OCTOBER IS CYBER SECURITY AWARENESS MONTH. October is Cyber Security Awareness Month  Our Cyber Security Awareness Campaign focuses on topics such as.

Slides:



Advertisements
Similar presentations
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Advertisements

How to protect yourself, your computer, and others on the internet
Are you Safe at Work? A look into Safety at the Workplace and Internet Security Presented by Sheila Gee.
Darton College Information Systems Use Policies. Introduction Dartons Information Systems are critical resources. The Information Systems Use Policies.
ANNUAL SECURITY AWARENESS TRAINING – 2011 UMW Information Technology Security Program Annual Security Awareness Training for UMW Faculty and Staff.
Cyber Stalking Cyber Stalking Phishing Hacker 1. Never reveal your home address !!! This rule is especially important for women who are business professionals.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Internet Safety Gleneagles Computer Club February 16, 2015 by Deborah Benson.
1 Electronic Information Security – What Researchers Need to Know University of California Office of the President Office of Research May 2005.
For further information computersecurity.wlu.ca
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 18, 20 & 25 March 2015.
October is National Cyber Security Month OIT and IT providers are launching an awareness campaign to provide tips and resources to help you stay safe online.
Network & Computer Security Training.  Prevents unauthorized access to our network and your computer  Helps keep unwanted viruses and malware from entering.
1 Enterprise Security Your Information Security and Privacy Responsibilities © 2008 Providence Health & Services This information may be replicated for.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
October is National Cyber Security Month OIT and IT providers are launching an awareness campaign to provide tips and resources to help you stay safe online.
Computer Security 1 Keeping your computer safe. Computer Security 1 Computer Security 1 includes two lessons:  Lesson 1: An overview of computer security.
Sensitive Data Accessibility Financial Management College of Education Michigan State University.
Joel Garmon, Director, Information Security Mike Rollins, Security Architect Jeff Teague, Security Analyst, Senior 1
Quiz Review.
Security Liaisons Information Presentation. Introduction  What’s the big deal with computer security? Don’t we have an IT security department to take.
How It Applies In A Virtual World
Information Security Information Technology and Computing Services Information Technology and Computing Services
Contents  Viruses Viruses  Computer Worms Computer Worms  Trojans Trojans  Spyware Spyware  Adware Adware  Spam Spam  Hoaxes and Scams Hoaxes and.
Program Objective Security Basics
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Your Trusted Partner In All Things IT. 20 Years of IT Experience University Automotive Food Service Banking Insurance Legal Medical Dental Software Development.
Security Awareness ITS SECURITY TRAINING. Why am I here ? Isn’t security an IT problem ?  Technology can address only a small fraction of security risks.
Information Security and YOU!. Information Assurance Outreach Information Security Online Security Remote Access with Demonstration The Cloud Social.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
ESCCO Data Security Training David Dixon September 2014.
1.1 System Performance Security Module 1 Version 5.
Staying Safe Online Keep your Information Secure.
Adam Soph, Alexandra Smith, Landon Peterson. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Online Security By:. The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access.
DIGITAL SECURITY PART 2 TOOLS. phising  Internet criminals can steal your personal and banking information without you ever noticing – they can do it.
End User Cyber Security Awareness Training. Who should complete this training This training is required for all individuals that owns a computer, mobile.
Safeguarding Your Privacy Section 1.3. Safeguarding Your Privacy 1. What is Identity Theft? 2. Research a story on identity theft and be prepared to report.
INFORMATION SECURITY WHAT IS IT? Information Security The protection of Information Systems against unauthorized access to or modification of information,
Computer Security Hacking, Phishing, Passwords Kausalya S. And Sushil Mujumdar (CCCF) 04 - Aug - 15.
What are the rules? Information technology is available to every student, faculty and staff member in support of the essential mission of the University.
How can IT help you today?. Agenda Why Do You Care? What Are The Risks? What Can You Do? Questions? How can IT help you today? 2.
Chapter 7 Phishing, Pharming, and Spam. Phishing Phishing is a criminal activity using computer security techniques. Phishers try to acquire information.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
A Matter of Your Personal Security Phishing. Beware of Phishing s Several employees received an that looked legitimate, as if it was being.
October is National CyberSecurity Awareness Month OIT and IT providers across campus are launching an awareness campaign to provide tips and resources.
Cyber Safety Jamie Salazar.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Social Networking Practices. Information Security Purpose is to protect your information’s Confidentiality Integrity Availability.
Information Security Everyday Best Practices Lock your workstation when you walk away – Hit Ctrl + Alt + Delete Store your passwords securely and don’t.
WHAT IS CYBER SECURITY? Governments, military, corporations, financial institutions, hospitals and other businesses collect, process and store a great.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
ICT Laptops Passwords Encryption Back-ups Data Protection and the Internet Viruses Social Networking / Professional Conduct.
Technological Awareness for Teens and Young Adults.
Computer Security Keeping you and your computer safe in the digital world.
Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Introduction to Networking Technologies Security on Peer-to-Peer Networks.
Information Technology Security Office of the Vice President for Information Technology New Employee Orientation II.
An Introduction to Phishing and Viruses
Learn how to protect yourself against common attacks
Internet Identity, Safety, & Security
I S P S loss Prevention.
Passwords.
Cybersecurity Awareness
Digital $$ Quiz Test your knowledge.
Lesson 2: Epic Security Considerations
Presentation transcript:

OCTOBER IS CYBER SECURITY AWARENESS MONTH

October is Cyber Security Awareness Month  Our Cyber Security Awareness Campaign focuses on topics such as identity theft, social networking (Facebook, Twitter), desktop security, portable devices, spyware, safeguarding passwords and protecting confidential University information.

What is cyber security?  Everyone relies on computers and the internet now – Communication ( , cell phones), Entertainment (mp3s, digital cable), Shopping (online stores, credit cards), Finances (online banking)  Cyber security involves protecting that information by preventing, detecting, and responding to attacks.

Safeguard Topics  Passwords  Protecting Workstation  Protecting Portable Devices  Identity Theft  Acceptable Use Policy

Passwords  Use Strong Passwords  All passwords must be at least 8 characters in length.  All passwords must contain at least one number (0-9) or special character (~, #, $, %, ^, &, *, (, ), -, =, +, ?, [, ],{, }).  All passwords must differ from a person’s username.  All passwords must contain at least one upper case letter (A-Z).  All passwords must contain at least one lower case letter (a-z).

Passwords Cont.  Passwords should NOT contain: Personal Information (name, nickname, pet’s name, child’s name, birth date, etc.) Keyboard patterns (qwerty or asdfg) Sequential numbers (12345) or letters (adcdef) Words associated with your school or place of business (UST, Celts) Blank Spaces

Passwords Cont.  Create a strong, memorable password  Use a sentence or phrase only you know. Ex. “I Always Eat Burgers on Saturday at the Park”.  Use the first letters of the sentence. Ex. “iaebosatp”  Substitute numbers and special characters for some of the letters. Example: Eat burgers 0n the Park” would become

Password Cont.  Secure your Password  Do not share passwords with anyone  Do not post them or write down them down  Do not send passwords via or instant messenger  Always change default passwords  Change passwords every 120 days  Do not use the same password for entertainment sites (Facebook) and critical sites (Bank of America, myStThom)

Protecting Workstations  Is confidential information available to others?  Is your screen saver password protected? For Windows users Right click on a blank part of the Windows Desktop area Choose “Properties” then “Screensaver” Tab Select a screensaver (from the drop down list) Click on “On Resume, Password Protect”  Is your computer locked when unattended? Hold the “Flying Window” key & “L” Key OR “Ctrl” “Alt” “Del”

Protecting Workstations Cont.  Keep patches updated  Keep anti-virus and spyware software updated  Make data backups of important files and folders  Backup information to different media (CDs, thumb drive/USB stick, External Hard Drive) Store department data on Vincent  Store the backup data in a separate, secure location  Be aware of any confidential information stored on thumb drive/USB stick or external hard drive

Protecting Workstations Cont.  Safeguard data  and instant messenger Do not send confidential or sensitive information, i.e. social security numbers or student ID numbers through or instant messenger. Do not open a message or an attachment from unknown senders.  Use caution when discarding electronic and physical student data

Protecting Portable Devices  Ways to protect your portable devices (pda, blackberry, iphone, & laptops)  Data security Password-protect portable devices Keep software up to date Install and maintain anti-virus and spyware software Store important data separately Do not follow links sent in or text messages Backup files Disable remote connectivity (Bluetooth)

Protecting Portable Devices Cont.  Ways to protect portable devices –  Physical security Password-protect portable devices Be discreet with portable devices Keep portable devices with you at all times Backup files Consider a lock for laptops

Identity Theft! Don’t get Phooled with Phishing!!  Phishing is a scam in which legitimate-appearing e- mails are sent out to unsuspecting users in attempt to acquire sensitive information such as usernames, passwords, credit card numbers, or social security numbers by masquerading as trustworthy sites.

Don’t get Phooled with Phishing!!  Protect yourself from phishing scams  Do not respond to suspicious or “phishy” s  Do not click on links within the “phishy” s  Check the legitimacy of the links  Do not enter personal or financial information  Schools, banks, or other legitimate institutions will NEVER request personal information via or phone!!

Acceptable User Policy  The user is responsible for correct and sufficient use of the tools available for maintaining the security, privacy and integrity of data.  University personnel should exercise diligence in the physical security of all technological resources assigned to them.  Policy location Security & Protection

 Questions?  For additional information 