Information Security Office & Home IT Forum October 29, 2009 Presenters: Diane Jachimowicz – Senior Technology Services Analyst Anthony Maszeroski – Information.

Slides:



Advertisements
Similar presentations
Point3r$. Password Introduction Passwords are a key part of any security system : –Work or Personal Strong passwords make your personal and work.
Advertisements

Are you Safe at Work? A look into Safety at the Workplace and Internet Security Presented by Sheila Gee.
Web Shift Booking System
A note for you We have created this presentation for you, the outstanding employee who has IT security on the brain. We want to help you spread the word.
Helping our customers keep their computers safe.  Using your pet’s, business, family, friend’s names  Using number or letter sequences (0123, abcd)
Windows XP Tutorial Securing Windows. Introduction This presentation will guide you through basic security principles for Windows XP.
Maintaining Security While Using Computers What all of Our Computer Users Need to Know.
Tutorial on Basic Usage
Internet Safety Gleneagles Computer Club February 16, 2015 by Deborah Benson.
PowerChart Basics Session 1 June Goal: To acquaint the user with the basics of PowerChart patient information security. Objective: 1.State the importance.
1 Electronic Information Security – What Researchers Need to Know University of California Office of the President Office of Research May 2005.
Two-Factor Authentication & Tools for Password Management August 29, 2014 Pang Chamreth, IT Development Innovations 1.
1 of 2 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2006 Microsoft Corporation.
Perimeter Church Perimeter Network Introduction 2005.
Welcome Overview of this Session Introduction The Migration –Active Directory (replacing Novell) – & Calendar – from iPlanet to Outlook –Network.
Computer and Physical Security Recommendations. Assure that computers and work locations are secured when work areas are not staffed.  Log-off or lock.
Lesson 13 PROTECTING AND SHARING DOCUMENTS
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
1 I ntegrated S ite S ecurity for G rids © Members of the ISSeG Collaboration, 2008 See: ISS e G Computer Security: Advice for computer.
1 Enterprise Security Your Information Security and Privacy Responsibilities © 2008 Providence Health & Services This information may be replicated for.
October is National Cyber Security Month OIT and IT providers are launching an awareness campaign to provide tips and resources to help you stay safe online.
IT Security Essentials Ian Lazerwitz, Information Security Officer.
June is an easy way to communicate. It costs nothing to send an , but it does require a connection to the Internet. You can.
10 Essential Security Measures PA Turnpike Commission.
Chapter 7 Installing and Using Windows XP Professional.
1 WELCOME TO BASIC Instructor Donna DeMedicis ♦ 22 Years of Library Service ♦ BPL Support Staff In Opening The Regional Library Computer Center (Gates.
Protect Your Computer from Viruses and Other Threats! 1. Use antivirus software. 2. Run Windows updates. 3. Use a strong password. 4. Only install reputable.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Chapter 7 Working with Files.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
1. 2 CUSTODIAL COMPUTER ACCESS MANUAL Table of Contents 3 Logging in to School Connect 3 Changing School Connect Password 5 Webmail9 Changing Webmail.
ESCCO Data Security Training David Dixon September 2014.
You will find applications that are installed on the computer. Go to Start – Programs (depending on view Start – All Programs). All applications installed.
IT security By Tilly Gerlack.
IT Security Essentials Lesley A. Bidwell, IT Security Administrator.
 Physical protection and Simple measures  Passwords  Firewalls  Anti-Virus, Spyware and Malware  Web browsers   Patches  Wireless  Encryption.
Information Security 493. Lab 11.3: Encrypt a Windows File Windows operating systems since Windows 2000 have included the ability to encrypt files. Follow.
Introduction to Windows7
University Health Care Computer Systems Fellows, Residents, & Interns.
INFORMATION SECURITY WHAT IS IT? Information Security The protection of Information Systems against unauthorized access to or modification of information,
PHYSICAL ITSECURITY scope. 1.What is password security?. 2.Why can't I tell anyone my password? 3.What about writing my password down 4.Social engineering.
Computing Fundamentals Module Lesson 3 — Changing Settings and Customizing the Desktop Computer Literacy BASICS.
Downloading and Installing Autodesk Revit 2016
Computer Labs Orientation September 2003 Prepared by Computer Services.
Downloading and Installing Autodesk Inventor Professional 2015 This is a 4 step process 1.Register with the Autodesk Student Community 2.Downloading the.
Internet Safety and Productivity Tips Presented by ITS Kerri Sorenson and Sean Hernandez December 11, 8:30-9:00 am.
CHAPTER 5 MANAGING USER ACCOUNTS & GROUPS. User Accounts Windows 95, 98 & Me do not need a user account like Windows XP Professional to access computer.
Government Agency’s Name April  At the end of this course, the learner will be able to: ◦ Define personally identifiable information ◦ List examples.
Government Agency’s Name April Identity Theft is when someone steals your personal information and uses it as their own, usually for some financial.
Information Security Everyday Best Practices Lock your workstation when you walk away – Hit Ctrl + Alt + Delete Store your passwords securely and don’t.
OCTOBER IS CYBER SECURITY AWARENESS MONTH. October is Cyber Security Awareness Month  Our Cyber Security Awareness Campaign focuses on topics such as.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Account & Google Message Center Guide August 2015 Prepared by: Angela Mars IT Education and Training.
Product Training 1 JetFlash Software Application.
Sniper Corporation. Sniper Corporation is an IT security solution company that has introduced security products for the comprehensive protection related.
Common sense solutions to data privacy observed by each employee is the crucial first step toward data security Data Privacy/Data Security Contact IRT.
Protection of Data 31 Protection of Data 31. Protection of Data 31 Having looked at threats, we’ll now look at ways to protect data: Physical Barriers.
Computer Security  Computer Security:  Password Strength  Windows Screen Saver  Deleting browser cache  Deleting browser cookies  Securing MS Office.
POLICIES & PROCEDURES FOR HANDLING CONFIDENTIAL INFORMATION NOVEMBER 5 TH 2015.
Properly Safeguarding Personally Identifiable Information (PII) Ticket Program Manager (TPM) Social Security’s Ticket to Work Program.
Lesson 13 PROTECTING AND SHARING DOCUMENTS
Account & Google Message Center Guide August 2015 Prepared by: Angela Mars IT Education and Training.
Computer Literacy BASICS
Lesson 13 PROTECTING AND SHARING DOCUMENTS
Robert Leonard Information Security Manager Hamilton
Computer Basics Last Updated: 2007.
Lesson 2: Epic Security Considerations
Using TrueCrypt 6th May 2009.
Keeping Our Data Secure

