Course 1: Introduction
Course 2: What Technology are YOU Using?
Course 3: Level of Experience
Course 4: Current Concerns with Security
Course 5: Browser Use and Safe Email Practices
Course 6: What is: Two-Factor Authentication (2FA)
Course 7: Typical Scams
Course 8: How to Determine if It Is a Scam
Course 9: Phone Security and Protecting Personal Information Online
Conclusion
Identifying different types of devices (smartphones, tablets, laptops, desktops).
You may be using a variety of technologies that are susceptible to cyber threats if not properly secured. Here are some common types:
1. Smartphones and Tablets
- Threats: Malware, phishing apps, and unsecured Wi-Fi connections.
- Vulnerabilities: Downloading apps or programs from untrusted sources, not updating the operating system or apps regularly, and using weak passwords.
2. Laptops and Desktops
- Threats: Viruses, ransomware, phishing emails, and unsafe downloads.
- Vulnerabilities: Outdated operating systems, lack of antivirus software, and unsafe browsing habits.
3. Smart Home Devices
- Threats: Hacking and unauthorized access.
- Vulnerabilities: Default passwords, lack of firmware updates, and unsecured network connections.
4. Smart TVs and Streaming Devices
- Threats: Malware and data theft.
- Vulnerabilities: Downloading apps from untrusted sources and not updating software regularly.
5. Wearables (Smartwatches, Fitness Trackers)
- Threats: Data breaches and privacy issues.
- Vulnerabilities: Weak Bluetooth connections, lack of security updates, and insufficient privacy settings.
6. Internet of Things (IoT) Devices –
- WHAT ARE IoT Devices? -Ring Door Bell, Alexa, Smart Thermostats, just to name a few.
- Threats: Botnets and unauthorized control.
- Vulnerabilities: Poor security protocols, default settings, and lack of regular updates.
7. Email and Social Media Accounts
- Threats: Phishing, identity theft, and scams.
- Vulnerabilities: Weak passwords, lack of two-factor authentication, and sharing too much personal information.
8. Online Banking and Shopping
- Threats: Fraud and phishing.
- Vulnerabilities: Using unsecured websites, weak passwords, and not monitoring accounts regularly.