Presentation is loading. Please wait.

Presentation is loading. Please wait.

Protecting Your Identity: Information Security Basics Presented by:Barbara D. Kissner SVP & CIO International Fidelity Insurance Company March 18, 2014.

Similar presentations


Presentation on theme: "Protecting Your Identity: Information Security Basics Presented by:Barbara D. Kissner SVP & CIO International Fidelity Insurance Company March 18, 2014."— Presentation transcript:

1 Protecting Your Identity: Information Security Basics Presented by:Barbara D. Kissner SVP & CIO International Fidelity Insurance Company March 18, 2014 3/18/20141

2 Biography Barbara Kissner International Fidelity Insurance Company Senior Vice President, Chief Information Officer Barbara Kissner joined International Fidelity Insurance Company in 2007 as SVP and Chief Information Officer. Her responsibilities include management of the company’s telecommunications, IT and Licensing departments as well as overseeing the company’s Disaster Recovery plan and IFIC’s Regulatory Committee. Prior to joining IFIC, Barbara served as the Chief Information Security Officer for BankAtlantic in Fort Lauderdale, FL, and Senior Vice President of Global IT Risk Management for The CIT Group. Barbara has authored many published articles on subjects ranging from e-commerce to information engineering and holds the CISA, CSTE, CSQA, CGEIT and CRISC designations. This year, she has been named one of Computerworld’s Premier 100 IT Honorees for 2014. 3/18/20142

3 Agenda Security Awareness Requests for confidential information Unexpected email and attachments SPAM Internet safety Phishing attempts Protecting your laptop and yourself Q&A 3/18/20143

4 What is Security Awareness? … it is the knowledge and attitude members of an organization possess regarding the protection of the physical and, especially, information assets of that organization. ( Wikipedia ) 3/18/20144

5 Requests for Confidential Information Do not provide confidential information to unknown sources This is especially true for unsolicited email and telephone calls Verify who is asking before you respond Spoofers use professional sounding names and organizations to get you to reveal information Legitimate companies do not ask you to “verify” SSN, PIN, date of birth, account number through email 3/18/20145

6 Unexpected Email Attachments If you receive email from an unknown source, don’t open it Never open or forward unexpected attachments Do not respond to SPAM email No, you did not win that free trip Those guys are not really going to put $30 million in your bank account Do not open or forward chain letters Do not “unsubscribe” from an unknown email list or SPAM: To unsubscribe from this mailing list: click here or send a blank message to: TopNotchRewards.o-9c93cbb-4c9.xx.xx.com.-bkissner@07.mailmx01.com 3/18/20146

7 Spam 3/18/20147

8 More Spam 3/18/20148

9 And More, Dangerous Spam 3/18/20149

10 Internet Safety Firewalls are a must, even for Macs Buy AntiVirus and AntiSpyware and install them on every computer in your home Wireless Networks Turn off SSID broadcasting – this tells everyone in the neighborhood who you are Change the installation passwords – everyone knows them Enable WPA encryption Know the names of the machines on your network and regularly look for intruders 3/18/201410

11 3/18/201411 Look For Security Features LOCK HTTPS Windows Explorer

12 Other Browsers 3/18/201412 Google Chrome Firefox Safari

13 Social Websites Popular social sites include Facebook, LinkedIn, Pinterest, Instagram Anything you post can be discovered Prospective employers, universities and corrections agencies regularly scan these sites Remember, even if you delete your entries or responses, someone already has a copy 3/18/201413

14 Phishing – Part 1 3/18/201414

15 Phishing – Part 2 3/18/201415

16 Protect Your Laptops and Phones 3/18/201416 Store in secure place when you leave your office Keep out of view when stored in your car Don’t leave unattended in public places Be especially careful in airports and train stations Watch out for Spam text messages on cell phones Be wary of strangers asking to borrow your phone

17 In Conclusion You can protect personal information and your Identity Don’t respond to Spam email Use firewalls, AntiVirus, AntiSpyware at home Look for security features like HTTPS and the Use caution when asked for sensitive information Keep track of your personal articles, including cell phones and laptops If something doesn’t look right, it probably isn’t!

18 Questions? 3/18/201418 Barbara D. Kissner International Fidelity Insurance Company bkissner@ific.com 973/624 7200 x259


Download ppt "Protecting Your Identity: Information Security Basics Presented by:Barbara D. Kissner SVP & CIO International Fidelity Insurance Company March 18, 2014."

Similar presentations


Ads by Google