PSAP Managers Meeting October 16th, :30 am – 12:00 pm

Slides:



Advertisements
Similar presentations
SmartCall™ SMS SmartCall SMS by HME Wireless is a great tool to manage your patient workflow through your facility. Using the SmartCall SMS system, staff.
Advertisements

ELOC Bank Table Top Exercise Executive Leadership of Cybersecurity Austin, TX December 3,
Victoria ISD Common Sense Media Grade 6: Scams and schemes
Scary s. Before We Get Started Please turn your cell phones to stun. Restrooms are down the hall and on the right We’ll take a 5 minute break around.
Creating an Amazon Simple Service Account. 1- Sign Up for an Amazon Account 2- Verify Sending Account or Domain 3- Send Test Message 4- Request.
How It Applies In A Virtual World. Phishing Definition: n. To request confidential information over the Internet under false pretenses in order to fraudulently.
What is identity theft, and how can you protect yourself from it?
Bsharah Presentation Threats to Information Security Protecting Your Personal Information from Phishing Scams.
Jason Rich CIS  The purpose of this project is to inform the audience about the act of phishing. Phishing is when fake websites are created.
Basics. 2 Class Outline Part 1 - Introduction –Explaining –Parts of an address –Types of services –Acquiring an account.
SmartCall™ Messenger Account Setup
October is National Cyber Security Month OIT and IT providers are launching an awareness campaign to provide tips and resources to help you stay safe online.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
Teach a man (person) to Phish Recognizing scams, spams and other personal security attacks July 17 th, 2013 High Tea at IT, Summer, 2013.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
Introduction to computer accounting
How It Applies In A Virtual World
Outlook Gini Courter and Annette Marquis TRIAD Consulting.
Logo Name of Company Search My Account, Contact, Log in HomeLiquorWineBeer Wine Copyright Google Map Location Advertisement WhiskeyBeerBrandy RumVodka.
Reliability & Desirability of Data
Scams & Schemes Common Sense Media.
Phishing, Spoofing, Spamming and Security How To Protect Yourself Additional Credits: Educause/SonicWall, Hendra Harianto Tuty, Microsoft Corporation,
1 ADP Algebra II End-Of-Course Online Field Test Test Administrator Training September, 2007.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Phishing Internet scams. Phishing phishing is an attempt to criminally and fraudulently acquire sensitive information, such as usernames, passwords and.
Phishing A practical case study. What is phishing? Phishing involves fraudulently acquiring sensitive information (e.g. passwords, credit card details.
SCAMS & SCHEMES PROTECTING YOUR IDENTITY. SCAMS WHAT IS A SCAM? ATTEMPT TO TRICK SOMEONE, USUALLY WITH THE INTENTION OF STEALING MONEY OR PRIVATE INFORMATION.
1 Executive Leadership of Cybersecurity Austin, TX December 3, 2014 ELOC Bank Table Top Exercise.
PHISHING PRESENTED BY: ARQAM PASHA. AGENDA What is Phishing? Phishing Statistics Phishing Techniques Recent Examples Damages Caused by Phishing How to.
Do you know who you’re dealing with? Social Engineering: Minimise the risk of becoming a victim.
© 2012 Boise State University1 SecureForms Erin Taylor Office of Information Technology.
Using the District Accounting System Part 2: Managing Accounts Receivable.
How to Navigate the Fort Lee Website And log into your Parent Account Created by Ms. Despotakis and Mrs. Serulle-Green.
…AT-THE-TABLE. Benefits For You:  Generates a new monthly revenue stream  Simple setup process for merchants  Contemporary and secure solution attracts.
Catching Phish. If I went fishing what would I be doing? On the Internet fishing (phishing) is similar! On the internet people might want to get your.
WELCOME TO GGC BOOKING Where you can book a library room Enter Site GGC ID Password.
Important Information Provided by Information Technology Center
Objectives Define phishing and identify various types of phishing scams Recognize common baiting tactics used in phishing scams Examine real phishing messages.
Phishing, identity theft, and more
how to prevent them from being successful
ISYM 540 Current Topics in Information System Management
Encrypting Confidential Student
Phishing, what you should know
Presented by: Brendan Walsh Manager, Security and Access Management
BP5 – encryption - Fun gym
Repair Management Script Auto Workshop management script Workshop Management System
Yahoo Toll-free | Unable to Login to Yahoo account U.S.A
IT Security awareness Training.
Call Now Yahoo Support Number Phone USA
Ask, seek, knock Welcome to summer camp
Scams and Schemes.
Personal IT Security Cyber Security – Basic Steps
To , or not to – that is the question
Phishing.
Tarrant County District PSAP Managers Meeting Thursday, June 25, :00 AM – 11:00AM Tarrant County District Office Training Room 2600 Airport.
Tarrant County District PSAP Managers Meeting Thursday, April 24, :00 AM – 11:00AM Tarrant County District Office Training Room 2600.
Feedback from people with learning disabilities
BP5 – encryption - Fun gym
If I’d only known then what I know now about phishing…
Tarrant County District Tarrant County District Office
Tarrant County District PSAP Managers Meeting Thursday, September 12, :00 AM – 11:30AM Tarrant County District Office Training Room 2600.
Tarrant County District Tarrant County District Office
Security Hardening through Awareness August 2018
Tarrant County District PSAP Managers Meeting Friday, September 1, :00PM – 3:00PM Tarrant County District Office Training Room 2600 Airport.
Maine Assessment & Accountability System
System Administration Homework 4 – Web Server
Training 101 : Accessing iBoomerang Tools
What is Phishing? Pronounced “Fishing”
Spear Phishing Awareness
Tarrant County District PSAP Managers Meeting Thursday, June 30, :00 AM – 11:00AM Tarrant County District Office Training Room 2600 Airport.
Presentation transcript:

