Education – Partnership – Solutions

Slides:



Advertisements
Similar presentations
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Advertisements

Staying Safe Online Stephan Freeman. Increasing numbers of people on social networking sites More and more people leading their lives online Varying degrees.
Online Holiday Shopping Brings Great Deals – and Fraud This lesson is part of the iKeepCurrent TM Program, provided by iKeepSafe TM.
Deter, Detect, Defend: The FTC’s Program on Identity Theft.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Identity Theft consumer.gov. What is identity theft? When someone uses information about you without your permission. The information can be your: – Name.
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 18, 20 & 25 March 2015.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
Scams Stevie's Scam School videos
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
Do you know how to keep yourself safe?
How To Protect Your Privacy and Avoid Identity Theft Online.
How To Protect Your Privacy and Avoid Identity Theft Online.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Elite Networking & Consulting Presents: Everything You Wanted To Know About Data Insurance* * But Were Afraid To Ask Elite Networking & Consulting, LLC,
Internet Safety By Stephanie Jarrard. What is the Internet?  “Internet” is a shortened name for “Interconnected networks”  The internet is a global.
Keeping Information Safe Task 4. Basic security measures Passwords Change password on regular basis Do not use names or words easily linked to yourself.
Information Security and YOU!. Information Assurance Outreach Information Security Online Security Remote Access with Demonstration The Cloud Social.
Stay Safe & Secure Online. Outline Passwords Everyday Security Security Physical Security Protecting Personal Information.
PRIVACY BOOTCAMP YpJU.
Computer Security By: MacKenzie Olson. To be safer and more secure online, make these seven practices part of your online routine.
IT security By Tilly Gerlack.
OFFICE OF BUDGET AND FINANCE Information Security Office ISC Meeting August 21, 2015 Information Security Office
Chloe Miles IMPROVING PRODUCTIVITY USING IT. Menu Using Word Advantages Disadvantages Conclusion E-Safety Social Media Dangers of Social Media Sites Staying.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
Safeguarding Your Privacy Section 1.3. Safeguarding Your Privacy 1. What is Identity Theft? 2. Research a story on identity theft and be prepared to report.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
How can IT help you today?. Agenda Why Do You Care? What Are The Risks? What Can You Do? Questions? How can IT help you today? 2.
Minding your business on the internet Kelly Trevino Regional Director October 6,2015.
Internet Safety and Productivity Tips Presented by ITS Kerri Sorenson and Sean Hernandez December 11, 8:30-9:00 am.
PRIVACY BOOTCAMP Jack Vale - Social Media Experiement.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Unit Five Your Money – Keeping It Safe and Secure Identity Theft Part II Resource: NEFE High School Financial Planning Program.
OFFICE OF BUDGET AND FINANCE Information Security Office Information Security Committee Meeting April 15, 2016 Information Security Office
STOP. THINK. CONNECT. Online Safety Quiz. Round 1: Safety and Security.
The internet is a place of both useful and bad information. It has both good and bad side- and it’s all too easy for kids to stray into it. And no parents/guardian.
Staying Secure in an Insecure World NATE HOWE CHIEF INFORMATION SECURITY OFFICER Education – Partnership – Solutions.
Computer Security Keeping you and your computer safe in the digital world.
Two account types on this campus: UWB Access AccountUW NetID Account & 1.Not everyone has one as it must be requested by your supervisor 2.You are.
Intro to Digital Technology Review for Final Introduction to Digital Technology Finals Seniors Monday, 5/16 – 2 nd Tuesday 5/17 – 1 st,3 rd Underclassmen.
Information Technology Overview Welcome to NC State!
Internet Safety.
Decluttering Your Digital Life
The importance of computer backups
Attention Identity theft Definition
How to use the internet safely and How to protect my personal data?
Ways to protect yourself against hackers
How to use the internet safely and How to protect my personal data?
46elks Add-In for Microsoft Office 365 Excel Makes it Easy to Add SMS and Voice to Any Website or App – Just Install, Select Numbers, and Hit Send OFFICE.
Welcome to iSolutions – your IT support service
Working with Google Applications Gmail, a popular
I S P S loss Prevention.
Home Computer Security
Information Security 101 Richard Davis, Rob Laltrello.
ARE YOU A TARGET? YOU MAY NOT REALIZE IT, BUT YOU ARE A TARGET FOR CYBER CRIMINALS. IDENTITY THEFT IS ON THE RISE. BE AWARE AND TAKE PREVENTIVE ACTIONS.
Protecting your personal information and privacy
STOP. THINK. CONNECT. Online Safety Quiz.
Cybersecurity Awareness
Information is at the heart of any University, and Harvard is no exception. We create it, analyze it, share it, and apply it. As you would imagine, we.
Identity Theft This presentation will focus on identity theft. What do you already know about identity theft? Do you know anyone who has had their identity.
Don’t Get Scammed on Your Way to College and Avoiding Identity Theft
Premier Employee Program Version 4.0
Internet Safety – Social Media
Founded in 2002, Credit Abuse Resistance Education (CARE) educates high school and college students on the responsible use of credit and other fundamentals.
Online Safety; Privacy and Sharing
Online Safety; Privacy and Sharing
Presentation transcript:

