Data Security at Albemarle County: Keeping You and Your Computer Safe.

Slides:



Advertisements
Similar presentations
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Advertisements

Identity theft Protecting your credit identity. Identity Theft Three hundred forty three million was lost from consumers in 2002 The number of complaints.
Fraud Protection. Agenda Start time: ____ Break time: ____ (10 minutes) End time: ____ Please set phones to silent ring and answer outside of the room.
Helping our customers keep their computers safe.  Using your pet’s, business, family, friend’s names  Using number or letter sequences (0123, abcd)
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Internet Safety Gleneagles Computer Club February 16, 2015 by Deborah Benson.
SECURITY CHECK Protecting Your System and Yourself Source:
What to Know, What to Do Presentation Powered By: The Federal Trade Commission Consumer Protection Toolkit.
Protecting Your Identity: What to Know, What to Do.
1 Identity Theft and Phishing: What You Need to Know.
BALANCING LIFE’S ISSUES, INC. Identity Theft Protection, Prevention and Self Help.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
1.3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge.
1 Identity Theft: What You Need to Know. 2 Identity Theft Identity theft is a crime of stealing key pieces of someone’s identifying information, such.
Network & Computer Security Training.  Prevents unauthorized access to our network and your computer  Helps keep unwanted viruses and malware from entering.
1 Enterprise Security Your Information Security and Privacy Responsibilities © 2008 Providence Health & Services This information may be replicated for.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
10 Essential Security Measures PA Turnpike Commission.
Felicia Cervantes. Using someone's personal identifying data for unlawful purpose. (This is a SERIOUS crime.) More than 8 million American Adults fell.
[your name, organization] Protecting Your IdentityProtecting Your Identity: What to Know, What to Do.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Have You Lost Your Identity? By Sierra Bowland. Deter Detect Defend.
Washington State Department of Financial Institutions “Regulating financial services to protect and educate the public and promote economic vitality.”
Who Is This?! By Bailey Hoover. Foreword Deter Detect Defend Deter, Detect, Defend Brochure ID Theft: What It’s All About.
Identity Theft By: Victoria Tuttle. DeterDetect Defend.
3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America,
ESCCO Data Security Training David Dixon September 2014.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Identity theft: Real or Virtual? By: Alex Metzler.
IT security By Tilly Gerlack.
Identity Theft  IDENTITY THEFT occurs when someone wrongfully acquires and uses a consumer’s personal identification, credit, or account information.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Cyber Security. Security – It’s About Layers There’s no one stop solution to protection Each layer you add, an additional tool will be needed to pierce.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS). SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.1 I can describe.
Identity Fraud TODAY YOU WILL... TAKE STEPS TO PROTECT YOURSELF AGAINST FRAUD 1 ©2014 NEFE High School Financial Planning Program® | Lesson 2-5: Identity.
End User Cyber Security Awareness Training. Who should complete this training This training is required for all individuals that owns a computer, mobile.
Be Cautious of Identity Theft By: Sydney Langley.
INFORMATION SECURITY WHAT IS IT? Information Security The protection of Information Systems against unauthorized access to or modification of information,
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
How can IT help you today?. Agenda Why Do You Care? What Are The Risks? What Can You Do? Questions? How can IT help you today? 2.
Identity Fraud TODAY YOU WILL... TAKE STEPS TO PROTECT YOURSELF AGAINST FRAUD 1 (C)2012 National Endowment for Financial Education | Lesson 2-5 Identity.
Internet Safety Internet Safety LPM
© 2013 BALANCE / REV0513 Identity Theft Identity theft can be one of the most shocking and upsetting events to ever happen to you. Fortunately, there are.
Identity Theft What is it, is identity theft really a problem, how can I protect myself, what do I do if my Identity is stolen.
Protecting Your Assets By Preventing Identity Theft 1.
Unit Five Your Money – Keeping It Safe and Secure Identity Theft Part II Resource: NEFE High School Financial Planning Program.
OCTOBER IS CYBER SECURITY AWARENESS MONTH. October is Cyber Security Awareness Month  Our Cyber Security Awareness Campaign focuses on topics such as.
Presented By: Jennifer Thayer, SPHR, SHRM-SCP.  Identify CyberCrime and Types  Identify Steps to Take to Prevent Identity Theft  Learn Tips and Tricks.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Account & Google Message Center Guide August 2015 Prepared by: Angela Mars IT Education and Training.
ARE YOU A CYBER SECURITY RISK?. Pass the Hat Al QaedaFARCHezbollahIRAHAMAS.
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
Protecting Your Assets By Preventing Identity Theft
Account & Google Message Center Guide August 2015 Prepared by: Angela Mars IT Education and Training.
Fraud Protection.
Fraud protection.
Unit 4 IT Security.
Information Security.
Protecting Your Identity:
Information Security 101 Richard Davis, Rob Laltrello.
Staying Austin College
Protecting Your Identity:
Protecting Yourself from Fraud including Identity Theft
Protecting Your Credit Identity
Handling Information Securely
Protecting Yourself from Fraud including Identity Theft
Identity Theft Samuel H. Slater.
Presentation transcript:

