InformatiOn Technology Services

Slides:



Advertisements
Similar presentations
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Advertisements

Cyber Stalking Cyber Stalking Phishing Hacker 1. Never reveal your home address !!! This rule is especially important for women who are business professionals.
Helping our customers keep their computers safe.  Using your pet’s, business, family, friend’s names  Using number or letter sequences (0123, abcd)
THE DHS PHISHING IQ TEST PART 2 LEGITIMATE V PHISHING How do you know if an is legitimate, or is a phony, phishing ? Take the.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Internet Safety Gleneagles Computer Club February 16, 2015 by Deborah Benson.
1 Identity Theft and Phishing: What You Need to Know.
Social media threats. Warning! May contain mild peril.
1 Identity Theft: What You Need to Know. 2 Identity Theft Identity theft is a crime of stealing key pieces of someone’s identifying information, such.
Lesson 11 Using Online Banking. Key Terms Account Transfer – online transfer of money; ex. Savings to checking acct. Fraud – using trickery to convince.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
IDENTITY THEFT ARE YOU SAFE?. HOW DOES THIS HAPPEN TO ME? Internet “Security “ When using a public computer, never access any vital accounts like banking.
Internet Security PA Turnpike Commission. Internet Security Practices, rule #1: Be distrustful when using the Internet!
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Notes to Teachers At the time we embedded the links in these lessons, they all worked. If they don’t, you can google the website, find the link, open it.
Security Liaisons Information Presentation. Introduction  What’s the big deal with computer security? Don’t we have an IT security department to take.
Contents  Viruses Viruses  Computer Worms Computer Worms  Trojans Trojans  Spyware Spyware  Adware Adware  Spam Spam  Hoaxes and Scams Hoaxes and.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Federal Student Aid Identification username and password – this is how students and parents will sign the FAFSA application. The FSA ID process replaced.
PAGE 1 Company Proprietary and Confidential Internet Safety and Security Presented January 13, 2014.
Have Fun, Be Safe Strategies for Internet and Social Media Safety.
Preventing Identity Theft in Aspen Falls Helping citizens protect themselves IdentityTheft.
IT security By Tilly Gerlack.
Online Security By:. The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
Computer Security By Rachel Gaines. Computers are used for work, play, and everything in between. So here’s how to keep it fun and protected.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Personal Online Safety Information Security Systems Community Outreach Program McKinley Middle School April 23, 2013.
Passwords and more How to cope with computer passwords and avoid identity theft You can download this from Mark Cross.
NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholder to insert your own image. Cyber.
Student Experience It’s your education Type the web site address into the browser given to you by your junior high or high school Select “I am a student”
user guide Having a strong password allows other users to struggle to guess. To make a strong password you should use up to 12 letters and 1 or 2.
Protecting Your Identity © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.
By John Williams. Why Secure Passwords Matter Passwords protect everything about you online. Once those passwords are discovered and used by someone else.
Cyber Safety Jamie Salazar.
Copy of the from the secure website - click on the AccoridaLife.zip link.
Basics What is ? is short for electronic mail. is a method for sending messages electronically from one computer.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Any criminal action perpetrated primarily through the use of a computer.
OCTOBER IS CYBER SECURITY AWARENESS MONTH. October is Cyber Security Awareness Month  Our Cyber Security Awareness Campaign focuses on topics such as.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Outline of this module By the end of this module, you will be able to: Identify the benefits of using social networking to communicate with family and.
STOP. THINK. CONNECT. Online Safety Quiz. Round 1: Safety and Security.
Smart, Safe, and Secure Online Spam commercial messages that you didn’t ask for (a company trying to sell things by sending out thousands of messages at.
Technological Awareness for Teens and Young Adults.
Computer Security Keeping you and your computer safe in the digital world.
Computer Security  Computer Security:  Password Strength  Windows Screen Saver  Deleting browser cache  Deleting browser cookies  Securing MS Office.
Unit 4 Protecting Your Information Section C. Chapter 1, Slide 2Starting Out with Visual Basic 3 rd EditionIntroduction to ComputersUnit 4C – Protecting.
Internet Safety.
InformatiOn Technology Services
Introduction to Web Safety
Class Name: Online Safety & Privacy Basics
Personal spaces.
Protecting What’s Yours: Your Identity
Ways to protect yourself against hackers
Information Security 101 Richard Davis, Rob Laltrello.
Phishing is a form of social engineering that attempts to steal sensitive information.
Protect Your Computer Against Harmful Attacks!
Navigating the Internet
Cybersecurity Awareness
HOW TO MAKE YOUR GMAIL ACCOUNT SECURE…. At Google, we take account security very seriously. To protect your account, we strongly recommend following the.
Protecting Your Identity:
Staying safe on the internet
Introduction to Computers
Powerschool for Parents
Room Booking System User Manual.
9 ways to avoid viruses and spyware
Student Experience It’s your education.
Creating Passphrases Include Examples NOT REQUIRED
Internet Safety – Social Media
Presentation transcript:

InformatiOn Technology Services

Accounts You have three accounts created automatically Email account Canvas account My SWOSU Portal account

Email Passwords expire every 180 days Password requirements for your email password. The password is case sensitive. Because of the security requirements of our email system, the passwords will expire every 180 days. The password must be at least 8 characters long. Must NOT contain your first name or last name Must NOT contain your ID number Consist of a combination of at least 3 of the following: 1) Uppercase letters, 2) Lowercase letters, 3) Numbers, 4) Symbols. (ie: Happy1234, h%ppy1234, haPpy????) Make use of Passphrases

Email SWOSU Email Passwords to avoid Any personal information about you or our family (ie birthdates, anniversary dates, family names) Don’t use Pets names Do not use any words which are associated with Southwestern. (i.e. SWOSU, bulldogs, bulldawgs, Duke) Any type of information that is typically posted on social media like Facebook

Email All emails sent and received are archived. We encourage you to use a Non-SWOSU email for your personal correspondence. Emails are not secure – watch what you send and NEVER send any personal information in an email.

Email Security issues Phishing Scams –NEVER answer emails requesting any personal information , usernames or passwords or links to click on to verify accounts. Identity Theft Your account is compromised and used to send out thousands of email requesting others for their personal emails Disrupts SWOSU outgoing and incoming email correspondence due to being on a blacklist Never open up email from people you do not know especially if you are not expecting an email.

Phishing emails examples Red Flags

Phishing Emails Examples

Web Surfing HTTPS: Make sure you are on a secure sight when doing anything financial. (i.e. banking or ordering). Never save password Change passwords regularly on personal accounts. The rule of thumb is the sensitive the information being assessed with the account the more frequent it needs to be change Keep your browser up today Be sure when download files they are from a trusted site. When surfing the web, look at the URLs to see if they look like reputable sites.

Web Surfing Beware of bloatware – extra software installed during an installation Advertisements on the sides of pages frequently will be compromised with malware