Co-hosted by Presents Where’s Your Data www.We-Are-IT.com 816-941-6800.

Slides:



Advertisements
Similar presentations
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 25 & 27 November 2013.
Advertisements

Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Protecting Your Identity: What to Know, What to Do.
Deter, Detect, Defend: The FTC’s Program on Identity Theft.
Part 2 of Evil Lurking in Websites Data Security at the University of Wisconsin Oshkosh.
Guide to Massachusetts Data Privacy Laws & Steps you can take towards Compliance.
Security Awareness Lloyd Guyot – Steelcase Ed Jaros – Tenundra Inc. July 17, 2003.
9/20/07 STLSecurity is Everyone's Responsibility 1 FHDA Technology Security Awareness.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
Locking the Backdoor: Computer Security and Medical Office Practice Dr. Maury Pinsk, FRCPC University of Alberta Division of Pediatric Nephrology.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 18, 20 & 25 March 2015.
Beyond WiFi: Securing Your Mobile Devices Thomas Kuhn Information Technology Assistance Center (iTAC) Kansas State University.
October is National Cyber Security Month OIT and IT providers are launching an awareness campaign to provide tips and resources to help you stay safe online.
Sensitive Data Accessibility Financial Management College of Education Michigan State University.
How To Protect Your Privacy and Avoid Identity Theft Online.
COMM 1010 Presentation By: Gina Haws Information for the presentation obtained from EVERYTHING YOU SAY, POST OR DO ON THE INTERNET CAN PUT YOU AT RISK.
Will you need your umbrella?.  Objective: Explain the Cloud In business terms, so you can see if it will benefit you.  Agenda: 12:00 – Welcome and Introductions.
New Data Regulation Law 201 CMR TJX Video.
Threats to I.T Internet security By Cameron Mundy.
Information Security Information Technology and Computing Services Information Technology and Computing Services
Security and Risk Management. Who Am I Matthew Strahan from Content Security Principal Security Consultant I look young, but I’ve been doing this for.
How To Protect Your Privacy and Avoid Identity Theft Online.
Manjit kaur Manjit Kaur1. Why do we need to protect our computer from a virus? A reason why we need to protect our computer from a virus is because it.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Information Security and YOU!. Information Assurance Outreach Information Security Online Security Remote Access with Demonstration The Cloud Social.
ESCCO Data Security Training David Dixon September 2014.
Stay Safe & Secure Online. Outline Passwords Everyday Security Security Physical Security Protecting Personal Information.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Malicious Attack Corporate Awareness and Walk through Date 29 September 2011.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS). SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.1 I can describe.
{ Active Directory Security Why bother?.   Law #1: Nobody believes anything bad can happen to them, until it does   Law #2: Security only works if.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
Security Training USAID Information Security.
How to safely use Facebook. Ken Loveday. TIPS FOR PROTECTING PERSONAL INFORMATION FACEBOOK LOGIN  Required Info  Name   Password  Birthday.
WE ARE DATA By Hazim Zaidani Do you really think that your personal data is protected ? Well… Think Again !!!
Specialist communication channel. Sarah-Jane king.
Manjit kaur Manjit Kaur1. Why do we need to protect our computer from a virus? A reason why we need to protect our computer from a virus is because it.
Information/Internet Safety. MBA Candidates at UNM Anderson School of Management This is our homework.
Data Security Overview. Data Security Periphery –Firewalls –Web Filtering –Intrusion Detection & Prevention Internal –Virus Protection –Anti Spy-ware.
For brownies this PowerPoint will help you understand computer viruses and help stop them!!!!
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
Data Security.
By: Asfa Khan and Huda Mukhtar
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
How & Why 1 of 8 security. 2 of 8 security – Why? 1.Your address is your online identity If it is not secure you may get s (including.
Cyber Safety Jamie Salazar.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
OIT and IT providers across campus are launching an awareness campaign to provide tips and resources to help you stay safe online and protect AU resources.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Computer Security & Backups LO: Understanding the need for computer security and typical ways to ensure that a system is secure. Learning Outcome : Define.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
Online Banking. Learning Objectives To learn how society has been affected by online banking.
© 2015 albert-learning.com Role of Mobile Phone Apps Role of mobile Phone Apps.
OCTOBER IS CYBER SECURITY AWARENESS MONTH. October is Cyber Security Awareness Month  Our Cyber Security Awareness Campaign focuses on topics such as.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
STOP. THINK. CONNECT. Online Safety Quiz. Round 1: Safety and Security.
Copyright © 2008 AusCERT 1 Practical Computer Security See the notes section throughout the slide presentation for additional information.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Digital & Internet Safety. Understanding your personal data Defining “Big Data” Protecting your data, computer & devices Avoiding identity theft.
Digital Citizenship Unit 2 Lesson 1: Strong Passwords
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
PCS Technology for Staff: Acceptable Use, Privacy, and Safety
OWASP CONSUMER TOP TEN SAFE WEB HABITS
STOP. THINK. CONNECT. Online Safety Quiz.
Information Security Awareness 101
Presentation transcript:

Co-hosted by Presents Where’s Your Data

The coats that you brought today will be donated to: Hotline: To donate call: x231 $50 Gift Card Drawing For Each Coat You Brought

 What Is The Value Of Your Data?  Where’s Your Data?  Keeping Your Data Out Of The Wrong Hands  Questions Today’s Agenda

How Much Has Your Company Invested In Its Data? If Your Data Was Accessed By Someone With Bad Intentions Clients? Employees? Business?

Employees need easy access to company data from most anywhere. The Sharp Side: MUST keep everyone else from gaining access to your data. The REALLY Sharp Side

 Don’t Panic  Educate Your Staff  Take Reasonable Prudent Steps  Be Vigilant

 Password protected screen savers  Password protect everything. ◦ Laptop ◦ Phone ◦ I-pad ◦ Memory Stick & SD Cards ◦ Home PC  Establish strong passwords policy BEFORE you have a concern  Strong Passwords ◦ Min. 6 to 8 letters, Require 1 number & 1 capital letter ◦ Don’t Make Password Policy Too Stringent  Disable/Delete Obsolete User Accounts

 Don’t Use Guessable Passwords ◦ , Iloveyou, Password, Abc123 ◦ Pet names, phone #, maiden names, Alma Mater, favorite team/player  DO NOT Write Down Passwords  Follow ADA Recommendations For Toothbrushes ◦ Change Your Password Every Three Months ◦ Don’t Share Them  Don’t Share User Accounts

 Keys To The Castle ◦ Bank Accounts/PINs ◦ Client Information ◦ Chat Dialogues ◦ And Voic ◦ Network Logon Info ◦ Credit Card Numbers  Easily Stolen  SD Card Easily Transferred Not Encrypted  “Cool” Apps steal data

 Remove All Apps That Are Not Being Used  Only Download Apps From Trusted Vendors ◦ Research App Reviews On-line First  Keep Your Smartphone Firmware Updated  Wifi Turned Off & When Not In Use  Only Connect To Trusted Wireless Networks  Use App Scanner ◦ Lookout Security & Antivirus  App Privacy Advisor  Locate, Lock Or Wipe A Phone  Backup Data

 Keep Wifi Turned Off When Not Using It  Don’t Store Passwords To Auto Connect To Accounts  Always Turn On Firewall At Public Hot Spots  Encrypt The Harddrive  Encryption ◦ Laptops (TrueCrypt) ◦ Memory Sticks (TrueCrypt) ◦ SD Cards (Various Apps)  End Point Security ◦ Blink EPP ◦ Lumension Secuiry

 Questions???  Coat Drawing  Post Card  Future Events