Computer and Physical Security Recommendations. Assure that computers and work locations are secured when work areas are not staffed.  Log-off or lock.

Slides:



Advertisements
Similar presentations
Privacy and Information Security Training ( ) VUMC Privacy Website
Advertisements

FAIR AND ACCURATE CREDIT TRANSACTIONS ACT (FACTA)- RED FLAG RULES University of Washington Red Flag Rules Protecting Against Identity Fraud.
1 Electronic Information Security – What Researchers Need to Know University of California Office of the President Office of Research May 2005.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Guide to Massachusetts Data Privacy Laws & Steps you can take towards Compliance.
Information and Technology Services Customer Services.
9/20/07 STLSecurity is Everyone's Responsibility 1 FHDA Technology Security Awareness.
The Internet = A World of Opportunities
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 18, 20 & 25 March 2015.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Created by Dragon Lee May Computer Virus What is computer virus? Computer virus refers to a program which damages computer systems and/or destroys.
10 Essential Security Measures PA Turnpike Commission.
Information about the computer By Sophia and Christina C.
1 Computer Security: Protect your PC and Protect Yourself.
Computing Fundamentals Module Lesson 3 — Maintaining and Protecting Hardware Computer Literacy BASICS.
Effective Customer Service: Exploring the process from beginning to end.
Internet safety By Lydia Snowden.
Course: Introduction to Computers Lecture: 6.  Commercial software is covered by Copyrights.  You have to pay for it and register to have the license.
UNIT 3C Security of Information. SECURITY OF INFORMATION Firms use passwords to prevent unauthorised access to computer files. They should be made up.
Security Squad Keeping your Equipment and Information Safe Security Squad Keeping your Equipment and Information Safe Security Squad Video Series, Part.
Over 3,000 computers are affected monthly by Malware and Phishing.
First Community Bank Prevx Safe Online Rollout & Best Practice Presentation.
Manjit kaur Manjit Kaur1. Why do we need to protect our computer from a virus? A reason why we need to protect our computer from a virus is because it.
Securing Information in the Higher Education Office.
Program Objective Security Basics
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
HIPAA Privacy & Security Kay Carolin Barbara Ann Karmanos Cancer Center March 2009.
Learning Objectives Discuss measures to address: –Physical Security –Technical Security –Administrative Security.
Introduction to Information and Computer Science Security Lecture b This material (Comp4_Unit8b) was developed by Oregon Health and Science University,
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 5 1 Control Panel Applets.
Keeping your computer current and trouble free Aaron Robertson.
GCSE ICT Viruses, Security & Hacking. Introduction to Viruses – what is a virus? Computer virus definition - Malicious code of computer programming How.
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 2 This material was developed by Oregon Health & Science University,
 The front desk is perhaps the first stop for many students.  It is very important to keep the area clean, organized and professional in appearance.
DECS Community IT DIVISION OF ENGINEERING COMPUTING SERVICES Michigan State University College of Engineering.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
©Holm Publications Security Awareness Presentation.
Information Services Overview An introduction to DePaul’s technology especially for new employees.
Privacy and Information Management ICT Guidelines.
University Health Care Computer Systems Fellows, Residents, & Interns.
Desktop computer security policies Applies to ALL computers connecting to the PathStone network irrespective of device ownership.
Computer Literacy BASICS
System Security Chapter no 16. Computer Security Computer security is concerned with taking care of hardware, Software and data The cost of creating data.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
What is computer virus? Computer virus refers to a program which damages computer systems and/or destroys or erases data files.
Security Training USAID Information Security.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Manjit kaur Manjit Kaur1. Why do we need to protect our computer from a virus? A reason why we need to protect our computer from a virus is because it.
Cost of Ownership of a PC Acknowledgements to Euan Wilson (Staffordshire University)
Module 15 Managing Windows Server® 2008 Backup and Restore.
XP Practical PC, 3e Chapter 6 1 Protecting Your Files.
Chapter 3 Installing and Learning Software. 2Practical PC 5 th Edition Chapter 3 Getting Started In this Chapter, you will learn: − What is in an application.
SECURITY OF INFORMATION Unit 3c. Click to return to Sum up page HOW TO PROTECT DATA AND COMPUTERS Computers can be locked in a room CCTV and alarms to.
Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.
Computer Security By: Alex Metzler. Table of Contents Protecting Your Personal Info Know Who You’re Dealing With Use Updated Security Software Update.
Confidentiality Region 7 Education Service Center Head Start Copyright 2013 by Region 7 Education Service Center. This document may be reproduced for educational.
Ryhooooma1 Main Frame. Ryhooooma2 Mouse Monitor System Case Hard disk Drag each graphic to the box contains its description.
1 COMPUTER LAB REGULATION
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Computer virus (W). A virus is a piece of software or programming that can be extremely harmful to computer. It damages your computer by taking over your.
McAfee Antivirus Support By PCCare247 PCCare247 – Caring For Your PCs 24x7.
Computer Security Keeping you and your computer safe in the digital world.
Philip J. Beyer, Information Security Officer John P. Skaarup, Sr. Security Engineer Texas Education Agency Information Security.
Two account types on this campus: UWB Access AccountUW NetID Account & 1.Not everyone has one as it must be requested by your supervisor 2.You are.
Antivirus Support Phone Number + 1-(844) One Step IT Solutions December 6, 2017
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Things To Avoid: 1-Never your password to anyone.
Part 3.
HIPAA SECURITY RULE Copyright © 2008, 2006, 2004 by Saunders an imprint of Elsevier Inc. All rights reserved.
Presentation transcript:

