- St. Clair County Network-

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Thank you to IT Training at Indiana University Computer Malware.
Internet Safety Gleneagles Computer Club February 16, 2015 by Deborah Benson.
INTERNET SAFETY FOR EVERYONE A QUICK AND EASY CRASH COURSE.
INTERNET SAFETY FOR EVERYONE
FIRST COURSE Computer Concepts Internet and Microsoft Office Get to Know Your Computer.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Quiz Review.
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Security Awareness ITS SECURITY TRAINING. Why am I here ? Isn’t security an IT problem ?  Technology can address only a small fraction of security risks.
U3A Computing Beginners Class Leader – Brian Moore Week 7 of 10 weeks. Mondays 4:15 to 5:45 pm.
Staying Safe Online Keep your Information Secure.
IT security By Tilly Gerlack.
IT Security Essentials Lesley A. Bidwell, IT Security Administrator.
The Internet for Beginners Section Four of Four From the Richard Sugden Library Spencer, MA Jillian M. Parsons.
People use the internet more and more these days so it is very important that we make sure everyone is safe and knows what can happen and how to prevent.
DIGITAL SECURITY PART 2 TOOLS. phising  Internet criminals can steal your personal and banking information without you ever noticing – they can do it.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Advanced Guide to ing. Introduction In this guide you and explain will learn how to use ing in an advanced way. I will go through on.
A Quick and Easy Crash Course Internet Safety for Everyone.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Smart, Safe, and Secure Online Spam commercial messages that you didn’t ask for (a company trying to sell things by sending out thousands of messages at.
Computer Security Keeping you and your computer safe in the digital world.
U3A Computing CMP Class Leader – Brian Moore Week 7 of 10 weeks. Mondays 4:15 to 5:45 pm 11/11/13.
Ransomware BISD Technology Department. Ransomware Ransomware is a type of malicious software (malware) that infects a computer and/or mobile device and.
Protecting Against Cyber Attacks PLEASE TAKE A MINUTE TO LOOK AT THIS IMPORTANT MESSAGE. THIS IS HAPPENING HERE AND NOW! LET US SAVE YOU AND YOUR INFORMATION.
Intro to Digital Technology Review for Final Introduction to Digital Technology Finals Seniors Monday, 5/16 – 2 nd Tuesday 5/17 – 1 st,3 rd Underclassmen.
Cyber Security and Computer Safety
Internet Safety.
Presented by: SBS CyberSecurity © SBS CyberSecurity, LLC
INTERNET SAFETY FOR EVERYONE
What they are and how to protect against them
An Introduction to Phishing and Viruses
PHISHING Hi, The comms team asked if I could refresh everyone about Phishing after a fairly successful phishing circulated last week that led to.
links and attachments: Help stop malware from spreading
Unit 4 IT Security.
How to use the internet safely and How to protect my personal data?
Ways to protect yourself against hackers
How to use the internet safely and How to protect my personal data?
Lesson 3 Safe Computing.
Information Security 101 Richard Davis, Rob Laltrello.
Unit 4 IT Security.
Staying Austin College
STOP. THINK. CONNECT. Online Safety Quiz.
Cybersecurity Awareness
HOW TO MAKE YOUR GMAIL ACCOUNT SECURE…. At Google, we take account security very seriously. To protect your account, we strongly recommend following the.
Call AVG Antivirus Support | Fix Your PC
Robert Leonard Information Security Manager Hamilton
Risk of the Internet At Home
Internet Safety for Everyone
Cyber Security and Computer Safety
Lesson 2: Epic Security Considerations
HOW DO I KEEP MY COMPUTER SAFE?
Internet Safety for Everyone
Computer Security.
9 ways to avoid viruses and spyware
Bethesda Cybersecurity Club
Lesson 2: Epic Security Considerations
How to keep the bad guys out and your data safe
Internet Safety for Everyone
Internet Safety for Everyone
Internet Safety for Everyone
Internet Safety for Everyone
Presentation transcript:

- St. Clair County Network- St. Clair County IT – Feb. 28, 2018 Computer Security - St. Clair County Network-

Topics we will discuss Malware, Viruses, Ransomware Email Web Browsing Content Filtering Data Backup Passwords New Computer Use Policy

Malware, Viruses and Ransomware Malware – software that is intended to damage or disable computers Can come from corrupt website Sometimes there will be a false alarm stating that your computer is infected Don’t call the number or click the link, call us immediately Spyware – software that enables a person to see what you are doing on your computer without you knowing it Piggybacked software installation Browser add-ons – toolbars, additional search bars, etc. Some spyware masquerades as antispyware Piggybacked software installation - just clicking yes on every window when installing software

Malware, Viruses and Ransomware cont. Virus - a piece of code that is capable of copying itself and typically has a detrimental effect such as corrupting the system or destroying data Computer viruses can infect your computer through email attachments, downloads from the internet or removable media (thumb drives) Viruses can spread through the network via shared folders Ransomware – a type of malicious software designed to block access to a computer system until a sum of money is paid Typically comes through email as an attachment. Once opened, the ransomware will lock files by encrypting them and you need the decryption key to unlock the files, which requires a substantial amount of money to acquire Speaking of thumb drives, if you ever find a thumb drive laying around, do not plug it into your computer to see what is on it. Get it to us and we can safely determine the contents and whether it is ok to use.

