IT Security Awareness: Information Security is Everyone’s Business A Guide to Information Technology Security at Northern Virginia Community College.

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
ANNUAL SECURITY AWARENESS TRAINING – 2011 UMW Information Technology Security Program Annual Security Awareness Training for UMW Faculty and Staff.
Cyber Stalking Cyber Stalking Phishing Hacker 1. Never reveal your home address !!! This rule is especially important for women who are business professionals.
Welcome to the SPH Information Security Learning Module.
Internet Safety Gleneagles Computer Club February 16, 2015 by Deborah Benson.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 25 & 27 November 2013.
Protecting Personal Information Guidance for Business.
1 Electronic Information Security – What Researchers Need to Know University of California Office of the President Office of Research May 2005.
Fraud, Scams and ID Theft …oh my! Deb Ramsay ESD 101 Chief Information Officer Technology Division.
Protect Yourself Against Phishing. The good news: The number of US adult victims of identity fraud decreased from 9.3 million in 2005, to 8.4 million.
Perimeter Church Perimeter Network Introduction 2005.
Good Computer Security Practices Basic Security Awareness September 10, 2007 School of Nursing Office of Academic and Administrative Information Systems.
9/20/07 STLSecurity is Everyone's Responsibility 1 FHDA Technology Security Awareness.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Information Security Awareness:
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 18, 20 & 25 March 2015.
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
1 Enterprise Security Your Information Security and Privacy Responsibilities © 2008 Providence Health & Services This information may be replicated for.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
IT Security Essentials Ian Lazerwitz, Information Security Officer.
Sensitive Data Accessibility Financial Management College of Education Michigan State University.
10 Essential Security Measures PA Turnpike Commission.
New Data Regulation Law 201 CMR TJX Video.
Internet safety By Lydia Snowden.
Securing Information in the Higher Education Office.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Security Awareness ITS SECURITY TRAINING. Why am I here ? Isn’t security an IT problem ?  Technology can address only a small fraction of security risks.
1.1 System Performance Security Module 1 Version 5.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
IT security By Tilly Gerlack.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
IT Security Essentials Lesley A. Bidwell, IT Security Administrator.
Adam Soph, Alexandra Smith, Landon Peterson. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
1. Self Awareness You should only access your accounts and private informations from a safe location (only at home as necessary if at all possible) where.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
©Holm Publications Security Awareness Presentation.
2010 Test Security 2011 Campus Test Coordinator Training Test Security January 26, 2011 Freeport Intermediate school.
Safeguarding Your Privacy Section 1.3. Safeguarding Your Privacy 1. What is Identity Theft? 2. Research a story on identity theft and be prepared to report.
University Health Care Computer Systems Fellows, Residents, & Interns.
Information Security Awareness Training. Why Information Security? Information is a valuable asset for all kinds of business More and more information.
INFORMATION SECURITY WHAT IS IT? Information Security The protection of Information Systems against unauthorized access to or modification of information,
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
What are the rules? Information technology is available to every student, faculty and staff member in support of the essential mission of the University.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
By Liam Wright Manga comic group Japan SAFETY on your computer.
Internet safety By Suman Nazir
Cyber Safety Jamie Salazar.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Identity Theft PD Identity Theft Identity theft is a serious crime which can: Cost you time and money Destroy your.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
OCTOBER IS CYBER SECURITY AWARENESS MONTH. October is Cyber Security Awareness Month  Our Cyber Security Awareness Campaign focuses on topics such as.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Account & Google Message Center Guide August 2015 Prepared by: Angela Mars IT Education and Training.
2015Computer Services – Information Security| Information Security Training Budget Officers.
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
Two account types on this campus: UWB Access AccountUW NetID Account & 1.Not everyone has one as it must be requested by your supervisor 2.You are.
Account & Google Message Center Guide August 2015 Prepared by: Angela Mars IT Education and Training.
Information Security 101 Richard Davis, Rob Laltrello.
Staying Austin College
Robert Leonard Information Security Manager Hamilton
Red Flags Rule An Introduction County College of Morris
Welcome to the SPH Information Security Learning Module
Premier Employee Program Version 4.0
Presentation transcript:

IT Security Awareness: Information Security is Everyone’s Business A Guide to Information Technology Security at Northern Virginia Community College

Goals of IT Security Awareness Training  To assist faculty and staff in using safe, secure computer practice to safeguard College computing systems and data they store or access.  To answer any questions about information security requirements and procedures  To promote Computer Security Awareness

Information Technology Security Awareness

What Is IT Security Awareness? Information Technology Security Awareness means understanding various information technology threats that exist in one's computing environment and taking reasonable steps to guard against them.

