End User Cyber Security Awareness Training. Who should complete this training This training is required for all individuals that owns a computer, mobile.

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

Virginia Department for Aging and Rehabilitative Services.
Developed by Technology Services 1:1 Laptop Initiative
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
The Internet.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
National Cybersecurity Awareness Campaign. Campaign Background  In May 2009, President Obama issued the Cyberspace Policy Review, which recommends the.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Fraud, Scams and ID Theft …oh my! Deb Ramsay ESD 101 Chief Information Officer Technology Division.
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
What is identity theft, and how can you protect yourself from it?
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
Social media threats. Warning! May contain mild peril.
What you don’t know CAN hurt you!
8 Mistakes That Expose You to Online Fraud to Online Fraud.
STOP.THINK.CONNECT™ NATIONAL CYBERSECURITY AWARENESS CAMPAIGN FAMILIES PRESENTATION.
National Cybersecurity Awareness Campaign CyberWatch C3 Conference October 7,
How to keep your kids safe online
STOP.THINK.CONNECT™ A NATIONAL CYBERSECURITY AWARENESS CAMPAIGN OLDER AMERICANS PRESENTATION.
1 Enterprise Security Your Information Security and Privacy Responsibilities © 2008 Providence Health & Services This information may be replicated for.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
Social Engineering PA Turnpike Commission. “Social Engineering is the practice of obtaining confidential information by manipulation of legitimate users”
STOP.THINK.CONNECT™ NATIONAL CYBERSECURITY AWARENESS CAMPAIGN UNDERGRADUATE STUDENT PRESENTATION.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
E-Safety Quiz Keeping safe online! A guide for parents & children.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
INTERNET SAFETY FOR STUDENTS
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
National Cybersecurity Awareness Campaign: Chatting with Kids About Being Online.
Protecting Our Personal Space Security in a Virtual World.
Security Liaisons Information Presentation. Introduction  What’s the big deal with computer security? Don’t we have an IT security department to take.
Protecting Our Personal Space Security in a Virtual World by David Hines - Information Security Officer
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
STAY SAFE ONLINE. STAY SAFE ONLINE! PLEASE MAKE SURE YOU LOGIN AT THE CORRECT BANK URL / ADDRESS 1.NEVER LOGIN VIA LINKS 2.NEVER REVEAL YOUR PIN.
JMU GenCyber Boot Camp Summer, Cyberspace Risks and Defenses Facebook Snapchat P2P filesharing Apps Craigslist Scams JMU GenCyber Boot Camp© 2015.
ESCCO Data Security Training David Dixon September 2014.
Welcome to E.L. Wright iPad Safety Night I. Using Technology and Protecting Your Child E.L. Wright Technology Department and Richland County Sheriff's.
IT security By Tilly Gerlack.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
E-Safety E-safety relates to the education of using new technology responsibly and safely focusing on raising awareness of the core messages of safe content,
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Internet Safety Helpful Tips to Stay Safe. I bet you didn’t know… 18% of 8- to 10-year-olds spend time on some kind of social networking site daily Kids'
L ESSON 2 A website is a collection of different types of data, which can be anything like text, graphics, videos etc. combined together to provide.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
Information Security Sharon Welna Information Security Officer.
Inappropriate Content Hackers Phishers Scammers Child Abusers Bullies.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
Awareness raising session for Parents and Carers June Todd Awareness raising session for Parents and Carers June Todd.
Issues for Computer Users, Electronic Devices, Computer and Safety.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
OCTOBER IS CYBER SECURITY AWARENESS MONTH. October is Cyber Security Awareness Month  Our Cyber Security Awareness Campaign focuses on topics such as.
STOP.THINK.CONNECT™ A NATIONAL CYBERSECURITY AWARENESS CAMPAIGN Protecting Yourself and Your Family Online.
Presented By: Jennifer Thayer, SPHR, SHRM-SCP.  Identify CyberCrime and Types  Identify Steps to Take to Prevent Identity Theft  Learn Tips and Tricks.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Smart, Safe, and Secure Online Spam commercial messages that you didn’t ask for (a company trying to sell things by sending out thousands of messages at.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Computer Security Keeping you and your computer safe in the digital world.
Identity Theft SS.8.FL.6.7 Evaluate social networking sites and other online activity from the perspective of making individuals vulnerable to harm caused.
Internet Safety.
Digital Security Identity theft Copyright Laws Plagiarism, and More.
Information Security.
Cybersecurity Awareness
Protecting Yourself from Fraud including Identity Theft
Protecting Yourself from Fraud including Identity Theft
Protecting Yourself from Fraud including Identity Theft
Presentation transcript:

End User Cyber Security Awareness Training

Who should complete this training This training is required for all individuals that owns a computer, mobile device, touch pad. Each individual must complete this training before using their devices to navigate the internet for research, purchase, social media sites and etc. Refresher security training is highly recommended to stay current with present cyber threats and protect user PII data.

