Helping our customers keep their computers safe.  Using your pet’s, business, family, friend’s names  Using number or letter sequences (0123, abcd)

Slides:



Advertisements
Similar presentations
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Advertisements

INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
A note for you We have created this presentation for you, the outstanding employee who has IT security on the brain. We want to help you spread the word.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Invasion of Smart Phones in Clinical Areas Chrissy Kyak Privacy Officer University of Maryland Upper Chesapeake Health.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 25 & 27 November 2013.
Johnson Logistics Solutions Office of Systems and Information Technology.
1 of 2 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2006 Microsoft Corporation.
Part 2 of Evil Lurking in Websites Data Security at the University of Wisconsin Oshkosh.
Guide to Massachusetts Data Privacy Laws & Steps you can take towards Compliance.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
IDENTITY THEFT ARE YOU SAFE?. HOW DOES THIS HAPPEN TO ME? Internet “Security “ When using a public computer, never access any vital accounts like banking.
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
1 Enterprise Security Your Information Security and Privacy Responsibilities © 2008 Providence Health & Services This information may be replicated for.
October is National Cyber Security Month OIT and IT providers are launching an awareness campaign to provide tips and resources to help you stay safe online.
By Mrs. Smith DATA INTEGRITY AND SECURITY. Accurate Complete Valid Data Integrity.
10 Essential Security Measures PA Turnpike Commission.
Joel Garmon, Director, Information Security Mike Rollins, Security Architect Jeff Teague, Security Analyst, Senior 1
Securing Your Home Computer Presenter: Donnie Green Date: February 11, 2009 National Aeronautics and Space Administration
Protect Your Computer from Viruses and Other Threats! 1. Use antivirus software. 2. Run Windows updates. 3. Use a strong password. 4. Only install reputable.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
10 Tips for keeping MCL safe 1. Set up your defenses. Do you have adequate firewalls and antivirus software to protect you from hackers who could steal.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Staying Safe. Files can be added to a computer by:- when users are copying files from a USB stick or CD/DVD - downloading files from the Internet - opening.
PAGE 1 Company Proprietary and Confidential Internet Safety and Security Presented January 13, 2014.
IT Security for Users By Matthew Moody.
ESCCO Data Security Training David Dixon September 2014.
Stay Safe & Secure Online. Outline Passwords Everyday Security Security Physical Security Protecting Personal Information.
1.1 System Performance Security Module 1 Version 5.
Staying Safe Online Keep your Information Secure.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
IT Security Essentials Lesley A. Bidwell, IT Security Administrator.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
People use the internet more and more these days so it is very important that we make sure everyone is safe and knows what can happen and how to prevent.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
Protecting Your Personal Information November 15, 2013.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Computer Security Hacking, Phishing, Passwords Kausalya S. And Sushil Mujumdar (CCCF) 04 - Aug - 15.
DATA PROTECTION & FREEDOM OF INFORMATION. What is the difference between Data Protection & Freedom of Information? The Data Protection Act allows you.
How can IT help you today?. Agenda Why Do You Care? What Are The Risks? What Can You Do? Questions? How can IT help you today? 2.
Viruses Hackers Backups Stuxnet Portfolio Computer viruses are small programs or scripts that can negatively affect the health of your computer. A.
Joel Rosenblatt Director, Computer and Network Security September 10, 2013.
tool kit. USER GUIDE Etiquette (Acceptable use policy) – a list of rules that we observe Use a suitable subject in the - this helps.
Cyber Safety Jamie Salazar.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
Confidentiality, Integrity, Awareness What Does It Mean To You.
Information Security Everyday Best Practices Lock your workstation when you walk away – Hit Ctrl + Alt + Delete Store your passwords securely and don’t.
OCTOBER IS CYBER SECURITY AWARENESS MONTH. October is Cyber Security Awareness Month  Our Cyber Security Awareness Campaign focuses on topics such as.
1 Outline of this module By the end of this module, you will be able to: – Understand what is meant by “identity crime”; – Name the different types of.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
STOP. THINK. CONNECT. Online Safety Quiz. Round 1: Safety and Security.
Copyright © 2008 AusCERT 1 Practical Computer Security See the notes section throughout the slide presentation for additional information.
Common sense solutions to data privacy observed by each employee is the crucial first step toward data security Data Privacy/Data Security Contact IRT.
ICT Laptops Passwords Encryption Back-ups Data Protection and the Internet Viruses Social Networking / Professional Conduct.
BizSmart Lunch & Learn Webinar Information Security and Protecting your business With the increased risk of some sort of cyber- attack over the past few.
Computer Security Keeping you and your computer safe in the digital world.
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
Computer Security  Computer Security:  Password Strength  Windows Screen Saver  Deleting browser cache  Deleting browser cookies  Securing MS Office.
Internet Safety.
Information Security.
Home Computer Security
Staying Austin College
Cybersecurity Awareness
Norton technical support Norton.com/Setup | Norton Setup and Install with Product Key Norton Antvirus Activation For protection against.
Robert Leonard Information Security Manager Hamilton
Top Ten Cyber Security Hygiene Tips
IT Office hours – 1 Data Sharing 101
Presentation transcript:

