166/171/181 RAL 9006 195/201/196 RAL 7035 173/180/174 RAL 7038 81/153/44 RAL 6018 255/165/30 RAL 1033 190/40/0 RAL 3001 0/84/134 RAL 5005 METRO blue 251/204/46.

Slides:



Advertisements
Similar presentations
1. XP 2 * The Web is a collection of files that reside on computers, called Web servers. * Web servers are connected to each other through the Internet.
Advertisements

Slide 1 Insert your own content. Slide 2 Insert your own content.
Pennsylvania BANNER Users Group 2007 Disaster Recover For The Financial Aid Environment.
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Are you Safe at Work? A look into Safety at the Workplace and Internet Security Presented by Sheila Gee.
1 of 2 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2006 Microsoft Corporation.
Financial Services Workshop Margaret Umphrey ECU Information Security Officer March 12, IT Security, East Carolina University.
The Office Procedures and Technology
Cyber Safety Assessment Review
Smartphone and Mobile Device Security IT Communication Liaisons Meeting October 11, 2012 Theresa Semmens, CITSO.
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
ONE® Mail Training Presentation North York General Hospital North York General Hospital.
XP New Perspectives on Browser and Basics Tutorial 1 1 Browser and Basics Tutorial 1.
© Paradigm Publishing, Inc Excel 2013 Level 2 Unit 2Managing and Integrating Data and the Excel Environment Chapter 6Protecting and Sharing Workbooks.
Maintaining Security While Using Computers What all of Our Computer Users Need to Know.
WORKFORCE CONFIDENTIALITY HIPAA Reminders. HIPAA 101 The Health Insurance Portability and Accountability Act (HIPAA) protects patient privacy. HIPAA is.
1 Electronic Information Security – What Researchers Need to Know University of California Office of the President Office of Research May 2005.
Part 2 of Evil Lurking in Websites Data Security at the University of Wisconsin Oshkosh.
SAFEGUARDING DHS CLIENT DATA PART 2 SAFEGUARDING PHI AND HIPAA Safeguards must: Protect PHI from accidental or intentional unauthorized use/disclosure.
Information Security Awareness:
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
1 Enterprise Security Your Information Security and Privacy Responsibilities © 2008 Providence Health & Services This information may be replicated for.
1 Information Security for HIPAA First Meeting for Researchers Michael Caputo December 17, 2002.
October is National Cyber Security Month OIT and IT providers are launching an awareness campaign to provide tips and resources to help you stay safe online.
HIPAA What’s Said Here – Stays Here…. WHAT IS HIPAA  Health Insurance Portability and Accountability Act  Purpose is to protect clients (patients)
Security Awareness Training PA Turnpike Commission.
10 Essential Security Measures PA Turnpike Commission.
1 Computer Security: Protect your PC and Protect Yourself.
Software. stands for electronic mail. software enables you to send an electronic message to another person anywhere in the world. The message.
New Data Regulation Law 201 CMR TJX Video.
 Review the security rule as it pertains to ›Physical Safeguards ♦ How to protect the ePHI in the work environment ♦ Implementation ideas for your office.
Program Objective Security Basics
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
CS101 Lecture 14 Security. Network = Security Risks The majority of the bad things that can be done deliberately to you or your computer happen when you.
ESCCO Data Security Training David Dixon September 2014.
1.1 System Performance Security Module 1 Version 5.
Staying Safe Online Keep your Information Secure.
Best Practices for Protecting Data. Section Overview Mobile Computing Devices Technical Procedures Data Access and Permissions Verbal Communication Paper.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
Privacy and Information Management ICT Guidelines.
University Health Care Computer Systems Fellows, Residents, & Interns.
Information Security Awareness Training. Why Information Security? Information is a valuable asset for all kinds of business More and more information.
STARTFINISH DisposePrint & ScanShareStore Protect information and equipment ClassifyProtect.
Chapter 9 Sending and Attachments. 2Practical PC 5 th Edition Chapter 9 Getting Started In this Chapter, you will learn: − How works − How.
IT tools to communicate By Suleman Kalam. Podcast What is Podcasts? A podcasts is a downloadable media file which can be downloaded into many electronic.
ONE® Pages Training Presentation North York General Hospital.
1 3/13/08 Michael O’Connor Nicoleta Kourouniotis Michelle LaNasa Samantha Bonar Michael O’Connor Nicoleta Kourouniotis Michelle LaNasa Samantha Bonar.
Information Security Everyday Best Practices Lock your workstation when you walk away – Hit Ctrl + Alt + Delete Store your passwords securely and don’t.
Computer Security & Backups LO: Understanding the need for computer security and typical ways to ensure that a system is secure. Learning Outcome : Define.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Common sense solutions to data privacy observed by each employee is the crucial first step toward data security Data Privacy/Data Security Contact IRT.
Properly Safeguarding Personally Identifiable Information (PII) Ticket Program Manager (TPM) Social Security’s Ticket to Work Program.
What is Information Security?
IT Information for Graduate Students
Unit 4 IT Security.
Administrative Practices Outcome 1
People used to install software on their computers
Student Monmouth College
Protecting Client Confidentiality for Volunteers and Agency Staff
Unit 4 IT Security.
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Staying Austin College
Things To Avoid: 1-Never your password to anyone.
Information Security and Travel-related Security
ONE® Pages Training Presentation
Welcome to the SPH Information Security Learning Module
Lesson 2: Epic Security Considerations
Dos and Don’ts.
9 ways to avoid viruses and spyware
Handling Information Securely
Presentation transcript:

