Information Systems Services How to Protect Yourself On-Line – Keeping Safe At Home Neil Jowsey, IT Security Team 25 th September 2013.

Slides:



Advertisements
Similar presentations
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Advertisements

Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 25 & 27 November 2013.
SECURITY CHECK Protecting Your System and Yourself Source:
Information Systems Services Protecting Data – Keeping Safe Kevin Darley, IT Security Co-ordinator 8 th November 2012.
7 Effective Habits when using the Internet Philip O’Kane 1.
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
Social media threats. Warning! May contain mild peril.
IDENTITY THEFT ARE YOU SAFE?. HOW DOES THIS HAPPEN TO ME? Internet “Security “ When using a public computer, never access any vital accounts like banking.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 18, 20 & 25 March 2015.
Security Liaisons Information Presentation. Introduction  What’s the big deal with computer security? Don’t we have an IT security department to take.
E-Safety Challenge College. Learning Objectives To assess the risks faced when online and how to use the options available to protect yourself.
Protection against viruses, malware, misuse and theft
Protect Your Computer from Viruses and Other Threats! 1. Use antivirus software. 2. Run Windows updates. 3. Use a strong password. 4. Only install reputable.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
Manjit kaur Manjit Kaur1. Why do we need to protect our computer from a virus? A reason why we need to protect our computer from a virus is because it.
Protect against viruses, malware, misuse and theft Protect against data theft or loss, identity theft and fraud Avoid scams, savvy social networking and.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
CS101 Lecture 14 Security. Network = Security Risks The majority of the bad things that can be done deliberately to you or your computer happen when you.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Stay Safe & Secure Online. Outline Passwords Everyday Security Security Physical Security Protecting Personal Information.
Staying Safe Online Keep your Information Secure.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
IT Security Essentials Lesley A. Bidwell, IT Security Administrator.
Donald Constant. Digital Citizenship  For teachers and students, digital citizenship changes as new technology tools are used by the educational world.
E-Safety E-safety relates to the education of using new technology responsibly and safely focusing on raising awareness of the core messages of safe content,
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Manjit kaur Manjit Kaur1. Why do we need to protect our computer from a virus? A reason why we need to protect our computer from a virus is because it.
Stay Safe Online. Use strong passwords Using the same password for all your accounts makes it easy to remember. However, it also means a hacker needs.
Grades 4-6 Be SAFE Online! Ceres Unified School District.
Information Systems Services How to Protect Yourself On-Line (Keeping Safe At Work) Kevin Darley, IT Security Co-ordinator 7 th March 2013.
Lee County’s intent is to provide free and equal access to resources via the internet. All school rules for appropriate use of technology also apply.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
Joel Rosenblatt Director, Computer and Network Security September 10, 2013.
Desktop Security: Making Sure Your Office Environment is Secure.
HOW TO PREVENT IDENTITY THEFT ONLINE TIPS 1.WATCH OUT FOR PHISHING WEBSITES.
By Tia, Amy & Carly Don’t share any of these things to anyone:  Phone number  address  Where you live  Your name  Age  Sex  Photos of yourself.
What is Spam? d min.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Computer Skills and Applications Computer Security.
@ BCHS. The School Policy is your guide to ensuring you and your students are safe. It is your responsibility to make yourself aware and familiar with.
Cyber Safety Jamie Salazar.
Internet Security. 2 Computers on the Internet are almost constantly bombarded with viruses, other malware and other threats.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Onguardonline.gov By Austin Kellogg. Main ideas  Protect your personal information  Know who your dealing with  Use security software that updates.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Confidentiality, Integrity, Awareness What Does It Mean To You.
Social Networking Practices. Information Security Purpose is to protect your information’s Confidentiality Integrity Availability.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
STOP. THINK. CONNECT. Online Safety Quiz. Round 1: Safety and Security.
Smart, Safe, and Secure Online Spam commercial messages that you didn’t ask for (a company trying to sell things by sending out thousands of messages at.
1 Outline of this module By the end of this module you will be able to: Understand why computer security is important; Name the different threats to.
The internet is a place of both useful and bad information. It has both good and bad side- and it’s all too easy for kids to stray into it. And no parents/guardian.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Computer Security Keeping you and your computer safe in the digital world.
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
Have a Safe Shopping Online Experience. Did You Shop Online Today?  Anything you need today is available online. Whether it’s groceries, jewellery, clothes,
PCS Technology for Students: Acceptable Use, Privacy, and Safety.
Before the talk… Zix Mail is the approved encrypted platform, we will have training on this soon. Citrix Sharefile has been approved for use for.
10 Tips for Staying Safe Online
ARE YOU A TARGET? YOU MAY NOT REALIZE IT, BUT YOU ARE A TARGET FOR CYBER CRIMINALS. IDENTITY THEFT IS ON THE RISE. BE AWARE AND TAKE PREVENTIVE ACTIONS.
Cybersecurity Awareness
How to Stay Safe Online Rollie Edwards.
Presentation transcript:

Information Systems Services How to Protect Yourself On-Line – Keeping Safe At Home Neil Jowsey, IT Security Team 25 th September 2013

Information Systems Services Threats Hacking Viruses Malware (key stroke loggers) Theft Risks Shared Use Dodgy Sites / Dubious Software? Social Networking No Central Support Ignorance Less Physical Security

Information Systems Services

Consequences Concerted Processing Power Identity Theft Spread of Viruses Spamming

Information Systems Services Protection Technical Virus & Patching Update Malware Detection Encryption of UoL Laptops Personal Security Conscious Abide by Policy Take it to Bed

Information Systems Services Tips 1 Use Desktop Anywhere or OWA to access University data. Use in-built security on smart phones and tablets. Immediately report the loss of any device through which you download University s.

Information Systems Services Tips 2 Don’t click on embedded links in s. Only open attachments from trusted sources. Reputable organisations will not ask you for your password or account details. When buying on line check for or the padlock symbol.

Information Systems Services Tips 3 Minimise your personal details on social networking sites and restrict access using available controls. Never post anything to Facebook/Twitter that you would not be prepared to publish elsewhere. Remember, once it’s in the ‘ether’ it’s out there forever. Prospective employers check social networking sites.

Information Systems Services Help Microsoft Security Essentials ID=e1605e a d813687a7f ID=e1605e a d813687a7f McAfee Anti-Virus Software Please report actual or suspected security breaches involving Universitydata as soon as possible: ISS Help Desk % )

Information Systems Services Questions