Information Security Everyday Best Practices Lock your workstation when you walk away – Hit Ctrl + Alt + Delete Store your passwords securely and don’t.

Slides:



Advertisements
Similar presentations
1 of 2 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2006 Microsoft Corporation.
Advertisements

Virginia Department for Aging and Rehabilitative Services.
Computer and Mobile Device Equipment Security Brief May 29, 2008 Presented by: Kevin G. Sutton, Chief, Information Technology Unit.
Smartphone and Mobile Device Security IT Communication Liaisons Meeting October 11, 2012 Theresa Semmens, CITSO.
Helping our customers keep their computers safe.  Using your pet’s, business, family, friend’s names  Using number or letter sequences (0123, abcd)
Invasion of Smart Phones in Clinical Areas Chrissy Kyak Privacy Officer University of Maryland Upper Chesapeake Health.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 25 & 27 November 2013.
1 Electronic Information Security – What Researchers Need to Know University of California Office of the President Office of Research May 2005.
KDE Employee Training. What IS a Data Breach? Unauthorized release (loss or theft) of Sensitive or Confidential Data, such as PII, PHI, etc. On site or.
Protecting Your Identity: What to Know, What to Do.
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
Part 2 of Evil Lurking in Websites Data Security at the University of Wisconsin Oshkosh.
Copyright © 2014 Merck Sharp & Dohme Corp., a subsidiary of Merck & Co., Inc. All rights reserved. In practice, how do we recognize a potential Privacy.
9/20/07 STLSecurity is Everyone's Responsibility 1 FHDA Technology Security Awareness.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Information Security Awareness:
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 18, 20 & 25 March 2015.
Beyond WiFi: Securing Your Mobile Devices Thomas Kuhn Information Technology Assistance Center (iTAC) Kansas State University.
Network & Computer Security Training.  Prevents unauthorized access to our network and your computer  Helps keep unwanted viruses and malware from entering.
Lack of Security in Hotspots/Wi Fi Areas Yin Wai ISM 158 4/27/10.
1 Enterprise Security Your Information Security and Privacy Responsibilities © 2008 Providence Health & Services This information may be replicated for.
10 Essential Security Measures PA Turnpike Commission.
HIPAA Basic Training for Privacy and Information Security Vanderbilt University Medical Center VUMC HIPAA Website: HIPAA Basic.
Protecting Sensitive Information PA Turnpike Commission.
Security The Kingsway School. Accidental Data Loss Data can be lost or damaged by: Hardware failure such as a failed disk drive Operator error e.g. accidental.
Information Security Decision- Making Tool What kind of data do I have and how do I protect it appropriately? Continue Information Security decision making.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
ESCCO Data Security Training David Dixon September 2014.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
Privacy and Information Management ICT Guidelines.
University Health Care Computer Systems Fellows, Residents, & Interns.
Information Security Awareness Training. Why Information Security? Information is a valuable asset for all kinds of business More and more information.
INFORMATION SECURITY WHAT IS IT? Information Security The protection of Information Systems against unauthorized access to or modification of information,
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
What are the rules? Information technology is available to every student, faculty and staff member in support of the essential mission of the University.
Physical ways of keeping your system secure. Unit 7 – Assignment 2. (Task1) By, Rachel Fiveash.
Information Systems Security
STARTFINISH DisposePrint & ScanShareStore Protect information and equipment ClassifyProtect.
How can IT help you today?. Agenda Why Do You Care? What Are The Risks? What Can You Do? Questions? How can IT help you today? 2.
SECURITY OF INFORMATION Unit 3c. Click to return to Sum up page HOW TO PROTECT DATA AND COMPUTERS Computers can be locked in a room CCTV and alarms to.
Joel Rosenblatt Director, Computer and Network Security September 10, 2013.
By: Asfa Khan and Huda Mukhtar
Computer Security By Duncan Hall.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Computer Security & Backups LO: Understanding the need for computer security and typical ways to ensure that a system is secure. Learning Outcome : Define.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
ANNUAL HIPAA AND INFORMATION SECURITY EDUCATION. KEY TERMS  HIPAA - Health Insurance Portability and Accountability Act. The primary goal of the law.
OCTOBER IS CYBER SECURITY AWARENESS MONTH. October is Cyber Security Awareness Month  Our Cyber Security Awareness Campaign focuses on topics such as.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Computer Security Sample security policy Dr Alexei Vernitski.
Copyright © 2008 AusCERT 1 Practical Computer Security See the notes section throughout the slide presentation for additional information.
that keeping money and personal information safe is very important That losing money or having personal information stolen can be distressing.
Common sense solutions to data privacy observed by each employee is the crucial first step toward data security Data Privacy/Data Security Contact IRT.
Traveling Securely. Unsecured Networks and browsing  Using Unsecured Networks –Hotels, airports, coffee shops, libraries, etc Anywhere you do not know.
Information Security Awareness Training
Protecting PHI & PII 12/30/2017 6:45 AM
A Lawyer’s Ethical Duties Regarding Electronically Stored Information
Protection of CONSUMER information
Information Security.
Staying Austin College
Things To Avoid: 1-Never your password to anyone.
Cybersecurity Awareness
Robert Leonard Information Security Manager Hamilton
Lesson 2: Epic Security Considerations
Lesson 2: Epic Security Considerations
Lesson 2: Epic Security Considerations
Premier Employee Program Version 4.0
Personal Mobile Device Acceptable Use Policy Training Slideshow
Information Security in Your Office
Presentation transcript:

Information Security Everyday Best Practices Lock your workstation when you walk away – Hit Ctrl + Alt + Delete Store your passwords securely and don’t share them with anyone – Use a password protected Excel file or lock them away in a cabinet Be careful what you write – Write every as if it may become public Be suspicious of s with attachments and links – Even if that appears to come from within CBS or from a well known organization (airline, bank, etc) Report quickly – If something seems odd with your computer or you accidentally click on a suspicious link, call the CBS Service Desk or Transfer files securely – If you have to an attachment that has sensitive information – password protect that attachment and send the password through another channel (phone, text, IM) Use only approved services for CBS information – Use only CBS for CBS business and only approved file sharing services Practice “need to know” – Only share sensitive or highly confidential information with those that require it for conducting their job duties Keep an eye on your mobile devices at all times – Portable devices are very easy to steal or lose, make sure you’re being careful If you have further information security questions contact the CBS Information Security Group at

The Information Security Group Information Security Policies and Standards can be found on Stagehand – Information Security questions: – Report anything suspicious to ISG – –

Information Security Best Practices Your Role in Incident Response What is an Information Security Incident? Use of CBS information systems contrary to CBS policy Unauthorized access to CBS computer systems or CBS information Suspicious activity on CBS computer systems or CBS employee owned personal computer or mobile devices that contain CBS information Loss or theft of CBS owned or personal computer systems, mobile devices or other devices that contain CBS data It’s an incident… What should I DO? Call the CBS Service Desk (800) or them at the Information Security Group at It’s an incident… What should I NOT DO? Don’t take any direct action unless instructed to do so by the CBS Service Desk or other IT support (such as unplugging wires, disconnecting from the network, shutting down your computer) Don’t contact Law Enforcement (Corporate Security will do that when necessary) Don’t post anything about the incident on social media sites Provide as much information as possible! Pornography Don’t contact any media organizations

try a phrase instead of a word like: CBS1 you know 7hat our people R the best!” Go Long &, *, !, $, % Use numbers and special characters If you have to write down passwords, do so in a password protected or encrypted excel spreadsheet Don’t use “password” in the file name Store it securely Keep your CBS and personal passwords diverse and separate Don’t reuse passwords Information Security Best Practices Foundation of a Secure Password If you have further information security questions contact the CBS Information Security Group at

Keep an eye on your items at all times or store them securely Use a screen filter to avoid others “shoulder surfing” Use approved CBS technology (VPN) when using wifi Use a secure, password protected non-public wifi Discuss sensitive CBS information in public Let anyone else use your CBS provided device or account Use public computers or kiosks to access CBS systems or information (i.e. webmail) Information Security Best Practices Working Remotely If you have further information security questions contact the CBS Information Security Group at

Keep the software up to date If you lose it or it’s stolen, report it immediately Use a secure PIN (not 1111 or your birthday) Don’t connect to public wifi networks Backup your device Encrypt your device Information Security Best Practices Securing Your Mobile Device If you have further information security questions contact the CBS Information Security Group at