header-logo.png

0

Overview

Solving Cyber Menace through Awareness. –

Covid-19 has necessitated that many businesses conduct investor meetings over Zoom, run marketing campaigns online and accept digital contactless payments. The time is now to move fundraising online as well. As lockdowns became the new normal, businesses and consumers increasingly “went digital”, providing and purchasing more goods and services online, raising e-commerce’s share of global retail trade from 14% in 2019 to about 17% in 2020. The Indian e-commerce market has been one of the biggest beneficiaries of the pandemic, as containment measures introduced millions to the convenience of online shopping, and prompted seasoned online shoppers to buy more.

Social distancing compulsions through the year, massive smartphone base and reliable broadband galvanised e-commerce uptake beyond metros, deep into smaller cities and towns, bringing an element of ‘trust in online commerce.

Smart phones, kindle, Laptops, Tabs became so famous and very important tools of business, education, transactions. The Internet is an inevitable part of our life. The new normal of working and learning from home also fuelled demand for consumer electronic products.

E-Commerce security is the guidelines that ensure safe transactions through the internet. It consists of protocols that safeguard people who engage in online selling and buying of goods and services. You need to gain your customers’ trust by putting in place eCommerce security basics. Such basics include:

<!--[if !supportLists]-->       <!--[endif]-->Privacy

<!--[if !supportLists]-->       <!--[endif]-->Integrity

<!--[if !supportLists]-->       <!--[endif]-->Authentication

<!--[if !supportLists]-->       <!--[endif]-->Non-repudiation

During the first two phases of the lockdown, e-commerce companies were allowed to sell only essential items like grocery, healthcare and pharmaceutical products. In the following phases (starting May 4), the restrictions were gradually lifted.

 

But these digital platforms undertook a series of measures, including hiring thousands of delivery staff to meet the surge in orders.

 The outbreak necessitated the use of new technology tools and non-contact formats to cater to unprecedented demand. Analysts said these shifts in consumer shopping traits are here to stay, post-pandemic.

 

Most of us rely heavily on the internet to enjoy social media, online education, remote work, and all sorts of entertainment. But widespread use doesn’t equal widespread understanding.

Online meetings & Collaborations, Online networking will lead to jobs but BUT THERE IS AN UNPLEASANT SIDE TO THIS AS WELL. E Commerce security is essential if you are to make it in this industry. Are you aware that cyber-criminals target mostly eCommerce businesses?  These cyber attackers can destroy our digital life as well as physical life by doing cybercrimes.

Ecommerce sites will always be a hot target for cyberattacks. For would-be thieves, they are treasure troves of personal and financial data. And for businesses of all sizes, the cost of a breach both in loss of data and in customer trust can be hugely damaging for businesses of all sizes.  Ecommerce business owners are all too aware of these issues and are increasing their security measures. News only shows us the tip of the iceberg, cybercrimes are a much bigger problem than most people imagine.

Cybercrime has the potential to ruin even industries and sectors which seem to have maximum security. Several people and brands get their reputation damaged due to cyber mischief or online controversies.

HOW TO AVOID CYBER PROBLEMS AT YOUR WORKPLACE?

This course will help your business  to keep safe from financial, Legal and Reputational Damages. It will help us Keeping our  company safe from cyber crimes.  Turning employees into smart netizens.

Through cybersecurity awareness training, users are brought up to speed on an organization's IT security procedures, policies and best practices. These education modules not only help to ensure staff is aware of these principles but that they also follow and understand them.

 

Though the reference of Covid 19 is given in this introduction , the cyber safety and security was of extreme importance before pandemic and will remain after pandemic as well.

