Presentation is loading. Please wait.

Presentation is loading. Please wait.

Cyber Security – Our Approach James Clement Network Specialist ETS: Communications & Network Services

Similar presentations


Presentation on theme: "Cyber Security – Our Approach James Clement Network Specialist ETS: Communications & Network Services"— Presentation transcript:

1 Cyber Security – Our Approach James Clement Network Specialist ETS: Communications & Network Services jclement@monroecc.edu

2 ETS:CNS recent security enhancements Continued migration to separate networks based on user. More restrictive firewall rulesets at DCC, PSTF, ATC. Bluesocket Wireless Gateway Outlook Web Access upgraded to SSL. Attachment filtering on college related E-Mail. Centralized patch management for ETS servers, clients.

3 ETS:CNS upcoming challenges Banner Systems Isolation Voice Over IP Security Trends in Technology, more is better. Networks trust the middle man.

4 Wireless security Bluesocket Wireless Gateway - Supports IPSec VPN Connections - Requires authenticated users - Uses SSL - Independent Firewall Use a VPN client such as MCC@Home. College wide migration to Cisco 1200 access points. Turn it off when you don’t need it.

5 E-Mail security Outline of standard preventative measures: Avoid accessing off-campus E-mail from on campus. Use a “junk” E-Mail account, such as Yahoo or Google free mail. Don’t open unknown attachments directly, save & scan them first. Question messages from unknown sources, suspect titles. Current ETS approach to protection: Filter dangerous content including:.vbs.com.shs.js.bat.cmd.pif.scr.chm.vb.eml.exe.ceo Filter media files (.mpg.wmv.avi.mp3.wm.mpeg) > 1 Megabyte in size.

6 Easy steps to improving your security Passwords – Change often, Use hard to guess combinations, Don’t tell. E-Mail – Question mail from unknown senders. Stay current on Windows Updates. Update Anti-virus signatures often. Clean Spyware with tools such as Spybot. Use the Google Toolbar to stop pop-ups. Avoid installing “entertainment” or novelty & File Sharing software. Use VPN clients (MCC@Home) on untrusted networks. Avoid using public terminals, insecure computers.

7 Questions & Comments Related Links: http://toolbar.google.com


Download ppt "Cyber Security – Our Approach James Clement Network Specialist ETS: Communications & Network Services"

Similar presentations


Ads by Google