Basic Cybersecurity for End Users

Cyber Security Essentials for Everyone - Protecting Our Business Together

Slide 1: Title Slide

Title: Cyber Security Essentials for Everyone
Subtitle: Protecting Our Business Together
Presented by: Maarten Schaap, CyberSecurity inferstruture Consultant

Slide 2: Why Cybersecurity Matters

  • Cyber attacks are increasing

  • End users are the first line of defence

  • A breach can cost time, money, and trust


Slide 3: Our Environment

  • Remote Staff: 22 computers on home networks behind basic firewalls

  • Office Staff: 10 computers secured by Fortinet

  • Reality: Threats exist both at home and at work


Slide 4: Common Cyber Threats

  • Phishing emails

  • Malware and ransomware

  • Weak or reused passwords

  • Unpatched software


Slide 5: Remote Work Risks

  • Public Wi-Fi use

  • Personal devices

  • Unsecured home routers

  • Lack of endpoint protection


Slide 6: Office Risks (Even with Fortinet)

  • Human error (e.g. clicking bad links)

  • Internal threats

  • USB drives and unauthorized devices


Slide 7: Passwords and Authentication

  • Use strong, unique passwords

  • Enable multi-factor authentication (MFA)

  • Use password managers


Slide 8: Phishing Awareness

  • Think before clicking

  • Check email addresses carefully

  • Report suspicious emails


Slide 9: Device Hygiene

  • Lock your screen when away

  • Don’t install unauthorized software

  • Keep antivirus and software up to date


Slide 10: Safe Remote Work Habits

  • Use company VPN if available

  • Avoid public Wi-Fi or use a mobile hotspot

  • Keep work and personal activities separate


Slide 11: Your Role in Security

  • Stay alert

  • Ask when unsure

  • Report anything suspicious immediately


Slide 12: What We’re Doing (Company Measures)

  • Fortinet firewall protections in office

  • Endpoint protection software

  • Regular updates and patches

  • Security awareness training (this session!)


Slide 13: What to Do If You Suspect a Breach

  • Unplug from the internet (if necessary)

  • Contact IT support immediately

  • Do not try to fix it yourself


Slide 14: Quick Tips Recap

  • Think before you click

  • Lock your device

  • Use strong passwords

  • Stay updated

  • Report issues


Slide 15: Questions & Answers

  • Invite questions

  • Share a contact email or helpdesk link

As of 2025, the most common cybersecurity attacks targeting businesses

As of 2025, the most common cybersecurity attacks targeting businesses—especially those with remote work setups or basic protections—are:

1. Phishing (Still #1)

  • What it is: Fake emails or messages tricking users into clicking malicious links or giving away credentials.

  • Why it’s common: It’s cheap, scalable, and still highly effective—especially against distracted or untrained users.

  • Variants: Business Email Compromise (BEC), SMS phishing (smishing), and voice phishing (vishing).

  • Active action:

    Phishing

    • Fake emails or messages that trick you into clicking a link, downloading a file, or entering your password

    • Often looks like it’s from a trusted source (e.g. your boss, bank, or IT)

    • Requires you to take action—click, reply, download, or enter credentials

    • Common forms:

      • Email phishing (with fake login pages)

      • Smishing (phishing via SMS)

      • Vishing (phone-based scams)

    • Red Flags: Urgency, poor grammar, unusual sender, strange links

    • Your defense: Slow down, verify, and never click unless you’re sure

2. Ransomware

  • What it is: Malware that encrypts files and demands payment for decryption.

  • Common delivery methods: Phishing emails, remote desktop protocol (RDP) attacks, malicious downloads.

  • Targets: Small to medium businesses are increasingly targeted because they often lack proper backups or endpoint defenses.

  • – Fake emails/messages trick users into clicking links or entering info
  • – Looks like trusted sources (boss, IT, bank)
  •  
  • **Your Active Role:**
  • – Think before clicking
  • – Verify sender addresses
  • – Report anything suspicious

3. Credential Stuffing / Password Attacks

  • What it is: Using stolen username/password combinations from past breaches to access accounts.

  • Why it works: Many people reuse passwords across services.

  • Fix: Use unique passwords + enable MFA.

  • Active action: 
  • – Uses stolen passwords from other breaches
  • – Works when users reuse passwords
  •  
  • **Your Active Role:**
  • – Use unique passwords
  • – Enable MFA
  • – Use a password manager

4. Malware (Trojan Horses, Spyware, Keyloggers)

  • What it is: Malicious software that installs itself via downloads, USBs, or email attachments.

  • Purpose: Data theft, spying, remote control of devices.

  • Defense: Endpoint protection and strict software control.

  • Active action:
  • – Malicious software installs from links, attachments, USBs
  • – Can spy, steal data, or damage files
  •  
  • **Your Active Role:**
  • – Don’t install unknown software
  • – Avoid suspicious downloads
  • – Keep antivirus updated

5. Man-in-the-Middle (MitM) Attacks

  • What it is: Attackers intercept communication between two parties—common over public Wi-Fi.

  • Impact: Stolen credentials, data, or injection of malicious content.

  • Mitigation: VPN usage, encrypted connections (HTTPS), and not using public Wi-Fi for work.

  • Active action:
  • – Attacker intercepts communications on unsecured networks
  • – Common on public Wi-Fi
  •  
  • **You
  • Active Role:
  • – Don’t use public Wi-Fi for work
  • – Use a VPN or zero trust connections like tail scale or twingate if required
  • – Always check for HTTPS in websites

6. Supply Chain Attacks

  • What it is: Targeting software vendors or service providers to compromise many customers at once.

  • Recent example: The SolarWinds and MOVEit attacks.

  • Challenge: Hard to detect—requires vendor vetting and monitoring.

  • Active actions:
  • – Attackers compromise trusted vendors or software
  • – Hard to detect directly as a user
  •  
  • **Your Active Role:**
  • – Only install software approved by IT
  • – Report anything strange after updates
  • – Stay informed of alerts

7. Social Engineering

  • What it is: Manipulating people into giving up confidential info—via calls, in-person, or online.

  • Example: An attacker calls pretending to be from IT and asks for your password.

  • Defense: Awareness and verification procedures.

  • Active actions:
  • Manipulates people into revealing info
  • – Often poses as IT, management, or other trusted people
  •  
  • **Your Active Role:**
  • – Always verify requests for credentials
  • – Be skeptical of urgency or threats
  • – Report suspicious interactions

8. Exploiting Unpatched Software

  • What it is: Hackers use known vulnerabilities in outdated software to gain access.

  • Common targets: Browsers, plugins (e.g., Java, Flash), old OS versions.

  • Fix: Regular updates and patch management.

  • Active actions:
  • – Exploits known vulnerabilities in outdated apps or systems
  • – Often automated and widespread
  •  
  • **Your Active Role:**
  • – Don’t delay updates
  • – Reboot your device after updates
  • – Notify IT if something fails to update