2020 was an exceptional year for everyone, and like everyone, the hackers, scammers, and other technology criminals took advantage of new opportunities brought by COVID. Criminals reportedly used innovative approaches to exploit weaknesses created by the pandemic. You will learn tips and techniques from these events to help protect you, your company, and your data. Attend this session and learn more about how high-profile control failures occurred so you can be more effective at preventing crimes such as theft, malware, ransomware, phishing, and hacking.
Upon completing this session, you should be able to: · List at least three major security incidents reported in the headlines in the last year and explain at least one primary control design or operation flaws that allowed the hack to occur · Select the correct definitions from a list of standard security terms such as attack surface, vulnerability, exploit, social engineering, phishing, malware, heuristics, biometrics, and multi-factor authentication (MFA) · Explain why home-grade computer hardware and applications are sometimes less secure than business and enterprise-grade hardware and applications · List at least three best practices learned because of reviewing the incidents cited in the case studies
Common security weaknesses that occur with hardware and software at home and in the office. Malware, ransomware, data breach, and incident response tips. Internal control failures resulting in the theft of assets or unauthorized manipulation of data. User authentication and security awareness training
Fundamental knowledge of computer operations and cybersecurity risks