Cybersecurity: Why it Matters

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Time
2 hours 13 minutes
Difficulty
Beginner
CEU/CPE
2
Video Transcription
00:00
Welcome to Palo alto Networks cybersecurity Academy presentation of cybersecurity and Why it Matters.
00:07
Cybersecurity refers to a set of techniques used to protect the integrity of networks, programs and data from attack damage or unauthorized access.
00:17
In today's connected world, you need to understand the significant number of security risks that we are all exposed to in our normal day to day activities, we all need to do all we can to reduce that risk exposure.
00:31
Most Attackers are out to steal your personal information. Once your personal data has been acquired, Attackers can then use that information to gain access to your finances and your work. And personal networks. A successful hacker can eventually obtain your passwords, log on credentials and more
00:48
and often sell that personal information to an entire network of cybercriminals.
00:55
It's important to identify the different ways your devices and and points are vulnerable. When you are participating on a particular network,
01:03
you'll need to make good choices to limit your vulnerabilities.
01:06
You may wish to have an active online presence in social media and you may have an app that alerts you when you receive messages.
01:12
Yet when you're performing a secured transactions such as online banking, you should consider turning off your social media applications and reducing your visibility.
01:22
And one big question remains who or what is the adversary?
01:26
Most of the time, the adversary is a pragmatic hacker.
01:30
They have simple goals and will be often attacking with simple tools.
01:36
An adversary will likely be obscured.
01:38
There could be even someone who is hiding in plain sight,
01:44
they'll continue to exfiltrate or gather information about you piece by piece and you'll never even know they were there.
01:52
We can never say for certain that the network app is completely hardened or protected. Vulnerabilities and exploits often show up as zero day attacks, meaning the vulnerabilities only first come to light when they are actually exploited.
02:05
Often when you agree to the terms specified by an application privacy statement, you are unknowingly granting the app rights to all your personal data as well as your phone and messaging records, your browser activity and more.
02:17
You may be installing permission also for a sidekick app, including Adware, Spyware and others.
02:24
The number of users and systems that have been exploited just by participating in mainstream network activity is shocking at any time. There are millions of users who are exposed and vulnerable. So how can you limit your risk when you choose to participate in these vulnerable networks?
02:42
Well, again, you'll need to thoroughly understand the devices you're using and how that can be exploited.
02:47
You'll need to look at some of the best practices associated with wireless activity and bluetooth.
02:53
You may consider turning these surfaces off as you enter into public spaces.
03:00
Limiting vulnerability also comes down to understanding the choices we make. Many of today's hackers are well trained and capable of performing very sophisticated attacks using automated systems that never sleep.
03:13
They'll entice you to engage, wait for you to click on a link or open an exploited email attachment and establish a back door.
03:21
And in many cases to avoid detection, there will be decoy documents that actually looked to be legitimate.
03:28
So with all this risk going on, how can you win the battle?
03:31
You'll have to think carefully before you act. Don't be the low hanging fruit
03:37
participating. Good cyber hygiene means separating your network activities, cleaning up your caches and trash changing passwords frequently and in general, just being aware and careful with your activities,
03:51
make sure you know, your devices and networks and how they're vulnerable.
03:53
And also take a step back look at the big picture and assess who might actually profit from exploiting your systems and your accounts,
04:01
assume you're the attacker and think how might you compromise your own devices and networks?
04:09
So there's an exciting part to this story
04:12
as risks are significant and ever increasing. There are also millions of unfulfilled jobs in the cybersecurity field.
04:19
The shortage of qualified cybersecurity professionals is increasing and the pay is handsome. This is an opportune time to advance your career in cybersecurity
04:30
at the Palo Alto Networks cybersecurity Academy. We are equipping students with leading edge cybersecurity knowledge and skills that they need to protect their digital way of life and to prepare for the many unfilled jobs in cybersecurity. Please visit our Palo Alto Networks Academy site to learn how we can provide the education that will open up these career opportunities for you within the cybersecurity workforce.
Up Next