Information Security Sharon Welna Information Security Officer.

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

SECURITY CHECK Protecting Your System and Yourself Source:
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Protecting Your Identity: What to Know, What to Do.
1 Identity Theft and Phishing: What You Need to Know.
Protecting Yourself Against Identity Theft TSCPA Member Name, CPA Firm/Company Name.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Fraud, Scams and ID Theft …oh my! Deb Ramsay ESD 101 Chief Information Officer Technology Division.
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
1.3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge.
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
1 Identity Theft: What You Need to Know. 2 Identity Theft Identity theft is a crime of stealing key pieces of someone’s identifying information, such.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
OU INFORMATION SECURITY & RISK MANAGEMENT ISA – February 4, 2015.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Security Liaisons Information Presentation. Introduction  What’s the big deal with computer security? Don’t we have an IT security department to take.
Online Safety 2.02 Remember the rules of online safety.
Contents  Viruses Viruses  Computer Worms Computer Worms  Trojans Trojans  Spyware Spyware  Adware Adware  Spam Spam  Hoaxes and Scams Hoaxes and.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Safe Internet Use Mark Wheatley CSI Onsite
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Identity Theft By: Chelsea Thompson. What is identity theft? The crime of obtaining the personal or financial information of another person for the purpose.
Scams & Schemes Common Sense Media.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
IT security By Tilly Gerlack.
Adam Soph, Alexandra Smith, Landon Peterson. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details.
People use the internet more and more these days so it is very important that we make sure everyone is safe and knows what can happen and how to prevent.
Personal Privacy and Security Zenia C. Bahorski Ph.D. Department of Computer Science Eastern Michigan University Personal Privacy & Security - Z. Bahorski,
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Malware and Phishing By: Sydney Langley. MALWARE- includes viruses and spyware to steal your personal information PHISHING- is an internet scam sending.
safety Bailey mullan. dangers ing has become on of the main sources for communicating. When using it is more likely for someone.
Online Safety 2.02 Remember the rules of online safety.
Identity Theft What is it, is identity theft really a problem, how can I protect myself, what do I do if my Identity is stolen.
Cyber Safety Jamie Salazar.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Protecting Your Assets By Preventing Identity Theft 1.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Cybersecurity Test Review Introduction to Digital Technology.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Any criminal action perpetrated primarily through the use of a computer.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
STOP.THINK.CONNECT™ A NATIONAL CYBERSECURITY AWARENESS CAMPAIGN Protecting Yourself and Your Family Online.
Presented By: Jennifer Thayer, SPHR, SHRM-SCP.  Identify CyberCrime and Types  Identify Steps to Take to Prevent Identity Theft  Learn Tips and Tricks.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
SCAMS and FRAUDS How to Recognize Them and Ways You Can Protect Yourself Presented by the Criminal Investigations Division, Morganton Department of Public.
Protecting Yourself Against Identity Theft A Financial Literacy Presentation by.
STOP. THINK. CONNECT. Online Safety Quiz. Round 1: Safety and Security.
WHAT YOU NEED TO KNOW Chevron Federal Credit Union Great Rates. Personal Service. chevronfcu.org  
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
Outline of this module By the end of this module, you will be able to: Understand the benefits that internet banking provides; Name the different dangers.
Protecting Your Assets By Preventing Identity Theft
Done by… Hanoof Al-Khaldi Information Assurance
Lesson 3 Safe Computing.
Remember the rules of online safety.
Information Security 101 Richard Davis, Rob Laltrello.
Protect Your Computer Against Harmful Attacks!
Cybersecurity Awareness
Protecting Yourself from Fraud including Identity Theft
Protecting Your Credit Identity
What is Phishing? Pronounced “Fishing”
Presentation transcript:

Information Security Sharon Welna Information Security Officer

Security = Layers of Defense By the numbers Blocking Downloads 101,000 Downloads inspected each day for malware 82,000 Downloads blocked each day that contain known malware Blocking URLs 8.56 M URL’s inspected each day for malware 3.9 M URL’s blocked from downloads Scanning Devices 19,000 devices scanned for vulnerabilities Blocking s 522,000 s received per day 122,000 valid s delivered (23%) 400,000 s blocked per day (77%)

