Information Technology Security Office of the Vice President for Information Technology New Employee Orientation II.

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
SECURITY CHECK Protecting Your System and Yourself Source:
TAX-AIDE Computer Security Chris Hughes Chairman NTC 1 NLT Meeting Aug 2014.
Protecting Your Identity: What to Know, What to Do.
1 MIS 2000 Class 22 System Security Update: Winter 2015.
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
9/20/07 STLSecurity is Everyone's Responsibility 1 FHDA Technology Security Awareness.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Tips and Techniques: How to Protect Yourself and Others Better Jeanne Smythe February 20, 2004.
10 Essential Security Measures PA Turnpike Commission.
Banking Safely. PIN and Password Selection and Protection Select unique digits (number and letter combinations DO NOT SELECT your birthdate, telephone.
Threats to I.T Internet security By Cameron Mundy.
Information Security Information Technology and Computing Services Information Technology and Computing Services
SHASHANK MASHETTY security. Introduction Electronic mail most commonly referred to as or e- mail. Electronic mail is one of the most commonly.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Security for Seniors SeniorNet Help Desk
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
CS101 Lecture 14 Security. Network = Security Risks The majority of the bad things that can be done deliberately to you or your computer happen when you.
Protecting People and Information: Threats and Safeguards
Safe computing and Malware Presentation done by Tylor Hardwick, Alex Gilsdorf, Code Forrester, Xander Winans.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Unit 19 INTERNET SECURITY
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
The Internet Netiquette and Dangers. Outline Netiquette Dangers of the Internet.
1.1 System Performance Security Module 1 Version 5.
Staying Safe Online Keep your Information Secure.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
IT security By Tilly Gerlack.
IT Security Essentials Lesley A. Bidwell, IT Security Administrator.
People use the internet more and more these days so it is very important that we make sure everyone is safe and knows what can happen and how to prevent.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
Safeguarding Your Privacy Section 1.3. Safeguarding Your Privacy 1. What is Identity Theft? 2. Research a story on identity theft and be prepared to report.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
STARTFINISH DisposePrint & ScanShareStore Protect information and equipment ClassifyProtect.
Ch9QQ T F 1.Hacking is an example of unauthorized access. T F 2.A Trojan horse is a type of malware that masquerades as another type of program. T F 3.A.
Information Security Sharon Welna Information Security Officer.
Grants Management Training 200 Cyber Security There are two kinds of people in America today: Those who have experienced a cyber-attack and know it, and.
Computer Skills and Applications Computer Security.
Protecting Your Identity © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Internet Security. 2 Computers on the Internet are almost constantly bombarded with viruses, other malware and other threats.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Cybersecurity Test Review Introduction to Digital Technology.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Any criminal action perpetrated primarily through the use of a computer.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
OCTOBER IS CYBER SECURITY AWARENESS MONTH. October is Cyber Security Awareness Month  Our Cyber Security Awareness Campaign focuses on topics such as.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Common sense solutions to data privacy observed by each employee is the crucial first step toward data security Data Privacy/Data Security Contact IRT.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
SAP – our anti-hacking software. Banking customers can do most transactions, payments and transfer online, through very secure encrypted connections.
Digital Security Identity theft Copyright Laws Plagiarism, and More.
IT Security  .
Protect Your Computer Against Harmful Attacks!
Staying Austin College
Robert Leonard Information Security Manager Hamilton
Digital $$ Quiz Test your knowledge.
Staying safe on the internet
HOW DO I KEEP MY COMPUTER SAFE?
Top Ten Cyber Security Hygiene Tips
How to keep the bad guys out and your data safe
Presentation transcript:

Information Technology Security Office of the Vice President for Information Technology New Employee Orientation II

What is Phishing?  Phishing - spoofed s and fraudulent web sites designed to fool recipients into divulging personal financial data  Risks  Identity theft  Credit card fraud

What is Malware?  Malware (malicious software) is software that is intended to damage or disable your computer.  Risks  Viruses  Worms  Trojans  Data loss/stolen  Ransom-ware

What is Spyware?  Spyware is software that allows  information to be obtained about someone elses computer by transmitting data without their knowledge, and  can cause your computer to not work properly

Web Attacks  Target Personal Information such as  Credit Card Information  Passwords  Bank Account Information

Best Practices : Mobile Devices  Enable a lock  Use password rather than 4-digit pins or pattern locks  Disable Bluetooth, infrared, or Wi-Fi when not in use  Set Bluetooth to non-discoverable mode  Never leave your devices unattended

Best Practices : Passwords  Has at least 15 characters  Use a mixture of letters, numbers and symbols  Use a memorable phrase  Keep safe and confidential  Do not share or write down your passwords  Always lock your computer or laptop when you walk away from it  DO NOT USE THE FOLLWING PASSWORD EXAMPLE  L!t$wDiamonds2015!

Best Practices : Encryption  Don’t share confidential information via  Use a secure file share, SharePoint, TRACS, or using encrypted USB drives  SEND ENCRYPTED – This option will encrypt and send your original . This is recommended for university ‐ related e- mail with a true business need and also an optional choice for personal .  Example  Subject: [Encrypt] Hello

Best Practices : Laptop Encryption  Reduce the risk of university confidential data exposure through stolen or lost equipment.  Implement full-disk encryption solutions that meets industry and State of Texas Administrative Code (TAC 202) standards.

Best Practices : Browser Security  Configure Privacy and security settings  Clear history  Disable third party cookies  Enable phishing and malware protection  Disable Autofill, javascript, plugins, location tracking  Enable pop-up blocker  Automatically update

Security Software  Anti-Virus  Identity Finder  Windows Updates

Contact Information  Information Technology Security (IT Security)  (512)    Information Technology Assistance Center (ITAC)  (512) 245-ITAC (4822) 