©Holm Publications Security Awareness Presentation.

Slides:



Advertisements
Similar presentations
Everything HelpDesk Your Comprehensive Service Solution Your life doesnt need to be complicated, always stay one step ahead with Ticket Templates GroupLink.
Advertisements

Computer Security set of slides 10 Dr Alexei Vernitski.
Maintaining Security While Using Computers What all of Our Computer Users Need to Know.
BP5- METHODS BY WHICH PERSONAL DATA CAN BE PROTECTED Data Protection.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
INTERNET SAFETY FOR STUDENTS
1 of 2 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2006 Microsoft Corporation.
Perimeter Church Perimeter Network Introduction 2005.
Computer and Physical Security Recommendations. Assure that computers and work locations are secured when work areas are not staffed.  Log-off or lock.
Backups Why Is it important to back up your files? w If you've ever been in a situation in which you've almost completed an important project, only to.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Information Security Awareness:
1 Enterprise Security Your Information Security and Privacy Responsibilities © 2008 Providence Health & Services This information may be replicated for.
Password Best Practices.  Never share your login ids and/or passwords  Remember: you are responsible for any activities associated with your login and.
By Mrs. Smith DATA INTEGRITY AND SECURITY. Accurate Complete Valid Data Integrity.
10 Essential Security Measures PA Turnpike Commission.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
1.0 Computer Lab Regulations 1.1 Computer Lab Rules 1.2 User 1.3 Equipment 1.4 Data and User Security.
HIPAA Basic Training for Privacy and Information Security Vanderbilt University Medical Center VUMC HIPAA Website: HIPAA Basic.
September 2007 General Security Basics Your Responsibilities for Safe Computing.
UNIT 3C Security of Information. SECURITY OF INFORMATION Firms use passwords to prevent unauthorised access to computer files. They should be made up.
Security Squad Keeping your Equipment and Information Safe Security Squad Keeping your Equipment and Information Safe Security Squad Video Series, Part.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
HIPAA Privacy & Security Kay Carolin Barbara Ann Karmanos Cancer Center March 2009.
IT Security Awareness: Information Security is Everyone’s Business A Guide to Information Technology Security at Northern Virginia Community College.
GCSE ICT Viruses, Security & Hacking. Introduction to Viruses – what is a virus? Computer virus definition - Malicious code of computer programming How.
An Educational Computer Based Training Program CBTCBT.
1.1 System Performance Security Module 1 Version 5.
IT Security Essentials Lesley A. Bidwell, IT Security Administrator.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Computer Security Preventing and Detecting Unauthorized Use of Your Computer.
Jan 11 Encryption and Hacking. Your Answer Encryption is used to keep information safe from unauthorised users. The best way to keep the system safe is.
3.3 Digital Communication Security. Overview Demonstrate knowledge and understanding of basic network security measures, e.g. passwords, access levels,
Use of U.T. Austin Property Computers: Security & Acceptable Use The University of Texas at Austin General Compliance Training Program.
INFORMATION SECURITY WHAT IS IT? Information Security The protection of Information Systems against unauthorized access to or modification of information,
INTERNET SAFETY RULES. TECHNOLOGY Technology has become an important part of today’s classroom as well as the world. Students need to be able to use and.
Security Training USAID Information Security.
What are the rules? Information technology is available to every student, faculty and staff member in support of the essential mission of the University.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Physical ways of keeping your system secure. Unit 7 – Assignment 2. (Task1) By, Rachel Fiveash.
Viruses Hackers Backups Stuxnet Portfolio Computer viruses are small programs or scripts that can negatively affect the health of your computer. A.
Incident Security & Confidentiality Integrity Availability.
SECURITY OF INFORMATION Unit 3c. Click to return to Sum up page HOW TO PROTECT DATA AND COMPUTERS Computers can be locked in a room CCTV and alarms to.
Computer Security By: Alex Metzler. Table of Contents Protecting Your Personal Info Know Who You’re Dealing With Use Updated Security Software Update.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Computer Security Sample security policy Dr Alexei Vernitski.
Common sense solutions to data privacy observed by each employee is the crucial first step toward data security Data Privacy/Data Security Contact IRT.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
Computer Security Keeping you and your computer safe in the digital world.
Two account types on this campus: UWB Access AccountUW NetID Account & 1.Not everyone has one as it must be requested by your supervisor 2.You are.
2.4 Cyber-Safety.
ISMS Information Security Management System
Answer the questions to reveal the blocks and guess the picture.
Lesson 1: Epic Advanced Appointment Scheduling
Things To Avoid: 1-Never your password to anyone.
Robert Leonard Information Security Manager Hamilton
Security of People, Property and Information
2.4 Cyber-Safety.
Lesson 2: Epic Security Considerations
Epic Introduction Basics
Lesson 1: Epic Advanced Appointment Scheduling
Epic Introduction Basics
Lesson 1: Epic Advanced Appointment Scheduling
Lesson 2: Epic Security Considerations
Lesson 2: Epic Security Considerations
Epic Introduction Basics
Handling Information Securely
G061 - Network Security.
Presentation transcript:

©Holm Publications Security Awareness Presentation

Who we are? We are a publications company that strives to become one of the best in the industry. We provide state of the art publishing within a safe and secure environment. A fun environment to work!!

Our Responsibilities Employees are our responsibility, and this training program will make you aware of the companies security awareness program. We will provide each employee with the knowledge needed to succeed in our company.

Security Policy, Employee Passwords Passwords should be easy for you to remember, but not easy for others to guess. Do NOT use your log in ID as your password. Never use any part of your name as your password.

Security Policy, Employee Passwords Never use any password that will identify you, your hobbies, your children, or pets names. Do not use any word that can be found in a dictionary. Try to use “special characters” in your password. Example: *

Security Policy, Password Confidentiality Never disclose your password to anyone, even supervisors and managers. Never keep your password in plain sight. If you ever feel your password has been compromised, change it immediately.

Security Policy, Your Workstation Only use your computer for Business use only. Your business is for business purposes only. No Exceptions!! Internet access for personal use may only be used during your assigned breaks. Absolutely no copying of company software!

NO

PIRACY IS A….. CRIME!

Security Policy, Social Engineering Never disclose any company information or passwords to anyone outside the company, whether it is in form, or telephone! Anyone wanting this information should be immediately directed to supervisors or managers.

Security Policy, Workstation Security If you need to leave your work area for anything, please save all information and log out. Never leave important information on your desk. Always keep them under lock and key while away from your desk.

Security Policy, Storing Data Any company data is to be saved each day onto the business servers. Backups of personal data can be stored on your own workstation, but to be on the safe side, you should always back that up to flash drive or CD.

Security Policy, Spyware & Viruses Every employees computer is set up to automatically update and scan for viruses and spyware nightly, so please leave your computer on when you go home.

Security Policy, Company Policies Every employee receives an employee handbook when hired. Please refer to these policies for answers to your questions. Any other questions, please contact your department managers for more information.

The Three Characteristics of Information: Please follow these policies to ensure a safe, secure, and productive work environment. Integrity Confidentiality Availability Thank You