Protecting Your Identity: Information Security Basics Presented by:Barbara D. Kissner SVP & CIO International Fidelity Insurance Company March 18, 2014.

Slides:



Advertisements
Similar presentations
Online Privacy A Module of the CYC Course – Personal Security
Advertisements

Surfing the net: Ways to protect yourself. Internet Safety Look into safeguarding programs or options your online service provider might offer. Look into.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Internet Safety Gleneagles Computer Club February 16, 2015 by Deborah Benson.
SECURITY CHECK Protecting Your System and Yourself Source:
1 Identity Theft and Phishing: What You Need to Know.
1. 2 Someone steals your personal information to commit fraud. A “buy now, pay never” shopping experience. What is Identity Theft?
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
INTERNET SAFETY FOR EVERYONE A QUICK AND EASY CRASH COURSE.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
ONLINE SAFETY Online safety Money Works: Level 1 Topic 3.
Social Networking Systems: Education Awareness Briefing.
1 Enterprise Security Your Information Security and Privacy Responsibilities © 2008 Providence Health & Services This information may be replicated for.
Joel Garmon, Director, Information Security Mike Rollins, Security Architect Jeff Teague, Security Analyst, Senior 1
How To Protect Your Privacy and Avoid Identity Theft Online.
+ An Introduction to Safety on the Internet 1 Material and Advice provided by:
Security Liaisons Information Presentation. Introduction  What’s the big deal with computer security? Don’t we have an IT security department to take.
September 2007 General Security Basics Your Responsibilities for Safe Computing.
Information Security Information Technology and Computing Services Information Technology and Computing Services
How To Protect Your Privacy and Avoid Identity Theft Online.
Contents  Viruses Viruses  Computer Worms Computer Worms  Trojans Trojans  Spyware Spyware  Adware Adware  Spam Spam  Hoaxes and Scams Hoaxes and.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
© 2006 Consumer Jungle Minimizing Online Risks. © 2006 Consumer Jungle 15 Steps to Minimizing Online Risks 1.Update your operating system 2.Use a firewall.
Have You Lost Your Identity? By Sierra Bowland. Deter Detect Defend.
Keeping Information Safe Task 4. Basic security measures Passwords Change password on regular basis Do not use names or words easily linked to yourself.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Security Awareness ITS SECURITY TRAINING. Why am I here ? Isn’t security an IT problem ?  Technology can address only a small fraction of security risks.
ESCCO Data Security Training David Dixon September 2014.
Stay Safe & Secure Online. Outline Passwords Everyday Security Security Physical Security Protecting Personal Information.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Identity Theft What is Identity Theft?  Identity theft is a serious crime. Identity theft happens when someone uses information about you without your.
November 10,  Acceptable use  Internet Filtering  Social Web (MySpace, Facebook, etc.)  Cyberbullying  Plagiarism  Phishing.
Everyday Cyber Security April 27 th Why Should You Care? Ensuring your privacy and security Protecting yourself and others Practicing safe internet.
Be Cautious of Identity Theft By: Sydney Langley.
Safe Use of Social Media Cadets – Air Force’s Future.
Ms. Park.  Q&A: What are some Internet safety tips you already know?
Computer Security Hacking, Phishing, Passwords Kausalya S. And Sushil Mujumdar (CCCF) 04 - Aug - 15.
advantages The system is nearly universal because anyone who can access the Internet has an address. is fast because messages.
How can IT help you today?. Agenda Why Do You Care? What Are The Risks? What Can You Do? Questions? How can IT help you today? 2.
Personal Online Safety Information Security Systems Community Outreach Program McKinley Middle School April 23, 2013.
INTERNET: The Good, The Bad and The Ugly
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Joel Rosenblatt Director, Computer and Network Security September 10, 2013.
safety Bailey mullan. dangers ing has become on of the main sources for communicating. When using it is more likely for someone.
Internet Safety Internet Safety LPM
Internet 1) John R. Levine, Margaret Levine Young, The Internet for Dummies. Wiley Publishing, 12 th Edition, 2010.
Activity 4 Catching Phish. Fishing If I went fishing what would I be doing? On the Internet fishing (phishing) is similar!
Cyber Safety Jamie Salazar.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
REACTION AND ACTION RESPONDING TO FRAUD 1. THE VICTIMS THE CON IS TAILORED TO THE PROSPECTIVE VICTIMS. 2.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
A Quick and Easy Crash Course Internet Safety for Everyone.
OCTOBER IS CYBER SECURITY AWARENESS MONTH. October is Cyber Security Awareness Month  Our Cyber Security Awareness Campaign focuses on topics such as.
STOP.THINK.CONNECT™ A NATIONAL CYBERSECURITY AWARENESS CAMPAIGN Protecting Yourself and Your Family Online.
Presented By: Jennifer Thayer, SPHR, SHRM-SCP.  Identify CyberCrime and Types  Identify Steps to Take to Prevent Identity Theft  Learn Tips and Tricks.
Common sense solutions to data privacy observed by each employee is the crucial first step toward data security Data Privacy/Data Security Contact IRT.
Digital & Internet Safety. Understanding your personal data Defining “Big Data” Protecting your data, computer & devices Avoiding identity theft.
Computer Security Keeping you and your computer safe in the digital world.
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
Avoiding Frauds and Scams Barbara Martin-Worley Director, Consumer Fraud Protection 18 th Judicial District Attorney’s Office Serving Arapahoe, Douglas,
PUBLIC COMPUTER SAFETY
Done by… Hanoof Al-Khaldi Information Assurance
Learn how to protect yourself against common attacks
How to use the internet safely and How to protect my personal data?
Information Security 101 Richard Davis, Rob Laltrello.
Cybersecurity Awareness
Internet Safety – Social Media
Presentation transcript:

Protecting Your Identity: Information Security Basics Presented by:Barbara D. Kissner SVP & CIO International Fidelity Insurance Company March 18, /18/20141

Biography Barbara Kissner International Fidelity Insurance Company Senior Vice President, Chief Information Officer Barbara Kissner joined International Fidelity Insurance Company in 2007 as SVP and Chief Information Officer. Her responsibilities include management of the company’s telecommunications, IT and Licensing departments as well as overseeing the company’s Disaster Recovery plan and IFIC’s Regulatory Committee. Prior to joining IFIC, Barbara served as the Chief Information Security Officer for BankAtlantic in Fort Lauderdale, FL, and Senior Vice President of Global IT Risk Management for The CIT Group. Barbara has authored many published articles on subjects ranging from e-commerce to information engineering and holds the CISA, CSTE, CSQA, CGEIT and CRISC designations. This year, she has been named one of Computerworld’s Premier 100 IT Honorees for /18/20142

Agenda Security Awareness Requests for confidential information Unexpected and attachments SPAM Internet safety Phishing attempts Protecting your laptop and yourself Q&A 3/18/20143

What is Security Awareness? … it is the knowledge and attitude members of an organization possess regarding the protection of the physical and, especially, information assets of that organization. ( Wikipedia ) 3/18/20144

Requests for Confidential Information Do not provide confidential information to unknown sources This is especially true for unsolicited and telephone calls Verify who is asking before you respond Spoofers use professional sounding names and organizations to get you to reveal information Legitimate companies do not ask you to “verify” SSN, PIN, date of birth, account number through 3/18/20145

Unexpected Attachments If you receive from an unknown source, don’t open it Never open or forward unexpected attachments Do not respond to SPAM No, you did not win that free trip Those guys are not really going to put $30 million in your bank account Do not open or forward chain letters Do not “unsubscribe” from an unknown list or SPAM: To unsubscribe from this mailing list: click here or send a blank message to: 3/18/20146

Spam 3/18/20147

More Spam 3/18/20148

And More, Dangerous Spam 3/18/20149

Internet Safety Firewalls are a must, even for Macs Buy AntiVirus and AntiSpyware and install them on every computer in your home Wireless Networks Turn off SSID broadcasting – this tells everyone in the neighborhood who you are Change the installation passwords – everyone knows them Enable WPA encryption Know the names of the machines on your network and regularly look for intruders 3/18/201410

3/18/ Look For Security Features LOCK HTTPS Windows Explorer

Other Browsers 3/18/ Google Chrome Firefox Safari

Social Websites Popular social sites include Facebook, LinkedIn, Pinterest, Instagram Anything you post can be discovered Prospective employers, universities and corrections agencies regularly scan these sites Remember, even if you delete your entries or responses, someone already has a copy 3/18/201413

Phishing – Part 1 3/18/201414

Phishing – Part 2 3/18/201415

Protect Your Laptops and Phones 3/18/ Store in secure place when you leave your office Keep out of view when stored in your car Don’t leave unattended in public places Be especially careful in airports and train stations Watch out for Spam text messages on cell phones Be wary of strangers asking to borrow your phone

In Conclusion You can protect personal information and your Identity Don’t respond to Spam Use firewalls, AntiVirus, AntiSpyware at home Look for security features like HTTPS and the Use caution when asked for sensitive information Keep track of your personal articles, including cell phones and laptops If something doesn’t look right, it probably isn’t!

Questions? 3/18/ Barbara D. Kissner International Fidelity Insurance Company 973/ x259