Webinar 3 - Cybersecurity: Empowering Every Digital Explorer

Event Title: “Cybersecurity: Empowering Every Digital Explorer”


I. Details of the event/activity

    “Cybersecurity: Empowering Every Digital Explorer” is the title of the event I attended. The topics discussed here are the Overview of Internet Use | Data Breach | Hacking | Phishing Scams | and Malware. It was held on the day of September 20, 2023 at 1:30 PM – 3:30 PM via Zoom meeting and this is three-hour webinar and the DICT Region 4B – MIMAROPA organized this event. The Resource Speaker during the Cybersecurity Awareness Training was Engr. Jan Wilmer S. Gasmeña.

 

II. Reflections the webinar/activity give rise to (learnings)

    I learned here different cybercrimes that we should know so as not to be a victim of these types of cyberattacks. They explain here the example of Identity Theft in which someone wrongfully obtains and uses another person's personal data in some way that involves fraud or deception, typically for economic gain. And the top Cyber ​​Crime here is the Data Breach, this is an incident where information is stolen or taken from a system without the knowledge or authorization of the system's owner.

    This is where some other cybercrimes come in, such as connecting to public Wi-Fi and they can have access to your personal or organizational data of your computer system or network. Phishing scams are one of the things we encounter here. One of the types of phishing attacks here is email phishing. This is any malicious email message meant to trick users into divulging private information. Another phishing attack is Spear phishing this is typically used in targeted attack campaigns to gain access to an individual’s account or impersonate a specific individual. And the 2 common phishing attacks here are the Smishing and Vishing, smishing is an attack carried out over mobile text messaging, also known as SMS phishing or Text Scams, and vishing uses verbal scams to trick people into doing things they believe are in their best interests.

    To conclude as a digital explorer, rushing and the lack of awareness make the perfect setting for a successful cyber-attack or cybercrime. Cybersecurity is not expensive compared to the cost of having a cyber-attack. Internet is no longer a luxury but a necessity.

 

III. Reflections on possibilities on implementing some of the webinar input on a practical level. (Practical application of learnings)

    Cyber threats evolve rapidly; staying updated is imperative. Encourage others to participate in regular cybersecurity training like in this webinar I attended, set aside time for continuous learning and knowledge-sharing within the organization and also sharing information about cyber threats and best practices strengthens the collective defense.

 

IV. Positive feedback (on the event organization)

    Engaging Content: The selection of speakers and the thought-provoking topics made the event intellectually stimulating and kept the audience fully engaged throughout.

 

V. Suggestions for improvements to be made/ consider for future activities

    Stay abreast of technological advancements relevant to event management, registration, engagement, and virtual/hybrid event platforms. Embrace new technologies to enhance the event experience and streamline operations.


VI. Photos/Videos taken








VII. Certificate

Comments

Popular posts from this blog

REFLECTION AS PARTICIPANT 03 - JavaScript for Beginners Complete Course

Reflection Report As Participant 07 - CCS Research Forum 2023

Webinar 5 - Your Data Privacy in a Nutshell: RA 10173