< All End User Security Awareness | 1 Hour Notes

tsirhCdneM | End User Security Awareness | 1 Hour | Module 6

By: Raul Pop | Related Course: End User Security Awareness | 1 Hour | Published: June 14, 2017 | Modified: June 14, 2017
Join Cybrary

NotepadComputer Best Practices

Computer Security Best Practice

-keep your computer safe against attacks ,best practice as lock them,cable locks using and data system protected.

Best Practice are

IdentifyKnow what computer threats look like and what to be suspicious of.Try to determine authenticity but when in doubt assume the worst.



Once we have identified a threat we need to know what to do with it how to handle it and how to prevent it from causing damage


If a threat was able to get to us that probably means it slipped through a security measure.Report the threat so it can be prevented in the future


Types of Threats we face:



Password attacks


Malware distribution

-Email links

-Malicious Files

-Fake Updates



Physical Security

Theft Prevention

Lock Computer









What to do after avoiding a threat


Contact the security team

Make them aware of the situation

Follow up later if necessary to see if actions were taken

Inform your coworkers/manager if it is a threat that could happen again

< All End User Security Awareness | 1 Hour Notes
Join Cybrary

Our Revolution

We believe Cyber Security training should accessible for everyone, everywhere. Everyone deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is the world's largest community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

We recommend always using caution when following any link

Are you sure you want to continue?