Premier Employee Program Version 4.0

Slides:



Advertisements
Similar presentations
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Advertisements

ANNUAL SECURITY AWARENESS TRAINING – 2011 UMW Information Technology Security Program Annual Security Awareness Training for UMW Faculty and Staff.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
HIPAA Basic Training for Privacy & Information Security Vanderbilt University Medical Center VUMC HIPAA Website:
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 25 & 27 November 2013.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Protecting Your Identity: What to Know, What to Do.
1 Identity Theft and Phishing: What You Need to Know.
Fraud, Scams and ID Theft …oh my! Deb Ramsay ESD 101 Chief Information Officer Technology Division.
What is identity theft, and how can you protect yourself from it?
SAFEGUARDING DHS CLIENT DATA PART 2 SAFEGUARDING PHI AND HIPAA Safeguards must: Protect PHI from accidental or intentional unauthorized use/disclosure.
1 Identity Theft: What You Need to Know. 2 Identity Theft Identity theft is a crime of stealing key pieces of someone’s identifying information, such.
Guide to Massachusetts Data Privacy Laws & Steps you can take towards Compliance.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 18, 20 & 25 March 2015.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
HIPAA Basic Training for Privacy and Information Security Vanderbilt University Medical Center VUMC HIPAA Website: HIPAA Basic.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
IT Security for Users By Matthew Moody.
1.1 System Performance Security Module 1 Version 5.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
Legal Division CSAA Insurance Group, a AAA Insurer Protecting Your Identity: What to Know, What to Do 2015 Risky Business Week.
Information Security Awareness Training. Why Information Security? Information is a valuable asset for all kinds of business More and more information.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
What are the rules? Information technology is available to every student, faculty and staff member in support of the essential mission of the University.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Minding your business on the internet Kelly Trevino Regional Director October 6,2015.
Cyber Safety Jamie Salazar.
Information Security Everyday Best Practices Lock your workstation when you walk away – Hit Ctrl + Alt + Delete Store your passwords securely and don’t.
OCTOBER IS CYBER SECURITY AWARENESS MONTH. October is Cyber Security Awareness Month  Our Cyber Security Awareness Campaign focuses on topics such as.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Managing Money Workshop The National Autistic Society AGM
Phishing and Internet Scams. Definitions and recent statistics Why is it dangerous? Phishing techniques and identifiers Examples of phishing and scam.
JANELL LAYSER Training Manual. AWARENESS! Social Engineers are out there, and everyone should be prepared to deal with them! They can contact you by phone,
POLICIES & PROCEDURES FOR HANDLING CONFIDENTIAL INFORMATION NOVEMBER 5 TH 2015.
Internet Safety.
Information Security Awareness Training
Protecting Your Assets By Preventing Identity Theft
ISMS Information Security Management System
What is Information Security?
Information Technology Acceptable Use An Overview
Scams & Schemes Common Sense Media.
Done by… Hanoof Al-Khaldi Information Assurance
E&O Risk Management: Meeting the Challenge of Change
Learn how to protect yourself against common attacks
Mysale Information Classification 101
Protection of CONSUMER information
How to use the internet safely and How to protect my personal data?
Information Security.
How to use the internet safely and How to protect my personal data?
Protecting Your Identity:
I S P S loss Prevention.
Information Security 101 Richard Davis, Rob Laltrello.
Protect Your Computer Against Harmful Attacks!
Staying Austin College
Education – Partnership – Solutions
Cybersecurity Awareness
4 ways to stay safe online 1. Avoid viruses and phishing scams
Information Security Session October 24, 2005
Red Flags Rule An Introduction County College of Morris
Lesson 2: Epic Security Considerations
HOW DO I KEEP MY COMPUTER SAFE?
What is BankMobile? A process to select how to receive student refunds and student payroll payments It is fast, secure, and convenient. Go to:
9 ways to avoid viruses and spyware
Business Compromise and Cyber Threat
Handling Information Securely
Anatomy of a Common Cyber Attack
School of Medicine Orientation Information Security Training
Presentation transcript:

Premier Employee Program Version 4.0 Information Security Premier Employee Program Version 4.0 Premier Employee Program Version 4.0 4/18/2019

Information Security at JobStreet Our informational asset is a vital access at JobStreet. Jobseeker resumes Employer data Internal administrative, financial and sales data Wikis, etc. Includes Electronic - Databases, Emails Paper form Spoken Premier Employee Program Version 4.0 4/18/2019 4/18/2019 2

Importance of protecting our information assets Reputation – TRUST in JobStreet is very important Compliance with legal contracts (NDA, customer contracts, truste, term of use) Legal penalties Loss of business or competitive advantages Identity theft Disruption of service Bad media coverage Premier Employee Program Version 4.0 4/18/2019

Your role in Information Security YOU can prevent several security threats facing JobStreet. Comply with our corporate security policies at: http://int.jobstreet.com/static/finance/ism/main.htm You have 2 weeks to read and sign-off the policy after your first day of work http://int.jobstreet.com/static/hr/online_agreement/listMyDocument.asp Premier Employee Program Version 4.0 4/18/2019

