Key behavior # 1 Be Secure Awareness Quiz

Slides:



Advertisements
Similar presentations
Internet Safety at Work Protect company, customer, and your data online.
Advertisements

Cyber Security on the go
Virginia Department for Aging and Rehabilitative Services.
Excuse Me. What is this woman telling us? Before you interrupt someone who is busy on the phone, talking with someone, or in a meeting, ask yourself?...
Helping our customers keep their computers safe.  Using your pet’s, business, family, friend’s names  Using number or letter sequences (0123, abcd)
1 Creating a Data Backup Oakland University University Relations Updated - June 2006.
HIPAA Basic Training for Privacy & Information Security Vanderbilt University Medical Center VUMC HIPAA Website:
Springfield Technical Community College Security Awareness Training.
The Importance of Information Security for Parkers Office Products.
Technology October 12, Data Security Verbal & Written – When to share data Other IU departments & employees Legitimate business need Employee and/or.
Contains M3 Information, LLC sensitive information. Proprietary and Confidential. M3Clinician iPad App Instructions for: Downloading Updating Redirecting.
Copyright © 2014 Merck Sharp & Dohme Corp., a subsidiary of Merck & Co., Inc. All rights reserved. In practice, how do we recognize a potential Privacy.
IT&S information technology and services (Run as Slide Show) Laptop Encryption – Password Change (Run as Slide Show)  As a user of an encrypted laptop.
10 Essential Security Measures PA Turnpike Commission.
Section Seven: Information Systems Security Note: All classified markings contained within this presentation are for training purposes only.
Security Squad Keeping your Equipment and Information Safe Security Squad Keeping your Equipment and Information Safe Security Squad Video Series, Part.
Privacy and Information Management ICT Guidelines.
Information Security & Compliance Financial Services Workshop February 10, 2010.
University Health Care Computer Systems Fellows, Residents, & Interns.
INFORMATION SECURITY WHAT IS IT? Information Security The protection of Information Systems against unauthorized access to or modification of information,
WE ARE DATA By Hazim Zaidani Do you really think that your personal data is protected ? Well… Think Again !!!
STARTFINISH DisposePrint & ScanShareStore Protect information and equipment ClassifyProtect.
Payment Card Acceptance Security Awareness Interactive Quiz.
KTAC Security Task Force Superintendents Update April 23, 2015.
Information Security. Your responsibilities as a Government of Canada employee.
Computer Security Sample security policy Dr Alexei Vernitski.
2015Computer Services – Information Security| Information Security Training Budget Officers.
Privacy and Security Challenge "Private" Benjamin For the Record Top Secret Green Eggs and Spam Hi ho, hi ho it's of to FOIP I go
Handling Personal Data & Security of Information Paula Trim, Information Officer, Children’s Strategic Services, Mon – Thurs 9:15-2:15.
Proper Chromebook Care Digital Greenspun JHS Day 4.
Properly Safeguarding Personally Identifiable Information (PII) Ticket Program Manager (TPM) Social Security’s Ticket to Work Program.
Take the Quiz and find out more!
PUBLIC COMPUTER SAFETY
Information Protection & Cyber Security
Why is this called “the ostrich effect”?
“Be Secure” – How to implement the 9 key behaviors in your team
To Encrypt or Not Encrypt
Unit 13 IT Systems Troubleshooting and Repair Anne Sewell
Mysale Information Classification 101
Social Engineering Brock’s Cyber Security Awareness Committee
Protecting Client Confidentiality for Volunteers and Agency Staff
Information Protection & Cyber Security
Cyber Security By: Pratik Gandhi.
End User Cyber Security Awareness Training
KINREP A Karvy Business Segment.
Key behavior # 2 Be Secure Awareness Quiz
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Information Security Awareness 101
Robert Leonard Information Security Manager Hamilton
Information Security and Travel-related Security
Join In Be Secure Presentation
HIPAA PRIVACY AWARENESS, COMPLIANCE and ENFORCEMENT
End User Cyber Security Awareness Training
County HIPAA Review All Rights Reserved 2002.
IT & Security Training Skills.
Information Security Awareness
Dos and Don’ts.
Mysale Information Classification 101
Cybersecurity Am I concerned?
Presenter : Mr Yong Jong Shyan
Online Data Collection: Ethics
Handout 4: Document distribution
Handling Information Securely
HPE BPIA – Approver OATH Token Provisioning Instructions
Why Cyber Security is important to SME? Useful Tips on how you protect and secure your business. By Ronald Soh from Win-Pro Consultancy Pte Ltd
Personal Mobile Device Acceptable Use Policy Training Slideshow
Protecting Student Data
Information Security in Your Office
UMMS Human Resources Learning Management System (LMS): Resetting Your Password Hello my name is Martha Streeter and I am the Director of HR Communications,
Presentation transcript:

Key behavior # 1 Be Secure Awareness Quiz Information Protection & Cyber Security Internal

Instructions Key behavior # 1: Join in How many security risks can you identify at a desk? Start by activating the presentation mode in PowerPoint On the next slide, you will find an employee’s desk full of Information Protection and Cyber Security risks Take a good look at the desk and note down all of the security risks that are obvious to you With the next set of clicks, the security risks at the employee’s desk will be revealed For each correct answer, give yourself one point. Sum up your points and compare your result to the Be Secure awareness levels shown on the Be Secure - Refresher Page Good luck! Internal

An employee left the office for lunch An employee left the office for lunch. Can you find any security risks in their office? 1. Door not locked in an office left unattended 2. Connecting private devices to company hardware 3. Leaving bluetooth on when phone is not in use 4. Using a private USB stick that may be infected with a virus on company PC 5. Confidential business strategy still displayed on whiteboard Private 6. Disposing confidential information in a regular trash can or in a non-approved shredder (i.e. not a crosscut shredder) Private My Password is „dadada“ 7. Key left in lock of the document storage cupboard 10. Storing password on sticky note on desk (The password is also weak) 9. PC unlocked during absence 8. Smartcard left lying around unattended In total, there are 10 security risks at this employee‘s desk. Unauthorized third parties could gain access to sensitive information or infiltrate the BASF IT system because this employee did not apply secure behavior in the workplace. Internal