Joel Rosenblatt Director, Computer and Network Security September 10, 2013.

Slides:



Advertisements
Similar presentations
Surfing the net: Ways to protect yourself. Internet Safety Look into safeguarding programs or options your online service provider might offer. Look into.
Advertisements

How to protect yourself, your computer, and others on the internet
1 of 2 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2006 Microsoft Corporation.
Presented by the San Diego Industrial CI Awareness Working Group, an Affiliate of the Industrial Security Awareness Council.
Smartphone and Mobile Device Security IT Communication Liaisons Meeting October 11, 2012 Theresa Semmens, CITSO.
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Helping our customers keep their computers safe.  Using your pet’s, business, family, friend’s names  Using number or letter sequences (0123, abcd)
Invasion of Smart Phones in Clinical Areas Chrissy Kyak Privacy Officer University of Maryland Upper Chesapeake Health.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 25 & 27 November 2013.
SECURITY CHECK Protecting Your System and Yourself Source:
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Part 2 of Evil Lurking in Websites Data Security at the University of Wisconsin Oshkosh.
Critical Data Management Indiana University HR Summit April 24, 2014.
9/20/07 STLSecurity is Everyone's Responsibility 1 FHDA Technology Security Awareness.
Information Security Awareness:
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 18, 20 & 25 March 2015.
Export Controls CBP is Turning up the Heat and the “ICE” is Not Melting April 2008 NCURA Western Regional Conference Adilia F. Koch.
Beyond WiFi: Securing Your Mobile Devices Thomas Kuhn Information Technology Assistance Center (iTAC) Kansas State University.
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
1 Enterprise Security Your Information Security and Privacy Responsibilities © 2008 Providence Health & Services This information may be replicated for.
10 Essential Security Measures PA Turnpike Commission.
Information Security Information Technology and Computing Services Information Technology and Computing Services
Securing Information in the Higher Education Office.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
Program Objective Security Basics
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
CS101 Lecture 14 Security. Network = Security Risks The majority of the bad things that can be done deliberately to you or your computer happen when you.
Hacking Phishing Passwords Sourendu Gupta (TIFR).
ESCCO Data Security Training David Dixon September 2014.
1.1 System Performance Security Module 1 Version 5.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
IT Security Essentials Lesley A. Bidwell, IT Security Administrator.
Wireless Security: Protect yourself when you’re mobile.
Information Systems Services How to Protect Yourself On-Line – Keeping Safe At Home Neil Jowsey, IT Security Team 25 th September 2013.
Legal Division CSAA Insurance Group, a AAA Insurer Protecting Your Identity: What to Know, What to Do 2015 Risky Business Week.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
Personal Privacy and Security Zenia C. Bahorski Ph.D. Department of Computer Science Eastern Michigan University Personal Privacy & Security - Z. Bahorski,
Privacy and Information Management ICT Guidelines.
Safeguarding Your Privacy Section 1.3. Safeguarding Your Privacy 1. What is Identity Theft? 2. Research a story on identity theft and be prepared to report.
Copyright ©: SAMSUNG & Samsung Hope for Youth. All rights reserved Tutorials The internet: Staying safe online Suitable for: Beginner.
INFORMATION SECURITY WHAT IS IT? Information Security The protection of Information Systems against unauthorized access to or modification of information,
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
Computer Security Hacking, Phishing, Passwords Kausalya S. And Sushil Mujumdar (CCCF) 04 - Aug - 15.
WE ARE DATA By Hazim Zaidani Do you really think that your personal data is protected ? Well… Think Again !!!
STARTFINISH DisposePrint & ScanShareStore Protect information and equipment ClassifyProtect.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
Protecting Your Identity: Information Security Basics Presented by:Barbara D. Kissner SVP & CIO International Fidelity Insurance Company March 18, 2014.
The Office Procedures and Technology
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Information Security Everyday Best Practices Lock your workstation when you walk away – Hit Ctrl + Alt + Delete Store your passwords securely and don’t.
OCTOBER IS CYBER SECURITY AWARENESS MONTH. October is Cyber Security Awareness Month  Our Cyber Security Awareness Campaign focuses on topics such as.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Computer Security Sample security policy Dr Alexei Vernitski.
Common sense solutions to data privacy observed by each employee is the crucial first step toward data security Data Privacy/Data Security Contact IRT.
Traveling Securely. Unsecured Networks and browsing  Using Unsecured Networks –Hotels, airports, coffee shops, libraries, etc Anywhere you do not know.
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
Risky Business Week Protecting Your Identity: What to Know, What to Do Legal Division CSAA Insurance Group, a AAA Insurer.
PUBLIC COMPUTER SAFETY
Library IT - Security and Remote Access
Out of sight, out of….. control?
Information Security.
Staying Austin College
Things To Avoid: 1-Never your password to anyone.
Information Security Awareness 101
Protecting Your Identity:
Digital $$ Quiz Test your knowledge.
Preparing for GDPR Sharing experiences of the process and using the British Canoeing Toolkit bit.ly/BCGDPRToolkit
Presentation transcript:

Joel Rosenblatt Director, Computer and Network Security September 10, 2013

 Heightened Risks ◦ Theft of equipment  Try not to look like a tourist  Never leave your bags unwatched  Be aware of your surroundings ◦ Theft of credentials  Don’t use hotel business centers or web cafés to check your , bank accounts, stock accounts, etc.  There is a good chance that they have key logging programs installed  Don’t use unknown WiFi networks  If you don’t know, ask

 Backups of your data ◦ Backup everything before you leave  If your only copy gets stolen, you’re in trouble ◦ Take more than one copy of your presentations  Don’t keep them in the same place  yourself a copy  Send a copy to the conference organizers

 For domestic travel ◦ Any device containing University sensitive data  Must have a strong password  Must have a locking screensaver  Must be encrypted  This includes ◦ Laptops ◦ Tablets ◦ Cell Phones ◦ External Storage (the encryption part)

 Before you go … ◦ Check to make sure your machine is up to date  Check updates for OS, AV, and all applications ◦ Make sure you have all of your gadgets, and only take the ones you really need  Chargers, cables, any anything else you may need  For foreign travel, you will need plug converters ◦ Test your presentation  Better to do that here, then have to call the Help Desk long distance

 International travel is not the same as Domestic travel ◦ Different laws ◦ Different expectations of privacy ◦ Language differences may make for complicated interactions

 Don’t take sensitive data with you ◦ See Data Classification policy  ◦ Loss of data through theft, seizure or search can get very complicated ◦ If your equipment is not in your possession at all times, you should assume that the hard drive may have been copied ◦ Even if device is encrypted, you may be required to supply the password in order to clear customs ◦ If sensitive data is required, make arrangements to download data using a secure encrypted link (VPN) and securely delete data when you are done using it

 Protect your data in case of loss or theft ◦ Encrypt your device (supported devices) ◦ Use a strong password and device timeout  Setting a password on a smart phone encrypts the data ◦ Consider using auto wipe – 10 bad password guesses and the device gets erased (smart phones) ◦ If you downloaded data for a meeting, remember to securely erase it when the meeting is over  Data you do not have cannot be compromised

 Protect your identity ◦ Do not use the same password for multiple resources  Never use your UNI password for another resource ◦ Don’t log into any resource on a “free” computer ◦ Don’t use unidentified WiFi networks ◦ Random web surfing can be very risky, don’t do it ◦ If a web site looks different, don’t use it ◦ Change your password(s) when you get back using a secure computer

 Protect your devices ◦ Backup your devices before you leave ◦ Install all updates before you go (including AV)  Installing updates while traveling is risky ◦ Consider taking a bare bones or loaner system on your trip – speak to your department ◦ Check that any software you are traveling with is allowed in the country you are going to – See:  columbia-international-travelers columbia-international-travelers ◦ Don’t cook your device, make sure you have the proper converters

 Travel between countries – Crossing the border ◦ Carrying data across the border can be especially risky  Border control officers can request that you enter passwords and take your machine away for inspection  If you refuse, you or your device may be detained ◦ If your device is seized, try and get documentation  Contact the U.S. Embassy or Consulate for advice  If your device is taken by the U.S. customs, contact Columbia University’s department of Export control 

 Travel with electronic devices and data presents additional risks.  Situational awareness is essential for security.  Personal safety is of the highest priority. When an official request is made, turn over the device.  You can send questions to