PSAP Managers Meeting October 16th, 2018 9:30 am – 12:00 pm Tarrant County 9-1-1 District Office Training Room 2600 Airport Freeway Fort Worth, TX

AGENDA Welcome………………………………………………………………..………..……….……………...…Yvonne Krumm Drawing - 9-1-1 Gifts for On-Time Arrivals……...…….………………….….….……………………………….……Staff Introduction of New Staff Members – Erin Zuzik, Thomas Coomer, Aniel Austin………………..Yvonne Krumm CritiCall Testing Site………………………………………………………………………………………………...Erin Zuzik Trouble Tickets ………...….…………………………………………………………….……Kevin Kleck & Sarah Sellers Be Aware of Phishing Schemes……………………………………………………………………………Danny Willars Drawing………………………………………………………………………………………………….………….…….Staff RapidSOS…………………….…………………………………………………………………………..…..Karin Marquez Question and Answer / Open Discussion……………………………………………………….……Attendees/Staff Grand Prize Drawing……………….………………………………………………….……………………….…….…Staff

WELCOME

On-Time Arrival Drawing

New to Tarrant County 9-1-1 District Thomas Coomer IT Support Technician Aniel Austin Finance Manager Erin Zuzik Operations Support Specialist

CritiCall Testing Site Moved to 5041 Resource Dr, Fort Worth 8 Testing Seats Office with Admin Computer and Desk Access Card Required for Entry Schedule Testing Times through Erin Zuzik Google Maps Directs to the Wrong Building Jail Laundry is Next Door

CritiCall Location Entrance 5041 Resource Dr

Kevin Kleck – Director of Technical Services Sarah Sellers (Therrien) Trouble Tickets

Danny Willars – Security Analyst Be Aware of Phishing Schemes

Keep an Eye Out for these Clues of a Phishing Attack Messages creating a tremendous sense of urgency Look for typos or discrepancies in text or logos Read URLs from left to right, the last address is the true domain For Example: https://store.amazon-com.example.com/index.html This might look like it will take you to Amazon’s website, but it will take you to example.com Offers that seem too good to be true Requests for INVOICES or a PAYMENT RECEIPT Generic greetings such as “Dear Customer”

Keep an Eye Out for these Clues of a Phishing Attack Emails that are work related but are sent from a personal email address Such as: hotmail.com or gmail.com Websites that claim to be secure but do not use HTTPS Requests for sensitive data such as credit card numbers or account passwords The tone or wording of the message does not sound like the sender Sites that begin with an IP address instead of a domain name For Example: https://10.1.1.1/PayPal-Payment/index.html

Mid-Meeting Prize Drawing

Karin Marquez – RapidSOS

Question & Answer Any Questions???

Grand Prize Drawing