Presentation is loading. Please wait.

Presentation is loading. Please wait.

End User Cyber Security Awareness Training. Who should complete this training This training is required for all individuals that owns a computer, mobile.

Similar presentations


Presentation on theme: "End User Cyber Security Awareness Training. Who should complete this training This training is required for all individuals that owns a computer, mobile."— Presentation transcript:

1 End User Cyber Security Awareness Training

2 Who should complete this training This training is required for all individuals that owns a computer, mobile device, touch pad. Each individual must complete this training before using their devices to navigate the internet for research, purchase, social media sites and etc. Refresher security training is highly recommended to stay current with present cyber threats and protect user PII data.

3 Summary of Security Policies

4 Issues Affecting User Users must protect all sensitive data and files Defined as data, documents, or files which, if compromised, would have an adverse effect on your agency or COV Must be stored in a secure physical environment Includes all media formats (paper, CD, USB drive) May only be stored on devices owned and approved by your organization Must be encrypted when on mobile devices Includes laptops, CD’s, USB “thumb” drives Must be encrypted and password protected “in transit” For example, via e-mail or on any portable device

5 Issues Affecting User

6 Cyber Awareness Cyber predators are people who search online for other people in order to use, control, or harm them in some way.  Cyber predators target all users – both male and female – on a regular basis, regardless of age  Social networking sites enhance a predator’s ability to target users, especially if they share personal information in their profile.  88% of young adults say they are social networking “friends” with people they don’t know well*  Protect yourself and your personal information, you never know who is behind the screen  Notify your family and the proper authorities immediately if you are being targeted or harassed online

7 Cyber Awareness Social Media US-CERT* suggests ten steps that you can take to protect yourself on social networks:  Limit the amount of personal information you post  Remember that the internet is a public resource  Be wary of strangers  Be skeptical – Don’t believe everything you read online.  Evaluate your settings – don’t stick with the defaults!  Be wary of third-party applications  Use strong passwords  Check privacy policies  Keep software, particularly your web browser, up to date  Use and maintain anti-virus software

8 Cyber Awareness Identity Theft Identity theft is the illegal use of someone else's personal information in order to obtain money or credit.  Every 2 seconds an identity is stolen- so for the length of this training session over 2,600 identities may have been stolen.  Every year, 700,000 kids have their identity stolen.  Here are some simple tips to prevent identity theft: – Don’t use the same password twice. – Choose a password that means someone to you and you only. – If you have been compromised, report it to the Federal Trade Commission. – Lock your computer and cell phone. – Don’t share personal information without knowing exactly who is on the receiving end.

9 Cyber Awareness Fraud & Phishing

10 Cyber Awareness Fraud & Phishing Tips Fraud is the intentional perversion of truth in order to induce another to part with something of value or to surrender a legal right. Phishing is a scam by which an email user is duped into revealing personal or confidential information that the scammer can use illicitly or fraudulently.  Most organizations – banks, universities, companies, etc. - don’t ask for your personal information over email. Beware of requests to update or confirm your personal information.  Don’t open emails from strangers and don’t click on unfamiliar sites; if you think an offer is too good to be true, then it probably is.  Make sure you change your passwords often and avoid using the same password on multiple sites.  Always enter a URL by hand instead of following links.  Reporting of suspicious or unsolicited e-mails from unknown sources is key to preventing and mitigating the impacts of these attacks. Report any suspicious emails or links to US-CERT, Internet Crime Complaint Center, and the Federal Trade Commission.

11 Cyber Awareness Have a conversation with your kids about Being online facts  Have regular conversations about using the Internet.  Talk to kids about online manners.  Ask kids who they are in touch with online and what sites they visit.  Use parental control options that allow you to block and filter content, filter outgoing content and limit kid’s time online.  Develop computer and cell phone rules, such as no cell phone use at the dinner table, during homework or sleeping hours.

12 Cyber Awareness Cyber Awareness You can report Internet -related frauds, scams and suspicious activity with the following organizations You can report Internet -related frauds, scams and suspicious activity with the following organizations  Department of Justice (DOJ) – The DOJ’s Computer Crime & Intellectual Property Section (CCIPS) tells you where to go to report hacking, password trafficking, SPAM, child exploitation and other Internet harassment. For more information visit http://www.justice.gov/criminal/cybercrime/ http://www.justice.gov/criminal/cybercrime/  The Internet Crime Complaint Center (IC3) – The IC3 (http://www.ic3.gov/) is a partnership between the FBI, the National White Collar Crime Center, and the Bureau of Justice Assistance, whose mission is to serve as a vehicle to receive, develop, and refer criminal complaints related to cyber crimehttp://www.ic3.gov/

13 Cyber Awareness Cyber Awareness Basic Concept You Control What You Choose to Click Most end user threats are targeted specifically in hopes that you will click on a harmful link, attachment, picture, video or icon in an email or web page, including social media applications What you can do STOP, and THINK, BEFORE you CLICK Your job is to be aware, be alert and diligent. Always look for the signs that external entities are trying to gain access to your PC and your network. Securing your PII & Cyberspace starts with YOU

14 Cyber Awareness References Eyden, T (2013). "Cyberattacks and Hacktivism”. Web. 08 Jan. 2013. Retrieved from http://www.accountingweb.com/article/cyberat tacks-and-hacktivism-%E2%80%93-take- cover/220669 US-CERT. “United States Computer Emergency Readiness Team”. Web. Retrieved from https://www.us-cert.gov/ncas/tips#attacks-and- threats


Download ppt "End User Cyber Security Awareness Training. Who should complete this training This training is required for all individuals that owns a computer, mobile."

Similar presentations


Ads by Google