Information Technology Services Education and Awareness Team

Slides:



Advertisements
Similar presentations
Cyber security refers to the technologies and processes designed to protect computers, networks and data from unauthorized access and attacks delivered.
Advertisements

Internet Safety Gleneagles Computer Club February 16, 2015 by Deborah Benson.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
October is National Cyber Security Month OIT and IT providers are launching an awareness campaign to provide tips and resources to help you stay safe online.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
October is National Cyber Security Month OIT and IT providers are launching an awareness campaign to provide tips and resources to help you stay safe online.
How It Applies In A Virtual World
Threats to I.T Internet security By Cameron Mundy.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Keeping Information Safe Task 4. Basic security measures Passwords Change password on regular basis Do not use names or words easily linked to yourself.
ESCCO Data Security Training David Dixon September 2014.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Internet and Social Media Security. Outline Statistics Facebook Hacking and Security Data Encryption Cell Phone Hacking.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
CCT355H5 F Presentation: Phishing November Jennifer Li.
Cyber Safety Jamie Salazar.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
STOP. THINK. CONNECT. Online Safety Quiz. Round 1: Safety and Security.
Copyright © 2008 AusCERT 1 Practical Computer Security See the notes section throughout the slide presentation for additional information.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Windows Vista Configuration MCTS : Internet Explorer 7.0.
INTERNET SAFETY FOR EVERYONE
Digital Security Identity theft Copyright Laws Plagiarism, and More.
Learn how to protect yourself against common attacks
Unit 4 IT Security.
Information Security.
Ways to protect yourself against hackers
Types of Cyber Crimes Phishing - is a scam to steal your online username and password. Phishing attacks work by tricking you into entering your username.
Lesson 3 Safe Computing.
Overview 1. Phishing Scams
I S P S loss Prevention.
OWASP CONSUMER TOP TEN SAFE WEB HABITS
Information Security 101 Richard Davis, Rob Laltrello.
Unit 4 IT Security.
Topic 6: Issues Press F5 to view!
Presented by: Brendan Walsh Manager, Security and Access Management
Lesson 2- Protecting Yourself Online
© EIT, Author Gay Robertson, 2017
STOP. THINK. CONNECT. Online Safety Quiz.
Cybersecurity Awareness
Information Security Awareness 101
Internet Safety for Everyone
Staying safe on the internet
Internet safety By DAGAS YACMAS team.
Understanding Browsers
Protecting Yourself from Fraud including Identity Theft
HOW DO I KEEP MY COMPUTER SAFE?
Internet Safety for Everyone
Computer Security.
Bethesda Cybersecurity Club
Unit 4 IT Security Kerris Davies.
How to keep the bad guys out and your data safe
Internet Safety for Everyone
Internet Safety for Everyone
Information Technology Services Education and Awareness Team
What is Phishing? Pronounced “Fishing”
Lesson 2- Protecting Yourself Online
Security in mobile technologies
Internet Safety for Everyone
Internet Safety for Everyone
What devices use the internet?
IP Addresses & Ports IP Addresses – identify a device on a network
Presentation transcript:

Information Technology Services Education and Awareness Team Security Matters Information Technology Services Education and Awareness Team

Phishing attacks can take many forms: Common Phishing Spear Smishing Vishing Whaling Fraudulent emails with a general message. Fraudulent emails that appear to be from someone you know. Fraudulent text messages. Telephone calls where the caller is attempting to steal your personal information. Phishing emails that target high profile victims (celebrities, politicians or executives.)

Travel practices Use precaution when connecting to Wi-Fi Think before you connect. Connecting to a wireless network that is unsecured will expose your information and device. Be careful when using public wireless networks or Wi-Fi hotspots; they’re not secure, so anyone could potentially see what you’re doing on your computer or mobile device while you’re connected. Disable Wi-Fi and Bluetooth when not in use. Some stores and other locations search for devices with Wi-Fi or Bluetooth enabled to track your movements when you’re within range.

Safe password practices Creating a strong password can seem like a chore. But investing the time in creating a secure password can make all the difference in protecting your personal information. Avoid these common password no-nos: Don’t put your username in your password. Don’t use the same password for multiple accounts. Don’t use one word as your password. Don’t use repeating letters or a number sequence. Don’t use your pet’s name. Don’t use your personal information i.e. birthdate, address, phone number etc. Don’t share your password or passphrase with anyone.

Web browsing practices Just follow these simple secure browsing practices: Use anti-virus and anti-spyware software. Use different user names and passwords for different sites. Use a firewall and install software updates. Trust HTTPs: Look for the “s” or a padlock symbol that indicates that a website is secure. Avoid free Wi-Fi. These days, users have the world at their finger tips while browsing online. Unfortunately, with all this freedom users can unwittingly fall victim to hacking or phishing attacks.