InformatiOn Technology Services

Slides:



Advertisements
Similar presentations
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Advertisements

Cyber Stalking Cyber Stalking Phishing Hacker 1. Never reveal your home address !!! This rule is especially important for women who are business professionals.
Helping our customers keep their computers safe.  Using your pet’s, business, family, friend’s names  Using number or letter sequences (0123, abcd)
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Internet Safety Gleneagles Computer Club February 16, 2015 by Deborah Benson.
1 Identity Theft and Phishing: What You Need to Know.
1 Identity Theft: What You Need to Know. 2 Identity Theft Identity theft is a crime of stealing key pieces of someone’s identifying information, such.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
IDENTITY THEFT ARE YOU SAFE?. HOW DOES THIS HAPPEN TO ME? Internet “Security “ When using a public computer, never access any vital accounts like banking.
XP Browser and Basics1. XP Browser and Basics2 Learn about Web browser software and Web pages The Web is a collection of files that reside.
Browser and Basics Tutorial 1. Learn about Web browser software and Web pages The Web is a collection of files that reside on computers, called.
Internet Security PA Turnpike Commission. Internet Security Practices, rule #1: Be distrustful when using the Internet!
Notes to Teachers At the time we embedded the links in these lessons, they all worked. If they don’t, you can google the website, find the link, open it.
Contents  Viruses Viruses  Computer Worms Computer Worms  Trojans Trojans  Spyware Spyware  Adware Adware  Spam Spam  Hoaxes and Scams Hoaxes and.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
JMU GenCyber Boot Camp Summer, Cyberspace Risks and Defenses Facebook Snapchat P2P filesharing Apps Craigslist Scams JMU GenCyber Boot Camp© 2015.
Preventing Identity Theft in Aspen Falls Helping citizens protect themselves IdentityTheft.
IT security By Tilly Gerlack.
PASSWORDS AND . PASSWORDS It is important to make a good password. Stops others from stealing your information. Stops others from stealing your.
Computer Security By Rachel Gaines. Computers are used for work, play, and everything in between. So here’s how to keep it fun and protected.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
Must be at least 8 characters long Must contain at least one of each of the following: Uppercase letter Lowercase letter Number Special Character.
user guide Having a strong password allows other users to struggle to guess. To make a strong password you should use up to 12 letters and 1 or 2.
Cyber Security and Staying Safe Online Mark D. Riley College of Health Sciences and Professions.
Protecting Your Identity © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.
By John Williams. Why Secure Passwords Matter Passwords protect everything about you online. Once those passwords are discovered and used by someone else.
Cyber Safety Jamie Salazar.
Copy of the from the secure website - click on the AccoridaLife.zip link.
Basics What is ? is short for electronic mail. is a method for sending messages electronically from one computer.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
OCTOBER IS CYBER SECURITY AWARENESS MONTH. October is Cyber Security Awareness Month  Our Cyber Security Awareness Campaign focuses on topics such as.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Outline of this module By the end of this module, you will be able to: Identify the benefits of using social networking to communicate with family and.
STOP. THINK. CONNECT. Online Safety Quiz. Round 1: Safety and Security.
A Guide to Using SMART eR Online Ordering (Electronic Requisitions) Managing Employee Timeoff, Electronic W-2s, Etc… 1.
Technological Awareness for Teens and Young Adults.
Computer Security Keeping you and your computer safe in the digital world.
Computer Security  Computer Security:  Password Strength  Windows Screen Saver  Deleting browser cache  Deleting browser cookies  Securing MS Office.
Unit 4 Protecting Your Information Section C. Chapter 1, Slide 2Starting Out with Visual Basic 3 rd EditionIntroduction to ComputersUnit 4C – Protecting.
Internet Safety.
Password Reset Instructions
Class Name: Online Safety & Privacy Basics
Personal spaces.
How to use the internet safely and How to protect my personal data?
Ways to protect yourself against hackers
ItsLearning & Communication
Cyber Security Awareness Workshop
Some Common Terms The Internet is a network of computers spanning the globe. It is also called the World Wide Web. World Wide Web It is a collection of.
Information Security 101 Richard Davis, Rob Laltrello.
Phishing is a form of social engineering that attempts to steal sensitive information.
Protect Your Computer Against Harmful Attacks!
Navigating the Internet
Faculty Access Class Rosters & Entering Grades.
Cybersecurity Awareness
HOW TO MAKE YOUR GMAIL ACCOUNT SECURE…. At Google, we take account security very seriously. To protect your account, we strongly recommend following the.
Scams, Identity Theft, and Viruses Kelly & Caitlin
Protecting Your Identity:
Staying safe on the internet
Passwords and .
Introduction to Computers
Powerschool for Parents
Lesson 2: Epic Security Considerations
Top Ten Cyber Security Hygiene Tips
Lesson 2: Epic Security Considerations
Lesson 2: Epic Security Considerations
Creating Passphrases Include Examples NOT REQUIRED
Internet Safety – Social Media
InformatiOn Technology Services
Registering your returning student at Moody ISD
Presentation transcript:

InformatiOn Technology Services

Accounts You have three accounts created automatically Email account Canvas account My SWOSU Portal account

My SWOSU Portal/ITS Webpage

Accounts & Terminology You have three accounts created automatically Email account Canvas account My SWOSU Portal account Terminology Your Username: DawgTag (FL######) Default password Swosu#### Make sure you change your default password.

Email Passwords expire every 180 days Password requirements for your email password. The password is case sensitive. Because of the security requirements of our email system, the passwords will expire every 180 days. The password must be at least 8 characters long. Must NOT contain your first name or last name Must NOT contain your ID number Consist of a combination of at least 3 of the following: 1) Uppercase letters, 2) Lowercase letters, 3) Numbers, 4) Symbols. (ie: Happy1234, h%ppy1234, haPpy????) Make use of Passphrases (Ri@trosie)

Password suggestion SWOSU Passwords to avoid Any personal information about you or our family (ie birthdates, anniversary dates, family names) Don’t use Pets names Do not use any words which are associated with Southwestern. (i.e. SWOSU, bulldogs, bulldawgs, Duke) Any type of information that is typically posted on social media like Facebook

Email All emails sent and received are archived. We encourage you to use a Non-SWOSU email for your personal correspondence. Emails are not secure – watch what you send and NEVER send any personal information in an email.

Email Security issues Phishing Scams –NEVER answer emails requesting any personal information , usernames or passwords or links to click on to verify accounts. Identity Theft Your account is compromised and used to send out thousands of email requesting others for their personal emails Disrupts SWOSU outgoing and incoming email correspondence due to being on a blacklist Never open up email from people you do not know especially if you are not expecting an email.

My SWOSU Portal My SWOSU Portal gives access to your electronic paystubs and Campus Connect information Another form of communication Microsoft office is available all SWOSU employees at $20. You will have access to the university code from here. It is accessible on SWOSU homepage or type in this URL: https://my.swosu.edu

DawgTag *********

Phishing emails examples Red Flags

Phishing Emails Examples

Web Surfing HTTPS: Make sure you are on a secure sight when doing anything financial. (i.e. banking or ordering). Never save password Change passwords regularly on personal accounts. The rule of thumb is the sensitive the information being assessed with the account the more frequent it needs to be change Keep your browser up today Be sure when download files they are from a trusted site. When surfing the web, look at the URLs to see if they look like reputable sites.

Web Surfing Beware of bloatware – extra software installed during an installation Advertisements on the sides of pages frequently will be compromised with malware