Presentation is loading. Please wait.

Presentation is loading. Please wait.

ISB Computer Security Training

Similar presentations


Presentation on theme: "ISB Computer Security Training"— Presentation transcript:

1 ISB Computer Security Training
Fall 2017

2 Overview ISB’s computer security training is based on the NIH security course and reviews some Information Technology security threats and ways of avoiding them. Protect sensitive information, including personally identifiable information (PII). Practice safe computing habits. Keep your computer up to date with patches and antivirus.

3 Where to get help? Contact the ISB helpdesk (206) or IT at Our standard hours are 8am-5pm M-F. (new)

4 Topics Covered Protecting passwords
Protecting personally identifiable information (PII) IT Security Tips What is Social Engineering? Practice safe web habits Phishing s USB drives

5 Protecting Passwords Create a strong password of at least 8 characters (longer passwords are more secure). Memorize your password. Do Not share your password with anyone. Log out of ISB computers in conference rooms, common areas or labs when finished.

6 Protecting Personal Information
Personally Identifiable Information (PII) is a type of sensitive information which can potentially be used to identify, or locate an individual. PII can include a person’s social security number, address, date of birth, address, medical information, etc. PII should be protected and not stored on flash drives (thumb drives or external USB drives). Avoid storing PII on laptops since laptops can be lost or stolen.

7 Lost or Stolen Laptops Report lost or stolen ISB laptops to the ISB helpdesk and your supervisor. IT at

8 Avoiding Viruses and Spyware
ISB Windows and Mac computers have Symantec Endpoint installed – however this doesn’t mean we are immune to viruses or spyware. New viruses are written all the time, so its important to have the latest Symantec antivirus/antispyware definitions. Employees with ISB laptops should connect their laptops to the ISB network weekly for operating system updates and Symantec antivirus/antispyware definitions.

9 What is Spyware? Spyware is software that is maliciously installed on a computer with the intention of collecting information about a user and/or their computer. Spyware could potentially steal your bank account username and password or credit card number. Spyware can also interfere with the functioning of the computer, by installing additional software, redirecting to different websites, changing the home page, inhibiting the functioning of other programs and/or loss of Internet.

10 Ways to Avoid Viruses and Spyware
Install operating system patches when needed. Reboot your ISB computer when prompted (it may need to reboot from a patch or virus cleanup). Keep your antivirus/antispyware up to date. Avoid opening suspicious files – you can download and scan attachments for viruses before opening them.

11 Ways to Avoid Viruses and Spyware Cont.
Practice safe web browsing habits. Never clicking on links in pop-up ads (this includes spam or pop-ups ads that claim to offer anti-spyware). Fake anti-virus software can steal your personal information. Rouge security software is called “scareware.” Install Java, Adobe Flash, Adobe Reader, Firefox and other program patches when prompted. These are pushed out on Windows computers along with the Microsoft updates.

12 Reporting Viruses or Spyware
If your computer or a lab computer gets infected with a virus or spyware – Avoid using your flash drive on a virus infected computer.

13 IT Security on Your Personal PC
Install operating system patches (Windows, Mac and Linux). Must have an active antivirus subscription for Windows systems (trial Antivirus is not accepted) there are plenty of free AV available. Practice safe web browsing habits while connected to ISB resources. Install Java, Adobe Flash, Adobe Reader, Firefox and other program patches when prompted.

14 What is VPN? Virtual Private Network (VPN) is the best way to access ISB‘s internal network from an off-site location. The VPN client creates an encrypted tunnel that allows your computer to access ISB´s entire internal network while keeping your data safe and secure. Once you login with the VPN client it's just like your off-site computer is at ISB. Web VPN and the VPN client are available for Windows, Mac and Linux computers. Windows 7 or newer Mac OS or newer

15 Internet Usage on VPN Please disconnect from our VPN after conducting ISB business. We need all employees, collaborators, tenants and others who use our systems to comply with our policies for the safety and security of the Institute.  This is a serious issue.  We have no desire to monitor usage -- your complete cooperation is expected and will be appreciated.

16 Safe Web Surfing Tips Use the official sites for financial, medical or commercial vendors. Type in the web address or use a known good bookmark/favorite. Enable anti-phishing protection for your browser. Don’t click on links in popup windows. Don’t run programs of unknown origin. Check with IT before installing any unfamiliar programs on your ISB computer.

17 What is Social Engineering?
Social engineering is a way for criminals to gain access to your computer. The purpose of social engineering is often to install spyware or other malicious software and/or to trick you into handing over your passwords or personal/financial information. Some online criminals find it easier to prey upon human nature than to exploit holes in your software. Most on-line scams are a type of social engineering. Social engineering is sometimes also used over the phone to convince employees to share passwords or confidential information with an outsider.

18 Scams can contain the following:
Alarmist messages and threats to close your on-line account. (Phishing Scams) When offers seem to be too good to be true—they probably are. Poor misspellings and bad grammar. Appear to come from a popular company. Contain a web address that is very similar to the web address of a legitimate site…might be .com rather than .gov. Links to fake a website that claims to accept donations for charity.

19 Sources of Phishing Scams
Phishers often target customers of banks and online payment services. Social networking web sites, like MySpace and Facebook. Fake e-cards Online job-hunting scams (fake ads) In your instant message program. Text messages on cell phones.

20 Phishing s Phishing scams often imitate legitimate companies to steal personal information like passwords, credit card numbers or bank account information. Scammers copy Web pages of a business (like a bank) and set up a fake page that looks like the real company’s web site. Then they send an official sounding with a link to the fake page and request that the recipient update their account information. If the recipient enters their information on the fake web page, their account information is sent to the hacker (who then can log into the account).

21 Phishing Clues Phishing s tend to start with generic phrases like "Dear valued customer" or use your account name, such as "Dear SusieQ42," instead of your name ("Dear Susan"). If the was sent to an address that was not the one you provided to the company, this is usually a good indication that the is not legitimate. Never click on links in messages that request updating account/personal information. Often if you hover over the link, it will show a fake web address. Make sure you check both the display name and address of the sender.

22 Example of A Bank Phishing Email

23 Example of a Password Stealing Phishing Email
Notice that the link is a non-ISB link. Missing ISB Logo and branding. Form asks for too much information!

24 Recent Google Doc’s Phishing Scam
If information is added, then the account will send out malicious s to the contacts.

25 USB Drives If you find a USB drive in front of the building what would you do with it? USB drives can be carriers for spyware and viruses. Most of the viruses at ISB come from flash drives. Do you know where your flash drive has been? Avoid storing sensitive data on your flash drive in case it gets lost or stolen. Also, avoid saving your only copy of an important file on your flash drive.

26 Further Information The IT portion of the Intranet has detailed instructions for using VPN, Google Apps, accessing file shares, locating printers and using ISB’s wireless networks.

27 Questions?


Download ppt "ISB Computer Security Training"

Similar presentations


Ads by Google