 

Takeaways of the training :

 

We must understand the following to become responsible cyber professionals

<!--[if !supportLists]-->      <!--[endif]-->Different types of cyber crimes

<!--[if !supportLists]-->      <!--[endif]-->Cyber hygiene

<!--[if !supportLists]-->      <!--[endif]-->Cyber security posture

<!--[if !supportLists]-->      <!--[endif]-->Rules and regulations of cyber world

 

The training will focus on Some important Cyber security tips as follows:

 

<!--[if !supportLists]-->      <!--[endif]-->While using a business whatsApp account  keep 2 different nos.

keep seperate no. for whatsApp business account

<!--[if !supportLists]-->      <!--[endif]-->social media : 2 step authentication should be enabled

<!--[if !supportLists]-->      <!--[endif]-->observe the authenticity of websites which you are browsing

<!--[if !supportLists]-->      <!--[endif]-->get aware of the cyber safety norms and possible cyber crimes  

<!--[if !supportLists]-->      <!--[endif]-->games and online shopping : check safety and settings

 

<!--[if !supportLists]-->      <!--[endif]-->Be Aware while using free wifi : confidential information should not be shared on free wifi, no corporate meeting should be done , financial transactions should be avoided

 

<!--[if !supportLists]-->      <!--[endif]-->Responsibility of whatsApp admin : disclaimer should be displayed

 

<!--[if !supportLists]-->      <!--[endif]-->online shopping : use reputed websites , authenticity and legacy of website should be checked

 

Types of cyber crimes : The training further explains about the following type of cyber crimes and the legal security acts of  IT act  2000 and  Indian evidence act

 

<!--[if !supportLists]-->      <!--[endif]--> Person

<!--[if !supportLists]-->      <!--[endif]--> property

<!--[if !supportLists]-->      <!--[endif]-->country

 

The training tries to emphasize on understanding the difference between the real world and the cyber world.

 

 

property : cyber vandalism violation of intellectual property comes under cyber crimes (Intellectual property rights , trademark infringement )

 

 

 

country : cyber terrorism , highest punishment for this crime is hang till death

*****************************

 

Different cyber crimes :The training explains these crimes with real examples and videos.

<!--[if !supportLists]-->      <!--[endif]-->Cyber vandalism  : damage to public / private property is done in real world

outside party takes the control of your digital property and will damage your property

Which can completely ruin your online reputation

<!--[if !supportLists]-->      <!--[endif]-->DOS attack : criminals will block the traffic to your website

<!--[if !supportLists]-->      <!--[endif]-->Distributed denial of service attack , It will ruin your business reputation e.g wikipedia website is prone to it

<!--[if !supportLists]-->      <!--[endif]-->man in the middle attack case  : hacker attacks the information of both parties (be careful with international clients )

<!--[if !supportLists]-->      <!--[endif]-->Ransomware attack : malicious attack with the help of software which attacks your devices on the click of a link and you will be able to access your device after you pay certain amount

<!--[if !supportLists]-->      <!--[endif]-->phishing attack : fake emails

<!--[if !supportLists]-->      <!--[endif]-->Malware attacks

<!--[if !supportLists]-->      <!--[endif]-->Identity theft / ATM frauds

<!--[if !supportLists]-->      <!--[endif]-->reselling of phone :

<!--[if !supportLists]-->      <!--[endif]-->Other cyber crimes : Paytm frauds , Nigerian frauds , FB frauds :dead person's account

 

Cyber Threats while using social media :

<!--[if !supportLists]-->      <!--[endif]-->Cyber grooming

<!--[if !supportLists]-->      <!--[endif]-->Phishing

<!--[if !supportLists]-->      <!--[endif]-->Cyber bullying

<!--[if !supportLists]-->      <!--[endif]-->Cyber pornography

<!--[if !supportLists]-->      <!--[endif]-->FB frauds-identity theft

 

 

Following are the reasons for threats to IT security : We must understand these reasons and have IT security norms in place for our organization

<!--[if !supportLists]-->      <!--[endif]-->Natural disaster

<!--[if !supportLists]-->      <!--[endif]-->Human threats

<!--[if !supportLists]-->      <!--[endif]-->Inter human threats : dissatisfied employees , careless employees

<!--[if !supportLists]-->      <!--[endif]-->External Threats : preparators , competitors,hackers

 

Cyber Hygiene : As professionals we must ensure that we follow the specific cyber hygiene norms.The training has a content for following points.

