We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byJessica Blevins
Modified over 2 years ago
Internet Safety at Work Protect company, customer, and your data online
Stay Sharp at Work
Not their best days.
3 ways to avoid one of those days. 1. Defend your computer 2. Protect data and sensitive information 3. Protect devices and data on the go
#1: Defend your computer. Do 3 simple things: 1. Install all updates 2. Log off when you leave your desk 3. Lock up your laptop when you leave work
#2: Protect sensitive data. Think before you enter sensitive data Be suspicious of attachments and links Look out for scams and fraud Create strong passwords
Think before you type. Look for https (the s is for secure) A closed padlock means secure, too Are there signs the site is trustworthy?
Think before you click. Be suspicious and aware of: and IM attachments and links Messages within social sites
The tricks that make you click. Alarming messages Misspellings and grammatical errors Great deals Requests for sensitive info
How to avoid the bait. Confirm that the message is real Type the Web address yourself Use a browser with safety features
Passwords lock data doors. Keep them secret Change them often Make them strong
Which passwords are strong? /04/79 3. Exp3d!ti0us 4. Ambl!anc MsAw3yOiD
And the answers are…
#3 Protect devices on the go. Do they have the latest protection? Guard devices like you do your wallet Dont hand-carry sensitive data Use caution if using a thumb drive in another computer
On the go: wireless hotspots. Connect securely Know who youre connecting to Save sensitive uses for more trusted connections
Sometimes things go wrong. How do you know a PC is infected? Your computer might run slowly Or crash often Or show other unusual behavior Contact our IT department immediately
You lost WHAT? Follow corporate IT policy Report it immediately. Or sooner Change all passwords Mobile phones: get help wiping data
Have a better day…
© 2010 Microsoft Corporation. All rights reserved. Microsoft, Internet Explorer, SmartScreen, and Windows are registered trademarks of Microsoft Corporation in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation.
The Internet = A World of Opportunities Look whats at your fingertips A way to communicate with friends, family, colleagues Access to information and.
© 2009 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered.
© 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or.
Feature: Microsoft Dynamics GP 2013 R2 Dashboards © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product.
KETTŐŐ + EGY Comming Soon Comming Soon.
SOAP Because SOAP uses POST and POST is unsafe to cache *Except Data Caching.
Windows 7 Training. Windows ® 7 Compatibility Session 0 Isolation Isolation of Windows 7 Services.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Services Course Windows Live SkyDrive Participant Guide.
Services Course Office Web Apps Participant Guide.
Services Course Windows Live Messenger Participant Guide.
Microsoft ® Lync 2010 IM and Presence Training. Objectives In this course you will learn how to: Connect with people you care about People are easy to.
Źródło:http://msdn.microsoft.com/en-us/library/ms aspxhttp://msdn.microsoft.com/en-us/library/ms aspx.
Helping our customers keep their computers safe. Using your pet’s, business, family, friend’s names Using number or letter sequences (0123, abcd)
Services Course Windows Live Groups Participant Guide.
Why should my organisation move to Internet Explorer 9? An upgrade guide for IT professionals.
Objective 7.03 Understand ways to avoid identity theft. Identity Theft.
Steve Marx Windows Azure Microsoft Corporation ES01.
SECURITY AWARENESS. The Importance of Security Awareness Training Security Awareness Training provides the knowledge to protect information systems and.
Windows Azure Web Sites Jürgen Mayrbäurl Principal Technical Evangelist Microsoft Österreich DPE.
CYBER SECURITY October 2009 ARE YOU AWARE? The Federal Trade Commission reports that: For the seventh year in a row, identity theft tops the list, accounting.
Powerful and convenient management for Windows Mobile ® 6.1 devices in an enterprise environment. These features include: Centralized, over-the-air device.
The following 10 questions test your knowledge of client site assignment in Configuration Manager Configuration Manager 2007 Client Site Assignment.
Business logic Datacenter Respond to hardware failures Add storage capacity Handle increase in traffic Diagnose service failures Apply OS.
University Services. Agenda Technology Support Data Privacy and Security Software and Hardware Discounts for U of M Staff.
The following 10 questions test your knowledge of Internet-based client management in Configuration Manager Configuration Manager 2007 Internet-Based.
© 2016 SlidePlayer.com Inc. All rights reserved.