Data Security at Albemarle County: Keeping You and Your Computer Safe

Levels of Cyber Security My Online Security Maintaining a high level of cyber security requires you to focus on the four different areas shown in this diagram. The slides that follow explore these topics in greater detail. For any additional information, or if you have follow-up questions, please contact the Albemarle County Government Help Desk, x 5895 or

Lack of Physical Security Undercuts All Other Security Measures Dont lose track of your laptop. Dont lose track of your laptop. Dont walk away from your machine without locking it (Hold down the Windows and L keys to lock). Dont walk away from your machine without locking it (Hold down the Windows and L keys to lock). Create strong passwords. Create strong passwords. The Windows key is located between the Ctrl and Alt keys in the lower-right corner of a standard keyboard.

Computer Theft Prevention Never leave your laptop unattended in plain sight Never leave your laptop unattended in plain sight Don't leave a laptop in an unlocked vehicle, even if the vehicle is in your driveway or garage. If you must leave your laptop in a vehicle, cover it up or put it in a locked trunk. Don't leave a laptop in an unlocked vehicle, even if the vehicle is in your driveway or garage. If you must leave your laptop in a vehicle, cover it up or put it in a locked trunk. Carry your laptop in a nondescript carrying case, briefcase, or bag. Carry your laptop in a nondescript carrying case, briefcase, or bag. Going to lunch, or taking a break? Don't leave a meeting or conference room without your laptop. Take it with you, or you run the risk that it won't be there when you return. Going to lunch, or taking a break? Don't leave a meeting or conference room without your laptop. Take it with you, or you run the risk that it won't be there when you return. Lock the laptop in your office during off-hours. Lock the laptop in your office during off-hours.

Data Theft Prevention Dont work on sensitive data in a public place – you never know who is watching Dont work on sensitive data in a public place – you never know who is watching Use passwords and encryption whenever working on important data Use passwords and encryption whenever working on important data Back up your information on disks and store them at home or the office. Back up your information on disks and store them at home or the office.

Protecting Mini Storage Devices Mini Storage devices include CDs, IPods, or any type of flash drive (thumb drives, memory sticks, USB drives, or pen drives). Mini Storage devices include CDs, IPods, or any type of flash drive (thumb drives, memory sticks, USB drives, or pen drives). We recommend strongly against storing ANY county data on these types of devices; we have the network capability and tools available to anyone who needs to transport presentations or documents to other PCs. We recommend strongly against storing ANY county data on these types of devices; we have the network capability and tools available to anyone who needs to transport presentations or documents to other PCs. Attach important items like flash drives to your key chain so you dont lose them. Attach important items like flash drives to your key chain so you dont lose them. Never leave a storage device in plain sight when you leave your office, car, or workplace. Never leave a storage device in plain sight when you leave your office, car, or workplace. If you are using one of these devices always back up the information to another source. If you are using one of these devices always back up the information to another source.

Locking Your Computer If you are leaving you computer for 90 minutes or less you should always lock it. If you are leaving you computer for 90 minutes or less you should always lock it. Why? To ensure that no one else uses your computer while you are away. Why? To ensure that no one else uses your computer while you are away. Use one of these methods: Use one of these methods: Press the Windows and L keysPress the Windows and L keys Press the Ctrl-Alt-Delete keys. When the Windows Security Menu appears, click on the Lock Computer buttonPress the Ctrl-Alt-Delete keys. When the Windows Security Menu appears, click on the Lock Computer button Safe some energy! If you leave your computer for more than 90 minutes, shut down. Safe some energy! If you leave your computer for more than 90 minutes, shut down. The Windows key is located between the Ctrl and Alt keys in the lower-right corner of a standard keyboard.