Your role in Information Security Key policies applicable to all staff Information Security Policy Acceptable Use Policy Incident Management Plan Truste Privacy Policy Application and Data Access Control Policy Premier Employee Program Version 4.0 4/18/2019

Handling Confidential Information All information obtained in the course of duty are strictly confidential. Under NO circumstances should you divulge to any unauthorized persons within and / or outside the Company. Premier Employee Program Version 4.0 4/18/2019 4/18/2019 6

Questions to Ask Is the information I am about to review legitimate / authentic? Have I contacted appropriate JobStreet personnel regarding my uncertainty on handling sensitive situations? Could the actions I am about to perform in any way either harm myself or JobStreet? Is the information I am currently handling of vital importance either to myself or JobStreet? Premier Employee Program Version 4.0 4/18/2019

Who to Contact Its critical you contact appropriate person in charge the moment you suspect something is wrong Incident Classification 1st Level Notification to Response Team 2nd Level Update 1 Unauthorized access, circulation or distribution or loss of customer and jobseeker database Application Owner ISO/CTO (immediate notification required) 2 Unauthorized access, circulation or distribution or loss of financial information Group Finance ISO/CTO & CFO (immediate notification required) 3 Loss of accessibility to systems Application Owners CTO 4 Other security related IT incidents Local IT Officer Infrastructure Ops Manager 5 Loss of fixed asset Local Department Head and Local Facility/Security Country Head and Group Finance 6 Security related operational incidents not related to IT systems Country Head and COO Contact ncc@jobstreet.com if you are unsure of who to inform for any security incidents. Premier Employee Program Version 4.0 4/18/2019

Information Security Policy Objective: Protect the integrity, confidentiality and the accessibility of information Confidentiality People obtaining or disclosing information inappropriately Integrity Information being altered or erroneously validated, whether deliberate or accidental Availability Information not being available when it is required Premier Employee Program Version 4.0 4/18/2019

Information Security Policy Responsibilities Obligation to protect our information assets, systems and infrastructure. Everyone will respect the information assets of third parties. Actual or suspected security incidents must be reported immediately to the functional department head relevant to the incident. Report of any security shortfalls in our existing security practices or improvements should be reported to senior managers. Premier Employee Program Version 4.0 4/18/2019

General Information Security Measures Keep your laptop in your possession and within sight The anti-virus software MUST be updated as soon as the update is available – turn on the service auto-update If desktop/ laptop is unattended, screen lock it Premier Employee Program Version 4.0 4/18/2019

General Information Security Measures Back up data by uploading data onto network file server Do not leave confidential documents unattended at the printer or fax machine Report any security incidents (such as virus infections) promptly to ncc@jobstreet.com New Hire Orientation Version 3.0 4/18/2019 Premier Employee Program Version 4.0

General Information Security Measures Safe surfing on a public wireless connection Up-to-date anti-virus software Two-way firewall Turn off the wireless radio Avoid entering sensitive personal info Turn off file sharing Don’t type any passwords unless the site is secure Look for addresses that begin with “https” – secure (BUT, it’s not failsafe) Premier Employee Program Version 4.0 4/18/2019

General Information Security Measures Password management NEVER share your password with anyone Don’t write down your passwords anywhere Do not download, install, or use unauthorised software programs. Do not download, forward, print or post inappropriate materials: Premier Employee Program Version 4.0 4/18/2019

Phishing Scams Phishing: Designed to steal your identity Forms of phishing email messages Appear to be from someone you know Premier Employee Program Version 4.0 4/18/2019

Phishing scams Might ask you to make a phone call to a number listed in the email Might include official-looking logos Premier Employee Program Version 4.0 4/18/2019

Phishing scams Might include links to spoofed websites where you are asked to click and enter personal information Premier Employee Program Version 4.0 4/18/2019

Phishing scams Phrases to look for in a phishing scam “Verify your account” “You have won the lottery” “If you don’t respond within 24 hours, your account will be closed” – makes you panic Premier Employee Program Version 4.0 4/18/2019

Phishing scams How to avoid NEVER reply suspicious-looking emails asking for personal info NEVER give out personal information (eg: passwords) through email to anyone NEVER use links in an e-mail to get to a website Premier Employee Program Version 4.0 4/18/2019

Phishing scams How to avoid NEVER enter your personal info in a pop-up screen Call the company/ IT department directly Premier Employee Program Version 4.0 4/18/2019

Phishing scams Phishing can happen by phone NEVER give your personal information over the phone Verify the caller’s identity Ask for the person’s name Get the main phone number from JobStreet’s contact list/ internet directory Find out if the call was legitimate Install anti-virus and anti-spam software Report suspicious activity to ncc@jobstreet.com or tedtarg@jobstreet.com Premier Employee Program Version 4.0 4/18/2019