Security Liaisons Information Presentation. Introduction  What’s the big deal with computer security? Don’t we have an IT security department to take.

Slides:



Advertisements
Similar presentations
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Advertisements

Cyber Stalking Cyber Stalking Phishing Hacker 1. Never reveal your home address !!! This rule is especially important for women who are business professionals.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Internet Safety Gleneagles Computer Club February 16, 2015 by Deborah Benson.
The Internet.
Fraud, Scams and ID Theft …oh my! Deb Ramsay ESD 101 Chief Information Officer Technology Division.
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
What is identity theft, and how can you protect yourself from it?
Recommendations on the future of online GyroScope & Databse implementation.
James Sees Senior Network Administrator Management Analyst Cyber Protection Strategies White Hall Business Association - Cyber Security & Awareness Conference.
IDENTITY THEFT ARE YOU SAFE?. HOW DOES THIS HAPPEN TO ME? Internet “Security “ When using a public computer, never access any vital accounts like banking.
Personal Security on the Internet. Introduction What is InfoSec? Information Security (InfoSec) is: –Protection of information –Its critical elements.
Staying Safe, Having Fun, And Cruising The ‘Net Daniel Owens IT Security Professional.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
Scams Stevie's Scam School videos
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
How To Protect Your Privacy and Avoid Identity Theft Online.
Notes to Teachers At the time we embedded the links in these lessons, they all worked. If they don’t, you can google the website, find the link, open it.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Social Engineering Training. Why Social Engineering Training? The Department of Energy (DOE) authorized the Red Team to perform vulnerability assessments.
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
SACHIN DEDHIA Cyber Crime Investigator Cert. Ethical Hacker(USA)
Day 3 Cybersafety Presented by FJUHSD Teacher Librarian.
Have Fun, Be Safe Strategies for Internet and Social Media Safety.
Information Security and YOU!. Information Assurance Outreach Information Security Online Security Remote Access with Demonstration The Cloud Social.
Stay Safe & Secure Online. Outline Passwords Everyday Security Security Physical Security Protecting Personal Information.
Staying Safe Online Keep your Information Secure.
Scams & Schemes Common Sense Media.
IT security By Tilly Gerlack.
Malicious Attack Corporate Awareness and Walk through Date 29 September 2011.
 Facebook  Twitter  MySpace  Windows LiveSpace.
Online Security By:. The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Identity Theft Since 2005, there has been a dramatic increase in the occurrence of identity theft among students online.
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
Information Security Sharon Welna Information Security Officer.
CCT355H5 F Presentation: Phishing November Jennifer Li.
Malware and Phishing By: Sydney Langley. MALWARE- includes viruses and spyware to steal your personal information PHISHING- is an internet scam sending.
SCAMS & SCHEMES PROTECTING YOUR IDENTITY. SCAMS WHAT IS A SCAM? ATTEMPT TO TRICK SOMEONE, USUALLY WITH THE INTENTION OF STEALING MONEY OR PRIVATE INFORMATION.
A Matter of Your Personal Security Phishing. Beware of Phishing s Several employees received an that looked legitimate, as if it was being.
Inappropriate Content Hackers Phishers Scammers Child Abusers Bullies.
What is Spam? d min.
A Matter of Your Personal Security Phishing Revised 11/30/15.
Cyber Safety Jamie Salazar.
INTRODUCTION & QUESTIONS.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Safe Computing Practices. Outline Objective Safe Computing Defined Safe Computing Methods Summary List of References.
OCTOBER IS CYBER SECURITY AWARENESS MONTH. October is Cyber Security Awareness Month  Our Cyber Security Awareness Campaign focuses on topics such as.
Password Theft By: Markie Jones. Road Map Do’s Do Not’s What can someone do with it? How do they get it? Who’s most at risk? When & Where are consumers.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Safe Computing Practices. What is behind a cyber attack? 1.
The internet is a place of both useful and bad information. It has both good and bad side- and it’s all too easy for kids to stray into it. And no parents/guardian.
Computer Security Keeping you and your computer safe in the digital world.
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
Presented by: SBS CyberSecurity © SBS CyberSecurity, LLC
Introduction to Web Safety
Internet Identity, Safety, & Security
Information Security.
Lesson 3 Safe Computing.
Protect Your Computer Against Harmful Attacks!
Lesson 2- Protecting Yourself Online
Cybersecurity Awareness
IT Security awareness Training.
What is Phishing? Pronounced “Fishing”
Lesson 2- Protecting Yourself Online
Founded in 2002, Credit Abuse Resistance Education (CARE) educates high school and college students on the responsible use of credit and other fundamentals.
Presentation transcript:

Security Liaisons Information Presentation

Introduction  What’s the big deal with computer security? Don’t we have an IT security department to take care of this?  [Explain users’ role in IT Security]  [Who you are]

