(A trading company s staff, Ken, is opening the office s door)

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "(A trading company s staff, Ken, is opening the office s door)"

Transcription

1 Information Security Animations Cloud Service Case Study (Script) First Set Setting: At a Trading Company (A trading company s staff, Ken, is opening the office s door) Ken: Boss, what happened? Mr. Chung: The company s server was down and we lost all the import and export information between Mainland and Hong Kong. As you re more familiar with computing, could you help to try rescuing the data? Ken: Yes, of course! Ken: Oh no! The backup data is too outdated so it s useless. Mr. Chung: Why didn t we back up the data regularly? Who is responsible for this? Ken: No one in the company is. Hey! Let s set up an IT Department and upgrade the existing system, then we don t have to worry again! Mr. Chung: I ve considered this too but we are small and medium enterprise (SME) with limited budget, setting up a new department requires money. Regular upgrade of computer systems is not that economical. Uh! Do we have other alternatives? Ken: This Let me look it up on the Internet. Ken: Can we consider cloud services, boss? Mr. Chung: What are cloud services? Ken: As you see, cloud computing is a means of computing based on the Internet, where the shared hardware and software resources as well as information are provided to users computers and other devices on demand.cloud service providers can deliver cloud services to individuals as well as SMEs via cloud computing. Cloud services are designed to provide users with simple and easy access to applications, resources and services, which are fully managed by a cloud service provider. Examples of such services include webmail, data storage, document management, etc. This is very suitable for our company. The benefits of using cloud services include operational savings, agility, innovation and so on. Mr. Chung: How does it work to save operating cost? Ken: Based on their needs, SMEs can use cloud services of relatively low-cost. In general, the cost will be based on the usage of the services or a fixed monthly charge. Mr. Chung: Is it reliable? Ken: No problem! Many companies are using it. Mr. Chung: If that s the case I ll rely on you to give it a try. Ken: No problem! You can count on me! Second Set Setting: Mr. Chung s Home (Mr. Chung s daughter, Wan, and her friend, Keung, are arriving at her home s opening front door after a voluntary activity.) Keung: I m going to leave now. Page 1 of 6

2 Wan: Thank you for the hard work today! Mother: Wan, you re back! Oh? And Keung is here too! Keung: Aunt Chung, How are you doing? Mother: I m fine, thanks! Would you like to have dinner with us tonight? Keung: No, thank you. I feel sorry to keep bothering you. Mother: It s alright. We rarely have a chance to have dinner with you. Keung: Then I d better accept your invitation. Thank you! Mother: Don t be too courteous to me! Little Brother: I am very hungry. What can I eat? (Wan is opening an enveloped birthday card that was put on the coffee table.) Little Brother: Wow! This birthday card is cool! Who sent it to you? Wan: Mind your own business! Give it back to me! Little Brother: Wait a second. Let me take a photo and share it with friends via my mobile phone. Wan: Those friends on social networking sites again? Little Brother: That is a website providing services on a cloud platform. Keung: Wait a second! (The photo has been uploaded successfully.) Little Brother: When did you start acting like my mother, Keung? You even bother to interfere me with photo upload? Keung: Excuse me if I interfere with you. However, the photo you took contains image of the envelope with Wan s personal data, such as name, date of birth and address. Little Brother: And so what? Keung: Just like using other online services, it s very important to protect information on cloud platform. When you upload Wan s sensitive information to the Internet, this could bring trouble to Wan if the information is exposed to people with illicit intent. Little Brother: Don t worry! My selected cloud service provider has applied adequate security measures. It s really safe! Keung: Knowing the security measures applied by cloud service provider is not sufficient to protect sensitive information. Have you read and understand the details of the Terms of Services as well as Security and Privacy Policy of your service provider? These include how information is being stored and protected, and how to report an security incident, etc. Little Brother: Um but this user account is mine. Does the service provider have the right to make use of my photos? Keung: It s possible. That s why we have to be cautious before uploading any sensitive information to the cloud platform. Wan: Anyway, delete the photo now! (Wan grabs her little bother s mobile phone immediately and delete the photo from the cloud platform.) (In the living room, Wan is uploading photos of the voluntary activity to the cloud storage platform.) Wan: I ve just shared the photos with you, Keung. You could now easily complete the highlights of today s Page 2 of 6

3 activities. Keung: Yes, I got it. Thank you! I also downloaded your resume and found that we studied in the same primary school! Wan: What? No way! Keung: In fact, you should pay attention to access limitation settings, and check if the default permission of files or folders is appropriate. If not, then it will be like the file containing your resume, which is available for download to anyone like me. Keung: When using mobile devices, for example a smartphone, to connect to the cloud services, you need to properly protect it because of its small size. You should also enable the password protected screen savers to lock the access devices and keep operating systems, browsers and applications of the access devices up-to-date with the latest software versions and security patches. Also, refrain from jailbreaking the access devices, which means removing usage and access limitation controls. Wan: Okay! May I use your mobile phone to change my settings on the cloud platform? Keung: No! You should only use trustworthy devices to access your cloud service, such as your laptop. Never use public computers to handle sensitive information on cloud platform. You should also securely setup your access account, including a strong password. Use different passwords for different accounts. Log off from the cloud services when it is not required. Wan: I see. Let s change the settings right away, or else my little brother will eat up all the food! Third Set Setting: Mr. Chung s Home (Mr. Chung gets back home after work.) Mother: Why are you so late from work? It s rare that Keung joined us for dinner tonight. Mr. Chung: Our company s server was down. We lost all our recent data and we need to input it all over again. I ve been busy all day. Keung: Uncle, why don t you upgrade the system? Mr. Chung: I ve considered that, but we will have to invest a lot. Little Brother: Dad, have you heard of cloud services? It s so popular now and I m using it! Mother: You just don t understand. By storing important data in some kind of so-called cloud, you wouldn t even know when people steal them! Forget it, and don t follow the trend. Mr. Chung: His suggestion is actually constructive this time. My colleague also suggested using cloud services, but I m worried about what would happen if the cloud services are unavailable and the stored data could not be accessed. What if personal privacy is being disclosed or someone steals business secrets from the company? Little Brother: I ve been using cloud services for so long but I never see such accidents happened before. Keung: Actually, cloud services are not that unsafe as you think. As long as uncle s company have a thorough understanding on the security measures for selecting cloud service providers and using cloud services, then cloud services can be used safely. Mr. Chung: You also know about cloud services? Page 3 of 6

