Free Excel Skills Assessment

Very short questionnaire to establish your skill level with Microsoft Excel.

Excel Assessment

Free Microsoft Word Skills Assessment

Very short questionnaire to establish your skill level with Microsoft Word.

Word Assessment

Free PowerPoint Skills Assessment

Very short questionnaire to establish your skill level with Microsoft PowerPoint.

PowerPoint Assessment

Cybersecurity threats and how you can help

Better ways to close the IT skills gap Better ways to close the IT skills gap
Previous Article
New Horizons UK and New Horizons Ireland Unveil Rebrand to Nexus Human: A New Era in Professional Training New Horizons UK and New Horizons Ireland Unveil Rebrand to Nexus Human: A New Era in Professional Training
Next Article

Individuals can play a crucial role in cybersecurity at their business by practicing good security habits and adopting a vigilant and proactive approach.

Safeguarding our digital world has become more crucial than ever before. As we navigate the interconnected landscape of technology, the realm of cybersecurity becomes increasingly complex.

Cybercriminals have become experts at social engineering and use increasingly sophisticated techniques to trick you to click malicious links and attachments. Making sure our employees have the knowledge and skills to better defend against these attacks is critical — this includes building awareness and secure behaviors.

How you can help

Individuals can play a crucial role in cybersecurity at their business by practicing good security habits and adopting a vigilant and proactive approach. This can actively contribute to establishing a fortified environment, effectively shielding their business from potential cyberthreats.

People:
Shape your behavior so that it reduces the likelihood and/or impact of security incidents. You can be the greatest security weapon.

Processes:
Consider how your day-to-day processes and behaviors may be impacted by a security threat and potentially result in a breach. Many incidents are caused by data misuse or human error.

Devices:
Remote work has increased the risks as you use more home networks and personal devices and make your own decisions about potential threats. Sitting in your home office, your can no longer casually turn to a neighboring colleague and ask whether an email looks authentic.

Notably, the human element heavily impacts cybersecurity risks. It is vital for our employees to stay vigilant and equipped with the necessary knowledge to defend against the ever-evolving techniques employed by cybercriminals. In light of the increasing prevalence of advanced social engineering strategies, such as luring employees into clicking on harmful links, it becomes crucial to equip oneself with the necessary knowledge and skills to effectively counteract these attacks.

Your Role in Cybersecurity

Cybersecurity is everyone’s job. As an employee, you play a critical role in maintaining a strong cybersecurity posture. Here is what you can do:

Stay Informed:
Keep up to date with the latest cybersecurity trends, threats, and best practices. Be aware of the risks and potential consequences of cyberattacks.

Use Strong and Unique Passwords:
Create complex passwords by not using actual words but a combination of upper case and lower case letters, numbers, and symbols. Avoid reusing the same password across multiple accounts. Consider using a password manager to securely store and manage your passwords.

Be Wary of Phishing:
Be cautious of suspicious emails, ones that might have funny return email addresses, misspellings or typos, links, attachments, and requests for personal information. Verify the source and legitimacy of communications before taking any action.

Keep Software Updated:
Regularly update your operating systems, applications, and antivirus software to ensure you have the latest security patches and protection against known vulnerabilities.

Secure Your Devices:
Protect your work devices with strong passwords or biometric authentication. Enable screen locks, encryption, and remote tracking/wiping capabilities for smartphones and laptops.

Practice Safe Browsing:
Only use secure and reputable websites for online transactions. Avoid visiting suspicious websites that are poorly designed, have misspellings, and a negative reputation. Don’t click on unknown links or download files from untrusted sources. Use secure and reputable websites for online transactions.

Be Mindful of Social Media:
Be cautious about sharing sensitive or personal information. Take a moment and ask yourself if you would be okay with the world knowing what you are about to communicate. Adjust privacy settings to limit access to your personal information.

Report Security Incidents:
If you suspect any cybersecurity incidents, such as phishing attempts, malware infections, or unauthorized access, report them immediately to our IT support team.

