General Awareness Training Security Awareness Module 3 Take Action! Where To Go for Help.

Slides:



Advertisements
Similar presentations
The Whole/Hole of Security Public (DoD) v. Corporate Carl Bourland US Army Judge Advocate Generals Corps.
Advertisements

Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
ANNUAL SECURITY AWARENESS TRAINING – 2011 UMW Information Technology Security Program Annual Security Awareness Training for UMW Faculty and Staff.
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Red Flags Rule BAS Forum August 18, What is the Red Flags Rule? Requires implementation of a written Identity Theft Prevention Program designed.
PC Security 101 Keeping your data safe. Security is a real concern Identity theft is a hot topic in the news. Data theft is a very real and serious issue.
Information Privacy and Data Protection Lexpert Seminar David YoungDecember 9, 2013 Breach Prevention – Due Diligence and Risk Reduction.
K eep I t C onfidential Prepared by: Security Architecture Collaboration Team.
Protecting Personal Information Guidance for Business.
SL21 Information Security Board Mission, Goals and Guiding Principles.
Information Security Awareness April 13, Motivation Recent federal and state regulations and guidance Recent federal and state regulations and guidance.
Guide to Massachusetts Data Privacy Laws & Steps you can take towards Compliance.
August 9, 2005 UCCSC IT Security at the University of California A New Initiative Jacqueline Craig. Director of Policy Information Resources and.
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
IT Security Essentials Ian Lazerwitz, Information Security Officer.
Introduction to PCI DSS
Sensitive Data Accessibility Financial Management College of Education Michigan State University.
10 Essential Security Measures PA Turnpike Commission.
ICT School Policies 6 th November Suggested Policies for Schools Not always a requirement, but useful to cover you, your school and the students.
CSP Annual Security Training Miranda Gregory, CSP Analyst Carroll County Department of Citizen Services.
Obtaining, Storing and Using Confidential Data October 2, 2014 Georgia Department of Audits and Accounts.
TRACs Security Awareness FY2009 Office of Information Technology Security 1.
April 23, Massachusetts’ New Data Security Regulations: Ten Steps To Compliance Amy Crafts
Information Security Technological Security Implementation and Privacy Protection.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
General Awareness Training
PCI requirements in business language What can happen with the cardholder data?
1 General Awareness Training Security Awareness Module 1 Overview and Requirements.
Information Security. What is Information Security? A. The quality of being secure B. To protect the confidentiality, integrity, and availability of information.
Thomas Levy. Agenda 1.Aims: Reducing Cyber Risk 2.Information Risk Management 3.Secure Configuration 4.Network Security 5.Managing User Access 6.Education.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Best Practices for Protecting Data. Section Overview Mobile Computing Devices Technical Procedures Data Access and Permissions Verbal Communication Paper.
©Holm Publications Security Awareness Presentation.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Information Security & Compliance Financial Services Workshop February 10, 2010.
April 14, A Watershed Date in HIPAA Privacy Compliance: Where Should You Be in HIPAA Security Compliance and How to Get There… John Parmigiani National.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Addressing Unauthorized Release of Personal Information at UC Davis August 12, 2003.
© Copyright 2010 Hemenway & Barnes LLP H&B
1 Introduction to Auditing Auditing allows you to track User activities. Microsoft Windows 2000 activities. Windows 2000 records events in the security.
Information Security Standards 2015 Update IIPS Security Standards Committee Roderick Brower - Chair.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Configuring, Managing and Maintaining Windows Server® 2008 Servers Course 6419A.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Chapter 3 Pre-Incident Preparation Spring Incident Response & Computer Forensics.
Personal data protection in research projects
IDENTITY FINDER TRAINING. What is Identity Finder?  Identity Finder is a program that is installed on your desktop, laptop, or server to locate personally.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Security Bob Cowles
Canada’s Breach Reporting Law What you need to know Timothy M. Banks, CIPP/C Dentons Canada LLP July 21, 2015.
POLICIES & PROCEDURES FOR HANDLING CONFIDENTIAL INFORMATION NOVEMBER 5 TH 2015.
Introduction to PCI DSS
ISMS Information Security Management System
Information Security Board
Unfortunately, any small business could face the risk of a data breach or cyber attack. Regardless of how big or small your business is, if your data,
Protecting Personal Information Guidance for Business.
Move this to online module slides 11-56
Security Awareness Training: System Owners
Red Flags Rule An Introduction County College of Morris
County HIPAA Review All Rights Reserved 2002.
Information Security Awareness
What You MUST Do Be aware of what constitutes Personally Identifiable Information (PII) Protect this information and passwords that.
EDUCAUSE Security Professionals Conference 2018 Jason Pufahl, CISO
Unit 4 IT Security Kerris Davies.
Lesson 2: Epic Security Considerations
Introduction to the PACS Security
What You MUST Do Be aware of what constitutes Personally Identifiable Information (PII) Protect this information and passwords that.
Presentation transcript:

General Awareness Training Security Awareness Module 3 Take Action! Where To Go for Help

2 Take Action! Evaluate your environment and make personal department hygiene changes Use passwords on all secure systems and files, and change your password frequently. All University computer users should at the very least maintain passwords for logging on to their computers. Do not write down your password and leave it someplace that is easy to find (like under your computer keyboard or in a side drawer) Use passwords for sensitive files or documents. Return

3 Take Action! Do not use simple, easy-to-guess passwords. Use passwords that include numbers and letters. Immediately contact IT if you believe there has been a breach of computer security. Credit card information should not be stored on individual computers. Storage of social security numbers should be minimized Contractual compliance obligations and requirements for IR Protect your identity, change password often Return

4 Take Action! Share your information security responsibility and reduce liability Seek more information as it is appropriate for your position Return

5 Take Action! Again, computer security is every computer user’s responsibility. The IT staff, namely the information security officer and his designee, should be contacted when any computer user has reason to believe that a breach of computer security has occurred Return

6 Where do I go for Help? Information Technology ServicesExtensions Access Control Account Management Application and Operational Assessment Computer Configuration Management Certification Patch Management Reporting Security Incident Risk Assessment Security Incident Spyware Training Virus and Worm Software