Computer and Physical Security Recommendations

Assure that computers and work locations are secured when work areas are not staffed.  Log-off or lock your PC’s screen when you leave the immediate work area… Meetings, Breaks, Lunches, End-of-the-day…  Shut Down PCs at the Close of Business each day…  Assure that work areas are kept locked…

Don’t allow NON-STAFF persons to use STAFF PCs or workstations  Student Casual Workers  Children or Family members  Visitors  Friends  Unknown persons ???

Know who is accessing the STAFF PCs around you.  Question anyone who comes in to FIX, UPGRADE, REPAIR or REMOVE any computer equipment.  If you are un-sure if the Repair Person is Genuine STOP THEM… Call the ITS Help Desk to verify their identity Locate Online Photos of ITS Technical Staff at the ITS: Tech Services Web Page  Report any un-authorized access immediately to your Supervisor or Dean and the ITS: Help Desk…  As a last resort if you are unable to verify the identity of any repair person immediately - Call Campus Police …

Beware of what files you store on your PC.  NO - Confidential information  NO - Disciplinary information  NO - Personal Private information  NO - Unauthorized Software

Safely Store Back-up CDs or Data Diskettes away from harm…  Use a Sturdy diskette storage box  Lock the Storage Box in a Secure Storage Location Locked File Cabinet  Never store diskettes or CDs out in the open…

Dispose of Diskettes CDs or Backup tapes correctly.  Re-format Destroy all data diskettes or CDs before throwing them away… Break the diskette cover and remove the disk Cut up the disk or CD with scissors to assure destruction Safely throw away all parts

Safeguard any Original Software CDs, Manuals or Licenses  Store in a Locked Secure Location  Record any License Numbers  Don’t loan out software to others…

Maintain the Antivirus Software for your PCs  Assure Antivirus Software is loaded and operating on your PC  Setup the Antivirus Software to automatically update the scanning data files - Daily  Check the Antivirus Program and Data Files – Weekly  Scan your Computer for Viruses – Twice a week  Updates for the McAfee Software is available on the ITS: Tech Services Web Page

ITS: Technical Services Web Pages  Online Work Orders for Computer and Audio Visual Repairs  Antivirus Software Updates  ITS: Technical Staff Pages Names, Photos, Addresses, Phone Numbers…  Computer and Printer Hardware Recommendations  Access to Software and Hardware Vendor Web Pages