ESCCO Data Security Training David Dixon September 2014.

Slides:



Advertisements
Similar presentations
Internet Safety at Work Protect company, customer, and your data online.
Advertisements

Pennsylvania BANNER Users Group 2007 Disaster Recover For The Financial Aid Environment.
ANNUAL SECURITY AWARENESS TRAINING – 2011 UMW Information Technology Security Program Annual Security Awareness Training for UMW Faculty and Staff.
Cyber Safety Assessment Review
Computer and Mobile Device Equipment Security Brief May 29, 2008 Presented by: Kevin G. Sutton, Chief, Information Technology Unit.
Helping our customers keep their computers safe.  Using your pet’s, business, family, friend’s names  Using number or letter sequences (0123, abcd)
HIPAA Basic Training for Privacy & Information Security Vanderbilt University Medical Center VUMC HIPAA Website:
Part 2 of Evil Lurking in Websites Data Security at the University of Wisconsin Oshkosh.
SAFEGUARDING DHS CLIENT DATA PART 2 SAFEGUARDING PHI AND HIPAA Safeguards must: Protect PHI from accidental or intentional unauthorized use/disclosure.
9/20/07 STLSecurity is Everyone's Responsibility 1 FHDA Technology Security Awareness.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 18, 20 & 25 March 2015.
Beyond WiFi: Securing Your Mobile Devices Thomas Kuhn Information Technology Assistance Center (iTAC) Kansas State University.
1 Enterprise Security Your Information Security and Privacy Responsibilities © 2008 Providence Health & Services This information may be replicated for.
October is National Cyber Security Month OIT and IT providers are launching an awareness campaign to provide tips and resources to help you stay safe online.
New Faculty Orientation to Privacy and Security at UF Susan Blair, Chief Privacy Officer Kathy Bergsma, Information Security.
10 Essential Security Measures PA Turnpike Commission.
HIPAA Basic Training for Privacy and Information Security Vanderbilt University Medical Center VUMC HIPAA Website: HIPAA Basic.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Protecting Yourself Online (Information Assurance)
Information guide.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Security Awareness ITS SECURITY TRAINING. Why am I here ? Isn’t security an IT problem ?  Technology can address only a small fraction of security risks.
Information Security and YOU!. Information Assurance Outreach Information Security Online Security Remote Access with Demonstration The Cloud Social.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
Wireless Security: Protect yourself when you’re mobile.
Social Networks Cyberbullying Techno Addiction Digital footprint Spam Internet shopping The positive side Netiquette.
Privacy and Information Management ICT Guidelines.
Safeguarding Your Privacy Section 1.3. Safeguarding Your Privacy 1. What is Identity Theft? 2. Research a story on identity theft and be prepared to report.
Information Security Awareness Training. Why Information Security? Information is a valuable asset for all kinds of business More and more information.
INFORMATION SECURITY WHAT IS IT? Information Security The protection of Information Systems against unauthorized access to or modification of information,
PHYSICAL ITSECURITY scope. 1.What is password security?. 2.Why can't I tell anyone my password? 3.What about writing my password down 4.Social engineering.
How to be Safe Online. Online Access How many of you go online? What are your favorite things to do online? Who accesses the Internet from their smart.
Joel Rosenblatt Director, Computer and Network Security September 10, 2013.
ONE® Pages Training Presentation North York General Hospital.
@ BCHS. The School Policy is your guide to ensuring you and your students are safe. It is your responsibility to make yourself aware and familiar with.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
How to set up an account- Non-Technical Aimee Lilley.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Information Security Everyday Best Practices Lock your workstation when you walk away – Hit Ctrl + Alt + Delete Store your passwords securely and don’t.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
OCTOBER IS CYBER SECURITY AWARENESS MONTH. October is Cyber Security Awareness Month  Our Cyber Security Awareness Campaign focuses on topics such as.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
STOP. THINK. CONNECT. Online Safety Quiz. Round 1: Safety and Security.
Common sense solutions to data privacy observed by each employee is the crucial first step toward data security Data Privacy/Data Security Contact IRT.
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
Two account types on this campus: UWB Access AccountUW NetID Account & 1.Not everyone has one as it must be requested by your supervisor 2.You are.
Protecting PHI & PII 12/30/2017 6:45 AM
A Lawyer’s Ethical Duties Regarding Electronically Stored Information
INFORMATION TECHNOLOGY NEW USER ORIENTATION
How to use the internet safely and How to protect my personal data?
Information Security.
Ways to protect yourself against hackers
How to use the internet safely and How to protect my personal data?
Unit 4 IT Security.
Staying Austin College
STOP. THINK. CONNECT. Online Safety Quiz.
Information Security Awareness 101
Information Technology Services Education and Awareness Team
Robert Leonard Information Security Manager Hamilton
ONE® Pages Training Presentation
Digital $$ Quiz Test your knowledge.
HOW TO KEEP YOUR CHILDREN SAFE AT SCHOOL AND HOME
INFORMATION TECHNOLOGY NEW USER ORIENTATION
INFORMATION TECHNOLOGY NEW USER ORIENTATION
HIPAA Overview.
Internet Safety – Social Media
Information Technology Services Education and Awareness Team
Handling Information Securely
Presentation transcript:

ESCCO Data Security Training David Dixon September 2014

What is data security? For our purposes data security simply means keeping information safely in your possession or in the hands of a trusted recipient

When do I need to think about it? You need to think about data security whenever you are accessing, saving, or ing data

Are there legal requirements we have to follow? “FERPA”  Family Educational Rights and Privacy Act of 1974 “HIPAA”  Health Insurance Portability and Accountability Act of 1996

Is this going to get really complicated? The technical aspects of this topic can be highly complex However, basic awareness and a few simple guidelines can make your data less vulnerable

RED FLAGS! Social Security Numbers Student Disability Information Student Test Scores Purchasing Card Numbers Discipline Data  Any information that you would not want to share publicly

Accessing Information DOs Create passwords including upper and lowercase letters, numbers, and symbols when possible  GOOD3xamp!e  $h0CA$E Change passwords periodically Use different passwords for each account DON’Ts Don’t access agency information from either a public computer or public network (e.g. library or coffee shop) Don’t share or store your usernames or passwords where others can access them The ESC will never contact you to confirm your user name and password

Accessing Information Continued Trouble remembering all those passwords? –If you cannot remember your passwords, then consider using a password management tool

Saving Files DOs Only save sensitive files on your ESC issued computer DON’Ts Don’t save sensitive files on a public computer, home computer, or mobile device (e.g. library computer or cell phone) Don’t save sensitive files on a thumb drive/flash drive

Sending Files Securely When To Encrypt When in doubt, encrypt your attachments Any time you send sensitive information to a address encrypt it When practical, avoid sending sensitive information

Sending Files Continued How To Encrypt Encrypting files using Zip Mail is as easy as typing a password when attaching a file Only information within the attachment is encrypted; the message is not secure Do not include the password in the same as the attachment

Tips for Mobile DOs Protect your laptop, phone, or tablet (iPad) with a password Store your mobile device in a safe (locked) location Check to make sure you only connect to secure wireless networks (password required) File a police report and contact your supervisor and the Help Desk immediately if you believe your device has been stolen

Tips for Mobile Continued DON’Ts Don’t store your mobile device in your car Don’t leave your mobile device unattended in a public place such as a coffee shop or conference center Don’t connect your agency issued mobile device to unsecured wireless networks (no password required)

Online Behavior Do not share student or staff information over ListServs, discussion boards, or social media websites (e.g. facebook or twitter) Keep in mind that we all have a “digital footprint” documenting almost everything we do, say, and post online (or that someone else posts about us)

General Tips 1)Be wary of suspicious s or text messages  when in doubt, delete! 2)Never store agency information online (“on the cloud”) unless specifically directed to by the ESC 3)Never share personally identifiable information with someone who you don’t know and trust 4)Be sure to lock or logoff from computers and mobile devices when not in use  If you need assistance resetting passwords or encrypting files please contact the Technology Help Desk at or

THANK YOU!