Before the talk… Zix Mail is the approved encrypted email platform, we will have training on this soon. Citrix Sharefile has been approved for use for.

Slides:



Advertisements
Similar presentations
Are you Safe at Work? A look into Safety at the Workplace and Internet Security Presented by Sheila Gee.
Advertisements

Smartphone and Mobile Device Security IT Communication Liaisons Meeting October 11, 2012 Theresa Semmens, CITSO.
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Invasion of Smart Phones in Clinical Areas Chrissy Kyak Privacy Officer University of Maryland Upper Chesapeake Health.
Guide to Massachusetts Data Privacy Laws & Steps you can take towards Compliance.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
New Data Regulation Law 201 CMR TJX Video.
Security Squad Keeping your Equipment and Information Safe Security Squad Keeping your Equipment and Information Safe Security Squad Video Series, Part.
 Review the security rule as it pertains to ›Physical Safeguards ♦ How to protect the ePHI in the work environment ♦ Implementation ideas for your office.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
DATA SECURITY AND YOU! W/ DAVE California Center for Population Research.
10 Tips for keeping MCL safe 1. Set up your defenses. Do you have adequate firewalls and antivirus software to protect you from hackers who could steal.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Protecting Your Information Assets
INTEROP 2014 Mobile Issues in the Network. Mobile Issues Data loss – Hardware theft or failure – Data corruption Data theft – Hardware theft – Spyware,
© Hodder Gibson 2012 Staying safe online. © Hodder Gibson 2012 Dangers on the Internet There are a number of dangers on the Internet such as: viruses.
Information Systems Services How to Protect Yourself On-Line – Keeping Safe At Home Neil Jowsey, IT Security Team 25 th September 2013.
Arkansas State Law Which Governs Sensitive Information…… Part 3B
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
Complete Security. Threats changing, still increasing Data everywhere, regulations growing Users everywhere, using everything We’re focused on protecting.
University Health Care Computer Systems Fellows, Residents, & Interns.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Goals Be able to identify the parts of a URL Determine the safeness of a link Know the best places to find the info you need Know how to deal with toolbars.
Computer Security Sample security policy Dr Alexei Vernitski.
Copyright © 2008 AusCERT 1 Practical Computer Security See the notes section throughout the slide presentation for additional information.
Phillip Schneider Information Services Librarian Gail Borden Public Library District Cybersecurity: Keeping Your Computers & Devices Safe.
Computer Security Keeping you and your computer safe in the digital world.
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
Dial-In Number: 1 (631) Webinar ID: FHC Tech Talk Automation and Efficiency Series Talk #1 Carbonite automated backup.
Lesson 10A: The Three D’s of Identify Theft
DATA SECURITY FOR MEDICAL RESEARCH
Unit 13 IT Systems Troubleshooting and Repair Anne Sewell
Safe Browsing Tips and more!
How to use the internet safely and How to protect my personal data?
How to use the internet safely and How to protect my personal data?
I S P S loss Prevention.
Computer Virus and Antivirus
OWASP CONSUMER TOP TEN SAFE WEB HABITS
Lecture 14: Business Information Systems - ICT Security
Your Computer Wants To Ruin Your Life
Home Computer Security
Internet Tips & Tricks By Brandon Hall.
Project Overview Visit Now:
Unit 4 IT Security.
Staying Austin College
ALL ABOUT USING YOUR ANDROID DEVICE
Encryption The Good kind of obscurity
How to Install and Use Malwarebytes Antivirus How to Install and Use Malwarebytes Antivirus Designed to supplement your antivirus software, Malwarebytes.
Call AVG Antivirus Support | Fix Your PC
Chapter 6 Purchasing and Maintaining a Computer
ALL ABOUT USING YOUR ANDROID DEVICE
Identity Theft This presentation will focus on identity theft. What do you already know about identity theft? Do you know anyone who has had their identity.
Setting up an online account
What you can do to support people to be safe online
CHAPTER 2: OPERATING SYSTEMS (Part 2) COMPUTER SKILLS.
Protecting Your Information Assets
9 ways to avoid viruses and spyware
Bethesda Cybersecurity Club
Unit 4 IT Security Kerris Davies.
CYBERSAFETY & Personal information
Cybersecurity and Cyberhygiene
G061 - Network Security.
6. Application Software Security
Week 7 - Wednesday CS363.
Information Security in Your Office
Mcafee.com/activate
Presentation transcript:

Before the talk… Zix Mail is the approved encrypted email platform, we will have training on this soon. Citrix Sharefile has been approved for use for all reps and assistants, but must be FHC’s platform. As you will soon see, we are switching to gotowebinar for our webinar provider. We trust this will be a much more user friendly and intuitive presentation platform for the future.

