Cybersecurity at WAJ What is it? Are we at risk?.

Slides:



Advertisements
Similar presentations
For further information computersecurity.wlu.ca
Advertisements

9/20/07 STLSecurity is Everyone's Responsibility 1 FHDA Technology Security Awareness.
OneDrive for Business Introduction First Time Use First Time Use Access from Computer Access from Computer Access from Internet Access from Internet Access.
IDENTITY THEFT ARE YOU SAFE?. HOW DOES THIS HAPPEN TO ME? Internet “Security “ When using a public computer, never access any vital accounts like banking.
Information about the computer By Sophia and Christina C.
September 2007 General Security Basics Your Responsibilities for Safe Computing.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Manjit kaur Manjit Kaur1. Why do we need to protect our computer from a virus? A reason why we need to protect our computer from a virus is because it.
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported License.Creative Commons Attribution-NonCommercial-ShareAlike.
Internet Safety Portage Department of Public Safety.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Your Guide to Internet Safety Family Learning Service 2015 Family Learning Service Top Tips for Parents 1.Introduce children to the CEOPS button Clicking.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
Viruses Reality and Myth. Virus – True or False Computer viruses happen naturally. FALSE.
Desktop computer security policies Applies to ALL computers connecting to the PathStone network irrespective of device ownership.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Accessing Your “How To” Series – W&J Office of Communications.
Manjit kaur Manjit Kaur1. Why do we need to protect our computer from a virus? A reason why we need to protect our computer from a virus is because it.
Data Security Overview. Data Security Periphery –Firewalls –Web Filtering –Intrusion Detection & Prevention Internal –Virus Protection –Anti Spy-ware.
Small Business Security Keith Slagle April 24, 2007.
What is hacking? Hacking is the use of a computer and its files with out being allowed by the owner. Hacking is used to find out peoples passwords and.
What is Spam? d min.
Computer Ethics. Computer Virus  A Virus is a computer program written to alter the way a computer operates, without the permission or knowledge of the.
Computers and the Internet Chromebook Booklet 1. What is a Chromebook? A Chromebook is a computer.
Cyber Safety Jamie Salazar.
Don’t let them catch your computer!!!!!
Membership Competitions FIBA Organizer Information is stored offline, either on a desktop computer or on a Laptop. FIBA Organizer application installed.
Here are some virus safety rules By Corey. Update anti virus once a week so no new viruses can get in you’re devices like laptops, phones, usb stick and.
OIT and IT providers across campus are launching an awareness campaign to provide tips and resources to help you stay safe online and protect AU resources.
KASPERSKY INTERNET SECURITY multi-device  Average number of devices in households: 4.5  Consumer device diversity will continue to expand.
BY JENNA SAUDER SLIDE OVERVIEW This presentation will discuss the following This presentation will discuss the following : What a Virus is… How a Virus.
Computer safety By Elliot.
Library IT - Security and Remote Access
Chapter 3: SYSTEM SOFTWARE
What they are and how to protect against them
COMPUTER CRIMES Presented by THABO.
Internet Identity, Safety, & Security
TECHNOLOGY GUIDE THREE
Information Technology
Malware aka- malicious software By: Ken Fogel
How to build a good reputation online
Dangers of the internet
Cyber Security By: Pratik Gandhi.
Protecting Devices The Future Citizen.
Protecting Devices The Future Citizen.
Unit 4 IT Security.
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
A Trojan is a computer program that contains the malicious code and it misleads users and user's computer. It aims to designed to perform something is.
HOW TO MAKE YOUR GMAIL ACCOUNT SECURE…. At Google, we take account security very seriously. To protect your account, we strongly recommend following the.
CYB 110 Education Begins / Snaptutorial.com. CYB 110 All Assignments For more classes visit CYB 110 Week 1 Individual Protecting.
CYB 110 Education Begins / tutorialrank.com. CYB 110 All Assignments For more course tutorials visit CYB 110 Week 1 Individual Protecting.
Norton technical support Norton.com/Setup | Norton Setup and Install with Product Key Norton Antvirus Activation For protection against.
Information Technology Services Education and Awareness Team
Computer Viruses.
GSBS IT Resources and Security
CHAPTER 2: OPERATING SYSTEMS (Part 2) COMPUTER SKILLS.
الانترنت والبريد الإلكتروني
Level 2 Diploma Unit 11 IT Security
King Saud University- College OF Applied Studies
Top Ten Cyber Security Hygiene Tips
9 ways to avoid viruses and spyware
Unit 4 IT Security Kerris Davies.
Weakest Link in a Network?
Protecting Devices The Future Citizen.
What is Information Security?
King Saud University- College OF Applied Studies
Cybersecurity By Sri Kankanahalli.
Information Technology Services Education and Awareness Team
What devices use the internet?
INTERNET SECURITY.
Presentation transcript:

Cybersecurity at WAJ What is it? Are we at risk?

Devices 734 Total Devices 470 Mobile Devices 111 Chromebooks 177 iPads 84 Surface Tablets 22 Galaxy Tablets 76 Laptops______ 470 Mobile Devices 264 Desktops 734 Total Devices

Cybersecurity at WAJ Are we at risk? Yes What are we at risk of?

How are we protected at WAJ? Firewall

How are we protected at WAJ? Firewall Anti Virus software

How are we protected at WAJ? Firewall Anti Virus software Web Filter

How are we protected at WAJ? Firewall Anti Virus software Web Filter Backups Updates Users

Myth or Fact Open emails on your cell phone first since phones can’t get infected. MAC Books don’t get infections. A user must do something wrong for a computer to become infected. All Devices can get infections. Viruses won’t spread if the computer is turned off.

Tips for Safety Updates Use software to protect your device and data Strong passwords Don’t share passwords (especially email passwords) Backup Data Control Access to your device Use email and internet wisely. If it looks suspicious….