Education – Partnership – Solutions Student Orientation Fall 2016

Who We Are ISO is a department within the Office of Budget and Finance Education – Partnership – Solutions Who We Are ISO is a department within the Office of Budget and Finance VP is Terry Pankratz CISO is Nate Howe Located at ROC 2.604, west side of campus on Waterview Stop by for a visit with our staff, 8am - 5pm weekdays

ISO Approach Our motto is ‘Education – Partnership – Solutions’ Information security doesn’t mean saying NO to everything, we seek the balance between ease of use and security Information security is not just an IT thing, everyone can help Get involved by reporting phishing, scams, bugs, and other security issues to our team Review the Information Security and Acceptable Use Policy

Education – Partnership – Solutions Identity on Campus Your SSN should not be used except in rare instances UTDID = 2076849400 NetID = SXT079756 PEA = s.edwards@utdallas.edu If users need help with setting up their PEA (Personalized E-Mail Account) they can call the HelpDesk at ext 2911

Education – Partnership – Solutions Identity in Real Life Students are just establishing their credit and professional reputations Criminals look for a ways to obtain your data for their own profit Imagine not being able to get a job, buy a car, or rent an apartment because of identity theft Social Media is often searched and considered when your applying for a job of club

Phishing Scams Avoid phishing and website pop-ups Education – Partnership – Solutions Phishing Scams Avoid phishing and website pop-ups Offers that are too good to be true usually are Criminals will often make the matter seem urgent, or use a title or name with authority Scams: often too good to be true, or they are asking you for information you would normally want to keep safe Report any phishing emails or phone calls you receive to our office Phishing can happen via email, phone, website pop-ups, etc

Education – Partnership – Solutions Social Media Be mindful of what you put out there, employers often do social media searches before hiring Criminals are also watching social media to customize scams targeted at you Geotagging tells your friends, and criminals, where you are and where you are not Social Media is often searched and considered when your applying for a job of club

Education – Partnership – Solutions Online Footprint Avoid mixing work and personal information, be careful with devices synchronizing info Adjust privacy setting and deactivate old accounts Use unique passwords for each site you visit and avoid using Facebook / Google to sign into 3rd party sites Google search yourself Many devices are now linked together such as your Mac computer, iPad, phone, and messenger. Also using the client for services like Drop Box may download personal materials to your work machine.

Education – Partnership – Solutions Device Security Install current software patches (computers, mobile devices, and apps) Set longer ‘passphrases’ which are easy to remember but hard to guess Protect phones and tablets with passcodes All devices includes your computer, phone, tablets and so on. Pass phrases are best

Backups and File Storage Education – Partnership – Solutions Backups and File Storage Backup all important files BEFORE disaster strikes Use department shares instead of local drives CometSpace gives you 1TB of free storage Departmental shares such as the G:\ or your own H:\ Box.com offers 1TB of space can be used for typical work and personal data but check with ISO/website for info on HIPAA, changes, and comparisons to other cloud storage

Education – Partnership – Solutions Physical Security Secure mobile devices on campus, in your automobile trunk, and at home It only takes a few minutes for someone to take your device, which can cause you financial and data loss All devices includes your computer, phone, tablets and so on. Pass phrases are best

Shredding Old Media Take advantage of our personal device shredding Education – Partnership – Solutions Shredding Old Media Take advantage of our personal device shredding Cellphones, hard drives, USB drives, and other media Device shredding: Must be a personal device, hard drives need to be removed from the computer or laptop, we can do limited pick up or they can bring the equipment to our office

Education – Partnership – Solutions askYoda infosecurity@utdallas.edu https://www.utdallas.edu/infosecurity https://www.facebook.com/UTDInfoSec