Keeping Our Data Secure

Slides:



Advertisements
Similar presentations
Point3r$. Password Introduction Passwords are a key part of any security system : –Work or Personal Strong passwords make your personal and work.
Advertisements

PC Security 101 Keeping your data safe. Security is a real concern Identity theft is a hot topic in the news. Data theft is a very real and serious issue.
Managing Online Activity And Social Media By: Katie P, Curt W, Katie M, and Shelbe W.
Passwords are the key to network and data security.
Meeting. How safe are you on computers at school? Year 2 Most think they are safe Year3 17 very safe 3 a little bit Year3 / 4 19 feel safe 1 feels unsafe.
P ASSWORD S ECURITY. I F SOMEONE HAS YOUR PASSWORD, EITHER FROM YOU GIVING IT OUT OR THEM FIGURING OUT, THEY COULD : 1.Send abusive or threatening .
© The University of Texas at El Paso THE UNIVERSITY OF TEXAS AT EL PASO POLICE DEPARTMENT.
Network & Computer Security Training.  Prevents unauthorized access to our network and your computer  Helps keep unwanted viruses and malware from entering.
Do you know how to keep yourself safe?
1.0 Computer Lab Regulations 1.1 Computer Lab Rules 1.2 User 1.3 Equipment 1.4 Data and User Security.
Strong Passwords How to make your passwords work for you…. Linda A. LeBlanc IT Security Support IS&T.
E safety. Ads It’s always best to not click on ads when you see them, and it’s always a good idea to ignore them, but if there are too many you can always.
Security Awareness Norfolk State University Policies.
Internet Safety By Stephanie Jarrard. What is the Internet?  “Internet” is a shortened name for “Interconnected networks”  The internet is a global.
About Facebook Facebook is a social networking service launched in February 2004, owned and operated by Facebook Inc. Facebook was founded by Mark Zuckerberg.
Keeping Information Safe Task 4. Basic security measures Passwords Change password on regular basis Do not use names or words easily linked to yourself.
Logging onto the Computer for the first time And Signing the Acceptable Use Policy (AUP) for Using the Internet.
IT Security Essentials Lesley A. Bidwell, IT Security Administrator.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Computer Security Preventing and Detecting Unauthorized Use of Your Computer.
©Holm Publications Security Awareness Presentation.
1 Safely Using Shared Computers Amanda Grady December 2013.
Adrian Ellison Assistant Director, IT Services Wednesday 23 November 2011.
Password Fundamentals. UMB-Dental School New Password Policy Passwords must be eight characters or longer. Password must contain characters from three.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
INFORMATION SECURITY WHAT IS IT? Information Security The protection of Information Systems against unauthorized access to or modification of information,
PHYSICAL ITSECURITY scope. 1.What is password security?. 2.Why can't I tell anyone my password? 3.What about writing my password down 4.Social engineering.
Security Training USAID Information Security.
What are the rules? Information technology is available to every student, faculty and staff member in support of the essential mission of the University.
MMTK Access control. Session overview Introduction to access control Passwords –Computers –Files –Online spaces and networks Firewalls.
KeePass Open Source Software James Hadvabne Open Source Software James Hadvabne.
Passwords Internet Safety for grades Introduction to Passwords Become part of our everyday life –Bank cards, , chat programs, on- line banking,
For brownies this PowerPoint will help you understand computer viruses and help stop them!!!!
Password Security. Overview What are passwords, why are they used? Different types of attacks Bad password practices to avoid Good password practices.
Internet Safety Mr. Richard Orr Technology Teacher Murphy Jr. High School.
On-line Safety and Student . I understand there are certain rules I need to follow when I am online.
Changing Your Password General Lesson 3. Objectives Following completion of this lesson you will be able to:. Define how often a password must be changed.
By, Jason Arthur HOW TO MAKE A SECURE PASSWORD. INTRO For some people it may be hard to make a safe and secure password, and some people think their password.
Joshua Fuller. - Passwords keep your information private - Never tell your password to ANYONE - Change your password regularly Basic Security.
Passwords Keep Your Information Secure. Online Lives need Good Locks “A password is like a toothbrush: Choose a good one and don’t share it.”
Digital Footprints Cyberbullying Passwords The Digital Community Staying Safe Online
CAN YOU GUESS THE PASSWORD You and your teacher are going to work through a program with 5 different passwords. And you need to try and guess them. You.
Common sense solutions to data privacy observed by each employee is the crucial first step toward data security Data Privacy/Data Security Contact IRT.
E-SAFETY BY THE DIGITAL LEADERS. SAFER INTERNET DAY 2016 H ello, welcome to our e- safety assembly to help you keep safe on the computer. We are going.
CREATING A STRONG PASSWORD. PASSWORD DON’TS Single dictionary words (skydiving) Less than 8 characters (rj1977) Personal words/dates (samantha, ,
In this tutorial, you will be shown security considerations that you should keep in mind while accessing or using any GW systems, including GWeb. Remember.
Welcome to Week 2 in the computer lab. Last week you learned step 1 of the morning routine. Today we will learn how to complete the entire routine!
PUBLIC COMPUTER SAFETY
Internet Safety.
2.4 Cyber-Safety.
Key words: Secure | Password | Character
How to use the internet safely and How to protect my personal data?
Password Protection: How Safe Are Your Passwords?
How to use the internet safely and How to protect my personal data?
Safe Internet Mechatronika Budapest.
Welcome to Week 3 in the computer lab
Netiquette and Online Safety
Staying Austin College
STOP. THINK. CONNECT. Online Safety Quiz.
Cybersecurity Awareness
SEAL. Relationships. Lesson 2.
Passwords.
2.4 Cyber-Safety.
Rules for Being Safe on the Internet for Kids
Lesson 2: Epic Security Considerations
1.8 Safe and happy online I am aware of how friendships are formed and that likes, dislikes, special qualities and needs can influence relationships.
Lesson 2: Epic Security Considerations
Protecting Your Password
Lesson 2: Epic Security Considerations
Uppingham Community College
Presentation transcript:

Keeping Our Data Secure You Are Our Main Line of Defense

Why Worry About Computer Security? Remember that your personal data is part of what needs to be protected. We are required by law to keep our data secure! Our data is highly valuable and a security breech has to be reported to law enforcement. We need your help!

What You Can Do To Secure Our Data Don't Leave Computers Unsecured Password Protection Using Secure Passwords Sharing Passwords Don't Give People Information Follow The College's Computer Use Policy

Do Not Leave Computers Unattended Security risk – Leaving Your Desk for Just A Minute Without Logging Out Unauthorized Access To The Network Could Have Just Occurred

Passwords! Should be more than seven characters long Mix letters and numerals Use upper-case and lower-case letters Do not create a password that contains a single word that is in the dictionary Use phrases BAD: Your Dog Name: Freckles Easily Guessed or Hacked GOOD: 1LuvCGCC@N1ght Easily remembered and it isn't true (I'm am not a night person) so no one would guess that. Also, this password would be hard to hack.

Sharing Passwords Don't Share Your Password With Anyone Even your co-workers Do not write it down. The first place that someone looks is under the keyboard and on notes around your desk. Be sure someone isn't watching when you type it. The IT Department will never ask you for your password.

Don't Give People Information Be suspicious! Don't tell other people about our network and how to access it. Be aware that the easiest way for people to get information about our network is to ask. Even a little bit of information from you can be put together with other pieces of information from other sources.

The College's Computer Use Policy Take the time to read the computer use policy. Computer Use Policy is Located on the College's Website You are responsible for knowing the rules and following them.

Thank You! Remember that our first line of defense is you when it comes to securing our data. Thank you for your help!