Cloud Automation by mayurrele (1) - PowerPoint PPT Presentation

About This Presentation
Title:

Cloud Automation by mayurrele (1)

Description:

As many organizations and businesses continue to depend on cloud automation for better services and application, Mayur Rule, an expert in information technology strategies, business development, and cybersecurity. Who also has global experience in managing hi-tech products for technology companies explains all we need to know about cloud automation. – PowerPoint PPT presentation

Number of Views:57
Slides: 13
Provided by: mayurrele
Category:

less

Transcript and Presenter's Notes

Title: Cloud Automation by mayurrele (1)


1
Work from home top cybersecurity loopholes
  • - Mayur Rele

2
Coronavirus vs new ways of working
  • Coronavirus has forced many companies and
    organizations to adopt work from home culture.
  • Even though working from home has many
    advantages, it also poses some cybersecurity
    risks.
  • That can cause companies and organizations to
    lose if measures and controls are not taken into
    consideration.

3
Coronavirus vs new ways of working
Therefore it is of paramount importance that
everyone in the organization is familiar with
such risks associated with virtual working from
home.
4
Insecure home networksetups
  • Most home network systems have may not have
    network security features like firewalls, network
    antivirus, strong passwords, and many more.

5
Insecure home networksetups
  • Hackers know it is easy to use the home networks
    system, which has poor security.
  • Working remotely needs one to be strict on
    security measures and control because many
    loopholes can occur due to home open internet.

6
The use of open and unsecured applications
  • WhatsApp, Google Meet, and Teams are open
    platforms that have helped many companies to have
    virtual meetings.

7
The use of open and unsecured applications
  • Having an online meeting presents loopholes to
    many hackers as it is easy to access.
  • Hackers can tap conversations.

8
Use of personal devices
  • It is not advisable to use personal computers to
    work on office work that needs confidentiality.
  • Sensitive information and data need to be secure
    from people who may cause danger to its security.

9
Precautions to take
  • Always try to use secured software .
  • when a computer starts to slow down, it is
    important to check if it is secure.
  • Strange pop-ups ads should not be clicked at all.

10
Any query??
11

12
(No Transcript)
Write a Comment
User Comments (0)
About PowerShow.com