Strong Passwords Any password should be at least 7 characters long. Any password should be at least 7 characters long. Add complexity to your password: Add complexity to your password: Use a combination of upper- and lowercase lettersUse a combination of upper- and lowercase letters Add numbersAdd numbers Substitute special characters or numbers for letters for a, $ for s, 3 for e, ! for l)Substitute special characters or numbers for letters for a, $ for s, 3 for e, ! for l) Think of a sentence that you will remember and turn that into your password by using the first letter of each word to create a password string. Think of a sentence that you will remember and turn that into your password by using the first letter of each word to create a password string. Sample password using the above suggestions:Sample password using the above suggestions: All passwords must be at least seven characters long becomes: Keep your password a secret: Treat your passwords with as much care as the information that they protect. DO NOT keep your password written down in plain sight or in any place accessible by other people. Keep your password a secret: Treat your passwords with as much care as the information that they protect. DO NOT keep your password written down in plain sight or in any place accessible by other people.

How the IT Dept. Secures Your PC Keeps software up-to-date. Keeps software up-to-date. Maintains a firewall. Maintains a firewall. Automatically updates and runs antivirus program. Automatically updates and runs antivirus program. Offers anti-spy & adware programs as needed. Offers anti-spy & adware programs as needed.

Safe ing: 3 Things to Know Know who you are sending mail to. Know who you are sending mail to. Know who you are getting mail from. Know who you are getting mail from. Know who you expect attachments from. Know who you expect attachments from. Just because you know the person the mail came from does not mean its a legitimate .Just because you know the person the mail came from does not mean its a legitimate . Dont believe everything you read. Dont believe everything you read.

The Never Never List: Never never open an attachment from an unknown source. Never never open an attachment you were not expecting. Never never click on a link in an from an unknown source. Never never share your password.

What Is Phishing? An attempt via to get you to disclose personal information that will be used in a malicious manner. An attempt via to get you to disclose personal information that will be used in a malicious manner. Often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one. Often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one.

Recognizing Phishing s:

Clues To Identify A Phishing If it sounds too good to be true, it probably is! If it sounds too good to be true, it probably is! Spelling errors and bad grammar. Spelling errors and bad grammar. Odd formatting (e.g., incorrect use of capital letters or punctuation). Odd formatting (e.g., incorrect use of capital letters or punctuation). No real person's name included in either the greeting or signature of the . No real person's name included in either the greeting or signature of the . No legitimate business will ever request your password. No legitimate business will ever request your password. No mention of a phone number to call or person to contact. No mention of a phone number to call or person to contact. Threatening to delete an account due to lack of response: legitimate businesses dont do that. Threatening to delete an account due to lack of response: legitimate businesses dont do that.

Verifying Website Security The s in the http indicates that this is a secure site. A padlock icon also indicates that this is a secure site (the icons location depends on your browser; it may be at the top of the screen or in the lower-right corner). Know how to identify secure sites when youre online. Know how to identify secure sites when youre online.

Be careful about what you reveal online: Be careful about what you reveal online: AgeAge AddressAddress WhereaboutsWhereabouts Itinerary/routineItinerary/routine Phone number, IM namePhone number, IM name Tips To Protect Yourself

ID theft not just a cybercrime; it occurs in the real world too. Mail Mail Stealing from mailbox, change of address formsStealing from mailbox, change of address forms Theft Theft Wallet/purse stolen, home/car break-insWallet/purse stolen, home/car break-ins Dumpster diving at homes and businessesDumpster diving at homes and businesses Cell Phone Cameras Cell Phone Cameras Sneaky photos taken of your private infoSneaky photos taken of your private info Maintain Your Physical Security

Secure your trash Secure your trash Think before you toss; buy & use a shredderThink before you toss; buy & use a shredder Secure your mailbox Secure your mailbox Stop mail and newspapers when out of townStop mail and newspapers when out of town Mail letters from P.O. or dropboxesMail letters from P.O. or dropboxes Note anything unusualNote anything unusual Monitor your credit Monitor your credit Opt out of pre-approved offers. Call OPTOUT ( ) to request such offers be stopped. Note that you will be asked to provide your Social Security number when you call.Opt out of pre-approved offers. Call OPTOUT ( ) to request such offers be stopped. Note that you will be asked to provide your Social Security number when you call. Check your statements & credit reportsCheck your statements & credit reports How to Prevent ID Theft

Place a fraud alert on your credit reports, and review your credit reports. Place a fraud alert on your credit reports, and review your credit reports. Close the accounts that you know, or believe, have been tampered with or opened fraudulently. Close the accounts that you know, or believe, have been tampered with or opened fraudulently. File a complaint with the Federal Trade Commission. File a complaint with the Federal Trade Commission. File a report with your local police. File a report with your local police. If You Are A Victim of ID Theft…