Security Squad Keeping your Equipment and Information Safe Security Squad Keeping your Equipment and Information Safe Security Squad Video Series, Part.

Slides:



Advertisements
Similar presentations
POSSIBLE THREATS TO DATA
Advertisements

Cyber Security Quiz By: Alex Alberg. Q. A good password is: A. 8 characters or more B. Contains upper and lower case letters C. Contains special characters.
BP5- METHODS BY WHICH PERSONAL DATA CAN BE PROTECTED Data Protection.
1 Alcatel Onetouch Antivirus. 2 Thinking about security on your smartphone Alcatel OneTouch? We have the solution. Among the applications on your smartphone,
1 MIS 2000 Class 22 System Security Update: Winter 2015.
1 of 2 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2006 Microsoft Corporation.
Mr C Johnston ICT Teacher
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
3 Section C: Installing Software and Upgrades  Web Apps  Mobile Apps  Local Applications  Portable Software  Software Upgrades and Updates  Uninstalling.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Back Up and Recovery Sue Kayton February 2013.
 Lesson 05: Computer Maintenance. Keep Software Up-To-Date Patches Security Holes Improves Software Stability Improves Software Performance Adds.
Viruses & Destructive Programs
Securing Your Home Computer Presenter: Donnie Green Date: February 11, 2009 National Aeronautics and Space Administration
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human.
Data Security GCSE ICT.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
Manjit kaur Manjit Kaur1. Why do we need to protect our computer from a virus? A reason why we need to protect our computer from a virus is because it.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
© 2006 Consumer Jungle Minimizing Online Risks. © 2006 Consumer Jungle 15 Steps to Minimizing Online Risks 1.Update your operating system 2.Use a firewall.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
I T Essentials I Chapter 9 JEOPARDY.
IT Security for Users By Matthew Moody.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
1.1 System Performance Security Module 1 Version 5.
Computer Security By: MacKenzie Olson. To be safer and more secure online, make these seven practices part of your online routine.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
IT security By Tilly Gerlack.
Security Squad Keeping your Equipment and Information Safe Security Squad Keeping your Equipment and Information Safe Security Squad Video Series, Part.
©Holm Publications Security Awareness Presentation.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Computer Security By Rachel Gaines. Computers are used for work, play, and everything in between. So here’s how to keep it fun and protected.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Viruses Hackers Backups Stuxnet Portfolio Computer viruses are small programs or scripts that can negatively affect the health of your computer. A.
Jan 11 Encryption and Hacking. Your Answer Data encryption is used to keep information safe from unauthorised users. Data encryption software makes the.
Incident Security & Confidentiality Integrity Availability.
INTERNET SAFETY FOR KIDS
Computer Security By: Alex Metzler. Table of Contents Protecting Your Personal Info Know Who You’re Dealing With Use Updated Security Software Update.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Internet Safety Internet Safety LPM
Cyber Safety Jamie Salazar.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Society & Computers PowerPoint
Home Computer Security Sponsored by NASA HQ ITCD Special Projects Training Presented by your Computer Training Center.
Onguardonline.gov By Austin Kellogg. Main ideas  Protect your personal information  Know who your dealing with  Use security software that updates.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
Candidates should be able to:  describe the purpose and use of common utility programs for:  computer security (antivirus, spyware protection and firewalls)
Cybersecurity Test Review Introduction to Digital Technology.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Any criminal action perpetrated primarily through the use of a computer.
Mr C Johnston ICT Teacher BTEC IT Unit 09 - Lesson 11 Network Security.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
GCSE Computing: A451 Computer Systems & Programming Topic 3 Software System Software (2) Utility Software.
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
Computer Security Sample security policy Dr Alexei Vernitski.
Common sense solutions to data privacy observed by each employee is the crucial first step toward data security Data Privacy/Data Security Contact IRT.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Technological Awareness for Teens and Young Adults.
Computer Security Keeping you and your computer safe in the digital world.
Virus Removal Support Services. H OW TO K EEP Y OUR C OMPUTER F REE F ROM V IRUS T HREAT ? Virus can attack your PC any time without any.
Protection of Data 31 Protection of Data 31. Protection of Data 31 Having looked at threats, we’ll now look at ways to protect data: Physical Barriers.
Computer Security  Computer Security:  Password Strength  Windows Screen Saver  Deleting browser cache  Deleting browser cookies  Securing MS Office.
Intro to Digital Technology Review for Final Introduction to Digital Technology Finals Seniors Monday, 5/16 – 2 nd Tuesday 5/17 – 1 st,3 rd Underclassmen.
Business Risks of Insecure Networks
1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.
Presentation transcript:

Security Squad Keeping your Equipment and Information Safe Security Squad Keeping your Equipment and Information Safe Security Squad Video Series, Part 1 Presenter, Title University of ________________ 8/26/2015Security Squad Video Series

1.Greater understanding why security is needed to protect your business 2.Recognition of small business security concerns 3.Basic knowledge of tools and actions needed to fix security gaps Security Plan Objectives 8/26/2015Security Squad Video Series

8/26/2015Security Squad Video Series The Security Plan Plan Overview

Data loss and equipment failures are expensive Identify theft is a serious problem Mistakes do happen Most critical loss areas can be fixed Why Develop a Plan 8/26/2015Security Squad Video Series

Inventory – Tallying What you Have Passwords – Creating Strong Passwords Backups – Making Secured Copies Viruses – Protecting Your Office from Malware Wireless – Limiting Your Exposure Firewalls – Stopping Hackers at the Door E-commerce – Buying and Selling Safely Online Employee Policies – Protecting the Company and Employees Security Plan Topics 8/26/2015Security Squad Video Series

You Trusted employee/s Technician/s Human Resources (if applicable) Security Squad Team 8/26/2015Security Squad Video Series

8/26/2015Security Squad Video Series Equipment and Software Inventory Tallying What You Have

Develop an inventory management system Items to record are: – Model – Date Purchased and price – Serial number – IP Address – MAC Address – Location & Primary users – Warranty dates Key Points – Equipment List 8/26/2015Security Squad Video Series

Items to record are: – Description – Version – Date purchased – Operating license, serial number or key code – Primary users and location Key Points – Software List 8/26/2015Security Squad Video Series

Store copies in a secured, off-site location Permanently label equipment Update list regularly Assign person to maintain list Good Inventory Practices 8/26/2015Security Squad Video Series

8/26/2015Security Squad Video Series InventoryInventory What is your current inventory process? Do you even have an inventory list? Is it up-to-date? Do you have all the needed information? Who’s in charge of keeping the inventory list current?

8/26/2015Security Squad Video Series PasswordsPasswords Creating Strong Passwords

Random letters, numbers and symbols At least 8 characters long No words found in dictionary No names, teams, abbreviations, shows, movies, hobbies or anything readily recognizable. Good Passwords 8/26/2015Security Squad Video Series Junebug24 vs. J*9!b$G!

Secure passwords in a secured location Use a password generator and “lock box” to secure passwords (optional) Do not use “remember password” feature Never share passwords with anyone Do not use default passwords, change them Install password activated screen savers Change passwords immediately if they’ve been compromised Good Password Practices 8/26/2015Security Squad Video Series

8/26/2015Security Squad Video Series BackupsBackups Making Secured Copies

Determine how often to backup your systems – Weekly vs. Daily Backup plan – Incremental, multi-layer – Only data files – Entire system backup Key Points – Backing Up 8/26/2015Security Squad Video Series

Select storage devices – USB flash drives – DVDs – External hard drives Online backup – End-to-end encryption – Needs larger bandwidth Key Points – Backing Up 8/26/2015Security Squad Video Series

8/26/2015Security Squad Video Series BackupsBackups What is your current backup system? How often are you files backed up? How are they stored? Who’s in charge of backing up files?

8/26/2015Security Squad Video Series VirusesViruses Protecting Your Office from Malware

Key Points – Viruses 8/26/2015Security Squad Video Series Anti-virus musts Install on every computer! Schedule automatic updates Use only one anti-virus software Scan incoming files

Key Points – Viruses 8/26/2015Security Squad Video Series Computer Update musts: Download latest OS “fix or patches” Schedule automatic updates

Good Prevention Practices 8/26/2015Security Squad Video Series Uncertain attachments Block known carrier files -.exe,.bat Block files with more than one file extension – happydays.jpg.vbs Use only reputable websites Delete spam s Install anti-virus on smart phones Conduct employee training

Malware Definitions 8/26/2015Security Squad Video Series Virus Trojan Worm Adware Spyware Crimeware Keystroke logging

Famous Viruses 8/26/2015Security Squad Video Series FREUDIAN VIRUS: Your computer becomes obsessed with marrying its own motherboard. ADAM AND EVE VIRUS Takes a couple of bytes out of your Apple computer. AIRLINE VIRUS You're in Dallas, but your data is in Singapore. ELVIS VIRUS Your computer gets fat, slow and lazy, then self- destructs -- only to resurface at shopping malls and service stations across rural America.

8/26/2015Security Squad Video Series Anti-Virus Protection What is the status of computer protections? Is the anti-virus software current? Is it set be automatically update? Who’s in charge of keeping computer protections current?

Security Squad – Part 2 Workshop to be held: Security Squad – Part 2 Workshop to be held: Contact: _________________________ _________________________ 8/26/2015Security Squad Video Series