10 Essential Security Measures PA Turnpike Commission.

Slides:



Advertisements
Similar presentations
166/171/181 RAL /201/196 RAL /180/174 RAL /153/44 RAL /165/30 RAL /40/0 RAL /84/134 RAL 5005 METRO blue 251/204/46.
Advertisements

Darton College Information Systems Use Policies. Introduction Dartons Information Systems are critical resources. The Information Systems Use Policies.
1 of 2 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2006 Microsoft Corporation.
HIPAA Security.
Computer and Mobile Device Equipment Security Brief May 29, 2008 Presented by: Kevin G. Sutton, Chief, Information Technology Unit.
Helping our customers keep their computers safe.  Using your pet’s, business, family, friend’s names  Using number or letter sequences (0123, abcd)
Windows XP Tutorial Securing Windows. Introduction This presentation will guide you through basic security principles for Windows XP.
HIPAA Basic Training for Privacy & Information Security Vanderbilt University Medical Center VUMC HIPAA Website:
WORKFORCE CONFIDENTIALITY HIPAA Reminders. HIPAA 101 The Health Insurance Portability and Accountability Act (HIPAA) protects patient privacy. HIPAA is.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 25 & 27 November 2013.
Protecting Personal Information Guidance for Business.
1 Electronic Information Security – What Researchers Need to Know University of California Office of the President Office of Research May 2005.
Part 2 of Evil Lurking in Websites Data Security at the University of Wisconsin Oshkosh.
Guide to Massachusetts Data Privacy Laws & Steps you can take towards Compliance.
PHYSICAL SECURITY Attacker. Physical Security Not all attacks on your organization's data come across the network. Many companies focus on an “iron-clad”
9/20/07 STLSecurity is Everyone's Responsibility 1 FHDA Technology Security Awareness.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Information Security Awareness:
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 18, 20 & 25 March 2015.
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
1 Enterprise Security Your Information Security and Privacy Responsibilities © 2008 Providence Health & Services This information may be replicated for.
Social Engineering PA Turnpike Commission. “Social Engineering is the practice of obtaining confidential information by manipulation of legitimate users”
IT Security Essentials Ian Lazerwitz, Information Security Officer.
Security Awareness Training PA Turnpike Commission.
Internet Security PA Turnpike Commission. Internet Security Practices, rule #1: Be distrustful when using the Internet!
New Data Regulation Law 201 CMR TJX Video.
Protecting Sensitive Information PA Turnpike Commission.
 Review the security rule as it pertains to ›Physical Safeguards ♦ How to protect the ePHI in the work environment ♦ Implementation ideas for your office.
Information Governance Jym Bates Head of Information Assurance.
Program Objective Security Basics
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Security Awareness ITS SECURITY TRAINING. Why am I here ? Isn’t security an IT problem ?  Technology can address only a small fraction of security risks.
ESCCO Data Security Training David Dixon September 2014.
1.1 System Performance Security Module 1 Version 5.
IT Security Essentials Lesley A. Bidwell, IT Security Administrator.
Malicious Attack Corporate Awareness and Walk through Date 29 September 2011.
Cyber Security. Security – It’s About Layers There’s no one stop solution to protection Each layer you add, an additional tool will be needed to pierce.
©Holm Publications Security Awareness Presentation.
Constant Hall A Mediated Classroom Guide. In Constant Hall classrooms, media and computer equipment is stored in a Media Desk. You will also find this.
Privacy and Information Management ICT Guidelines.
Information Security Awareness Training. Why Information Security? Information is a valuable asset for all kinds of business More and more information.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
PHYSICAL ITSECURITY scope. 1.What is password security?. 2.Why can't I tell anyone my password? 3.What about writing my password down 4.Social engineering.
Dimeji Ogunshola 10b  There are many threats to your computer system. The computer threats can be mainly transferred through unknown s or accidental.
Introduction to Computer Security PA Turnpike Commission.
STARTFINISH DisposePrint & ScanShareStore Protect information and equipment ClassifyProtect.
® HHM Clean Desk Policy. 2 ® Clean Desk Policy : What Will You Learn Importance of Privacy and Security The kinds of information we protect Privacy Requirements.
Computer Use Guidelines Business Lab. Computers are Important Tools! Internet Research Learning Software Word Processing Multimedia Presentations.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Policies and Security for Internet Access
Information Security Everyday Best Practices Lock your workstation when you walk away – Hit Ctrl + Alt + Delete Store your passwords securely and don’t.
Computer Security & Backups LO: Understanding the need for computer security and typical ways to ensure that a system is secure. Learning Outcome : Define.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
ANNUAL HIPAA AND INFORMATION SECURITY EDUCATION. KEY TERMS  HIPAA - Health Insurance Portability and Accountability Act. The primary goal of the law.
OCTOBER IS CYBER SECURITY AWARENESS MONTH. October is Cyber Security Awareness Month  Our Cyber Security Awareness Campaign focuses on topics such as.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Computer Security Sample security policy Dr Alexei Vernitski.
Copyright © 2008 AusCERT 1 Practical Computer Security See the notes section throughout the slide presentation for additional information.
Common sense solutions to data privacy observed by each employee is the crucial first step toward data security Data Privacy/Data Security Contact IRT.
Information Technology Nuts and Bolts Presented by Susana Ponte August 19, 2015.
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
Information Technology Security Office of the Vice President for Information Technology New Employee Orientation II.
Properly Safeguarding Personally Identifiable Information (PII) Ticket Program Manager (TPM) Social Security’s Ticket to Work Program.
Staying Austin College
Things To Avoid: 1-Never your password to anyone.
Welcome to the SPH Information Security Learning Module
Lesson 2: Epic Security Considerations
Handling Information Securely
Presentation transcript:

10 Essential Security Measures PA Turnpike Commission

1. Physically secure your area, files, and equipment before leaving them unattended. Check doors, drawers, and windows. Lock up any sensitive materials before you leave your area. Never share your lock code, photo ID badge, keys, etc. Ensure that anyone who is visiting you signs in when they arrive, and signs out when they leave, and escort them at all times during their visit. Question people in your area whom you don’t recognize, or report them to the front desk. In restricted areas, don’t hold doors open for unknown people.

2. Secure laptop computers and other portable computing devices. Never leave the device unattended in public areas such as: Conference sites. Airports. Restaurants. Never leave a device in plain sight in a vehicle. At the end of the workday be sure to lock your device in a desk, cabinet, or office.

3. Anti-virus software Anti-virus software is installed and enabled on your computer. Do not attempt to disable this tool.

4. Don’t keep important data on portable devices unless you know how to properly protect it. When it is necessary to store sensitive information on portable devices or electronic media such as laptops, CDs, floppys, memory sticks, PDAs, phones, etc., it must be secured using an Information Security approved solution, typically encryption. Never store sensitive information on non-PTC media. And remember to dispose of electronic media, that contains sensitive information, in an appropriate manner. Typically, electronic media must be destroyed unless IT sanitized the media. Contact the IT Help Desk at ext for information. Also remember that paper media containing sensitive information must be shredded.

5. Do not install unknown or unsolicited programs on computers. Such as programs you find out about through . These can harbor computer viruses and malicious code, and even open a “back door” giving others access to your computer. Any usage of software obtained via the Internet must comply with Commission policy letter No. 8.5, Licensed Software Use.

6. Be sure that automatic login and guest accounts are disabled on your computer. This should not be an issue with PTC computing devices.

7. Shut down, lock, or log off of your computer before leaving it unattended. When you leave your seat, … And lock your computer. At the end of the workday, logoff and shutdown your computer.

8. Your computer should require a password to start up or unlock.

9. For additional security, set up your computer to “lock,” when it is inactive.

10. Always shut your computer down properly when you shut down; don’t just turn off the power button or the monitor.

The different modules of this tutorial will: Discuss the risks to your computer and the data it contains. Provide some guidelines for avoiding risks. Suggest some practical and easy solutions. Please review these modules at your convenience.