Sensitive Data Accessibility Financial Management College of Education Michigan State University.

Slides:



Advertisements
Similar presentations
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Advertisements

Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
ANNUAL SECURITY AWARENESS TRAINING – 2011 UMW Information Technology Security Program Annual Security Awareness Training for UMW Faculty and Staff.
PC Security 101 Keeping your data safe. Security is a real concern Identity theft is a hot topic in the news. Data theft is a very real and serious issue.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
Springfield Technical Community College Security Awareness Training.
A dialogue with FMUG: Sensitive Data & Filemaker MIT Policy and Data Classifications ** DRAFT ** Guidelines Feedback and Discussion Tim McGovern 2 June.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 25 & 27 November 2013.
1 Electronic Information Security – What Researchers Need to Know University of California Office of the President Office of Research May 2005.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
For further information computersecurity.wlu.ca
PC Security 101 Keeping your data and your computer safe.
C USTOMER CREDIT CARD AND DEBIT CARD SECURITY (PCI – DSS COMPLIANCE) What is PCI – DSS Compliance and Who needs to do this?
NCS welcome all participants on behalf of Quick Heal Anti Virus and Fortinet Firewall solution.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
1 I ntegrated S ite S ecurity for G rids © Members of the ISSeG Collaboration, 2008 See: ISS e G Computer Security: Advice for computer.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 18, 20 & 25 March 2015.
Computer Hardware Software 1.Introduction 2.Internet research and security Basic online protection 3.Use PC safely and efficiently 4.Purchase decisions.
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
1 Enterprise Security Your Information Security and Privacy Responsibilities © 2008 Providence Health & Services This information may be replicated for.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Use computer and internet safely Dave Dai Computer security Malware Virus: a program that copies itself and infect a computer without permission.
IT Security Essentials Ian Lazerwitz, Information Security Officer.
Internet safety By Lydia Snowden.
P6 - CONFIGURE THE SOFTWARE. CONFIGURE SOFTWARE Most software can be configured to suit an individual user, for example by changing the appearance of.
Securing Information in the Higher Education Office.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
Program Objective Security Basics
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
IT Security Awareness: Information Security is Everyone’s Business A Guide to Information Technology Security at Northern Virginia Community College.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Security Awareness ITS SECURITY TRAINING. Why am I here ? Isn’t security an IT problem ?  Technology can address only a small fraction of security risks.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Sensitive Data Accessibility Financial Management College of Education Michigan State University.
Staying Safe Online Keep your Information Secure.
Web Browser Security Prepared By Mohammed EL-Batta Mohammed Soubih Supervised By Eng. Eman alajrami Explain Date 10. may University of Palestine.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
INFORMATION SECURITY WHAT IS IT? Information Security The protection of Information Systems against unauthorized access to or modification of information,
System Security Chapter no 16. Computer Security Computer security is concerned with taking care of hardware, Software and data The cost of creating data.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
What are the rules? Information technology is available to every student, faculty and staff member in support of the essential mission of the University.
FINANCIAL MANAGEMENT 29 AUG 05 OC CARUSO. OVERVIEW BUDGETS CREDIT CARDS IDENTITY THEFT IMPORTANT FINANCIAL TOPICS FOR NEW COLLEGE STUDENTS.
Safe Computing Practices. Why would anyone want to hack me? 1 Krebs, Brian - “The Scrap Value of a Hacked PC, Revisited”, 12 Oct 2012,
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
Small Business Security Keith Slagle April 24, 2007.
Minding your business on the internet Kelly Trevino Regional Director October 6,2015.
Internet Safety Internet Safety LPM
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Safe Computing Practices. Why would anyone want to hack me? 1 Krebs, Brian - “The Scrap Value of a Hacked PC, Revisited”, 12 Oct 2012,
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
CONTROLLING INFORMATION SYSTEMS
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Any criminal action perpetrated primarily through the use of a computer.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
OCTOBER IS CYBER SECURITY AWARENESS MONTH. October is Cyber Security Awareness Month  Our Cyber Security Awareness Campaign focuses on topics such as.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Personal Data Protection and Security Measures Kelvin Lai IT Services - Information Security Team 12 & 13 April 2016.
2015Computer Services – Information Security| Information Security Training Budget Officers.
Protecting Against Cyber Attacks PLEASE TAKE A MINUTE TO LOOK AT THIS IMPORTANT MESSAGE. THIS IS HAPPENING HERE AND NOW! LET US SAVE YOU AND YOUR INFORMATION.
Computer Security  Computer Security:  Password Strength  Windows Screen Saver  Deleting browser cache  Deleting browser cookies  Securing MS Office.
Managing Windows Security
Personal spaces.
Information Security Seminar
HOW DO I KEEP MY COMPUTER SAFE?
Presentation transcript:

Sensitive Data Accessibility Financial Management College of Education Michigan State University

Agenda for today Sensitive data management Basic computer security issues Financial management Physical Security Q: What are examples of security threats? Q: What does information security mean to you? Q: Why do we need to know this?Why do we need to know this?

Levels of sensitivity for data Public Sensitive Confidential Institutional data: all of the data held by MSU, in any form or medium, for normal business operations.

Public data Not protected and generally made publically available, without restriction or limitation Directories Library card catalogs Course catalogs Institutional policies

Sensitive data Protected by institutional policy, guidelines, or procedures – may be public/FOI-able (freedom of information) Salary data Detailed institutional accounting and budget data Personally restricted directory data

Confidential data 1. Institutional data that could be used for identity theft 2. Protected by law, contract, or University policy 3. Records of the university security measures SSN payment/credit card health records student records

Sensitive data management at MSU PCI DSS - Payment Card Industry Data Security Standard – Fine up to $500,000 MSU’s Managing Sensitive Data site at

Sensitive data management at MSU Use Institutional Data only for University purposes. Minimize the potential for their improper disclosure or misuse. Individually responsible for the security and integrity of Institutional

Where to look for confidential data Digital Laptop computers, Desktop computers Phones, thumb drives Network drives, web and file servers attachments, social networking sites Paper Sticky notes, notepads, paper files Receipts PAN forms and other official documents Travel documentation

“Do I absolutely need this data?” If not, get rid of it. As soon as you no longer need the data, delete it. Don’t leave sensitive data on computers or PDAs that can be stolen. Make sure the computer, where the data is stored, is protected against viruses, worms, etc. Be careful distributing the data via or paper forms.

Q: What should you do if an incident occurs on your computer? Q: what should you do if you find a thumb drive in the hall way?

College Policy College policy can be found from this website All college staff are required to attend sensitive data awareness seminar every three years. No one should keep SSN and credit card number on your computer and shared drive.

In practical terms, this means? No confidential data on college servers or computers There is no reason to store SSNs on a computer, so don’t. If you need to use SSNs at all, work with us to make sure they are handled with a minimum of risk. If you absolutely must have SSNs, credit card numbers, or any other sensitive data on paper, destroy paper sheets as soon as you don’t need the data anymore. If you need to keep the data, lock the papers up, then destroy them as soon as you can. Most important: Know the policy, be aware of how you can minimize exposure.

Q: what should you do when your salvage your PC?

Internet use security When you browse Internet  Set your browser security to medium/medium-high  Add safe sites to trusted sites  Block pop-up windows in your browser  Clear cookies and cache for browser periodically  Log out of secure apps when not in use  use screen saver to lock the screen  Do not write down passwords  Be aware when use Instant messenger, chatting VideoVideo: Spyware VideoVideo: Do not leave your computer unlocked

Strong password, but easy to remember Install anti virus program and update automatically Updates Windows system automatically Turn on Windows built-in firewall Set the Internet browser security medium-high Do not download free programs from internet Do not use flash drive as your main storage Salvage computer only after clean the hard drive Basic computer use protection

Phishing Phishing (use of messages that appear to be sent from a trusted source.) Phishing Spelling Mistakes Incorrect Graphics Personal Information The URL VideoVideo: hoax

File management Manage by folders Save on the server (\\edshare.educ.msu.edu) Name files properly (do not use space or #, $, ~, !) View files with different layout Stop using floppy disks; use thumb drive to transfer file management Organize by folders and sub-folders

Financial Management Oversight Segregation of duties: More than one person needed to complete a record transaction. Implement mitigating controls if staffing resources do not permit desired segregation of duties. Adequate oversight: at least take samples. Pay attention to high risk areas: cash and inventories. Take periodic inventory. Monthly reconciliation of P-card statement is required.

Physical Security Protect valuables (yours and others) Be aware of and report suspicious activity Good descriptions NOT heroics Keys Doors

Please remember to take the survey after you receive the with a link. Thanks.