Data Security Concerns at Work and at Home STEVE MITZEL IT DIRECTOR ASHLAND SCHOOL DISTRICT #5 – ASHLAND OREGON

Slides:



Advertisements
Similar presentations
Cyber Stalking Cyber Stalking Phishing Hacker 1. Never reveal your home address !!! This rule is especially important for women who are business professionals.
Advertisements

Lecture Materials for the John Wiley & Sons book: Cyber Security: Managing Networks, Conducting Tests, and Investigating Intrusions October 12, 2014 DRAFT1.
Password Security An overview. We need your help The IT department uses the latest technology and techniques to maintain the highest level of security.
Internet Safety Gleneagles Computer Club February 16, 2015 by Deborah Benson.
The Technology Partner for Financial Institutions End User Best Practices Presented By:
SOCIAL ENGINEERING AND INFORMATION PROTECTION BEST PRACTICES.
Johnson Logistics Solutions Office of Systems and Information Technology.
Social media threats. Warning! May contain mild peril.
Kevin Mitnick Home Internet Security Course Today, Internet criminals are going after families. They try to guess your passwords and steal your credit.
James Sees Senior Network Administrator Management Analyst Cyber Protection Strategies White Hall Business Association - Cyber Security & Awareness Conference.
1 I ntegrated S ite S ecurity for G rids © Members of the ISSeG Collaboration, 2008 See: ISS e G Computer Security: Advice for computer.
IDENTITY THEFT ARE YOU SAFE?. HOW DOES THIS HAPPEN TO ME? Internet “Security “ When using a public computer, never access any vital accounts like banking.
Network & Computer Security Training.  Prevents unauthorized access to our network and your computer  Helps keep unwanted viruses and malware from entering.
Do you know how to keep yourself safe?
Information Assurance Outreach. Overview Survey Results Password Security Safety Internet Privacy Social Media Privacy and Safety Technology Demonstration.
Strong Passwords How to make your passwords work for you…. Linda A. LeBlanc IT Security Support IS&T.
STRONG PASSWORDS Common Sense Unit 2-Lesson 1 (Cross-Curricular Categories) Privacy and Security.
Discover the Internet together …safely!. Who am I? Emma Vard Working for Microsoft Ireland Microsoft has a key focus on privacy and internet safety Teaching.
Information Security Technological Security Implementation and Privacy Protection.
Safe computing and Malware Presentation done by Tylor Hardwick, Alex Gilsdorf, Code Forrester, Xander Winans.
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Federal Student Aid Identification username and password – this is how students and parents will sign the FAFSA application. The FSA ID process replaced.
PAGE 1 Company Proprietary and Confidential Internet Safety and Security Presented January 13, 2014.
The Technology Partner for Financial Institutions Employee Training Presented By:
Information Security and YOU!. Information Assurance Outreach Information Security Online Security Remote Access with Demonstration The Cloud Social.
ESCCO Data Security Training David Dixon September 2014.
1.1 System Performance Security Module 1 Version 5.
Staying Safe Online Keep your Information Secure.
You, Me & Technology. Overview Technology –Our relationship with technology Threats –What, Who, When, Where, Why & How Protection –What we can do to protect.
PRIVACY BOOTCAMP YpJU.
IT Security Essentials Lesley A. Bidwell, IT Security Administrator.
© Hodder Gibson 2012 Staying safe online. © Hodder Gibson 2012 Dangers on the Internet There are a number of dangers on the Internet such as: viruses.
Online Security By:. The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Computer Security By Rachel Gaines. Computers are used for work, play, and everything in between. So here’s how to keep it fun and protected.
MMTK Access control. Session overview Introduction to access control Passwords –Computers –Files –Online spaces and networks Firewalls.
Pitfalls and Mistakes. Agenda Who We Are Social Media Today Pitfalls and Mistakes –Policies –Poor Decisions Online Reputation Accepting Random People.
25/10/ Passwords are high value targets 2,000,000 passwords stolen from Facebook, Twitter and Google The Independent, 5 December 2013 Stolen Facebook.
How can IT help you today?. Agenda Why Do You Care? What Are The Risks? What Can You Do? Questions? How can IT help you today? 2.
Personal Online Safety Information Security Systems Community Outreach Program McKinley Middle School April 23, 2013.
Information Systems Security New Faculty Orientation Day Queen’s University August 2011 George Farah, GIAC/GSEC Gold, CRISC, CISA University Information.
 Introduction to Computing  Computer Programming  Terrorisom.
Internet Safety. Phishing, Trojans, Spyware, Trolls, and Flame Wars—oh my! If the idea of these threats lurking around online makes you nervous, then.
Suggestions for Parents Take the time to see what your kids are doing online and what their interests are. Let them teach you about the Internet. Surf.
Cyber Security and Staying Safe Online Mark D. Riley College of Health Sciences and Professions.
Put a Lock on It: Protecting your online privacy A project of Consumer Action |
Protecting Your Identity © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.
Internet Safety For Kids What is the Internet? A group of many, many computers all over the world that are all connected to each other.
How & Why 1 of 8 security. 2 of 8 security – Why? 1.Your address is your online identity If it is not secure you may get s (including.
Has your been hacked (or hijacked)? 1.What a Spam looks like 2.How to change your password to a stronger one.
PRIVACY BOOTCAMP Jack Vale - Social Media Experiement.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
OCTOBER IS CYBER SECURITY AWARENESS MONTH. October is Cyber Security Awareness Month  Our Cyber Security Awareness Campaign focuses on topics such as.
STOP. THINK. CONNECT. Online Safety Quiz. Round 1: Safety and Security.
Common sense solutions to data privacy observed by each employee is the crucial first step toward data security Data Privacy/Data Security Contact IRT.
The internet is a place of both useful and bad information. It has both good and bad side- and it’s all too easy for kids to stray into it. And no parents/guardian.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
SECURE DATA TRANSFER Melvin Freeman The Next Step Public Charter School.
PROTECTING YOUR DATA THREATS TO YOUR DATA SECURITY.
Cyber Security Lesson Quarter 1.
Passwords.
STOP. THINK. CONNECT. Online Safety Quiz.
Cybersecurity Awareness
Information Technology Services Education and Awareness Team
Dear Students,   The school holidays are just around the corner. When spending time online during the school holidays, you should be aware of good practices.
Information Security Awareness
1. Basics of Online Safety
Creating Passphrases Include Examples NOT REQUIRED
Information Technology Services Education and Awareness Team
Presentation transcript:

