PLUG IT IN 7 Protecting Your Information Assets. 1.How to Protect Your Assets: The Basics 2.Behavioral Actions to Protect Your Information Assets 3.Computer-Based.

Slides:



Advertisements
Similar presentations
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Advertisements

Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Thank you to IT Training at Indiana University Computer Malware.
[your name, organization] Protecting Your Identity: What to Know, What to Do.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
What to Know, What to Do Presentation Powered By: The Federal Trade Commission Consumer Protection Toolkit.
Protecting Your Identity: What to Know, What to Do.
Protecting Yourself Against Identity Theft TSCPA Member Name, CPA Firm/Company Name.
National Association of Student Financial Aid Administrators The following is a presentation prepared for NASFAA’s 2007 Conference in Washington, DC July.
1 MIS 2000 Class 22 System Security Update: Winter 2015.
Identity Theft consumer.gov. What is identity theft? When someone uses information about you without your permission. The information can be your: – Name.
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
1.3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
CHAPTER 3 Ethics and Privacy. Outline for Today Chapter 3: Ethics and Privacy Tech Guide: Protecting Information Assets REMINDER: Project 1 due tonight.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
TECHNOLOGY GUIDE 3 1 Protecting Your Information Assets.
TECHNOLOGY GUIDE 5: Protecting Your Information Assets
[your name, organization] Protecting Your IdentityProtecting Your Identity: What to Know, What to Do.
New Data Regulation Law 201 CMR TJX Video.
Hierarchical file system Hierarchical file system - A hierarchical file system is how drives, folders, and files are displayed on an operating system.
eScan Total Security Suite with Cloud Security
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Have You Lost Your Identity? By Sierra Bowland. Deter Detect Defend.
Who Is This?! By Bailey Hoover. Foreword Deter Detect Defend Deter, Detect, Defend Brochure ID Theft: What It’s All About.
Identity Theft By: Victoria Tuttle. DeterDetect Defend.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America,
Identity theft: Real or Virtual? By: Alex Metzler.
Protecting Your Information Assets
IT security By Tilly Gerlack.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
Identity Theft  IDENTITY THEFT occurs when someone wrongfully acquires and uses a consumer’s personal identification, credit, or account information.
Legal Division CSAA Insurance Group, a AAA Insurer Protecting Your Identity: What to Know, What to Do 2015 Risky Business Week.
Protecting Yourself Against Identity Theft By Sierra Monif Next.
Personal Privacy and Security Zenia C. Bahorski Ph.D. Department of Computer Science Eastern Michigan University Personal Privacy & Security - Z. Bahorski,
CHAPTER 3 Ethics and Privacy. Outline for Today Chapter 3: Ethics and Privacy Tech Guide: Protecting Information Assets.
Be Cautious of Identity Theft By: Sydney Langley.
TECHNOLOGY GUIDE THREE Protecting Your Information Assets.
PLUG IT IN SIX Protecting Your Information Assets.
Identity Theft: Protect Yourself By Rachel Gaines.
Protecting Your Identity Anders Olson Computers III September 18, 2008.
What is Spam? d min.
Identity Theft: Prepare and Protect Yourself. What is Identity Theft? Identity theft occurs when someone uses your personal information, without your.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Society & Computers PowerPoint
Presented By Plano Police Department Crime Prevention Unit.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
W elcome to our Presentation. Presentation Topic Virus.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Protecting Your Assets By Preventing Identity Theft 1.
Identity Theft PD Identity Theft Identity theft is a serious crime which can: Cost you time and money Destroy your.
Policies and Security for Internet Access
Presented By: Jennifer Thayer, SPHR, SHRM-SCP.  Identify CyberCrime and Types  Identify Steps to Take to Prevent Identity Theft  Learn Tips and Tricks.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Protecting Yourself Against Identity Theft A Financial Literacy Presentation by.
Staying Secure in an Insecure World NATE HOWE CHIEF INFORMATION SECURITY OFFICER Education – Partnership – Solutions.
Computer Security Keeping you and your computer safe in the digital world.
Lesson 10A: The Three D’s of Identify Theft
TECHNOLOGY GUIDE THREE
Protecting Your Identity:
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Protecting Your Identity:
Protecting Your Information Assets
Presentation transcript:

PLUG IT IN 7 Protecting Your Information Assets

1.How to Protect Your Assets: The Basics 2.Behavioral Actions to Protect Your Information Assets 3.Computer-Based Actions to Protect Your Information Assets

>>> 1.Explain why it is critical that you protect your information assets. 2.Identify the various behavioral actions you can take to protect your information assets. 3.Identify the various computer-based actions you can take to protect your information assets.