Ongoing Training and Support

It is important that organizations are committed to strengthening their cybersecurity awareness and skills. We want to help you stay informed and empowered in this ever-evolving landscape. At New Horizons we are dedicated to helping individuals and organizations enhance their cybersecurity knowledge and skills.

Remember, cybersecurity is a shared responsibility, and each of us plays a vital role in protecting our team and organization. By practicing good cybersecurity habits, we create a safer work environment for everyone.

View all our cybersecurity courses

Highlighted Courses

CertNexus Certified CyberSec First Responder

The course introduces tools, tactics, and procedures to manage cybersecurity risks, defend cybersecurity assets, identify various types of common threats, evaluate the organization's security, collect and analyze cybersecurity intelligence, and remediate and report incidents as they occur. This course provides a comprehensive methodology for individuals responsible for defending the cybersecurity of their organization.

Learning Objectives

In this course, you will identify, assess, respond to, and protect against security threats and operate a system and network security analysis platform. You will:

  • Assess cybersecurity risks to the organization.
  • Analyze the threat landscape.
  • Analyze various reconnaissance threats to computing and network environments.
  • Analyze various attacks on computing and network environments.
  • Analyze various post-attack techniques.
  • Assess the organization's security posture through auditing, vulnerability management, and penetration testing.
  • Collect cybersecurity intelligence from various network-based and host-based sources.
  • Analyze log data to reveal evidence of threats and incidents.
  • Perform active asset and network analysis to detect incidents.
  • Respond to cybersecurity incidents using containment, mitigation, and recovery tactics.
  • Investigate cybersecurity incidents using forensic analysis techniques.

View dates

 
5 day course Normally runs 14:00 to 22:00 Live Online Can be run in person.
Contact us for details.

CertNexus CyberSAFE

Welcome to CyberSAFE: Exam CBS-410. Regardless of your computer experience, this class will help you become more aware of technology-related risks and what you can do to protect yourself and your organization from them. This course will help you to:

  • Understand both security and compliance needs and requirements.
  • Recognize and avoid phishing and other social engineering attempts.
  • Recognize and avoid viruses, ransomware, and other malware.
  • Help ensure data security on computers, mobile devices, networks, the Internet, and in the cloud.

In this course, you will use discussions, case studies, and the experiences of your instructor and fellow students to explore the hazards and pitfalls of technology and learn how to use that technology safely and securely.

WHAT YOU’LL LEARN

In this course, you will identify many of the common risks involved in using conventional computing technology, as well as ways to use it safely, to protect yourself from those risks. You will:

  • Identify security compliance measures.
  • Address social engineering attempts.
  • Secure devices such as desktops, laptops, tablets, smartphones, and more.
  • Use the Internet securely.

View dates

 
Half day course Normally runs 14:00 to 22:00 Live Online Can be run in person.
Contact us for details.

Sources

Watters, A. (2023, January 27). Top 50 cybersecurity statistics, figures and facts. Default. https://connect.comptia.org/blog/cyber-security-stats-facts James, N. (2023, May 2).
160 Cybersecurity Statistics 2023 - The Ultimate List of Stats and Trends. Astra Security Blog. https://www.getastra.com/blog/security-audit/cyber-security-statistics/#:~:
text=Cybersecurity%20statistics%20indicate%20that%20there,cost%20%248%20trillion%20by%202023 3 Gopal, D. McMullen, L. (2023, January 25). Predicts 2023: Cybersecurity
Industry Focuses on the Human Deal. Gartner. https://www.gartner.com/doc/reprints?id=1-2D7XIUC3&ct=230413&st=sb

/ Author: Liam Phelan / Number of views: 241 / Comments: 0 /
Print
Categories:Cybersecurity

Theme picker

Loader

Categories

Subscribe to our Newsletter

cheat sheet resources

Subscribe to our Newsletter for all the latest cheat sheets and resources.

Subscribe


Follow us on Linkedin for the lastest cheat sheets and learning resources