Lesson 2: Epic Security Considerations

Slides:



Advertisements
Similar presentations
1 of 2 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2006 Microsoft Corporation.
Advertisements

What you don’t know CAN hurt you!
How to avoid Viruses and Malware on your Computer Use a firewall Using a firewall is like locking the front door to your house—it helps keep intruders.
1 I ntegrated S ite S ecurity for G rids © Members of the ISSeG Collaboration, 2008 See: ISS e G Computer Security: Advice for computer.
IDENTITY THEFT ARE YOU SAFE?. HOW DOES THIS HAPPEN TO ME? Internet “Security “ When using a public computer, never access any vital accounts like banking.
Downloading and Installing AutoCAD Architecture 2015 This is a 4 step process 1.Register with the Autodesk Student Community 2.Downloading the software.
Notes to Teachers At the time we embedded the links in these lessons, they all worked. If they don’t, you can google the website, find the link, open it.
Threats to I.T Internet security By Cameron Mundy.
E safety. Ads It’s always best to not click on ads when you see them, and it’s always a good idea to ignore them, but if there are too many you can always.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Staying Safe Online Keep your Information Secure.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
©Holm Publications Security Awareness Presentation.
Digital Citizenship Grade Why are we here and what is Digital Citizenship? Part 1: What is Private Online? Part 2: Passwords Part 3: Responsibilities.
Copyright ©: SAMSUNG & Samsung Hope for Youth. All rights reserved Tutorials The internet: Staying safe online Suitable for: Beginner.
University Health Care Computer Systems Fellows, Residents, & Interns.
Meditech is the EMR system utilized by St. Mary’s Health Care System and can be accessed remotely from your home/office. If needed, our physician liaison.
Information Security Awareness Training. Why Information Security? Information is a valuable asset for all kinds of business More and more information.
PHYSICAL ITSECURITY scope. 1.What is password security?. 2.Why can't I tell anyone my password? 3.What about writing my password down 4.Social engineering.
Personal Online Safety Information Security Systems Community Outreach Program McKinley Middle School April 23, 2013.
Online Safety and You!. Introduction The good and the bad about the internet Protecting your Personal Information –Password protection Safety.
Internet Safety Tips.
Acceptable Use of Internet & Technology and Netiquette for High School Students.
Cyber Safety Jamie Salazar.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Information Security Everyday Best Practices Lock your workstation when you walk away – Hit Ctrl + Alt + Delete Store your passwords securely and don’t.
OCTOBER IS CYBER SECURITY AWARENESS MONTH. October is Cyber Security Awareness Month  Our Cyber Security Awareness Campaign focuses on topics such as.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Account & Google Message Center Guide August 2015 Prepared by: Angela Mars IT Education and Training.
STOP. THINK. CONNECT. Online Safety Quiz. Round 1: Safety and Security.
Copyright © 2008 AusCERT 1 Practical Computer Security See the notes section throughout the slide presentation for additional information.
The internet is a place of both useful and bad information. It has both good and bad side- and it’s all too easy for kids to stray into it. And no parents/guardian.
Computer Security Keeping you and your computer safe in the digital world.
Welcome to Week 2 in the computer lab. Last week you learned step 1 of the morning routine. Today we will learn how to complete the entire routine!
Cyber Security and Computer Safety
Account & Google Message Center Guide August 2015 Prepared by: Angela Mars IT Education and Training.
Social Engineering: The Human Element of Computer Security
Introduction to Web Safety
links and attachments: Help stop malware from spreading
IT Security  .
Internet Identity, Safety, & Security
Unit 4 IT Security.
Class 2 - Transitional Internet Basics
Lesson 3 Safe Computing.
Welcome to Week 3 in the computer lab
How to build a good reputation online
Lesson 1: Epic Advanced Appointment Scheduling
Staying Austin College
Information Security Session November 11, 2004
STOP. THINK. CONNECT. Online Safety Quiz.
Cybersecurity Awareness
HOW TO MAKE YOUR GMAIL ACCOUNT SECURE…. At Google, we take account security very seriously. To protect your account, we strongly recommend following the.
Call AVG Antivirus Support | Fix Your PC
Practice Safe Computing
Robert Leonard Information Security Manager Hamilton
- St. Clair County Network-
PowerChart New User Tutorial
Information Security Session October 23, 2006
Epic Introduction Basics
Lesson 1: Epic Advanced Appointment Scheduling
9 ways to avoid viruses and spyware
Epic Introduction Basics
Keep It Safe! Secure Your Secrets
Lesson 1: Epic Advanced Appointment Scheduling
Lesson 2: Epic Security Considerations
Lesson 2: Epic Security Considerations
Epic Introduction Basics
Presentation transcript:

Lesson 2: Epic Security Considerations

Epic Security Considerations In this lesson you will learn: Password creation Security Considerations Where to find support material Safety measures Who to contact for security concerns

Epic Security Considerations Your username is assigned to you by the IS Department. Usernames can be similar, but they are never the same. William R. Smith’s username could be SMITHWR. Passwords must be at least eight characters in length and contain at least one number. No more than 32 characters, cannot be dictionary words, cannot be reused, and must contain at least one number. Your Epic password is the same as your Citrix/Network (also referred to as Active Directory) password.

Epic Security Considerations Remember to create strong passwords that use a mix of letters, numbers and punctuation. Be sure to make it something you can recall. No one should ever ask you for your password for any reason; never share your password with anyone. Report any suspicious activity to Information Services. ************************Correct phone number for IS Help Desk 8-7075. Slides 4-16****************************

Epic Security Considerations Passwords: - must have at least eight characters - must have no more than 32 characters Must have no more than 30 characters - must contain at least one number - must be changed every 180 days - cannot be reused If you feel your password has been compromised, change it immediately.

Epic General Security Awareness Use strong p@$$w0rdZ Hackers use tools that automatically try every word in the dictionary as your password. Choose longer, hard-to-guess passwords that contain a mix of letters, numbers, and punctuation. For easy-to-remember passwords, use a line from a poem, song, or movie.

Never give out your password. Epic General Security Awareness Never give out your password. Never, under any circumstances, should a user give out their password. Watch out for persons attempting to get your password or information through social engineering. Social engineering is a method by which a person impersonates or intimates others to get sensitive information. Report any such cases to Information Services 8-7075.

Destroy notes containing passwords. Epic General Security Awareness Destroy notes containing passwords. More and more, thieves are stealing computer files or passwords from their victims. Notes and post-it notes around your work area containing passwords, account numbers, or other confidential information make it too easy. Clean up!

Epic General Security Awareness Your username and password make up your electronic signature. CHKDS applications log actions in computer applications using an employee’s signature. If anything has your electronic signature stamped to it, you are responsible for it!

Lock it up to lock them out! Epic General Security Awareness Lock it up to lock them out! Never your leave your computer/applications open when you step away from your computer. Locking your PC will help to stop snooping passers-by when you leave your desk.

Don’t trust unexpected emails/files. Epic General Security Awareness Don’t trust unexpected emails/files. Most computer viruses enter the network when an employee opens an e-mail attachment. If an attachment arrives unexpectedly, verify who sent it before you open it. Never open attachments from strangers.

Stay in safe internet neighborhoods. Epic General Security Awareness Stay in safe internet neighborhoods. You recognize the dangers of wandering to the tough part of town. Web surfing works the same way. Malicious software is installed on victims’ computers from a number of unsafe sites. If a website does not look right… it probably is not!

Epic General Security Awareness Look before you click… Look carefully at links before you click them. Unless you intend to download software, no website/web address should have .exe in it. The “.exe” indicates an executable program, which could be malicious.

Epic General Security Awareness Just click “NO”! When you visit a website and a box asks, "Should I remember your password?”, click NO. The password is actually stored on your own computer. Anyone else using your computer can visit your ‘Favorites’ and login as you.

Report suspicious activity. Epic General Security Awareness Report suspicious activity. Is your computer is not performing as expected, are there more webpage pop-ups on your screen than clicked on, or you notice a program installing and you did not start the installation? These are examples of what is considered suspicious activity on a computer and could indicate that spyware, ad-ware or remote control programs have been installed without your permission or knowledge. If you experience any of these or other suspicious activity, please call the help desk at 8-7075.

Epic General Security Awareness When in doubt, call I.S. Information Services is here for you. If you ever have a question or need to notify us of a problem, give us a call at 8-7075. Only with your help can we maintain the privacy and security of our systems.

Click on the lock to advance to Lesson 3 End of Lesson 2 Click on the lock to advance to Lesson 3