Be Safe, use Password Protection Michael Hodges ITS, Identity and Access Management mhodges@hawaii.edu.

Slides:



Advertisements
Similar presentations
Identity Theft What you need to know Betty White, April 2010.
Advertisements

The Most Critical Risk Control: Human Behavior Lynn Goodendorf Director, Information Security Atlanta ISACA Chapter Meeting June 20, 2014.
Information Security Confidential Two-Factor Authentication Solution Overview Shawn Fulton January 15th, 2015.
Emerging Trends: Cyber Threats Bryan Sheppard Cyber Security Defense Center.
October is National Cyber Security Month OIT and IT providers are launching an awareness campaign to provide tips and resources to help you stay safe online.
Design Aspects. User Type the URL address on the cell phone or web browser Not required to login.
INFORMATION SECURITY AWARENESS PRESENTED BY KAMRON NELSON AND ROYCE WILKERSON.
Data Protection Act. Lesson Objectives To understand the data protection act.
Information Security Phishing Update CTC
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
TITLE : E-SAFETY NAME : ABDUL HAFIQ ISKANDAR BIN ROZLAN PROGRAM : SR221 NO.STUDENT :
Brian Kelly, CISSP, CISM, MSIA Information Security Officer Director of Information Security and Network Operations “Quinnipiac University Information.
Identity Theft By: Chelsea Thompson. What is identity theft? The crime of obtaining the personal or financial information of another person for the purpose.
IT security By Tilly Gerlack.
The Protection of Information in Computer Systems Part I. Basic Principles of Information Protection Jerome Saltzer & Michael Schroeder Presented by Bert.
By John Williams. Why Secure Passwords Matter Passwords protect everything about you online. Once those passwords are discovered and used by someone else.
“2 million Facebook, Gmail and Twitter passwords stolen in massive hack”
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
5 different ways to get tricked on the internet. 1. Viruses A virus is a computer malware program that copies it’s files to the computer. This may allow.
By: Rathi Raja Section 1055, 005 About Internet Privacy  Should we have Internet Privacy? Why do we need it? Can having internet privacy help us and.
Protecting Children from Internet Pornographers Act of 2011.
Zeus Virus By: Chris Foley. Overview  What is Zeus  What Zeus Did  The FBI investigation  The virus for phones  Removal and detection  Conclusion.
PCS Technology for Students: Acceptable Use, Privacy, and Safety.
BuckeyePass Multi-Factor Authentication. 2 What is Multi-Factor Authentication? Adds a 2 nd layer of security Combines something you know with something.
Gmail Customer Service Phone Number
Yahoo Support toll free number USA/CA
Policy Development Milan Adams.
Key words: Secure | Password | Character
Want to be secure? Eliminate passwords.
Stay Safe in Cyber Space!!!
Understanding The Computer Login Account
Gift Card Risk Mitigation – Presentation A
PCS Technology for Staff: Acceptable Use, Privacy, and Safety
Some Methods Phishing Database & Password Exploits Social Engineering & Networking Weak Controls Default Accounts & Passwords Dated Software & Patch.
Cyber Attacks on Businesses 43% of cyber attacks target small business Only 14% of small business rate their ability to mitigate cyber risk highly.
VERIZON CUSTOMER SERVICE VERIZON CUSTOMER SERVICE NUMBER HELPLINE Just dial our Verizon Customer Care Number. Our Verizon,
[ Issues Faced By Yahoo Users] Presented By [Merlene Jose] Call Us:
Gmail Customer Service Online Chat. Gmail Technical Support Number Gmail technical support number is a 24/7 active service which provides the best technical.
Looking for Gmail customer service?Gmail customer service TROUBLESHOOT PROBLEMS  FORGOT GMAIL PASSWORD YOUR OR USERNAME FORGOT GMAIL PASSWORD  CAN'T.
Call For Yahoo Mail Account Support Number
Find The Best Yahoo customer service number
SBCGLOBAL SUPPORT If you are a SBCGOBAL user and have an issue with the services of sbcglobal, contact us for instant help and support at sbcglobal.
Google 2 Step Verification Backup Codes Google 2 Steps Verification Backup Codes is very important to get access Gmail account. Backup codes is usually.
How to Secure Facebook Using Norton. If you are Norton customers and holds a Facebook account, this is how you can secure your account in few simple steps:
How to Change a Yahoo Mail Password. Login Yahoo Account.
Call us on (Toll-free). How to Manage the Norton Identity Safe Logins Those Login information that you store in Identity Safe includes.
Need To Fix YAHOO Sign In Problems?
Instact Call For Yahoo Mail Support Number Yahoo Mail Support Number Yahoo mail support number offers their customer for high quality support.
Call Now Yahoo Support Number Phone USA
Understanding IDENTITY Assurance
Yahoo suffers world’s biggest hack
smartmail & smartportal: Introducing Two-Factor Authentication
Philip Nichilo Vincent Carestia
INTERNET SAFETY Tip 1 Tip 2 Tip 3 Tip 4 Tip 5 The end BY:SAFIYYA
Practical tips to defend your business from cyber attacks
Qiyu chen, Xiaomin Dong, Chenhui Lai, Xinteng Chen, Vittorio DiPentino
Yahoo Password Change ? Dial Now
Considerations for Cybersecurity and Data Security in Today’s World
Hanqing Zhou|Yijiang Li|Jason M Mays|Karabo Ntokwane|Qianru Yang
Is this respect. What does this tell me about you
Multi-Factor Authentication
Who am I?. Information Security and You: Identity Theft and Credit Card Encryption.
Information Protection
SAGE Lecture Spark [10/2/18] The Publisher of the Social Sciences.
Dark Web Domain Status Report
Yahoo Mail Technical Support Expert Number
Information Protection
Founded in 2002, Credit Abuse Resistance Education (CARE) educates high school and college students on the responsible use of credit and other fundamentals.
Presentation transcript:

Be Safe, use Password Protection Michael Hodges ITS, Identity and Access Management mhodges@hawaii.edu

Unprotected Passwords, a risky behavior: In the News: 63% of Data Breaches Result from Weak or Stolen Passwords. Over 560 Million Passwords Discovered in Anonymous Online Database Yahoo Says 1 Billion User Accounts Were Hacked Verizon reports: Weak Stolen Password Still a Leading Factor in Breaches

Password Protection is relevant to each of us: UH Account Takeovers reported to us by Google 7,669 takeovers since 2011 3,742 takeovers just last year (2016) Password Protection would have prevented these.

ITS provides Password Protection today: Duo Security for your phone Duo Security baked into UH Login (CAS/Shib) Look for the ITS Fall 2017 awareness campaign.

http://www.hawaii.edu/its/mfa What can you do? Be proactive, protect your passwords today. Spread the word, tell your coworkers and students. FYI: ITS requires all staff and students to use Duo. http://www.hawaii.edu/its/mfa