Presentation is loading. Please wait.

Presentation is loading. Please wait.

Data Security at Albemarle County: Keeping You and Your Computer Safe.

Similar presentations


Presentation on theme: "Data Security at Albemarle County: Keeping You and Your Computer Safe."— Presentation transcript:

1 Data Security at Albemarle County: Keeping You and Your Computer Safe

2 Levels of Cyber Security My Online Security Maintaining a high level of cyber security requires you to focus on the four different areas shown in this diagram. The slides that follow explore these topics in greater detail. For any additional information, or if you have follow-up questions, please contact the Albemarle County Government Help Desk, x 5895 or

3 Lack of Physical Security Undercuts All Other Security Measures Dont lose track of your laptop. Dont lose track of your laptop. Dont walk away from your machine without locking it (Hold down the Windows and L keys to lock). Dont walk away from your machine without locking it (Hold down the Windows and L keys to lock). Create strong passwords. Create strong passwords. The Windows key is located between the Ctrl and Alt keys in the lower-right corner of a standard keyboard.

4 Computer Theft Prevention Never leave your laptop unattended in plain sight Never leave your laptop unattended in plain sight Don't leave a laptop in an unlocked vehicle, even if the vehicle is in your driveway or garage. If you must leave your laptop in a vehicle, cover it up or put it in a locked trunk. Don't leave a laptop in an unlocked vehicle, even if the vehicle is in your driveway or garage. If you must leave your laptop in a vehicle, cover it up or put it in a locked trunk. Carry your laptop in a nondescript carrying case, briefcase, or bag. Carry your laptop in a nondescript carrying case, briefcase, or bag. Going to lunch, or taking a break? Don't leave a meeting or conference room without your laptop. Take it with you, or you run the risk that it won't be there when you return. Going to lunch, or taking a break? Don't leave a meeting or conference room without your laptop. Take it with you, or you run the risk that it won't be there when you return. Lock the laptop in your office during off-hours. Lock the laptop in your office during off-hours.

5 Data Theft Prevention Dont work on sensitive data in a public place – you never know who is watching Dont work on sensitive data in a public place – you never know who is watching Use passwords and encryption whenever working on important data Use passwords and encryption whenever working on important data Back up your information on disks and store them at home or the office. Back up your information on disks and store them at home or the office.

6 Protecting Mini Storage Devices Mini Storage devices include CDs, IPods, or any type of flash drive (thumb drives, memory sticks, USB drives, or pen drives). Mini Storage devices include CDs, IPods, or any type of flash drive (thumb drives, memory sticks, USB drives, or pen drives). We recommend strongly against storing ANY county data on these types of devices; we have the network capability and tools available to anyone who needs to transport presentations or documents to other PCs. We recommend strongly against storing ANY county data on these types of devices; we have the network capability and tools available to anyone who needs to transport presentations or documents to other PCs. Attach important items like flash drives to your key chain so you dont lose them. Attach important items like flash drives to your key chain so you dont lose them. Never leave a storage device in plain sight when you leave your office, car, or workplace. Never leave a storage device in plain sight when you leave your office, car, or workplace. If you are using one of these devices always back up the information to another source. If you are using one of these devices always back up the information to another source.

7 Locking Your Computer If you are leaving you computer for 90 minutes or less you should always lock it. If you are leaving you computer for 90 minutes or less you should always lock it. Why? To ensure that no one else uses your computer while you are away. Why? To ensure that no one else uses your computer while you are away. Use one of these methods: Use one of these methods: Press the Windows and L keysPress the Windows and L keys Press the Ctrl-Alt-Delete keys. When the Windows Security Menu appears, click on the Lock Computer buttonPress the Ctrl-Alt-Delete keys. When the Windows Security Menu appears, click on the Lock Computer button Safe some energy! If you leave your computer for more than 90 minutes, shut down. Safe some energy! If you leave your computer for more than 90 minutes, shut down. The Windows key is located between the Ctrl and Alt keys in the lower-right corner of a standard keyboard.

8 Strong Passwords Any password should be at least 7 characters long. Any password should be at least 7 characters long. Add complexity to your password: Add complexity to your password: Use a combination of upper- and lowercase lettersUse a combination of upper- and lowercase letters Add numbersAdd numbers Substitute special characters or numbers for letters for a, $ for s, 3 for e, ! for l)Substitute special characters or numbers for letters for a, $ for s, 3 for e, ! for l) Think of a sentence that you will remember and turn that into your password by using the first letter of each word to create a password string. Think of a sentence that you will remember and turn that into your password by using the first letter of each word to create a password string. Sample password using the above suggestions:Sample password using the above suggestions: All passwords must be at least seven characters long becomes: Keep your password a secret: Treat your passwords with as much care as the information that they protect. DO NOT keep your password written down in plain sight or in any place accessible by other people. Keep your password a secret: Treat your passwords with as much care as the information that they protect. DO NOT keep your password written down in plain sight or in any place accessible by other people.