Who Is Responsible for IT Security? Everyone who uses a computer needs to know how to keep his or her computer and data secure to ensure a safe working environment. NOTE: Security Awareness is one of the thirteen security components required in the COV ITRM Standard SEC

Who Must Have Security Awareness Training?  All new employees who use information technology or have access to areas where information resources reside, must receive formal training within 30 days  Refresher training must be provided to all personnel annually at a minimum

What Are User Personal Responsibilities?  Report security violations  Develop “end-of-day” security procedures  Practice proper telephone and security  Clear physical area in office of sensitive data when not in office  Do not leave your portable unattended  Lock your office, if possible

What Are the Consequences for Security Violations?  Risk to security and integrity of personal or confidential information  Los of employee and public trust resulting in embarrassment and bad publicity  Costly reporting requirements in case of compromise of sensitive information  Internal disciplinary action(s) up to and including termination of employment, possible penalties, prosecution, & potential for sanctions/lawsuits

What Must Be Included in the Security Awareness Training Program?  Provide both general and position appropriate security awareness content  Specify timeframes for receiving initial, ongoing and refresher training  Be documented on an auditable medium  Be approved by the Information Systems Security Officer

How Is Security Awareness Training Documented?  Receipt of training must be documented in employee’s personnel file with employee’s acknowledgement of receipt and understanding  All training must be documented and filed with Information Systems Security Officer and available for audit

How Can Training Be Delivered?  New employee orientation  General sessions  Departmental sessions  Web delivery via Web Pages, PowerPoint or video  Tip of the month via to distribution lists

How Can Training Be Delivered?  Posters  Brochures  “Security Day”  Brown bag lunch sessions

Computer Security

How Do I Secure My Computer?  Use a firewall  Use strong passwords  Use antivirus software  Install security patches  Share files correctly  Back up files regularly  Don’t store sensitive information on hard drive

How Can I Prevent Spyware on my Computer?  Avoid free tool bars for your browser since they may come with spyware  Regularly use spam cleaners to remove spyware.

Using USB Drives Safely

How Do I Use USB Flash Drives Safely?  Back up files on USB flash drive  Do not store sensitive data, such as SSNs or student grades, on USB flash drive  If possible, use password to protect data on USB flash drive  Remember to remove drive from your computer before walking away

Safe Practice

What Is Safe Practice?  Don’t open attachments unless you know what they are.  Don’t open, forward or reply to spam or suspicious s; delete them.  Be aware of sure signs of scam . Not addressed to you by name Asks for personal or financial information Asks you for password Asks you to forward it to lots of other people

Safe Practice  Don’t click on website addresses in s unless you know what you are opening.  Use official VCCS student to communicate with students about grades or to provide feedback on assignments.  Report security concerns to IT Help Desk.

How Do I Recognize Phishing?  Phishing is type of or instant message scam designed to steal your identity.  Phishing is the act of attempting to fraudulently acquire sensitive information, such as usernames, passwords, and credit card details, by masquerading as trustworthy entity in electronic communication using or instant message.

How Can I Safeguard Against Phishing?  Don’t reply to or pop-up messages that ask for personal or financial information.  Don’t click on links in or instant message.  Don’t cut and paste link from questionable message into your Web browser.  Use antivirus and firewalls and update them regularly.  Don’t personal or financial information.

 If you are scammed, visit Federal Trade Commission’s Identity Theft website –

Protecting Sensitive Information

How Do I Protect Sensitive Data?  Protect sensitive information on lists and reports with social security numbers (SSNs).  Limit access to lists and reports with SSNs to those who specifically need SSNs for official college business.  Never store SSNs or lists with SSNs on laptops or home computers.  Save and store sensitive information on server managed by campus or college IT staff.

Protection of Sensitive Data  Never copy sensitive data to CDs, disks, or portable storage devices.  Do not sore lists with sensitive information on the Web.  Lock printed materials with sensitive data in drawers or cabinets when you leave at night.  When done with printed sensitive material, shred them.

Protection of Sensitive Data  Remove sensitive materials from printer right away.  If problem with printer, turn off printer to remove sensitive material from printer’s memory.  Personally deliver sensitive materials to recipient or distribute information electronically using College’s system.  Arrange for shared electronic file that requires user ID and password.

Password Security Guidelines

What Are the Password Security Guidelines?  Passwords must be treated as sensitive and confidential information.  Never share your password with anyone for any reason.  Passwords should not be written down, stored electronically, or published.

Password Security Guidelines  Be sure to change initial passwords, password resets and default passwords first time you log in.  Use different passwords for your different accounts.  Create passwords that are not common, avoid common keyboard sequences, contain personal information, such as pets & birthdays.

Top Ten List of Good Computing Practices

What Are the Steps to Take to Ensure Safe Computing?  Use cryptic passwords that can’t be easily guessed and protect your passwords.  Secure your area, files and portable equipment before leaving them unattended.  Make sure your computer is protected with anti-virus and all security patches and updates.

Steps to Ensure Safe Computing  Make backup copies of data you do not want to lose and store the copies very securely.  Don’t save sensitive information on portable devises, such as laptops, memory sticks, PDAs data phones, CDs/DVDs.  Practice safe ing.  Be responsible when using the Internet.

Steps to Ensure Safe Computing  Don’t install unknown or suspicious programs on your computer.  Prevent illegal duplication of proprietary software.  Protect against sypware/adware.

How Should I Report Security Incidents?  Immediately report suspected security incidents & breaches to your supervisor and the IT Help Desk.

Resources

Resource Handout  Use the handout found on the IT Security Awareness Training website as easy reference for steps to follow to ensure information security.

College and Campus Resources  Contact the IT HelpDesk  Contact the Office of Instructional & Information Technology Support Services  Contact your campus Information Technology Manager (ITMs)

Campus IT Staff Contacts  Dave Babel (AL)  Bruce Ghofrany (AN)  Jeff Howlett (MEC)  Kevin Kelley (LO)  Lynn Bowers (MA)  Lynn Feist (WO)  Peter Tharp (CS)  Tom Pyron (ELI)