IT Security awareness Training.

Slides:



Advertisements
Similar presentations
Account HIGHJACKING & IDENTITY THEFT GPCE Credit Union has prepared a slide show presentation to examine the most prevalent financial crimes at work today.
Advertisements

Social Network Security Issues: Social Engineering and Phishing Attacks Jeffrey Allen, Leon Gomez, Marlon Green, Phillip Ricciardi, Christian Sanabria.
SECURITY AND SOCIAL ENGINEERING US Department of Commerce Office of Security Updated 09/26/11 Security is Everyone's Responsibility – See Something, Say.
Bsharah Presentation Threats to Information Security Protecting Your Personal Information from Phishing Scams.
Jason Rich CIS  The purpose of this project is to inform the audience about the act of phishing. Phishing is when fake websites are created.
Cryptography: Keeping Your Information Safe. Information Assurance/Information Systems –What do we do? Keep information Safe Keep computers Safe –What.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
Security Liaisons Information Presentation. Introduction  What’s the big deal with computer security? Don’t we have an IT security department to take.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
STAY SAFE ONLINE. STAY SAFE ONLINE! PLEASE MAKE SURE YOU LOGIN AT THE CORRECT BANK URL / ADDRESS 1.NEVER LOGIN VIA LINKS 2.NEVER REVEAL YOUR PIN.
Keeping Information Safe Task 4. Basic security measures Passwords Change password on regular basis Do not use names or words easily linked to yourself.
ESCCO Data Security Training David Dixon September 2014.
Staying Safe Online Keep your Information Secure.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
© Hodder Gibson 2012 Staying safe online. © Hodder Gibson 2012 Dangers on the Internet There are a number of dangers on the Internet such as: viruses.
Adam Soph, Alexandra Smith, Landon Peterson. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Identity Theft Since 2005, there has been a dramatic increase in the occurrence of identity theft among students online.
Personal Online Safety Information Security Systems Community Outreach Program McKinley Middle School April 23, 2013.
The way to avoid being trap into cyber crime. What is cyber crime? The Department of Justice categorizes computer crime in three ways: 1. The computer.
INTERNET: The Good, The Bad and The Ugly
A Matter of Your Personal Security Phishing. Beware of Phishing s Several employees received an that looked legitimate, as if it was being.
A Matter of Your Personal Security Phishing Revised 11/30/15.
Cyber Safety Jamie Salazar.
Internet safety. Dangers of a poor password How people guess your password Your partner, child, or pet's name, possibly followed by a 0 or 1 The last.
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
JANELL LAYSER Training Manual. AWARENESS! Social Engineers are out there, and everyone should be prepared to deal with them! They can contact you by phone,
In this tutorial, you will be shown security considerations that you should keep in mind while accessing or using any GW systems, including GWeb. Remember.
Cyber security. Malicious Code Social Engineering Detect and prevent.
Why Does The Site Need an SSL Certification?. Security should always be a high concern for your website, but do you need an SSL certificate? A secure.
Take the Quiz and find out more!
Objectives Define phishing and identify various types of phishing scams Recognize common baiting tactics used in phishing scams Examine real phishing messages.
Cyber Security and Computer Safety
Presented by: SBS CyberSecurity © SBS CyberSecurity, LLC
Digital Security Identity theft Copyright Laws Plagiarism, and More.
Social Media Security: Understanding how to keep yourself safe.
PHISHING Hi, The comms team asked if I could refresh everyone about Phishing after a fairly successful phishing circulated last week that led to.
Information Security.
Ways to protect yourself against hackers
ISYM 540 Current Topics in Information System Management
Lesson 3 Safe Computing.
Cyber Security Awareness Workshop
Information Security 101 Richard Davis, Rob Laltrello.
Phishing is a form of social engineering that attempts to steal sensitive information.
Year 10 ICT ECDL/ICDL IT Security.
Lesson 2- Protecting Yourself Online
Cybersecurity Awareness
Robert Leonard Information Security Manager Hamilton
4 ways to stay safe online 1. Avoid viruses and phishing scams
Risk of the Internet At Home
Information Security Session October 24, 2005
Starter What is identity theft?
Phishing.
Cyber Security and Computer Safety
DON’T GET HOOKED! YOU MAY BE UNAWARE BUT YOU ARE A PHISHING TARGET FOR CYBER CRIMINALS. A. Unknown sender address B. Offer too good to be true &
Lesson 2: Epic Security Considerations
WannaCry Ransomware Overview
The information in this presentation is marked as:
9 ways to avoid viruses and spyware
Practical tips to defend your business from cyber attacks
Bethesda Cybersecurity Club
Lesson 2: Epic Security Considerations
Lesson 2: Epic Security Considerations
What is Phishing? Pronounced “Fishing”
Lesson 2- Protecting Yourself Online
Spear Phishing Awareness
Founded in 2002, Credit Abuse Resistance Education (CARE) educates high school and college students on the responsible use of credit and other fundamentals.
Presentation transcript:

IT Security awareness Training

AGENDA IT Security – Why? Security Awareness Survey Social Engineering PHISHING RANSOMWARE Passwords Summary Q&A

It security - why? Protect Our Identity Data Integrity Raise Our Collective Awareness Protect Privacy Everyone’s Responsibility Together we can create a more secure working environment

IT Security Awareness Survey 115 Completed Survey (Thanks to those who completed it) This Security awareness training is a result of the information gathered from the survey Main Area Of Concern?

SOCIAL ENGINEERING

The hackers see us as a… Puppet on their string Techniques used by hackers include; Trickery Influencing Deception To exploit your weaknesses PHISHING ATTACK RANSOMWARE The hackers see us as a… Puppet on their string

PHISHING

Scam Link, Incorrect Domain Name, NO Https & NO Padlock Legitimate Link, Correct Domain Name, Https & The Padlock

www.facebook.com www.facebook.com www.facebook.com

ransomware The Day The NHS Stopped

Only 42% of ransomware victims Malicious Code Created Users Targeted Through Emails & Attachments Encrypts Your Files Bitcoin Payments Requested To Decrypt Files Bitcoin Payment Made Not Guaranteed Only 42% of ransomware victims recovered their data

Ransomware Infection Methods Visiting unsafe, suspicious, or fake websites. Emails & Email attachments Malicious Links on Facebook, Twitter, etc

AND FINALLY…

passwords Never share your passwords with anyone Change password immediately if you discover someone's aware of your account details Change your password frequently Never write your password down Avoid using known facts e.g. Date of birth, Pets names, Children's names Never use the same password for your work and personal accounts Try using Passphrases, easy to remember. Password memory test – Research…

Mydoghasbigbricks F0rtun4t3! Length: 17 Strength: Strong - This password is typically good enough to safely guard sensitive information like financial records. Entropy: 81.1 bits Mydoghasbigbricks F0rtun4t3! Length: 10 Strength: Reasonable - This password is fairly secure cryptographically and skilled hackers may need some good computing power to crack it. (Depends greatly on implementation!) Entropy: 44.9 bits

Password Housekeeping To summarise IT Security – Why? Is everyone's responsibility. Raise a collective awareness. Be safe online. Use common sense. Phishing Check sender address, Suspicious links, hover over links/buttons to check URL Ransomware Check sender address, Suspicious links, hover over links/buttons to check URL. Only open attachments that you’re expecting. Password Housekeeping Never give your password out. Use different passwords. Consider using passphrases for your password.

If in doubt contact IT Services Call EXT: 300 Email – Service.desk@LSEC.ac.uk

Q&a

DO YOU WANT TO WIN £20?