Security Hardening through Awareness August 2018

Slides:



Advertisements
Similar presentations
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Advertisements

What is Bad ? Spam, Phishing, Scam, Hoax and Malware distributed via
Internet Safety Gleneagles Computer Club February 16, 2015 by Deborah Benson.
Breaking Trust On The Internet
Hacker’s tricks for online users to reveal their sensitive information such as credit card, bank account, and social security. Phishing s are designed.
David Abarca, Instructor Del Mar College Computer Corner Phishing, Pharming, Spear-Phishing, and now…. Vishing.
October is National Cyber Security Month OIT and IT providers are launching an awareness campaign to provide tips and resources to help you stay safe online.
Don’t Lose Your Identity – Protect Yourself from Spyware Dan Frommer Sherry Minton.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Security Liaisons Information Presentation. Introduction  What’s the big deal with computer security? Don’t we have an IT security department to take.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Preventing Identity Theft in Aspen Falls Helping citizens protect themselves IdentityTheft.
Reliability & Desirability of Data
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Computer Security Hacking, Phishing, Passwords Kausalya S. And Sushil Mujumdar (CCCF) 04 - Aug - 15.
CCT355H5 F Presentation: Phishing November Jennifer Li.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
Cybersecurity Test Review Introduction to Digital Technology.
FLTCYBERCOM / C10F    U.S. FLEET CYBER COMMAND / U.S. TENTH FLEET    1 Overall Classification of this Briefing is UNCLASSIFIED//FOUO Phishing.
Information Security Awareness Program. Agenda  What is Information Security?  Why is Information Security important?  Education Data Breach  Appropriate.
SAP – our anti-hacking software. Banking customers can do most transactions, payments and transfer online, through very secure encrypted connections.
 77.4% of the perpetrators are male.  50% live in one of the following states: California, New York, Florida, Texas, and Washington.  55.4% complainants.
Protecting Against Cyber Attacks PLEASE TAKE A MINUTE TO LOOK AT THIS IMPORTANT MESSAGE. THIS IS HAPPENING HERE AND NOW! LET US SAVE YOU AND YOUR INFORMATION.
Properly Safeguarding Personally Identifiable Information (PII) Ticket Program Manager (TPM) Social Security’s Ticket to Work Program.
PHISHING A Melbourne Athenaeum Library Cybersafety Information Guide
Important Information Provided by Information Technology Center
An Introduction to Phishing and Viruses
Done by… Hanoof Al-Khaldi Information Assurance
PHISHING Hi, The comms team asked if I could refresh everyone about Phishing after a fairly successful phishing circulated last week that led to.
CYBER SECURITY PANDEMIC
Learn how to protect yourself against common attacks
Unit 4 IT Security.
Social Engineering Charniece Craven COSC 316.
Ways to protect yourself against hackers
Lesson 3 Safe Computing.
Overview 1. Phishing Scams
National Cyber Security Month
Unit 4 IT Security.
I S P S loss Prevention.
Cyber Security Awareness Workshop
Information Security 101 Richard Davis, Rob Laltrello.
Protecting our institutional and your personal data
Phishing is a form of social engineering that attempts to steal sensitive information.
Protect Your Computer Against Harmful Attacks!
Staying Austin College
Lesson 2- Protecting Yourself Online
Cybersecurity Awareness
Practice Safe Computing
Robert Leonard Information Security Manager Hamilton
4 ways to stay safe online 1. Avoid viruses and phishing scams
Scams, Identity Theft, and Viruses Kelly & Caitlin
Risk of the Internet At Home
Information Security Session October 24, 2005
HOW DO I KEEP MY COMPUTER SAFE?
Top Ten Cyber Security Hygiene Tips
Computer Security.
CYBERSAFETY & Personal information
Information Security – Sep 18
What is Phishing? Pronounced “Fishing”
Lesson 2- Protecting Yourself Online
Week 7 - Wednesday CS363.
Why Cyber Security is important to SME? Useful Tips on how you protect and secure your business. By Ronald Soh from Win-Pro Consultancy Pte Ltd
Cybersecurity Simplified: Phishing
FSU Basic Cybersecurity Training
Presentation transcript:

Security Hardening through Awareness August 2018 WOU CyberSecurity Security Hardening through Awareness August 2018

E-mail Standard E-mail delivery is an insecure form of communication If you don’t want it printed in the newspaper, don’t send by standard e-mail WOU subscribes to Cisco Registered Envelope Service Outgoing E-mail will be delivered encrypted if: E-mail is sent using your Wou e-mail account #SECURE# is used in the subject line or An SSN or Credit card number is used in the body of the e-mail

E-mail blocked during the last week by: Reputation – 2,535,242 (top offender: cpro20.com) Invalid recipients – 197 Spam detected – 55,770 Virus Detected – 4 Malware – 3 Malicious URLs – 1,808 Content – 67 – (know bad users, machines or subject lines) These numbers were recorded in August 2018

E-mail Phishing Phishing -- fraudulent attempt to obtain sensitive information These scams attempt to trick recipients into responding or clicking immediately, by claiming they will lose something (for example, email access, bank account) University Computing Services will “never” ask you for your login credentials Spear-phishing This type of attack is directed at specific individuals The perpetrator knows more about you, making the request sound more believable

Passwords Use different passwords for each secure site There is a wou portal group called password security Password security reports sites where your security has been breached Password manager PasswordSafe, dashlane, keeper Your password can be changed by using https://wou.edu/accountlookup An alternative is to visit the service request desk in ITC009 Ucs will never give you your password by phone or e-mail Two factor authentication is available for sensitive access requirements

Protecting your computer Malware, popups & Ransomware There is significant threat of infection, when visiting Pornographic or Beer websites Sophos/intercept X does an excellent job of reporting threats and in most cases automatically remediates Beware of people calling you and reporting to be from support They may ask to take control of your computer ??? If you find a flash drive that doesn’t belong to you, do not attempt to use it

Physical security The Wou network has significant security protection built into it If you take a work laptop home, that same security environment will not be protecting you If your laptop must be left in a vehicle, secure it physically and virtually Encrypt sensitive files Use two factor authentication to access the computer Don’t tape your credentials to your monitor or the top of your desk

Information security Data stored on Google Drive is not backed up This project is in the current queue