Information Security in Your Office

Slides:



Advertisements
Similar presentations
Darton College Information Systems Use Policies. Introduction Dartons Information Systems are critical resources. The Information Systems Use Policies.
Advertisements

Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.
Invasion of Smart Phones in Clinical Areas Chrissy Kyak Privacy Officer University of Maryland Upper Chesapeake Health.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 25 & 27 November 2013.
Part 2 of Evil Lurking in Websites Data Security at the University of Wisconsin Oshkosh.
Guide to Massachusetts Data Privacy Laws & Steps you can take towards Compliance.
9/20/07 STLSecurity is Everyone's Responsibility 1 FHDA Technology Security Awareness.
Information Security Awareness:
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
Locking the Backdoor: Computer Security and Medical Office Practice Dr. Maury Pinsk, FRCPC University of Alberta Division of Pediatric Nephrology.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 18, 20 & 25 March 2015.
Data Security Issues in IR Eileen Driscoll Institutional Planning and Research Cornell University
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Payment Card Industry (PCI) Data Security Standard
HIPAA What’s Said Here – Stays Here…. WHAT IS HIPAA  Health Insurance Portability and Accountability Act  Purpose is to protect clients (patients)
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
New Data Regulation Law 201 CMR TJX Video.
Information Security Information Technology and Computing Services Information Technology and Computing Services
Security The Kingsway School. Accidental Data Loss Data can be lost or damaged by: Hardware failure such as a failed disk drive Operator error e.g. accidental.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Data Stewardship May 13, 2010 Tom Barton R.L. Morgan Ron Kraemer.
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
ESCCO Data Security Training David Dixon September 2014.
Ames Laboratory Privacy and Personally Identifiable Information (PII) Training Welcome to the Ames Laboratory’s training on Personally Identifiable Information.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS). SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.1 I can describe.
Data Security: Steps to Improved Information Security September 22, 2015 Presented by: Alex Henderson General Counsel and Chief Administrative Officer.
TECHNOLOGY GUIDE THREE Protecting Your Information Assets.
Information Security Awareness Training. Why Information Security? Information is a valuable asset for all kinds of business More and more information.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
COMPUTER SECURITY BEST PRACTICES. SECURE YOUR STUFF!  Physically secure your workstation by locking your screen when away  Secure any small, easy to.
WE ARE DATA By Hazim Zaidani Do you really think that your personal data is protected ? Well… Think Again !!!
STARTFINISH DisposePrint & ScanShareStore Protect information and equipment ClassifyProtect.
Joel Rosenblatt Director, Computer and Network Security September 10, 2013.
Frontline Enterprise Security
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Information Security Everyday Best Practices Lock your workstation when you walk away – Hit Ctrl + Alt + Delete Store your passwords securely and don’t.
OCTOBER IS CYBER SECURITY AWARENESS MONTH. October is Cyber Security Awareness Month  Our Cyber Security Awareness Campaign focuses on topics such as.
Computer Security Sample security policy Dr Alexei Vernitski.
Common sense solutions to data privacy observed by each employee is the crucial first step toward data security Data Privacy/Data Security Contact IRT.
Staying Secure in an Insecure World NATE HOWE CHIEF INFORMATION SECURITY OFFICER Education – Partnership – Solutions.
Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Introduction to Networking Technologies Security on Peer-to-Peer Networks.
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
Properly Safeguarding Personally Identifiable Information (PII) Ticket Program Manager (TPM) Social Security’s Ticket to Work Program.
Methods of Securing Data in Windows Networks
Before the talk… Zix Mail is the approved encrypted platform, we will have training on this soon. Citrix Sharefile has been approved for use for.
TECHNOLOGY GUIDE THREE
Ways to protect yourself against hackers
I S P S loss Prevention.
OWASP CONSUMER TOP TEN SAFE WEB HABITS
Lecture 14: Business Information Systems - ICT Security
Home Computer Security
HIPAA Basic Training for Privacy and Information Security
Unit 4 IT Security.
Information Security Awareness 101
Content Management lifecycle
Information Security and Travel-related Security
Network Security Best Practices
Preparing for GDPR Sharing experiences of the process and using the British Canoeing Toolkit bit.ly/BCGDPRToolkit
Information Security Awareness
Dos and Don’ts.
Chapter 3: Protecting Your Data and Privacy
North Tech Student Computer Policies
How it affects policies and procedures
16. Account Monitoring and Control
Move this to online module slides 11-56
Introduction to the PACS Security
Why Cyber Security is important to SME? Useful Tips on how you protect and secure your business. By Ronald Soh from Win-Pro Consultancy Pte Ltd
Protecting Student Data
Presentation transcript:

Information Security in Your Office Bob Bulow Ohio University ohio.edu/registrar

Overview Introduction Being More Secure Partnering with IT What You Can Do Wrap Up

Self Assessment On a scale of 1 to 10, how good are you at being secure? Why did you rate yourself this way? What are some things you do (or don’t do) that influence your decision?

Ranking Security Practices Ranking Activity

https://security. googleblog https://security.googleblog.com/2015/07/new-research-comparing-how-security.html

Being More Secure Key * Things to do personally and professionally # Things to do without technology (i.e., behavioral things)

Partnering with IT Data Storage *Software patches applied File encryption Disk encryption Share files securely Automated backups *Software patches applied Password policies *Dual- or two-factor authentication Data security policies

Partnering with IT #Create a climate where staff think about data security #Training and awareness Lockout limit based on failed attempts *Wipe computers before recycling *VPNs *Desktop security management (i.e., admin access)

What You Can Do *#Create awareness #Policy for data retention and data disposal *Do not click on suspect links and attachments How to inspect a link Dangerous types of attachments *Do not send sensitive data via email (and delete it if someone sends it to you) *Lock your computer when you walk away *#Lock physical files

What You Can Do *#Have strong passwords & change if needed If you use the same password for multiple things If your account might have been hacked What is a strong password? *Use a password manager, e.g. LastPass, 1Password Limit who has access to data in system #Third party contracts have responsibility for data handling

What You Can Do #Collect data only if needed *#Provide data only if necessary *#Eliminate use of SSN Limit who can access SSN, Date of Birth Do not use (or limit) who can have student data on portable drives #Employee acknowledge responsibilities

What You Can Do *Back up files routinely (if it is not automated by IT) *Limit who has access to the files *Password-protect files *Personal device security (laptops, phones, tablets) *Wireless network security

What You Can Do *Virus/malware protection software and run regular scans *Avoid downloads *Use secure connections to Internet (https) #Keep office doors locked

What You Can Do #Privacy screen protectors Routinely review who has access to data #Clean desk club #Internal audit conduct a review

Wrap Up and Questions “…no one can hack my mind” Use tools where it makes sense Personal and professional are more intertwined than ever before Personal life (in regard to accounts, security, etc.) can impact professional life and vice versa Doing something is better than doing nothing Try at least one new thing from the suggestions

Resources EDUCAUSE – Higher Education Information Security Guide https://spaces.at.internet2.edu/display/2014infosecurityguide/Home EAB – Information Security https://www.eab.com/topics/information-technology/information-security Google Security Blog Post https://security.googleblog.com/2015/07/new-research-comparing-how-security.html Have I Been Pwned? https://haveibeenpwned.com/

Bob Bulow bulow@ohio.edu 740.593.2469 Associate Registrar for Technology and Communication bulow@ohio.edu 740.593.2469