4 Keung: A bit. Wan: You are so humble! Dad, he s a technical consultant on cloud services! You found the right person! Mr. Chung: That s great! Keung, I ve seen on the Internet that there are different types of cloud services. In terms of information security, how can I choose the right service provider that can make me feel safe? Keung: SMEs should understand the Terms of Service and Security & Privacy Policy. For example, how to report an incident, whether the privacy policy follows the data protection principles, and how to process the data retained on cloud platform after service termination. You should also understand data ownership, for example, check whether the service provider can use, disclose, or make your information public. Mr. Chung: What else should I pay attention to? Keung: Besides, you should choose a service provider that can clearly explain what security features they could provide. And this service provider should preferably possess with independent information security management certificates, such as the ISO/IEC Meanwhile, the service provider under selection should not have history of major security incident, or one that could provide a clear explanation of what happened during the incident and what follow up actions have been taken afterwards. Mr. Chung: I see. However, how do I ensure that my information is well protected? Keung: You can choose a service provider that can provide encryption (such as Secure Sockets Layer (SSL)) to transmit data. Encryption should be provided when storing static data. If the service provider does not provide encryption, you should encrypt your data before storing them on the cloud platform and protect the encryption key securely. Mr. Chung: Got it. However, I want to know more about the things that I should pay attention to when using the cloud services. Are you free to come to my office and tell me more about it, Keung? You will be well rewarded! Keung: No problem! Reward is not needed and I think having dinners at your home more often would be fine, if Aunt Chung doesn t mind. Fourth Set Setting: In the office of Mr. Chung s company (Mr. Chung invited Keung to meet at his office. Ken is preparing to store sensitive information onto the cloud platform.) Ken: We ll upload this that and this file to the cloud platform, encrypt the data and properly set up account authentication. Then it ll be alright. Good morning, boss. Mr. Chung: Good morning, Ken. I invited a cloud services expert, Keung, to our office today. You can ask him any issues on cloud services. Ken: Cloud services are quite easy to use, boss. I consider myself a semi-expert now! Mr. Chung: You should be careful when handling company s sensitive information. There are many areas related to data protection that you need to pay attention. Keung: That s right! Before handling sensitive information, you should read the Terms of Service and Security &Privacy Policy. You should also understand whether your service provider has access to your company data. If so, how to restrict that access. Sometimes there may be secondary uses on user Page 4 of 6

5 account information without user s knowledge or consent. Ken: What is Secondary uses? Keung: For example, information stored in the cloud may be used for tailor advertisements. If you don t understand these terms, company information may be leaked without your notice. At the same time, you should understand the data location, and assess whether there are impacts on security procedures. Mr. Chung: If you store company s sensitive information on the cloud without understanding such issues, what happens if our data is being leaked? Ken: I thought as long as I set up user accounts with authentication and apply encryption for data protection, then it would be very secure. I didn t know that there are other areas requiring our attention. Keung: Yes. When using cloud services, you should use strong authentication method, such as two-factor authentication. It refers to a combination of any two factors of:, what you know, what you have and what you are. Also you should change your passwords periodically. In addition, you should delete access accounts or change passwords immediately when there are staff changes. This can avoid unauthorised access of sensitive information which causes potential damage to the company. At the same time, data protection is also important., for example, you should understand and keep a record of what type of data are stored in the cloud and avoid sharing out data to unintended parties, etc. Mr. Chung: Ken, as you are our company s cloud service administrator, you should be familiar with how to protect the data on cloud platform. If you have any questions, you can seek Keung s advice! Ken: That s very good! Are there any other duties for a cloud service administrator? Keung: You also need to know how to manage the cloud and understand service continuity. For example, you should perform regular backup of the data stored in the cloud service and maintain a local backup copy of your important data. In doing so, you can ensure that the data can still be available when the service provider s provided service is out of service temporarily or permanently. You should also establish a simple set of access account policies and usage policies for using the cloud services for your staff to comply with. You should also conduct regular reviews of access rights on staff having access to cloud data and provide basic security awareness training for staff using cloud service. Ken: What else should I pay attention to? (Ken continues to seek advice from Keung on cloud service administration.) Ken: I understand now. I have just realised that a cloud service administrator should pay attention to so many details, which deviates from what I thought that it s all about uploading data. I would like to ask for a salary increase! Mr. Chung: A salary increase? Keung taught you so much that you should be the one paying for that. Page 5 of 6

6 To learn more about information security, please visit the InfoSec website at: Page 6 of 6

Adopting Cloud Computing with a RISK Mitigation Strategy

Adopting Cloud Computing with a RISK Mitigation Strategy Adopting Cloud Computing with a RISK Mitigation Strategy TS Yu, OGCIO 21 March 2013 1. Introduction 2. Security Challenges Agenda 3. Risk Mitigation Strategy Before start using When using 4. Policy & Guidelines

More information

White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0

White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0 White Paper Enterprise File Serving 2.0 Anywhere, Any Device File Access with IT in Control Like it or not, cloud- based file sharing services have opened up a new world of mobile file access and collaborative

More information

Mapping Your Path to the Cloud. A Guide to Getting your Dental Practice Set to Transition to Cloud-Based Practice Management Software.