Data Security Concerns at Work and at Home STEVE MITZEL IT DIRECTOR ASHLAND SCHOOL DISTRICT #5 – ASHLAND OREGON

Understanding Privacy and Security Challenges in Today’s World. Mobile Technology Cloud Computing Bring Your Own Device (BYOD) Data Warehouses Constantly Connected

Potential Threats “Hacker’s” Malware SPAM and Phishing Targeted Attacks Social Engineering Patches (or the lack there of) Social Media, Mobile Vulnerabilities, and Cloud Vulnerabilities

Passwords The Don'ts Do not use the same passwords at work and home. Make them uniquely different. Do not share your password(s) with anyone, including your coworkers, administration, tech support. All passwords should be treated as sensitive and confidential. Do not reveal a password over the phone to anyone. Do not reveal a password in an . Do not talk about a passwords in front of others. Do not hint at the format of a password (e.g. “my dog’s name”) Do not reveal a password on a questionnaire or a security form Do not share a password with family members Do not reveal a password to co-workers while on vacation Are not words in any language Are not based on personal information, names of family, etc. Are never to be written down or stored physically or on-line. Do not keep your password on a sticky note underneath your keyboard

Passwords The Do’s – A strong password should: Contain both upper and lower case characters Have digits and punctuation characters as well as letters At least characters long and possibly a passphrase (Ohmy1stubbedmyt0e!) Changed with some frequency

Links to various resources: PBS: Frontline – HACKERS  Stay Safe Online - SANS Institute - Steve Mitzel : -