Presentation is loading. Please wait.

Presentation is loading. Please wait.

GSBS IT Resources and Security

Similar presentations


Presentation on theme: "GSBS IT Resources and Security"— Presentation transcript:

1

2 GSBS IT Resources and Security
Michael Valladolid IT Manager BSRB S3.8411

3 Enroll in Two-Factor Authentication
Clear your IDM hold Activates your network and account and gives you more access See me in person with state issued photo ID I will your login info and how to setup your password. Enroll in Two-Factor Authentication Login with a password and one other piece of information using your smartphone.

4 For some of you: Fill out the Information Resources User Acknowledgement Form Find it in your packet Turn in at Station 4 (Check-Out) on Wednesday morning Forms Due Session

5

6 Protect Password Data Your Computer Your Connection

7 Protect Data Confidential Data should NOT be stored on personal devices. Data that can cause harm if lost or stolen. Protected Health Information (PHI) Data “individually identifiable health information that is related to the "past, present or future physical or mental health condition" of a person.” Must be De-Identified. Research Data is sensitive data. Encrypt and Back up important data Phishing and Ransomware

8 Common vector for data loss

9 Cloud Storage http://www.uth.tmc.edu/UTH-Share/ All file types Sharing
unlimited space

10 Protect Your Computer Password login
Install security updates regularly Update your Anti-Virus Definitions Encrypt it.

11 Protect Your Connection
Wi-Fi: Use the secure access points. Do not use any file/media sharing software – such as bitTorrent, movie site plug-ins. Don’t go past the web filters. Log off

12 Are You Sure?

13 Email Us: gsbs.support@uth.tmc.edu
Us:

14


Download ppt "GSBS IT Resources and Security"

Similar presentations


Ads by Google