Auditing JTT’s Acceptable Use Policy

Slides:



Advertisements
Similar presentations
Woodland Hills School District Computer Network Acceptable Use Policy.
Advertisements

Thoughts on Technology Issues for Small Business Implementing Technical Safeguards to support Your Policies.
Networks. User access and levels Most network security involves users having different levels of user access to the network. The network manager will.
InformationWeek 2014 Mobile Security Survey Research Findings © 2014 Property of UBM Tech; All Rights Reserved.
The Most Critical Risk Control: Human Behavior Lynn Goodendorf Director, Information Security Atlanta ISACA Chapter Meeting June 20, 2014.
Surveillance and Privacy on the Internet Presented by Jill Homes and Marion Barry.
Emerging Tech Expo Social Networking November 18, 2009.
1 Maritza Johnson Ph.D. candidate in Computer Science Research Computer security and human factors Paper Computer security research with human subjects.
Copyright 2011 Trend Micro Inc. Trend Micro Web Security- Overview.
Social Media Jeevan Kaur, Michael Mai, Jing Jiang.
FIVE STEPS TO REDUCE THE RISK OF CYBERCRIME TO YOUR BUSINESS.
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
Security considerations for mobile devices in GoRTT
Protecting the Player– Information Security Concerns Gus March 21, 2014.
 Website Mobile Application (iPhone application) Facebook and Twitter Weekly Newsletter ( ) Message Boards/Discussion Forum Blog- DailySpark.com.
Protect Manage Optimize Why LastPass Enterprise?
13.6 Legal Aspects Corporate IT Security Policy. Objectives Understand the need for a corporate information technology security policy and its role within.
Webmail security.. Webmail security should be of interest to you, because using web based programs like: Gmail, Hotmail, Yahoo, MSN, Rocket, basically.
Social Networking Presentation to Department Heads January 21, 2010.
The Dominance of Facebook Allison Bryan Why this social media giant is here to stay.
Bell Ringer Activity  Pick up a graphic organizer about Social Networking  First, in your own words, explain what social media means to you (be prepared.
HootSuite #1 Integrating Your Social Media. HootSuite: Integrating & Automating Your Social Media #1 Integrated Dashboard View LI + TW + FB WPB #2 Automated.
SAR Social Media Training
Should Schools Integrate Social Media into the Classroom?
Staying Safe On Social Media. Website Security  How do you know if a website is secure?  Celebrities  http vs https  http: Hypertext Transfer Protocol.
Internet Safety Sam Farnsworth Utah PTA Technology Specialist
Technological Awareness for Teens and Young Adults.
USER ADOPTION TRACKER. FEATURES Monitor User Adoption of Dynamics CRM by tracking daily usage Support for tracking on OOB & Custom entities Configure.
Calgary Computer Support Services -
Calgary Computer Security Solutions
Calgary Computer Security Solutions
@2017 Magazine 360°. All rights reserved.
@2017 Magazine 360°. All rights reserved.
@2017 Magazine 360°. All rights reserved.
Design for Security Pepper.
@2017 Magazine 360°. All rights reserved.
Property Management Services Hawaii -
Honolulu Property Management
Property Management Companies Honolulu
@2017 Magazine 360°. All rights reserved.
Oahu Property Management Business
@2017 Magazine 360°. All rights reserved.
Hush mail Customer Tech Support Number Hush mail Customer Tech Support Number Call Now : Toll Free Call Now : Toll Free.
@2017 Magazine 360°. All rights reserved.
Honolulu Rental Management Services
@2018 Magazine 360°. All rights reserved.
Oahu Property Manager
Honolulu Rental Management
DETAILED Global CYBERSECURITY SURVEY Summary RESULTS
FIX GMAIL NO CONNECTION ERROR Get in touch at Gmail Customer Support Number to Fix Gmail No Connection Error under the supervision of Gmail.
ციფრული მარკეტინგი ნიკოლოზ არჩვაძე.
Check Out for Property Management Oahu
Check Out for Oahu Property Management Business
Check Out for Property Managers Oahu
Property Management Companies in Hawaii -
Check Out for Best Property Management Companies Honolulu
Gmail Password Support Customer Service Numebr
Registering on the SITE is a MULTI-STEP process:
Digital $$ Quiz Test your knowledge.
Protecting IT systems (2)
Computer Lab Etiquette
Best Honolulu Property Management Company
Hawaiiana Property Management Honolulu
Module 3 Using Linux.
Students will not engage in any illegal activity including copyright infringement, vandalism, or harassment on the computer.
Session 1 – Introduction to Information Security
Social Media.
@2019 Magazine 360°. All rights reserved.
Presentation transcript:

Auditing JTT’s Acceptable Use Policy CEO: Kerwing Hy, We Audit Tech (WAT) Auditing JTT’s Acceptable Use Policy

Access to Certain Sites Time Magazine’s 2013 List Facebook – 19.4% Twitter – 15.1% YouTube – 13.7% Pinterest – 11.2% Other social media – 10.9% LinkedIn – 9.7% Webmail (Gmail, Yahoo, etc.) – 9.3% Other sites – 4.6%

Password Security JTT’s Password Requirements What WAT can offer: #1 JTT’s Password Requirements Uppercase character(s) Lowercase character(s) A number Non-alphanumeric character(s) – i.e. $ , %, # Be a minimum of 10 character(s) JTT’s Password Requirements Uppercase character(s) Lowercase character(s) A number Non-alphanumeric character(s) – i.e. $ , %, # Be a minimum of 10 character(s) #2 Organizations should consider several factors when determining password expiration requirements, including the availability of secure storage for user passwords, the level of threats against the passwords, the frequency of authentication (daily versus annually), the strength of password storage, and the effectiveness or ineffectiveness of password expiration against cracking. Organizations should consider having different policies for password expiration for different types of systems, operating systems, and applications, to reflect their varying security needs and usability requirements. #3

Exporting JTT Data Monitor USB Usage Double Check all USB Ports Limit Access/Communication to 3rd Party Email Providers:

Unacceptable Usage: Hacking Illegal Distribution of Assets JTT: Data Loss Prevention (DLP)

We look forward to our potential partnership in creating a more secured and tested work environment! We can provide JTT with multiple auditing services