Spring ITAC Quarterly 2015 Information Technology Advisory Committee.

Slides:



Advertisements
Similar presentations
Cyber Stalking Cyber Stalking Phishing Hacker 1. Never reveal your home address !!! This rule is especially important for women who are business professionals.
Advertisements

IT Advisory Committee North Seattle Community College April 8th, 2010.
1 Identity Theft and Phishing: What You Need to Know.
Protect Yourself Against Phishing. The good news: The number of US adult victims of identity fraud decreased from 9.3 million in 2005, to 8.4 million.
SECURITY AND SOCIAL ENGINEERING US Department of Commerce Office of Security Updated 09/26/11 Security is Everyone's Responsibility – See Something, Say.
Johnson Logistics Solutions Office of Systems and Information Technology.
1 Identity Theft: What You Need to Know. 2 Identity Theft Identity theft is a crime of stealing key pieces of someone’s identifying information, such.
Network Redesign and Palette 2.0. The Mission of GCIS* Provide all of our users optimal access to GCC’s technology resources. *(GCC Information Services:
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 14 Security Policies and Training.
Network Redesign and Palette 2.0. The Mission of GCIS* Provide all of our users optimal access to GCC’s technology resources. *(GCC Information Services:
Computer Assisted Communication. Terms Asynchronous Blog Bulletin Board – Discussion Board Chat Chat Room.
DRIVER TRAINING COMPUTER WORKSHOP October CYBERPHOBIA: The irrational fear of computers or technology.
Annual Safety & Security Briefing - 9/22/04 Teresa Downey – SLAC Computer Security Group & SCS Applications Group.
Viruses and Spyware. What is a Virus? A virus can be defined as a computer program that can reproduce by changing other programs to include a copy of.
Computer Basics. Computers & Peripherals Safety on the Web Security Software Firewall Antivirus Software Norton Antivirus McAffee Antivirus Security.
Information about the computer By Sophia and Christina C.
Information Technology Services Technical Support Services Summer 2009 Accomplishments Fall 2009 Current Projects.
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
Extranet Enhancements JTC Spring 2015 May 13, 2015.
1 Kids on the Web. Child’s play? September, 2008.
Information Security and YOU!. Information Assurance Outreach Information Security Online Security Remote Access with Demonstration The Cloud Social.
DECS Community IT DIVISION OF ENGINEERING COMPUTING SERVICES Michigan State University College of Engineering.
Information Services Overview An introduction to DePaul’s technology especially for new employees.
~Computer Virus~ The things you MUST know Brought to You By Sumanta Majumdar Dept. Of Electrical Engg. 2010,GNIT
Lauran Technology Introducing: “Enterprise Infrastructure” (Optimization from Screen to Screen)
How can IT help you today?. Agenda Why Do You Care? What Are The Risks? What Can You Do? Questions? How can IT help you today? 2.
ISTE 2014: Personalized Learning: A District Wide Approach Carrie Wozniak, Fraser Public Schools, Assistant Superintendent for Curriculum and Instruction.
Joel Rosenblatt Director, Computer and Network Security September 10, 2013.
Priya Ranjan Kumar Dept. Of Computer Science Engg. 2012, RIT.
Introduction to Systems Security (January 12, 2015) © Abdou Illia – Spring 2015.
Cyber Security and Staying Safe Online Mark D. Riley College of Health Sciences and Professions.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
IT&MS MAY 2015 ALL STAFF. WELCOME TO THE MIDDLE OF SPRING! Mid Quarter Check-in  Overview  Service Management  Spiceworks  Project Planning and Timelines.
WINS Monthly Meeting 5/7/2004 WINS Monthly Meeting 5/7/2004.
Protect Your Good Name Reduce your Risk of Identity Theft.
Cybersecurity Test Review Introduction to Digital Technology.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
President’s Day IT Update August 31, Data Access Model People Infrastructure Support.
Adware and Browser Hijacker – Symptoms and Preventions /killmalware /u/2/b/ /alexwaston14/viru s-removal/ /channel/UC90JNmv0 nAvomcLim5bUmnA.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Information Technology Nuts and Bolts Presented by Susana Ponte August 19, 2015.
Two account types on this campus: UWB Access AccountUW NetID Account & 1.Not everyone has one as it must be requested by your supervisor 2.You are.
◦ Services to Employees  Managed Desktop Computer  Phone, Network, Internet & Wireless Access  & Portal Services  Android and Apple Phone App.
Internet Safety.
Information Technology Services (ITS)
To access your you will need: address Password
Thoughts on our network
ComArtSci Technology Update
Cyber Security Awareness Workshop
DFD For Seed Management System
Protect Your Computer Against Harmful Attacks!
MEASURE I CITIZEN’S OVERSIGHT COMMITTEE MEETING
VCE Questions Dumps
IT Development Initiative: Status and Next Steps
الانترنت والبريد الإلكتروني
Introduction to Systems Security
If I’d only known then what I know now about phishing…
Module 7 Questions Prepared by Mr O Seguna next.
Technology New staff orientation Dennis Wainwright
Information Technology Services (ITS) Quick Start for New Hires
9 ways to avoid viruses and spyware
Data Flow Diagram For Seed Management System
Bethesda Cybersecurity Club
Networks and the Internet
School – wide Positive Behavior Interventions and Supports
Social Engineering Humans are often the weakest point in security
Spear Phishing Awareness
Division of Engineering Computing Services
Information Technology Services (ITS) Quick Start for New Hires
Presentation transcript:

Spring ITAC Quarterly 2015 Information Technology Advisory Committee

ITAC Agenda Today Introductions Sub Committees – Web Team Redesign – PIO Office Office 365 Updates EAD Rollout Updates Ricoh Rollout Updates IT Service Management Initiative SANS Securing the Human Video Software Classroom Requests for Summer / Fall

What is Patch Tuesdays? Every Tuesday Every Week Microsoft OS Updates Security Patches IT Process Updates Perform at Night NOTE: On Update Tuesday, when you turn-off your machine at the end of the day the updates will perform.

Introductions Sub Committees – Web Redesign – PIO Office

Vetting Step 1 WHO Verify The REAL Sender! Look at the address “From:” Can you VERIFY the Sender? Some “From:” Senders Info is Deceiving Step 2 WHAT Are they Asking you to do something? What is being Asked? You are never instructed to “Give Away” You are NEVER asked to “Give Away” something Step 3 WHY Why do you need to do this? Nothing is “URGENT!” in at work. Step 4 ASK Confused - ASK ITASK IT & DELETE

Project Updates Office 365 EAD Rollout Ricoh Rollout

Securing the Human Social Engineering Bad Actor is targeting you Shoulder Surfing Cold Calls Internet Research PII In Person Spear Phishing is targeting Sale s Reset your Password PII Leads to Social Engineering

Service Management Defining Division Needs that are Ongoing Determining the Roles IT Performs Documentation of Service Operational Level Agreement

Wi-Fi Performance Update SIEMENS Project Network Backbone SCCD District Wide Enterprise Active Directory - Updates