Mapping Your Path to the Cloud. A Guide to Getting your Dental Practice Set to Transition to Cloud-Based Practice Management Software. Mapping Your Path to the Cloud A Guide to Getting your Dental Practice Set to Transition to Cloud-Based Practice Management Software. Table of Contents Why the Cloud? Mapping Your Path to the Cloud...4

More information

For example some Bookkeepers are using Dropbox to share the accounting files between them and their client.

For example some Bookkeepers are using Dropbox to share the accounting files between them and their client. DropBox vs SugarSync - File storage in the cloud 1 Dropbox There are a number of solutions emerging into the market, which provide users the ability to store files in the cloud, which provide a number

More information

Tenth Judicial Circuit of Florida Information Systems Acceptable Use Guidelines Polk, Hardee and Highlands Counties as of January 2014

Tenth Judicial Circuit of Florida Information Systems Acceptable Use Guidelines Polk, Hardee and Highlands Counties as of January 2014 Tenth Judicial Circuit of Florida Information Systems Acceptable Use s Polk, Hardee and Highlands Counties as of January 2014 The following guidelines define the acceptable use of information technology

More information

Hosted File Backup for business. Keep your data safe with our cloud backup service

Hosted File Backup for business. Keep your data safe with our cloud backup service Hosted File Backup for business Keep your data safe with our cloud backup service Why choose Hosted File Backup? Your most important business asset is data. After all, without customer information, order

More information

platforms Android BlackBerry OS ios Windows Phone NOTE: apps But not all apps are safe! malware essential

platforms Android BlackBerry OS ios Windows Phone NOTE: apps But not all apps are safe! malware essential Best Practices for Smartphone Apps A smartphone is basically a computer that you can carry in the palm of your hand. Like computers, smartphones have operating systems that are often called platforms.

More information

For parents this document should be read in conjunction with the Osper Cardholder Terms and Conditions.

For parents this document should be read in conjunction with the Osper Cardholder Terms and Conditions. Version: 10.08.15 Osper Service Terms Introduction This document explains your legal rights and obligations in relation to your use of the Osper Service ( Osper ), including use of the Osper App. Parents

More information

BUSINESS COMPUTER SECURITY. aaa BUSINESS SECURITY SECURITY FOR LIFE

BUSINESS COMPUTER SECURITY. aaa BUSINESS SECURITY SECURITY FOR LIFE aaa BUSINESS SECURITY SECURITY FOR LIFE CHAPTER 1: WHY COMPUTER SECURITY IS IMPORTANT FOR YOUR BUSINESS No matter how big or small your business is, it s highly likely that you have some information stored

More information

Meet Drive. Find your files easily with Drive, and keep all your documents safe and secure.

Meet Drive. Find your files easily with Drive, and keep all your documents safe and secure. Meet Drive With Google Drive, you can store your files in the cloud, share them with your team members or external partners, and access the files from anywhere. Find your files easily with Drive, and keep

More information

Transcription. Crashplan vs Backblaze. Which service should you pick the short version

Transcription. Crashplan vs Backblaze. Which service should you pick the short version Transcription Crashplan vs Backblaze Hey and welcome to cloudwards.net and another exciting video of two major unlimited online backup services namely Backblaze and CrashPlan or CrashPlan or Backblaze.

More information

Small businesses: What you need to know about cyber security

Small businesses: What you need to know about cyber security Small businesses: What you need to know about cyber security March 2015 Contents page What you need to know about cyber security... 3 Why you need to know about cyber security... 4 Getting the basics right...

More information

Hosted File Back-up for business. Keep your data safe with our cloud back-up service

Hosted File Back-up for business. Keep your data safe with our cloud back-up service Hosted File Back-up for business Keep your data safe with our cloud back-up service Why choose Hosted File Back-up? Your most important business asset is data. After all, without customer information,

More information

Privacy Policy Version 1.0, 1 st of May 2016

Privacy Policy Version 1.0, 1 st of May 2016 Privacy Policy Version 1.0, 1 st of May 2016 THIS PRIVACY POLICY APPLIES TO PERSONAL INFORMATION COLLECTED BY GOCIETY SOLUTIONS FROM USERS OF THE GOCIETY SOLUTIONS APPLICATIONS (GoLivePhone and GoLiveAssist)

More information

Spreed Keeps Online Meetings Secure. Online meeting controls and security mechanism. www.spreed.com

Spreed Keeps Online Meetings Secure. Online meeting controls and security mechanism. www.spreed.com Spreed Keeps Online Meetings Secure Online meeting controls and security mechanism www.spreed.com Spreed Online Meeting is protected by the most advanced security features. Rest assured that your meetings

More information

Research into mobile users privacy attitudes

Research into mobile users privacy attitudes Research into mobile users privacy attitudes Key findings from and Conducted by July 2013 2 Research into mobile users privacy attitudes Key findings from and In association with: With support from: Research

