IT Security Essentials Lesley A. Bidwell, IT Security Administrator.

Slides:



Advertisements
Similar presentations
1 of 2 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2006 Microsoft Corporation.
Advertisements

INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
BP5- METHODS BY WHICH PERSONAL DATA CAN BE PROTECTED Data Protection.
1 Electronic Information Security – What Researchers Need to Know University of California Office of the President Office of Research May 2005.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Information Security Awareness:
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
Data Security Issues in IR Eileen Driscoll Institutional Planning and Research Cornell University
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
Spring Definitions  Virus  A virus is a piece of computer code that attaches itself to a program or file so it can spread.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Identity Theft and Safe Computing Keeping yourself You by good habits and good technology.
IT Security Essentials Ian Lazerwitz, Information Security Officer.
10 Essential Security Measures PA Turnpike Commission.
September 2007 General Security Basics Your Responsibilities for Safe Computing.
Threats to I.T Internet security By Cameron Mundy.
Information Security Information Technology and Computing Services Information Technology and Computing Services
Protect Your Computer from Viruses and Other Threats! 1. Use antivirus software. 2. Run Windows updates. 3. Use a strong password. 4. Only install reputable.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Security 101 Harper P. Johnson Information Technology Services Director of Information Security.
IT Security Awareness: Information Security is Everyone’s Business A Guide to Information Technology Security at Northern Virginia Community College.
Security Awareness ITS SECURITY TRAINING. Why am I here ? Isn’t security an IT problem ?  Technology can address only a small fraction of security risks.
IT Security for Users By Matthew Moody.
1.1 System Performance Security Module 1 Version 5.
IT security By Tilly Gerlack.
 Physical protection and Simple measures  Passwords  Firewalls  Anti-Virus, Spyware and Malware  Web browsers   Patches  Wireless  Encryption.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Best Practices for Protecting Data. Section Overview Mobile Computing Devices Technical Procedures Data Access and Permissions Verbal Communication Paper.
©Holm Publications Security Awareness Presentation.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
INFORMATION SECURITY WHAT IS IT? Information Security The protection of Information Systems against unauthorized access to or modification of information,
A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously.
Desktop computer security policies Applies to ALL computers connecting to the PathStone network irrespective of device ownership.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
Computer Security Hacking, Phishing, Passwords Kausalya S. And Sushil Mujumdar (CCCF) 04 - Aug - 15.
What are the rules? Information technology is available to every student, faculty and staff member in support of the essential mission of the University.
Return to the PC Security web page Lesson 5: Dealing with Malware.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
INTERNET SAFETY FOR KIDS
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
Small Business Security Keith Slagle April 24, 2007.
Desktop Security: Making Sure Your Office Environment is Secure.
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Computer Security By Duncan Hall.
OCTOBER IS CYBER SECURITY AWARENESS MONTH. October is Cyber Security Awareness Month  Our Cyber Security Awareness Campaign focuses on topics such as.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Account & Google Message Center Guide August 2015 Prepared by: Angela Mars IT Education and Training.
By Kyle Bickel.  Securing a host computer is making sure that your computer is secure when it’s connected to the internet  This be done by several protective.
Computer Security Sample security policy Dr Alexei Vernitski.
Copyright © 2008 AusCERT 1 Practical Computer Security See the notes section throughout the slide presentation for additional information.
Common sense solutions to data privacy observed by each employee is the crucial first step toward data security Data Privacy/Data Security Contact IRT.
ICT Laptops Passwords Encryption Back-ups Data Protection and the Internet Viruses Social Networking / Professional Conduct.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Computer Security Keeping you and your computer safe in the digital world.
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
Information Technology Security Office of the Vice President for Information Technology New Employee Orientation II.
Account & Google Message Center Guide August 2015 Prepared by: Angela Mars IT Education and Training.
Information Security Session November 11, 2004
Things To Avoid: 1-Never your password to anyone.
Lesson 2: Epic Security Considerations
Information Security Awareness
Epic Introduction Basics
Cybersecurity Am I concerned?
Epic Introduction Basics
Lesson 2: Epic Security Considerations
Lesson 2: Epic Security Considerations
Epic Introduction Basics
Keeping Our Data Secure
Presentation transcript:

IT Security Essentials Lesley A. Bidwell, IT Security Administrator

The Security Mantra Confidentiality Integrity Availability

SUNY Oneonta Security Program Developed by a working group of faculty and staff Adopted by President’s Cabinet in March 2005 Available from the campus network at

SUNY Oneonta Security Program “This program applies to all faculty, staff and students of the College, or others … who may utilize the College’s technology and related facilities.”

Why all the concern about security? Computer hacking has become big business We store vast amounts of personal data in our systems – on students and employees We need that data to be accurate and available in order to do our jobs We must comply with State and Federal regulations

What are we doing about it? Constantly monitoring systems and threats to keep our servers and our network secure Implementing policies, procedures and practices to assure only authorized users have access to data Educating users

What can you do? Security is everyone’s responsibility Check out the security program Contact the IT Security Administrator with any questions or if you suspect there has been a security breach Follow some basic guidelines:

Be aware Make information security a regular practice Recognize poor security practices in your own habits and in your office Remain vigilant where information security is concerned

Passwords Never share a password –If more than one person needs access work with us to set up a network share so each can use their own password –Even the IT Helpdesk should never ask for your password

Passwords Choose strong Passwords –Will be required soon –Use a phrase that’s easy to remember but hard to guess –Must contain 3 of 4 Upper case letters Lower case letters Numbers Special Characters See acy/password.mspx

Passwords Examples: Weak fluffy password2 bidwella Strong str0ngPa55 2&2=Four myc4tisf!uffy

Passwords Change passwords regularly –Will be required soon –Every 180 days –Limits the length of time a hacker can use a compromised password –ALWAYS change passwords if you suspect your password has been stolen

Passwords Never post your password –On your computer monitor –Under your keyboard –In the desk drawer –Anyplace that someone might look

Passwords Never save passwords in applications – , Web Authoring, PPP for dial-in –Anyone who sits at your computer has access –Equally important at home

Physical Security Always lock your computer when you leave it unattended (ctrl-alt-del) Never leave hard copies with sensitive data in plain view Always log out of web applications (Banner, ) and close browser

Laptops and Mobile Devices Theft Access on insecure networks Strong passwords Encryption

Malware A general term for malicious software Includes viruses, trojans, rootkits, spyware, etc. Vectors of infection include , web pages, links sent through IM sessions, hidden in other programs

Malware Anti-virus software –Must be up to date –Must be running –Use on-access scanner –Schedule daily scans

Malware Anti-spyware software –Must be up to date –Must be running –Good choices include Microsoft Defender, Spybot Search & Destroy and Adaware – /modules/wfdownloads/viewcat.ph p?cid=3

Malware Operating system patches –Apply critical patches as soon as possible –Use automatic updating when possible –Important for Macs and Linux machines as well as Windows

Malware – Signs of Infection Computer slows down New homepage, toolbars, default search pages or favorites in browser Anti-virus and/or anti-spyware software get turned off

Malware Be sure to use these procedures at home Call the Information Technology Helpdesk about using the ASCI or Secure Desktop program for your office computer

Business Continuity Planning Remember “Availability?” All departments need one Test it!

Questions? Lesley Bidwell x2628 Information Technology Helpdesk x4567