Internet Security Awareness Program in Georgia funded by ISOC Community Grants Programme

Size: px
Start display at page:

Download "Internet Security Awareness Program in Georgia funded by ISOC Community Grants Programme"

Transcription

1 Internet Security Awareness Program in Georgia funded by ISOC Community Grants Programme Final Report July, 2011 Prepared by David Tabatadze Project Coordinator

2 Project Overview With the internet an everyday part of our lives for communication, shopping, banking and education the Security awareness has never been more important, as security threats become more complicated and we become more inter-connected. The main goal of this project was to make information and internet security awareness raising program/campaign in easy understandable native language for common Georgia Internet users, to focus common internet users attention on security, to allow individuals to recognize IT security concerns and respond accordingly. As the purpose of information security awareness is improving coordination of the need to protect information and systems and defining the users role in the process. Making computer system users aware of their security responsibilities and disseminating correct practices can help user s change past behaviors. Security Awareness stimulates and motivates to care about security and to remind them of important security practices, explaining what happens to their computers and valuable information if security fails, this motivates people to take security seriously. The scope of any security awareness campaign is to persuade computer users to listen and act on measures to avoid, deter, detect, and defend against information security threats. People must know that the information they posses, whether it's on a computer or in some other communication system, risks being lost, stolen, damaged, or corrupted; so, achieving a basic understanding of information security is a primary goal. People can not only learn about security issues but can learn to mitigate or remove a vulnerability or specific threat. As our project aim was to reach wider audience we created dedicated user awareness web portal in Georgian language where users will be able to find information and best practice about: How to protect computers and data (Usage of Antivirus, Antispyware, firewall ) Secure usage of Internet (Browsers, , Social Media ) Threats, risks and vulnerabilities. (Malware, Spyware, Riskware, Fraud ) Children online safety (Parent's Guide to Internet Safety ) E-Banking, E-Privacy, E-Trade (Online Banking, Shopping, etc) Computer security and vulnerability terminology Various security tools and tips Importance of Wireless security, Passwords, Backup, etc Links to security related web sites and materials Statistics, Legislation, Security announcements, newsletters, etc. Also one of the project aim was to attract other organizations and individuals to pay more attention on importance of security awareness programs to think to start their own and use already published useful materials.

3 Activities undertaken According agreement with web developer company, CMS (Content Management System) web site was created taking into consideration all necessary tools and then it took some time improving mistakes and adding some additional features to make web site as much as possible informative and easy to navigate and understand (www.isap.ge). After collecting, studying, analyzing, revising and approving the general contents, were translated in to Georgian language and revised one more time because of specific words and meanings. Then materials were uploaded to isap.ge web site. In best practice of security awareness campaigns we created informative Leaflet/ brochure. One side contained general tips about protecting information and computer security (use Anti-Virus, use Firewall, make regular updates, use strong passwords, safely use and internet) and another side presented Cartoons about safe use (First think than Click), about password strength, and about Botnet network ( is you computer part of botnet). We think that such kind flyer is attractive and have proven to be one of the most effective method as an awareness strategy for users to understand the seriousness of cyber threats and attract their attention. When the web site was done, most of important information uploaded and leaflet printed it was time to present Georgian internet security awareness project to wider audience. With kind help of Georgian Research and Educational Networking Association GRENA we organized ISAP project presentation and invited representatives and decision makers of different organizations (Universities, Internet Service and Hosting Providers, Governmental agencies and some other). Three presentation have been presented : 1. Prof. Ramaz Kvatadze GRENA - Executive director presented information about GRENA activities and had talk about importance of security nowadays. 2. David Tabatadze Project coordinator presented ISAP project and talked about importance of internet and information security, about current situation with cyber threats in Georgia and about information sharing and awareness raising in general and in different organizations. 3. Dr. Jacek Gajewski - ISOC Europe Chapter Development Manager made presentation about ISOC and it s activities in area of Internet security and also about Importance of CERTs(Computer Emergency Response Teams) and Internet Security Awareness. After project presentation there was questions and discussion how to make people, internet users, employees more security aware and what and how it can be done in terms of different organizations. We suggested as a first step to refer users to isap.ge web site which already contain a lot of important information and also suggested to make their own in-house awareness campaign using materials from isap website. Facebook page was done (facebook.com/isap.ge). As isap.ge web site have possibility of sharing information through facebook, awareness posters have been designed and uploaded, useful tips and some other information have been and is published trough facebook network also.

