Virginia Department for Aging and Rehabilitative Services.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
ANNUAL SECURITY AWARENESS TRAINING – 2011 UMW Information Technology Security Program Annual Security Awareness Training for UMW Faculty and Staff.
Computer and Mobile Device Equipment Security Brief May 29, 2008 Presented by: Kevin G. Sutton, Chief, Information Technology Unit.
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Welcome to the SPH Information Security Learning Module.
Helping our customers keep their computers safe.  Using your pet’s, business, family, friend’s names  Using number or letter sequences (0123, abcd)
Thank you to IT Training at Indiana University Computer Malware.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Internet Safety Gleneagles Computer Club February 16, 2015 by Deborah Benson.
Stop!! THINKClick. Who must complete this training  All Users: This training is required for all individuals, including contractors and vendors, with.
Part 2 of Evil Lurking in Websites Data Security at the University of Wisconsin Oshkosh.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
DHS SECURITY INCIDENT REPORTING AND RESPONSE SECURITY INCIDENT REPORTING AND RESPONSE DHS managers, employees, and other authorized information users.
Information Security Awareness:
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 18, 20 & 25 March 2015.
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
Network & Computer Security Training.  Prevents unauthorized access to our network and your computer  Helps keep unwanted viruses and malware from entering.
1 Enterprise Security Your Information Security and Privacy Responsibilities © 2008 Providence Health & Services This information may be replicated for.
October is National Cyber Security Month OIT and IT providers are launching an awareness campaign to provide tips and resources to help you stay safe online.
10 Essential Security Measures PA Turnpike Commission.
Joel Garmon, Director, Information Security Mike Rollins, Security Architect Jeff Teague, Security Analyst, Senior 1
Security Liaisons Information Presentation. Introduction  What’s the big deal with computer security? Don’t we have an IT security department to take.
Welcome to the Southeastern Louisiana University’s Online Employment Site Applicant Tutorial!
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Information guide.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
JMU GenCyber Boot Camp Summer, Cyberspace Risks and Defenses Facebook Snapchat P2P filesharing Apps Craigslist Scams JMU GenCyber Boot Camp© 2015.
Security Awareness ITS SECURITY TRAINING. Why am I here ? Isn’t security an IT problem ?  Technology can address only a small fraction of security risks.
ESCCO Data Security Training David Dixon September 2014.
1.1 System Performance Security Module 1 Version 5.
Staying Safe Online Keep your Information Secure.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
IT Security Essentials Lesley A. Bidwell, IT Security Administrator.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Move Pictures From Your Mobile Phone to Your PC.  You never know when a photo opportunity is going to arise, which is why having a camera phone can be.
 Facebook  Twitter  MySpace  Windows LiveSpace.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
End User Cyber Security Awareness Training. Who should complete this training This training is required for all individuals that owns a computer, mobile.
University Health Care Computer Systems Fellows, Residents, & Interns.
Information Security Awareness Training. Why Information Security? Information is a valuable asset for all kinds of business More and more information.
INFORMATION SECURITY WHAT IS IT? Information Security The protection of Information Systems against unauthorized access to or modification of information,
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
The way to avoid being trap into cyber crime. What is cyber crime? The Department of Justice categorizes computer crime in three ways: 1. The computer.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Information Security Everyday Best Practices Lock your workstation when you walk away – Hit Ctrl + Alt + Delete Store your passwords securely and don’t.
OCTOBER IS CYBER SECURITY AWARENESS MONTH. October is Cyber Security Awareness Month  Our Cyber Security Awareness Campaign focuses on topics such as.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Computer Security Sample security policy Dr Alexei Vernitski.
Computer Security Keeping you and your computer safe in the digital world.
POLICIES & PROCEDURES FOR HANDLING CONFIDENTIAL INFORMATION NOVEMBER 5 TH 2015.
Information Security.
End User Cyber Security Awareness Training
Staying Austin College
Cybersecurity Awareness
Information Security Awareness 101
Robert Leonard Information Security Manager Hamilton
Welcome to the SPH Information Security Learning Module
End User Cyber Security Awareness Training
Lesson 2: Epic Security Considerations
Epic Introduction Basics
Lesson 2: Epic Security Considerations
Lesson 2: Epic Security Considerations
Epic Introduction Basics
Presentation transcript:

Virginia Department for Aging and Rehabilitative Services

Who should complete this training This training is required for all individuals with security access to sensitive or confidential systems owned by the Department for Aging and Rehabilitative Services (DARS) Each individual must complete this training when security access is granted Refresher security training is required annually Supervisors must certify and track completion of security awareness training for each user

DARS Information Technology Summary of Security Policies DARS is required to adhere to policies from the Virginia Information Technology Agency (VITA) These policies extend to all users that have access to DARS systems that contain sensitive or confidential information All users must sign the Information Security Access Agreement (CISAA)

DARS IT Security Policies: Sensitive Data Users must protect all sensitive data and files Defined as data, documents, or files which, if compromised, would have an adverse effect on your agency or COV Must be stored in a secure physical environment Includes all media formats (paper, CD, USB drive) May only be stored on devices owned and approved by your organization Must be encrypted when on mobile devices Includes laptops, CDs, USB thumb drives Must be encrypted and password protected in transit For example, via or on any portable device

DARS IT Security Policies: Devices and Files Only devices owned or approved by your organization may be connected to DARS systems PCs must be manually locked when unattended PCs must automatically lock after a period of inactivity For example, fifteen minutes PCs must require a password to re-activate Files must be stored and backed up on your server Not on the desktop or C:\ drive

DARS IT Security Policies: Logons/Passwords Passwords must comply with security standards Password Requirement (Strong): Upper case alpha, lower case alpha, numeric (0-9) non-alphabetic characters (~!#$%^&*) in positions 2-6 Passwords must be changed every 90 days Cannot be changed in less than 7 days Cannot have been used within last 4 changes 5 unsuccessful attempts will lock your account System or browser may not be configured to remember (cache) passwords Users may NEVER share passwords for any reason

DARS IT Security Policies: Security Updates/Patches Operating system must be protected by applying automatic security updates and patches Applications must be configured for automatic security updates and patches For example, Microsoft Office Word, Excel, PowerPoint Adobe Reader /Acrobat Security Software must be up to date and configured for regular scans For example, McAfee, Norton, Kaspersky, Sophos will be set to check for updates and scan at startup and shut down Security software should be set to scan Internet pages, , attachments, and downloads

DARS IT Security Policies: Physical Security Lock your workstation when you leave your desk or leave your laptop/mobile device unattended Press the Windows Key and L (at the same time) Press Ctrl-Alt-Del and Lock Computer Lock sensitive documents and materials in a file cabinet Dispose of sensitive materials appropriately Never share your access key, card or fob Always question unescorted strangers Always report incidents and suspicious activities

Current Threats Current Threats The following slides include a few examples of the kinds of threats you may encounter with suggestions on how you can protect yourself, your data, your organization and DARS systems from harm. Basic Concept You Control What You Choose to Click Most end user threats are targeted specifically in hopes that you will click on a harmful link, attachment, picture, video or icon in an or web page, including social media applications What you can do STOP, and THINK, BEFORE you CLICK Your job is to be aware, be alert and diligent. Always look for the signs that external entities are trying to gain access to your PC and your network. DARS Cyber Security Awareness: Threats

Your Workspace Individuals that you do not know may be in your physical space, in the office and at your other work locations. Do not allow unauthorized access to your work area. Do not let anyone borrow your keys or security badge Your Devices Individuals will look for easy ways to steal PCs, cell phones, and other devices. Put away and lock your PC and other devices when not using them. If you have a laptop or other mobile device, make sure it is encrypted. If you use a thumb drive or external hard drive, make sure it is encrypted. Do not leave your PC unattended, particularly in public spaces. Your Password Your password is also a key. Individuals will try to steal your passwords if they are in plain sight or easy to determine. Do not write down your passwords on sticky notes or paper in plain sight. Change your passwords frequently and make them hard to guess. Report immediately all suspicious activities and breaches of physical security DARS Cyber Security Awareness: Physical Threats

Phishing, Spoofs, Goofs, Hoaxes, Malware, Scams and Spam The most prevalent and persistent threats to your security come to you in your Inbox. They come by different names and may even appear legitimate and even supposedly from people you may know. They all have this in common: they are designed to get you to click on an item like an attachment, link or picture. Result: If you click, you may launch a harmful program or be directed to a harmful web site. You may then find your personal information compromised and you may subject your network to malicious software. Stop: Do not click. Do not assume that links in your are automatically safe. Think: If you cannot identify the source and attachments as legitimate or be sure the links are safe by looking at the actual web address, you can logically conclude that you should beware. Click: Only after you are completely confident that the action is safe. Protect all of your accounts. Report all incidents and suspicious activity to security. DARS Cyber Security Awareness: Threats

