Grants Management Training 200 Cyber Security There are two kinds of people in America today: Those who have experienced a cyber-attack and know it, and.

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

SECURITY CHECK Protecting Your System and Yourself Source:
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Protecting Your Identity: What to Know, What to Do.
Deter, Detect, Defend: The FTC’s Program on Identity Theft.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Fraud, Scams and ID Theft …oh my! Deb Ramsay ESD 101 Chief Information Officer Technology Division.
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
8 Mistakes That Expose You to Online Fraud to Online Fraud.
Bsharah Presentation Threats to Information Security Protecting Your Personal Information from Phishing Scams.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Smartphone Security How safe are you?. Main Points 1. Malware/Spyware 2. Other Mischief 3. How a phone might get infected 4. Staying Safe a. Malware b.
Internet Security Awareness Presenter: Royce Wilkerson.
Hey check out this cool PHISHING presentation! Benjamin Ross Lyerly.
STOP.THINK.CONNECT™ A NATIONAL CYBERSECURITY AWARENESS CAMPAIGN OLDER AMERICANS PRESENTATION.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
Internet Fraud By: Noelle Woodman.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
Securing Your Home Computer Presenter: Donnie Green Date: February 11, 2009 National Aeronautics and Space Administration
Threats to I.T Internet security By Cameron Mundy.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Information Security and YOU!. Information Assurance Outreach Information Security Online Security Remote Access with Demonstration The Cloud Social.
Staying Safe Online Keep your Information Secure.
IT security By Tilly Gerlack.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
People use the internet more and more these days so it is very important that we make sure everyone is safe and knows what can happen and how to prevent.
Personal Privacy and Security Zenia C. Bahorski Ph.D. Department of Computer Science Eastern Michigan University Personal Privacy & Security - Z. Bahorski,
Cyber Security Anchorage School District – 7 th grade Internet Safety.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Computer Security Hacking, Phishing, Passwords Kausalya S. And Sushil Mujumdar (CCCF) 04 - Aug - 15.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholder to insert your own image. Cyber.
Cyber Security and Staying Safe Online Mark D. Riley College of Health Sciences and Professions.
Cyber Safety Jamie Salazar.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
INTRODUCTION & QUESTIONS.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
DoS Attacks Phishing Keylogging Computer Laws/Acts.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
5.6- Demonstrate how to be a responsible consumer in the 21 st century Roll Call Question: Something that you learned in this unit.
OCTOBER IS CYBER SECURITY AWARENESS MONTH. October is Cyber Security Awareness Month  Our Cyber Security Awareness Campaign focuses on topics such as.
STOP.THINK.CONNECT™ A NATIONAL CYBERSECURITY AWARENESS CAMPAIGN Protecting Yourself and Your Family Online.
Presented By: Jennifer Thayer, SPHR, SHRM-SCP.  Identify CyberCrime and Types  Identify Steps to Take to Prevent Identity Theft  Learn Tips and Tricks.
1 Outline of this module By the end of this module, you will be able to: – Understand what is meant by “identity crime”; – Name the different types of.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Mobile Device Security Threats Christina Blakley Host Computer Security.
Safe Computing Practices. What is behind a cyber attack? 1.
Scott Hervoyavich December 6 th, 2011 CYBERCRIME.
Managing Money Workshop The National Autistic Society AGM
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Zeus Virus By: Chris Foley. Overview  What is Zeus  What Zeus Did  The FBI investigation  The virus for phones  Removal and detection  Conclusion.
By: Micah Stevens Identity Theft in the World Today.
Avoiding Frauds and Scams Barbara Martin-Worley Director, Consumer Fraud Protection 18 th Judicial District Attorney’s Office Serving Arapahoe, Douglas,
CURRENT STATUS OF CYBERCRIME  Security is the fastest growing service in IT  Cyber Crime Costs $750 Billion annually  70% of threats arrive via .
KASPERSKY INTERNET SECURITY FOR ANDROID. YOUR MOBILE DEVICES NEED PROTECTION More online communications and transaction are happening on tablets and phones.
Warm Up: Identity Theft: Quick Write 1. What is Identity Theft? 2. What is Fraud?
Information Technology Security Office of the Vice President for Information Technology New Employee Orientation II.
Information Security.
Cyber Security Awareness Workshop
Protect Your Computer Against Harmful Attacks!
Cybersecurity Awareness
Security in mobile technologies
Founded in 2002, Credit Abuse Resistance Education (CARE) educates high school and college students on the responsible use of credit and other fundamentals.
Presentation transcript:

Grants Management Training 200 Cyber Security There are two kinds of people in America today: Those who have experienced a cyber-attack and know it, and those who have experienced a cyber-attack and don’t know it. –Frank Wolf Which one are you?

Grants Management Training 200 SAME SECURITY RULES APPLY WITH SMART PHONES AND SOCIAL NETWORKING 91% of Targeted Attacks Start with a Phishing

Grants Management Training 200 Universities are a prime target for hackers In 2015, at least 9 major universities were victims of cyber-attacks

Grants Management Training 200

Grants Management Training shtml

Grants Management Training 200

Grants Management Training 200

Grants Management Training 200

Grants Management Training 200

Grants Management Training ding_up_to_3m_to.html

Grants Management Training /

Grants Management Training 200

Number of spam/phishing s UNM IT blocks DAILY 1-3 MILLION If one gets through, forward to:

Grants Management Training 200 Why Universities? Universities are prime targets for hackers because of the vast amounts of personal and technological data that they store Universities are on the cutting edge of science and technology creating next generation technology that is coveted worldwide The cornerstone for academic research institutions is collaboration. This fundamental aspects makes universities a soft target

Grants Management Training 200 Your information is out there

Grants Management Training 200

Cyber Crime 6 BILLION scams sent out monthly! CYBER CRIME COST CONSUMERS $113 BILLION ANNUALLY! 110 million Americans, about 47% of American adults, lost some personal information to hackers in Cyber Attacks on U.S. Companies in Target/Kmart Home Depot PF Changs/Chick-fil-a/Jimmy Johns/Dairy Queen Michaels Ebay JP Morgan Chase Sony Blue Cross

Grants Management Training 200

It just takes ONE to start the virus When a virus infects UNM computers a hacker can obtain every document stored on your UNM computer/network Personal Information Research

Grants Management Training 200 TRUST YOUR GUT YOU have to do something to be attacked! NEVER click on “Click Here” or embedded links! NEVER give personal information to ANYONE over the phone/internet NOTHING is free

Grants Management Training 200 Hover, Don’t click Before Clicking On Any Links in , FB,Twitter, LinkedIn, etc., You Should Always Hover Your Mouse Over The Links To Check Their Real Destination.

Grants Management Training 200 Sender is a UNM employee whose account was compromised

Grants Management Training 200

This was an that was sent out to the UNM Community from The actual sender used a system in Italy

Grants Management Training 200

Antivirus software can only protect you from known viruses Kaspersky Lab is detecting 315,000 new malicious files every day

Grants Management Training 200 Fake Virus Alerts

Grants Management Training 200 What other ways can you get a virus?

Grants Management Training 200 Allow remote access? Never

Grants Management Training 200

WHAT TO DO IF YOU’VE RESPONDED TO A PHISHING SCAM: Report the incident -FTC, FBI, Secret Service, UNM IT Change the passwords on all your online accounts Routinely review your credit card and bank statements Place a fraud alert on your credit report

Grants Management Training 200 Cell Phone Location Tracking Apple iphone : Android:

Grants Management Training 200 MOBILE PHONE THREATS USE SAME PRECAUTIONS ON A MOBILE DEVICE AS YOU WOULD USE ON A COMPUTER Do not use passwords on public Wi-Fi Install vendor approved anti-virus software. Have passcode to log into phone Don’t ask someone to take your photo with your phone Do not save passwords, PINs or other account information as Contacts or in Notes. Do not download software updates while logged into a Wi-Fi network. Install tracking tools to track lost and stolen devices. Install remote wiping tools. Disable GPS feature when taking and sending photos

Grants Management Training 200 OTHER TRAINING OFFERED Cyber Security – Phishing: How Not To Become a Victim of Fraud Social Networking Security Laptop and Cell phone Security International Travel Security Workplace Violence Identity Theft Deb Kuidis