0% found this document useful (0 votes)
17 views16 pages

TGCSB PPT 2 Final

Uploaded by

jrameshwmq
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views16 pages

TGCSB PPT 2 Final

Uploaded by

jrameshwmq
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 16

CYBER HYGIENE

TABLE OF CONTENTS
• Enable Firewall Advanced Threat Protection
• Patch Management
• Change Default Router Password
• Safe Browsing Practice
• Implement ad Blockers and Script Blockers
• Regularly Update Browsers and Plugins
• Regular Backups of Essential Data
ENABLE FIREWALL ADVANCED THREAT PROTECTION

• Firewalls monitor and control network traffic to protect against


unauthorized access, while Advanced Threat Protection (ATP) adds an extra
layer to detect sophisticated threats.
• Without ATP, networks are more vulnerable to data breaches, malware, and
zero-day attacks.

What Happens if it is Not Enabled?


• Increased vulnerability to data breaches and malware infections.Higher
risk of network downtime due to undetected cyberattacks.Exposure to zero-
day threats and advanced persistent threats.Potential financial losses,
regulatory penalties, and reputational damage.
Control PanelSystem & Security  Windows FirewallTurn Windows Defender on
PATCH MANAGEMENT

• Patch management involves updating software to fix security vulnerabilities and protect
the organization.
• Path for Check: Settings Apps App & features Check for dates of app installed (if very
old date, you may check for updates manually for respective app).
• Regular patching reduces the risk of attackers exploiting known security flaws.

• Without patch management, systems are exposed to potential breaches and malware
attacks.
• Automated patch management tools ensure timely updates, while manual checks cover
critical systems.
• A scheduled approach to patching helps maintain an organization’s security posture.
What if Patch Management is Not Enabled:
• Increased risk of exploitation from unpatched security vulnerabilities.
• Greater likelihood of malware infections and data breaches.
• Potential downtime and financial losses due to successful cyberattacks.
• Non-compliance with security regulations, leading to fines and reputational
damage.
CHANGE DEFAULT ROUTER PASSWORD

Router logins often use guessable passwords, such as "admin" for the username
and "password." Default credentials, including the username and password, are
usually printed on a sticker located on the back or bottom of the router.
• Changing the default router password is a basic but essential security step.

• Default passwords are widely known and can be exploited by attackers.

• Using unique, complex passwords enhances network protection.

• Example: User: Admin123, Password: Ee(0p$2025

• Documenting password changes helps with future management and


accountability.
What Happens if Default Password is Not Changed ?
• Increased risk of unauthorized access and control over network devices.

• Higher chance of data breaches and malware spreading through the network.

• Potential for attackers to exploit weak defenses, compromising sensitive


information.
• Loss of network integrity, affecting overall organizational security.

Suggested Countermeasures:
• Change default passwords to complex, unique passwords immediately upon setup.

• Use a password management tool to securely document and retrieve passwords.

• Establish a regular schedule for reviewing and updating passwords on critical


devices.
The above image displays the Default Credentials in Router
Page.
SAFE BROWSING PRACTICES
Safe browsing refers to the practice of navigating the internet in a way that minimizes
the risk of encountering malicious websites, phishing attacks, or harmful content. It
involves being cautious of suspicious links, verifying website authenticity, using secure
connections (HTTPS), and avoiding downloading untrusted files or software. Safe
browsing helps protect personal information and prevent exposure to online threats.

What Happens if Safe Browsing is Not Enabled:


• Increased exposure to phishing attacks, where attackers trick users into revealing
sensitive information.

• Higher risk of visiting malicious websites that can install malware or spyware on
devices.

• Greater likelihood of downloading harmful files, such as viruses or ransomware,


leading to data loss.

• Users may unknowingly access fraudulent or fake websites that steal personal or
financial details.

• Sensitive data like login credentials or financial information can be compromised


Suggested Countermeasures:
• Enable safe browsing features on browsers to block malicious sites and prevent access to
phishing pages. Web filtering tools can block harmful sites and reduce risks . Regularly update
Browsers, antivirus and anti-malware software to protect against threats.
• Path: Chrome  Settings  Privacy & Security  Site settings  Additional Content setting
Protected content Ids
IMPLEMENT AD BLOCKERS AND SCRIPT BLOCKERS

Ad blockers prevent unwanted ads from displaying on web pages, while script blockers
stop potentially harmful scripts from running. Together, they enhance security by
blocking tracking and malicious content.
What Happens if it is Not Enabled:
• Increased exposure to intrusive and potentially harmful ads that may contain
malware.
• Greater risk of being tracked by third-party advertisers and compromised by
malicious scripts.
• Slower browsing speeds due to the loading of unwanted ads and scripts.
• Vulnerability to phishing and malicious ads that exploit web browser weaknesses.
For Google Chrome: Ad Blocker:
• Browser: Menu bar (Top Right)Extension  Visit Chrome Webstore  Search for add blocker  Add to
chrome.
Before After
• Script Blocker:
. may block scripts.
Extensions like NoScript or ScriptSafe
Check for these by going to chrome://extensions in the address bar.
REGULARLY UPDATE BROWSERS AND
PLUGINS
Regularly updating browsers and plugins is essential for applying security patches that
prevent attackers from exploiting known vulnerabilities. It helps close security gaps,
protects against emerging threats, and ensures optimal functionality and performance.

For Google Chrome:


• Open Chrome and type chrome://extensions in the address bar, then press Enter.

• This page shows all installed extensions (plugins for Chrome are mostly in the form of
extensions).
• To manage them, you can enable, disable, or remove extensions here.

For Chrome-specific plugins (such as PDF viewer or Flash Player if still supported), you
can also go to chrome://settings/content and scroll to Additional content settings to
adjust settings for these plugins.
REGULAR BACKUPS OF ESSENTIAL DATA

Regular data backups ensure that critical information is securely stored and can be
restored in case of data loss due to cyberattacks or hardware failures. Periodic testing
and secure storage are key to maintaining backup integrity.

What Happens if it is Not Enabled:


• Increased risk of permanent data loss due to cyber incidents or system failures.

• Inability to recover quickly from ransomware attacks, leading to significant


downtime.

• Vulnerability to data corruption or hardware failure with no fallback option.

• Potential loss of business continuity and critical operations during disaster recovery.

You might also like