DATA SECURITY AND YOU! W/ DAVE California Center for Population Research.

Slides:



Advertisements
Similar presentations
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Advertisements

Data Storage & Security Dr Alastair F. Brown Head of Computing MRC Human Genetics Unit MRC Institute of Genetics and Molecular Medicine The University.
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 25 & 27 November 2013.
SECURITY CHECK Protecting Your System and Yourself Source:
Information Systems Services Protecting Data – Keeping Safe Kevin Darley, IT Security Co-ordinator 8 th November 2012.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Information Security Jim Cusson, CISSP. Largest Breaches 110, NorthgateArinso, Verity Trustees 6, Aurora St. Luke's Medical.
Protecting Your Identity: What to Know, What to Do.
Critical Data Management Indiana University HR Summit April 24, 2014.
Safe Computing Dave Carter, CISSP Michigan State University College of Agriculture and Natural Resources.
Guide to Massachusetts Data Privacy Laws & Steps you can take towards Compliance.
UT Wing Civil Air Patrol. Objective Identify network and cyber vulnerabilities and mitigations Social Media/Metadata/Exfil data MITM Attacks Malware Social.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 18, 20 & 25 March 2015.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Data Security Issues in IR Eileen Driscoll Institutional Planning and Research Cornell University
October is National Cyber Security Month OIT and IT providers are launching an awareness campaign to provide tips and resources to help you stay safe online.
Created by Dragon Lee May Computer Virus What is computer virus? Computer virus refers to a program which damages computer systems and/or destroys.
STORING YOUR DATA ……………………………………………………………………………………………………………………………….…………………………….. ……………………………………………………………......…... RESEARCH DATA MANAGEMENT TEAM UK DATA.
Information Security Information Technology and Computing Services Information Technology and Computing Services
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
CS101 Lecture 14 Security. Network = Security Risks The majority of the bad things that can be done deliberately to you or your computer happen when you.
Safe computing and Malware Presentation done by Tylor Hardwick, Alex Gilsdorf, Code Forrester, Xander Winans.
Brett Miller, Medical School Chief IT Security Officer IRBMED Seminar Series April 28, 2015 Data Security.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Security Awareness ITS SECURITY TRAINING. Why am I here ? Isn’t security an IT problem ?  Technology can address only a small fraction of security risks.
IT Security for Users By Matthew Moody.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
2015 Risky Business Week Welcome to the 2015 Risky Business Week presentation regarding disaster recovery Risky Business Week.
© Cisco Systems, Inc. All rights reserved. Cisco Public ITE PC v4.1 Chapter 9 1 Chapter 9: Fundamental Security IT Essentials: PC Hardware and.
 Physical protection and Simple measures  Passwords  Firewalls  Anti-Virus, Spyware and Malware  Web browsers   Patches  Wireless  Encryption.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
1. Self Awareness You should only access your accounts and private informations from a safe location (only at home as necessary if at all possible) where.
Instructional Technology & Design Office or Digital Security Basics Presented by Mark Baldwin &
DIGITAL SECURITY PART 2 TOOLS. phising  Internet criminals can steal your personal and banking information without you ever noticing – they can do it.
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
Computer Security By Rachel Gaines. Computers are used for work, play, and everything in between. So here’s how to keep it fun and protected.
Computer Security! By Bailey Hoover. Opening: “Computer viruses are an urban legend.” -Peter Norton Actually: Virus: software reproduces itself; causes.
What is computer virus? Computer virus refers to a program which damages computer systems and/or destroys or erases data files.
WE ARE DATA By Hazim Zaidani Do you really think that your personal data is protected ? Well… Think Again !!!
How can IT help you today?. Agenda Why Do You Care? What Are The Risks? What Can You Do? Questions? How can IT help you today? 2.
Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.
Joel Rosenblatt Director, Computer and Network Security September 10, 2013.
Information Technology Acceptable Use Policy The acceptable use policy (AUP) is a document stipulating constraints and practices that a user must agree.
What is Spam? d min.
Computer Skills and Applications Computer Security.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
Onguardonline.gov By Austin Kellogg. Main ideas  Protect your personal information  Know who your dealing with  Use security software that updates.
Personal Security for Advanced Users Group 18 Andrew Trusty, Gaurav Mullick.
Federal Trade Commission's List of Top 10 Consumer Scams in 2013 By: Austin Warren
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Computer Security Sample security policy Dr Alexei Vernitski.
Common sense solutions to data privacy observed by each employee is the crucial first step toward data security Data Privacy/Data Security Contact IRT.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
Staying Secure in an Insecure World NATE HOWE CHIEF INFORMATION SECURITY OFFICER Education – Partnership – Solutions.
Phillip Schneider Information Services Librarian Gail Borden Public Library District Cybersecurity: Keeping Your Computers & Devices Safe.
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
Information Technology Security Office of the Vice President for Information Technology New Employee Orientation II.
Library IT - Security and Remote Access
Attention Identity theft Definition
Before the talk… Zix Mail is the approved encrypted platform, we will have training on this soon. Citrix Sharefile has been approved for use for.
Top Ten Cyber Security Hygiene Tips
Presentation transcript:

DATA SECURITY AND YOU! W/ DAVE California Center for Population Research

What is it? “Data security is the means of ensuring that data is kept safe from corruption and that access to it is suitably controlled.” -Wikipediadatacorruption “The term data means groups of information that represent the qualitative or quantitative attributes of a variable or set of variables.” -Wikipediavariable

By no fault of our own…  December 12 th, UCLA suffers from one of the largest data security breeches ever  In recent years security breaches have increased in frequency and scope: -CardSystems Solutions -Heartland Payment

Daily Risks  One common risk on the web - financial, medical, social, collaborative = the password.  Keyloggers, trojans, malware  Network risks: man-in-the-middle (example), unencrypted wirelessexample  Physical risks: natural disasters – earthquakes, equipment theft

Minimizing Risk  Current and Active backups of all data  Data Encryption  Physical security – thumb drives, laptops  Use your head – Phishing attempts – don’t open unsolicited mail, inappropriate sites, never asked for password  Often overlooked: Invest in a UPS

Best Practices…  Use c0mP13x passwords! And don’t share  Anti-virus software, enable firewalls  Keep OS and browsers up to date – allow updates to occur  Never use public terminals for anything “private”  Verify HTTPS (secure http) is being used when doing online banking, shopping etc.  Lock your desktop - easy as WindowsKey+L  Shred sensitive documents, smash hard drives, destroy media

Data Security Tools  encryption, secure erasure, creation of personal VPN, Antivirus, collaboration and file sharing  TrueCrypt for Encryption – BitLocker  Hamachi for personal VPN  Freeraser for secure erasing  Sophos, AVG or Panda Cloud  MalwareBytes for Malware Removal:

Back It Up!  Online backup services  Carbonite example  Mirroring local disk – external drive  Cobian Backup, Robocopy script, Built-in >robocopy C:\mydata D:\backup /MIR  Synchronization tools –  Dropbox (dropbox.com), Syncplicity (syncplicity.com)

In Conclusion…  Backups!  Passwords!  Stay Updated!  Try Security Tools!  Use Common Sense!