More information

HIPAA Myths. WEDI Member Town Hall. Chris Apgar, CISSP Apgar & Associates

HIPAA Myths. WEDI Member Town Hall. Chris Apgar, CISSP Apgar & Associates HIPAA Myths WEDI Member Town Hall Chris Apgar, CISSP Apgar & Associates Overview Missed Regulatory Requirements Common HIPAA Privacy Myths Common HIPAA Security Myths Other Related Myths Finding the Right

More information

HIPAA Myths. WEDI Regional Affiliates. Chris Apgar, CISSP Apgar & Associates

HIPAA Myths. WEDI Regional Affiliates. Chris Apgar, CISSP Apgar & Associates HIPAA Myths WEDI Regional Affiliates Chris Apgar, CISSP Apgar & Associates Overview Missed Regulatory Requirements Common HIPAA Privacy Myths Common HIPAA Security Myths Other Related Myths Finding the

More information

ShareFile Security Overview

ShareFile Security Overview ShareFile Security Overview ShareFile Company Policy All ShareFile employees undergo full background checks and sign our information security policy prior to beginning employment with the company. The

More information

Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines

Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines 1. Implement anti-virus software An anti-virus program is necessary to protect your computer from malicious programs,

More information

Bodywhys Privacy Policy

Bodywhys Privacy Policy Bodywhys Privacy Policy Website Bodywhys respects the privacy of all visitors to our website. This website privacy statement outlines our policy concerning the use and collection of personal information

More information

Online Backup by Mozy. Common Questions

Online Backup by Mozy. Common Questions Online Backup by Mozy Common Questions Document Revision Date: June 29, 2012 Online Backup by Mozy Common Questions 1 What is Online Backup by Mozy? Online Backup by Mozy is a secure online data backup

More information

The BiGuard SSL VPN Appliances

The BiGuard SSL VPN Appliances The BiGuard SSL VPN Appliances ERP Application Guide 1. What is ERP (Enterprise Resource Planning)? 2. The current status of ERP 3. Billion s solutions for several ERP usage scenarios A. Small to medium

More information

Security Solutions for HIPAA Compliance Issues 1

Security Solutions for HIPAA Compliance Issues 1 :6B)73 6HFXULW\6ROXWLRQVIRU +,3$$&RPSOLDQFH +RZ:6B)73&DQ+HOS +,3$$7KH+HDOWK,QVXUDQFH3RUWDELOLW\DQG $FFRXQWDELOLW\$FWRIZDVHQDFWHGWR HVWDEOLVKJXLGHOLQHVZLWKLQWKHKHDOWKFDUHLQGXVWU\ WRHQVXUHWKHSULYDF\RISDWLHQWVDQGWKHSK\VLFDO

More information

Paladin Computers Privacy Policy Last Updated on April 26, 2006

Paladin Computers Privacy Policy Last Updated on April 26, 2006 Paladin Computers Privacy Policy Last Updated on April 26, 2006 At Paladin Computers ( Service Provider ), we respect our Users and Clients right to privacy with regards to the use of their email and our

More information

FAMILY. Reference Guide. Pogoplug Family. Reference Guide. 2012 Cloud Engines, Inc. All Rights Reserved.

FAMILY. Reference Guide. Pogoplug Family. Reference Guide. 2012 Cloud Engines, Inc. All Rights Reserved. Reference Guide Pogoplug Family Reference Guide Table of Contents Table of Contents 1. What s Included 2. Setting Up Your Pogoplug Device 3. Back Up a. Backing Up Your Computers b. Backing Up Your Mobile

More information

INTRODUCTION TO CLOUD STORAGE

INTRODUCTION TO CLOUD STORAGE University of North Carolina at Chapel Hill Libraries Carrboro Cybrary Chapel Hill Public Library Durham County Public Library INTRODUCTION TO CLOUD STORAGE GETTING STARTED PAGE 02 Class Overview What

More information

Conferencing Moderator Guide - Proprietary - 2007 Nextera Communications. Conferencing Moderator Guide

Conferencing Moderator Guide - Proprietary - 2007 Nextera Communications. Conferencing Moderator Guide - Proprietary - Conferencing Moderator Guide TABLE OF CONTENTS 1 INTRODUCTION...3 2 ACTIVATING THE CONFERENCE CALL...3 3 QUICK KEY REFERENCE FOR TELEPHONE ADMINISTRATION...3 4 WEB INTERFACE...4 4.1 Accessing

More information

Privacy Policy. Introduction. Scope of Privacy Policy. 1. Definitions

Privacy Policy. Introduction. Scope of Privacy Policy. 1. Definitions Privacy Policy Introduction This Privacy Policy explains what information TORO Limited and its related entities ("TORO") collect about you and why, what we do with that information, how we share it, and

More information

FREE REPORT: Answers To The Top 5 Questions Business Owners Have About Cloud Computing

FREE REPORT: Answers To The Top 5 Questions Business Owners Have About Cloud Computing FREE REPORT: Answers To The Top 5 Questions Business Owners Have About Cloud Computing Discover What Most IT Consultants Don t Know Or Won t Tell You About Moving Your Company s Network To The Cloud By

More information

Online Backup Solution Features

Online Backup Solution Features CCC Technologies, Inc. 700 Nicholas Blvd., Suite 300 Elk Grove Village, IL 60007 877.282.9227 www.ccctechnologies.com Online Backup Solution Features Introduction Computers are the default storage medium

