In this tutorial, you will be shown security considerations that you should keep in mind while accessing or using any GW systems, including GWeb. Remember.

Slides:



Advertisements
Similar presentations
Cyber Stalking Cyber Stalking Phishing Hacker 1. Never reveal your home address !!! This rule is especially important for women who are business professionals.
Advertisements

How It Applies In A Virtual World. Phishing Definition: n. To request confidential information over the Internet under false pretenses in order to fraudulently.
Network Security aka CyberSecurity Monitor and manage security risks at the network level for the entire Johns Hopkins Network.
Jason Rich CIS  The purpose of this project is to inform the audience about the act of phishing. Phishing is when fake websites are created.
Strong : Do You Really Need Them? October 30, 2013.
ONLINE SAFETY Online safety Money Works: Level 1 Topic 3.
Security+ Guide to Network Security Fundamentals
October is National Cyber Security Month OIT and IT providers are launching an awareness campaign to provide tips and resources to help you stay safe online.
Cryptography: Keeping Your Information Safe. Information Assurance/Information Systems –What do we do? Keep information Safe Keep computers Safe –What.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Security Awareness Cloud Phishing Attacks
Computer Questions? Contact the OIT HelpDesk: (865) or
Hacking Phishing Passwords Sourendu Gupta (TIFR).
Information Security 101 Five things you should learn to protect your data and privacy February 26/27, 2014.
CCT355H5 F Presentation: Phishing November Jennifer Li.
Phishing Dennis Schmidt, CISSP Director, Office of Information Systems HIPAA Security Officer UNC School of Medicine UNC School of Medicine.
@ BCHS. The School Policy is your guide to ensuring you and your students are safe. It is your responsibility to make yourself aware and familiar with.
Internet safety. Dangers of a poor password How people guess your password Your partner, child, or pet's name, possibly followed by a 0 or 1 The last.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
that keeping money and personal information safe is very important That losing money or having personal information stolen can be distressing.
SAP – our anti-hacking software. Banking customers can do most transactions, payments and transfer online, through very secure encrypted connections.
Phishing and Internet Scams. Definitions and recent statistics Why is it dangerous? Phishing techniques and identifiers Examples of phishing and scam.
Communicating safely and appropriately online. Why do we need passwords?
Important Information Provided by Information Technology Center
Media education: from passive consumers to active creators
How to stay safe using the internet & App’s
Communicating safely and appropriately online
October 27, 2016 Main Line Association for Continuing Education
How to stay safe using the internet and app’s?
Fraud Protection.
Social Media Security: Understanding how to keep yourself safe.
An Introduction to Phishing and Viruses
Fraud protection.
Key words: Secure | Password | Character
PHISHING Hi, The comms team asked if I could refresh everyone about Phishing after a fairly successful phishing circulated last week that led to.
Learn how to protect yourself against common attacks
Unit 4 IT Security.
Protecting What’s Yours: Your Identity
Information Security.
How to use the internet safely and How to protect my personal data?
Safe Internet Mechatronika Budapest.
Information Security and Privacy Pertaining to Phishing and Internet Scams Brian Corl COSC 316 Information Security and Privacy.
Digital Footprints & Cyber Security Written by:
Phishing is a form of social engineering that attempts to steal sensitive information.
Passwords & Behavioral Ads
Staying Austin College
Presented by: Brendan Walsh Manager, Security and Access Management
STOP. THINK. CONNECT. Online Safety Quiz.
Cybersecurity Awareness
Fix All Your Issues at Trezor Support Phone Number
IT Security awareness Training.
Robert Leonard Information Security Manager Hamilton
Risk of the Internet At Home
Join In Be Secure Presentation
Health Insurance Portability and Accountability Act of 1996 (HIPAA)
Phishing.
Kent County Council Schools Bankline Presentation
Introduction to Computers
If I’d only known then what I know now about phishing…
Protecting Senior Citizens from Phishing s
Phishing Don’t fall for fake
Lorenzo Biasiolo 3°AI INFORMATION SECURITY.
What is Phishing? Pronounced “Fishing”
Communicating in the IT Industry
Keeping Our Data Secure
Donning your Detective Hat: Sniffing Out Payroll Fraud
Why Cyber Security is important to SME? Useful Tips on how you protect and secure your business. By Ronald Soh from Win-Pro Consultancy Pte Ltd
Founded in 2002, Credit Abuse Resistance Education (CARE) educates high school and college students on the responsible use of credit and other fundamentals.
Presentation transcript:

In this tutorial, you will be shown security considerations that you should keep in mind while accessing or using any GW systems, including GWeb. Remember that your data is precious. Even though the Division of IT takes several measures to keep your data confidential, these steps do not mitigate risks that may be a result of negligence, lack of awareness or unsecure computing practices. These are the reasons why, before you access this system, we would like you to know ways that you can help keep your data and GW secure.

Always create a strong password or PIN that will not be guessed or broken into easily. Remember, GW will NEVER ask for your password or PIN. Your password and PIN are confidential information that you should never share with anyone. If you see an , text message or any other type of communication asking you to provide information such as your GWid, NetID, passwords or PIN, it is FAKE! Report it to or contact the IT Support Center by calling GWIT ( The next few pages are examples of what these scams may look like.

Remember, your vigilance protects not only you but also everyone around you.

Learn how to protect your personal information: Recent phishing attempts that have been received by the Division of IT: How to check links if they are legitimate: GW's Twitter account for reporting recent phishing attempts: How to detect phishing video: to report security incidents or