Download presentation
Presentation is loading. Please wait.
Published byPierce Booth Modified over 9 years ago
1
Cyber Security Awareness Month Using Your Laptop Safely On the Road Off-Campus Safe Computing Part 2
2
Introductions Allen Monette Security Coordinator Office of Campus Information Security
4
OCIS Brown Bag Series Worst Practices, or 10 Easy Steps to Loosing Your Data Protecting Your Laptop’s Data Using Your Laptop Safely on the Road Finding and Protecting Sensitive Data on Your Computer Protecting Data by Using Network and Server Scanning Tools
5
Rick’s Road Trip
6
Rick’s New Laptop
12
Rick visits his favorite coffee shop
13
Hey, Free Wi Fi!
21
Rick on the Road
24
Rick’s New Laptop
26
Rick’s return
28
Account Balance: $0
30
2005 Wisconsin Act 138 requires entities to notify individuals of certain unauthorized acquisitions of personal information. “Personal information” means an individual’s last name and the individual’s first name or first initial, in combination with and linked to any of the following elements, if the element is not publicly available information and is not encrypted, redacted, or altered in any manner that renders the element unreadable: (a) the individual’s Social Security number; (b) the individual’s driver’s license number or state identification number; (c) the number of the individual’s financial account number, including a credit or debit card account number, or any security code, access code, or password that would permit access to the individual’s financial account; (d) the individual’s DNA profile; and (e) the individual’s unique biometric data, including fingerprint, voice print, retina or iris image, or any other unique physical characteristic.
31
Let’s go Back In Time
32
Rick isn’t a bad user Did work to secure his computer What he did is good for a desktop on a protected network Not so good for the wilds of Free WiFi
33
Credit Card What happened?
35
Solutions What to do?
36
Solutions File on desktop –don’t store that data! –If you must store it, encrypt it! –Lock your workstation; use screensaver passwords –Don’t leave your laptop unattended Be aware of those around you
37
Email + Break-in What happened?
40
Solutions What to do?
41
Solutions Know how to spot a phishing attempt Use different credentials for different accounts Use a VPN
42
Laptop Lost; Cash gone What happened?
44
Solutions What to do?
45
Solutions OS hardening –require username/password to login Encrypt! Use removable storage; better yet use network storage Lojack for laptops Security screening line strategies
46
Rules of the Road 1.Store no data locally 2.Since we know 1 is hard: Encrypt! 3.Practice Defensive Networking – Use VPN 4.Know where your laptop is at all times
47
Questions?
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.