Presentation transcript:

Information Security Office & Home IT Forum October 29, 2009 Presenters: Diane Jachimowicz – Senior Technology Services Analyst Anthony Maszeroski – Information Security Manager Danielle Morse – Associate Director, Desktop Services

House Keeping Sign In Sheet Prizes Speakers Top 10 Office Security Tips Agenda

Personally Identifiable Information (PII) Safer Web Browsing Office Security Student Use of Office PCs Passwords Royal Drive Encryption of Files USB Encryption McAfee AntiVirus Home Tools Q & A Announcements/Prizes Awarded

Office Security Keep your office locked even if you just step out for a minute Dont leave valuables in plain view Consider taking your laptop home with you Report suspicious activity immediately If the building is locked, dont let someone you dont know into the building Dont become so absorbed in what you are doing that you dont notice the activity around you Confidential documents should be put away and not left visible and unattended on work desks

Office Computer Security Computer screens should be angled so visitors cant see sensitive information Shutdown every night Unplug over holidays Use Laptop Locks Backup Storage

Logoff when you leave To Lock Down Windows XP Click Ctrl+Alt+Delete Select "Lock Workstation" This will bring up your login screen and lock your computer down Windows XP shortcut: Click the Windows key (the flying window key at the bottom of the key board) and the L key. This will bring up your login screen and lock your computer down. To Lock Down Windows Vista at home Go to the Start menu At the bottom right you'll see an icon of a padlock Click it to lock the computer

Student Use of Office Computers Designated Student Computers Secure storage space Check Student PC Periodically Confidentially Agreements

Why You Need a Secure Password Authenticate or prove your identity Malicious sent in your name Your password can be used to commit fraud, post child pornography, send spam, make threats, break into other systems, and much more.

Protect Your Password Select a unique password Avoid any password with personal information: Birth date, name, home town, or mother's maiden name Childrens name, pet's name, or your best friend Driver's License, phone, address, license plate, social security number, or PIN numbers Dont write down your password Dont tell anyone your password

Common Password Mistakes changeme password start computer internet ihavenopass mypassword openup scranton Letmein

Creating a Secure Password Use 9 or more characters DO NOT use plain dictionary words Include at least 3 of the following criteria: – lowercase letters – UPPERCASE letters – Numbers – Punctuation 4S&7yaofb4th

Passwords are like Underwear… Change Yours Often! Don't Share Them with Friends! Be Mysterious! The Longer the Better! Dont Leave Yours Lying Around!

Consider these findings... More than 40% of all individually-chosen passwords are readily guessed by someone who knows you 3,000 out of 13,000 passwords cracked Gaining access to one password often provides access to other systems and accounts

How Passwords are Cracked Dictionary programs Changing the default password Guessable passwords Commonly-chosen passwords Short passwords

Tips for strong passwords... DON'T use your login name in any form DON'T use a password made up of all digits, or of all the same letter DON'T use words in the dictionary DON'T use consecutive or adjacent keys DON'T use "remember my password features"

Tips for strong passwords... DO include a mix of upper and lower case, numbers, and punctuation such as HY?j4iP or 3rt!dlP DO use a password that you can type quickly without having to look at the keyboard DO change your password regularly

Royal Drive What is it? Who should use it? How do you get to it? Why should you use it? Royal Drive is used in over 120 colleges and universities throughout the country including Georgetown, Boston College, Harvard, Princeton and Yale.

Royal Drive Benefits Secure Storage Document Sharing/Collaboration Intellitach

Encryption Encryption is the process of encoding data to ensure that unauthorized parties cannot view it. To accomplish encryption, a key or code provided by you is used to encrypt the data, making encryption difficult to crack. A few encryption options are readily available to you.

ENCRYPTION OF FILES

USB ENCRYPTION

TrueCrypt Software application used for real-time on- the-fly encryption Free, open-source software available for Windows 7/Vista/XP, Mac OS X, and Linux Encrypts an entire partition or storage device such as a USB Flash Device (UFD) or hard drive Creates a virtual encrypted disk within a file and mounts it as a real disk

TrueCrypt UFD Encryption Service The TSC does not provide UFDs. You will need to purchase and take a UFD with you. The encryption process will destroy any existing data on the UFD. During the encryption process, you will be prompted to enter a password for your device. TSC staff will encourage you to select a password that is 20 characters or more in length. Determining the password you intend to use before you visit the TSC is recommended. When complete your original UFD will contain an encrypted TrueCrypt volume and TrueCrypt Traveler Disk Software.

MCAFEE VIRUSSCAN ENTERPRISE 8.7I

McAfee VirusScan Enterprise

Q &A ???

Next IT Forum Topic: Windows 7 Date: November 24, 2009 Time: 11:30am – 1:00pm Location: BRN 509 RSVP: Lunch will be provided

And the Winners are…….