Cyber Best Practices for Critical Infrastructure

Why is cyber security important in critical infrastructure?

As an employee at a critical infrastructure provider, you likely have numerous duties related to maintaining the confidentiality of sensitive data and keeping vital systems operational. Cyber criminals often have malicious intent and could look to bring systems down just to demand a ransom to bring them back up.
View Options Again

The importance of data security

Is the following statement True or False:
Data security isn't important in critical infrastructure because it's just customer data.

Customer data is a highly sought after commodity on the black market. This can include anything from customer names to emails to other forms of personally identifiable data. A breach of customer data could result in severe regulatory fines and reputational damage to providers of critical infrastructure.
View Options Again

Staying cyber safe

What is an example of a strong password?

Strong passwords are long passwords and ones that a human or computer would not easily guess. It is best to use special characters, upper and lower case plus numbers and letters. Avoid using obvious passwords like sequential numbers or lazy passwords such as "password" or "qwerty". These are common passwords which are easily cracked or guessed.
View Options Again

What is an example of using caution online?

The correct asnwer is to be wary of suspicious emails, this is a text-book example of using caution online. You should always be on the lookout for potential phishing scams designed to masquerade as a company or someone you know. They could have the intent to steal your personal information or infect your device with ransomware.
View Options Again

From a security standpoint, why should you always keep your devices up to date?

Whilst keeping your devices and software up-to-date will give you the added bonus of new features, from a security standpoint, the key reason to update is to ensure you have the latest security patches applied. By staying up-to-date, known vulnerabilities will be fixed and your devices will be safer to use.
View Options Again

Learn how to spot the phish

Begin the Guided Tour Look out for urgency in email subjects, fraudulent sender addresses or requests to perform an action.

What are some indicators that an email is malicious?

Cyber criminals will often use spoofed sender addresses and urgency to try and bypass critical thinking and make an email seem trustworthy. They will then also commonly request personal information or request you to perform an adverse action.
View Options Again

Goals of cyber security

Why is Multi-Factor Authentication important?

What is an example of Multi-Factor Authentication?

One-time passwords can be generated and sent to the user's cellular device via SMS. The correct user must be in possession of the device that receives/ generates the one-time password to access the system.
View Options Again

Wrapping up