Audit Marketing Axe Finance

1 of
Published on Video
Go to video
Download PDF version
Download PDF version
Embed video
Share video
Ask about this video

Page 1 (0s)

[Virtual Presenter] Hello, welcome to the Infrastructure and Cloud Department presentation..

Page 2 (0s)

[Audio] Today, you will learn everything you need to know about security at axe finance as a new joiner. The Infrastructure team remains at your disposal to answer your questions and to respond to your requests..

Page 3 (1s)

[Audio] The Agenda will Cover : - How to choose Good passwords - How to safely browse websites - Emails best practices and how to avoid phishing - How to protect your mobile devices. - How to maintain physical security. social engineering and finally we will wrap up with security tips.

Page 4 (2s)

[Audio] Let's start with How to choose Good passwords.

Page 5 (3s)

[Audio] How to choose a strong password: Make it at least 8 characters long. Use a mix of letters, numbers, and symbols. Change it every 90 days. Keep it secret. Avoid common or easy-to-guess passwords..

Page 6 (4s)

[Audio] let's talk about strategies for creating strong passwords: First, avoid common passwords that are easy to guess. Instead of using single words, try using combinations of words. Consider incorporating acronyms or non-English language words for added complexity. Use full sentence phrases Finally, substitute letters with numbers or symbols to further strengthen your password. By following these strategies, you can create passwords that are both strong and secure.".

Page 7 (5s)

[Audio] Now that we've covered strategies for creating strong passwords, let's move on to safe web browsing practices to ensure your online security..

Page 8 (6s)

[Audio] let's discuss safe web browsing practices: Before logging into or entering sensitive information into a website, always look for the security padlock symbol in the URL bar. This indicates that the connection is secure. You can double-click this icon to view the certificate information for added assurance. Additionally, check for 'https' in the URL, which confirms that the website encrypts data sent between your browser and the site. Always pay attention to the web address. If it suddenly changes or looks suspicious, it could be a fraudulent site attempting to steal your information..

Page 9 (7s)

[Audio] Now, how do you safely close scareware popups? Firstly, resist the urge to click on any buttons within these popups, as they may be designed to trick you into downloading malicious software. Instead, use the keyboard shortcut Alt + F4 to safely close the window without interacting with its contents..

Page 10 (8s)

[Audio] Now let's shift our focus to email security best practices to ensure your communications remain safe and private.

Page 11 (9s)

[Audio] Firstly, avoid using your personal email account for work purposes to minimize the risk of exposing personal information. Secondly, never open attachments in emails from unfamiliar sources. Thirdly, avoid clicking on suspicious links embedded in emails. Lastly, ensure you use secure email encryption when sending sensitive information..

Page 12 (10s)

[Audio] How to spot a phishing e-mail?: First of all A legitimate email from PayPal would come from a paypal.com address, not a free email service like PayPal will always address you by name not your e-mail address as mentioned on the picture Phishing scams create a sense of urgency to pressure you into acting without thinking Be careful and don't click on Remove limitation and call directly the infrastructure team.

Page 13 (11s)

[Audio] let's turn our attention to securing your mobile devices.

Page 14 (12s)

[Audio] Firstly Use a strong password or PIN, with at least 6 digits. Encrypt your device and enable remote wipe for security. Check app reviews before downloading. Only download apps from trusted sources. Lastly Avoid using public Wi-Fi for sensitive activities.

Page 15 (13s)

[Audio] And finaly Physical security !. 5- Physical Security.

Page 16 (14s)

[Audio] Firstly Question strangers and report suspicious individuals to security or management. Ensure authorized visitors and contractors have checked in properly. Require individuals to use their own card keys to enter areas. Always lock your computer screen when leaving it unattended. Secure sensitive paper documents and comply with end-of-day closing procedures. Lately Use secure shred bins for disposing of sensitive documents and electronic media. ..

Page 17 (15s)

eps10 red vector danger notice or risk icon isolated on white ....

Page 18 (16s)

[Audio] Let's discuss important security tips: Follow a clean desk policy to secure sensitive information.Be mindful when creating or disposing of paper documents.Think twice about sharing personal information online.Prevent unauthorized access to your workplace.Stay vigilant against phishing scams.Protect your devices from malware.Be cautious even with familiar contacts.

Page 19 (17s)

[Audio] Thanks for joining us today! Always remember Security is everyone's responsibility! If you have any questions, feel free to ask. Have a great day!.