Download presentation
Presentation is loading. Please wait.
Published byChad Williams Modified over 9 years ago
1
Grants Management Training 200 Cyber Security There are two kinds of people in America today: Those who have experienced a cyber-attack and know it, and those who have experienced a cyber-attack and don’t know it. –Frank Wolf Which one are you?
2
Grants Management Training 200 SAME EMAIL SECURITY RULES APPLY WITH SMART PHONES AND SOCIAL NETWORKING 91% of Targeted Attacks Start with a Phishing email
3
Grants Management Training 200 Universities are a prime target for hackers In 2015, at least 9 major universities were victims of cyber-attacks
4
Grants Management Training 200 http://thehill.com/policy/cybersecurity/251259-hackers-hit-university-of-virginia
5
Grants Management Training 200 http://news.softpedia.com/news/harvard-university-announces-cyber-intrusion- 485837.shtml
6
Grants Management Training 200 http://www.esecurityplanet.com/hackers/johns-hopkins-university-hacked.html
7
Grants Management Training 200 http://money.cnn.com/2014/02/19/news/university-maryland-hack/
8
Grants Management Training 200 http://www.nextgov.com/cybersecurity/threatwatch/2015/08/breach/2435/
9
Grants Management Training 200 http://www.miamiherald.com/news/local/community/miami-dade/coral-gables/article31056513.html
10
Grants Management Training 200 http://www.nj.com/education/2015/08/who_hacked_rutgers_university_spen ding_up_to_3m_to.html
11
Grants Management Training 200 http://www.providencejournal.com/article/20150820/NEWS/150829905 http://www.nextgov.com/cybersecurity/threatwatch/2015/08/breach/2450 /
12
Grants Management Training 200
14
Number of spam/phishing emails UNM IT blocks DAILY 1-3 MILLION If one gets through, forward to: spamdrop@unm.edu
15
Grants Management Training 200 Why Universities? Universities are prime targets for hackers because of the vast amounts of personal and technological data that they store Universities are on the cutting edge of science and technology creating next generation technology that is coveted worldwide The cornerstone for academic research institutions is collaboration. This fundamental aspects makes universities a soft target
16
Grants Management Training 200 Your information is out there
17
Grants Management Training 200
19
Cyber Crime 6 BILLION email scams sent out monthly! CYBER CRIME COST CONSUMERS $113 BILLION ANNUALLY! 110 million Americans, about 47% of American adults, lost some personal information to hackers in 2014 http://www.businessinsider.com/half-of-american-adults-were-hacked-last-year-2014-5#ixzz3XyUm2sOl Cyber Attacks on U.S. Companies in 2014 http://www.heritage.org/research/reports/2014/10/cyber-attacks-on-us-companies-in-2014 Target/Kmart Home Depot PF Changs/Chick-fil-a/Jimmy Johns/Dairy Queen Michaels Ebay JP Morgan Chase Sony Blue Cross
20
Grants Management Training 200
21
It just takes ONE to start the virus When a virus infects UNM computers a hacker can obtain every document stored on your UNM computer/network Personal Information Research Email
22
Grants Management Training 200 TRUST YOUR GUT YOU have to do something to be attacked! NEVER click on “Click Here” or embedded links! NEVER give personal information to ANYONE over the phone/internet NOTHING is free
23
Grants Management Training 200 Hover, Don’t click Before Clicking On Any Links in Email, FB,Twitter, LinkedIn, etc., You Should Always Hover Your Mouse Over The Links To Check Their Real Destination.
24
Grants Management Training 200 Sender is a UNM employee whose account was compromised
25
Grants Management Training 200
26
This was an email that was sent out to the UNM Community from employeebenifits@unm.eduemployeebenifits@unm.edu The actual sender used a system in Italy
27
Grants Management Training 200
28
Antivirus software can only protect you from known viruses http://kaspersky-cyberstat.com/ Kaspersky Lab is detecting 315,000 new malicious files every day http://www.kaspersky.com/about/news/virus/2013/number-of-the-year
29
Grants Management Training 200 Fake Virus Alerts
30
Grants Management Training 200 What other ways can you get a virus?
31
Grants Management Training 200 Allow remote access? Never http://www.xsolutions.com/2014/03/the-dangers-of-granting-remote-access-to-your-network/
32
Grants Management Training 200
34
WHAT TO DO IF YOU’VE RESPONDED TO A PHISHING SCAM: Report the incident -FTC, FBI, Secret Service, UNM IT http://www.ic3.gov/default.aspx http://www.ic3.gov/default.aspx https://www.ftccomplaintassistant.gov/#crnt&panel1-1 Change the passwords on all your online accounts Routinely review your credit card and bank statements Place a fraud alert on your credit report
35
Grants Management Training 200 Cell Phone Location Tracking Apple iphone : http://www.womansday.com/life/work-money/news/a51083/secret-iphone-locations-menu/http://www.womansday.com/life/work-money/news/a51083/secret-iphone-locations-menu/ Android: http://www.today.com/video/how-to-turn-off-android-location-tracking-435573315637http://www.today.com/video/how-to-turn-off-android-location-tracking-435573315637
36
Grants Management Training 200 MOBILE PHONE THREATS USE SAME PRECAUTIONS ON A MOBILE DEVICE AS YOU WOULD USE ON A COMPUTER Do not use passwords on public Wi-Fi Install vendor approved anti-virus software. Have passcode to log into phone Don’t ask someone to take your photo with your phone Do not save passwords, PINs or other account information as Contacts or in Notes. Do not download software updates while logged into a Wi-Fi network. Install tracking tools to track lost and stolen devices. Install remote wiping tools. Disable GPS feature when taking and sending photos -- http://abclocal.go.com/wabc/video?id=7621105 http://abclocal.go.com/wabc/video?id=7621105
37
Grants Management Training 200 OTHER TRAINING OFFERED Cyber Security – Phishing: How Not To Become a Victim of Email Fraud Social Networking Security Laptop and Cell phone Security International Travel Security Workplace Violence Identity Theft Deb Kuidis 277-2058
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.