CDAC ITS Security Awareness How to help your daily computer activities remain safe and sane.

Slides:



Advertisements
Similar presentations
User Authentication on Mobile Devices Google Two Factor Authentication OTP (One Time Password)
Advertisements

Technology & You! Download this PowerPoint at:
Smartphone and Mobile Device Security IT Communication Liaisons Meeting October 11, 2012 Theresa Semmens, CITSO.
Thank you to IT Training at Indiana University Computer Malware.
7 Effective Habits when using the Internet Philip O’Kane 1.
TAX-AIDE Computer Security Chris Hughes Chairman NTC 1 NLT Meeting Aug 2014.
Security for Today’s Threat Landscape Kat Pelak 1.
TAX-AIDE Computer Security Chris Hughes (HMR mod) Chairman NTC 1 NLT Meeting Aug 2014.
Trojan Horse Program Presented by : Lori Agrawal.
INFORMATION SECURITY STUDENT GUIDE. There is only one true way to secure a computer. 1.Cut off all the cables, bury the computer in concrete 2.Put the.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Your Trusted Partner In All Things IT. 20 Years of IT Experience University Automotive Food Service Banking Insurance Legal Medical Dental Software Development.
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Keeping Information Safe Task 4. Basic security measures Passwords Change password on regular basis Do not use names or words easily linked to yourself.
Security Chapter 8 Objectives Societal impact of information and information technology –Explain the meaning of terms related to computer security and.
Security Awareness ITS SECURITY TRAINING. Why am I here ? Isn’t security an IT problem ?  Technology can address only a small fraction of security risks.
ESCCO Data Security Training David Dixon September 2014.
Stay Safe & Secure Online. Outline Passwords Everyday Security Security Physical Security Protecting Personal Information.
Staying Safe Online Keep your Information Secure.
IT Security Essentials Lesley A. Bidwell, IT Security Administrator.
Computer Security Preventing and Detecting Unauthorized Use of Your Computer.
The Strickland Group Founded in employees Information Technology consulting – Software Development – HelpDesk Support – Network Infrastructure.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
1 C-DAC/Kolkata C-DAC All Rights Reserved Computer Security.
Types of Electronic Infection
A Growing Threat Debbie Russ 1/28/2015. What is Ransomware? A type of malware which restricts access to the computer system that it infects, and demands.
Internet and Social Media Security. Outline Statistics Facebook Hacking and Security Data Encryption Cell Phone Hacking.
3.06 Data Encryption Unit 3 Internet Basics. Introduction In May of 2006, an analyst with the U.S. Department of Veterans Affairs was robbed of his notebook.
Frequently Asked Questions NCSC Product Certification Payroll Anytime, Anywhere!
Information System Security. Agenda Survey Results Social Networking Multi-Factor Authentication & Passwords Phishing Schemes Cyber Bullying Advice.
How can IT help you today?. Agenda Why Do You Care? What Are The Risks? What Can You Do? Questions? How can IT help you today? 2.
Cyber Security and Staying Safe Online Mark D. Riley College of Health Sciences and Professions.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
@ BCHS. The School Policy is your guide to ensuring you and your students are safe. It is your responsibility to make yourself aware and familiar with.
Internet Safety and Productivity Tips Presented by ITS Kerri Sorenson and Sean Hernandez December 11, 8:30-9:00 am.
January 07 th 2016 Intelligence Briefing NOT PROTECTIVELY MARKED.
PRIVACY BOOTCAMP Jack Vale - Social Media Experiement.
INTRODUCTION & QUESTIONS.
About Us AVG is a global security software maker protecting 98 million active users in 170 countries from the ever-growing incidence of Web threats, viruses,
Cybersecurity Test Review Introduction to Digital Technology.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
 There are many android hack tool given on the internet that promises to give you best performance. But unfortunately most of the android hack tool are.
Policies and Security for Internet Access
Computer Security & Backups LO: Understanding the need for computer security and typical ways to ensure that a system is secure. Learning Outcome : Define.
COMPUTER VIRUSES By James Robins. THE IMPACT OF VIRUSES By James 2.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
©2016 Check Point Software Technologies Ltd. 1 Latest threats…. Rolando Panez | Security Engineer RANSOMWARE.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Office 365 is cloud- based productivity, hosted by Microsoft. Business-class Gain large, 50GB mailboxes that can send messages up to 25MB in size,
SAP – our anti-hacking software. Banking customers can do most transactions, payments and transfer online, through very secure encrypted connections.
Technological Awareness for Teens and Young Adults.
R ANSOMWARE CAN ORIGINATE FROM A MALICIOUS WEBSITE THAT EXPLOITS A KNOWN VULNERABILITY, PHISHING CAMPAIGNS,
Protecting Against Cyber Attacks PLEASE TAKE A MINUTE TO LOOK AT THIS IMPORTANT MESSAGE. THIS IS HAPPENING HERE AND NOW! LET US SAVE YOU AND YOUR INFORMATION.
Intro to Digital Technology Review for Final Introduction to Digital Technology Finals Seniors Monday, 5/16 – 2 nd Tuesday 5/17 – 1 st,3 rd Underclassmen.
November 14, 2016 bit.ly/nercomp_defendingyourdata16
Mobile Threats: Ransomware, RAT’s, & the Compromised App Market
Managing Windows Security
What they are and how to protect against them
Hotspot Shield Protect Your Online Identity
Information Security.
Cyber Security Awareness Workshop
Things To Avoid: 1-Never your password to anyone.
Risk of the Internet At Home
The Internet of Unsecure Things
Staying safe on the internet
Online Computer Security Tips For Parents
Cybersecurity Simplified: Ransomware
Defencebyte THE PERFECT SECURITY FOR YOUR COMPUTER.
Presentation transcript:

CDAC ITS Security Awareness How to help your daily computer activities remain safe and sane

Today we have many different access points to our Personal Information Passwords Persistent Login Social Media Phone Apps Online Media Sites

Security incidents are on the rise…daily Up 48% from 2013— an average of 117,339 reported security incidents per day

Video – Securing the Human 6&cid= &cid=95438

What steps can you take to minimize your risk of having your computer workstation compromised – Examples “Password”, “Help”, “be Aware”, “Delete?” Password Protection LogoutDo Not ShareChange Monthly Be Aware ProgramsRead Verify Senders Ask for Help Help DeskAsk co-workers In Doubt? Delete ! Password CheckAccount Check

Wired Magazine Security (Wireless Hijack) Date of Publication: Time of Publication: 9:14 am Hack Brief: Upgrade to iOS 9 to Avoid a Bluetooth iPhone Attack Jul 27, 06:00 AM Stagefright: It Only Takes One Text To Hack 950 Million Android Phones Most Android phones at risk from simple text hack, Last year, more than 1 billion Android devices shipped around the globe. Stay Vigilant CryptoLocker is a ransomware trojan which targeted computers running Microsoft Windows, [1] believed to have first been posted to the Internet on 5 September [2] CryptoLocker propagated via infected attachments, and via an existing botnet; when activated, the malware encrypts certain types of files stored on local and mounted network drives using RSA public-key cryptography, with the private key stored only on the malware's control servers. The malware then displays a message which offers to decrypt the data if a payment (through either bitcoin or a pre- paid cash voucher) is made by a stated deadline, and threatened to delete the private key if the deadline passes. If the deadline is not met, the malware offered to decrypt data via an online service provided by the malware's operators, for a significantly higher price in bitcoin.ransomwaretrojanMicrosoft Windows [1] [2]botnetencryptspublic-key cryptographybitcoin

Keep up the good work ! Personal Check you operating system updates regularly Turning On/Off Computer ? Persistent logins & Social Media “Do you want to remember this password?” Shoulder Surfing / Public & Private Work Updates are applied ? Programs slowing down ? No Inbound ? Internet connections fail Turn Off Computer Call x3630 Help

EIR Policy at North and District du/policies/electronic- information-resources

Questions? Answers?

Thank you ! North IT & Media Services