GSBS IT Resources and Security

Slides:



Advertisements
Similar presentations
Smartphone and Mobile Device Security IT Communication Liaisons Meeting October 11, 2012 Theresa Semmens, CITSO.
Advertisements

Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 25 & 27 November 2013.
1 Electronic Information Security – What Researchers Need to Know University of California Office of the President Office of Research May 2005.
Part 2 of Evil Lurking in Websites Data Security at the University of Wisconsin Oshkosh.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
DHS SECURITY INCIDENT REPORTING AND RESPONSE SECURITY INCIDENT REPORTING AND RESPONSE DHS managers, employees, and other authorized information users.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 18, 20 & 25 March 2015.
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
10 Essential Security Measures PA Turnpike Commission.
How It Applies In A Virtual World
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Wireless Security: Protect yourself when you’re mobile.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
Windows Security. Security Windows 2000/XP Professional security oriented Authentication Authorization Internet Connection Firewall.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Networked Information Systems Network Security. Network Physical Security File server failure can severely affect network users. Server security: Locked.
CLASSROOM PROCEEDURES. COMPUTER WORKSTATIONS  The personal space around each computer  NO food or drink allowed in this area!  Clean up your workstation.
Joel Rosenblatt Director, Computer and Network Security September 10, 2013.
Chapter 2 Securing Network Server and User Workstations.
TCOM Information Assurance Management Software Hacking.
 Online document storage and file sharing.  Access files from anywhere, store them free, and securely share them.  Great back up plan for storing those.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Computer Security By Duncan Hall.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
1 #UPAugusta Today’s Topics What are Deadly IT Sins? Know them. Fear them. Fix them. #UPAugusta201 6.
Safe Computing Practices. Outline Objective Safe Computing Defined Safe Computing Methods Summary List of References.
Maryknoll Wireless Network Access Steps for Windows 7 As of Aug 20, 2012.
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
Chapter 40 Internet Security.
IT Security Awareness Day October 19, 2016
Information Technology Acceptable Use An Overview
Trend Micro Consumer 2010 Easy. Fast. Smart.
DATA SECURITY FOR MEDICAL RESEARCH
East Carolina University
Attention Identity theft Definition
Unit 4 IT Security.
Handling Personal Data
Ways to protect yourself against hackers
Information Technology
ComArtSci Technology Update
OWASP CONSUMER TOP TEN SAFE WEB HABITS
How And The Internet Work
Information Protection & Cyber Security
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Staying Austin College
Services Provided by Network Operating Systems
Things To Avoid: 1-Never your password to anyone.
How To Fix Verification Failed Error On iCloud?
Information Security Awareness 101
Information Technology Services Education and Awareness Team
Content Management lifecycle
Operating Systems Security
12 STEPS TO A GDPR AWARE NETWORK
Part 3.
Internet Safety and Security Curtis Shaw nwtel.ca November 2012
Computer Security.
Bethesda Cybersecurity Club
Unit 4 IT Security Kerris Davies.
Drew Hunt Network Security Analyst Valley Medical Center
What is Information Security?
Information Technology Services Education and Awareness Team
Security in mobile technologies
Best way to install and Activate Norton Setup In Computer at norton.com/setup
Introduction to the PACS Security
G061 - Network Security.
6. Application Software Security
Session 1 – Introduction to Information Security
Cybersecurity at WAJ What is it? Are we at risk?.
McAfee.com/activate. Mcafee Activate
Presentation transcript:

GSBS IT Resources and Security Michael Valladolid IT Manager BSRB S3.8411

Enroll in Two-Factor Authentication Clear your IDM hold Activates your network and email account and gives you more access See me in person with state issued photo ID I will email your login info and how to setup your password. Enroll in Two-Factor Authentication Login with a password and one other piece of information using your smartphone.

For some of you: Fill out the Information Resources User Acknowledgement Form Find it in your packet Turn in at Station 4 (Check-Out) on Wednesday morning Forms Due Session

Protect Password Data Your Computer Your Connection

Protect Data Confidential Data should NOT be stored on personal devices. Data that can cause harm if lost or stolen. Protected Health Information (PHI) Data “individually identifiable health information that is related to the "past, present or future physical or mental health condition" of a person.” Must be De-Identified. Research Data is sensitive data. Encrypt and Back up important data Phishing and Ransomware

Common vector for data loss

Cloud Storage http://www.uth.tmc.edu/UTH-Share/ All file types Sharing unlimited space

Protect Your Computer Password login Install security updates regularly Update your Anti-Virus Definitions Encrypt it.

Protect Your Connection Wi-Fi: Use the secure access points. Do not use any file/media sharing software – such as bitTorrent, movie site plug-ins. Don’t go past the web filters. Log off

Are You Sure?

Email Us: gsbs.support@uth.tmc.edu http://go.uth.edu/GSBSIT Email Us: gsbs.support@uth.tmc.edu