INTERNAL STAFF SEMINAR ON CYBERSECURITY

ST. AUGUSTINE COLLEGE OF EDUCATION, AKOKA – YABA, LAGOS

AFFILIATED TO THE UNIVERSITY OF IBADAN, IBADAN

2, MORONFOLU STREET, AKOKA – YABA, LAGOS

HELD AN

INTERNAL STAFF SEMINAR ON CYBERSECURITY

THURSDAY, 3RD JULY 2025

11AM

THEMED:

CYBERSMART @ ST. AUGUSTINE COLLEGE OF EDUCATION: PROTECTING OUR DIGITAL CAMPUS AND INDIVIDUALS

BY

REV. SR. DR. CELINE ONAFOWOPE, OSF

As we all live in the physical world and the digital world as well, we mostly protect our physical world and slightly forgetting to also protect our digital world. In this digital world that we are there are numerous cyber threats. Cybersecurity is all about keeping our digital/online world safe.

IMPORTANCE OF CYBERSECURITY

  1. Data protection
  2. Privacy
  3. Preventing financial loss

UNDERSTANDING THE ENEMY: BEING AWARE OF THESE THREATS

  1. Phishing and Social Engineering
  2. Malware
  3. Weak passwords and Authentication
  4. Human (insider) threats

TYPES OF MALWARES

  • Virus
  • Worms
  • Trojans
  • Ransomware
  • Spyware
  • Adware

HOW TO DETECT MALWARE

  • Sudden loss of space
  • Unusually slow computer or device speeds
  • A blue screen
  • Repeated system crashes or freezes

PUBLIC WI-FI ACCESS – RISKS

  • Man-in-the-middle attacks
  • Unsecured Networks
  • Fake Wi-Fi hotspots

TYPES OF HUMAN (INSIDER) THREATS

  • Intentional insider threats
  • Un-international insider threats
  • Compromised insider threats
  • Malicious insider threats

PREVENTIVE MEASURES ON CYBERSECURITY

  • Using strong & unique passwords and enable 2-Factor authenticator passwords in all accounts, apps, and devices
  • Use multi-factor authenticator
  • Stay vigilant against email or suspicious links and scams
  • Report any suspected cybersecurity issues to IT administrators immediately
  • Avoid using unknown USB drives
  • Scan all removable media with antivirus software
  • Encrypt sensitive data on portable drives

STEPS TO TAKE WHEN WE ARE ATTACKED

  1. Stay calm and access the situation
  2. Disconnect from the internet to contain the threats
  3. Check where you have been “wounded”
  4. Change your passwords on all accounts
  5. Documentation
  6. Clean up and recover
  7. Communication
  8. Strengthen your defenses
  9. To quickly identify which systems are compromised during a cyber crisis, you need to focus on spotting.

Related posts