Facts  Major security breaches are the result of users:  Not protecting credentials  People responding to phishing  Responding to pop up “your computer is at risk” ads  Losing cell phones and laptops, with no password protection  Let’s break it down into some statistics:  About 63% of all major security breaches are caused by user error breaches-cause-businesses-most-concern/ breaches-cause-businesses-most-concern/  Worldwide about 23% of people will respond to spear-phishing attacks, with 70% of people responding to directed phishing attacks users-fall-for-spear-phishing/article/128480/ users-fall-for-spear-phishing/article/128480/

Facts (cont’d)  More statistics ( nts/2012dbir/) : nts/2012dbir/  96% of all data breaches were not highly difficult  97% were avoidable through simple or intermediate controls  69% incorporated malware  81% of incidents used a form of hacking (through phishing, drive-by downloads, etc)  79% of victims were targets of opportunity

Things You Can Do  Secure your computer  Use strong passwords  Watch for phishing  Use social networking cautiously  Do not store highly sensitive data  How?  Contact your Security Liaison for additional resources or contact the ITU Support Center for more information on how to protect yourself and your data!

Phishing

 What is phishing?  Phishing is a form of social engineering that uses e- mail or malicious websites to solicit personal information by posing as a trustworthy organization.  What does a phishing look like?  False Sense Of Urgency  Suspicious-Looking Links  Not personalized  Misspeld or Pooooorly Written  Sender not known

Phishing (cont’d)

 What can happen?  Phishing Attacks Lead to Identity Theft - When users respond with the requested information, attackers can use it to:  Empty your bank account  Open new credit cards  Gain employment  Give your name to the police during an arrest  Specific to Mason:  Your Mason UserID gives access to:  Patriotweb/Internet Native Banner  Student/Employee Personal information  Financial information  Mason Money  MyMason

Phishing (cont’d)  How to protect yourself:  Be cautious about opening attachments in e- mails  Be very cautious about downloading files  Be suspicious of unsolicited s asking for information  If an unknown individual claims to be from a legitimate organization, try to verify his or her identity directly with the company.  Pay attention to the URL of a website  Malicious websites may look identical to a legitimate site, but the URL may use a variation in spelling or a different domain (e.g.,.com vs..net).

Password Security

 Use a secure password  Length first, then complexity  At least 10 characters  Mixed alphanumeric, upper/lower and special characters  Try using a passphrase instead – makes it harder to crack!  Use a password safe to store your passwords  Never use chain-link passwords – i.e. never use the same password for all your accounts  Never link accounts

Securing Your Web Browser

 Web browser security:  Understand what risky behavior is  Beware of untrusted web sites  Don’t click the fake anti-virus button, instead end the process – do not just close your browser.  Beware of downloading plugins and add-ons  Secure your internet browser  Manage plugins  Disable Java**, JavaScript, and ActiveX  For more details, please visit Home-Network-Part2.pdf Home-Network-Part2.pdf

Social Networking

 What is social networking?  Social networking service is defined as an “online service, platform, or site that focuses on facilitating the building of social networks or social relations among people who, for example, share interests, activities, backgrounds, or real-life connections.” ( networking/)  Social Networking Sites (to name a few):  Facebook  Twitter  LinkedIn  MySpace  Google +  Pinterest

Social Networking (cont’d)  Privacy settings are key:  Why do we need them?  Won’t that make it harder for people to find us and friend us?  How do they work?  What do I need to do?

Social Networking (cont’d)  Tips for safely using social networking:  Be conscious of what you write. It’s the internet, nothing is ever truly private.  Avoid posting your plans, particular personal information, etc.  Do not state your location.  Make sure you have your privacy settings in place.  Be careful what you allow your friends to tag you in.  Don’t accept friend requests from people you don’t know.  Be careful when playing games and apps that ask for personal information. They can sell that to third-party vendors.  Make sure your passwords are strong and are not the same for every site.  Never use your Facebook or Twitter as logins for other sites.

Social Networking (cont’d)  Social Networking  Proof that nothing is private:  “We Know What You’re Doing” –  Takes revealing posts and makes them public, proving you’re not always as private as you would like to hope. Again, think before you type.  Failbook –  Embarrassing and funny Facebook statuses. If you’re not careful, you could end up on this site.  Again, THINK BEFORE YOU POST.

Things You Can Do

 Secure your computer  Use strong passwords  Watch for phishing – DO NOT respond  Use social networking cautiously  Do not store highly sensitive data

If you think there is a problem…  Contact the IT Support Center if there is a suspected problem, or if you know you have a problem.  ITU Support Center x

Important Contacts   IT Support Center  Sarah Morehouse, Communications Coordinator, IT Security and Project Management Office