{"id":307337,"date":"2023-10-31T06:00:33","date_gmt":"2023-10-31T13:00:33","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=307337"},"modified":"2023-10-30T13:46:17","modified_gmt":"2023-10-30T20:46:17","slug":"navigating-cybersecurity-in-a-social-first-campaign","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2023\/10\/navigating-cybersecurity-in-a-social-first-campaign\/","title":{"rendered":"Navigating Cybersecurity in a Social-First Campaign"},"content":{"rendered":"<h2>The Cyber Talk Series<\/h2>\n<p>Introducing, \u201cCyber Talks\u201d \u2013 our collection of videos that distill complex cybersecurity topics into simple to understand videos. Inspired by everyday life and <em>the <\/em>talk, because bad cybersecurity hygiene can lead to unwanted situations.<\/p>\n<p>This collection of social-first videos, launched during Cybersecurity Awareness month, follows Polly-Anne Newman (hint: there\u2019s an Easter egg in there if you\u2019re paying attention), who breaks down complex topics for her parents, friends and co-workers. Topics include everything from ransomware, the importance of encrypting important files, and staying up to date with your IT protocols.<\/p>\n<p>These videos are rooted in current cybersecurity best practices and portrayed via the very platforms you interact with daily (i.e., texting and video chat). They will hopefully equip you with the information you need to have the cyber talk with the important people in your lives during Cybersecurity Awareness Month and anytime after.<\/p>\n<p>So, have the Cyber Talk. It\u2019s not as bad as you might think.<\/p>\n<h2><a id=\"post-307337-_qhsdynqhguws\"><\/a>Texting with Mom and Dad<\/h2>\n<p>We\u2019re reversing roles and giving our parents the talk. What could go wrong? Polly-Anne explains to Mom and Dad why they need to update their phones, and how not doing so might leave them exposed.<\/p>\n<div style=\"position: relative; display: block; max-width: 100%;\">\n<div style=\"padding-top: 56.25%;\"><iframe style=\"position: absolute; top: 0px; right: 0px; bottom: 0px; left: 0px; width: 100%; height: 100%;\" src=\"https:\/\/players.brightcove.net\/1050259881001\/default_default\/index.html?videoId=6339869406112\" allowfullscreen=\"allowfullscreen\" allow=\"encrypted-media\"><\/iframe><\/div>\n<\/div>\n<p>&nbsp;<\/p>\n<p>Updating your apps for cloud security is like locking your front door. If you don't update, it's like leaving that door open for any and all criminals. Maybe that analogy will be one that your parents understand.<\/p>\n<h2><a id=\"post-307337-_qhz76e4b4mly\"><\/a>Video Call with Your Co-Worker<\/h2>\n<p>There is no surprise that ransomware is more prevalent than ever. It's 2023, and attacks are <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2023\/09\/combating-ransomware-attacks-insights\/\">becoming more and more sophisticated<\/a> and dangerous. This is all the more reason that Polly-Anne has to have the talk with her co-worker, Dave.<\/p>\n<div style=\"position: relative; display: block; max-width: 100%;\">\n<div style=\"padding-top: 56.25%;\"><iframe style=\"position: absolute; top: 0px; right: 0px; bottom: 0px; left: 0px; width: 100%; height: 100%;\" src=\"https:\/\/players.brightcove.net\/1050259881001\/default_default\/index.html?videoId=6339868761112\" allowfullscreen=\"allowfullscreen\" allow=\"encrypted-media\"><\/iframe><\/div>\n<\/div>\n<p>&nbsp;<\/p>\n<p>Unknowingly, Dave has opened himself up and the company to bad actors by not following his IT team\u2019s protocols. His software isn\u2019t up to date, nor has he taken his mandated security training. And, while <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2023\/10\/ai-and-ml-the-keys-to-better-security-outcomes\/\">AI<\/a> is empowering with real-time detection, the bad guys are using it, too. So, Dave really needs to do his part to stay vigilant.<\/p>\n<h2><a id=\"post-307337-_n0dr2dxxjhp7\"><\/a>WFH Neighbor<\/h2>\n<p>Work from home is still a reality for some of us, especially Polly-Anne\u2019s neighbor, who clearly is making the most of it. However, his computer doesn't seem to understand that he should have <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/prisma-cloud\/zero-trust-cloud-network-security\/\">Zero Trust <\/a>when it comes to public Wi-Fi or unsecured networks, otherwise he\u2019ll open himself up to breaches. What\u2019s a girl to do? Go next door and give him the Cyber Talk, so he can ensure his pitch deck is safe from prying eyes.<\/p>\n<div style=\"position: relative; display: block; max-width: 100%;\">\n<div style=\"padding-top: 56.25%;\"><iframe style=\"position: absolute; top: 0px; right: 0px; bottom: 0px; left: 0px; width: 100%; height: 100%;\" src=\"https:\/\/players.brightcove.net\/1050259881001\/default_default\/index.html?videoId=6339868851112\" allowfullscreen=\"allowfullscreen\" allow=\"encrypted-media\"><\/iframe><\/div>\n<\/div>\n<h2><a id=\"post-307337-_jpgok6umiufx\"><\/a>Helping Your Bestie<\/h2>\n<p>Complaining about your boss is a right and a rite (of passage) between friends, but even when you\u2019re swapping stories with your bestie, it's important to <em>not<\/em> share anything that is private, confidential or unencrypted. Unencrypted files can open your organization up to massive vulnerabilities. You should also keep the work conversations to people at work.<\/p>\n<div style=\"position: relative; display: block; max-width: 100%;\">\n<div style=\"padding-top: 56.25%;\"><iframe style=\"position: absolute; top: 0px; right: 0px; bottom: 0px; left: 0px; width: 100%; height: 100%;\" src=\"https:\/\/players.brightcove.net\/1050259881001\/default_default\/index.html?videoId=6339870205112\" allowfullscreen=\"allowfullscreen\" allow=\"encrypted-media\"><\/iframe><\/div>\n<\/div>\n<h2>Easy Solution<\/h2>\n<p>See, these topics aren\u2019t scary or too complicated. Anyone can have \u201cthe talk\u201d with co-workers, parents, your tweens, your\u2026 everyone. We\u2019ll all be more secure because of it.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The \"Cyber Talks\" series simplifies complex cybersecurity through relatable scenarios. Learn to protect your digital life in this social-first campaign.<\/p>\n","protected":false},"author":723,"featured_media":307453,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[6719,6724],"tags":[9600,120],"coauthors":[9599],"class_list":["post-307337","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-company-culture","category-points-of-view","tag-cyber-talks","tag-cybersecurity"],"jetpack_featured_media_url":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2023\/10\/cq5dam.web_.1280.1280-14.jpeg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/307337","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/723"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=307337"}],"version-history":[{"count":12,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/307337\/revisions"}],"predecessor-version":[{"id":307515,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/307337\/revisions\/307515"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/307453"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=307337"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=307337"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=307337"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=307337"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}