Staying Austin College

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

Smartphone and Mobile Device Security IT Communication Liaisons Meeting October 11, 2012 Theresa Semmens, CITSO.
A note for you We have created this presentation for you, the outstanding employee who has IT security on the brain. We want to help you spread the word.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 25 & 27 November 2013.
Using internet and cell phones safely
9/20/07 STLSecurity is Everyone's Responsibility 1 FHDA Technology Security Awareness.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 18, 20 & 25 March 2015.
10 Essential Security Measures PA Turnpike Commission.
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Quiz Review.
Protection against viruses, malware, misuse and theft
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
Manjit kaur Manjit Kaur1. Why do we need to protect our computer from a virus? A reason why we need to protect our computer from a virus is because it.
Protect against viruses, malware, misuse and theft Protect against data theft or loss, identity theft and fraud Avoid scams, savvy social networking and.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Security Awareness ITS SECURITY TRAINING. Why am I here ? Isn’t security an IT problem ?  Technology can address only a small fraction of security risks.
ESCCO Data Security Training David Dixon September 2014.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
IT security By Tilly Gerlack.
Training PowerPoint.  Just plug into the USB port on your computer. You will find USB ports on the front or back of your computer.  If you have a laptop.
Identity Theft What is Identity Theft?  Identity theft is a serious crime. Identity theft happens when someone uses information about you without your.
Copyright ©: SAMSUNG & Samsung Hope for Youth. All rights reserved Tutorials The internet: Staying safe online Suitable for: Beginner.
Information Security Awareness Training. Why Information Security? Information is a valuable asset for all kinds of business More and more information.
Ms. Park.  Q&A: What are some Internet safety tips you already know?
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Manjit kaur Manjit Kaur1. Why do we need to protect our computer from a virus? A reason why we need to protect our computer from a virus is because it.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
 Subject: The topic you are talking about. So they understand what it is a about and explain to the point.  clients usually display it in a.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
A Matter of Your Personal Security Phishing. Beware of Phishing s Several employees received an that looked legitimate, as if it was being.
A Matter of Your Personal Security Phishing Revised 11/30/15.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Information Security Everyday Best Practices Lock your workstation when you walk away – Hit Ctrl + Alt + Delete Store your passwords securely and don’t.
YEAR 6’S GUIDE TO STAYING SAFE ON THE INTERNET. CHATTING When you are chatting to people online, try not to give out any personal information about yourself.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Personal Data Protection and Security Measures Kelvin Lai IT Services - Information Security Team 12 & 13 April 2016.
Common sense solutions to data privacy observed by each employee is the crucial first step toward data security Data Privacy/Data Security Contact IRT.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Mobile device security Practical advice on how to keep your mobile device and the data on it safe.
Information Technology Security Office of the Vice President for Information Technology New Employee Orientation II.
Important Information Provided by Information Technology Center
Chapter 40 Internet Security.
8 online danger tips By: kailee bariring.
Unit 4 IT Security.
Information Security.
Lesson 3 Safe Computing.
10 Tips for Staying Safe Online
How to build a good reputation online
Information Security 101 Richard Davis, Rob Laltrello.
Lesson 1: Epic Advanced Appointment Scheduling
© EIT, Author Gay Robertson, 2017
Cybersecurity Awareness
HOW TO MAKE YOUR GMAIL ACCOUNT SECURE…. At Google, we take account security very seriously. To protect your account, we strongly recommend following the.
Practice Safe Computing
Robert Leonard Information Security Manager Hamilton
What you can do to support people to be safe online
Lesson 2: Epic Security Considerations
Stay Safe While Using The Internet
Epic Introduction Basics
HOW DO I KEEP MY COMPUTER SAFE?
9 ways to avoid viruses and spyware
Epic Introduction Basics
KEEP SAFE I will NOT give out personal information: Name -- create a screen name Address Phone number Password School address Pictures.
Lesson 2: Epic Security Considerations
Lesson 2: Epic Security Considerations
Epic Introduction Basics
How to Stay Safe Online Rollie Edwards.
What devices use the internet?
Handling Information Securely
Presentation transcript:

Staying Secure @ Austin College

Protecting your password Don’t write it down where others can see or find it Anyone who finds your password can act as you and access your mailbox and file shares. Just "hidden" in a drawer or under your keyboard is not a safe place. Don’t share it with anyone No one else should need to log in as you. Once you share it with someone else, you don’t know who else may have it. IT will never ask you for your password IT will not need you to tell them your password. Anyone who claims to be from IT and asks for your password is probably an imposter.

Email Protection Don't trust who the email claims to be from The From address can be "spoofed" to pretend to be anyone. If the message is a surprise to you and asks you to do or click something, verify the sender by phone or in person before taking action. Don’t trust links or attachments in emails Links and attachments may not be what they claim to be and may harm your computer just by clicking. If you are not sure of the sender, do not click the link or open the attachment. Legitimate emails from IT will have a subject that starts with "IT@AC" Lock your mobile device if you check email on it If you check your AC email on a phone or tablet, enable a passcode or other screen lock to prevent access to your email if you lose the device.

Information Protection Don't store personal/sensitive data on laptops, tablets, or phones These devices could be lost or stolen, putting that information at risk. If it must be stored in a file, it is better placed on a network share. Don’t store sensitive college files on a personally owned computer College-owned computers are configured to improve their security; a personal computer may not be as secure and may place this data at risk. Be suspicious of unknown memory sticks/thumb drives USB media (memory sticks / thumb drives) can contain malware that may automatically execute when plugged into your computer. If you do not know or do not trust where it came from, keep it away from your computer.

Information Protection Be careful of the websites you visit Malicious websites may attempt to steal login information or trick you into installing malware on your computer. Do not download or install software If you need additional software on your computer, contact the Help Desk. Verify anyone claiming to be from IT support If you don’t already know the person, verify anyone who contacts you in person, by phone, or by email. You can see if they are from AC IT using the AC website directory. Someone claiming to be from an outside company should never contact you without an IT person being present. X

Be Safe! When in doubt, take the safe action Contact the Help Desk if you are unsure or encounter something malicious Email: helpdesk@austincollege.edu Phone: extension 2063 (903-813-2063) Office: Jackson Technology Center east end 1st floor