Information Security Awareness Campaign

Slides:



Advertisements
Similar presentations
Track-able Bulk Management System. Agenda: Why TBMS? Track-able Bulk Management System (TBMS) TBMS Flow Benefits.
Advertisements

Outlook 2010 Quick Guide Table of Contents: Overview of client, Sending/Receiving , Using the address book………..……… Sent Items……………………………………………………………………………………………..…..8.
A quick course on the new. GCA Webmail can be accessed by clicking on the Webmail link in the GCA page, or by going to either or .gcasda.org.
Pro Exchange SPAM Filter An Exchange 2000 based spam filtering solution.
Norman SecureTide Powerful cloud solution to stop spam and threats before it reaches your network.
Login Screen This is the Sign In page for the Dashboard Enter Id and Password to sign In New User Registration.
Information Security Phishing Update CTC
WELCOME Title V Emissions Inventory SPARS Training – Site Management.
Login Screen This is the Sign In page for the Dashboard New User Registration Enter Id and Password to sign In.
Creating a No Phishing Zone Group Discussion Written Project Russell Eubanks & Tsega Thompson SANS Technology Institute- Candidate for Master of Science.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
FTLOA Go to User Name: first last name lower case.
Copy of the from the secure website - click on the AccoridaLife.zip link.
Prototype Security New Feature: Send Mass & Activity Code.
How to Enable Account Key Sign Instead Of Password In Yahoo? For more details:
CLINIC-LAB COMMUNICATION Configuring 3Shape Communicate™
Online Safety The Campion School.
VFA Year Four January 1 – December 31, 2017
Managing Windows Security
Exchange Online Advanced Threat Protection
Phishing, Spear Phishing, and what to do about it.
Information Security Awareness Campaign
Phishing, Spear Phishing, and what to do about it.
PHISHING Hi, The comms team asked if I could refresh everyone about Phishing after a fairly successful phishing circulated last week that led to.
StudentTranscripts Service Overview
Configuring Windows Firewall with Advanced Security
Conclusions DoD Net-Centric Data Strategy (DS) and
Document Management Lindsey & Krystian.
District and Club database
Report Phishing Forward phishing s to
Cyber Security Awareness Workshop
BUILDING A PRIVACY AND SECURITY PROGRAM FOR YOUR NON-PROFIT
King Phisher Diy phishing security
Working to Keep our Children Safe in a World Filled with Technology
9/14/2018 2:22 AM THR2026 Set up secure and efficient collaboration for your organization with Office 365 Joe Davies Senior Content Developer Brenda Carter.
SAMMS Secure Authorized Monitored Messaging System
StudentTranscripts Service Overview
Bigpond Contact Number  Support to update account features  Receive error messages during.
StudentTranscripts Service Overview
Information is at the heart of any University, and Harvard is no exception. We create it, analyze it, share it, and apply it. As you would imagine, we.
StudentTranscripts Service Overview
Sysco Speaks Post-Survey Plan
Phishing.
Riding Someone Else’s Wave with CSRF
SMS The following presentation will provide a brief synopsis of the key functions of the FltPlan.com FRAT system and your SMS program. Rev. 2, Updated.
2015 IT Summit CIO Council Update
Report Phishing Forward phishing s to
StudentTranscripts Service Overview
Keeping your data, money & reputation safe
StudentTranscripts Service Overview
Security Hardening through Awareness August 2018
This is the Sign In page for the Dashboard
StudentTranscripts Service Overview
Coordinated Security Response
New employee induction for new staff and managers
Spear Phishing Awareness
Employee Cybersecurity Program
1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.
Wireless Spoofing Attacks on Mobile Devices
COMPLETE BUSINESS TEXTING SOLUTION
Street Manager High-level roadmap
Microsoft Data Insights Summit
Integrated Payables Powered by Regions Intersect
Enabling Edmonton’s Communities
Using Instagram as a Marketing Tool
Kickboard Introduction for Families
Cybersecurity Simplified: Phishing
Presentation transcript:

Information Security Awareness Campaign CIO Council February 23, 2017

Information Security Awareness Strategy Spring 2017 Focus Communications Overview

Strategy “The Big Four” “One Action at a Time” Use Two Step Raising Awareness (2015 - 2016) Changing Behaviors (2016-) “The Big Four” “One Action at a Time” Identify an insecure behavior based on risk data Choose a measurable action users can take to mitigate this risk Promote this behavior change Measure the results Concept Actions Use long passwords Enable 2-Step Follow the Policy Delete Unneeded Data Fall 2016 Use Two Step Verification Recognize Phishing Report Harvard Phishing Spring 2017 Report Phishing Enable Auto-Update Reboot Frequently

Spring 2017 Focus – Report Phishing “Forward phishing emails to phishing@harvard.edu” Why Phishing? Phishing is extremely common “You’re only safe behind the gates.” Phishing is being used to install malware It is a risk that is heavily dependent on user behavior vs. technology Why Reporting? To put the numbers game in our favor To help members of the community who fall for phishing emails To streamline our response to phishing attacks university wide

Spring 2017 Focus – Public View Emails from local leadership, posters, and in-person talks Communicator’s toolkit for customizable approaches Rewards for phish reporters to spur discussion of the program Phishing stats page to show how phish reports are used and effective (planned) CADM internal phishing assessment (mid-March)

Spring 2017 Focus – Behind the Scenes Manual Phishing Review Process Create Ticket Phish Monitor Actions Phishing? Block Link in Proofpoint Yes Block File in Proofpoint Review for Escalation to Security Operations ? Criteria for Escalation Harvard Related Content Sent from Harvard Account New File / Interesting File Family Probable Spear Phishing No Investigate by checking links and files in sandbox environment Store for future “Phishy looking” email guidance. Security Operations Actions Block domain via DNS Recall Message from Exchange / Filter in g.Harvard Lookup recipients in Proofpoint for contact / review

Communication Overview Key Dates Posters and signage up first week of March Emails sent throughout week of 3/6 Rewards to phish reporters begin delivery 4/1 More dates included on communication plan