Presentation is loading. Please wait.

Presentation is loading. Please wait.

Library IT - Security and Remote Access

Similar presentations


Presentation on theme: "Library IT - Security and Remote Access"— Presentation transcript:

1 Library IT - Security and Remote Access

2 Threats Phishing and whaling attacks (email and phone)
Credential Theft Ransomware Attacks on MySlice applications Attacks on web sites “Door Rattling” Malware

3

4

5 Reduce the risk Use strong passwords 10-16 characters
Non-dictionary words Derive from phrase for easier recollection Do not reuse passwords Use a password manager to keep track of multiple passwords (example Lastpass, keypass, 1password etc.) Consider enabling two-factor authentication If possible work on your system using a non – admin (lower privilege account, similar to your ad joined computer) so applications can’t be installed without further authentication

6 Best Practices Don’t it (unless you KNOW it’s OK)— especially confidential! Don’t put it on portable media Don’t use cloud services (DropBox, iCloud etc.) Don’t leave it visible on your office computer when you walk away – Lock the screen Get rid of such data as soon as possible DO – Keep it on your shared drive (30 day backup available) DO - Use only approved methods of access

7 Remote Access – LIT policy / procedure
Discuss need with supervisor – If you come to LIT first, we’ll ask for supervisor approval before moving forward Identify requirements and preferred tool / method Submit request for Remote Access to We’ll review and schedule appropriate training

8 Levels of Access Level 1 – basic level
Access to services on/off campus with just netid/password (outlook mail/myslice/ blackboard) Risk is being managed at service level Level 2 – elevated access with managed endpoints In addition to basic access additional services accessible (example shared drive/printer available) with managed device (ex. DirectAccess Laptop) Managed device mitigates the risk Level 3 – Elevated access with unmanaged endpoints Ability to access additional services open from on/off campus with unknown endpoint This represents significant risk to university For proper risk mitigation, training is mandatory

9

10 Best Practices Anti-virus product installed and working, updated daily
Anti-spyware product installed and working Windows Update – set to auto-update Firewall turned ON Up to date browser and add-ons If possible work on your system using a non – admin (lower privilege account, similar to your ad joined computer) so applications can’t be installed without further authentication Get your news from reputed sources example CNN, BBC etc. Visit answers.syr.edu and search for information security tools and device best practices.

11 Tools SURA / VPN – sura.syr.edu Microsoft Remote Desktop Windows / Mac
DirectAccess Offline Files Terminal Server – ts.syr.edu DatAnywhere w/o sync – drive.syr.edu VPN with elevated access – Map H: & G: DatAnywhere with sync – only for non SU devices

12 Demo Exchange SURA / Remote Desktop – Mac and Windows DatAnywhere
DirectAccess Terminal Server

13 General questions Equipment replacement Windows 10 Office 2016 Eduroam
Generic AD account password change 12/14/16 Anything else


Download ppt "Library IT - Security and Remote Access"

Similar presentations


Ads by Google