Traveling Securely. Unsecured Networks and browsing  Using Unsecured Networks –Hotels, airports, coffee shops, libraries, etc Anywhere you do not know.

Slides:



Advertisements
Similar presentations
Internet Safety at Work Protect company, customer, and your data online.
Advertisements

Online Privacy A Module of the CYC Course – Personal Security
©2013 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Best Practices to Secure the Mobile Enterprise Macy Torrey
Smartphone and Mobile Device Security IT Communication Liaisons Meeting October 11, 2012 Theresa Semmens, CITSO.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Supporting The Mobile Client: Expanding Our Borders John Guidone Manager, Desktop Technologies and Dawn E. Colonese Manager, Help Desk & Client Access.
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
Part 2 of Evil Lurking in Websites Data Security at the University of Wisconsin Oshkosh.
SAFEGUARDING DHS CLIENT DATA PART 2 SAFEGUARDING PHI AND HIPAA Safeguards must: Protect PHI from accidental or intentional unauthorized use/disclosure.
What you don’t know CAN hurt you!
Introduction to Depository Institutions Presented by Day 2.
9/20/07 STLSecurity is Everyone's Responsibility 1 FHDA Technology Security Awareness.
Information Security Awareness:
OAAIS Enterprise Information Security Security Awareness, Training & Education (SATE) Program or UCSF Campus VPN.
Beyond WiFi: Securing Your Mobile Devices Thomas Kuhn Information Technology Assistance Center (iTAC) Kansas State University.
Data Security Issues in IR Eileen Driscoll Institutional Planning and Research Cornell University
1 of 2 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
Sensitive Data Accessibility Financial Management College of Education Michigan State University.
Scams Stevie's Scam School videos
10 Essential Security Measures PA Turnpike Commission.
Joel Garmon, Director, Information Security Mike Rollins, Security Architect Jeff Teague, Security Analyst, Senior 1
Mobile Phone Theft. Serving our communities and protecting them from harm Introduction Mobile Phone Theft There were an estimated 742,000 victims of mobile.
Securing Information in the Higher Education Office.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Digital Citizenship Evan Shipp. Fair Use Guidelines To determine whether or not use of certain materials violate copyright infringement laws one must.
Hacking Phishing Passwords Sourendu Gupta (TIFR).
ESCCO Data Security Training David Dixon September 2014.
Stay Safe & Secure Online. Outline Passwords Everyday Security Security Physical Security Protecting Personal Information.
Reliability & Desirability of Data
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
IT Security Essentials Lesley A. Bidwell, IT Security Administrator.
Wireless Security: Protect yourself when you’re mobile.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
Identity Theft What is Identity Theft?  Identity theft is a serious crime. Identity theft happens when someone uses information about you without your.
Trouble-shooting Tips Georgia Bulldogs I can receive, but not send messages  If you can successfully receive messages, but can’t send.
Safeguarding Your Privacy Section 1.3. Safeguarding Your Privacy 1. What is Identity Theft? 2. Research a story on identity theft and be prepared to report.
University Health Care Computer Systems Fellows, Residents, & Interns.
Phillip Zerzan, Chief Emergency: 911 or Non-Emergency: Portland State University Campus.
Internet and Social Media Security. Outline Statistics Facebook Hacking and Security Data Encryption Cell Phone Hacking.
COMPUTER SECURITY BEST PRACTICES. SECURE YOUR STUFF!  Physically secure your workstation by locking your screen when away  Secure any small, easy to.
Computer Security Hacking, Phishing, Passwords Kausalya S. And Sushil Mujumdar (CCCF) 04 - Aug - 15.
How to safely use Facebook. Ken Loveday. TIPS FOR PROTECTING PERSONAL INFORMATION FACEBOOK LOGIN  Required Info  Name   Password  Birthday.
STARTFINISH DisposePrint & ScanShareStore Protect information and equipment ClassifyProtect.
Joel Rosenblatt Director, Computer and Network Security September 10, 2013.
FTP File Transfer Protocol Graeme Strachan. Agenda  An Overview  A Demonstration  An Activity.
CS101 Network Setup. Parts of a network Everything on a network is called a ____ Three main types of _____: –__________ Devices = Printers, Scanners,
Staying Secure Online How do we buy and sell safely on the Internet?
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Trouble-shooting Tips Georgia Bulldogs I can receive, but not send messages  If you can successfully receive messages, but can’t send messages,
Government Agency’s Name April Identity Theft is when someone steals your personal information and uses it as their own, usually for some financial.
Information Security Everyday Best Practices Lock your workstation when you walk away – Hit Ctrl + Alt + Delete Store your passwords securely and don’t.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Top 100 security tips. Topics Social Engineering Social Media Physical computer security Password security Smartphones Encryption Anti Virus Public computers.
STOP. THINK. CONNECT. Online Safety Quiz. Round 1: Safety and Security.
Common sense solutions to data privacy observed by each employee is the crucial first step toward data security Data Privacy/Data Security Contact IRT.
Setting Up Your New iPad. Turn on Your iPad and then… Select English Select United States Select DVUSD Mobile as your wifi network Select enable location.
Digital Skills Award Day 1 – Introduction to your Programme of Learning.
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
Information Technology
OWASP CONSUMER TOP TEN SAFE WEB HABITS
Things To Avoid: 1-Never your password to anyone.
How to fix yahoo mail pop sending and receiving issues?
IT for Students Need IT Help? Visit
What you can do to support people to be safe online
Digital $$ Quiz Test your knowledge.
Text Messages To Your Office Number
Joining a WEBEX Meeting
Presentation transcript:

Traveling Securely

Unsecured Networks and browsing  Using Unsecured Networks –Hotels, airports, coffee shops, libraries, etc Anywhere you do not know how they manage their network –Check for HTTPS in your browser, and a lock icon –Browsers will show a Green label next to the URL for some sites. It means site is authentic. –Anyone on the network can listen to you! –If you have an app without SSL, Do not run it E.g., Do not send any sensitive info in your IM, or tweets. Everyone can see your messages

security  How to do your ? –Many hotels block ports other than 8080 and 8443 –Do not try to change the settings in your client –Do not try to disable security in your client Tip: Always Check “use secure connection TLS” –Use the Web Client for the imapserver.fnal.gov

Using Kiosk at the airport, coffee shops, etc  Even if you access secure webmail client or HTTPS –Do Not! –The machines may be dirty, keyboard loggers, infected browser, etc –Accounts have been infected this way! –If you have to use, –Minimize personal information entry –Reset the browser history before logging off

Physical Security  To avoid thefts of laptops and smart phones: –Pay attention to your belongings –Do not leave your items unattended –Use a screen lock AND a physical lock if you must walk away –Buy a physical lock to chain your computer to a desk if you work in public areas a lot when you travel (shared lab environment, etc). –

Physical Security  If your wallet or passport is stolen –Contact your embassy right away –Contact local law enforcement –Good to inform FNAL help desk –Did you have any passwords written in your wallet?

Physical Security  If your laptop is lost or stolen: –Contact local law enforcement –Contact Fermilab service desk