Helping our customers keep their computers safe

 Using your pet’s, business, family, friend’s names  Using number or letter sequences (0123, abcd)  Using your anniversary, birthday, address, zip code, or even worse…your social security #  Using less than 10 characters  Storing them on your hard drive, on the internet, or posting them on your desk area

 Use a relevant phrase for the type of site. (eg for your auto loan site, think “my$onWheels”  Use different passwords for different sites & machines. If one gets hacked, you can mitigate the likelihood others will be as well  Make it visual – you’ll remember it easier  Make it more than 10 characters  Make it personal-  Include at least 1 from three of the following: ◦ Uppercase ◦ Lowercase ◦ Numbers ◦ Symbols

 Always put passwords on sensitive files, not just the computer itself  Password protect your USB, zip drives and smart phones…these devices are easy to lose or leave somewhere, putting your data in anyone’s hands

 Any information you access or input on an unsecured computer is not safe (this includes coffee shop, library, community, hotel and even some home machines)  Make sure you use your computer in User Mode. Administrator Mode should only be used when necessary to make changes  Ensure your firewalls are enabled and current  Install and keep current up-to-date AntiVirus (and only run 1; multiples installed can create their own problems!). For home users, we recommend Microsoft Security Essentials for Windows and Sophos for Macs. Business and networks need more comprehensive programs. Contact us for a free security assessment at and we can make recommendations to best suit your environment.Microsoft Security Essentials Sophos

 Always lock your computer, whether you are not using it, or just stepping away for a quick break or to speak with a nearby colleague  Always lock your cell phone, especially if you keep it on your desk throughout the day. Cell phones now are like mini computers containing private & sensitive data too

 Don’t leave important and private data on your desk  File and lock sensitive data  Lock your office door when you are not present  Shred documents before discarding

 Just opening or viewing suspicious s can put your computer at risk  Delete or report to IT s that request confidential personal or company information. (Employees, partners, customers won’t use this method for legit requests)  Do not reply to s requesting additional information for processing (ie reward, prize)  Do not click on links unless you are confident the sender is safe (its best to verify before clicking)  Most s about banking, funds, accounts, legal matters are scams

 Games, tools, software, & even antivirus can guise as legit, but when installed will infect your computer. Contact IT before doing any installations to ensure they are safe  Personal devices like flash drives, MP3s and smartphones can unleash harm upon plug in as well, as some computers have code that will compromise the devices. Take care & get approval from IT for plug-ins

 Cyber attacks, scams, and internet fraud pose real threats. Its not enough to just delete s, change passwords, etc…you must report suspicious sites and s to IT or your support providers.  Equally important is to report suspicious activity you may observe, even if it is on the part of a co- worker. It is better to be safe that sorry.

 Stay educated and in contact with your IT department or IT resources provided by your company  At home, have a support resource you can call if you need repairs, or guidance with downloads, security etc.  At ECS, we are available to help you at