ST. AUGUSTINE COLLEGE OF EDUCATION, AKOKA – YABA, LAGOS
AFFILIATED TO THE UNIVERSITY OF IBADAN, IBADAN
2, MORONFOLU STREET, AKOKA – YABA, LAGOS
HELD AN
INTERNAL STAFF SEMINAR ON CYBERSECURITY
THURSDAY, 3RD JULY 2025
11AM
THEMED:
CYBERSMART @ ST. AUGUSTINE COLLEGE OF EDUCATION: PROTECTING OUR DIGITAL CAMPUS AND INDIVIDUALS
BY
REV. SR. DR. CELINE ONAFOWOPE, OSF
As we all live in the physical world and the digital world as well, we mostly protect our physical world and slightly forgetting to also protect our digital world. In this digital world that we are there are numerous cyber threats. Cybersecurity is all about keeping our digital/online world safe.
IMPORTANCE OF CYBERSECURITY
- Data protection
- Privacy
- Preventing financial loss
UNDERSTANDING THE ENEMY: BEING AWARE OF THESE THREATS
- Phishing and Social Engineering
- Malware
- Weak passwords and Authentication
- Human (insider) threats
TYPES OF MALWARES
- Virus
- Worms
- Trojans
- Ransomware
- Spyware
- Adware
HOW TO DETECT MALWARE
- Sudden loss of space
- Unusually slow computer or device speeds
- A blue screen
- Repeated system crashes or freezes
PUBLIC WI-FI ACCESS – RISKS
- Man-in-the-middle attacks
- Unsecured Networks
- Fake Wi-Fi hotspots
TYPES OF HUMAN (INSIDER) THREATS
- Intentional insider threats
- Un-international insider threats
- Compromised insider threats
- Malicious insider threats
PREVENTIVE MEASURES ON CYBERSECURITY
- Using strong & unique passwords and enable 2-Factor authenticator passwords in all accounts, apps, and devices
- Use multi-factor authenticator
- Stay vigilant against email or suspicious links and scams
- Report any suspected cybersecurity issues to IT administrators immediately
- Avoid using unknown USB drives
- Scan all removable media with antivirus software
- Encrypt sensitive data on portable drives
STEPS TO TAKE WHEN WE ARE ATTACKED
- Stay calm and access the situation
- Disconnect from the internet to contain the threats
- Check where you have been “wounded”
- Change your passwords on all accounts
- Documentation
- Clean up and recover
- Communication
- Strengthen your defenses
- To quickly identify which systems are compromised during a cyber crisis, you need to focus on spotting.