9 How the IT Dept. Secures Your PC Keeps software up-to-date. Keeps software up-to-date. Maintains a firewall. Maintains a firewall. Automatically updates and runs antivirus program. Automatically updates and runs antivirus program. Offers anti-spy & adware programs as needed. Offers anti-spy & adware programs as needed.

10 Safe ing: 3 Things to Know Know who you are sending mail to. Know who you are sending mail to. Know who you are getting mail from. Know who you are getting mail from. Know who you expect attachments from. Know who you expect attachments from. Just because you know the person the mail came from does not mean its a legitimate .Just because you know the person the mail came from does not mean its a legitimate . Dont believe everything you read. Dont believe everything you read.

11 The Never Never List: Never never open an attachment from an unknown source. Never never open an attachment you were not expecting. Never never click on a link in an from an unknown source. Never never share your password.

12 What Is Phishing? An attempt via to get you to disclose personal information that will be used in a malicious manner. An attempt via to get you to disclose personal information that will be used in a malicious manner. Often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one. Often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one.

13 Recognizing Phishing s:

14 Clues To Identify A Phishing If it sounds too good to be true, it probably is! If it sounds too good to be true, it probably is! Spelling errors and bad grammar. Spelling errors and bad grammar. Odd formatting (e.g., incorrect use of capital letters or punctuation). Odd formatting (e.g., incorrect use of capital letters or punctuation). No real person's name included in either the greeting or signature of the . No real person's name included in either the greeting or signature of the . No legitimate business will ever request your password. No legitimate business will ever request your password. No mention of a phone number to call or person to contact. No mention of a phone number to call or person to contact. Threatening to delete an account due to lack of response: legitimate businesses dont do that. Threatening to delete an account due to lack of response: legitimate businesses dont do that.

15 Verifying Website Security The s in the http indicates that this is a secure site. A padlock icon also indicates that this is a secure site (the icons location depends on your browser; it may be at the top of the screen or in the lower-right corner). Know how to identify secure sites when youre online. Know how to identify secure sites when youre online.

16 Be careful about what you reveal online: Be careful about what you reveal online: AgeAge AddressAddress WhereaboutsWhereabouts Itinerary/routineItinerary/routine Phone number, IM namePhone number, IM name Tips To Protect Yourself

17 ID theft not just a cybercrime; it occurs in the real world too. Mail Mail Stealing from mailbox, change of address formsStealing from mailbox, change of address forms Theft Theft Wallet/purse stolen, home/car break-insWallet/purse stolen, home/car break-ins Dumpster diving at homes and businessesDumpster diving at homes and businesses Cell Phone Cameras Cell Phone Cameras Sneaky photos taken of your private infoSneaky photos taken of your private info Maintain Your Physical Security

18 Secure your trash Secure your trash Think before you toss; buy & use a shredderThink before you toss; buy & use a shredder Secure your mailbox Secure your mailbox Stop mail and newspapers when out of townStop mail and newspapers when out of town Mail letters from P.O. or dropboxesMail letters from P.O. or dropboxes Note anything unusualNote anything unusual Monitor your credit Monitor your credit Opt out of pre-approved offers. Call OPTOUT ( ) to request such offers be stopped. Note that you will be asked to provide your Social Security number when you call.Opt out of pre-approved offers. Call OPTOUT ( ) to request such offers be stopped. Note that you will be asked to provide your Social Security number when you call. Check your statements & credit reportsCheck your statements & credit reports How to Prevent ID Theft

19 Place a fraud alert on your credit reports, and review your credit reports. Place a fraud alert on your credit reports, and review your credit reports. Close the accounts that you know, or believe, have been tampered with or opened fraudulently. Close the accounts that you know, or believe, have been tampered with or opened fraudulently. File a complaint with the Federal Trade Commission. File a complaint with the Federal Trade Commission. File a report with your local police. File a report with your local police. If You Are A Victim of ID Theft…


Download ppt "Data Security at Albemarle County: Keeping You and Your Computer Safe."

Similar presentations


Ads by Google