Presentation is loading. Please wait.

Presentation is loading. Please wait.

Protecting Your Information Assets

Similar presentations


Presentation on theme: "Protecting Your Information Assets"— Presentation transcript:

1 Protecting Your Information Assets
5 Protecting Your Information Assets

2 Explain why it is critical that you protect your information assets.
Identify the various behavioral actions you can take to protect your information assets. Identify the various computerbased actions you can take to protect your information assets.

3 Introduction Behavioral Actions to Protect Your Information Assets Computer-Based Actions to Protect Your Information Assets

4 TG 5.1 Introduction Risk of Using Wireless Hot Spots While Traveling or Working from Home Protecting Yourself Due to the Rise in Organized Crime Online Two Types of Actions to Protect Yourself Behavioral Actions Computer-Based Actions

5 Behavioral Actions to Protect Your Information Assets
TG 5.2 Behavioral Actions to Protect Your Information Assets General Behavioral Actions What to Do in the Event of Identity Theft

6 General Behavioral Actions
Never provide personal information to strangers in any format – Physical, Verbal, or Electronic Protect Your Social Security Number Secure Your Credit Cards Against Fraudulent Use Include a Picture on Your Credit Card Write “Photo ID Required” in Signature Area Use Virtual Credit Cards for Online Shopping Pay close attention to Billing Cycles Limit Use of Debit Cards Have Credit Card Bills Delivered Paperless/Digitally

7 General Behavioral Actions (Continued)
Use a P.O. Box instead of your personal mailbox at your home or apartment Lock Credit Files with LifeLock or TrustedID

8 What to Do in the Event of Identity Theft
Get a Lawyer Get Organized File a Detailed Police Report Get the name and phone number of your police investigator, and give it to your creditors In all communications about the crime, use certified, return-receipt mail

9 What to Do in the Event of Identity Theft (Continued)
Be sure to obtain your unique case number from each credit agency, and ask each credit agency to send you your credit report Tell each agency to issue a fraud alert Obtain the document that you need to file a long-term fraud alert, which lasts for seven year or until cancelled. Ask the credit agencies for the names and phone number of lenders with whom fraudulent accounts have been opened

10 What to Do in the Event of Identity Theft (Continued)
Point out to each agency all entries generated due to fraud Instruct each agency to notify anyone who received your credit report in the last six months that you are disputing the information Californians can order a “credit freeze” with all three major credit agencies Call your credit card companies directly Change all your credit cards immediately

11 What to Do in the Event of Identity Theft (Continued)
Be alert for unauthorized change-of-address notifications in your mail Fill out fraud affidavits for creditors If debt collector demand payment of fraudulent accounts, write down the name of the company as well as the collector’s name, address, and phone number, and inform them you have been victimized

12 Computer-Based Actions to Protect Your Information Assets
TG 5.3 Computer-Based Actions to Protect Your Information Assets Determining Which Internet Sites People Using Your Computer Have Visited Dangers of Social Networking Sites Determining Whether Your Computer Is Infected Computer Actions to Prevent Malware Infections Protecting Your Portable Devices and Information Internet Explorer 9

13 Computer-Based Actions to Protect Your Information Assets (Continued)
TG 5.3 Computer-Based Actions to Protect Your Information Assets (Continued) Other Actions That You Can Take On Your Computer Protecting Your Privacy Preparing for Personal Disasters Restoring Backup Files Wireless Security

14 Computer Actions to Prevent Malware Infections
Test Your System Install a Security Suite on Your Computer Install an Anti-Malware Product on Your Computer Install a Firewall on Your Computer Install an Antispyware Product on Your Computer

15 Computer Actions to Prevent Malware Infections (Continued)
Install Monitoring Software on Your Computer Install Content-Filtering Software on Your Computer Install Anti-spam Software on Your Computer Install Proactive Intrusion Detection and Prevention Software on Your Computer

16 Computer Actions to Prevent Malware Infections (Continued)
Manage Patches Use a Browser Other Than Internet Explorer Use an Operating System Other Than Windows

17 Internet Explorer 9 Protected Mode ActiveX Opt-In Fix My Settings
Windows Defender Personal Data Safeguards Phishing Filter Delete Browsing History

18 Internet Explorer 9 (Continued)
InPrivate Domain Highlighting SmartScreen Filter Add-on Manager Cross-site Scripting Filter A 128-bit Secure Connection for Using Secure Web Sites

19 Other Actions That You Can Take On Your Computer
How To Detect a Worm How to Detect a Trojan Horse How to Detect Fake Web Sites

20 Protecting Your Privacy
Use Strong Passwords How to Adjust Your Privacy Settings on Your Computer How to Surf the Web Anonymously How to Anonymously Turning Off Your Google Web History Removing All Google Web or Search History

21 Wireless Security Hide Your Service Set Identifier (SSID)
Use Encryption Filter Out Media Access Control (MAC) Addresses Limit Internet Protocol (IP) Addresses

22 Wireless Security (Continued)
Sniff Out Intruders Using a Public Hotspot Test Your Wireless Network Wireless Security Software


Download ppt "Protecting Your Information Assets"

Similar presentations


Ads by Google