Information Protection & Cyber Security

Slides:



Advertisements
Similar presentations
Digital Certificate Installation & User Guide For Class-2 Certificates.
Advertisements

Installation & User Guide
TO A USB DEVICE. DATA CAN BE LOST DUE TO POWER SURGES MANUFACTURING DEFECTS HURRICANES/LIGHTENING STRIKES.
Digital Certificate Installation & User Guide For Class-2 Certificates.
Click Here for Download the Installation Files Click Here for Guide How to Extract Installation Files.
DAP-1520 FAQ’s Wireless AC750 Dual Band Range Extender.
Getting your Arduino to Work: Microsoft Windows 1.Install Arduino programming environment 2.Install Arduino Uno driver 3.Make sure you can download a program.
1 of 4 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
1 of 5 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
1 of 6 Parts of Your Notebook Below is a graphic overview of the different parts of a OneNote 2007 notebook. Microsoft ® OneNote ® 2007 notebooks are digital.
1 of 3 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
Portable Software. This program will explain what portable software is, how it can be used, and where it can be found. This is an advanced level technology.
XP 1 New Perspectives on Microsoft Windows XP, 2005 Service Pack 2 Update Appendix D Microsoft Windows XP, Service Pack 2 Update Appendix D – Setting Up.
Welcome to the Milagrow Universe
Epass 2003 Token Driver Installation Guide ***************************************
Windows Tutorial 9 Maintaining Hardware and Software
Digital Certificate Installation & User Guide For Class - 2 Certificates.
Digital Logic and State Machine Design Installing Xilinx WebPACK 12.4 CS 2204 Digital Hardware.
SECURING DATA FOR ER STAFF Windy L. Newton May 29, 2015.
Practical PC, 7th Edition Chapter 5: Organizing Files and Folders
Cambridge University Library Back-up, Storage and Sharing Helping you put into practice what you know you ought to be doing… Cambridge University Library.
Move Pictures From Your Mobile Phone to Your PC.  You never know when a photo opportunity is going to arise, which is why having a camera phone can be.
Information Security 493. Lab 11.3: Encrypt a Windows File Windows operating systems since Windows 2000 have included the ability to encrypt files. Follow.
Installation Walk-Through Step 1 – Download the Installation Files
Excel Electronic Membership Directions, Examples and Operational Hints. Created by: Jim Armbruster.
1 of 5 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
Final Union Training TY What’s New In TaxWise Gary Blauth Module NJ 2.3.
How to Download and Install the Naper eReader and eBook Naper Publishing Group.
© Harcourt Education 2006 OCR Nationals in ICT Teacher’s Resource; Unit 1 AO1 Lesson 3 Good Working Practices Keeping Work Safe.
1 of 3 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
Emedia Training Created October 13, 2009 By Thomas Redd.
Multi-Programmer User Guide 1. Contents 1.Product ComponentsProduct Components 2.Software InstallationSoftware Installation 3.Software UseSoftware Use.
OFL2Go Utility to copy OTDR trace files from an OFL250 or OFL280 to a PC, with fiber folders removed. Quick Reference Guide.
John Samuels October, Why Now?  Vista Problems  New Features  >4GB Memory Support  Experience.
Maryknoll Wireless Network Access Steps for Windows 7 As of Aug 20, 2012.
Mesa Wi-Fi 802.1x PEAP and EAP-TLS Authentication for Wi-Fi.
How to Backup your Encrypted Files A comprehensive guide on how to encrypt your most private files and upload them to a back-up server.
SuccessFactors - Frequently Asked Questions FAQs Question: I don't have easy access to a computer at work. What other options do I have? Answer: SuccessFactors.
 There are three things to get Trend Micro software for your PC. They are Download, Installation and Activation of the software license. Trend Micro.
How to Connect Wi-Fi HP Laptop/Desktop with Android Smart Phone? ( )
1-877(242)-3672 How to Use a Password Reset Disk on Windows 10?
Importing Quicken Files for Mac to Excel. Intuit introduced Quicken as a personal finance tool. If you also use it for your business purposes then you.
HP Indigo Sales & Marketing Suitcase Overview and setup
1.5 File Management.
Information Protection & Cyber Security
INFORMATION TECHNOLOGY NEW USER ORIENTATION
Getting Started with Application Software
Welcome © GTM Software. Welcome © GTM Software.
Sharing and Synching files
How to use Library Kindle Books
How to use Library Kindle Books
HOW TO CHANGE DLINK WIRELESS PASSWORD.
Introduction To Programming with LEGO NXT 1
Change sound track.
HOW TO PUT PASSWORD IN WORD, SPREAD SHEET AND DATABASE
Key behavior # 1 Be Secure Awareness Quiz
RBS Remote Business Support System
T_C_N_L_G_ E D I D I E O Y O H I E B J I R E A A W.
How to use Avast to Disable SSL/TLS in Outlook.  Here, you need to begin with opening Outlook and launch the “File” tab. Then you are required to click.
Backup your Data © EIT, Author Gay Robertson, 2017.
I forgot my iTunes backup password
HOW TO TRANSFER QUICKBOOKS FILES FROM ONE COMPUTER TO ANOTHER?
Join In Be Secure Presentation
Select “Save this to disk” option and click on “OK”
Windows 7                      .
Installation & User Guide
INFORMATION TECHNOLOGY NEW USER ORIENTATION
Using TrueCrypt 6th May 2009.
INFORMATION TECHNOLOGY NEW USER ORIENTATION
How To Password Protect A PDF Free With or Without Acrobat.
Presentation transcript:

Information Protection & Cyber Security Only Connect Authorized Devices and Use Encryption Be Secure Presentation Information Protection & Cyber Security INTERNAL

Only Connect Authorized Devices and Use Encryption External devices are frequently used for work purposes. As a result, they are one of the most common ways to attack companies. Don’t connect unknown, non-BASF, found or private devices to the BASF infrastructure. And remember to encrypt sensitive information. Only use BASF authorized devices and preferably encrypted USB sticks for business purposes Use encryption when storing (strictly) confidential information on USB sticks, etc. Close your wireless device connections like Bluetooth or Wi-Fi after use By using corporate devices for storing corporate data and encrypting them you avoid security breaches and protect BASF information. Unknown, non-BASF, found or private USB sticks BASF authorized USB sticks either with integrated encryption or additional encryption software (e.g. WinZip) INTERNAL

Use USB sticks with integrated hardware encryption How to setup the encryption on your USB stick? Plug in the USB stick and a USB drive (for installing purposes only) shows up. Set up your personal password by double-clicking the „DTVP_Launcher.exe“ file. The launcher will guide you through all setup steps. After setup, a separate drive will appear in your Windows-Explorer, where files can be saved. What do I need to know for setup and usage? Use a strong password and memorize it. Make sure it is different from other passwords you are using. Only store copies of centrally managed documents, because… … if you forget your password, the data is lost! (You can reset the stick and use it again) INTERNAL

Encrypt information with Winzip How to encrypt information using WinZip? Search for WinZip in the Start Menu. Open WinZip and switch the option “Encrypt” to On at the right side of the window. Choose the folder or files to be saved in encrypted WinZip form. Enter a strong password and confirm. Click the button “Save as” to finish the procedure. 1 2 For transferring large amounts of information to external partners, use SecureDocXpress. There is a limit of 5 files or 2 GB per batch. INTERNAL

Further information Be Secure Portal including videos, infographics, FAQs and e-learnings Information Protection Minimum Requirements Do you need more information? Contact us: Your Information Protection Officer Be Secure (be-secure@basf.com) INTERNAL