Information Technology Security Office of the Vice President for Information Technology New Employee Orientation II
What is Phishing? Phishing - spoofed s and fraudulent web sites designed to fool recipients into divulging personal financial data Risks Identity theft Credit card fraud
What is Malware? Malware (malicious software) is software that is intended to damage or disable your computer. Risks Viruses Worms Trojans Data loss/stolen Ransom-ware
What is Spyware? Spyware is software that allows information to be obtained about someone elses computer by transmitting data without their knowledge, and can cause your computer to not work properly
Web Attacks Target Personal Information such as Credit Card Information Passwords Bank Account Information
Best Practices : Mobile Devices Enable a lock Use password rather than 4-digit pins or pattern locks Disable Bluetooth, infrared, or Wi-Fi when not in use Set Bluetooth to non-discoverable mode Never leave your devices unattended
Best Practices : Passwords Has at least 15 characters Use a mixture of letters, numbers and symbols Use a memorable phrase Keep safe and confidential Do not share or write down your passwords Always lock your computer or laptop when you walk away from it DO NOT USE THE FOLLWING PASSWORD EXAMPLE L!t$wDiamonds2015!
Best Practices : Encryption Don’t share confidential information via Use a secure file share, SharePoint, TRACS, or using encrypted USB drives SEND ENCRYPTED – This option will encrypt and send your original . This is recommended for university ‐ related e- mail with a true business need and also an optional choice for personal . Example Subject: [Encrypt] Hello
Best Practices : Laptop Encryption Reduce the risk of university confidential data exposure through stolen or lost equipment. Implement full-disk encryption solutions that meets industry and State of Texas Administrative Code (TAC 202) standards.
Best Practices : Browser Security Configure Privacy and security settings Clear history Disable third party cookies Enable phishing and malware protection Disable Autofill, javascript, plugins, location tracking Enable pop-up blocker Automatically update
Security Software Anti-Virus Identity Finder Windows Updates
Contact Information Information Technology Security (IT Security) (512) Information Technology Assistance Center (ITAC) (512) 245-ITAC (4822)