follow us on facebook so department of information and communications technology the ict the i d i ct dot the ict gov ph department of information and communications technology luzon cluster 2 at the ict the ict dot lc2 the ict cyber security at cyber sec gov ph the ict result at the ict result the ict cyber security the song cluster 2 at cybersec dot lc2 university of resolve system the president's post at the president post university result system urs office of public affairs at oppa dot urs urs deny laboratory high school at urs deny laboratory high school uis laboratory schools colon slash www.facebook.com ursm dash laboratory schools dash one zero eight three six four six nine zero nine one four eight three three nine and with that we will end today's webinar with this quote from newton lee as the world is increasingly interconnected everyone shares the responsibility of securing cyberspace thank you for attending our webinar thank you god the ict and university of resale system for this important event we also thank those who have in one way helped in making this event a successful one goodbye everyone keep safe and god bless us all [Music] so [Music] [Music] [Music] [Music] [Music] [Applause] [Music] [Music] [Music] [Music] [Music] so [Music] [Music] [Music] so [Music] [Music] [Music] [Applause] [Music] [Music] [Music] [Music] so [Music] you
Info
Channel: cybersecLC2
Views: 4,188
Rating: 4.9572954 out of 5
Keywords: CybersafePH, Cybersecurity, DataPrivacyPH, CybersecurityLC2, DataPrivacyLC2
Id: VCTTaBFh0D0
Channel Id: undefined
Length: 150min 35sec (9035 seconds)
Published: Tue Mar 30 2021
Related Videos
Note
Please note that this website is currently a work in progress! Lots of interesting data and statistics to come.