A note for you We have created this presentation for you, the outstanding employee who has IT security on the brain. We want to help you spread the word.

Slides:



Advertisements
Similar presentations
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Advertisements

How to protect yourself, your computer, and others on the internet
Mobile device security Practical advice on how to keep your mobile device and the data on it safe.
Smartphone and Mobile Device Security IT Communication Liaisons Meeting October 11, 2012 Theresa Semmens, CITSO.
Helping our customers keep their computers safe.  Using your pet’s, business, family, friend’s names  Using number or letter sequences (0123, abcd)
Don’t be bullied, or be a bully.
Keeping Your Child Safe on the Internet.  To understand what our children are doing online  To keep our children safe when they’re online  To teach.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Internet Online Safety How to have FUN and Stay in Control.
Part 2 of Evil Lurking in Websites Data Security at the University of Wisconsin Oshkosh.
Using internet and cell phones safely
9/20/07 STLSecurity is Everyone's Responsibility 1 FHDA Technology Security Awareness.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
IDENTITY THEFT ARE YOU SAFE?. HOW DOES THIS HAPPEN TO ME? Internet “Security “ When using a public computer, never access any vital accounts like banking.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 18, 20 & 25 March 2015.
Cryptography: Keeping Your Information Safe. Information Assurance/Information Systems –What do we do? Keep information Safe Keep computers Safe –What.
Network & Computer Security Training.  Prevents unauthorized access to our network and your computer  Helps keep unwanted viruses and malware from entering.
1 Enterprise Security Your Information Security and Privacy Responsibilities © 2008 Providence Health & Services This information may be replicated for.
Scams Stevie's Scam School videos
Notes to Teachers At the time we embedded the links in these lessons, they all worked. If they don’t, you can google the website, find the link, open it.
Security Liaisons Information Presentation. Introduction  What’s the big deal with computer security? Don’t we have an IT security department to take.
Threats to I.T Internet security By Cameron Mundy.
Internet Safety.
Copyright ©: SAMSUNG & Samsung Hope for Youth. All rights reserved Tutorials The internet: Social networks and communities Suitable for: Improver.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Internet Safety By Stephanie Jarrard. What is the Internet?  “Internet” is a shortened name for “Interconnected networks”  The internet is a global.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
IT Security for Users By Matthew Moody.
Staying Safe Online Keep your Information Secure.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
People use the internet more and more these days so it is very important that we make sure everyone is safe and knows what can happen and how to prevent.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS). SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.1 I can describe.
 Facebook  Twitter  MySpace  Windows LiveSpace.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
Copyright ©: SAMSUNG & Samsung Hope for Youth. All rights reserved Tutorials The internet: Staying safe online Suitable for: Beginner.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
COMPUTER SECURITY BEST PRACTICES. SECURE YOUR STUFF!  Physically secure your workstation by locking your screen when away  Secure any small, easy to.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Computer Security Hacking, Phishing, Passwords Kausalya S. And Sushil Mujumdar (CCCF) 04 - Aug - 15.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
Inappropriate Content Hackers Phishers Scammers Child Abusers Bullies.
IT tools to communicate By Suleman Kalam. Podcast What is Podcasts? A podcasts is a downloadable media file which can be downloaded into many electronic.
Cyber Security and Staying Safe Online Mark D. Riley College of Health Sciences and Professions.
Activity 3 Identifying the Risks. Questions What do you do online? What sort of sites do you visit? Have you ever had a bad experience online?
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Information Security Everyday Best Practices Lock your workstation when you walk away – Hit Ctrl + Alt + Delete Store your passwords securely and don’t.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
Designed By: Jennifer Gohn.  “Getting people to do things they wouldn’t ordinarily do for a stranger” –Kevin Mitnick  There are several different.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
STOP. THINK. CONNECT. Online Safety Quiz. Round 1: Safety and Security.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Computer Security Keeping you and your computer safe in the digital world.
JANELL LAYSER Training Manual. AWARENESS! Social Engineers are out there, and everyone should be prepared to deal with them! They can contact you by phone,
Internet Safety.
Internet Identity, Safety, & Security
How to use the internet safely and How to protect my personal data?
Information Security.
How to use the internet safely and How to protect my personal data?
Lesson 3 Safe Computing.
Staying Austin College
STOP. THINK. CONNECT. Online Safety Quiz.
Cybersecurity Awareness
Robert Leonard Information Security Manager Hamilton
Risk of the Internet At Home
Lesson 2: Epic Security Considerations
Lesson 2: Epic Security Considerations
Lesson 2: Epic Security Considerations
Presentation transcript:

A note for you We have created this presentation for you, the outstanding employee who has IT security on the brain. We want to help you spread the word about IT security, so we’re giving you our top 10 IT Security DOs and DON’Ts to help you in that effort. Take this content and tailor it to your business. Use it for new employee training, quarterly IT updates, or even general company meetings. It’s up to you. And we’d love to hear your feedback on how we can make this better. Visit Your SOPHOS

IT Security DOs and DON’Ts From your helpful IT Team

1. Don’t be tricked into giving away confidential information Don’t respond to s or phone calls requesting confidential company information Always keep in mind that bad guys are successful because they are convincing. Recent news stories out of Canada reported scammers were tricking people into giving away information with fake tech support calls claiming to help. fake tech support calls claiming to help Keep on guard and report any suspicious activity to IT. Video tip 1: Don’t get tricked

2. Don’t use an unprotected computer When you access sensitive information from a non-secure computer you put the information you’re viewing at risk. Malicious software exists that allows people to easily snoop on what you’re doing online when accessing unprotected sites. snoop on what you’re doing online If you’re unsure if the computer you’re using is safe, don’t use it to access corporate or sensitive data. Video tip 2: Stay secure Keep your personal computer safe with Sophos Virus Removal ToolSophos Virus Removal Tool or Sophos Anti-virus for Mac Home Edition

3. Don’t leave sensitive info lying around the office Don’t leave printouts containing private information on your desk. It’s easy for a visitor to glance at your desk and see sensitive documents. Keep your desk tidy and documents locked away or shredded when no longer needed. It makes the office look more organized, and reduces the risk of information leaks. Video tip 3: Put things away

4. Lock your computer and mobile phone when not in use Always lock your computer and mobile phone when you’re not using them. You work on important things, and we want to make sure they stay safe and secure. Locking these devices keeps both your personal information and the company’s data and contacts safe from prying eyes. Video tip 4: Lock it

5. Stay alert and report suspicious activity Sometimes suspicious activity isn’t as obvious as we think. A recent news story reported that a supermarket manager, who was randomly befriended by a mysterious woman on Facebook, ended up on a “date” with two men who overpowered him and robbed his store.befriended by a mysterious woman on Facebook Be cautious of people you don't know asking for things, especially online. Always report any suspicious activity to IT. If something goes wrong, the faster we know about it, the faster we can deal with it. Video tip 5: Stay alert

6. Password-protect sensitive files and devices Always password-protect sensitive files on your computer, USB flash drive, smartphone, laptop, etc. Losing a device can happen to anyone. But by protecting your device with strong passwords, you make it difficult for someone to break in and steal data. Video tip 6: Protect it

7. Always use hard-to-guess passwords Many people use obvious passwords like “password,” “cat,” or obvious character sequences on the qwerty keyboard like “asdfg.” Create complex passwords by including different letter cases, numbers, and even punctuation. Try to use different passwords for different websites and computers. So if one gets hacked, your other accounts aren’t compromised. Video tip 7: Use strong passwords

8. Be cautious of suspicious s and links Hackers try to steal lists from companies, which happened recently to Toshiba. Company addresses are valuable to attackers, allowing them to create fake s from "real people.“ happened recently to Toshiba Always delete suspicious s from people you don't know. And never click on the links. Opening these s or clicking on links in them can compromise your computer without you ever knowing it. Video tip 8: Think first

9. Don’t plug in personal devices without the OK from IT Don’t plug in personal devices such as USBs, MP3 players and smartphones without permission from IT. Even a brand new iPod or USB flash drive could be infected with a nasty virus.could be infected with a nasty virus These devices can be compromised with code waiting to launch as soon as you plug them into a computer. Talk to IT about your devices and let them make the call. Video tip 9: Don't plug it in Protect your personal Android device with Sophos Mobile Security Free Edition

10. Don’t install unauthorized programs on your work computer Malicious applications often pose as legitimate programs like games, tools or even antivirus software. They aim to fool you into infecting your computer or network. If you like an application and think it will be useful, contact us and we’ll look into it for you. Video tip 10: Don’t install it

Get more IT Security DOs and DON’Ts View the online handbook at Get quick tips to create strong passwordscreate strong passwords Connect with us: facebook.com/securitybysophos twitter.com/Sophos_News Sophos on Google+ linkedin.com/company/sophos