166/171/181 RAL /201/196 RAL /180/174 RAL /153/44 RAL /165/30 RAL /40/0 RAL /84/134 RAL 5005 METRO blue 251/204/46 RAL 1018 METRO yellow Background Text and Lines Fill colors (No shadows!) SLIDE COLOR SCHEMA 1 Published by IT Security Manager Russia Is Everyones Business Information Security

166/171/181 RAL /201/196 RAL /180/174 RAL /153/44 RAL /165/30 RAL /40/0 RAL /84/134 RAL 5005 METRO blue 251/204/46 RAL 1018 METRO yellow Background Text and Lines Fill colors (No shadows!) SLIDE COLOR SCHEMA 2 Published by IT Security Manager Russia Keep your passwords secret. DO NOT SHARE them with anyone even if that anyone is your superior or technical support specialist!

166/171/181 RAL /201/196 RAL /180/174 RAL /153/44 RAL /165/30 RAL /40/0 RAL /84/134 RAL 5005 METRO blue 251/204/46 RAL 1018 METRO yellow Background Text and Lines Fill colors (No shadows!) SLIDE COLOR SCHEMA 3 Published by IT Security Manager Russia If YOU SUSPECT somebody has worked under your account or used your computer – call to User Support!

166/171/181 RAL /201/196 RAL /180/174 RAL /153/44 RAL /165/30 RAL /40/0 RAL /84/134 RAL 5005 METRO blue 251/204/46 RAL 1018 METRO yellow Background Text and Lines Fill colors (No shadows!) SLIDE COLOR SCHEMA 4 Published by IT Security Manager Russia How much of your work would be lost if your PC crashed ? Make sure your business files are stored on the NETWORK DRIVES !

166/171/181 RAL /201/196 RAL /180/174 RAL /153/44 RAL /165/30 RAL /40/0 RAL /84/134 RAL 5005 METRO blue 251/204/46 RAL 1018 METRO yellow Background Text and Lines Fill colors (No shadows!) SLIDE COLOR SCHEMA 5 Published by IT Security Manager Russia I love you ! Open the attachment NOW ! DO NOT OPEN unsolicited s, references to Internet sites or any computer media! They may well contain spy ware. When in doubt, call to User Service. Click there ! And take your business profit !

166/171/181 RAL /201/196 RAL /180/174 RAL /153/44 RAL /165/30 RAL /40/0 RAL /84/134 RAL 5005 METRO blue 251/204/46 RAL 1018 METRO yellow Background Text and Lines Fill colors (No shadows!) SLIDE COLOR SCHEMA 6 Published by IT Security Manager Russia Remember, s are NOT SECURE, its almost like sending a postcard. Use PGP program to encrypt your sensitive data !