How to Protect Your Assets: The Basics PI7.1 Business travel Working from home Various activities at our favorite hotspot Industrial strength IS security from work Attacks on a home network

How to Protect Your Assets: The Basics

Behavioral Actions to Protect Your Information Assets PI7.2 General Behavioral Actions What to Do in the Event of Identity Theft

General Behavioral Actions Never provide personal information to anyone in any format Protect your Social Security number Use credit cards with your picture on them Write “Photo ID Required” on the back of credit cards

General Behavioral Actions (Continued) Use virtual credit cards Pay very close attention to your credit card billing cycles Receive your credit card bills electronically Only use the last four digits of your credit card account when paying by check

General Behavioral Actions (Continued) Limit your use of debit cards Use secure, private mailbox/PO Box Use a cross-cut or confetti shredder to dispose of old mail & records Sign up for a proactive protection service (e.g., lifelock.com, trustedid.com, cardcops.com)

What to Do in the Event of Identity Theft Review instructions from the Federal Trade Commission (FTC) and immediately take the actions outlined in the following slides.

What to Do in the Event of Identity Theft (continued) Step 1: Place an Initial Fraud Alert by contacting all three credit reporting agencies (Equifax, Experian, Transunion Keep a detailed record of all communication (phone calls, letters, )

What to Do in the Event of Identity Theft (continued) Step 2: Order credit reports from all three nationwide credit reporting companies. Keep detailed records of everything you requested and received

What to Do in the Event of Identity Theft (continued) Step 3: Create and Identity Theft Report that includes an Identity Theft Affidavit and a police report.

What to Do in the Event of Identity Theft (continued) Step 4: Regularly review your credit report. Pay particular attention to medical benefit explanations from your insurance company. Respond quickly to notices from the Internal Revenue Service (IRS) Obtain legal counsel

Computer-Based Actions to Protect Your Information Assets PI7.3 Determining Where People Have Visited on the Internet Using Your Computer The Dangers of Social Networking Sites Determining if Your Computer is Infected

Computer-Based Actions to Protect Your Information Assets (Continued) PI7.3 Computer Actions to Prevent Malware Infections Protecting Your Portable Devices and Information Other Actions You Can Take On Your Computer Protecting Your Privacy

Computer-Based Actions to Protect Your Information Assets (Continued) PI7.3 Preparing for Personal Disasters Wireless Security Mobile Security

Determining Where People Have Visited on the Internet Using Your Computer Other people who may use your home computer may not practice “Safe Computing” practices Review the browser history Require a password for users on your home computer

The Dangers of Social Networking Sites Never post personal information about yourself or your family Deleted photos, posts, and messages can be copied and reposted by others Use the “Privacy Settings” to maintain control over your information

The Dangers of Social Networks (Source: Jure Porenta / Shutterstock)

Determining if Your Computer is Infected Signs that your computer system is infected with malicious software or malware Your computer shuts down unexpectedly by itself Your computer does not start normally

Determining if Your Computer is Infected (continued) Your computer exhibits erratic behavior, displaying some or all of these characteristics: – System runs out of hard drive space (memory) – System continually runs out of main memory (RAM) – Programs take longer to load than normal – Programs act erratically – Monitor displays strange graphics or messages. – System displays a high number of error messages. – Your client automatically sends messages to all your contacts

Computer Actions to Prevent Malware Infections Test Your System Install a Security Suite on Your Computer Install an Anti-malware Product on Your Computer Install a Firewall on Your Computer

Computer Actions to Prevent Malware Infections (con’t) Install an Antispyware Product on Your Computer Install Monitoring Software on Your Computer Install Content-Filtering Software on Your Computer

Computer Actions to Prevent Malware Infections (con’t) Install Antispam Software on Your Computer Manage Software Patches Use a Browser Other Than Internet Explorer Use an Operating System Other Than Windows

Protecting Your Portable Devices and Information Keep portable devices in an inconspicuous container/carrier Do not leave portable devices unattended in plain view Use alarms Two-factor authentication Use data encryption on portable devices

Other Actions You Can Take On Your Computer How to detect a worm How to detect a Trojan Horse How to detect fake Web Sites

Protecting Your Privacy Use strong passwords How to adjust your privacy settings on your computer How to surf the Web anonymously How to anonymously Erasing your Google search history

Preparing for Personal Disasters Safe deposit box for important papers Fireproof safe at home for important documents Regularly backup key computer files Encrypt backup files Backup to cloud or external drives

Wireless Security Hide your Service Set Identifier (SSID) Use encryption Filter out media access control addresses Limit IP Addresses Sniff out intruders

Wireless Security (continued) Using a Public Hotspot Test your wireless network Wireless security software

Mobile Security Mobile best practices – Strong password – Encrypted backups – Autolock option – Limit location based services – Maintain software/hardware updates – Be cautious when downloading apps