Things To Avoid: 1-Never your password to anyone.

Slides:



Advertisements
Similar presentations
Windows XP Tutorial Securing Windows. Introduction This presentation will guide you through basic security principles for Windows XP.
Advertisements

Johnson Logistics Solutions Office of Systems and Information Technology.
Part 2 of Evil Lurking in Websites Data Security at the University of Wisconsin Oshkosh.
Guide to Massachusetts Data Privacy Laws & Steps you can take towards Compliance.
How to safe online E-Safety Presentation How to stay safe when online Tip 1Tip 2Tip 3Tip 4 Tip 5.
Introduction to Computer Essentials. Information Systems 1. People 2. Procedures 3. Software 4. Hardware 5. Data.
Windows Security Larry MacPhee Why Security Matters Public nuisance Loss of productivity –The cost of spam!The cost of spam! Loss of data.
October is National Cyber Security Month OIT and IT providers are launching an awareness campaign to provide tips and resources to help you stay safe online.
10 Essential Security Measures PA Turnpike Commission.
1 Computer Security: Protect your PC and Protect Yourself.
Banking Safely. PIN and Password Selection and Protection Select unique digits (number and letter combinations DO NOT SELECT your birthdate, telephone.
Protect Your Computer from Viruses and Other Threats! 1. Use antivirus software. 2. Run Windows updates. 3. Use a strong password. 4. Only install reputable.
Manjit kaur Manjit Kaur1. Why do we need to protect our computer from a virus? A reason why we need to protect our computer from a virus is because it.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Hacking Phishing Passwords Sourendu Gupta (TIFR).
SLIR Computer Lab: Orientation and Training December 16, 1998.
ESCCO Data Security Training David Dixon September 2014.
Computer Security By: MacKenzie Olson. To be safer and more secure online, make these seven practices part of your online routine.
IT Security Essentials Lesley A. Bidwell, IT Security Administrator.
In the old days... You Your computer. Then came... The Network.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Best Practices for Protecting Data. Section Overview Mobile Computing Devices Technical Procedures Data Access and Permissions Verbal Communication Paper.
Computer Security Preventing and Detecting Unauthorized Use of Your Computer.
©Holm Publications Security Awareness Presentation.
Reason for Cyber Crime Pursuit of fame Purely out of mischief For finance means To get revenge on someone they hate Purely to pursuit criminal.
Chapter 5 Protecting Your PC from Viruses Prepared by: Khurram N. Shamsi.
Computer Security By Rachel Gaines. Computers are used for work, play, and everything in between. So here’s how to keep it fun and protected.
COMPUTER SECURITY BEST PRACTICES. SECURE YOUR STUFF!  Physically secure your workstation by locking your screen when away  Secure any small, easy to.
Security Training USAID Information Security.
Computer Security Hacking, Phishing, Passwords Kausalya S. And Sushil Mujumdar (CCCF) 04 - Aug - 15.
Basic Skills Foundation Computing The early bird may get the worm, but the second mouse gets the cheese.
Manjit kaur Manjit Kaur1. Why do we need to protect our computer from a virus? A reason why we need to protect our computer from a virus is because it.
ENCRYPTION EXERCISE ……………………………………………………………………………………………………………………………….…………………………….. ……………………………………………………………...…... RESEARCH DATA MANAGEMENT TEAM UK DATA.
INTERNET SAFETY FOR KIDS
Joel Rosenblatt Director, Computer and Network Security September 10, 2013.
safety Bailey mullan. dangers ing has become on of the main sources for communicating. When using it is more likely for someone.
Minding your business on the internet Kelly Trevino Regional Director October 6,2015.
All about viruses, hacking and backups By Harriet Thomas.
KTAC Security Task Force Superintendents Update April 23, 2015.
FIT03.05 Explain features of network maintenance.
Internet safety By Suman Nazir
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
OCTOBER IS CYBER SECURITY AWARENESS MONTH. October is Cyber Security Awareness Month  Our Cyber Security Awareness Campaign focuses on topics such as.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Computer Security Sample security policy Dr Alexei Vernitski.
Copyright © 2008 AusCERT 1 Practical Computer Security See the notes section throughout the slide presentation for additional information.
Common sense solutions to data privacy observed by each employee is the crucial first step toward data security Data Privacy/Data Security Contact IRT.
Information Resources at University of Worcester Information and Learning Services.
Identity Theft: Protect Yourself Ronald J. Leach.
Technological Awareness for Teens and Young Adults.
Computer Security Keeping you and your computer safe in the digital world.
Information Technology Nuts and Bolts Presented by Susana Ponte August 19, 2015.
What is Information Security?
Understanding The Computer Login Account
CS101 Booting A Computer.
Unit 4 IT Security.
10 Tips for Staying Safe Online
How to build a good reputation online
Your Computer Wants To Ruin Your Life
Staying Austin College
HOW TO MAKE YOUR GMAIL ACCOUNT SECURE…. At Google, we take account security very seriously. To protect your account, we strongly recommend following the.
Windows 94
Computer Security Password Management.
GSBS IT Resources and Security
Top Ten Cyber Security Hygiene Tips
Business Management & Administration HOLTVILLE High School
Machine Learning Course.
Business Management & Administration Stanhope Elmore High School
COMPUTER SAFTEY IS IMPORTANT….
Presentation transcript:

Things To Avoid: 1-Never email your password to anyone. 2-Never tell anyone your password. 3-Do not write down your password. 4-Do not store sensitive data on your local hard drive. (Use network storage when possible)

Things To Do: 1-Use Firefox, when possible 2-Lock workstation when leaving, but don’t turn it off. 3-Use complex passwords including characters and symbols. 4-Check with Computer Services before installing software. 5-Keep your computer up to date with Windows Update. 6-If you suspect your machine has been compromised, call Computer Services immediately and turn your computer off. 7-Take the 4 REQUIRED online courses at Secure.Uga.edu.