Cyber Security Awareness Month Using Your Laptop Safely On the Road Off-Campus Safe Computing Part 2.

Slides:



Advertisements
Similar presentations
ANNUAL SECURITY AWARENESS TRAINING – 2011 UMW Information Technology Security Program Annual Security Awareness Training for UMW Faculty and Staff.
Advertisements

Computer and Mobile Device Equipment Security Brief May 29, 2008 Presented by: Kevin G. Sutton, Chief, Information Technology Unit.
Springfield Technical Community College Security Awareness Training.
1 Electronic Information Security – What Researchers Need to Know University of California Office of the President Office of Research May 2005.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
1.3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge.
Part 2 of Evil Lurking in Websites Data Security at the University of Wisconsin Oshkosh.
Information Security Confidential Two-Factor Authentication Solution Overview Shawn Fulton January 15th, 2015.
PII – Identifying and Managing Risk Presented by: UNL Office of Internal Audit and ITS Security March 2014.
Guide to Massachusetts Data Privacy Laws & Steps you can take towards Compliance.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
By: Monika Achury and Shuchita Singh
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 18, 20 & 25 March 2015.
Beyond WiFi: Securing Your Mobile Devices Thomas Kuhn Information Technology Assistance Center (iTAC) Kansas State University.
October is National Cyber Security Month OIT and IT providers are launching an awareness campaign to provide tips and resources to help you stay safe online.
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
October is National Cyber Security Month OIT and IT providers are launching an awareness campaign to provide tips and resources to help you stay safe online.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Data Security Overview ORSP Staff AT Desktop Service Team November 18th, 2014.
10 Essential Security Measures PA Turnpike Commission.
Protecting Sensitive Information PA Turnpike Commission.
Securing Information in the Higher Education Office.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
Security of Data. Key Ideas from syllabus Security of data Understand the importance of and the mechanisms for maintaining data security Understand the.
CS101 Lecture 14 Security. Network = Security Risks The majority of the bad things that can be done deliberately to you or your computer happen when you.
Security Awareness ITS SECURITY TRAINING. Why am I here ? Isn’t security an IT problem ?  Technology can address only a small fraction of security risks.
How to Backup FNC Files to Corporate Network Using Windows XP Created By: Ricardo G. Mesa, Systems Administrator Date: January 17, 2006.
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 2 This material was developed by Oregon Health & Science University,
Todd Berrett Director, Server and Storage Solutions Office of Information Technology Brigham Young University 2205 ITB Provo, UT Office: (801)
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Best Practices for Protecting Data. Section Overview Mobile Computing Devices Technical Procedures Data Access and Permissions Verbal Communication Paper.
Computer Security Preventing and Detecting Unauthorized Use of Your Computer.
Arkansas State Law Which Governs Sensitive Information…… Part 3B
PKI Development Forum Jim Lowe, Campus Information Security Officer Brian Rust, Communications April 17, 2008.
System Security Chapter no 16. Computer Security Computer security is concerned with taking care of hardware, Software and data The cost of creating data.
Computer Security Hacking, Phishing, Passwords Kausalya S. And Sushil Mujumdar (CCCF) 04 - Aug - 15.
STARTFINISH DisposePrint & ScanShareStore Protect information and equipment ClassifyProtect.
SPH Information Security Update September 10, 2010.
© Copyright 2010 Hemenway & Barnes LLP H&B
SECURITY OF DATA By: ADRIAN PERHAM. Issues of privacy; Threats to IT systems; Data integrity; Standard clerical procedures; Security measures taken to.
Joel Rosenblatt Director, Computer and Network Security September 10, 2013.
Data Breach: How to Get Your Campus on the Front Page of the Chronicle?
Minding your business on the internet Kelly Trevino Regional Director October 6,2015.
Information Technology Acceptable Use Policy The acceptable use policy (AUP) is a document stipulating constraints and practices that a user must agree.
Cyber Security Awareness Month Protecting Your Laptop’s Data Off-Campus Safe Computing Part 1.
October is National CyberSecurity Awareness Month OIT and IT providers across campus are launching an awareness campaign to provide tips and resources.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Physical security By Ola Abd el-latif Abbass Hassan.
Computer Networks. Computer Network ► A computer network is a group of computers that are linked together.
IDENTITY FINDER TRAINING. What is Identity Finder?  Identity Finder is a program that is installed on your desktop, laptop, or server to locate personally.
CSCE 201 Identification and Authentication Fall 2015.
1.7.2.G1 © Family Economics & Financial Education – Revised May 2005 – Financial Institutions Unit – Electronic Banking Funded by a grant from Take Charge.
OCTOBER IS CYBER SECURITY AWARENESS MONTH. October is Cyber Security Awareness Month  Our Cyber Security Awareness Campaign focuses on topics such as.
Treat it like it’s yours: best practices for handling student transcript data Bob Hughes Application Support Manager North Orange County CCD CCCTran Steering.
Common sense solutions to data privacy observed by each employee is the crucial first step toward data security Data Privacy/Data Security Contact IRT.
Access control Presented by: Pius T. S. : Christian C. : Gabes K. : Ismael I. H. : Paulus N.
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
Data Breach ALICAP, the District Insurance Provider, is Now Offering Data Breach Coverage as Part of Our Blanket Coverage Package 1.
The new starbucks Jill E. Farris.
A Lawyer’s Ethical Duties Regarding Electronically Stored Information
An Introduction to Phishing and Viruses
Understanding The Computer Login Account
Protection of CONSUMER information
Information Security 101 Richard Davis, Rob Laltrello.
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Level 2 Diploma Unit 11 IT Security
Dos and Don’ts.
Computer Security.
Security Hardening through Awareness August 2018
Module 2 OBJECTIVE 14: Compare various security mechanisms.
Presentation transcript:

