Presentation is loading. Please wait.

Presentation is loading. Please wait.

Lesson 2: Epic Security Considerations

Similar presentations


Presentation on theme: "Lesson 2: Epic Security Considerations"— Presentation transcript:

1 Lesson 2: Epic Security Considerations
This material contains confidential and copyrighted information of Epic Systems Corporation © Epic Systems Corporation – Confidential

2 Epic Security Considerations
In this lesson you will learn: ─ Password creation ─ Security Considerations ─ Where to find support material ─ Safety measures ─ Who to contact for security concerns

3 Epic Security Considerations
Your username is assigned to you by the IS Department. Usernames can be similar, but they are never the same. William R. Smith’s username could be SMITHWR. Passwords must be at least eight characters in length and contain at least one number. No more than 32 characters, cannot be dictionary words, cannot be reused, and must contain at least one number. Your Epic password is the same as your Citrix/Network (also referred to as Active Directory) password.

4 Epic Security Considerations
Remember to create strong passwords that use a mix of letters, numbers and punctuation. Be sure to make it something you can recall. No one should ever ask you for your password for any reason; never share your password with anyone. Report any suspicious activity to Information Services.

5 Epic Security Considerations
If you feel your password has been compromised, change it immediately. When changing a password, you may not reuse a password for 180 days. Your username coupled with your password makeup your electronic signature.

6 Epic Security General Security Awareness
Don’t trust unexpected s/files. Most computer viruses enter the network when an employee opens an attachment. If an attachment arrives unexpectedly, verify who sent it before you open it. Never open attachments from strangers. Never give out your password Never, under any circumstances, should a user give out their password. Watch out for persons attempting to get your password or information through social engineering. Social engineering is a method by which a person impersonates or intimates others to get sensitive information. Report any such cases to Information Services

7 Epic Security General Security Awareness
Use strong Hackers use tools that automatically try every word in the dictionary as your password. Choose longer, hard-to- guess passwords that contain a mix of letters, numbers, and punctuation. For easy-to-remember passwords, use a line from a poem, song, or movie. Supporting Material:

8 Epic Security General Security Awareness
Destroy notes containing passwords. More and more, thieves are stealing computer files or passwords from their victims. Notes and post-it notes around your work area containing passwords, account numbers, or other confidential information make it too easy. Clean up! Lock it up to lock them out . Never your leave your computer/applications open when you step away from your computer. Locking your PC will help to stop snooping passers by when you leave your desk.

9 Epic Security General Security Awareness
Stay in safe Web neighborhoods. You recognize the dangers of wandering to the tough part of town. Web surfing works the same way. Malicious software is installed on victims’ computers from a number of unsafe sites. If a web site does not look right….it probably is not! Look before you click. Look carefully at links before you click them. Unless you intend to download software, no website/web address should have .exe in it. That indicates an executable program, which could be malicious.

10 Epic Security General Security Awareness
Just click "no." When you visit a Web site and a box asks, "Should I remember your password?" do not enable it. The password is actually stored on your own computer. Anyone else using your computer can visit your Favorites and log in as you.

11 Epic Security General Security Awareness
Report suspicious activity Your computer is not performing as expected, there are more web pages popping up on your screen than clicked on or you notice a program installing and you did not start the installation. These are examples of what is considered suspicious activity on a computer and could indicate that spyware, adaware or remote control programs have been installed without your permission or knowledge. If you experience any of these or other suspicious activity, please call the help desk at

12 Epic Security General Security Awareness
When in doubt call Information Services Information Services is here for you. If you ever have a question or need to notify us of a problem, give us a call at Only with your help can we maintain the privacy and security of our systems.

13 Click on the displayed mouse to advance to Lesson 3!
End of Lesson 2 Click on the displayed mouse to advance to Lesson 3!


Download ppt "Lesson 2: Epic Security Considerations"

Similar presentations


Ads by Google