SECURITY TRAINING AND THREAT AWARENESS

Slides:



Advertisements
Similar presentations
Keeping Safe on Campus Stranger Danger By Andrew Wingfield Boise State University.
Advertisements

HEALTH, SAFETY AND SECURITY. HEALTH AND SAFETY POLICY This is a statement that sets out how a firm manages health and safety in the workplace. Shows the.
Administration Intermediate 1 & 2 Command Words Identify 2 pieces of information included in the contract of Employment, apart from employees personal.
Site Security Presentation
/0403 Copyright ©2004 Business and Legal Reports, Inc. BLRs Safety Training Presentations Transportation Security TrainingPart II 49 CFR
Occupational Health & Safety training and consultancy Demo version e-training for emergency procedures Start your e-training.
Suspicious Packages Capitol Police Department. Objectives n Give our community (state employees) knowledge of suspicious packages.
Welcome to Crime Prevention Training.
Security Training and Threat Awareness Program for All Employees
Access Control & Escorting Responsibilities Objectives Different Badges Used at SNL Badge Responsibilities Escorting Vouching (Allowing Someone to “Piggyback”)
PHYSICAL SECURITY Attacker. Physical Security Not all attacks on your organization's data come across the network. Many companies focus on an “iron-clad”
Section Four: Employee and Visitor Access Controls Note: All classified markings contained within this presentation are for training purposes only.
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
10 Essential Security Measures PA Turnpike Commission.
UCOP Safety Meeting April Reduce Your Risk of Chronic Disease Through Better Nutrition USDA Dietary Guidelines link poor diet to cardiovascular.
Parkway UMC SAFE SANCTUARY Training. OUR SAFE SANCTUARY POLICY HELPS US PROTECT Our children and youth from harm or abuse Our employees and volunteers.
Mail Handling & Screening
Protecting your Employees and Securing your Mail Center.
Reception.
Reception Unit 2c.
Company Overview | Marketing & Communication | Finance | Facilities |TIM | QMG | ISG | ESG | RMG | HR Stand-up Meetings for BT Project Employees Information.
Chapter 13 Security Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Objectives State the major responsibility.
Defensive Travel Briefing Cheryl L. Wieser Regional Security Officer US Department of Commerce (206) (206) Fax Updated 10/03/11 Security.
CHAPTER 4, SECTION 2 Access and Key Control. Access Control Equipment  Hall mirrors  Closed-circuit televisions  Parking lot gates  Exit doors and.
Accommodation & Hospitality Services STAFF BRIEFING – No 17 Handling Suspicious Packages.
Security Management Providing a Secure Environment.
Site Security Policy Case 01/19/ : Information Assurance Policy Douglas Hines, Jr.
Indian Ridge Middle Safety and Emergency Plan
ACTIVE SHOOTER & EMERGENCY PREPAREDNESS & TRAINING Colorado history Jamie’s training Formed active shooter team Built training program ◦ Video ◦ What to.
Protecting Your Assets By Preventing Identity Theft 1.
What are the New Safety Mandates? Presented by Mark Schaudt.
Prepared by Jennie Yeung Summer School Safety Never leave school with anyone without a Parent Pass. May I see your Parent Pass? Although this did.
Warehousing and Storage Principles Session 12 – Security Day 6 / PM.
SGTM 6: Personal Security Awareness Slide 1 SGTM 6: Personal Security Awareness.
Protecting Your Assets By Preventing Identity Theft
ISMS Information Security Management System
Welcome to Crime Prevention Training.
Port of Stockton Access Policy
Registration Audit Escort & Managers Information
Energy Control Procedures (Lockout/Tagout)
TWIC Training & Maritime Security Awareness
Training for Employees
Real Estate Safety & Security Tips.
Energy Control Procedures (Lockout/Tagout)
Administrative Practices Outcome 1
Banks Logo Emergency Procedures.
See Something? Say Something!
HIPAA Basic Training for Privacy and Information Security
JFK Center Staff Development
Customs Trade Partnership Against Terrorism (C-TPAT) An Introduction
C-TPAT Awareness Training Program
Security of People, Property and Information
Provide reception services
Safety in the Workplace
Welcome Volunteers Urbana Elementary School.
Energy Control Procedures (Lockout/Tagout)
Lesson 2: Epic Security Considerations
DRILLS, EXERCISES, AND IMPORTANT INFORMATION March 8, 2018
Unit 101 Element 4 Maintain a Secure environment for customers, staff and visitors. Maintaining effective security should be the concern of everyone working.
Figure A Figure B 12/07/2006 Rev B
Kingsport City Schools
Lesson 2: Epic Security Considerations
Lesson 2: Epic Security Considerations
Energy Control Procedures (Lockout/Tagout)
Home Visitor Safety Deb Palmer.
FOOD DEFENSE TRAINING Brigiotta’s Farmland Produce & Garden Center, Inc.
Department of Public Safety
Port of Stockton Access Policy
Case Management Safety PROTOCOLS
Presentation transcript:

SECURITY TRAINING AND THREAT AWARENESS

Topics Suspicious Persons Suspicions Activities Suspicious Objects or Packages Employee Identification Visitor Controls Computer Security Document Security

Suspicious Person LOOK FOR….. Any person without an employee badge, visitor badge or uniform.

