Presentation is loading. Please wait.

Presentation is loading. Please wait.

Security Squad Keeping your Equipment and Information Safe Security Squad Keeping your Equipment and Information Safe Security Squad Video Series, Part.

Similar presentations


Presentation on theme: "Security Squad Keeping your Equipment and Information Safe Security Squad Keeping your Equipment and Information Safe Security Squad Video Series, Part."— Presentation transcript:

1 Security Squad Keeping your Equipment and Information Safe Security Squad Keeping your Equipment and Information Safe Security Squad Video Series, Part 2 Presenter, Title University of ________________ 9/22/2015Security Squad Video Series

2 9/22/2015Security Squad Video Series The Security Plan Plan Overview

3 Inventory – Tallying What you Have Passwords – Creating Strong Passwords Backups – Making Secured Copies Viruses – Protecting Your Office from Malware Wireless – Limiting Your Exposure Firewalls – Stopping Hackers at the Door E-commerce – Buying and Selling Safely Online Employee Policies – Protecting the Company and Employees Security Plan Topics 9/22/2015Security Squad Video Series

4 9/22/2015Security Squad Video Series WirelessWireless Limiting Your Exposure

5 Wireless Network security protocols Public vs. private networks Encryption levels – WPA2 – MAC identification Web interface agreement Broadcast network? Key Points – Wireless 9/22/2015Security Squad Video Series

6 Wireless Devices Bluetooth settings – Recognize connections – Encryption software Wireless printers Key Points – Wireless 9/22/2015Security Squad Video Series

7 9/22/2015Security Squad Video Series FirewallsFirewalls Stopping Hackers at the Door

8 Hardware Firewalls Install on the cable or DSL Uses a web-based interface Inexpensive can be combined with routers Network server behind firewall Key Points - Firewalls 9/22/2015Security Squad Video Series

9 Software Firewalls Install on every computer Turn on pre-installed firewalls Commercial software Use only one software firewall Applications require firewall permissions Key Points - Firewalls 9/22/2015Security Squad Video Series

10 9/22/2015Security Squad Video Series FirewallsFirewalls What is your current firewall protection? Do you have hardware/software protections? Is the firewall activated? Who’s in charge of backing up files?

11 9/22/2015Security Squad Video Series E-commerceE-commerce Buying and Selling Safely Online

12 Secured Socket Layering (SSL) Identifiers Locked padlock will appear in the browser status, or Green safety bar will appear in the browser address bar, and URL address will begin with https:// instead of the usual http:// Key Points – E-Commerce 9/22/2015Security Squad Video Series

13 Website Authenticity 3 rd Party verification – Security protocols – Company – Domain name $$$ to $$$$ Purchase services Key Points – E-Commerce 9/22/2015Security Squad Video Series

14 Include company contact information Privacy Policy Internal policy for record keeping and disposal No credit card information in email, mail Limit employee exposure Work with ISP and merchant account rep. for best credit card security. Good Practices - E-Commerce 9/22/2015Security Squad Video Series

15 Cookies – Advantages – Plugs in information, saves time – Personalizes website Disadvantages – Auto-fills sensitive information Store or not-to-store Do not have browser store passwords Good Practices - E-Commerce 9/22/2015Security Squad Video Series

16 9/22/2015Security Squad Video Series E-CommerceE-Commerce What are your website e-commerce protocols? Do you have encryption protections? Is your website trusted by your customers? Do you have good online purchasing practices?

17 9/22/2015Security Squad Video Series Employee Policies Protecting the Company and Employees

18 Business Owner Responsibilities – Administrative Rights – Evaluate employee access rights – Encrypt sensitive files – Complete Inventory list Key Points – Employee Policies 9/22/2015Security Squad Video Series

19 Employee Technology Rules – Approved File portability – Work from home policies – Smart phone/PDAs – Secure the workspace – Employee training Key Points – Employee Policies 9/22/2015Security Squad Video Series

20 Email/Internet Use – Monitoring email – Acceptable Internet Use policies – Illegal activity and consequences Key Points – Employee Policies 9/22/2015Security Squad Video Series

21 Handling Sensitive Data – Secure sensitive documents – Cross-cut shredder – Credit Card procedures Key Points – Employee Policies 9/22/2015Security Squad Video Series

22 9/22/2015Security Squad Video Series Employee Policies Review your employee technology use policies Are they applicable and current? Are they attorney reviewed? Do they reflect new security policies and practices?

23 Security Squad – Part 2 Contact: _________________________ _________________________ 9/22/2015Security Squad Video Series


Download ppt "Security Squad Keeping your Equipment and Information Safe Security Squad Keeping your Equipment and Information Safe Security Squad Video Series, Part."

Similar presentations


Ads by Google