Adrian Ellison Assistant Director, IT Services Wednesday 23 November 2011.

Slides:



Advertisements
Similar presentations
Point3r$. Password Introduction Passwords are a key part of any security system : –Work or Personal Strong passwords make your personal and work.
Advertisements

Web Shift Booking System
ANNUAL SECURITY AWARENESS TRAINING – 2011 UMW Information Technology Security Program Annual Security Awareness Training for UMW Faculty and Staff.
Please lock your COW! ext or call the College IT Help or ext
Two-Factor Authentication & Tools for Password Management August 29, 2014 Pang Chamreth, IT Development Innovations 1.
Part 2 of Evil Lurking in Websites Data Security at the University of Wisconsin Oshkosh.
ONLINE SAFETY Online safety Money Works: Level 1 Topic 3.
Network & Computer Security Training.  Prevents unauthorized access to our network and your computer  Helps keep unwanted viruses and malware from entering.
Social Engineering PA Turnpike Commission. “Social Engineering is the practice of obtaining confidential information by manipulation of legitimate users”
Jing Cast for Creation of a Professional Gmail Account By Matt Chonka EDTC6432: Essentials of Computer Authoring.
June is an easy way to communicate. It costs nothing to send an , but it does require a connection to the Internet. You can.
Cooperating Teachers: How to Reset Your Password in Tk20 Use this after your initial account set up if you cannot remember your TK20 password.
Remote Assistance  Using this program you can allow someone to work on your computer, chat with you and view your screen with your permission  The other.
Penn State University College Of Education Understanding College of Education Resources.
Notes to Teachers At the time we embedded the links in these lessons, they all worked. If they don’t, you can google the website, find the link, open it.
Information Security Decision- Making Tool What kind of data do I have and how do I protect it appropriately? Continue Information Security decision making.
To navigate through this slideshow, use the arrow keys on your keyboard to go forward or backward.  or  Use your mouse to click to the next step within.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Information guide.
Password Management PA Turnpike Commission
s By Mollie.
IT Security Essentials Lesley A. Bidwell, IT Security Administrator.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
By Diana Lenartiene, Ed. S.. Emoticons Polling Status/Away Raise Hand Chat Area Volume Control.
Password Fundamentals. UMB-Dental School New Password Policy Passwords must be eight characters or longer. Password must contain characters from three.
Digital Citizenship Grade Why are we here and what is Digital Citizenship? Part 1: What is Private Online? Part 2: Passwords Part 3: Responsibilities.
University Health Care Computer Systems Fellows, Residents, & Interns.
PHYSICAL ITSECURITY scope. 1.What is password security?. 2.Why can't I tell anyone my password? 3.What about writing my password down 4.Social engineering.
Computer Security Hacking, Phishing, Passwords Kausalya S. And Sushil Mujumdar (CCCF) 04 - Aug - 15.
What are the rules? Information technology is available to every student, faculty and staff member in support of the essential mission of the University.
To Introduction cyber safety Grids for Kids – January 2008 Written by Donna Cobrin.
25/10/ Passwords are high value targets 2,000,000 passwords stolen from Facebook, Twitter and Google The Independent, 5 December 2013 Stolen Facebook.
How can IT help you today?. Agenda Why Do You Care? What Are The Risks? What Can You Do? Questions? How can IT help you today? 2.
At the Log in page enter your college provided username and password then click submit to login to Owl Link.
Changing Your Case Password And a few other words about IT Security.
Changing Your Password General Lesson 3. Objectives Following completion of this lesson you will be able to:. Define how often a password must be changed.
How to Create an Address How to Create a Free Account, Read and Answer your s. Yahoo! provides FREE . To create a free .
tool kit. USER GUIDE Etiquette (Acceptable use policy) – a list of rules that we observe Use a suitable subject in the - this helps.
Internet Safety and Productivity Tips Presented by ITS Kerri Sorenson and Sean Hernandez December 11, 8:30-9:00 am.
NC Wise Security & Passwords Revised: July 29, 2008 Developed by: Jennifer Jenkins, Cabarrus County Schools.
1 Day 2 Logging in, Passwords, Man, talk, write. 2 Logging in Unix is a multi user system –Many people can be using it at the same time. –Connections.
Information Security Everyday Best Practices Lock your workstation when you walk away – Hit Ctrl + Alt + Delete Store your passwords securely and don’t.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Account & Google Message Center Guide August 2015 Prepared by: Angela Mars IT Education and Training.
Common sense solutions to data privacy observed by each employee is the crucial first step toward data security Data Privacy/Data Security Contact IRT.
Managing Money Workshop The National Autistic Society AGM
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Online Job Applications Workshop Coordinators Sharon Feeney – Andrea Reynolds –
Digital Citizenship Unit 2 Lesson 1: Strong Passwords
Gmail Password Reset Process Do you want to Reset your Gmail account password because your Gmail account password is not secure or easy to guess or your.
Two account types on this campus: UWB Access AccountUW NetID Account & 1.Not everyone has one as it must be requested by your supervisor 2.You are.
Unit 4 Protecting Your Information Section C. Chapter 1, Slide 2Starting Out with Visual Basic 3 rd EditionIntroduction to ComputersUnit 4C – Protecting.
Hondros College Student Mail System
Account & Google Message Center Guide August 2015 Prepared by: Angela Mars IT Education and Training.
Safe Internet Mechatronika Budapest.
How to Register.
Lesson 2- Protecting Yourself Online
Information is at the heart of any University, and Harvard is no exception. We create it, analyze it, share it, and apply it. As you would imagine, we.
Welcome to FOCUS FOCUS website:
Setting up an online account
Introduction to Computers
Lesson 2: Epic Security Considerations
Epic Introduction Basics
Epic Introduction Basics
Lesson 2: Epic Security Considerations
How to Register.
Lesson 2: Epic Security Considerations
Epic Introduction Basics
Lesson 2- Protecting Yourself Online
Handling Information Securely
Presentation transcript:

Adrian Ellison Assistant Director, IT Services Wednesday 23 November 2011

Protect our data Protect our identity Prevent misuse Often the only form of IT security Reduce the risk of compromise Helps maintain LSE’s reputation

Why? – LSE has over 40,000 user accounts – Safer: a stronger password is harder to crack – Reduces risk: of misuse, data theft, identity theft – Audit requirement – After consultation (LISC, ISSG, DHF) DMT approved a new password policy

On 17 January 2012 new policy comes into effect Anyone who does not have a strong password less than one year old will be forced to change it You will then need to change it again at least once a year

At least 8 characters long Must contain at least one CAPITAL letter and one NUMBER or SYMBOL Cannot be a dictionary word Cannot be something that you’ve used before Should be difficult to guess (but easy for you to remember)

Default ITS password for logging into your PC, Remote Desktop, Webmail, LFY, Moodle, Online Recruitment for staff and RPGs You may have other IT accounts, e.g. for specialist business systems which might have a separate password It will not affect your other passwords (e.g. Google, Yahoo, Hotmail, online banking etc.)

IT Services will be running a campaign to publicise the change. They will be a website offering more advice and guidance There are tips and tricks to choosing memorable strong passwords Try and use it everyday: to log in to your PC, access online resources (LSE For You, Moodle), and to unlock your PC when you’ve been away.

Mnemonic Capitalise last letter Birth year Add a ‘£’ symbol

Think of a quote… “ ”

Transpose ‘o’ for ‘0’ (‘1’ for ‘i’ and ‘3’ for ‘e’ are good too) Pick first 2 or 3 words and run together (tip: next year pick the next 2 words) Leading underscore

What was that date again?

How do I change my password?

What if I’m not in School? You can change your password when you are away from the campus in one of two ways: – Using the password reset in LSE For You – Using the Remote Desktop Weak Medium Strength Strong

What if I forget my password? You can set some personal security questions with answers in LSE For You. If you have, then you can use them to reset your password

What if I forget my password? You can set some personal security questions with answers in LSE For You. If you have, then you can use these to reset your password You can ring your IT support team or the IT Helpdesk and they will help you

So what do I do next…? Set your security questions in LFY NOW! Think of your own ‘mnemonic’ or memorable quote From it, devise your personal strong password When you feel comfortable with it change it anytime from today onwards Use it every day to log in and lock your PC when you are away from it Tell your colleagues please

What should I not do…? DO NOT write down your new password and store it anywhere obvious (in your desk drawer, under your keyboard, in the cover of your notebook) DO NOT share your new password with colleagues

Who’s received one of these? From: LSE Sent: 18 May :48 Subject: Official message Dear web mail Owner, We are contacting you to inform you that our Account Review Team identified some unusual errors in your account profile.This may be due to the following * Using a shared computer to access your online webmail. * Not logging off after webmail usage. Due to this an account update has been issued to rectify.Follow the Link Below providing the required security information correctly to re-gain access or we will locked your account permanently click here Or lse.ac.uk security update **Thanks * © 2011 LSE - London School of Economics and Political Science. All rights reserved

Never, never, never… Give out your IT password to anyone! Not your colleague, not your PA, not to IT staff

But I want to give access to… My , H:space – in case I’m away I routinely share files with colleagues Use DELEGATE ACCESS in Outlook – ask your IT Support Team for help Consider using Shared Storage (Deptshared/P:drive) instead

Using Cloud-based services ITS has provided new guidance on the use of Cloud-based services like Dropbox, Doodle, and Google Docs To summarise: Use for easy access to data and collaboration Don’t use for sensitive personal and/or confidential data, valuable data, or data you can’t afford to lose. See our website for detailswebsite for details ✔ ✖