The Technology Partner for Financial Institutions End User Best Practices Presented By:

Slides:



Advertisements
Similar presentations
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Advertisements

Presented by: Blue Green Systems. Inspiration Why people buy/sell online  Convenience  Better Prices  Variety  Fewer Expenses  Comparison of Prices.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Password Security An overview. We need your help The IT department uses the latest technology and techniques to maintain the highest level of security.
Internet Safety Gleneagles Computer Club February 16, 2015 by Deborah Benson.
Data Security Concerns at Work and at Home STEVE MITZEL IT DIRECTOR ASHLAND SCHOOL DISTRICT #5 – ASHLAND OREGON
1 of 2 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2006 Microsoft Corporation.
James Sees Senior Network Administrator Management Analyst Cyber Protection Strategies White Hall Business Association - Cyber Security & Awareness Conference.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
How to avoid Viruses and Malware on your Computer Use a firewall Using a firewall is like locking the front door to your house—it helps keep intruders.
Starting up a Security Class for Students Created by: Beth Byrnes Larry James Zac Reimer For Information Services University of Nebraska-Lincoln.
1 I ntegrated S ite S ecurity for G rids © Members of the ISSeG Collaboration, 2008 See: ISS e G Computer Security: Advice for computer.
IDENTITY THEFT ARE YOU SAFE?. HOW DOES THIS HAPPEN TO ME? Internet “Security “ When using a public computer, never access any vital accounts like banking.
1 Computer Security: Protect your PC and Protect Yourself.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Protect Your Computer from Viruses and Other Threats! 1. Use antivirus software. 2. Run Windows updates. 3. Use a strong password. 4. Only install reputable.
Manjit kaur Manjit Kaur1. Why do we need to protect our computer from a virus? A reason why we need to protect our computer from a virus is because it.
P6 - CONFIGURE THE SOFTWARE. CONFIGURE SOFTWARE Most software can be configured to suit an individual user, for example by changing the appearance of.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
© 2006 Consumer Jungle Minimizing Online Risks. © 2006 Consumer Jungle 15 Steps to Minimizing Online Risks 1.Update your operating system 2.Use a firewall.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
The Technology Partner for Financial Institutions Employee Training Presented By:
Security Awareness ITS SECURITY TRAINING. Why am I here ? Isn’t security an IT problem ?  Technology can address only a small fraction of security risks.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Staying Safe Online Keep your Information Secure.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
Securing Your Home Computer Securing Your Home Computer Jay Ferron ADMT, CISM, CISSP, MCDBA, MCSE, MCT, NSA-IAM.
COMPREHENSIVE Windows Tutorial 5 Protecting Your Computer.
®® Microsoft Windows 7 Windows Tutorial 5 Protecting Your Computer.
Online Security By:. The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access.
Copyright ©: SAMSUNG & Samsung Hope for Youth. All rights reserved Tutorials The internet: Staying safe online Suitable for: Beginner.
SURFING THE WEB PRIVACY, SAFETY, AND RELIABLE SOURCES.
Manjit kaur Manjit Kaur1. Why do we need to protect our computer from a virus? A reason why we need to protect our computer from a virus is because it.
How can IT help you today?. Agenda Why Do You Care? What Are The Risks? What Can You Do? Questions? How can IT help you today? 2.
Computer Security By Sierra Monif. “Access to information and entertainment, credit and financial services, products from every corner of the world —
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
INTERNET SAFETY FOR KIDS
safety Bailey mullan. dangers ing has become on of the main sources for communicating. When using it is more likely for someone.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
What is Spam? d min.
Cyber Safety Jamie Salazar.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
Internet Safety Sam Farnsworth Utah PTA Technology Specialist
OCTOBER IS CYBER SECURITY AWARENESS MONTH. October is Cyber Security Awareness Month  Our Cyber Security Awareness Campaign focuses on topics such as.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Account & Google Message Center Guide August 2015 Prepared by: Angela Mars IT Education and Training.
Computer Security Sample security policy Dr Alexei Vernitski.
Copyright © 2008 AusCERT 1 Practical Computer Security See the notes section throughout the slide presentation for additional information.
1 Outline of this module By the end of this module you will be able to: Understand why computer security is important; Name the different threats to.
Phillip Schneider Information Services Librarian Gail Borden Public Library District Cybersecurity: Keeping Your Computers & Devices Safe.
Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Introduction to Networking Technologies Security on Peer-to-Peer Networks.
Protection of Data 31 Protection of Data 31. Protection of Data 31 Having looked at threats, we’ll now look at ways to protect data: Physical Barriers.
Outline of this module By the end of this module, you will be able to: Understand the benefits that internet banking provides; Name the different dangers.
Computer Security  Computer Security:  Password Strength  Windows Screen Saver  Deleting browser cache  Deleting browser cookies  Securing MS Office.
Internet Safety.
Three steps to prevent Malware infection
Lesson 3 Safe Computing.
Antivirus Support Phone Number + 1-(844) One Step IT Solutions December 6, 2017
Home Computer Security
Information Security Session November 11, 2004
Cybersecurity Awareness
Take Cyber Security “TO HEART”
Information Security Session October 23, 2006
9 ways to avoid viruses and spyware

Presentation transcript:

The Technology Partner for Financial Institutions End User Best Practices Presented By:

The Technology Partner for Financial Institutions Best Practices Layered security Keep software up-to-date Firewalls Internet browsing Passwords Social networks/social media

The Technology Partner for Financial Institutions Layered Security

The Technology Partner for Financial Institutions Keep Software Up-to-Date Windows Patch Management Internet Explorer  IE 6.0 example Antivirus/Anti-Malware

