Download presentation
Presentation is loading. Please wait.
1
Technology Solutions Security Update
BOR March 2018 Paul Czarapata, Ed.D. KCTCS Vice President / CIO
2
2017 – KCTCS Technology By The Numbers
186,000,000 s received Over 1 billion spam, phishing, and malware blocked Over 38,000 hours of Skype meetings Over 8 million files in OneDrive Technology Solutions help desk tickets completed in ,029 Average # of unique logins per day in Blackboard Learning Management System – 32,000 Up to 86 thousand logins daily to student information system
3
KCTCS Protection of Systems/Data
Network Firewalls (controls incoming/outgoing network traffic) Intrusion detection hardware/software Antivirus / Anti-malware software Hard drive encryption Network penetration testing (both internal and by external parties) Annual Information Technology Audit by Crowe Horwath Personally Identifiable Information (PII) enterprise search software Looks for ssn, credit cards, drivers license, etc Take advantage of programs from FBI Infragard, Dept Homeland Security, and University of Texas
4
KCTCS Protection of Systems/Data (Continued)
Physical security (locks, video surveillance, badge scanners, etc.) Education!! People are the weakest link, we coach them up! Seminars, online training, monthly newsletter, phishing campaign
5
What is the “Cloud” In simplest terms, cloud computing means storing and accessing data and programs over the internet instead of your computer or local data center.
6
Cloud Flavors SAAS – Software as a Service
Software distribution method where access to program is provided over Internet (i.e. Quickbooks Online) PAAS – Platform as a Service Develop, run, and manage web-based applications IAAS – Infrastructure as a Service IaaS is the provision of virtual servers and storage that organizations use on a pay-as-you-go basis
7
KCTCS’s Cloud footprint
Have adopted “Cloud First” strategy Nearly all KCTCS systems are in the “cloud” Mix of private and public cloud solutions Public = many companies in same cloud Private = cloud solution is just your company Each provider is vetted and audited Penetration testing Patch/fix policy Personnel screening Physical data center security Breach notification contracts Service level agreements
8
Sampling of KCTCS Cloud Providers
9
Who Is The Weakest Link? No matter how strong KCTCS: Firewalls
Intrusion Detection Systems Cryptography Anti-virus software People are the weakest link in computer security! People are more vulnerable than computers "The weakest link in the security chain is the human element" -Kevin Mitnick
10
Privacy While KCTCS strives to protect its users' personal information and privacy, it cannot guarantee the security of any information you disclose online and you do so at your own risk. As a web user, keep in mind that whenever you give out personal information online information can be collected and used by people you don't even know.
11
Caution when you connect
Be wary of how/where you connect to the Internet Careful with free Public WiFi hotspots Be aware of shoulder surfers Shut your machine down when you’re not using it Never leave your laptop/phone/tablet alone in a public area Do not allow thumb drive to be attached to your machine
12
External Hard Drives & Thumb Drives
Don’t use a thumb drive you haven’t scanned for viruses (right click on it after you connect it)
14
What is Social Engineering?
At its core it is manipulating a person into knowingly or unknowingly giving up information; essentially 'hacking' into a person to steal valuable information. Psychological manipulation Trickery or Deception for the purpose of information gathering Secretly install spyware, other malicious software Trick persons into handing over passwords and/or other sensitive financial (credit card) or personal information.
15
Phishing Fraudulently obtaining private information
Send an that looks like it came from a legitimate person or business Request verification of information and warn of some consequence if not provided Usually contains link to a fraudulent web page that looks legitimate User gives information to the social engineer
16
Example:
19
Spear-Phishing Example:
20
Online Financial Transactions
Don’t use a debit card Sign up for alerts with your credit card company Only shop at reputable online stores (if the price is hard to believe, it’s probably a scam or a fake) Check your bank/credit card statements closely for small recurring charges Check if they support 2-factor authentication Ensure your are using a secure connection
21
What to do? Don’t click on links in suspicious emails
Set your operating system to automatically update If something doesn’t seem right, it probably isn’t Be very careful of what data you give over the phone Back up your machine frequently Watch what you post on social media (Facebook, Twitter, etc) Use a firewall on your personal computer
22
Preventing the infection
Use antivirus software. While there are some good free programs available, it may be worth your while to pay for top-notch protection. Antivirus software You are covered at work with antivirus, but are you covered at home? Set it to auto-update Run scans frequently My favorites – Kaspersky, McAfee, and AVG
23
What to do if you think you have a virus?
Contact your local IT team if at work (or contact me/Keith if you are retired or self-employed) If at home Disconnect it from internet Do a full scan with virus software to see if it can be removed If comfortable, you may want to download virus removal tools to a portable drive on another machine to see if those work Contact a reputable computer repair service to see if they can help If your drive is encrypted, you may be out of luck unless you pay the bad guys
24
Tips & Tricks Update your software regularly. This is the best way to make sure all security patches get installed. Otherwise, hackers can target you by attacking your computer with malware designed to exploit known weaknesses. Don’t click unknown links. Far too many computer users engage in this practice, which is frowned on by the professionals. Remember, it’s easy for attackers to “spoof” an address.
25
Questions? Thanks and be careful out there!!!!
KCTCS Technology Solutions
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.