More information

11. Exercise: Incident Handling in Live Role Playing 11.1 GENERAL DESCRIPTION. 112 CERT Exercises Toolset Document for students

11. Exercise: Incident Handling in Live Role Playing 11.1 GENERAL DESCRIPTION. 112 CERT Exercises Toolset Document for students 112 CERT Exercises Toolset 11. Exercise: Incident Handling in Live Role Playing Main Objective Targeted Audience Total Duration Time Schedule Frequency The exercise simulates a real-life incident, involving

More information

WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY

WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY SMALL BUSINESSES WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY ONE CLICK CAN CHANGE EVERYTHING SMALL BUSINESSES My reputation was ruined by malicious emails ONE CLICK CAN CHANGE EVERYTHING Cybercrime comes

More information

HIPAA MYTHS: DON T ALWAYS BELIEVE WHAT YOU HEAR. Chris Apgar, CISSP

HIPAA MYTHS: DON T ALWAYS BELIEVE WHAT YOU HEAR. Chris Apgar, CISSP HIPAA MYTHS: DON T ALWAYS BELIEVE WHAT YOU HEAR Chris Apgar, CISSP 2015 OVERVIEW Missed Regulatory Requirements Common HIPAA Privacy Myths Common HIPAA Security Myths Other Related Myths Finding the Right

More information

SOLITEC products or services for which a separate privacy policy is provided.

SOLITEC products or services for which a separate privacy policy is provided. 1 of 9 Privacy Policy This Privacy Policy explains what information SOLITEC Software Solutions GesmbH and its related entities ( SOLITEC ) collect about you and why, what we do with that information, how

More information

Two Factor Authentication - USER GUIDE

Two Factor Authentication - USER GUIDE Two Factor Authentication - USER GUIDE Two Factor Authentication (or 2FA) is a two step verification process that provides an extra layer of security for you when accessing your account within Online Services.

More information

Frequently asked questions

Frequently asked questions Adobe Creative Cloud for teams FAQ Frequently asked questions The following are answers to common questions about Adobe Creative Cloud for teams membership, purchasing, security, and storage. CREATIVE

More information

eztechdirect Backup Service Features

eztechdirect Backup Service Features eztechdirect Backup Service Features Introduction Portable media is quickly becoming an outdated and expensive method for safeguarding important data, so it is essential to secure critical business assets

More information

Selecting a Law Firm Cloud Provider: Questions to Ask and Ethical/Security Concerns

Selecting a Law Firm Cloud Provider: Questions to Ask and Ethical/Security Concerns Selecting a Law Firm Cloud Provider: Questions to Ask and Ethical/Security Concerns by Sharon D. Nelson, Esq. and John W. Simek 2013 Sensei Enterprises, Inc. It seems like everybody is talking about the

More information

TargetingMantra Privacy Policy

TargetingMantra Privacy Policy Last Updated August 15 th, 2013 TargetingMantra Privacy Policy TargetingMantra allows its customers, to provide personalization widgets to their users (collectively, the TargetingMantra Service ). The

More information

HIPAA: Bigger and More Annoying

HIPAA: Bigger and More Annoying HIPAA: Bigger and More Annoying Instructor: Laney Kay, JD Contact information: 4640 Hunting Hound Lane Marietta, GA 30062 (770) 312-6257 (770) 998-9204 (fax) laney@laneykay.com www.laneykay.com OFFICIAL

More information

Dropbox for Business. Secure file sharing, collaboration and cloud storage. G-Cloud Service Description

Dropbox for Business. Secure file sharing, collaboration and cloud storage. G-Cloud Service Description Dropbox for Business Secure file sharing, collaboration and cloud storage G-Cloud Service Description Table of contents Introduction to Dropbox for Business 3 Security 7 Infrastructure 7 Getting Started

More information

Report on Hong Kong SME Cloud Adoption and Security Readiness Survey

Report on Hong Kong SME Cloud Adoption and Security Readiness Survey Report on Hong Kong SME Cloud Adoption and Security Readiness Survey Collaborated by Internet Society Hong Kong and Cloud Security Alliance (HK & Macau Chapter) Sponsored by Microsoft Hong Kong Jointly

More information

Deduplication as security issue in cloud services, and its representation in Terms of Service Agreements

Deduplication as security issue in cloud services, and its representation in Terms of Service Agreements Deduplication as security issue in cloud services, and its representation in Terms of Service Agreements Cecilia Wirfelt Louise Wallin Email: {cecwi155, louwa538}@student.liu.se Supervisor: Jan-Åke Larsson,

More information

Online File Sharing for Business

Online File Sharing for Business Your complete guide to MyOwnCloud Online File Sharing for Business 1 Table of Contents Hosted Desk- The business need for online file sharing! What is MyOwnCloud? How can online file sharing help my business?

More information

Protecting Data with a Unified Platform

Protecting Data with a Unified Platform Protecting Data with a Unified Platform The Essentials Series sponsored by Introduction to Realtime Publishers by Don Jones, Series Editor For several years now, Realtime has produced dozens and dozens

More information

STRONGER ONLINE SECURITY

STRONGER ONLINE SECURITY STRONGER ONLINE SECURITY Enhanced online banking without compromise Manage your business banking efficiently and securely Internet banking has given business leaders and treasurers greater control of financial

More information

STOP. THINK. CONNECT. Online Safety Quiz

STOP. THINK. CONNECT. Online Safety Quiz STOP. THINK. CONNECT. Online Safety Quiz Round 1: Safety and Security Kristina is on Facebook and receives a friend request from a boy she doesn t know. What should she do? A. Accept the friend request.