Summary of Security Policies

Issues Affecting User Users must protect all sensitive data and files Defined as data, documents, or files which, if compromised, would have an adverse effect on your agency or COV Must be stored in a secure physical environment Includes all media formats (paper, CD, USB drive) May only be stored on devices owned and approved by your organization Must be encrypted when on mobile devices Includes laptops, CD’s, USB “thumb” drives Must be encrypted and password protected “in transit” For example, via or on any portable device

Issues Affecting User

Cyber Awareness Cyber predators are people who search online for other people in order to use, control, or harm them in some way.  Cyber predators target all users – both male and female – on a regular basis, regardless of age  Social networking sites enhance a predator’s ability to target users, especially if they share personal information in their profile.  88% of young adults say they are social networking “friends” with people they don’t know well*  Protect yourself and your personal information, you never know who is behind the screen  Notify your family and the proper authorities immediately if you are being targeted or harassed online

Cyber Awareness Social Media US-CERT* suggests ten steps that you can take to protect yourself on social networks:  Limit the amount of personal information you post  Remember that the internet is a public resource  Be wary of strangers  Be skeptical – Don’t believe everything you read online.  Evaluate your settings – don’t stick with the defaults!  Be wary of third-party applications  Use strong passwords  Check privacy policies  Keep software, particularly your web browser, up to date  Use and maintain anti-virus software

Cyber Awareness Identity Theft Identity theft is the illegal use of someone else's personal information in order to obtain money or credit.  Every 2 seconds an identity is stolen- so for the length of this training session over 2,600 identities may have been stolen.  Every year, 700,000 kids have their identity stolen.  Here are some simple tips to prevent identity theft: – Don’t use the same password twice. – Choose a password that means someone to you and you only. – If you have been compromised, report it to the Federal Trade Commission. – Lock your computer and cell phone. – Don’t share personal information without knowing exactly who is on the receiving end.

Cyber Awareness Fraud & Phishing

Cyber Awareness Fraud & Phishing Tips Fraud is the intentional perversion of truth in order to induce another to part with something of value or to surrender a legal right. Phishing is a scam by which an user is duped into revealing personal or confidential information that the scammer can use illicitly or fraudulently.  Most organizations – banks, universities, companies, etc. - don’t ask for your personal information over . Beware of requests to update or confirm your personal information.  Don’t open s from strangers and don’t click on unfamiliar sites; if you think an offer is too good to be true, then it probably is.  Make sure you change your passwords often and avoid using the same password on multiple sites.  Always enter a URL by hand instead of following links.  Reporting of suspicious or unsolicited s from unknown sources is key to preventing and mitigating the impacts of these attacks. Report any suspicious s or links to US-CERT, Internet Crime Complaint Center, and the Federal Trade Commission.

Cyber Awareness Have a conversation with your kids about Being online facts  Have regular conversations about using the Internet.  Talk to kids about online manners.  Ask kids who they are in touch with online and what sites they visit.  Use parental control options that allow you to block and filter content, filter outgoing content and limit kid’s time online.  Develop computer and cell phone rules, such as no cell phone use at the dinner table, during homework or sleeping hours.

Cyber Awareness Cyber Awareness You can report Internet -related frauds, scams and suspicious activity with the following organizations You can report Internet -related frauds, scams and suspicious activity with the following organizations  Department of Justice (DOJ) – The DOJ’s Computer Crime & Intellectual Property Section (CCIPS) tells you where to go to report hacking, password trafficking, SPAM, child exploitation and other Internet harassment. For more information visit  The Internet Crime Complaint Center (IC3) – The IC3 ( is a partnership between the FBI, the National White Collar Crime Center, and the Bureau of Justice Assistance, whose mission is to serve as a vehicle to receive, develop, and refer criminal complaints related to cyber crimehttp://

Cyber Awareness Cyber Awareness Basic Concept You Control What You Choose to Click Most end user threats are targeted specifically in hopes that you will click on a harmful link, attachment, picture, video or icon in an or web page, including social media applications What you can do STOP, and THINK, BEFORE you CLICK Your job is to be aware, be alert and diligent. Always look for the signs that external entities are trying to gain access to your PC and your network. Securing your PII & Cyberspace starts with YOU

Cyber Awareness References Eyden, T (2013). "Cyberattacks and Hacktivism”. Web. 08 Jan Retrieved from tacks-and-hacktivism-%E2%80%93-take- cover/ US-CERT. “United States Computer Emergency Readiness Team”. Web. Retrieved from threats