Download presentation
Presentation is loading. Please wait.
Published byCharles Williams Modified over 9 years ago
1
Information Security Information Technology and Computing Services http://www.ecu.edu/itcs Information Technology and Computing Services http://www.ecu.edu/itcs
2
Security Fallacies We have antivirus software, so we are secure We have a firewall, so we are secure The most serious threats come from the outside I don’t care about security because I backup my data daily Responsibility for security rests with IT Security Staff We have antivirus software, so we are secure We have a firewall, so we are secure The most serious threats come from the outside I don’t care about security because I backup my data daily Responsibility for security rests with IT Security Staff
3
IT Security Components Firewalls Intrusion Detection Software Antivirus Software Updated OS and Applications Continual education for staff and users User cooperation and compliance Most critical component Most difficult to achieve Firewalls Intrusion Detection Software Antivirus Software Updated OS and Applications Continual education for staff and users User cooperation and compliance Most critical component Most difficult to achieve
4
Security Threats Malware-viruses, worms, trojans, spyware Security patches not applied Hacking and network scanning Social engineering Chat and Instant Messaging software Weak Passwords Unawareness, carelessness Malware-viruses, worms, trojans, spyware Security patches not applied Hacking and network scanning Social engineering Chat and Instant Messaging software Weak Passwords Unawareness, carelessness
5
What can you do? Report Incidents (helpdesk) Passwords Backups E-mail use and Security Internet Security Mobile Devices Physical Security Report Incidents (helpdesk) Passwords Backups E-mail use and Security Internet Security Mobile Devices Physical Security
6
Use/Update antivirus software Patch OS and Applications Don’t use P2P file sharing software Use software firewalls Use your locks-door and computer Don’t reveal your password to anybody Don’t reveal confidential information Use/Update antivirus software Patch OS and Applications Don’t use P2P file sharing software Use software firewalls Use your locks-door and computer Don’t reveal your password to anybody Don’t reveal confidential information
7
Safe Computing Add-ons to Internet browsers Add-ons to e-mail clients Aftermarket screensavers Instant Messenger software If you have been hacked change all your passwords Safe Computing Add-ons to Internet browsers Add-ons to e-mail clients Aftermarket screensavers Instant Messenger software If you have been hacked change all your passwords
8
Antivirus Policy All networked machines must run Symantec AV software Site license for Symantec AV Free copy for every Windows and Macintosh computer Free copy to load on home computers Infected computers will be removed from the network until cleaned All networked machines must run Symantec AV software Site license for Symantec AV Free copy for every Windows and Macintosh computer Free copy to load on home computers Infected computers will be removed from the network until cleaned
9
Mobile Security Password protection Encryption Physical security WiFi (wireless technologies) All devices must be registered and authenticated using pirateID Telecommuting (remote access) Password protection Encryption Physical security WiFi (wireless technologies) All devices must be registered and authenticated using pirateID Telecommuting (remote access)
10
Data Security Data and You (protection of sensitive data) Continuity of Operations / Disaster Recovery (ensure you have a plan) Identity Theft / Phishing (don’t be a victim) Physical Security Data and You (protection of sensitive data) Continuity of Operations / Disaster Recovery (ensure you have a plan) Identity Theft / Phishing (don’t be a victim) Physical Security
11
HIPAA Privacy & Security All workforce members must be trained on HIPAA security issues if they access computers that contain EPHI. This training will help to assist you in protecting the confidentiality, security and integrity of EPHI. We all have certain responsibilities in implementing safeguards and actions to protect EPHI. http://www.ecu.edu/cs- itcs/itsecurity/HIPAA-Privacy- Security.cfm All workforce members must be trained on HIPAA security issues if they access computers that contain EPHI. This training will help to assist you in protecting the confidentiality, security and integrity of EPHI. We all have certain responsibilities in implementing safeguards and actions to protect EPHI. http://www.ecu.edu/cs- itcs/itsecurity/HIPAA-Privacy- Security.cfm
12
FERPA Avoid copying or downloading sensitive data from university systems If there are no other alternatives then proper security measures must be taken Avoid using SSN #’s in databases or applications as identifiers Avoid sending sensitive data un-encrypted Protect sensitive data Avoid social engineers that try to get you to share information Secure your workstations http://www.ecu.edu/cs-itcs/itsecurity/FERPA- ECU.cfm Avoid copying or downloading sensitive data from university systems If there are no other alternatives then proper security measures must be taken Avoid using SSN #’s in databases or applications as identifiers Avoid sending sensitive data un-encrypted Protect sensitive data Avoid social engineers that try to get you to share information Secure your workstations http://www.ecu.edu/cs-itcs/itsecurity/FERPA- ECU.cfm
13
Ways to Protect yourself @ HOME WiFi Security Symantec Antivirus Backup! Passwords Bank and Credit Card Information Firewall OS Patches Instant Messaging E-mail Encryption WiFi Security Symantec Antivirus Backup! Passwords Bank and Credit Card Information Firewall OS Patches Instant Messaging E-mail Encryption
14
Problems or Questions Don’t call individual ITCS employees Call IT Support Services @ 328-9866 Single point contact All calls forwarded to appropriate consultant Open a Service Request www.ecu.edu/9866 http://www.ecu.edu/cs- itcs/safetySecurity.cfm Don’t call individual ITCS employees Call IT Support Services @ 328-9866 Single point contact All calls forwarded to appropriate consultant Open a Service Request www.ecu.edu/9866 http://www.ecu.edu/cs- itcs/safetySecurity.cfm
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.