More information

Policy for Protecting Customer Data

Policy for Protecting Customer Data Policy for Protecting Customer Data Store Name Store Owner/Manager Protecting our customer and employee information is very important to our store image and on-going business. We believe all of our employees

More information

Question Bank June 2015 R001 Mock

Question Bank June 2015 R001 Mock Bank June 2015 R001 Mock Jan13 1 Spec 1 Spec 7 Jan15 7 1. The software needed to create individual graphics for animated cartoons Richard uses his smartphone to take a photograph. a) State two ways in

More information

OWASP Top 10 for IoT - Explained

OWASP Top 10 for IoT - Explained OWASP Top 10 for IoT - Explained Table of Contents Introduction... 1 Insecure Web Interface... 2 Insufficient Authentication/Authorization... 3 Insecure Network Services... 3 Lack of Transport Encryption...

More information

Using Dropbox with Amicus Attorney. (Presentation Notes) Full Presentation & Video Available @ http://accellis.com/ using-amicus-attorney-with-dropbox

Using Dropbox with Amicus Attorney. (Presentation Notes) Full Presentation & Video Available @ http://accellis.com/ using-amicus-attorney-with-dropbox (Presentation Notes) Full Presentation & Video Available @ http://accellis.com/ using-amicus-attorney-with-dropbox Materials by: Colleen Heine Amicus Attorney Certified Consultant My name is Colleen Heine

More information

Apptix Online Backup by Mozy

Apptix Online Backup by Mozy Apptix Online Backup by Mozy What is Apptix Online Backup by Mozy? Apptix Online Backup by Mozy is a secure online data backup service. It's a simple, smart, and economical way to protect your data from

More information

Frequently Asked Questions

Frequently Asked Questions FAQs Frequently Asked Questions Connecting your Linksys router to the Internet 1 What computer operating systems does my Linksys router support? 1 Why can t I connect my computer or device to my router?

More information

Information Security

Information Security Information Security A staff guide to the University's Information Systems Security Policy Issued by the IT Security Group on behalf of the University. Information Systems Security Guidelines for Staff

More information

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS ftrsecure.com Can You Separate Myths From Facts? Many Internet myths still persist that could leave you vulnerable to internet crimes. Check out

More information

Pros 4 Technology Online Backup Features

Pros 4 Technology Online Backup Features Pros 4 Technology Online Backup Features Introduction Computers are the default storage medium for most businesses and virtually all home users. Because portable media is quickly becoming an outdated and

More information

IIS 6.0SSL Certificate Deployment Guide

IIS 6.0SSL Certificate Deployment Guide IIS 6.0SSL Certificate Deployment Guide StartCom CA Limited Contents 1.Generate the CSR by customer.... 3 1.1 Generate the private key files and CSR files... 3 1.2 Create a new certificate request... 3

More information

InsightCloud. www.insightcloud.com. Hosted Desktop Service. What is InsightCloud? What is SaaS? What are the benefits of SaaS?

InsightCloud. www.insightcloud.com. Hosted Desktop Service. What is InsightCloud? What is SaaS? What are the benefits of SaaS? What is InsightCloud? InsightCloud is a web portal enabling Insight customers to purchase and provision a wide range of Cloud services in a straightforward and convenient manner. What is SaaS? Software

More information

Is Cloud Computing Inevitable for Lawyers?

Is Cloud Computing Inevitable for Lawyers? Is Cloud Computing Inevitable for Lawyers? by Sharon D. Nelson and John W. Simek 2015 Sensei Enterprises, Inc. Not a single day goes by when you don t hear something about cloud computing. It could be

More information

Contents. Internal Standards ... Ethics and Business Standards. Privacy Policy ... Product Security ... WebMaestro Security ...

Contents. Internal Standards ... Ethics and Business Standards. Privacy Policy ... Product Security ... WebMaestro Security ... Ethics and Security MaestroSoft, Inc. 1750 112th Avenue NE, Suite A200, Bellevue, WA 98004 425.688.0809 / 800.438.6498 Fax: 425.688.0999 www.maestrosoft.com Contents Internal Standards Ethics and Business

More information

Unless otherwise stated, our SaaS Products and our Downloadable Products are treated the same for the purposes of this document.

Unless otherwise stated, our SaaS Products and our Downloadable Products are treated the same for the purposes of this document. Privacy Policy This Privacy Policy explains what information Fundwave Pte Ltd and its related entities ("Fundwave") collect about you and why, what we do with that information, how we share it, and how

More information

5 TIPS FOR HIPAA COMPLIANT MOBILE DEVICES

5 TIPS FOR HIPAA COMPLIANT MOBILE DEVICES White paper 5 TIPS FOR HIPAA COMPLIANT MOBILE DEVICES PROTECTING PHI ON PORTABLE DEVICES 2016 SecurityMetrics 5 TIPS FOR HIPAA COMPLIANT MOBILE DEVICES 1 5 TIPS FOR HIPAA COMPLIANT MOBILE DEVICES PROTECTING

More information

SHARPCLOUD SECURITY STATEMENT

SHARPCLOUD SECURITY STATEMENT SHARPCLOUD SECURITY STATEMENT Summary Provides details of the SharpCloud Security Architecture Authors: Russell Johnson and Andrew Sinclair v1.8 (December 2014) Contents Overview... 2 1. The SharpCloud

More information

Telstra Wholesale Digital Certificates

Telstra Wholesale Digital Certificates Telstra Wholesale Digital Certificates LinxOnline User Guide Issue Number 2, 31 July 2007 Version 2, 31 July 2007 TW Digital Certificate Management User Guide Copyright 2007, Telstra Corporation Limited.

