Decluttering Your Digital Life

Slides:



Advertisements
Similar presentations
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Advertisements

Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Fraud, Scams and ID Theft …oh my! Deb Ramsay ESD 101 Chief Information Officer Technology Division.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
1 Enterprise Security Your Information Security and Privacy Responsibilities © 2008 Providence Health & Services This information may be replicated for.
PASSWORD MANAGER Why you need one 1. WHAT IS A PASSWORD MANAGER? A modern Password Manager is a browser extension (Chrome, Internet Explorer, Firefox,
Scams Stevie's Scam School videos
Practical PC, 7 th Edition Chapter 9: Sending and Attachments.
Password Management Programs By SIR Phil Goff, Branch 116 Area 2 Computers and Technology April 18,
Microsoft Office PowerPoint 2013 Microsoft Office PowerPoint 2013 Courseware # 3256 Lesson 8: Sharing Presentations.
Manjit kaur Manjit Kaur1. Why do we need to protect our computer from a virus? A reason why we need to protect our computer from a virus is because it.
March 14, Microsoft Microsoft officially announced the date and time that Internet Explorer 9 (IE9) will move away from a release candidate and.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Security Awareness ITS SECURITY TRAINING. Why am I here ? Isn’t security an IT problem ?  Technology can address only a small fraction of security risks.
Information Security and YOU!. Information Assurance Outreach Information Security Online Security Remote Access with Demonstration The Cloud Social.
ESCCO Data Security Training David Dixon September 2014.
Stay Safe & Secure Online. Outline Passwords Everyday Security Security Physical Security Protecting Personal Information.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Move Pictures From Your Mobile Phone to Your PC.  You never know when a photo opportunity is going to arise, which is why having a camera phone can be.
PLUG IT IN 7 Protecting Your Information Assets. 1.How to Protect Your Assets: The Basics 2.Behavioral Actions to Protect Your Information Assets 3.Computer-Based.
Instructional Technology & Design Office or Digital Security Basics Presented by Mark Baldwin &
Explain the purpose of an operating system
Manjit kaur Manjit Kaur1. Why do we need to protect our computer from a virus? A reason why we need to protect our computer from a virus is because it.
STARTFINISH DisposePrint & ScanShareStore Protect information and equipment ClassifyProtect.
Chapter 9 Sending and Attachments. 2Practical PC 5 th Edition Chapter 9 Getting Started In this Chapter, you will learn: − How works − How.
The Internet 8th Edition Tutorial 3 Using Web-Based Services for Communication and Collaboration.
Cyber Security and Staying Safe Online Mark D. Riley College of Health Sciences and Professions.
Internet Safety and Productivity Tips Presented by ITS Kerri Sorenson and Sean Hernandez December 11, 8:30-9:00 am.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
ITS Lunch & Learn November 13, What is Office 365? Office 365 is Microsoft’s software as a service offering. It includes hosted and calendaring.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Staying Secure in an Insecure World NATE HOWE CHIEF INFORMATION SECURITY OFFICER Education – Partnerships – Solutions.
STOP. THINK. CONNECT. Online Safety Quiz. Round 1: Safety and Security.
Computer Security Sample security policy Dr Alexei Vernitski.
Staff Induction Log On Credentials & Security Resources Web Applications / Software LanSchool Projectors / Cameras / Printing Laptops / WiFi.
Staying Secure in an Insecure World NATE HOWE CHIEF INFORMATION SECURITY OFFICER Education – Partnership – Solutions.
INFORMATION SECURITY OFFICE D ECLUTTERING Y OUR D IGITAL L IFE N ATE H OWE Chief Information Security Officer Education – Partnership – Solutions.
Intro to Digital Technology Review for Final Introduction to Digital Technology Finals Seniors Monday, 5/16 – 2 nd Tuesday 5/17 – 1 st,3 rd Underclassmen.
DISCOVERING COMPUTERS 2018 Digital Technology, Data, and Devices
How to stay safe using the internet & App’s
IT Security Awareness Day October 19, 2016
Information Technology Acceptable Use An Overview
DATA SECURITY FOR MEDICAL RESEARCH
Sharing and Synching files
Common Methods Used to Commit Computer Crimes
Unit 4 IT Security.
Information Security.
Everything You Wanted to Know About Encryption in Just 10 Minutes
OWASP CONSUMER TOP TEN SAFE WEB HABITS
Unit 11 Communication & Collaboration
Staying Austin College
Education – Partnership – Solutions
STOP. THINK. CONNECT. Online Safety Quiz.
How To Fix Verification Failed Error On iCloud?
Information Security Awareness 101
Information is at the heart of any University, and Harvard is no exception. We create it, analyze it, share it, and apply it. As you would imagine, we.
IT for Students Need IT Help? Visit
Digital $$ Quiz Test your knowledge.
Protecting Your Information Assets
Part 3.
HOW DO I KEEP MY COMPUTER SAFE?
Top Ten Cyber Security Hygiene Tips
Chapter 3: Protecting Your Data and Privacy
ICT Communications Lesson 3: Internet Life and Privacy
Internet Safety – Social Media
Online Safety; Privacy and Sharing
Online Safety; Privacy and Sharing
Presentation transcript:

Decluttering Your Digital Life Nate Howe Chief Information Security Officer Education – Partnership – Solutions

Education – Partnership – Solutions What’s The Problem? Information overload Consumerization of IT Distraction and short attention span More communication and less community Productivity tools, but are we less productive as we multitask? Plus, information security threats Education – Partnership – Solutions

Education – Partnership – Solutions Typical User Desktop or laptop computer at home Desktop or laptop computer at work Smartphone Tablet Smart TV Wearable technology In-car technology Social media presence Education – Partnership – Solutions

Let’s Start With Some Tech Tips… Education – Partnership – Solutions

Education – Partnership – Solutions Browser Favorites Save time by not retyping addresses Group sites according to purpose Less risk of visiting a malicious site Education – Partnership – Solutions

Education – Partnership – Solutions

Education – Partnership – Solutions Where Are My Files? Understand the concept of the file system Understand the concept of the user profile directory Local hard drive versus shared drive Box.com Consider where you will keep the “gold source” of a file, versus redundant copies Education – Partnership – Solutions

Education – Partnership – Solutions

Education – Partnership – Solutions

Education – Partnership – Solutions

Education – Partnership – Solutions

File Management Recommendations Use the network directories whenever possible (avoid storing to the local hard drive) Learn to use Box.com when collaborating with others Make sure your files are contained within the user profile and ensure backups of local hard drive Only one gold source of the file, yet multiple backups Use helpful folders and filenames Instead of “Annual” indicate the year Instead of “Final” indicate the version Make lots of folders if that will get you organized Education – Partnership – Solutions

Education – Partnership – Solutions

File Management Recommendations Always try to store electronic and scanned copies, rather than paper (better for BCP emergencies) Learn to “Export as PDF” or “Print to PDF” Education – Partnership – Solutions

Education – Partnership – Solutions

Education – Partnership – Solutions

Education – Partnership – Solutions External Drives Helpful method for backups and moving files between computers They can fail Realize they can be stolen, so think about how and where to store them Format flash drives when not in use Education – Partnership – Solutions

Education – Partnership – Solutions Email Management Folders Should you ever delete? Personal versus work From mobile phone, beware consolidated view Specific addresses for specific purposes? Education – Partnership – Solutions

Education – Partnership – Solutions

Email Management Recommendations Before overusing email, can you make a phone call or meet face to face? Save attachments to a network directory or local PC hard drive BEFORE making edits. Build filtering rules to automatically route mail into your folders Education – Partnership – Solutions

Education – Partnership – Solutions

Education – Partnership – Solutions Remote Access Education – Partnership – Solutions

