Desktop computer security policies Applies to ALL computers connecting to the PathStone network irrespective of device ownership.

Slides:



Advertisements
Similar presentations
Rockingham County Public Schools Technology Acceptable Use Policy
Advertisements

Computing Issues that Affect Us All lesson 30. This lesson includes the following sections: Computer Crime Computer Viruses Theft Computers and the Environment.
Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.
Security Training Lunch ‘n Learn. Agenda  Threat Analysis  Legal Issues  Threat Mitigation  User Security  Mobile Security  Policy Enforcement.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Online Course START Click to begin… Module 2 General Information Security.
Guide to Massachusetts Data Privacy Laws & Steps you can take towards Compliance.
Malicious Attacks By: Albert, Alex, Andon, Ben, Robert.
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
Protecting Yourself Online. VIRUSES, TROJANS, & WORMS Computer viruses are the "common cold" of modern technology. One in every 200 containing.
Spring Definitions  Virus  A virus is a piece of computer code that attaches itself to a program or file so it can spread.
By Mrs. Smith DATA INTEGRITY AND SECURITY. Accurate Complete Valid Data Integrity.
Software utilities Gladys Nzita-Mak. Disk defragmentation Disk defragmentation makes computers run efficiently. When you save, change or delete files.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
SUS Services ECE Computer Facilities. SUS Services Software Update Services Microsoft Security And Critical Update Service Microsoft Security And Critical.
11 MAINTAINING THE OPERATING SYSTEM Chapter 5. Chapter 5: MAINTAINING THE OPERATING SYSTEM2 CHAPTER OVERVIEW  Understand the difference between service.
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
The Impact of Physical Security on Network Security
First Community Bank Prevx Safe Online Rollout & Best Practice Presentation.
Understanding the spreading patterns of mobile phone viruses Presented by Sundararaman Natarajakumar Submitted to Prof.Dr. Eduard Heindl.
Section Seven: Information Systems Security Note: All classified markings contained within this presentation are for training purposes only.
Staying Safe. Files can be added to a computer by:- when users are copying files from a USB stick or CD/DVD - downloading files from the Internet - opening.
Open up Evernote, mini whiteboards.  2 minutes – write down as many as you can think of.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Current Job Components Information Technology Department Network Systems Administration Telecommunications Database Design and Administration.
IT Security Essentials Lesley A. Bidwell, IT Security Administrator.
User Manager Pro Suite Taking Control of Your Systems Joe Vachon Sales Engineer November 8, 2007.
1 Secure Telework Connectivity Peggy Ward Chief Information Security Officer July 22,
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously.
Blueberry Software IT Security Audit Results. Results: Good.
Chapter 18 Technology in the Workplace Section 18.2 Internet Basics.
Homework #2 John Bach IST 110 Section 031 JMB6824 9/15/2012.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
SECURITY OF INFORMATION Unit 3c. Click to return to Sum up page HOW TO PROTECT DATA AND COMPUTERS Computers can be locked in a room CCTV and alarms to.
How to protect your computer By: Emily, Jackie and Kathleen.
Chapter 2 Securing Network Server and User Workstations.
Small Business Security Keith Slagle April 24, 2007.
Computer Literacy for IC 3 Unit 1: Computing Fundamentals © 2010 Pearson Education, Inc. | Publishing as Prentice Hall.1 Chapter 4: Identifying Software.
Malicious Attacks By: Albert, Alex, Andon, Ben, Robert.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Operational Circular No 5 Use of CERN Computing Facilities.
FIT03.05 Explain features of network maintenance.
TRUENORTH TECHNOLOGY POLICIES OVERVIEW. This includes but is not limited to : – Games – Non-work related software – Streaming media applications – Mobile.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
ITACS L.L.P. Policy And Procedures Group 1. Objective: To establish companywide policy with regards to personal device usage both on and off of the company.
© 2013 Toshiba Corporation B2B PC Training Mailer - Toshiba Device Access Control.
Microsoft ® Official Course Module 6 Managing Software Distribution and Deployment by Using Packages and Programs.
Security Issues and Ethics in Education Chapter 8 Brooke Blanscet, Morgan Chatman, Lynsey Turner, Bryan Howerton.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Safe Computing Practices. Outline Objective Safe Computing Defined Safe Computing Methods Summary List of References.
OCTOBER IS CYBER SECURITY AWARENESS MONTH. October is Cyber Security Awareness Month  Our Cyber Security Awareness Campaign focuses on topics such as.
Information Systems CS-507 Lecture 32. Physical Intrusion The intruder could physically enter an organization to steal information system assets or carry.
Chapter 3.  The advantages and disadvantages of: ◦ Client-Server Networks & ◦ Peer-to-Peer Networks.
Computer Security Sample security policy Dr Alexei Vernitski.
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
Appendix A: Designing an Acceptable Use Policy. Overview Analyzing Risks That Users Introduce Designing Security for Computer Use.
Managing Windows Security
Computing Issues that Affect Us All
Definition, DIS/Advantages & Services
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Lesson #7 MCTS Cert Guide Microsoft Windows 7, Configuring Chapter 7 Configuring Devices and Updates.
Information Security Awareness
What is Information Security?
Student User Agreement and Policy 2022
Computing Issues that Affect Us All
Computing Issues that Affect Us All
Cybersecurity at WAJ What is it? Are we at risk?.
Presentation transcript:

Desktop computer security policies Applies to ALL computers connecting to the PathStone network irrespective of device ownership

Antivirus All computers must have an approved, functioning, and up to date antivirus software. Antivirus software must be set to auto update virus definitions daily

Manual logoff or lock When leaving a computer, laptop, company cell phone, iPad, or other computing device unattended, staff must manually logoff or lock the device to prevent unauthorized access to PathStone systems or information.

Compromised or virus infected computers Must have their network connection disabled to prevent spread of infection or illegal activities.

Security patching All computers must have an automated procedure for maintaining current patch levels. All applicable critical security patches must be installed within 48 hours of patch release by the vendor.

Prohibited use of Information Technology Resources Peer to Peer File Sharing Installation or use of peer to peer file sharing software such as Kazaa, BitTorrent, DC++ (Direct connect) etc is not permitted on the PathStone network.

Prohibited use of Information Technology Resources Pornography Authorized users are not permitted to utilize the PathStone IT Resources to access pornographic material or to create, store or distribute pornographic material of any type.

Prohibited use of Information Technology Resources Gambling Authorized users are not permitted to utilize the PathStone's IT Resources to gamble.

Prohibited use of Information Technology Resources Installing, downloading, or running software that has not been approved for PathStone IT.