Staying Secure in an Insecure World NATE HOWE CHIEF INFORMATION SECURITY OFFICER Education – Partnership – Solutions.

Slides:



Advertisements
Similar presentations
WEEK THREE MANAGING, FINDING AND SELECTING INFORMATION- PART 2 Functional ICT.
Advertisements

The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
What to Know, What to Do Presentation Powered By: The Federal Trade Commission Consumer Protection Toolkit.
Protecting Your Identity: What to Know, What to Do.
1 Identity Theft and Phishing: What You Need to Know.
Identity Theft. MIS Training Institute, Inc.Section X - Slide 2CS1 053 ©Network Security Services, LLC Outline n Definitions n Methods used n Ways to.
Fraud, Scams and ID Theft …oh my! Deb Ramsay ESD 101 Chief Information Officer Technology Division.
Identity Theft Someone steals your personal information for his/her own gain It’s a crime!
Safe Computing Dave Carter, CISSP Michigan State University College of Agriculture and Natural Resources.
Operating System Customization
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 18, 20 & 25 March 2015.
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
October is National Cyber Security Month OIT and IT providers are launching an awareness campaign to provide tips and resources to help you stay safe online.
October is National Cyber Security Month OIT and IT providers are launching an awareness campaign to provide tips and resources to help you stay safe online.
Scams Stevie's Scam School videos
[your name, organization] Protecting Your IdentityProtecting Your Identity: What to Know, What to Do.
Online and Mobile Banking. Online banking Online Banking  Online banking is a fairly established practice in our internet-saturated world.  Many people.
New Data Regulation Law 201 CMR TJX Video.
Manjit kaur Manjit Kaur1. Why do we need to protect our computer from a virus? A reason why we need to protect our computer from a virus is because it.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Have You Lost Your Identity? By Sierra Bowland. Deter Detect Defend.
Who Is This?! By Bailey Hoover. Foreword Deter Detect Defend Deter, Detect, Defend Brochure ID Theft: What It’s All About.
SACHIN DEDHIA Cyber Crime Investigator Cert. Ethical Hacker(USA)
Identity Theft By: Victoria Tuttle. DeterDetect Defend.
WHEN BAD THINGS HAPPEN TO GOOD NAMES IDENTITY THIEVES FRADULENTLY USE YOUR PERSONAL INFORMATION TO.
Security Awareness ITS SECURITY TRAINING. Why am I here ? Isn’t security an IT problem ?  Technology can address only a small fraction of security risks.
Information Security and YOU!. Information Assurance Outreach Information Security Online Security Remote Access with Demonstration The Cloud Social.
ESCCO Data Security Training David Dixon September 2014.
Stay Safe & Secure Online. Outline Passwords Everyday Security Security Physical Security Protecting Personal Information.
1.1 System Performance Security Module 1 Version 5.
Computer Security By: MacKenzie Olson. To be safer and more secure online, make these seven practices part of your online routine.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Identity theft By Joey Pawoll. intro DeterDetectDefend.
PLUG IT IN 7 Protecting Your Information Assets. 1.How to Protect Your Assets: The Basics 2.Behavioral Actions to Protect Your Information Assets 3.Computer-Based.
Protecting Yourself Against Identity Theft By Sierra Monif Next.
Be Cautious of Identity Theft By: Sydney Langley.
Safeguarding Your Privacy Section 1.3. Safeguarding Your Privacy 1. What is Identity Theft? 2. Research a story on identity theft and be prepared to report.
Computer Security By Rachel Gaines. Computers are used for work, play, and everything in between. So here’s how to keep it fun and protected.
WE ARE DATA By Hazim Zaidani Do you really think that your personal data is protected ? Well… Think Again !!!
Manjit kaur Manjit Kaur1. Why do we need to protect our computer from a virus? A reason why we need to protect our computer from a virus is because it.
FINANCIAL MANAGEMENT 29 AUG 05 OC CARUSO. OVERVIEW BUDGETS CREDIT CARDS IDENTITY THEFT IMPORTANT FINANCIAL TOPICS FOR NEW COLLEGE STUDENTS.
Justice Stillwell 1.  Pre paid cards are non- reloadable  Similar to credit cards  No line of credit needed  Make sure you have enough balance before.
Computer Security By: Alex Metzler. Table of Contents Protecting Your Personal Info Know Who You’re Dealing With Use Updated Security Software Update.
Protecting Your Identity Anders Olson Computers III September 18, 2008.
Consumer Protection Shop Safely and Guard Your Financial Information.
Minding your business on the internet Kelly Trevino Regional Director October 6,2015.
Society & Computers PowerPoint
Identity Theft PD Identity Theft Identity theft is a serious crime which can: Cost you time and money Destroy your.
Cybersecurity Test Review Introduction to Digital Technology.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Personal Data Protection and Security Measures Kelvin Lai IT Services - Information Security Team 12 & 13 April 2016.
Staying Secure in an Insecure World NATE HOWE CHIEF INFORMATION SECURITY OFFICER Education – Partnerships – Solutions.
INFORMATION SECURITY OFFICE D ECLUTTERING Y OUR D IGITAL L IFE N ATE H OWE Chief Information Security Officer Education – Partnership – Solutions.
Computer Security Keeping you and your computer safe in the digital world.
Avoiding Frauds and Scams Barbara Martin-Worley Director, Consumer Fraud Protection 18 th Judicial District Attorney’s Office Serving Arapahoe, Douglas,
Information Technology Security Office of the Vice President for Information Technology New Employee Orientation II.
Protecting Against Cyber Attacks PLEASE TAKE A MINUTE TO LOOK AT THIS IMPORTANT MESSAGE. THIS IS HAPPENING HERE AND NOW! LET US SAVE YOU AND YOUR INFORMATION.
Intro to Digital Technology Review for Final Introduction to Digital Technology Finals Seniors Monday, 5/16 – 2 nd Tuesday 5/17 – 1 st,3 rd Underclassmen.
Properly Safeguarding Personally Identifiable Information (PII) Ticket Program Manager (TPM) Social Security’s Ticket to Work Program.
Lesson 10A: The Three D’s of Identify Theft
Decluttering Your Digital Life
Protecting Your Identity:
OWASP CONSUMER TOP TEN SAFE WEB HABITS
Staying Austin College
Education – Partnership – Solutions
Protecting Your Identity:
Digital $$ Quiz Test your knowledge.
Protecting Your Information Assets
Presentation transcript:

Staying Secure in an Insecure World NATE HOWE CHIEF INFORMATION SECURITY OFFICER Education – Partnership – Solutions

What is information security? Information has value; it is an asset Securing information requires people, processes, technologies, and facilities properly designed and operating to resist threats Risks can be managed, but never fully eliminated Education – Partnership – Solutions

Agenda Computer security Mobile device security Social engineering Physical security Discussion Education – Partnership – Solutions

Passwords Longer is stronger – consider a “passphrase” Different password for each service Security questions can be researched using social media Education – Partnership – Solutions

Education – Partnership – Solutions

Avoid this by considering a password vault such as LastPass Education – Partnership – Solutions

Software updates Operating system, 3rd party software, anti-malware software Enable automatic update options on devices Patching is more important than running anti-malware software Education – Partnership – Solutions

Beware look-alike anti-malware software… Education – Partnership – Solutions

Digital housekeeping Delete what is not needed Delete multiple copies of same file Delete outdated versions Unclogs & speeds up device Education – Partnership – Solutions

Backups Backup everything else Network shared drives and home directories CometSpace powered by box.com Online services such as CrashPlan, Carbonite, and iCloud External hard drives Recover from ransomware if uninfected backups are available Education – Partnership – Solutions

Online scams

Take note of the website address - Is it constructed properly? Education – Partnership – Solutions

Regularly review your credit card and bank statements for unusual charges Monitor your credit reports periodically (Equifax, Experian, and Trans Union) Education – Partnership – Solutions

Stick with reputable sellers and familiar payment systems Education – Partnership – Solutions

Be wary of unsolicited s, links, and website banners Education – Partnership – Solutions

Job scams on the rise… Job offers without an interview or even applying Initial checks to be deposited Personal information collected Education – Partnership – Solutions

Like this one… Education – Partnership – Solutions

Deal locally & face-to-face Avoid shipping or wiring money Obtain 3 rd party inspection Education – Partnership – Solutions

Computer security Mobile device security Social engineering Physical security Discussion Education – Partnership – Solutions

Securing your smartphone is as important as securing your desktops and laptops

Mobile Device Protection Require a passcode to unlock the screen Backup your device & keep software up-to-date Enable features to locate or erase your missing device Disable unnecessary location-based services Beware unsolicited phone calls & text scams Education – Partnership – Solutions

Only install software from trusted sources Education – Partnership – Solutions

Computer security Mobile device security Social engineering Physical security Discussion Education – Partnership – Solutions

Avoid establishing relationships online with people you haven’t met in person wrong-place-fbi-says-n Education – Partnership – Solutions

Safe social networking Adjust available privacy settings Consider not posting personal information and location data Consider the privacy and permanence of what you post Education – Partnership – Solutions

Educate users about the risks of their “online lifestyles” Education – Partnership – Solutions

Computer security Mobile device security Social engineering Physical security Discussion

Education – Partnership – Solutions

Secure your home

Information storage Decline writing SSN when possible Make copies of the cards in your wallet Avoid carrying unnecessary personal information Card statements, bills, and documented passwords should be locked up within the home Education – Partnership – Solutions

Information destruction Shred mail rather than trash it Properly destroy or overwrite hard drives, memory cards, and electronic devices Education – Partnership – Solutions

Computer security Mobile device security Social engineering Physical security Discussion Education – Partnership – Solutions

Staying Secure in an Insecure World NATE HOWE CHIEF INFORMATION SECURITY OFFICER Education – Partnership – Solutions