Browsing Can Hazardous To Your PC The Internet is a significant resource for business and government services. However, some of the same issues as with can create security issues that you need to be aware of. The Common Threat: On the web, the threats come from malicious links. Most of the threats come when you click on a link that launches a malicious program or re-directs you to a dangerous site. Result: If you click, you may launch harmful programs or be directed to a harmful web site. You may then find your personal, client, or sensitive business information compromised and you may subject your PC and network to malicious software. Stop: Do not automatically click on Internet links until you have confidence in them. This includes pictures, videos, and navigational elements. Think: Look at the actual address for the links in question. For instance if the link indicates Click Here be sure to hover your mouse pointer over the link and investigate the actual web address before you proceed. Click: Only after you are completely confident that the web site is safe. Report all suspicious web sites to security DARS Cyber Security Awareness: Internet Threats

Social Media Can Be Suspect While usually relatively safe, the rapid increase in social networking and collaborative sites has offered new opportunities for hackers, thieves and others. You should use common sense and be cautious when visiting these sites. The Common Threat: Similar to threats, postings on FaceBook, LinkedIN, YouTube, and others may appear to take you to interesting content, funny videos, or connect you to other users and organizational sites of common interest. Result: In reality you may be clicking on links that launch malware or take you to sites other than the ones you expected, and exposing your personal information. Stop: Do not assume social networking sites are safe. Do not click on links until you are sure they are legitimate. This includes pictures, videos, invitations to games and applications, and navigational elements. Think: Look at the actual web addresses for the links in question. Investigate all links and linkable items by hovering your mouse over them. Look at the actual web address before you proceed. Be careful of postings and sites that ask to share your personal information Click: Only after you are completely confident that the web site is safe. Report all suspicious social media activity DARS Cyber Security Awareness: Internet Threats

For Mobile Workers: Be Careful With Your Connections The ability to work away from the office is beneficial and flexible, mobile workers need take special care of the inherent threats to COV systems when connected to public access points. Special care should taken when working in these environments. Wireless Networks: Assume when you connect to a public wireless access point that it is inherently not secure. Other individuals can potentially see your activity. When connecting to a sensitive COV system, this could expose your sensitive data. Virtual Private Network: VPN allows you to launch a secure Internet connection so that even with a public access point, you are able to work connected to your home network, applications and databases with a greater level of security. Device Encryption: Always make sure your Laptop, Tablet or other mobile device is protected from someone else logging on. Device encryption should be installed on all mobile devices that connect to COV systems. Stop: Do not connect to a public wireless access point without VPN. Think: When you are prompted to connect to a public wireless node, know what you are connecting to and assume it is public. Click: Only proceed if you are confident in the connection and are using VPN. Keep Your Mobile Computing Safe! DARS Cyber Security Awareness: Telework Threats

Take the CyberPledge! Print and sign the pledge on the next slide and post it as a reminder. Take the time and care every day to protect yourself, your organization and your clients through your own safe practices. DARS Cyber Security Awareness: The Pledge

I, _____________________________________________ Date: _________________ PLEDGE to: Stop, and Think (consider appropriateness and risk) before I Connect to the Internet. Take personal responsibility for security, follow my organizations security policies, and adhere to sound security practices. Lock my computer whenever I leave my work area. Safeguard portable computing equipment when I am in public places. Create and use strong passwords, and never share my password(s) with anyone. Never leave a written password (sticky note, etc.) near my computer, or easily accessible. Promptly report all security incidents or concerns to my organizations security officer or other appropriate contact. Safeguard sensitive data as well as confidential and/or legally protected (Personally Identifiable Information and Protected Health Information) data from any inappropriate disclosure. Work to the best of my ability to keep my organizations staff, property and information safe and secure. Spread the message to my friends, co-workers and community about staying safe online. Cyber Security Pledge

Thank you for taking the DARS Cyber Security Awareness Training. Please log your participation with your ISO. DARS Cyber Security Awareness: