IT & Security Training Skills.

Slides:



Advertisements
Similar presentations
How we work with you. Infrastructure savings Pay only for what you use Labour Costs Match job functions with skill sets Financial Technology Efficient.
Advertisements

CS898T Mobile and Wireless Network Handheld Device Security By Yuan Chen July 25 th, 2005.
Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.
Unit 4- Assignment 3 P5, P6, M2 BTEC Business Level 3.
Information Systems Services Protecting Data – Keeping Safe Kevin Darley, IT Security Co-ordinator 8 th November 2012.
Data Security for Healthcare Facilities Debbie Abbott Health Information Consultant Resolutions (Int) Pty Ltd.
ICT School Policies 6 th November Suggested Policies for Schools Not always a requirement, but useful to cover you, your school and the students.
Information Security Decision- Making Tool What kind of data do I have and how do I protect it appropriately? Continue Information Security decision making.
TITLE : E-SAFETY NAME : ABDUL HAFIQ ISKANDAR BIN ROZLAN PROGRAM : SR221 NO.STUDENT :
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
1.1 System Performance Security Module 1 Version 5.
Thomas Levy. Agenda 1.Aims: Reducing Cyber Risk 2.Information Risk Management 3.Secure Configuration 4.Network Security 5.Managing User Access 6.Education.
Quality of Support Review Category One incident reports of allegations of staff to client assault and unexplained injuries in disability services.
1. Self Awareness You should only access your accounts and private informations from a safe location (only at home as necessary if at all possible) where.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
How to evaluate ICT use for small organisations Session 2.
Recordkeeping for Councillors
April 14, A Watershed Date in HIPAA Privacy Compliance: Where Should You Be in HIPAA Security Compliance and How to Get There… John Parmigiani National.
Cyber Security & Fraud – The impact on small businesses.
Instructional & Information Technology Services Fall, Activities and Updates Teresa Macklin Information Security Officer Information Security.
Blueberry Software IT Security Audit Results. Results: Good.
Eliza de Guzman HTM 520 Health Information Exchange.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Working with HIT Systems
The IT Vendor: HIPAA Security Savior for Smaller Health Plans?
AIMS To raise awareness of some of the issues To offer advice on solutions To identify what might be considered as ‘best practice’ To launch new Policies.
@ BCHS. The School Policy is your guide to ensuring you and your students are safe. It is your responsibility to make yourself aware and familiar with.
Watech.wa.gov Records Management In a nutshell. watech.wa.gov What’s a record? A record is anything you create in the course of doing your work – Everything.
Chapter 8 Auditing in an E-commerce Environment
Describe the potential of IT to improve internal and external communications By Jim Green.
Session 12 Information management and security. 1 Contents Part 1: Introduction Part 2: Legal and regulatory responsibilities Part 3: Our Procedures Part.
VPN. CONFIDENTIAL Agenda Introduction Types of VPN What are VPN Tokens Types of VPN Tokens RSA How tokens Work How does a user login to VPN using VPN.
Policies and Security for Internet Access
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
Information Security tools for records managers Frank Rankin.
1 Information Governance (For Dental Practices) Norman Pottinger Information Governance Manager NHS Suffolk.
Unit 1 Communication and Employability Skills for IT 1.
ASSESSMENT TOOL The assessment tool comprises 3 sections: o Infrastructure o Policy o Practice Schools self-assess two-yearly, and for each assessment.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
Joe Knight’s Company VPN Policy. What is VPN? Virtual Private Network (VPN) will allow you all as users to remote into the network from home or anywhere.
BizSmart Lunch & Learn Webinar Information Security and Protecting your business With the increased risk of some sort of cyber- attack over the past few.
By: Mark Reed.  Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction.
THE CONSUMERIZATION OF IT By Patricia Coonelly, Anthony Dipoalo, Tom Stagliano.
Handling Personal Data & Security of Information Paula Trim, Information Officer, Children’s Strategic Services, Mon – Thurs 9:15-2:15.
Child safe guarding Child protection in your organisation.
PUBLIC COMPUTER SAFETY
Cybersecurity - What’s Next? June 2017
Gareth Johns IT Skills Development Advisor
Information Protection & Cyber Security
Key behavior # 1 Be Secure Awareness Quiz
Information Technology (IT) Department
BUILDING A PRIVACY AND SECURITY PROGRAM FOR YOUR NON-PROFIT
How to Use the Integrated Management System
Staying Austin College
Reporting personal data breaches to the ICO
Intro Cyber forensics needs direction and definition
Data Protection and GDPR – An introduction for Baptist Churches
Staying safe on the internet
Security Essentials for Small Businesses
Network Security Best Practices
Data Protection Managing risk is not just about health and safety and insurance. It’s about data protection too. New stricter data protection legislation.
12 STEPS TO A GDPR AWARE NETWORK
Information management and communication
Gareth Johns IT Skills Development Advisor
HIPAA Security Standards Final Rule
Colorado “Protections For Consumer Data Privacy” Law
Session 1 – Introduction to Information Security
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Information Security in Your Office
Management commitment and responsibility Safety accountability of managers Appointment of key safety personnel SMS Implementation Plan Coordination.
Presentation transcript:

IT & Security Training Skills

Introductions Who we are Who you are How comfortable are you with technology IT Skills self assessment Immediate needs Assumed knowledge and understanding

A look at the self assessment document It’s not a test It’s there to help you and us It helps the organisation assess areas of need and training priorities It’s only your opinion It’s private and personal It’s an opportunity to get further training

Safety and Security What do we mean by safety not taking unnecessary risks Safety is common sense What is security ensuring that the relevant hardware and software are in position Security means having the infrastructure in place Both of these are implemented through a set of policies and procedures which when used define the cyber security in the organisation

Basics Where are documents held? Where are your emails held? Who is the data protection officer? Do you use USB memory sticks? Where are they? Are they encrypted? How many passwords do you use? Do you use a different password for each login? Where do you keep your passwords? Do you use the same passwords at home and work? Do you take work home? How? When you answer the phone do you ever give out confidential information? How about on email? Does the organisation have certain information you are not supposed to tell people about? Do you mention work on your personal social media accounts?

Passwords Password Guidelines Try: https://howsecureismypassword.net/ How to set yourself a naming convention Does your organisation own your passwords? What is 2 factor authentication? Mobile phone PIN Other email a/c Passwords on other devices – work vs home