STOP. Before you use the Internet, take time to understand the risk and learn how to spot potential problems THINK. Take a moment to be certain the path ahead is clear. Watch for warning signs and consider how your actions could impact yoru safety, or your family’s CONNECT. Enjoy the Internet with greater confidence, knowing you’ve taken the right steps to safeguard yourself and your computer

Keep a Clean Machine. Keep security software current Automate software updates Protect all devices that connect to the Internet Plug and scan Protect your Personal Information Secure your accounts Make passwords long and strong Unique account, unique password Own your online presence Write it down and keep it safe Connect with Care When in doubt, throw it out Get savvy about Wi-Fi hotspots Protect your $$ Be Web Wise Stay current. Keep pace with new ways to stay safe online Think before you act Back it up Be a Good Online Citizen Safer for me more secure for all Post only about others as you have then post about you Help the authorities fight cybercrime

Phishing Incident What happened? –Between 8/29/15-9/10/15 several employees received s with subject Paychecks Adjusted September Paycheck –9/18/2015 an employee notified payroll of an unauthorized bank account change –13 employee’s direct deposit bank account information was changed –No funds were stolen Root Cause –User error –Social Engineering –No systems were “hacked”

8 ways to avoid phishing scams 1.Guard against phishing. Be especially cautious of s that: Come from unrecognized senders. Ask you to confirm personal or financial information over the internet and/or make urgent requests for this information. Aren’t personalized. Try to upset you into acting quickly by threatening you with frightening information. Contain spelling and grammar errors. Promise goodies!

2. Communicate personal information only via phone or secure web sites. When conducting online transactions, look for a sign that the site is secure such as a lock icon on the browser’s status bar or a “ URL whereby the “s” stands for “secure” rather than a “ Also, beware of phone phishing schemes. Do not divulge personal information over the phone unless you initiate the call. Be cautious of s that ask you to call a phone number to update your account information as well. 8 ways to avoid phishing scams

3. Do not click on links, download files or open attachments in s from unknown senders. It is best to open attachments only when you are expecting them and know what they contain, even if you know the sender. 8 ways to avoid phishing scams

4. Never personal or financial information, even if you know the recipient. You never know who may gain access to your account, or to the person’s account to whom you are ing. 8 ways to avoid phishing scams

5. Beware of links in s that ask for personal information… …even if the appears to come from an enterprise you do business with. Phishing web sites often copy the entire look of a legitimate web site, making it appear authentic. To be safe, call the legitimate enterprise first to see if they really sent that to you. Businesses should not request personal information to be sent via . UNMC will never ask for passwords via . 8 ways to avoid phishing scams

6. Beware of pop-ups and follow these tips: Never enter personal information in a pop-up screen. Do not click on links in a pop-up screen. Do not copy web addresses into your browser from pop-ups. Legitimate enterprises should never ask you to submit personal information in pop-up screens, so don’t do it. 8 ways to avoid phishing scams

7. Protect your computer with a firewall, spam filters, anti-virus and anti-spyware software. Do some research to ensure you are getting the most up- to-date software, and update them all regularly to ensure that you are blocking from new viruses and spyware. 8 ways to avoid phishing scams

8. Check your online accounts and bank statements regularly to ensure that no unauthorized transactions have been made. You should always be careful about giving out personal information over the internet. Luckily, companies have begun to employ tactics to fight against phishers, but they cannot fully protect you on their own. Only UNsubscribe to something you’ve SUBscribed to. 8 ways to avoid phishing scams

Protect your identity The Federal Bureau of Investigation offers several steps you can take to make it harder for thieves to steal your personally identifiable information: Check your credit report regularly. Don't carry around your Social Security card or any document containing your Social Security number. Shred documents that contain sensitive information. Only provide your personal information when absolutely necessary. Also, keep track of who has your information, as it could help determine the source of a breach if you become a victim of identity theft. Use firewalls and antivirus software to protect your personal computers. File your taxes as early as possible. Criminals file their fraudulent returns early to obtain refunds before the legitimate filer submits a return. If you're not required to file a tax return, file one anyway to prevent someone else from filing a false return in your name and to be alerted in case someone has already filed a false return in your name. Source: Federal Bureau of Investigation Federal Bureau of Investigation - See more at (Texas Medical Association):

Questions Sharon Welna Information Security Officer Lisa Bazis Information Security Engineer