The Importance of Information Security for Parkers Office Products.

Slides:



Advertisements
Similar presentations
Surfing the net: Ways to protect yourself. Internet Safety Look into safeguarding programs or options your online service provider might offer. Look into.
Advertisements

Mobile device security Practical advice on how to keep your mobile device and the data on it safe.
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
A note for you We have created this presentation for you, the outstanding employee who has IT security on the brain. We want to help you spread the word.
Copyright © 2012, Big I Advantage®, Inc., and Swiss Re Corporate Solutions. All rights reserved. (Ed. 08/12 -1) E&O RISK MANAGEMENT: MEETING THE CHALLENGE.
Helping our customers keep their computers safe.  Using your pet’s, business, family, friend’s names  Using number or letter sequences (0123, abcd)
PGCPS Security Awareness Summary L2-ME Heading: SummaryPage GUID: L2-LO-89880Page Number: Gfx GUID: L2-ME Body Text:
HIPAA. What Why Who How When What Is HIPAA? Health Insurance Portability & Accountability Act of 1996.
1 HIPAA Education CCAC Professional Development Training September 2006 CCAC Professional Development Training September 2006.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 25 & 27 November 2013.
Victoria ISD Common Sense Media Grade 6: Scams and schemes
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
Data Security for Healthcare Facilities Debbie Abbott Health Information Consultant Resolutions (Int) Pty Ltd.
Greg Lamb. Introduction It is clear that we as consumers and entrepreneurs cannot expect complete privacy when discussing business matters. However… There.
1 CAN YOU BELIEVE THIS?. 1 In Jacksonville FL A woman brought her teenage daughter to work at the hospital, and left her unattended at a logged in computer.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 18, 20 & 25 March 2015.
McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Chapter 8 Threats and Safeguards Chapter 8 PROTECTING PEOPLE AND INFORMATION Threats.
October is National Cyber Security Month OIT and IT providers are launching an awareness campaign to provide tips and resources to help you stay safe online.
کامیار نیرومند کارشناس تیم تجهیزات مرکز تخصصی آپا دانشگاه صنعتی اصفهان پاییز
Security Awareness Cloud Phishing Attacks
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
Computer Security: Principles and Practice
HIPAA Privacy & Security EVMS Health Services 2004 Training.
E-Safety Challenge College. Learning Objectives To assess the risks faced when online and how to use the options available to protect yourself.
1 Title ECI: Anatomy of a Cyber Investigation Who Are the Actors.
© 2009 IDBI Intech, Inc. All rights reserved.IDBI Intech Confidential 1 Information (Data) Security & Risk Mitigation.
PRIVACY BOOTCAMP YpJU.
Scams & Schemes Common Sense Media.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Cyber Security. Security – It’s About Layers There’s no one stop solution to protection Each layer you add, an additional tool will be needed to pierce.
EFFECT OF CORPORATE IT POLICIES ON OTHERWISE PRIVILEGED COMMUNICATIONS Prepared by Joel P. Hoxie of Snell & Wilmer November 2010 Presented by: Jon Barton.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
-Tyler. Social/Ethical Concern Security -Sony’s Playstation Network (PSN) hacked in April Hacker gained access to personal information -May have.
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
General Awareness Training Security Awareness Module 3 Take Action! Where To Go for Help.
Use of U.T. Austin Property Computers: Security & Acceptable Use The University of Texas at Austin General Compliance Training Program.
Monitoring Employees on Networks: Unethical or Good Business?
STARTFINISH DisposePrint & ScanShareStore Protect information and equipment ClassifyProtect.
TOP 10 TECHNOLOGY INITIATIVES © Robert G. Parker S-1 Issues Loss or theft of mobile devices Lack of MDM (mobile device management) software Cloud.
Keeping Children Safe in the Digital Age Christina Hefele K-12 Technology Coordinator Darien Public School.
What are ____ 1 ______? Rules of behavior that you should follow when using computers and the Internet for the rest of your life Plank Jr. High – Tech.
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
PRIVACY BOOTCAMP Jack Vale - Social Media Experiement.
Session 13 Cyber-security and cybercrime. Contents  What’s the issue?  Why should we care?  What are the risks?  How do they do it?  How do we protect.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
Cyber Security in the Mobile Era KEEPING ENTERPRISE DATA SAFE IN THE BYOD ERA.
WHAT IS CYBER SECURITY? Governments, military, corporations, financial institutions, hospitals and other businesses collect, process and store a great.
1 Figure 1-6: Attacks and Defenses (Study Figure) Access Control  Access control is the body of strategies and practices that a company uses to prevent.
Zemana AntiLogger (2012) Zemana AntiLogger (2012) Zemana Antilogger has been specifically developed to protect PC from numerous security.
BizSmart Lunch & Learn Webinar Information Security and Protecting your business With the increased risk of some sort of cyber- attack over the past few.
Mobile device security Practical advice on how to keep your mobile device and the data on it safe.
Building Our IT Security Lines of Defense Working together to protect Government’s IT systems.
Allison Gladkowski.  About privacy and why it matters  Spyware and spam vocabulary and examples  Identity theft  Unapproved access  Today's big issues.
E&O Risk Management: Meeting the Challenge of Change
Protection of CONSUMER information
Key behavior # 1 Be Secure Awareness Quiz
Business Risks of Insecure Networks
Year 10 ICT ECDL/ICDL IT Security.
Chapter 3: IRS and FTC Data Security Rules
Cybersecurity Awareness
Information Security and Travel-related Security
Health Insurance Portability and Accountability Act of 1996 (HIPAA)
Dear Students,   The school holidays are just around the corner. When spending time online during the school holidays, you should be aware of good practices.
IT & Security Training Skills.
Social Issues in Computing
Social Issues in Computing
Cybercrime By: Kimberly Foreiter
Protecting Student Data
Presentation transcript:

The Importance of Information Security for Parkers Office Products

Why Is Protecting Parker’s Information Important Company liability Employee liability Risks from Parker’s competition

Common Practices and Habits That Put Information At Risk Sharing passwords Using company devices and for personal use Using unsecure internet access Leaving company devices or assets unattended Discussion of company information with 3 rd parties, eavesdropping, and “Blabbermouth ”

Sharing Passwords Reasons or excuses for this: “It was just too busy…..” “I wasn’t there and letting them do it was easier….” “It’s always been ok…….”

Sharing Passwords Cont. What this can lead too: Conflicts with management and employees “He said, she said” situations Possibility of misuse, i.e.: theft, access to confidential information, etc.

Using Company Devices for Personal Use This includes: Personal internet browsing/use Personal use of company Gaming

Using Company Devices for Personal Use Continued Risks this incurs: Cyber attacks: viruses, malware, etc. Spam in company accounts Sharing of company and employee confidential information

Using Unsecure Internet Access Unsecure or Public internet access: Restaurants Stores Libraries Schools This can lead to: Cyber attacks 3 rd party eavesdropping or others seeing information on the screen

Leaving Company Assets Unattended Leaving a device unattended while logged in Leaving a device in a vehicle Lack of diligence while using company vehicles

Discussion of Parker’s Information With 3 rd Parties Discussion of information with: Employees Family Friends Customers Competitors

Eavesdropping Eliminate eavesdropping: Be aware of who’s listening Speak softly, especially when emotional If need be, take your conversation elsewhere If you can hear another conversation that’s confidential, remove yourself immediately

“Blabbermouth” Keep confidential information, CONFIDENTIAL! No one ever wins or benefits from gossip 3 rd party discussion, eavesdropping, and blabbermouth can lead to termination, liability, etc. Can lead to loss of business

Summary Do not share passwords, for any reason Do not misuse company devices or services Always use a secure internet access Do not discuss company info with 3 rd parties Eliminate eavesdropping and blabbermouth