 

<!--[if !supportLists]-->      <!--[endif]-->Security defences 

<!--[if !supportLists]-->      <!--[endif]-->Secure online financial services / transactions

<!--[if !supportLists]-->      <!--[endif]-->System control audit

<!--[if !supportLists]-->      <!--[endif]-->Administrative control

<!--[if !supportLists]-->      <!--[endif]-->Information system control : input,processing,output,storage

<!--[if !supportLists]-->      <!--[endif]-->Procedures : documentation, authorization requirement

<!--[if !supportLists]-->      <!--[endif]-->Physical facility control

<!--[if !supportLists]-->      <!--[endif]-->Audits 

 

 

 

To have cyber hygiene in place it's important to have strong HR policies even for small businesses.The training focuses on these HR policies.

**********************************************************

HR policies

<!--[if !supportLists]-->      <!--[endif]-->Personnel security

<!--[if !supportLists]-->      <!--[endif]-->verification check of the employees

<!--[if !supportLists]-->      <!--[endif]-->verification check of temporary staff

<!--[if !supportLists]-->      <!--[endif]-->system of dismissed or resigned employees ISO 27000

<!--[if !supportLists]-->      <!--[endif]-->Training related to security policies and procedures for all the employees once in a year

 

IT policies of the organization should include  :

<!--[if !supportLists]-->      <!--[endif]-->Security awareness for employees , customers and suppliers

<!--[if !supportLists]-->      <!--[endif]-->security policies and procedures : reasonable security practices IT

<!--[if !supportLists]-->      <!--[endif]-->Technical defences

<!--[if !supportLists]-->      <!--[endif]-->Access , authorisation and authentication

<!--[if !supportLists]-->      <!--[endif]-->Antivirus and anti phishing softwares

<!--[if !supportLists]-->      <!--[endif]-->Content filtering

<!--[if !supportLists]-->      <!--[endif]-->Firewalls and network defences compliance

<!--[if !supportLists]-->      <!--[endif]-->Incident response team should be in place

<!--[if !supportLists]-->      <!--[endif]-->Internal audits

<!--[if !supportLists]-->      <!--[endif]-->Audit of ISO 27001 :IT security audits and quality audits by government  approved agencies 

 

 

 

Overall cyber hygiene

 

<!--[if !supportLists]-->      <!--[endif]-->Install antivirus and malware

<!--[if !supportLists]-->      <!--[endif]-->use network firewalls

<!--[if !supportLists]-->      <!--[endif]-->update software regularly

<!--[if !supportLists]-->      <!--[endif]-->set strong passwords

<!--[if !supportLists]-->      <!--[endif]-->use multi step authentication

<!--[if !supportLists]-->      <!--[endif]-->back up regularly

<!--[if !supportLists]-->      <!--[endif]-->keep your hard drive clean

<!--[if !supportLists]-->      <!--[endif]-->secure your router

<!--[if !supportLists]-->      <!--[endif]-->incident response team

<!--[if !supportLists]-->      <!--[endif]-->educate everyone

 

Cyber security posture : IT security policies for an organization should be in place. The aspect of Cyber insurance is further explained by Dr Deepti in this section of the course.

 

These are the highlights of the training “Cyber Security For Professionals”.As a professional we must strive to educate ourselves, our family , our office team,our employees , our subordinates and seniors for the IT security measures which ultimately help India to conquer cyber crimes.

 

 

 

 

 

 

 

 

 

 

  • 1. Keeping your company safe from cyber crimes. 2. Turning employees into smart netizens.

  • Should be aware about How to access internet

About the instructor


                                 Deepti Lele
  • 0
  • 1 Students
  • 7 Courses

Deepti Lele

Student feedback

  • Stars 5
  • 0 %
  • Stars 4
  • 0 %
  • Stars 3
  • 0 %
  • Stars 2
  • 0 %
  • Stars 1
  • 0 %

0

Course Rating

Reviews

    Course Features

  • Lectures 1
  • Duration 01 Hours
  • Skill level All level
  • Language English