Download presentation
Presentation is loading. Please wait.
Published byMeghan Perkins Modified over 9 years ago
1
IT Security Essentials Lesley A. Bidwell, IT Security Administrator
2
The Security Mantra Confidentiality Integrity Availability
3
SUNY Oneonta Security Program Developed by a working group of faculty and staff Adopted by President’s Cabinet in March 2005 Available from the campus network at www.oneonta.edu/technology/security www.oneonta.edu/technology/security
4
SUNY Oneonta Security Program “This program applies to all faculty, staff and students of the College, or others … who may utilize the College’s technology and related facilities.”
5
Why all the concern about security? Computer hacking has become big business We store vast amounts of personal data in our systems – on students and employees We need that data to be accurate and available in order to do our jobs We must comply with State and Federal regulations
6
What are we doing about it? Constantly monitoring systems and threats to keep our servers and our network secure Implementing policies, procedures and practices to assure only authorized users have access to data Educating users
7
What can you do? Security is everyone’s responsibility Check out the security program Contact the IT Security Administrator with any questions or if you suspect there has been a security breach Follow some basic guidelines:
8
Be aware Make information security a regular practice Recognize poor security practices in your own habits and in your office Remain vigilant where information security is concerned
9
Passwords Never share a password –If more than one person needs access work with us to set up a network share so each can use their own password –Even the IT Helpdesk should never ask for your password
10
Passwords Choose strong Passwords –Will be required soon –Use a phrase that’s easy to remember but hard to guess –Must contain 3 of 4 Upper case letters Lower case letters Numbers Special Characters See http://www.microsoft.com/athome/security/priv acy/password.mspx
11
Passwords Examples: Weak fluffy password2 bidwella Strong str0ngPa55 2&2=Four myc4tisf!uffy
12
Passwords Change passwords regularly –Will be required soon –Every 180 days –Limits the length of time a hacker can use a compromised password –ALWAYS change passwords if you suspect your password has been stolen
13
Passwords Never post your password –On your computer monitor –Under your keyboard –In the desk drawer –Anyplace that someone might look
14
Passwords Never save passwords in applications –E-mail, Web Authoring, PPP for dial-in –Anyone who sits at your computer has access –Equally important at home
15
Physical Security Always lock your computer when you leave it unattended (ctrl-alt-del) Never leave hard copies with sensitive data in plain view Always log out of web applications (Banner, e-mail) and close browser
16
Laptops and Mobile Devices Theft Access on insecure networks Strong passwords Encryption
17
Malware A general term for malicious software Includes viruses, trojans, rootkits, spyware, etc. Vectors of infection include e-mail, web pages, links sent through IM sessions, hidden in other programs
18
Malware Anti-virus software –Must be up to date –Must be running –Use on-access scanner –Schedule daily scans
19
Malware Anti-spyware software –Must be up to date –Must be running –Good choices include Microsoft Defender, Spybot Search & Destroy and Adaware –http://helpdesk.oneonta.edu/xoops /modules/wfdownloads/viewcat.ph p?cid=3
20
Malware Operating system patches –Apply critical patches as soon as possible –Use automatic updating when possible –Important for Macs and Linux machines as well as Windows
21
Malware – Signs of Infection Computer slows down New homepage, toolbars, default search pages or favorites in browser Anti-virus and/or anti-spyware software get turned off
22
Malware Be sure to use these procedures at home Call the Information Technology Helpdesk about using the ASCI or Secure Desktop program for your office computer
23
Business Continuity Planning Remember “Availability?” All departments need one Test it!
24
Questions? Lesley Bidwell x2628 bidwella@oneonta.edu Information Technology Helpdesk x4567
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.