What should you have to keep your data safe? Tech Level 1 – All Audiences Dial-In Number: 1-201-479-4595 Meeting Number: 32941586

Goals Know what threats your data faces Describe secure behavior Understand the ways data moves and how/when it is exposed Know what software you should have Know where to look to see what you have already and what you still need Know what you are trying to protect and why

Threats Data corruption Drive failure/device failure Hack/breach Malware Randsomware Physical theft

Behavior A secure network starts with behavior Strong password, not under your keyboard Locks on doors and cabinets, 2 locks on medicals Shut down your machine overnight Secure your wireless network, segment it if possible, use wired if its available Have a firewall or some gateway protection device and set a good password on it as well – previous talk Look before you click Ask us questions

Data in motion Website access – form data entry Email Social media Mobile phones and tablets Mobile devices – laptops Off-site backups as a service Removable storage devices

Data in motion – steps to secure Website access – form data entry Ensure valid HTTPS before typing Take a second look at the URL, make sure you are where you think you are Email Don’t click anything within unsolicited emails including links and pictures Encrypt anything you question as being PII

Data in motion – steps to secure Social Media Is never and will never be secure, ever… Mobile phones and tablets Set a password or fingerprint Set maximum number of attempts before wiping the phone Encrypt the entire phone If the device will have client data, don’t install apps that aren’t from a well known company and business oriented If you must have candy crush, install it on another device separate from your client’s data

Data in motion – steps to secure Mobile Devices – laptops Set a password or fingerprint Set maximum number of attempts before rendering the device unusable Encrypt the entire laptop hard drive If the device will have client data, don’t install apps that aren’t from a well known company and business oriented

Data in motion – steps to secure Off-site backups as a service The only approved off-site backup as a service at this point is Carbonite, so use Carbonite Removable storage devices Encrypt the drive or purchase a drive that is encrypted by default and ensure it’s encrypted via the manufacturer’s procedures

Programs Full Disk Encryption- Check Point Full Disk Encryption Dell Data Protection | Encryption McAfee Complete Data Protection Sophos SafeGuard Symantec Endpoint Encryption DiskCryptor – open source Apple FileVault 2 Microsoft BitLocker.

Programs Anti-virus / anti-malware Anti-malware Bit Defender Kaspersky McAfee Anti-malware Malwarebytes.org Software Firewall – mobile devices The anti-virus vendors provide internet security suites that include a firewall

Programs Password storage Backup software Housekeeping Roboform Backup software Carbonite Housekeeping Ccleaner Email Encryption Zix – we are providing this and should be available this week

Where do I look to see if I have this stuff? Control Panel – windows 7 through 10 Programs and features will show all installed programs Ccleaner Under the tools section, you will find an area that you can remove programs http://www.belarc.com/ An actual computer assessment tool that tells you if your machine is missing patches and so much more

Protect what and why Personally Identifiable Information Definition - Any representation of information that permits the identity of an individual to whom the information applies to be reasonably inferred by either direct or indirect means. Further, PII is defined as information: (i) that directly identifies an individual (e.g., name, address, social security number or other identifying number or code, telephone number, email address, etc.) or (ii) by which an agency intends to identify specific individuals in conjunction with other data elements, i.e., indirect identification. (These data elements may include a combination of gender, race, birth date, geographic indicator, and other descriptors). Additionally, information permitting the physical or online contacting of a specific individual is the same as personally identifiable information. This information can be maintained in either paper, electronic or other media.

Reality Check – What’s at stake? Client’s data and livelihood – identity theft, actual theft, embarrassment, lawsuits Your reputation – could lose clients, new clients not interested in you, loss of client trust Your Revenue – fewer clients = less $$$ Your employment – less $$$ = less employees

Questions?