Grants Management Training 200 Cyber Security There are two kinds of people in America today: Those who have experienced a cyber-attack and know it, and those who have experienced a cyber-attack and don’t know it. –Frank Wolf Which one are you?
Grants Management Training 200 SAME SECURITY RULES APPLY WITH SMART PHONES AND SOCIAL NETWORKING 91% of Targeted Attacks Start with a Phishing
Grants Management Training 200 Universities are a prime target for hackers In 2015, at least 9 major universities were victims of cyber-attacks
Grants Management Training 200
Grants Management Training shtml
Grants Management Training 200
Grants Management Training 200
Grants Management Training 200
Grants Management Training 200
Grants Management Training ding_up_to_3m_to.html
Grants Management Training /
Grants Management Training 200
Number of spam/phishing s UNM IT blocks DAILY 1-3 MILLION If one gets through, forward to:
Grants Management Training 200 Why Universities? Universities are prime targets for hackers because of the vast amounts of personal and technological data that they store Universities are on the cutting edge of science and technology creating next generation technology that is coveted worldwide The cornerstone for academic research institutions is collaboration. This fundamental aspects makes universities a soft target
Grants Management Training 200 Your information is out there
Grants Management Training 200
Cyber Crime 6 BILLION scams sent out monthly! CYBER CRIME COST CONSUMERS $113 BILLION ANNUALLY! 110 million Americans, about 47% of American adults, lost some personal information to hackers in Cyber Attacks on U.S. Companies in Target/Kmart Home Depot PF Changs/Chick-fil-a/Jimmy Johns/Dairy Queen Michaels Ebay JP Morgan Chase Sony Blue Cross
Grants Management Training 200
It just takes ONE to start the virus When a virus infects UNM computers a hacker can obtain every document stored on your UNM computer/network Personal Information Research
Grants Management Training 200 TRUST YOUR GUT YOU have to do something to be attacked! NEVER click on “Click Here” or embedded links! NEVER give personal information to ANYONE over the phone/internet NOTHING is free
Grants Management Training 200 Hover, Don’t click Before Clicking On Any Links in , FB,Twitter, LinkedIn, etc., You Should Always Hover Your Mouse Over The Links To Check Their Real Destination.
Grants Management Training 200 Sender is a UNM employee whose account was compromised
Grants Management Training 200
This was an that was sent out to the UNM Community from The actual sender used a system in Italy
Grants Management Training 200
Antivirus software can only protect you from known viruses Kaspersky Lab is detecting 315,000 new malicious files every day
Grants Management Training 200 Fake Virus Alerts
Grants Management Training 200 What other ways can you get a virus?
Grants Management Training 200 Allow remote access? Never
Grants Management Training 200
WHAT TO DO IF YOU’VE RESPONDED TO A PHISHING SCAM: Report the incident -FTC, FBI, Secret Service, UNM IT Change the passwords on all your online accounts Routinely review your credit card and bank statements Place a fraud alert on your credit report
Grants Management Training 200 Cell Phone Location Tracking Apple iphone : Android:
Grants Management Training 200 MOBILE PHONE THREATS USE SAME PRECAUTIONS ON A MOBILE DEVICE AS YOU WOULD USE ON A COMPUTER Do not use passwords on public Wi-Fi Install vendor approved anti-virus software. Have passcode to log into phone Don’t ask someone to take your photo with your phone Do not save passwords, PINs or other account information as Contacts or in Notes. Do not download software updates while logged into a Wi-Fi network. Install tracking tools to track lost and stolen devices. Install remote wiping tools. Disable GPS feature when taking and sending photos
Grants Management Training 200 OTHER TRAINING OFFERED Cyber Security – Phishing: How Not To Become a Victim of Fraud Social Networking Security Laptop and Cell phone Security International Travel Security Workplace Violence Identity Theft Deb Kuidis