Protect against viruses, malware, misuse and theft Protect against data theft or loss, identity theft and fraud Avoid scams, savvy social networking and.

Slides:



Advertisements
Similar presentations
Keeping Your Child Safe on the Internet. Welcome We are first-generation Internet parents Our children are the first generation to be born and raised.
Advertisements

Surfing the net: Ways to protect yourself. Internet Safety Look into safeguarding programs or options your online service provider might offer. Look into.
Developed by Technology Services 1:1 Laptop Initiative
Helping our customers keep their computers safe.  Using your pet’s, business, family, friend’s names  Using number or letter sequences (0123, abcd)
Cybersafety Elimbah State School Cybersafety and cyberbullying: A guide for parents and caregivers, May 2012., Dept of Education, Training and Employment.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 25 & 27 November 2013.
INTERNET SAFETY.
Cyber bullying and internet safety Parents meeting: staying safe online.
C USTOMER CREDIT CARD AND DEBIT CARD SECURITY (PCI – DSS COMPLIANCE) What is PCI – DSS Compliance and Who needs to do this?
Part 2 of Evil Lurking in Websites Data Security at the University of Wisconsin Oshkosh.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 18, 20 & 25 March 2015.
Scams Stevie's Scam School videos
Security Liaisons Information Presentation. Introduction  What’s the big deal with computer security? Don’t we have an IT security department to take.
Protection against viruses, malware, misuse and theft
Information Security Decision- Making Tool What kind of data do I have and how do I protect it appropriately? Continue Information Security decision making.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
JMU GenCyber Boot Camp Summer, Cyberspace Risks and Defenses Facebook Snapchat P2P filesharing Apps Craigslist Scams JMU GenCyber Boot Camp© 2015.
Information Security and YOU!. Information Assurance Outreach Information Security Online Security Remote Access with Demonstration The Cloud Social.
ESCCO Data Security Training David Dixon September 2014.
Staying Safe Online Keep your Information Secure.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
IT security By Tilly Gerlack.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
Information Systems Services How to Protect Yourself On-Line – Keeping Safe At Home Neil Jowsey, IT Security Team 25 th September 2013.
This Presentation Evening is designed to inform you about any potential threats that your children could find themselves when online. At no point is it.
Online Security By:. The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access.
Staying Safe Online A Practical Guide for Middle School Students.
E-Safety E-safety relates to the education of using new technology responsibly and safely focusing on raising awareness of the core messages of safe content,
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
What are the rules? Information technology is available to every student, faculty and staff member in support of the essential mission of the University.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Lee County’s intent is to provide free and equal access to resources via the internet. All school rules for appropriate use of technology also apply.
Introduction to ICT Faculty of Medicine Elmy Thompson – ICT Site Manager, Hammersmith Campus.
Grants Management Training 200 Cyber Security There are two kinds of people in America today: Those who have experienced a cyber-attack and know it, and.
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
Cyber Safety Jamie Salazar.
INTRODUCTION & QUESTIONS.
Cybersecurity Test Review Introduction to Digital Technology.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
Internet Safety Sam Farnsworth Utah PTA Technology Specialist
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
STOP. THINK. CONNECT. Online Safety Quiz. Round 1: Safety and Security.
Common sense solutions to data privacy observed by each employee is the crucial first step toward data security Data Privacy/Data Security Contact IRT.
The internet is a place of both useful and bad information. It has both good and bad side- and it’s all too easy for kids to stray into it. And no parents/guardian.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Technological Awareness for Teens and Young Adults.
Computer Security Keeping you and your computer safe in the digital world.
Identity Theft SS.8.FL.6.7 Evaluate social networking sites and other online activity from the perspective of making individuals vulnerable to harm caused.
Avoiding Frauds and Scams Barbara Martin-Worley Director, Consumer Fraud Protection 18 th Judicial District Attorney’s Office Serving Arapahoe, Douglas,
PCS Technology for Students: Acceptable Use, Privacy, and Safety.
E-SAFETY (USING THE INTERNET AND MOBILES SENSIBLY AND SAFELY)
Internet Safety.
An Introduction to Phishing and Viruses
Personal spaces.
Information Security.
Staying Austin College
Lesson 2- Protecting Yourself Online
STOP. THINK. CONNECT. Online Safety Quiz.
Cybersecurity Awareness
Information Security Awareness 101
Cyberspace Risks and Defenses
Lesson 2: Epic Security Considerations
Cybersecurity Am I concerned?
CYBERSAFETY & Personal information
Internet Safety – Social Media
Lesson 2- Protecting Yourself Online
Handling Information Securely
Presentation transcript:

Protect against viruses, malware, misuse and theft Protect against data theft or loss, identity theft and fraud Avoid scams, savvy social networking and dealing with cyberbullies Follow College’s rules and regulations

Virus and malware protection Symantec Endpoint Protection and Malwarebytes is installed on all College machines. Students can install Symantec Endpoint Protection free of charge on personal computers and devices. Malwarebytes is also available. For more information and to download, visit ICT’s Software Shop. ICT home page > ShopShop Antivirus and anti-malware software is only as good as its last update. Be careful when opening attachments or clicking within s as these often contain malware. More about spotting scam s later… Visit the Be Secure website: Protecting against computer viruses and malwareProtecting against computer viruses and malware Protect computers and devices