More information

HIPAA Privacy and Security

HIPAA Privacy and Security HIPAA Privacy and Security Course ID: 1020 - Credit Hours: 2 Author(s) Kevin Arnold, RN, BSN Accreditation KLA Education Services LLC is accredited by the State of California Board of Registered Nursing,

More information

ITAR Compliance Best Practices Guide

ITAR Compliance Best Practices Guide ITAR Compliance Best Practices Guide 1 Table of Contents Executive Summary & Overview 3 Data Security Best Practices 4 About Aurora 10 2 Executive Summary & Overview: International Traffic in Arms Regulations

More information

Hang Seng HSBCnet Security. May 2016

Hang Seng HSBCnet Security. May 2016 Hang Seng HSBCnet Security May 2016 1 Security The Bank aims to provide you with a robust, reliable and secure online environment in which to do business. We seek to achieve this through the adoption of

More information

Estate Agents Authority

Estate Agents Authority INFORMATION SECURITY AND PRIVACY PROTECTION POLICY AND GUIDELINES FOR ESTATE AGENTS Estate Agents Authority The contents of this document remain the property of, and may not be reproduced in whole or in

More information

Online Banking & Bill Pay. Quick Start Guide. Step-by-step instructions PLUS easy-to-read screen shots and helpful tips.

Online Banking & Bill Pay. Quick Start Guide. Step-by-step instructions PLUS easy-to-read screen shots and helpful tips. Online Banking & Bill Pay Quick Start Guide Step-by-step instructions PLUS easy-to-read screen shots and helpful tips. Welcome -- Online System Security Welcome to Online Banking and Bill Pay! Whether

More information

How To Set Up Dataprotect

How To Set Up Dataprotect How To Set Up Dataprotect This document will show you how to install and configure your computer for a Typical installation. If you have questions about configuring a Custom installation please contact

More information

ALL THAT GLITTERS IS NOT GOLD

ALL THAT GLITTERS IS NOT GOLD CLOUD COMPUTING ALL THAT GLITTERS IS NOT GOLD SUMMARY: Despite the term first being coined in 1996, it has taken almost 20 years for cloud computing to become mainstream. And even though it has been widely

More information

Ridiculous IT Requests The Early Years. www.linuxit.com

Ridiculous IT Requests The Early Years. www.linuxit.com Ridiculous IT Requests The Early Years Ridiculous IT Requests The Early Years In the days of yore when Cloud computing meant browsing a copy of PC Pro in Economy class, a Smartphone was one that didn t

More information

Spring Hill State Bank Mobile Banking FAQs

Spring Hill State Bank Mobile Banking FAQs Spring Hill State Bank Mobile Banking FAQs What is Mobile Banking? Mobile Banking enables you to access your account information using the Bank online banking website. You must first be enrolled as an

More information

ZCorum s Ask a Broadband Expert Series:

ZCorum s Ask a Broadband Expert Series: s Ask a Broadband Expert Series: Is Privacy a Cloud Illusion? By Rick Stiles, VP of Product Development StoAmigo.800.909.944 450 North Point Parkway, Suite 25 Alpharetta, GA 30022 ZCorum.com TruVizion.com

More information

stacktools.io Services Device Account and Profile Information

stacktools.io Services Device Account and Profile Information Privacy Policy Introduction This Privacy Policy explains what information Super7ui LLC collect about you and why, what we do with that information, how we share it, and how we handle the content you place

More information

You can attach email accounts to this domain name (eg. sales@acme.com.au or mary@acme.com.au) which also increases your corporate branding.

You can attach email accounts to this domain name (eg. sales@acme.com.au or mary@acme.com.au) which also increases your corporate branding. EMAIL SET UP 1 Your website is placed on the Internet using a domain name (eg. www.acme.com.au). This is your virtual address and it allows people to find your website amongst the millions of websites

More information

Secure Mail Registration and Viewing Procedures

Secure Mail Registration and Viewing Procedures Secure Mail Registration and Viewing Procedures May 2011 For External Secure Mail Recipients Contents This document provides a brief, end user oriented overview of the Associated Banc Corp s Secure Email

More information

Click Studios. Passwordstate. Upgrade Instructions to V7 from V5.xx

Click Studios. Passwordstate. Upgrade Instructions to V7 from V5.xx Passwordstate Upgrade Instructions to V7 from V5.xx This document and the information controlled therein is the property of Click Studios. It must not be reproduced in whole/part, or otherwise disclosed,

More information

Secure Email Client Guide

Secure Email Client Guide PRESIDIO BANK 33 Secure Email Client Guide THE BUSINESS BANK THAT WORKS 8/2013 Table of Contents Introduction.....3 Our Responsibility to Protect Confidential Information....4 Registering and Accessing

More information

SVA Backup Plus Features

SVA Backup Plus Features 1221 John Q. Hammons Drive Madison, WI 53717 P.O. Box 44966, Madison, WI 53717 P: 608.826.2400 TF: 800.366.9091 F: 608.831.4243 www.sva.com Introduction Computers are the default storage medium for most