166/171/181 RAL /201/196 RAL /180/174 RAL /153/44 RAL /165/30 RAL /40/0 RAL /84/134 RAL 5005 METRO blue 251/204/46 RAL 1018 METRO yellow Background Text and Lines Fill colors (No shadows!) SLIDE COLOR SCHEMA 7 Published by IT Security Manager Russia Viruses can spread via , from local media and by downloading from the Internet. Make sure you have the ANTI-VIRUS software running and up to date.

166/171/181 RAL /201/196 RAL /180/174 RAL /153/44 RAL /165/30 RAL /40/0 RAL /84/134 RAL 5005 METRO blue 251/204/46 RAL 1018 METRO yellow Background Text and Lines Fill colors (No shadows!) SLIDE COLOR SCHEMA 8 Published by IT Security Manager Russia TURN ON your password-protected screensaver when you leave your PC unattended, even if its only for a short period!

166/171/181 RAL /201/196 RAL /180/174 RAL /153/44 RAL /165/30 RAL /40/0 RAL /84/134 RAL 5005 METRO blue 251/204/46 RAL 1018 METRO yellow Background Text and Lines Fill colors (No shadows!) SLIDE COLOR SCHEMA 9 Published by IT Security Manager Russia Restricted Dont let data on paper or electronic media lying on the desk when you leave. LOCK office cabinets and doors when you are outside office or store.

166/171/181 RAL /201/196 RAL /180/174 RAL /153/44 RAL /165/30 RAL /40/0 RAL /84/134 RAL 5005 METRO blue 251/204/46 RAL 1018 METRO yellow Background Text and Lines Fill colors (No shadows!) SLIDE COLOR SCHEMA 10 Published by IT Security Manager Russia Remember TO REMOVE your documents from photocopiers, faxes, printers, wall charts and projection equipment.

166/171/181 RAL /201/196 RAL /180/174 RAL /153/44 RAL /165/30 RAL /40/0 RAL /84/134 RAL 5005 METRO blue 251/204/46 RAL 1018 METRO yellow Background Text and Lines Fill colors (No shadows!) SLIDE COLOR SCHEMA 11 Published by IT Security Manager Russia DO NOT LEAVE portable devices unattended in public places. Keep sensitive data on hard drive and local media encrypted.

166/171/181 RAL /201/196 RAL /180/174 RAL /153/44 RAL /165/30 RAL /40/0 RAL /84/134 RAL 5005 METRO blue 251/204/46 RAL 1018 METRO yellow Background Text and Lines Fill colors (No shadows!) SLIDE COLOR SCHEMA 12 Published by IT Security Manager Russia SHRED any sensitive data and DESTROY electronic data media before to bin it (dumpster diver may find it). Sensitive Information

166/171/181 RAL /201/196 RAL /180/174 RAL /153/44 RAL /165/30 RAL /40/0 RAL /84/134 RAL 5005 METRO blue 251/204/46 RAL 1018 METRO yellow Background Text and Lines Fill colors (No shadows!) SLIDE COLOR SCHEMA 13 Published by IT Security Manager Russia Do you know WHO all your visitors are? You must accompany your visitors!

166/171/181 RAL /201/196 RAL /180/174 RAL /153/44 RAL /165/30 RAL /40/0 RAL /84/134 RAL 5005 METRO blue 251/204/46 RAL 1018 METRO yellow Background Text and Lines Fill colors (No shadows!) SLIDE COLOR SCHEMA 14 Published by IT Security Manager Russia Information discussing outside the office may be overheard. Conversation via mobile phone can be intercepted.

166/171/181 RAL /201/196 RAL /180/174 RAL /153/44 RAL /165/30 RAL /40/0 RAL /84/134 RAL 5005 METRO blue 251/204/46 RAL 1018 METRO yellow Background Text and Lines Fill colors (No shadows!) SLIDE COLOR SCHEMA 15 Published by IT Security Manager Russia Think Secure Be Secure