Download presentation
Presentation is loading. Please wait.
Published byRosalind Perkins Modified over 8 years ago
1
Information Technology Security Office of the Vice President for Information Technology New Employee Orientation II
2
What is Phishing? Phishing - spoofed e-mails and fraudulent web sites designed to fool recipients into divulging personal financial data Risks Identity theft Credit card fraud
3
What is Malware? Malware (malicious software) is software that is intended to damage or disable your computer. Risks Viruses Worms Trojans Data loss/stolen Ransom-ware http://security.vpit.txstate.edu/awareness/videos.html
4
What is Spyware? Spyware is software that allows information to be obtained about someone elses computer by transmitting data without their knowledge, and can cause your computer to not work properly
5
Web Attacks Target Personal Information such as Credit Card Information Passwords Bank Account Information
6
Best Practices : Mobile Devices Enable a lock Use password rather than 4-digit pins or pattern locks Disable Bluetooth, infrared, or Wi-Fi when not in use Set Bluetooth to non-discoverable mode Never leave your devices unattended
7
Best Practices : Passwords Has at least 15 characters Use a mixture of letters, numbers and symbols Use a memorable phrase Keep safe and confidential Do not share or write down your passwords Always lock your computer or laptop when you walk away from it DO NOT USE THE FOLLWING PASSWORD EXAMPLE L!t$wDiamonds2015!
8
Best Practices : Email Encryption Don’t share confidential information via email Use a secure file share, SharePoint, TRACS, or using encrypted USB drives SEND ENCRYPTED – This option will encrypt and send your original e-mail. This is recommended for university ‐ related e- mail with a true business need and also an optional choice for personal e-mail. Example Subject: [Encrypt] Hello
9
Best Practices : Laptop Encryption Reduce the risk of university confidential data exposure through stolen or lost equipment. Implement full-disk encryption solutions that meets industry and State of Texas Administrative Code (TAC 202) standards.
10
Best Practices : Browser Security Configure Privacy and security settings Clear history Disable third party cookies Enable phishing and malware protection Disable Autofill, javascript, plugins, location tracking Enable pop-up blocker Automatically update http://security.vpit.txstate.edu
11
Security Software Anti-Virus Identity Finder Windows Updates
12
Contact Information Information Technology Security (IT Security) (512) 245-4225 itsecurity@txstate.edu http://security.vpit.txstate.edu Information Technology Assistance Center (ITAC) (512) 245-ITAC (4822) itac@txstate.edu
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.