Protect mobile devices Laptops, smartphones and tablets are mobile computers and so, are exposed to the same virus and malware risks as desktop computers. And, they’re an attractive target for thieves. If you don’t protect your devices, you could give criminals access to more than a fancy gadget or handset - they could get at and misuse your data and personal information. Don’t give criminals a chance. There are very basic steps you can take to protect your mobile, laptop and/or tablet: Use a pin/passcode to restrict access Only install phone apps from trusted app stores (e.g. Google Play, Windows Store & App Store) Store) Always keep your belongings safe. Lock screens when not in use and store securely. Don’t back up data to a mobile device Visit the Be Secure website: Protect mobile devicesProtect mobile devices Protect computers and devices

Passwords secure and long Every student must to change their password at least once a year. You’ll be notified by (sent by the IT Security Officer, it-security- when your password is due to expire.it-security- It’s easy to change your password, to find out how visit ICT’s website: Changing your password Changing your password To keep your password secure and strong: Do not share your password with anyone, not even a member of staff. ICT will never ask anyone to reveal a password and neither should any other Imperial College London staff member Make your password more than eight characters Use letters, numbers and symbols Always lock or log out of personal and College machines when not in use For more tips, visit the Be Secure website: Secure and strong passwordsSecure and strong passwords Protect information

Keeping data safe: Storage Removable media - the risks: Very easy to steal or lose Can pick up or contain viruses and malware that could wipe data stored on them and infect any machine they’re plugged in to. Consumer cloud storage (Dropbox, Google Drive) – the risks: Many do not encrypt (protect) data adequately so data could be accessed, shared or lost There have been a number of high profile cases of personal data infringements reported in the press, resulting from photos and info stored on cloud platforms. It’s best to use College’s backed-up central file storage and sharing options, your personal H Drive space or One Drive for Business (available with free 365 software). ICT website: Free software for students Store sensitive information securely Share sensitive information securely Protect information

Keeping data secure: Encryption To keep personal or sensitive data safe from unauthorised access or misuse, use a process called Encryption. Encrypting data is the best way to make information unreadable, meaning it can only be read using a digital key to unlock it, called decryption. You should encrypt all sensitive data before storing or sharing. It’s possible to encrypt documents, USB drives, laptops, mobile phones and s. Find out how at the Be Secure website: Encrypt sensitive informationEncrypt sensitive information Protect information

Avoid scams and malware If in doubt, do not click A simple rule is: do not open attachments or click on any links that you're not sure about. Use your cursor to hover over the link and check the address it will take you too. Be wary of following any link that takes you to a login screen. If in doubt, don’t click. Check the carefully Copy-cat s, made to look like those from banks or even Imperial College, are getting increasingly sophisticated. Does the look genuine? Are there inconsistencies or mistakes? Is there a named sender you recognise? If in doubt, don’t click. As a general rule, no reputable organisation should ever ask you to share personal information by . ICT will never ask anyone to reveal private information by and neither should any other College member Report anything suspicious If it looks suspicious, even if you know the source, do not open or click on any links. Report it to the ICT Security team via the ICT Service Desk.ICT Service Desk Protect information

Social networking Many people leave themselves open to malicious attacks, reputational damage or personal embarrassment because they do not understand the risks of sharing information online. Make sure you know exactly what you are sharing and who you are sharing it with. Take time to understand and set up security settings. Most social networks allow you to control who sees what. Read an overview of Facebook's security settings by Sophos.overview of Facebook's security settings Do not upload images or text to social media that you would not be happy for the world to see. Be aware that networks like Facebook, Twitter, Tumblr and Instagram are public spaces. Future employers often check social media sites – what you post will reflect their assessment of you Always logout after use and keep your passwords secret. If you do not, your account could be hacked. Protect yourself online

Cyberbullying Being threatened or abused online or anywhere else is never acceptable. If you become a victim of bullying or harassment there are many routes for support. Report it to the ICT Security team If you are experiencing problems or have a sensitive query relating to IT security, contact the ICT Security team directly who are happy to help you put a stop to it. In person - Level 4, Sherfield Building, South Kensington Campus. - Telephone - +44(0) ICU Advice Centre The Imperial College Union Advice Centre offers advice and support on a wide range of issues.Imperial College Union Advice Centre College tutors Every department has a system of academic and pastoral care in place to make sure that you always have someone to whom you can turn. There is also a network of tutors to provide confidential support to all students, independent of your academic department.network of tutors Student counselling The Student Counselling Service offers short-term counselling to all registered students.Student Counselling Service Protect yourself online

Conditions of IT Use You must make sure that you adhere to with the Conditions of Use of IT Facilities, including the following:Conditions of Use of IT Facilities Do not access or transmit pornographic or indecent material. Do not attempt to access computer systems or applications that you are not authorised to use (known as hacking) or attempt to use other people's accounts. Respect the copyright of others and do not infringe this through the illegal downloading or use of software, music, video etc. Do not send s or participate in forums etc. that harass or defame others. Do not make commitments on behalf of the College that you are not authorised to make. Be careful not to misrepresent the College on blog, wikis etc. Use social networking sites with care. They are no different from any other form of publication and you could be legally accountable for any content. Read the full IT use policy here: Information Systems Security.Information Systems Security IMPORTANT - Failure to comply with College rules can result in loss of access to services and systems and disciplinary action. College Policies

Information Security Behaviours

Contact: ICT Service Desk Online: ASK ICTASK ICT By phone: +44 (0) or Via In person: 4th Floor, Sherfield Building, South Kensington Campus It’s everyone’s responsibility to be secure. Visit If you have IT security questions or concerns, contact the ICT Security team via the ICT Service Desk. ICT Service Desk