Security Squad Keeping your Equipment and Information Safe Security Squad Keeping your Equipment and Information Safe Security Squad Video Series, Part 2 Presenter, Title University of ________________ 9/22/2015Security Squad Video Series
9/22/2015Security Squad Video Series The Security Plan Plan Overview
Inventory – Tallying What you Have Passwords – Creating Strong Passwords Backups – Making Secured Copies Viruses – Protecting Your Office from Malware Wireless – Limiting Your Exposure Firewalls – Stopping Hackers at the Door E-commerce – Buying and Selling Safely Online Employee Policies – Protecting the Company and Employees Security Plan Topics 9/22/2015Security Squad Video Series
9/22/2015Security Squad Video Series WirelessWireless Limiting Your Exposure
Wireless Network security protocols Public vs. private networks Encryption levels – WPA2 – MAC identification Web interface agreement Broadcast network? Key Points – Wireless 9/22/2015Security Squad Video Series
Wireless Devices Bluetooth settings – Recognize connections – Encryption software Wireless printers Key Points – Wireless 9/22/2015Security Squad Video Series
9/22/2015Security Squad Video Series FirewallsFirewalls Stopping Hackers at the Door
Hardware Firewalls Install on the cable or DSL Uses a web-based interface Inexpensive can be combined with routers Network server behind firewall Key Points - Firewalls 9/22/2015Security Squad Video Series
Software Firewalls Install on every computer Turn on pre-installed firewalls Commercial software Use only one software firewall Applications require firewall permissions Key Points - Firewalls 9/22/2015Security Squad Video Series
9/22/2015Security Squad Video Series FirewallsFirewalls What is your current firewall protection? Do you have hardware/software protections? Is the firewall activated? Who’s in charge of backing up files?
9/22/2015Security Squad Video Series E-commerceE-commerce Buying and Selling Safely Online
Secured Socket Layering (SSL) Identifiers Locked padlock will appear in the browser status, or Green safety bar will appear in the browser address bar, and URL address will begin with instead of the usual Key Points – E-Commerce 9/22/2015Security Squad Video Series
Website Authenticity 3 rd Party verification – Security protocols – Company – Domain name $$$ to $$$$ Purchase services Key Points – E-Commerce 9/22/2015Security Squad Video Series
Include company contact information Privacy Policy Internal policy for record keeping and disposal No credit card information in , mail Limit employee exposure Work with ISP and merchant account rep. for best credit card security. Good Practices - E-Commerce 9/22/2015Security Squad Video Series
Cookies – Advantages – Plugs in information, saves time – Personalizes website Disadvantages – Auto-fills sensitive information Store or not-to-store Do not have browser store passwords Good Practices - E-Commerce 9/22/2015Security Squad Video Series
9/22/2015Security Squad Video Series E-CommerceE-Commerce What are your website e-commerce protocols? Do you have encryption protections? Is your website trusted by your customers? Do you have good online purchasing practices?
9/22/2015Security Squad Video Series Employee Policies Protecting the Company and Employees
Business Owner Responsibilities – Administrative Rights – Evaluate employee access rights – Encrypt sensitive files – Complete Inventory list Key Points – Employee Policies 9/22/2015Security Squad Video Series
Employee Technology Rules – Approved File portability – Work from home policies – Smart phone/PDAs – Secure the workspace – Employee training Key Points – Employee Policies 9/22/2015Security Squad Video Series
/Internet Use – Monitoring – Acceptable Internet Use policies – Illegal activity and consequences Key Points – Employee Policies 9/22/2015Security Squad Video Series
Handling Sensitive Data – Secure sensitive documents – Cross-cut shredder – Credit Card procedures Key Points – Employee Policies 9/22/2015Security Squad Video Series
9/22/2015Security Squad Video Series Employee Policies Review your employee technology use policies Are they applicable and current? Are they attorney reviewed? Do they reflect new security policies and practices?
Security Squad – Part 2 Contact: _________________________ _________________________ 9/22/2015Security Squad Video Series