Joel Garmon, Director, Information Security Mike Rollins, Security Architect Jeff Teague, Security Analyst, Senior 1

Slides:



Advertisements
Similar presentations
Financial Services Workshop Margaret Umphrey ECU Information Security Officer March 12, IT Security, East Carolina University.
Advertisements

ANNUAL SECURITY AWARENESS TRAINING – 2011 UMW Information Technology Security Program Annual Security Awareness Training for UMW Faculty and Staff.
HIPAA Security.
Computer and Mobile Device Equipment Security Brief May 29, 2008 Presented by: Kevin G. Sutton, Chief, Information Technology Unit.
Welcome to the SPH Information Security Learning Module.
Copyright © 2012, Big I Advantage®, Inc., and Swiss Re Corporate Solutions. All rights reserved. (Ed. 08/12 -1) E&O RISK MANAGEMENT: MEETING THE CHALLENGE.
Helping our customers keep their computers safe.  Using your pet’s, business, family, friend’s names  Using number or letter sequences (0123, abcd)
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 25 & 27 November 2013.
BE CYBER SAFE Office of Information Technology Information Security Department Security Awareness Top Security Issues.
For further information computersecurity.wlu.ca
C USTOMER CREDIT CARD AND DEBIT CARD SECURITY (PCI – DSS COMPLIANCE) What is PCI – DSS Compliance and Who needs to do this?
SAFEGUARDING DHS CLIENT DATA PART 2 SAFEGUARDING PHI AND HIPAA Safeguards must: Protect PHI from accidental or intentional unauthorized use/disclosure.
Guide to Massachusetts Data Privacy Laws & Steps you can take towards Compliance.
8 Mistakes That Expose You to Online Fraud to Online Fraud.
Security Awareness Lloyd Guyot – Steelcase Ed Jaros – Tenundra Inc. July 17, 2003.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Information Security Awareness:
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 18, 20 & 25 March 2015.
Data Security Issues in IR Eileen Driscoll Institutional Planning and Research Cornell University
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
1 Enterprise Security Your Information Security and Privacy Responsibilities © 2008 Providence Health & Services This information may be replicated for.
Tips and Techniques: How to Protect Yourself and Others Better Jeanne Smythe February 20, 2004.
IT Security Essentials Ian Lazerwitz, Information Security Officer.
Sensitive Data Accessibility Financial Management College of Education Michigan State University.
HIPAA What’s Said Here – Stays Here…. WHAT IS HIPAA  Health Insurance Portability and Accountability Act  Purpose is to protect clients (patients)
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
Protecting Sensitive Information PA Turnpike Commission.
Securing Information in the Higher Education Office.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
Security Awareness ITS SECURITY TRAINING. Why am I here ? Isn’t security an IT problem ?  Technology can address only a small fraction of security risks.
ESCCO Data Security Training David Dixon September 2014.
DHCH IT Orientation Introduction to DHCH Computer and Information Systems.
Sensitive Data Accessibility Financial Management College of Education Michigan State University.
1.1 System Performance Security Module 1 Version 5.
Malicious Attack Corporate Awareness and Walk through Date 29 September 2011.
Information Systems Services How to Protect Yourself On-Line – Keeping Safe At Home Neil Jowsey, IT Security Team 25 th September 2013.
Information Services Overview An introduction to DePaul’s technology especially for new employees.
University Health Care Computer Systems Fellows, Residents, & Interns.
INFORMATION SECURITY WHAT IS IT? Information Security The protection of Information Systems against unauthorized access to or modification of information,
What are the rules? Information technology is available to every student, faculty and staff member in support of the essential mission of the University.
SPH Information Security Update September 10, 2010.
Protecting Your Identity: Information Security Basics Presented by:Barbara D. Kissner SVP & CIO International Fidelity Insurance Company March 18, 2014.
Minding your business on the internet Kelly Trevino Regional Director October 6,2015.
Network Security & Accounting
tool kit. USER GUIDE Etiquette (Acceptable use policy) – a list of rules that we observe Use a suitable subject in the - this helps.
TRUENORTH TECHNOLOGY POLICIES OVERVIEW. This includes but is not limited to : – Games – Non-work related software – Streaming media applications – Mobile.
Cyber Safety Jamie Salazar.
Government Agency’s Name April Identity Theft is when someone steals your personal information and uses it as their own, usually for some financial.
Confidentiality, Integrity, Awareness What Does It Mean To You.
Information Security Everyday Best Practices Lock your workstation when you walk away – Hit Ctrl + Alt + Delete Store your passwords securely and don’t.
OCTOBER IS CYBER SECURITY AWARENESS MONTH. October is Cyber Security Awareness Month  Our Cyber Security Awareness Campaign focuses on topics such as.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Account & Google Message Center Guide August 2015 Prepared by: Angela Mars IT Education and Training.
Computer Security Sample security policy Dr Alexei Vernitski.
Common sense solutions to data privacy observed by each employee is the crucial first step toward data security Data Privacy/Data Security Contact IRT.
2015Computer Services – Information Security| Information Security Training Budget Officers.
BizSmart Lunch & Learn Webinar Information Security and Protecting your business With the increased risk of some sort of cyber- attack over the past few.
Technological Awareness for Teens and Young Adults.
Information Technology Nuts and Bolts Presented by Susana Ponte August 19, 2015.
Information Technology Security Office of the Vice President for Information Technology New Employee Orientation II.
Properly Safeguarding Personally Identifiable Information (PII) Ticket Program Manager (TPM) Social Security’s Ticket to Work Program.
Information Security Awareness Training
Staying Austin College
Robert Leonard Information Security Manager Hamilton
Welcome to the SPH Information Security Learning Module
Digital $$ Quiz Test your knowledge.
Security Hardening through Awareness August 2018
Premier Employee Program Version 4.0
Presentation transcript:

Joel Garmon, Director, Information Security Mike Rollins, Security Architect Jeff Teague, Security Analyst, Senior 1

Work together as a team to ensure protection of computer systems and data University-wide (using technology, policies and procedures). 2 Director of Information Security reports to Information Systems CIO and General Counsel in Legal Department.

At least 6 characters. At least 1 number. Do not reuse old passwords. Change password every 6 months. 3

The fraudulent practice of sending s purporting to be from legitimate companies in order to induce individuals to reveal personal information. NEVER SEND YOUR PASSWORD OR ANY PERSONAL INFORMATION THROUGH TO ANYONE. Wake Forest University will never ask you to provide personal information, such as your social security number or passwords, via message. 4

5

Forwarded message From: Wake Forest University Date: Tue, Apr 17, 2012 at 8:09 AM Subject: New Secure Message Regarding Your Wake Forest University New Important Security Message Alert! Log In in order to resolve the problem. Click to log in. 6

Do not use peer-to-peer sharing applications, such as BitTorrent. If you have questions about use of video or music, please contact ZSR Library for guidance. 7

WinZip can be used to encrypt attachments to s. Confirm recipient's address is correct. encryption password in separate . If unsure of confidentiality of data, be conservative and encrypt attachment files. 8

WFU IS department will encrypt staff laptops. Smart phones that receive WFU must be passcode protected. USB flash drives can be encrypted. Consult the following web site for examples of USB flash drives that support encryption. Consult IT support person in your area or any member of security team for questions. 9

Use the Virtual Private Network (VPN) software to connect to the WFU network. Consult the following web site for information: Ensure that your home computer is up to date regarding operating system patches, and antivirus patches. Ensure that data is secure appropriately on USB drive as the data is being transported home. 10

Physical Controls –  Use lock down cable connected to laptop or desktop.  Do not leave laptop visible in car.  Do not leave unattended laptop in meeting rooms, library tables or classrooms. Logical Controls –  Enable password protected screen savers.  Do not post passwords on desk, on wall, or anywhere visible to others.  Do not share passwords with others. 11

Social Security Number Credit Card Information Bank Information Student Records Drivers License Information 12

Any employee that works with NPI could potentially be aware of a breach. More importantly, employees aware of a breach must contact IS Security. Security breaches can affect many people. For example, Norte Dame had a breach of credit card data in 2006 as well as an employee record data breach in The affects were as follows: 24,000 employees affected by 2009 breach, personal information exposed on the Internet, and Notre Dame worked to minimize future threats. Notre Dame’s overall cost to mitigate 2006 PCI breach was a one time $4.6M fee and $630K recurring. WFU’s reputation would be majorly affected as well as having to pay financial penalties. 13

Bridge at ZSR Library Joel Garmon, Director, Information Security Mike Rollins, Security Architect Jeffrey Teague, Security Analyst, Senior 14

15