Download presentation
Presentation is loading. Please wait.
Published byOsborn Emil Sherman Modified over 8 years ago
1
INFORMATION SECURITY OFFICE D ECLUTTERING Y OUR D IGITAL L IFE N ATE H OWE Chief Information Security Officer Education – Partnership – Solutions
2
INFORMATION SECURITY OFFICE W HAT ’ S T HE P ROBLEM ? Information overload Consumerization of IT Distraction and short attention span More communication and less community Productivity tools, but are we less productive as we multitask? Plus, information security threats Education – Partnership – Solutions
3
INFORMATION SECURITY OFFICE T YPICAL U SER Desktop or laptop computer at home Desktop or laptop computer at work Smartphone Tablet Smart TV Wearable technology In-car technology Social media presence Education – Partnership – Solutions
4
INFORMATION SECURITY OFFICE L ET ’ S S TART W ITH S OME T ECH T IPS … Education – Partnership – Solutions
5
INFORMATION SECURITY OFFICE B ROWSER F AVORITES Education – Partnership – Solutions Save time by not retyping addresses Group sites according to purpose Less risk of visiting a malicious site
6
INFORMATION SECURITY OFFICE Education – Partnership – Solutions
7
INFORMATION SECURITY OFFICE W HERE A RE M Y F ILES ? Understand the concept of the file system Understand the concept of the user profile directory Local hard drive versus shared drive Box.com Consider where you will keep the “gold source” of a file, versus redundant copies Education – Partnership – Solutions
8
INFORMATION SECURITY OFFICE Education – Partnership – Solutions
9
INFORMATION SECURITY OFFICE Education – Partnership – Solutions
10
INFORMATION SECURITY OFFICE Education – Partnership – Solutions
11
INFORMATION SECURITY OFFICE Education – Partnership – Solutions
12
INFORMATION SECURITY OFFICE Education – Partnership – Solutions
13
INFORMATION SECURITY OFFICE F ILE M ANAGEMENT R ECOMMENDATIONS Use the network directories whenever possible (avoid storing to the local hard drive) Learn to use Box.com when collaborating with others Make sure your files are contained within the user profile and ensure backups of local hard drive Only one gold source of the file, yet multiple backups Use helpful folders and filenames – Instead of “Annual” indicate the year – Instead of “Final” indicate the version Make lots of folders if that will get you organized Education – Partnership – Solutions
14
INFORMATION SECURITY OFFICE Education – Partnership – Solutions
15
INFORMATION SECURITY OFFICE F ILE M ANAGEMENT R ECOMMENDATIONS Always try to store electronic and scanned copies, rather than paper (better for BCP emergencies) Learn to “Export as PDF” or “Print to PDF” Education – Partnership – Solutions
16
INFORMATION SECURITY OFFICE Education – Partnership – Solutions
17
INFORMATION SECURITY OFFICE Education – Partnership – Solutions
18
INFORMATION SECURITY OFFICE E XTERNAL D RIVES Helpful method for backups and moving files between computers They can fail Realize they can be stolen, so think about how and where to store them Format flash drives when not in use Education – Partnership – Solutions
19
INFORMATION SECURITY OFFICE E MAIL M ANAGEMENT Folders Should you ever delete? Personal versus work From mobile phone, beware consolidated view Specific addresses for specific purposes? Education – Partnership – Solutions
20
INFORMATION SECURITY OFFICE Education – Partnership – Solutions
21
INFORMATION SECURITY OFFICE E MAIL M ANAGEMENT R ECOMMENDATIONS Before overusing email, can you make a phone call or meet face to face? Save attachments to a network directory or local PC hard drive BEFORE making edits. Build filtering rules to automatically route mail into your folders Education – Partnership – Solutions
22
INFORMATION SECURITY OFFICE Education – Partnership – Solutions
23
INFORMATION SECURITY OFFICE R EMOTE A CCESS Education – Partnership – Solutions
24
INFORMATION SECURITY OFFICE R EMOTE A CCESS R ECOMMENDATIONS Education – Partnership – Solutions Don’t email UT Dallas files to your personal address, just learn to use Outlook Web Access If you hate VPN, consider using Box.com When connecting to VPN, don’t get confused by drive mappings – \\Utdfs01\utd\Dept\Security\ is G \\Utdfs01\utd\Dept\Security\ – \\Utdfs01\utd\Users\nxh141030\ is H \\Utdfs01\utd\Users\nxh141030\
25
INFORMATION SECURITY OFFICE N OW S OME S ECURITY S TUFF … Education – Partnership – Solutions
26
INFORMATION SECURITY OFFICE E MAIL E NCRYPTION Education – Partnership – Solutions
27
INFORMATION SECURITY OFFICE E MAIL E NCRYPTION Education – Partnership – Solutions
28
INFORMATION SECURITY OFFICE C LOUD S ERVICES Education – Partnership – Solutions Cloud is a marketing term Embrace reputable vendors providing valuable services Beware default settings, however. Understand what is synchronizing between your device and the provider Learn to use services like Box.com, iCloud, Google, Amazon, and CrashPlan Visit http://www.utdallas.edu/cometspace/http://www.utdallas.edu/cometspace/
29
INFORMATION SECURITY OFFICE P ASSWORDS Education – Partnership – Solutions Longer is stronger – consider a “passphrase” Different passwords for different services Keep passwords written down somewhere under your control Be careful when answering security questions – sometimes the answers can be researched using social media and online databases We are getting more questions about password vaults, such as LastPass
30
INFORMATION SECURITY OFFICE S OFTWARE U PDATES Education – Partnership – Solutions The single biggest risk to a computer – more important than antivirus protection Not just the operating system, but all the installed applications (Office, Firefox/Chrome, Flash, Java, etc.) Enable automatic update options on your devices Beware malicious look-alike antivirus software
31
INFORMATION SECURITY OFFICE D ATA D ESTRUCTION Education – Partnership – Solutions Properly destroy or overwrite hard drives, memory cards, and electronic devices Shred documents rather than trash them
32
INFORMATION SECURITY OFFICE M OBILE D EVICE R ECOMMENDATIONS Education – Partnership – Solutions Set a strong passcode to unlock the screen Do not leave the device unattended Run current versions of software Only install apps from trusted sources Enable security settings, e.g. remote wipe and locate device Ensure data is backed up Avoid unsolicited calls, texts, and emails
33
INFORMATION SECURITY OFFICE M OBILE D EVICE R ECOMMENDATIONS Education – Partnership – Solutions You can never have enough storage You will use more data than you expected Remove unnecessary apps Images and videos in text message threads are duplicate copies
34
INFORMATION SECURITY OFFICE A VOID O NLINE S CAMS Education – Partnership – Solutions Stick with reputable sellers; when using lesser-known websites look for familiar payment systems like PayPal and Amazon Regularly review your credit card statements for unusual charges Monitor your credit reports periodically (Equifax, Experian, and Trans Union) IRS scams are on the rise – file before someone does for you Be wary of e-mails and website banners offering “free” gifts, prizes, vacations Take note of the website address – is it constructed properly?
35
INFORMATION SECURITY OFFICE A VOID O NLINE S CAMS Education – Partnership – Solutions
36
INFORMATION SECURITY OFFICE S OCIAL N ETWORKING Education – Partnership – Solutions Avoid establishing relationships online with people you have not met in person Adjust the available privacy settings within each website Consider the privacy and permanence of what you post, including pictures and location data Educate younger users about the risks of their “online lifestyles”
37
INFORMATION SECURITY OFFICE W HAT ’ S T HE S OLUTION ? We all need to become more “technical” Learn from the experts…12 year olds on YouTube Technology isn’t good or bad, it’s how you use it Be willing to ask for help Education – Partnership – Solutions
38
INFORMATION SECURITY OFFICE D ECLUTTERING Y OUR D IGITAL L IFE N ATE H OWE Chief Information Security Officer Education – Partnership – Solutions
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.