1 3 2 4 PGCPS Security Awareness Summary. 1 3 2 4 L2-ME-2127501 Heading: SummaryPage GUID: L2-LO-89880Page Number: Gfx GUID: L2-ME-2127501 Body Text:

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Internet Safety and Cyber Bullying All info came from
Workplace Security for Employees
Hart District Acceptable Use Policy Acceptable Use Policy.
Digital Citizenship at West Dalhousie School 2010/12.
Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.
Information Security Is for Everyone By Jill Burrington-Brown, MS, RHIA.
Protecting children online  How can you protect your child online?  Are you aware of the dangers?  Do you know what you can put in place to protect.
BUSINESS B2 Ethics.
1 HIPAA Education CCAC Professional Development Training September 2006 CCAC Professional Development Training September 2006.
The Importance of Information Security for Parkers Office Products.
Guide to Massachusetts Data Privacy Laws & Steps you can take towards Compliance.
Copyright © 2014 Merck Sharp & Dohme Corp., a subsidiary of Merck & Co., Inc. All rights reserved. In practice, how do we recognize a potential Privacy.
9/20/07 STLSecurity is Everyone's Responsibility 1 FHDA Technology Security Awareness.
DHS SECURITY INCIDENT REPORTING AND RESPONSE SECURITY INCIDENT REPORTING AND RESPONSE DHS managers, employees, and other authorized information users.
1 Enterprise Security Your Information Security and Privacy Responsibilities © 2008 Providence Health & Services This information may be replicated for.
1 Pertemuan 17 Organisational Back Up Matakuliah:A0334/Pengendalian Lingkungan Online Tahun: 2005 Versi: 1/1.
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
Security Awareness Norfolk State University Policies.
Program Objective Security Basics
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
BUS1MIS Management Information Systems Semester 1, 2012 Week 7 Lecture 1.
G046 Lecture 05 Task E Briefing Notes Mr C Johnston ICT Teacher
EFFECT OF CORPORATE IT POLICIES ON OTHERWISE PRIVILEGED COMMUNICATIONS Prepared by Joel P. Hoxie of Snell & Wilmer November 2010 Presented by: Jon Barton.
April 14, A Watershed Date in HIPAA Privacy Compliance: Where Should You Be in HIPAA Security Compliance and How to Get There… John Parmigiani National.
INFORMATION SECURITY WHAT IS IT? Information Security The protection of Information Systems against unauthorized access to or modification of information,
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
The University of Georgia. /1002 Ensure that the University is appropriately managing risk to information assets and information services.
Our Acceptable Use Policy An Overview What is an Acceptable Use Policy (AUP)?
Acceptable Use Policy by Andrew Breen. What is an Acceptable Use Policy? According to Wikipedia: a set of rules applied by many transit networks which.
Lee County’s intent is to provide free and equal access to resources via the internet. All school rules for appropriate use of technology also apply.
Working with HIT Systems
Chapter 2 Securing Network Server and User Workstations.
Networked Systems Survivability CERT ® Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA © 2002 Carnegie.
What are ____ 1 ______? Rules of behavior that you should follow when using computers and the Internet for the rest of your life Plank Jr. High – Tech.
@ BCHS. The School Policy is your guide to ensuring you and your students are safe. It is your responsibility to make yourself aware and familiar with.
James Fox Shane Stuart Danny Deselle Matt Baldwin Acceptable Use Policies.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Woodland Hills School District Computer Network Acceptable Use Policy.
ITACS L.L.P. Policy And Procedures Group 1. Objective: To establish companywide policy with regards to personal device usage both on and off of the company.
© 2013 Toshiba Corporation B2B PC Training Mailer - Toshiba Device Access Control.
WHAT IS CYBER SECURITY? Governments, military, corporations, financial institutions, hospitals and other businesses collect, process and store a great.
OCTOBER IS CYBER SECURITY AWARENESS MONTH. October is Cyber Security Awareness Month  Our Cyber Security Awareness Campaign focuses on topics such as.
Information Technology Acceptable Use An Overview CSTMC All Staff Meeting February 10, 2014.
BTEC NAT Unit 15 - Organisational Systems Security ORGANISATIONAL SYSTEMS SECURITY Unit 15 Lecture 7 EMPLOYMENT CONTRACTS & CODES OF CONDUCT.
Effect of Corporate IT Policies on Otherwise Privileged Communication By: Jonathan T. Barton.
Appendix A: Designing an Acceptable Use Policy. Overview Analyzing Risks That Users Introduce Designing Security for Computer Use.
Properly Safeguarding Personally Identifiable Information (PII) Ticket Program Manager (TPM) Social Security’s Ticket to Work Program.
Information Technology Acceptable Use An Overview
Acceptable Use Policy (Draft)
e-Safety Awareness in Schools
East Carolina University
Information Security 101 Richard Davis, Rob Laltrello.
Technology: Legal and Ethical Issues
Unit 7 – Organisational Systems Security
CYB 110 Education Begins / Snaptutorial.com. CYB 110 All Assignments For more classes visit CYB 110 Week 1 Individual Protecting.
CYB 110 Education Begins / tutorialrank.com. CYB 110 All Assignments For more course tutorials visit CYB 110 Week 1 Individual Protecting.
CYB 110 Education for Service-- tutorialrank.com
Join In Be Secure Presentation
Health Insurance Portability and Accountability Act of 1996 (HIPAA)
ONE® Mail Training Presentation
Dos and Don’ts.
Information management and communication
Chapter 3: Protecting Your Data and Privacy
Cyber security Policy development and implementation
HIPAA SECURITY RULE Copyright © 2008, 2006, 2004 by Saunders an imprint of Elsevier Inc. All rights reserved.
Student User Agreement and Policy 2022
Guidelines for building security policies. Building a successful set of security policies will ensure that your business stands the best possible chance.
Presentation transcript:

PGCPS Security Awareness Summary

L2-ME Heading: SummaryPage GUID: L2-LO-89880Page Number: Gfx GUID: L2-ME Body Text: Your care and vigilance play an important role in safeguarding the security of WSSC's computer systems. When you protect your network account from unauthorized users, handle attachments with caution, maintain professional Internet behavior, you can feel confident that you are doing your part. Be sure to read and follow the WSSC policies and guidelines, and direct any questions to Your efforts help ensure the confidentiality, security, and availability of information system assets. Security Awareness Program > Module 1: Security Awareness > Summary Safeguard PGCPS Computer Systems Care and vigilance Do your part: Protect network account from unauthorized users Handle attachments with caution Maintain professional internet behavior Questions: Safeguard PGCPS Computer Systems

L2-ME Heading: Apply Your KnowledgePage GUID: L2-CO Page Number: Gfx GUID: L2-ME Body Text: You should now be able to: * Describe the types of security risks for the WSSC computer and information assets * Identify ways to protect your network account * List security issues related to sending and receiving and ways to handle them * Explain WSSC policies related to Internet usage and the reasons for the policies * Name four risks involved in installing software yourself on Commission computers * Describe methods for protecting the security and confidentiality of WSSC data Security Awareness Program > Module 1: Security Awareness > Summary > Apply Your Knowledge

Top Ten Most Common Security Mistakes… Passwords on Post-it Notes Leaving your computer on, unattended Opening attachments from strangers Poor password etiquette NOT securing Laptops

Top Ten Most Common Security Mistakes…(cont.) 6. Offering too much information to non-employees 7. Use of plug and play devices without protection 8. Not reporting security violations 9. Failure to install OS updates 10.Not knowing internal threats