Information Protection & Cyber Security

Slides:



Advertisements
Similar presentations
Darton College Information Systems Use Policies. Introduction Dartons Information Systems are critical resources. The Information Systems Use Policies.
Advertisements

Presentation. Contemporary Communication Fast – connects us quickly without delays Reliable – works always Global – connects us with the whole world Low.
Virtual Private Networks COSC541 Project Jie Qin & Sihua Xu October 11, 2014.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Web Servers Security: What You Should Know. The World Wide Web (WWW) is one of the best ways to develop an e-commerce business presence and interact with.
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
Securing Your Networks Personal Safety Rules Apply Here Too. Corporate Identity Theft SPAM.
VPNs Virtual Private Networks. VPNs: Purpose Emulate a private network using shared Service Provider infrastructure Same policies as private network What.
9 99 CHAPTER Privacy and Security - FAQ’s. 9 © The McGraw-Hill Companies, Inc Privacy How secure is data –On system –On Internet Private network.
Chapter 10 Virtual Private Networks. VPN Defined  A segment of the public network made to appear part of a private network so that it can be used to.
Chapter 11: Dial-Up Connectivity in Remote Access Designs
CACI Remote Access CACI has a range of remote access tools for offsite employees who need to connect to resources inside the CACI private network
By Julia Nguyen B2. What is it?  Networking is two or more computers linked together  Two common types are Local Area Network (LAN) and Wide Area Network.
Knowledge management exercise GROUP 2 Melisides Konstantinos Konstantinidou Angeliki Evgenidis Nikos
1 Overview of Microsoft ISA Server Introducing ISA Server Protects resourcesProtects resources Connects directly to the Internet and your private.
1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection.
Aware the Effect of Social Network For 1 Malaysia’s Safety Towards A Healthy Virtual Socialization.
1 Chapter 7: NAT in Internet and Intranet Designs Designs That Include NAT Essential NAT Design Concepts Data Protection in NAT Designs NAT Design Optimization.
Module 5: Configuring Access for Remote Clients and Networks.
FLOOR CANDY.
McGraw-Hill © ©The McGraw-Hill Companies, Inc., 2004 Chapter 31 Security Protocols in the Internet.
STARTFINISH DisposePrint & ScanShareStore Protect information and equipment ClassifyProtect.
Virtual Private Network. VPN In the most basic definition, VPN is a connection which allows 2 computers or networks to communicate with each other across.
KTAC Security Task Force Superintendents Update April 23, 2015.
Module 10: Providing Secure Access to Remote Offices.
Staying Safe Online. Who are we ? What do we do ? Why are we here ?
Virtual Private Network and Customer Relationship Management By: Saeed Baayoun.
Understand Network Isolation Part 2 LESSON 3.3_B Security Fundamentals.
Security Issues and Challenges in High Performance Grid Computing SASA SUBOTIC SASA SUBOTIC University of Pretoria.
What's a Firewall? A security system that acts as a protective boundary between a network and the outside world Isolates computer from the internet using.
VPN. CONFIDENTIAL Agenda Introduction Types of VPN What are VPN Tokens Types of VPN Tokens RSA How tokens Work How does a user login to VPN using VPN.
Welcome to …. Your IT Department: Client or Server?
Information Security Everyday Best Practices Lock your workstation when you walk away – Hit Ctrl + Alt + Delete Store your passwords securely and don’t.
WHAT IS CYBER SECURITY? Governments, military, corporations, financial institutions, hospitals and other businesses collect, process and store a great.
E-Safety. When using computers, we need to keep our data safe. We also need to keep ourselves safe online. Data security is about making sure that data.
Joe Knight’s Company VPN Policy. What is VPN? Virtual Private Network (VPN) will allow you all as users to remote into the network from home or anywhere.
Ideal in addition to fast VPN Service Provider using Secure VPN Access.
SuccessFactors - Frequently Asked Questions FAQs Question: I don't have easy access to a computer at work. What other options do I have? Answer: SuccessFactors.
PUBLIC COMPUTER SAFETY
What is Cloud Computing?
“Be Secure” – How to implement the 9 key behaviors in your team
Shopping online tips Presented by: Wala Al-Zahrani
Virtual Private Network
Virtual Private Networks,
ComArtSci Technology Update
Cyber Security Awareness Workshop
Information Protection & Cyber Security
Planning & System Installation
Key behavior # 1 Be Secure Awareness Quiz
Our Children and Social Media
Fix Microsoft Office Error Code Call
Panda Antivirus. 1. Panda Antivirus is a free antivirus software and also provide security to the cyber. 2. Panda Antivirus provides security to the business.
Join In Be Secure Presentation
Security Protocols in the Internet
VPN What, where, who, why when?.
PART 2.
This presentation uses a free template provided by FPPT.com Computer Support and Services in Connecticut
This presentation uses a free template provided by FPPT.com Professional Security Systems Ct.
Securing a Connected Transportation System
Observations and Eyewitness Testimony
Responsible Use Policy
This presentation uses a free template provided by FPPT.com New Office IT Setup Services
Presented By : Virtual Office CanberraVirtual Office Canberra.
MetTel Cloud Connect Seamlessly Secure Your Path to Cloud Providers
CYBER SECURITY SPACE OPERATIONS AND RESILIENCY.
Vpn’s Virtual private network is a private network that extends across a public network or internet which enables people to send and receive data across.
LO1 - Know about aspects of cyber security
World-Leading Research with Real-World Impact!
OCI – VPN Connect Internet Customer Premises
Presentation transcript:

Information Protection & Cyber Security Connect to the BASF Network when working outside the office Be Secure Presentation Information Protection & Cyber Security INTERNAL

Connect to the BASF Network when working outside the office Being outside the office also means being outside of the secure “BASF network environment”. Take additional security measures, such as using a VPN, and always keep an eye on your physical environment. Pay attention to your environment while working outside the office Don’t use non-BASF networks without a VPN connection Protect your work from shoulder surfers by using a privacy filter on your computer screen Pay attention to your environment while working outside the office Don’t use non-BASF networks without a VPN connection Protect your work from shoulder surfers by using a privacy filter on your computer screen Activate VPN (Virtual Private Network) right after establishing a connection to a non-BASF network. This protects you to securely continue working with internal or (strictly) confidential business information. BASF VPN protects your information! INTERNAL

Further information Be Secure Portal including videos, infographics, FAQs and e-learnings Information Protection Minimum Requirements Do you need more information? Contact us: Your Information Protection Officer Be Secure (be-secure@basf.com) INTERNAL