October was National Cybersecurity Awareness Month. Throughout the month I posted tips every day and this blog is part two of the knowledge shared (Days 11-20).
![broken image](http://custom-images.strikinglycdn.com/res/hrscywv4p/image/upload/c_limit,fl_lossy,h_9000,w_1200,f_auto,q_auto/1204528/490592_271330.png)
Your Human Firewall is both your weakest link and your greatest line of defence when it comes to CyberSecurity, the above infographic highlights the points made in my @TEDx talk on the subject - I hope it helps.
![broken image](http://custom-images.strikinglycdn.com/res/hrscywv4p/image/upload/c_limit,fl_lossy,h_9000,w_1200,f_auto,q_auto/1204528/420555_531802.png)
Using Public Wi-Fi is risky business, if you can you're better to create a hot spot and/or use your 4G/5G connection, failing that make sure you're using an official Public Wi-Fi point and have a VPN installed
![broken image](http://custom-images.strikinglycdn.com/res/hrscywv4p/image/upload/c_limit,fl_lossy,h_9000,w_1200,f_auto,q_auto/1204528/103012_499936.png)
Please NEVER make a payment (at work or at home) based on an instruction that you receive via email - you must ALWAYS verify the payment info with a conversation!
![broken image](http://custom-images.strikinglycdn.com/res/hrscywv4p/image/upload/c_limit,fl_lossy,h_9000,w_1200,f_auto,q_auto/1204528/807048_150792.png)
Your CyberSecurity education needs to be owned and driven by the board (with the involvement of HR, corporate comms and IT): Accountability & responsibility needs to be clear and it can only work from the top-down.
![broken image](http://custom-images.strikinglycdn.com/res/hrscywv4p/image/upload/c_limit,fl_lossy,h_9000,w_1200,f_auto,q_auto/1204528/582661_883428.png)
Please put CyberSecurity on your agenda before it becomes your agenda.
![broken image](http://custom-images.strikinglycdn.com/res/hrscywv4p/image/upload/c_limit,fl_lossy,h_9000,w_1200,f_auto,q_auto/1204528/198677_231546.png)
When browsing the internet don't believe that incognito or privacy mode is truly that. Your online habits are not as private as you probably think they are!
![broken image](http://custom-images.strikinglycdn.com/res/hrscywv4p/image/upload/c_limit,fl_lossy,h_9000,w_1200,f_auto,q_auto/1204528/186298_20121.png)
Your connection to the online world brings with it tremendous benefits, but it would be naïve to think that it doesn't also bring big risks. As a CyberAware champion I'm committed to helping non-InfoSec people understand the risks.
![broken image](http://custom-images.strikinglycdn.com/res/hrscywv4p/image/upload/c_limit,fl_lossy,h_9000,w_1200,f_auto,q_auto/1204528/820174_680880.png)
Do you want to know what happens when you reply to a spam email? Watch this brilliant TED Talk video 2from James Veitch
Would you share your password/login details in exchange for a chocolate bar? 34%-70% of people would! Watch my video CyberChat to find out more
![broken image](http://custom-images.strikinglycdn.com/res/hrscywv4p/image/upload/c_limit,fl_lossy,h_9000,w_1200,f_auto,q_auto/1204528/275479_876006.png)
I'm often asked how to report a cyber crime. In the UK as well as reporting your breach to the ICO (within 72 hours) you should report it to Action Fraud
![broken image](http://custom-images.strikinglycdn.com/res/hrscywv4p/image/upload/c_limit,fl_lossy,h_9000,w_1200,f_auto,q_auto/1204528/398305_273177.png)