Part 2 of Evil Lurking in Websites Data Security at the University of Wisconsin Oshkosh.

Slides:



Advertisements
Similar presentations
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Advertisements

Darton College Information Systems Use Policies. Introduction Dartons Information Systems are critical resources. The Information Systems Use Policies.
ANNUAL SECURITY AWARENESS TRAINING – 2011 UMW Information Technology Security Program Annual Security Awareness Training for UMW Faculty and Staff.
Welcome to the SPH Information Security Learning Module.
Helping our customers keep their computers safe.  Using your pet’s, business, family, friend’s names  Using number or letter sequences (0123, abcd)
Windows XP Tutorial Securing Windows. Introduction This presentation will guide you through basic security principles for Windows XP.
Setting Up Dropbox PCNA: HOW TO SETUP & SYNC FILES WITH DROPBOX.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 25 & 27 November 2013.
1 Electronic Information Security – What Researchers Need to Know University of California Office of the President Office of Research May 2005.
For further information computersecurity.wlu.ca
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Information Security Awareness:
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 18, 20 & 25 March 2015.
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
October is National Cyber Security Month OIT and IT providers are launching an awareness campaign to provide tips and resources to help you stay safe online.
Sensitive Data Accessibility Financial Management College of Education Michigan State University.
10 Essential Security Measures PA Turnpike Commission.
Penn State University College Of Education Understanding College of Education Resources.
Protect against viruses, malware, misuse and theft Protect against data theft or loss, identity theft and fraud Avoid scams, savvy social networking and.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
1 Technology Orientation. 2 Acceptable Use Policy.
Security Awareness ITS SECURITY TRAINING. Why am I here ? Isn’t security an IT problem ?  Technology can address only a small fraction of security risks.
ESCCO Data Security Training David Dixon September 2014.
DHCH IT Orientation Introduction to DHCH Computer and Information Systems.
 Academic   Administrative ◦ Departments  Desktop Services  Networking & Telecommunications  Computer Center ◦ Office of Computer and Information.
IT security By Tilly Gerlack.
IT Security Essentials Lesley A. Bidwell, IT Security Administrator.
Malicious Attack Corporate Awareness and Walk through Date 29 September 2011.
Information Services Overview An introduction to DePaul’s technology especially for new employees.
University Health Care Computer Systems Fellows, Residents, & Interns.
Information Security Awareness Training. Why Information Security? Information is a valuable asset for all kinds of business More and more information.
COMPUTER SECURITY BEST PRACTICES. SECURE YOUR STUFF!  Physically secure your workstation by locking your screen when away  Secure any small, easy to.
Security Training USAID Information Security.
Specialist communication channel. Sarah-Jane king.
STARTFINISH DisposePrint & ScanShareStore Protect information and equipment ClassifyProtect.
Cyber Security Awareness Month Using Your Laptop Safely On the Road Off-Campus Safe Computing Part 2.
INTERNET: The Good, The Bad and The Ugly
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
NC Wise Security & Passwords Revised: July 29, 2008 Developed by: Jennifer Jenkins, Cabarrus County Schools.
TRUENORTH TECHNOLOGY POLICIES OVERVIEW. This includes but is not limited to : – Games – Non-work related software – Streaming media applications – Mobile.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Cybersecurity Test Review Introduction to Digital Technology.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Information Security Everyday Best Practices Lock your workstation when you walk away – Hit Ctrl + Alt + Delete Store your passwords securely and don’t.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
OCTOBER IS CYBER SECURITY AWARENESS MONTH. October is Cyber Security Awareness Month  Our Cyber Security Awareness Campaign focuses on topics such as.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Personal Data Protection and Security Measures Kelvin Lai IT Services - Information Security Team 12 & 13 April 2016.
Account & Google Message Center Guide August 2015 Prepared by: Angela Mars IT Education and Training.
Copyright © 2008 AusCERT 1 Practical Computer Security See the notes section throughout the slide presentation for additional information.
Common sense solutions to data privacy observed by each employee is the crucial first step toward data security Data Privacy/Data Security Contact IRT.
The internet is a place of both useful and bad information. It has both good and bad side- and it’s all too easy for kids to stray into it. And no parents/guardian.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
2015Computer Services – Information Security| Information Security Training Budget Officers.
Windows Vista Configuration MCTS : Productivity Applications.
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
Two account types on this campus: UWB Access AccountUW NetID Account & 1.Not everyone has one as it must be requested by your supervisor 2.You are.
Information Technology Security Office of the Vice President for Information Technology New Employee Orientation II.
POLICIES & PROCEDURES FOR HANDLING CONFIDENTIAL INFORMATION NOVEMBER 5 TH 2015.
Information Security Awareness Training
Account & Google Message Center Guide August 2015 Prepared by: Angela Mars IT Education and Training.
Staying Austin College
Things To Avoid: 1-Never your password to anyone.
Lesson 2: Epic Security Considerations
Lesson 2: Epic Security Considerations
Division of Engineering Computing Services
Presentation transcript:

Part 2 of Evil Lurking in Websites Data Security at the University of Wisconsin Oshkosh

How Do We Protect the Data? What Data are We Protecting? How We Classify University Data Who Is Responsible for Protecting the Data? Our Top 10 Recommendations for Data Protection

UW Oshkosh Data Classifications

Data Security: It Takes the Whole University Community Security Officer and IT staff in Academic Computing, Administrative Computing and Networking Technical Solutions such as firewalls, virus protection, Websense, Identity Finder Data Classifications with alternatives for storage and usage IT cannot do data security alone! Securing the Human!

User Awareness is Essential Security Advisory Group – Website, etc. Demonstrations - What You Just Saw Top 10 Tips/Guidelines for UW Oshkosh Community

Top 10 Ways to Protect Confidential Data: # 1 1. Store confidential data only on departmental shared drives. Do not store it on your desktop Do not store it on personal devices Do not store it on Google drive Do not store it in Titan Files Do not store it on public web sites Do not it Do not store it in a dropbox

Top 10 Ways to Protect Confidential Data: # 2 2. If your computer accesses confidential data, do not shop or access news or social media for personal purposes. Issues with shopping Issues with news sites and social media If there are business purposes for these activities, ideal solution is isolated, restricted workstations.

Top 10 Ways to Protect Confidential Data: # 3 3: Avoid phishing attempts. What is phishing? Think before you click on links in messages. Beware of links that look legitimate but are not (e.g. ebay.something.com). Do not respond to ed (or phoned or in- person) requests for your login information or passwords.

Top 10 Ways to Protect Confidential Data: # 4 4 : Practice good password hygiene. Do not share passwords with anyone. Use strong passwords (not things that anyone could know about you like your birthday or your pet's name and mix case, letters, numbers and symbols). Try not write passwords down; if you must, store in locked location. Password protect your mobile devices.

Top 10 Ways to Protect Confidential Data: # 5 5. Lock your computer when you are not at your desk. For Microsoft Windows, click Control_Alt_Delete and select "Lock this Computer.") Or click the Windows Symbol and L. For Mac OS X, set your screen saver to require a password via the System Preferences "Security and Privacy panel; then in the "Desktop & Screen Saver" panel, under "Screen Saver," use the "Hot Corners" button to turn on your screen saver by moving your mouse to one of your desktop corners.

Top 10 Ways to Protect Confidential Data: # 6 6. Do not install non-work related software on your university computer. Do not install games on your computer. Do not share your computer with anyone.

Top 10 Ways to Protect Confidential Data: # 7 7. Do not access or store confidential or sensitive data in databases that are not secured or encrypted. Are these databases really needed? Can a larger system give you needed info more securely? If needed, how and where can these databases be stored? If in doubt, contact the Help Desk.

Top 10 Ways to Protect Confidential Data: # 8 8. Make sure that the virus protection on your computer is current and pay attention to results of scan. Scan does not solve problem, it simply identifies the problem If you notice any problems after scan (even if quarantined), always contact the Help Desk!

Top 10 Ways to Protect Confidential Data: # 9 9. Manage your accounts responsibly. Everyone should only have the access needed for his/her job. If you are a supervisor, make sure staff accounts are appropriate and that accounts are locked when staff retire, resign or transfer.

Top 10 Ways to Protect Confidential Data: # If you must access confidential University data from off- campus, contact the Help Desk for options. Only with University owned computers Obtain Supervisor’s approval and contact the Help Desk for options such as VPN if using shared directories Never let anyone else off-campus use the University owned computer Follow Tips 1-9 with this computer (only as safe as computer is clean)

Conclusion Questions? Thank you! Contact Information Richard Montano Julie Wilkinson