Steve Garner Ag Communications Services IT Manager.

Slides:



Advertisements
Similar presentations
Are you Safe at Work? A look into Safety at the Workplace and Internet Security Presented by Sheila Gee.
Advertisements

1 of 2 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2006 Microsoft Corporation.
Helping our customers keep their computers safe.  Using your pet’s, business, family, friend’s names  Using number or letter sequences (0123, abcd)
Internet Safety Gleneagles Computer Club February 16, 2015 by Deborah Benson.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 25 & 27 November 2013.
Network Login Username Login not case sensitive, but password is Password changes Keeps history of last 3 passwords Must be alpha-numeric & or use upper/lowercase.
For further information computersecurity.wlu.ca
Johnson Logistics Solutions Office of Systems and Information Technology.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
KEEPING YOUR SECURE DATA SECURE TRUECRPYT. WHAT IS TRUECRYPT Small program for encrypting files What is encrypting? Scrambling the data Password protecting.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 18, 20 & 25 March 2015.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
October is National Cyber Security Month OIT and IT providers are launching an awareness campaign to provide tips and resources to help you stay safe online.
IT Security Essentials Ian Lazerwitz, Information Security Officer.
Back Up and Recovery Sue Kayton February 2013.
10 Essential Security Measures PA Turnpike Commission.
STANFORD UNIVERSITY INFORMATION TECHNOLOGY SERVICES Windows Encryption File System (EFS) Tech Briefing July 18 th 2008
THE WHY AND HOW OF DATA SECURITY YOUR ROLE IN DATA STEWARDSHIP DEPARTMENT OF MEDICINE IT SERVICES.
1 Computer Security: Protect your PC and Protect Yourself.
THE WONDERFUL HISTORY OF COMPUTERS FROM THE BEGINNING HARDWARE, SOFTWARE,SAFTEY, AND COMPUTER ETHICS.
New Data Regulation Law 201 CMR TJX Video.
Password Management Programs By SIR Phil Goff, Branch 116 Area 2 Computers and Technology April 18,
Security Squad Keeping your Equipment and Information Safe Security Squad Keeping your Equipment and Information Safe Security Squad Video Series, Part.
Introduction to ITS SU. What we will cover ? Why it is important to you ? Netid account Printing SUmail Public Labs SURA/VPN AirOrangeX Getting.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Chapter 7 Working with Files.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
© 2006 Consumer Jungle Minimizing Online Risks. © 2006 Consumer Jungle 15 Steps to Minimizing Online Risks 1.Update your operating system 2.Use a firewall.
Your Trusted Partner In All Things IT. 20 Years of IT Experience University Automotive Food Service Banking Insurance Legal Medical Dental Software Development.
Security Awareness ITS SECURITY TRAINING. Why am I here ? Isn’t security an IT problem ?  Technology can address only a small fraction of security risks.
Course ILT Computers and society Unit objectives Identify the main uses of computers in daily life, and identify the benefits of using Describe.
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 2 This material was developed by Oregon Health & Science University,
ESCCO Data Security Training David Dixon September 2014.
Security Squad Keeping your Equipment and Information Safe Security Squad Keeping your Equipment and Information Safe Security Squad Video Series, Part.
 Physical protection and Simple measures  Passwords  Firewalls  Anti-Virus, Spyware and Malware  Web browsers   Patches  Wireless  Encryption.
SECURITY Research Data Management. Research Data Management Security Laptops go missing very regularly; Intel’s study in 2012 surveying 329 private and.
Online Security By:. The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access.
Computer Security By Joey Pawoll. Introduction to computer security Have you been wondering how to be safe online? Well look no further! This powerpoint.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
Jan 31, American Society of Nepalese Engineers 1 Some Useful Applications American Society of Nepalese Engineers Computer.
Types of Electronic Infection
What are the rules? Information technology is available to every student, faculty and staff member in support of the essential mission of the University.
“TK8 Safe” – Easy-to-use, secure password manager Download a free trial copy: Product Info Highlights TK8 Safe is a perfect password manager.
How can IT help you today?. Agenda Why Do You Care? What Are The Risks? What Can You Do? Questions? How can IT help you today? 2.
Incident Security & Confidentiality Integrity Availability.
Minding your business on the internet Kelly Trevino Regional Director October 6,2015.
Incident Security & Confidentiality Integrity Availability.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Cybersecurity Test Review Introduction to Digital Technology.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
OCTOBER IS CYBER SECURITY AWARENESS MONTH. October is Cyber Security Awareness Month  Our Cyber Security Awareness Campaign focuses on topics such as.
Running Windows Securely and Efficiently By Gary Esworthy.
Common sense solutions to data privacy observed by each employee is the crucial first step toward data security Data Privacy/Data Security Contact IRT.
The internet is a place of both useful and bad information. It has both good and bad side- and it’s all too easy for kids to stray into it. And no parents/guardian.
Phillip Schneider Information Services Librarian Gail Borden Public Library District Cybersecurity: Keeping Your Computers & Devices Safe.
Technological Awareness for Teens and Young Adults.
Protecting Against Cyber Attacks PLEASE TAKE A MINUTE TO LOOK AT THIS IMPORTANT MESSAGE. THIS IS HAPPENING HERE AND NOW! LET US SAVE YOU AND YOUR INFORMATION.
Computer Security  Computer Security:  Password Strength  Windows Screen Saver  Deleting browser cache  Deleting browser cookies  Securing MS Office.
Protecting PHI & PII 12/30/2017 6:45 AM
Ways to protect yourself against hackers
OWASP CONSUMER TOP TEN SAFE WEB HABITS
Digital $$ Quiz Test your knowledge.
Back Up and Recovery Sue Kayton October 2015.
King Saud University- College OF Applied Studies
Chapter 3: Protecting Your Data and Privacy
King Saud University- College OF Applied Studies
Presentation transcript:

Steve Garner Ag Communications Services IT Manager

Concentration on Securing ‘Sensitive Data’ Social security numbers Youth data Credit Card/Financial Info Home Addresses, DOB

Securing PII data Personal Professional Account List Account numbers Passwords User IDs Company name Financial Data Quicken files Taxes Cancelled checks Legal Documents Birth certificates Passports Credit Card photos Academic Records Grades Student Information Transcripts SSN/PUID Recommendation letters Academic challenge materials Research Data Names of children Survey results

Why are we doing this? LAWSUITS? Lost/stolen computing devices/data Hackers and Malware Must reduce the number of electronic files available Protect our clientele Assure them that PII is safe with CES

Acceptable Use Policy The UK Acceptable Use Policy contains official guidelines for the responsible use of information technology resources at the University. The Acceptable Use Policy describes your rights and responsibilities when using and accessing university resources. Acceptable Use Policy

Layered Defense Update Software Use Antivirus Software Use Strong Passwords Secure your Physical Environment and Encrypt Sensitive Data Keep Wireless Devices Secure Practice Online Safety Back Up Your Data

Update Software Operating Systems and Applications Auto Update Win XP and Win 7 Update software on mobile devices too Restart Computer ? YES!!!

Antivirus Software Keep Forefront up to date Microsoft Forefront can be downloaded at

Sensitive Data Locations? My Documents, Ctyfile, and other folders on hard drives/media, Access databases Folders Sent items Archives Deleted items/Trash Backups on portable media Flash drives Servers

What to do Delete unneeded files Empty recycle bin Print and store information then delete source file Consolidate needed files to minimize locations Encrypt and/or password protect sensitive files Don’t keep inactive old devices around Wipe old hard drives before reusing hardware or disposal

Password Guidelines Don’t always use the same password Don’t share your passwords Don’t it to anyone for any reason Use Strong Passwords At least 8 characters long Avoid dictionary words, phrases, quotes, etc. Mix of upper and lower case letters Use number and non-letter characters

File Protection Password protect/encrypt Office files that contain sensitive information Can encrypt any file/folder on computer Encrypt sensitive information that HAS to be stored

Encryption --The process of converting messages, information, or data into a form unreadable by anyone except the intended recipient. encryption—crypt—comes from the Greek word kryptos, meaning hidden or secret About 1900 BC An Egyptian scribe used non-standard hieroglyphs in an inscription. This is the first documented example of written cryptography. So nothing new about encryption!

Automatic Encryption BitLocker Windows 7 Secures entire drive in background TrueCrypt Free open-source disk encryption

What is True Crypt Free open-source disk encryption software for Windows, Mac OS X Main Features: Creates a virtual encrypted disk within a file. Encryption is automatic, real-time (on the fly) and transparent. Parallelization and pipelining allow data to be read and written as fast as if the drive was not encrypted. Hidden volume

Mobile device Security Password protect the login Encrypt sensitive data Automatic Encrypted flash drives are available Physically secure with lock Location Services: find myiPhone(iPad, etc.) also similar products for Android devices(Prey)

Public Wireless Airports Hotels Coffee Shops Bookstores Neighbors Access Point Use UK’s site licensed VPN Client Cisco VPN Client for Windows

Practice Online Safety  Only download what you trust, and even then be wary.  Limit what you download to your work computer  Don’t accept downloads from strangers What else are you getting with the “free” stuff? “Free” music and file sharing programs are wide open doors for hackers.

Backup Your Data It’s not a matter of IF, it’s a matter of when.

Non-technical Protections Lock your doors Hide your valuables Make your device hard to lose Attach to keychain Lanyard Whatever helps

Questions?