Remote Access Recommendations Don’t email UT Dallas files to your personal address, just learn to use Outlook Web Access If you hate VPN, consider using Box.com When connecting to VPN, don’t get confused by drive mappings \\Utdfs01\utd\Dept\Security\ is G \\Utdfs01\utd\Users\nxh141030\ is H Education – Partnership – Solutions

Now Some Security Stuff… Education – Partnership – Solutions

Now Some Security Stuff… Education – Partnership – Solutions

Education – Partnership – Solutions Passwords Longer is stronger – consider a “passphrase” Different passwords for different services Keep passwords written down somewhere under your control Be careful when answering security questions – sometimes the answers can be researched using social media and online databases We are getting more questions about password vaults, such as LastPass Education – Partnership – Solutions

Education – Partnership – Solutions Avoid Phishing Scams Education – Partnership – Solutions

Education – Partnership – Solutions Avoid Phishing Scams Education – Partnership – Solutions

Education – Partnership – Solutions Avoid Phishing Scams Education – Partnership – Solutions

Education – Partnership – Solutions Avoid Online Scams Stick with reputable sellers; when using lesser-known websites look for familiar payment systems like PayPal and Amazon Regularly review your credit card statements for unusual charges Monitor your credit reports periodically (Equifax, Experian, and Trans Union) IRS scams are on the rise – file before someone does for you Be wary of e-mails and website banners offering “free” gifts, prizes, vacations Take note of the website address – is it constructed properly? Education – Partnership – Solutions

Education – Partnership – Solutions Avoid Online Scams Education – Partnership – Solutions

Education – Partnership – Solutions Software Updates More important than antivirus protection Not just the operating system, but all the installed applications (Office, Firefox/Chrome, Flash, Java, etc.) Enable automatic update options on your devices Beware malicious look-alike antivirus software Education – Partnership – Solutions

Education – Partnership – Solutions Email Encryption Encryption is like sending a letter in an envelope, instead of sending a postcard that anyone can read while handling it. Education – Partnership – Solutions

Education – Partnership – Solutions Email Encryption Education – Partnership – Solutions

Education – Partnership – Solutions UTD Campus Email Education – Partnership – Solutions

Education – Partnership – Solutions Email Off Campus Education – Partnership – Solutions

Education – Partnership – Solutions Email Encryption Education – Partnership – Solutions

Mobile Device Recommendations Set a strong passcode to unlock the screen Run current versions of software Only install apps from trusted sources Enable security settings, e.g. remote wipe and locate device Ensure data is backed up Avoid unsolicited calls, texts, and emails Do not leave the device unattended Education – Partnership – Solutions

Mobile Device Recommendations Education – Partnership – Solutions

Mobile Device Recommendations You can never have enough storage You will use more data than you expected Remove unnecessary apps Images and videos in text message threads are duplicate copies Education – Partnership – Solutions

Education – Partnership – Solutions Cloud Services Cloud is a marketing term Embrace reputable vendors providing valuable services Beware default settings, however. Understand what is synchronizing between your device and the provider Learn to use services like Box.com, iCloud, Google, Amazon, and CrashPlan Visit http://www.utdallas.edu/cometspace/ Education – Partnership – Solutions

Education – Partnership – Solutions Data Destruction Properly destroy or overwrite hard drives, memory cards, and electronic devices Shred documents rather than trash them Education – Partnership – Solutions

Education – Partnership – Solutions Social Networking Avoid establishing relationships online with people you have not met in person Adjust the available privacy settings within each website Consider the privacy and permanence of what you post, including pictures and location data Educate younger users about the risks of their “online lifestyles” Education – Partnership – Solutions

Education – Partnership – Solutions What’s The Solution? We all need to become more “technical” Learn from the experts…12 year olds on YouTube Technology isn’t good or bad, it’s how you use it Be willing to ask for help Put away devices when visiting friends, driving, and sleeping Education – Partnership – Solutions

Decluttering Your Digital Life Nate Howe Chief Information Security Officer Education – Partnership – Solutions