Presentation is loading. Please wait.

Presentation is loading. Please wait.

Information Technology Security Office of the Vice President for Information Technology New Employee Orientation II.

Similar presentations


Presentation on theme: "Information Technology Security Office of the Vice President for Information Technology New Employee Orientation II."— Presentation transcript:

1 Information Technology Security Office of the Vice President for Information Technology New Employee Orientation II

2 What is Phishing?  Phishing - spoofed e-mails and fraudulent web sites designed to fool recipients into divulging personal financial data  Risks  Identity theft  Credit card fraud

3 What is Malware?  Malware (malicious software) is software that is intended to damage or disable your computer.  Risks  Viruses  Worms  Trojans  Data loss/stolen  Ransom-ware http://security.vpit.txstate.edu/awareness/videos.html

4 What is Spyware?  Spyware is software that allows  information to be obtained about someone elses computer by transmitting data without their knowledge, and  can cause your computer to not work properly

5 Web Attacks  Target Personal Information such as  Credit Card Information  Passwords  Bank Account Information

6 Best Practices : Mobile Devices  Enable a lock  Use password rather than 4-digit pins or pattern locks  Disable Bluetooth, infrared, or Wi-Fi when not in use  Set Bluetooth to non-discoverable mode  Never leave your devices unattended

7 Best Practices : Passwords  Has at least 15 characters  Use a mixture of letters, numbers and symbols  Use a memorable phrase  Keep safe and confidential  Do not share or write down your passwords  Always lock your computer or laptop when you walk away from it  DO NOT USE THE FOLLWING PASSWORD EXAMPLE  L!t$wDiamonds2015!

8 Best Practices : Email Encryption  Don’t share confidential information via email  Use a secure file share, SharePoint, TRACS, or using encrypted USB drives  SEND ENCRYPTED – This option will encrypt and send your original e-mail. This is recommended for university ‐ related e- mail with a true business need and also an optional choice for personal e-mail.  Example  Subject: [Encrypt] Hello

9 Best Practices : Laptop Encryption  Reduce the risk of university confidential data exposure through stolen or lost equipment.  Implement full-disk encryption solutions that meets industry and State of Texas Administrative Code (TAC 202) standards.

10 Best Practices : Browser Security  Configure Privacy and security settings  Clear history  Disable third party cookies  Enable phishing and malware protection  Disable Autofill, javascript, plugins, location tracking  Enable pop-up blocker  Automatically update http://security.vpit.txstate.edu

11 Security Software  Anti-Virus  Identity Finder  Windows Updates

12 Contact Information  Information Technology Security (IT Security)  (512) 245-4225  itsecurity@txstate.edu  http://security.vpit.txstate.edu  Information Technology Assistance Center (ITAC)  (512) 245-ITAC (4822)  itac@txstate.edu


Download ppt "Information Technology Security Office of the Vice President for Information Technology New Employee Orientation II."

Similar presentations


Ads by Google