Suspicious Person Determine if the person is an employee or a visitor …and ACT Determine if the person is an employee or a visitor If an employee, remind them always to display their ID badge and uniform. If a visitor, escort them to the reception area or to the person with whom they are visiting. Report the incident to your immediate supervisor. In the event you identify an employee or visitor that is not wearing an identification badge or uniform: If its an employee, remind them to always display their ID badge and uniform or notify a supervisor regarding the situation If its a visitor, escort them to the reception area or to the person with whom they are visiting.

Suspicious Persons LOOK FOR….. Any person in unauthorized/restricted areas If you identify an individual in an area he/she is prohibited from entering,

Suspicious Persons AND ACT….. Get them out of the area If a visitor, escort them to the reception area. Report the incident to your immediate supervisor If its an employee, approach them and ask them if they need assistance or contact management If it’s a visitor, escort them to the reception area or security guard Report suspicious activity to your immediate supervisor.

Suspicious Person Look for …. Any person: wearing an overcoat on a 95 degree day, or any kind of inappropriate clothing waiting or loitering in an area or hallway asking for an unknown department, person or employee Look for suspicious persons which may include an individual wearing an overcoat on a 75 degree day, someone waiting in the hallway, someone asking for an employee that doesn’t work here.

Suspicious Person LOOK FOR…. Any person: who seems not to belong in the area going door to door, office to office entering a private office unescorted selling items who seems lost Look for anyone that you’ve never seen in the building, peeking in offices, entering an office unescorted, someone that seems to be lost.

Suspicious Persons LOOK FOR ….. Any person: Tampering with somebody’s desk, boxes, personal items, equipment, vehicles, cameras, lights… running, especially if carrying something hiding behind doors, fences, desks, … Cam 7 1:17:23AM 8/02/06

Suspicious Persons AND ACT……… Immediately report the incident to your immediate supervisor Immediately report suspicious activity to your immediate supervisor.

Suspicious Activity LOOK FOR … Objects obstructing access points Disconnected or obstructed cameras Broken locks or access control systems Unexplained clutter or debris Objects thrown from a vehicle, especially while traveling at a high speed.

Suspicious Activity ACT … Immediately report any suspicious activity to your supervisor.

Suspicious Objects or Packages LOOK FOR…. Unexplained objects or packages that look strange or do not belong to the area Strange markings on boxes (unknown code, color) or strange characteristics (weight, number, odd shape) Strange leaking substance (powder, liquid, etc…) Suspicious objects in the middle of an area (e.g., hallway, lobby, etc.)

Suspicious Objects or Packages

Suspicious Objects or Packages AND ACT……… Immediately report any suspicious packages or objects to your supervisor, security, local police, 911 and/or FBI.

Suspicious Objects or Packages Isolate and Look for indicators (shape,Color,smell) Don’t Open ,smell ,Lick or taste Treat it as suspect Report Immediately Handle with care

Your Responsibilities Employee Identification Your Responsibilities While on company property Your company identification badge must be properly displayed and worn at all times. Your company uniform (if applicable) must be worn at all times. Properly secure and protect your ID badge, uniform, keys and access control card, etc.

Visitor Controls Visitor Pre-meeting Requirements Inform your visitor of the company’s visitor policies including photo identification, check in with receptionist prior to their visit. Visitor Entrance Requirements Ensure that your visitor has logged in and has been issued a visitor badge

Visitor Controls Visitor Escort Requirements You must escort your visitors at ALL times Do not leave your visitor unattended Visitor Exit Requirements Ensure that your visitor has logged out and has returned the visitor badge to the guard or receptionist

Visitor Controls Receptionist only Responsibilities Visitor Entrance Check photo identification Issue visitor badge Notify hosting employee Document arrival on Visitor Log Security personnel, the receptionist or a designated employee must adequately control the issuance and collection of visitor badges. All visitors must be escorted and visibly display their visitor badge. Visitor Exit Use colors and shapes of you choosing. Document departure on Visitor Log Collect visitor badge

Computer Security Do not share access to your computer with strangers Log-off when you leave your computer Passwords should be changed every 60 to 90 days Do not share your password with anyone Do not write down your password.

Computer Security Selecting a Password Use hard-to-guess passwords Do not use the same password in more than one place A password should have a mix of letters, numbers and symbols I Love to be Secure iL2bs@ Always on time to work !AoT2wx My Password is Very Secure MyP1VS# Yo Quiero Taco Bell yqtb!10

Electronic Mail Restrictions Computer Security Electronic Mail Restrictions Do not use company e-mail for private business activities, amusement or entertainment. Do not send e-mail containing racist, sexist, threatening or other objectionable language. Do not join mailing lists. Do not open unknown or unexpected e-mail attachments.

Let’s review… Suspicious persons Suspicious activity Suspicious objects or packages Employee identification Visitor controls Computer security Document security Information technology security

Security is not out of reach if you practice it every day.

QUESTIONS?