Time
1 hour 14 minutes
Difficulty
Beginner
CEU/CPE
1

Video Transcription

00:01
Hello. Welcome to cyber and data security and user awareness. This. It's Episode three enhanced privacy measures for desktop and mobile devices. Thanks so much for joining me today for this informative session.
00:17
Why take this course? There are two reasons. The first reason is to determine if your password has been compromised.
00:29
The second reason is to learn about and to apply privacy protection measures.
00:38
Today's free assessment question is what security measures can be taken to heighten password security and data privacy.
00:47
Refrain from using the top 25 passwords. Opt out of sake password features.
00:53
Check your password to see if it has been compromised. Remove password from browser. Install Privacy Browser Disabled. The Cortina Personal Assistant feature from Windows 10
01:06
or all of the above.
01:11
The Learning objectives for Episode three are to obtain a list of the top 25 passwords. Learn how to opt out of safe password. Determine if your password has been compromised. Learn how to remove password from browsers.
01:26
Install privacy browser and disabled Cortina Feature from Windows Tan.
01:34
The prerequisites for this module. Our completion of episodes one Part 11 part two to part one and two, part two
01:44
a sincere desire to learn and basic computer skills.
01:52
The supplementary materials that would be helpful when completing this module
01:57
are at Sesto Mobile device or access to a desktop computer or access to a tablet.
02:08
Let's begin our task, shall we?
02:12
The best practice
02:14
is to refrain from using the top 25 common passwords.
02:19
How do we know which alphabetic, numeric and symbol combinations are used? Most often,
02:25
we can check out the Wikipedia or enlarge this list to see if your password is listed here.
02:35
If your parents word was not on the list, that's great news, but we're not out of the woods yet. The next task is to determine if your password has been compromised.
02:46
Log onto the Internet.
02:49
Type this address into the browser. Https colon forward slash forward slash have I been P w n e d dot com. Forward slash
03:01
Enter your email address,
03:04
and if it indicates that your password has been compromised, please change your password.
03:13
The Nets task is to opt out of saved password. Log onto Google chrome. Click the three buttons located at the top, right hand corner of the screen
03:24
scroll to settings.
03:27
Move the button opt to save passwords from right to left.
03:35
The next task is to remove passwords from your browser.
03:39
Log onto Google chrome.
03:42
Click the three buttons located at the top right hand corner,
03:47
Go to settings,
03:49
then click passwords.
03:52
Scan for saved passwords and elite. If there are none, go to the Google account Password manager
04:00
scan for save passwords again and delete.
04:09
Now it is time to install privacy browser
04:13
Log onto the Internet.
04:15
Go to Google Search Privacy Browser
04:18
install.
04:25
The next task is to disable the personal assistant Cortina
04:30
The feature on Windows 10.
04:33
Launch Cortina from your Windows taskbar, which is located next to the start button.
04:40
Open Cortina setting panel.
04:42
In the setting screen, slide the toggle button to off
04:51
our post assessment. Question. What security measures can be taken? Toa Heightened password Security and data privacy.
05:00
Refrain from using the top 25 passwords.
05:03
Opt out of saved password features.
05:08
Check your password to see if it has been compromised.
05:12
Remove password from browser
05:15
install privacy browser.
05:17
Disabled Cortina Feature from Windows 10
05:20
or all of the above.
05:27
In today's brief lecture, we learned how to obtain a list of the top 25 passwords over an eight year period.
05:35
Learn howto up out of saved password.
05:40
Determine if your password has been compromised.
05:44
Learn how to remove password from browser.
05:46
Install privacy browser
05:49
Disabled Cortina Feature From Windows Tan
05:56
In this next video, we will learn about the various types of social engineering and how it impacts individuals and small businesses and what can be done to avoid victimization.
06:09
Become acquainted with real life case studies.

Up Next

End User Awareness

This end user cyber security training is a introduction series. It's designed to teach the principles and practices that mobile, desktop and gaming device users need to keep themselves safe, both at work and at home.

Instructed By

Instructor Profile Image
Tonya Mead
Instructor