The Technology Partner for Financial Institutions Patch Management Windows updates are constantly released  Typically on Tuesdays  Critical and security updates should always be installed Unless business reason not to  Larger offices and companies should consider a patch management solution like WSUS or HFNetChk Smaller office might want to enable automatic updates by following the screenshots below

The Technology Partner for Financial Institutions Patch Management Open Internet Explorer and click Tools-Windows Update to update computer

The Technology Partner for Financial Institutions

Accept Any License Terms

The Technology Partner for Financial Institutions Restart machine when install finishes

The Technology Partner for Financial Institutions Patch Management Once machine is up-to-date, you should enable automatic update to keep it updated

The Technology Partner for Financial Institutions Reboot For patch management to be completely successful reboots are most likely required Have users turn their computer off or restart at least weekly  Green advantages to turning off nightly if this doesn’t interfere with business needs

The Technology Partner for Financial Institutions Malware Antivirus/Malware  Both can cause production downtime  Both can spread to other machines  Both can be used to gather information to gain access to nonpublic information creating financial loss or reputation issues

The Technology Partner for Financial Institutions Antivirus Options avast! – Price range: $40.00-$ AVG – Price range: $34.00-$ en/226284?cmpid=fs_hp_testa_ Kaspersky – Price range: $30.00-$ McAfee – Price range: $40.00-$ Microsoft Forefront - Symantec – Price range: $24.00-$ rity&pvid=endpt_prot_sbe_1 Trend Micro – Price range: $27.00-$

The Technology Partner for Financial Institutions Anti-Malware option Along with antivirus solutions consider a separate anti- malware solution. Even if your antivirus solution includes anti-malware you will often have better luck installing a separate program for malware. One of the best programs on the market today for malware is Malwarebytes. Malwarebytes – Price range: $25.00 onetime fee -

The Technology Partner for Financial Institutions Key to Antivirus and Anti- Malware Programs You must keep both programs updated Review update options in settings of each program Set to update at least daily Schedule to scan a machine at least weekly  Even if it contains an “active scan” option

The Technology Partner for Financial Institutions Firewalls Hardware firewall  Preferred Software firewall  Minimum level of security  Free

The Technology Partner for Financial Institutions Windows Firewall Windows Firewall included in Windows XP Service Pack 2 and later  Blocks unsolicited Internet traffic to your computer Still should consider a hardware firewall  Windows Firewall should be enabled unless you are using a hardware firewall If unsure, turn Windows firewall on Follow screenshots below for enabling Windows firewall

The Technology Partner for Financial Institutions Enable Windows Firewall

The Technology Partner for Financial Institutions

Best Practices Never respond to unsolicited s or instant messages requesting sensitive information Be wary of links or attachments in s  Even from people you know  Hover mouse over links to see if link name matches website address Be cautions of s with grammatical errors or misspellings especially if they contain threats, prizes, or request personal information

The Technology Partner for Financial Institutions Internet Browsing Best Practices Minimize personal web browsing on machines used for business or banking purposes (including online banking) Avoid clicking on links in pop-up windows Look for “https” in URL bar when entering sensitive information. A “closed” lock may appear in the URL bar also

The Technology Partner for Financial Institutions Passwords Passwords are key to security success  Weak or shared passwords open up vulnerabilities  Grant access to computers and programs Can not be shared, written down, sitting out

The Technology Partner for Financial Institutions Poor Passwords Contain less than 8 characters Word found in the dictionary Names of pets, family, friends, characters Birthdays or other personal dates Phone numbers Addresses Any of the above spelled backwards or preceded/followed by a digit

The Technology Partner for Financial Institutions Good Passwords Contain upper and lower case character Contain digits and punctuation characters Have no personal information (family/pets/etc.) Should change on regular basis (e.g. 60 days) Not be a word, slang, or jargon

The Technology Partner for Financial Institutions Other Considerations Do not use same password for personal and business applications When possible do not use the same password for multiple sites, applications, programs, etc. Do not share with secretary, family members, friends

The Technology Partner for Financial Institutions Password Don’ts Don't reveal a password over the phone to ANYONE Don't reveal a password in an message Don't reveal a password to the boss Don't talk about a password in front of others Don't hint at the format of a password (e.g. "my family name") Don't reveal a password on questionnaires or security forms Don't share a password with family members Don't reveal a password to co-workers while on vacation

The Technology Partner for Financial Institutions Passphrases Consider using passphrases  Good because contain several words with usually a high number of characters, upper/lower case and punctuation. Sample Passphrase  "TheTrafficOnThe101InTheMorningIsBad!"  “I’mAlwaysLateToWork!”

The Technology Partner for Financial Institutions Letter Substitution Another good option is letter substitution L=1 o=0Or O=() S=5Or S=$ E=3 i=!Or I=1 t=+

The Technology Partner for Financial Institutions Letter Substitution JohnySmith = J()hny$m!+h Combine a passphrase with letter substitution for a really strong password ILoveMyBoss becomes !10v3MyB()$$  Which do you think is harder to break?

The Technology Partner for Financial Institutions Password Safe Consider a password management program Find one that encrypts passwords and is trusted One free program is Password Safe 

The Technology Partner for Financial Institutions Social Media Be careful what information you share Check security settings under “Settings” or “Options” menus to limit access to personal information

The Technology Partner for Financial Institutions Other Resources active/infosecurity/index.html active/infosecurity/index.html

The Technology Partner for Financial Institutions Questions