Cyber Security Awareness Month Using Your Laptop Safely On the Road Off-Campus Safe Computing Part 2

Introductions Allen Monette Security Coordinator Office of Campus Information Security

OCIS Brown Bag Series Worst Practices, or 10 Easy Steps to Loosing Your Data Protecting Your Laptop’s Data Using Your Laptop Safely on the Road Finding and Protecting Sensitive Data on Your Computer Protecting Data by Using Network and Server Scanning Tools

Rick’s Road Trip

Rick’s New Laptop

Rick visits his favorite coffee shop

Hey, Free Wi Fi!

Rick on the Road

Rick’s New Laptop

Rick’s return

Account Balance: $0

2005 Wisconsin Act 138 requires entities to notify individuals of certain unauthorized acquisitions of personal information. “Personal information” means an individual’s last name and the individual’s first name or first initial, in combination with and linked to any of the following elements, if the element is not publicly available information and is not encrypted, redacted, or altered in any manner that renders the element unreadable: (a) the individual’s Social Security number; (b) the individual’s driver’s license number or state identification number; (c) the number of the individual’s financial account number, including a credit or debit card account number, or any security code, access code, or password that would permit access to the individual’s financial account; (d) the individual’s DNA profile; and (e) the individual’s unique biometric data, including fingerprint, voice print, retina or iris image, or any other unique physical characteristic.

Let’s go Back In Time

Rick isn’t a bad user Did work to secure his computer What he did is good for a desktop on a protected network Not so good for the wilds of Free WiFi

Credit Card What happened?

Solutions What to do?

Solutions File on desktop –don’t store that data! –If you must store it, encrypt it! –Lock your workstation; use screensaver passwords –Don’t leave your laptop unattended Be aware of those around you

+ Break-in What happened?

Solutions What to do?

Solutions Know how to spot a phishing attempt Use different credentials for different accounts Use a VPN

Laptop Lost; Cash gone What happened?

Solutions What to do?

Solutions OS hardening –require username/password to login Encrypt! Use removable storage; better yet use network storage Lojack for laptops Security screening line strategies

Rules of the Road 1.Store no data locally 2.Since we know 1 is hard: Encrypt! 3.Practice Defensive Networking – Use VPN 4.Know where your laptop is at all times

Questions?