Email You receive an email and you don’t recognize the sender or the email looks suspicious: Don’t open the email or any attachments or click on any links Delete the email You get an email from FedEx or UPS about a package that you didn’t order Don’t open the attachment You get an email with a strange attachment, either from someone you don’t know or possibly someone you do know We all use email, but how can be more careful? Here are a few scenarios and how you should respond. Email Spoofing – creation of email with a forged sender address If you are hesitant about deleting an email that looks suspicious because you think it might be legitimate, you can call or email the sender to make sure. My thought are “better safe than sorry and if it is legitimate or important, they can resend the email.

Email cont. You get an email requesting your username and password Don’t ever send your username and password via Email We will never ask for that information via Email Don’t use your county email to sign up for things unless they are related to county business We have a spam filter to try and block spam, but you can help decrease spam by not putting your email address out there When you sign up for things using your email address, it can be put on a list that is sold to companies that send out junk or spam emails.

As of 2/20/2018 @ 2:53 PM – SPAM Filter was installed in July of 2016 This doesn’t included emails between stclairco users. We have security measures in place to protect internal emails. As of 2/20/2018 @ 2:53 PM – SPAM Filter was installed in July of 2016

From: IT@stclairco.com Subject: Change of Password Required Immediately We suspect a security breach happened earlier this week. In order to prevent further damage, we need everyone to change their password immediately.   Please click here to do that: Change Password Please do this right away. Thanks! Sincerely, IT Phishing experiment. We used a free tool to send out a phishing email to a limited number of users.

Social Engineering Experiment Out of 53 employees that received this email… 17 people (33.3%) clicked on the link

Web Browsing Use caution when browsing the internet If you use a search engine, most of the top search results are ads and have a small line of text denoting this Change your homepage from the default MSN or Yahoo These sites contain many ads and those ads can be easily corrupted Avoid accessing personal Social Media websites on the county network Most of the time, your job will not cause you to access a corrupt website Be cautious when clicking on links in webpages, searches and emails If your department has a social media site that is used for business related functions, of course you can access it. Companies know these sites are frequented and that is why there are so many ads, and these ads can be compromised

Web Browsing cont. In emails and in most web browsers, you can hover over the link and it will show you at the bottom what site you are going to. As a good rule of thumb, if the site doesn’t match the link, then it probably isn’t a legitimate site. There are some exceptions when a tool is used to shorten a link. I noticed that the ACCA uses this tool in their emails.

Content Filtering The county has a network firewall/content filter device This device has rules that allow access in and out of our network We currently have it set to block things like adult content, drugs, etc., but it isn’t locked down tight We have the capability of setting up different profiles for each department In the near future, we will be getting with each department head to determine what, if any, content restrictions need to be implemented for your department State agencies, this doesn’t apply to you as your internet access is through AOC

Passwords Don’t share your passwords with anyone! Don’t write your passwords on sticky notes and attach them to your monitor or bulletin board! Don’t use the exact same password for everything Password1 – P@ssw0rd1 – p@SSworD1 – Password2 Although it is tempting to use a simple password that’s easy to remember, those passwords are easy to guess or crack There are apps for your phone and also applications for your computer to safely keep up with your passwords Please ask us before using any application so we can verify that it is safe

Data Backup In the unlikely event that you get infected, or your hard drive crashes, you can recover your files if you have a backup We backup all county servers, but we do not backup data on desktops or laptops Depending on the amount of data you have, you can use a thumb drive or an external hard drive This backup drive should not stay connected to your computer at all times. If your computer gets infected, the external storage device could be infected as well and then your backups are useless

New Computer Use Policy We have developed an updated computer use policy that has been adopted by the County Commission – Policy #57 This will be on the county website this afternoon Please have each employee read this policy After they have read it, the last page needs to be printed and signed by each employee and turned into our HR Specialist, Sandra Wolfe Your work computer is not your personal computer and shouldn’t be used as such Your computer is a tool to allow you to accomplish your job

Questions…..

Contact information John Myers IT Technician jmyers@stclairco.com 205-594-2496 Glenn Morgan IT Manager gmorgan@stclairco.com 205-594-2495 To submit a ticket by email: helpdesk@stclairco.com www.stclairco.com/technology