More information

Evolved Backup Features Computer Box 220 5th Ave South Clinton, IA 52732 www.thecomputerbox.com 563-243-0016

Evolved Backup Features Computer Box 220 5th Ave South Clinton, IA 52732 www.thecomputerbox.com 563-243-0016 Evolved Backup Features 1 Contents 3 Introduction 3 Ease-of-Use Simple Installation Automatic Backup Off-Site Storage Scalability File Restoration 24/7 6 Security File Compression Encryption Transmission

More information

Using the owncloud Android App

Using the owncloud Android App Using the owncloud Android App Accessing your files on your owncloud server via the Web interface is easy and convenient, as you can use any Web browser on any operating system without installing special

More information

Making Endpoint Encryption Work in the Real World

Making Endpoint Encryption Work in the Real World Endpoint Data Encryption That Actually Works The Essentials Series Making Endpoint Encryption Work in the Real World sponsored by Ma king Endpoint Encryption Work in the Real World... 1 Th e Key: Policy

More information

The IT Manager s Nightmare... Good morning, the board decided last night that we need to have ipads in order to do our work properly. Can you please have these set up for us by next Friday so that we can

More information

ecatcher - Security Features with a Talk2M Pro Account

ecatcher - Security Features with a Talk2M Pro Account Application User Guide AUG 057 / Rev. 1.1 ecatcher - Security Features with a Talk2M Pro Account This application guide describes the security features of ecatcher 5 with a Talk2M Pro account. support.ewon.biz

More information

Is Privacy A Cloud Illusion? Five Hidden Facts You Need to Know

Is Privacy A Cloud Illusion? Five Hidden Facts You Need to Know Is Privacy A Cloud Illusion? Five Hidden Facts You Need to Know 2014 StoAmigo. The information contained within these marketing materials is strictly for illustrative purposes, and the figures herein are

More information

FREE REPORT: Answers To The Top 5 Questions Business Owners Have About Cloud Computing

FREE REPORT: Answers To The Top 5 Questions Business Owners Have About Cloud Computing FREE REPORT: Answers To The Top 5 Questions Business Owners Have About Cloud Computing Discover What Most IT Consultants Don t Know Or Won t Tell You About Moving Your Company s Network To The Cloud By

More information

Online Backup Client User Manual Linux

Online Backup Client User Manual Linux Online Backup Client User Manual Linux 1. Product Information Product: Online Backup Client for Linux Version: 4.1.7 1.1 System Requirements Operating System Linux (RedHat, SuSE, Debian and Debian based

More information

FileCloud Security FAQ

FileCloud Security FAQ is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file

More information

Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure)

Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure) Cryptelo Drive Cryptelo Drive is a virtual drive, where your most sensitive data can be stored. Protect documents, contracts, business know-how, or photographs - in short, anything that must be kept safe.

More information

Hosted SharePoint. OneDrive for Business. OneDrive for Business with Hosted SharePoint. Secure UK Cloud Document Management from Your Office Anywhere

Hosted SharePoint. OneDrive for Business. OneDrive for Business with Hosted SharePoint. Secure UK Cloud Document Management from Your Office Anywhere OneDrive for Business with Hosted SharePoint Secure UK Cloud Document Management from Your Office Anywhere Cloud Storage is commonplace but for businesses that want secure UK Cloud based document and records

More information

Human Resources Policy and Procedure Manual

Human Resources Policy and Procedure Manual Procedure: maintains a computer network and either purchases software for use in the network or develops proprietary software systems for Company use. Company employees are generally authorized to use

More information

THE STORY OF TRACY BEAKER BACK AND BAD by Mary Morris

THE STORY OF TRACY BEAKER BACK AND BAD by Mary Morris THE STORY OF TRACY BEAKER BACK AND BAD by Mary Morris Where s the butter? Right under your nose. Not in the puddle! Hey, hey, hey! That s not for lunch! Fine time to be defrosting the freezer! You told

More information

BUENOS AIRES ccnso Secure Email Communication for cctld Incident Response Working Group [C]

BUENOS AIRES ccnso Secure Email Communication for cctld Incident Response Working Group [C] BUOS AIRES ccnso Secure Email Communication for cctld Incident Response Working Group BUOS AIRES ccnso Secure Email Communication for cctld Incident Response Working Group Sunday, June 21, 2015 15:45 to

More information

WLAN Security Networking with Confidence

WLAN Security Networking with Confidence WLAN Security Networking with Confidence Introduction So you ve just installed a new wireless local area network (WLAN) in your small business or home. The access point is on and connected, the client

More information

Cloud Computing Risk management @HKQAA Symposium Antony Ma Chairman, CSA-HK&M Chapter Global, not-for-profit organization Over 40,000 individual members, around 200 corporate and affiliate members, 64

More information

Getting started with IMAP for Aggiemail What is IMAP?

Getting started with IMAP for Aggiemail What is IMAP? Getting started with IMAP for Aggiemail What is IMAP? IMAP, or Internet Message Access Protocol, lets you download messages from Aggiemail s servers onto your computer so you can access your mail with

More information

Acceptable Use of ICT Policy. Staff Policy

Acceptable Use of ICT Policy. Staff Policy Acceptable Use of ICT Policy Staff Policy Contents INTRODUCTION 3 1. ACCESS 3 2. E-SAFETY 4 3. COMPUTER SECURITY 4 4. INAPPROPRIATE BEHAVIOUR 5 5. MONITORING 6 6. BEST PRACTICE 6 7. DATA PROTECTION 7 8.

More information