4 Photos from ISAP Project Presentation, June 22, 2011.

5 List of publications and presentations Presentation about Internet Security Awareness Project in Georgia was presented by David Tabatadze at the international Conference Georgian Cyber Security and ICT Innovation Conference 2010 which took place from the 10th to the 12th of November in Tbilisi, Georgia. Presentation about Internet Security Awareness Project in Georgia was presented by David Tabatadze at Project opening event. Interview was given to Georgian Information technology newspaper Navigator about ISAP project - Methods of disseminating the information to the wider Internet community News about ISAP project and web site launch placed on several news agency headlines after sending them press release. Interview was given to Georgian Broadcasting Company Rustavi 2 after project presentation - Data Exchange Agency which is part of Ministry of Justice of Georgia and monthly sends newsletters to Governmental and public organizations, published article about Internet Security Awareness program in Georgia in it s June newsletter. (attached) As there are more than registered Georgian users in Facebook, it gives much more possibility for project information dissemination, in addition to project web site facebook page provides information about project itself, news, awareness publications and posters, questionnaires, etc. During 1 months more than 1200 people visited this page. (facebook.com/isap.ge) Project Web site which provides lots of information starting June when project was presented it already has about 800 unique visitor and number is growing up. Printed informative leaflets have been given to chapter members for dissemination during ISOC Georgia chapter meeting and also to attendees of the project presentation. Also University representatives agreed to disseminate booklets for students and faculty staff. The Project team s evaluation on the impact of the Project in the community who was expected to benefit from the activities, including specific details and examples that verify the impact The project was a success because attracts more and more interest from society. As this was first time project in terms of internet and information security awareness in Georgia, we think that we made big progress by introducing such kind project for common Georgian internet users as we receive quite good feedback from them. As it was proposed in project Impact of the project will be cooperation with ISPs in development and implementation of procedures to be undertaken in case of cyber security incidents. After project was presented one of the biggest Georgian Internet

6 Service provider (Caucasus Online) agreed to refer/link their customers to our project web site when they detect that user have security related problems. Actually Service Providers are well-placed to provide their customers with information that will help them take simple steps to be more secure online and, of course, ISP s will significantly benefit from reducing infected users and number of incidents in their networks. We continue negotiation with other service providers and organizations to participate in dissemination through its customers and online resources. Participation of Governmental bodies Collaboration with Data Exchange Agency which is very interested in security awareness program for governmental agency employees will give possibility to implement new procedures using already published materials which will help computer users awareness. Participation of Educational institutions Several biggest Georgian Universities (Tbilisi State University, Georgian Technical University, Tbilisi State Medical University and Caucasus University) wants to start in-house awareness program using our project materials and also refer students and faculty members to project web site. We already provided printed informative awareness leaflets to some of them for dissemination through university. At the end our impression and feeling is that we showed and proved to different communities that there is big need in Security awareness programs and users training and it is ongoing process and should be done as a must. Ideas and suggestions on how the Project may be replicable and/or sustainable for continued community benefit The project could be replicated in other countries using the model and tools of the current project. We will be happy to share our experience and knowledge to interested individuals. We think to start cooperation with Financial institutions and Vendors to support this project in any possible way. Acknowledgements ISAP project members are grateful for the funding received under ISOC's community grants programme and additional in-kind support to develop and implement this project.

Education as a defense strategy. Jeannette Jarvis Group Program Manager PSS Security Microsoft

Education as a defense strategy. Jeannette Jarvis Group Program Manager PSS Security Microsoft Education as a defense strategy Jeannette Jarvis Group Program Manager PSS Security Microsoft Introduction to End User Security Awareness End User Security Awareness Challenges Understanding End User

More information

Legislative Council Panel on Information Technology and Broadcasting. Information Security

Legislative Council Panel on Information Technology and Broadcasting. Information Security For Information on 8 July 2013 LC Paper No. CB(4)834/12-13(05) Legislative Council Panel on Information Technology and Broadcasting Information Security Purpose This paper updates Members on the latest

More information

Malware & Botnets. Botnets

Malware & Botnets. Botnets - 2 - Malware & Botnets The Internet is a powerful and useful tool, but in the same way that you shouldn t drive without buckling your seat belt or ride a bike without a helmet, you shouldn t venture online

More information

CUSTOMER SECURITY AWARENESS: A Key Defense Against Corporate Account Takeover & Cyber Fraud

CUSTOMER SECURITY AWARENESS: A Key Defense Against Corporate Account Takeover & Cyber Fraud CUSTOMER SECURITY AWARENESS: A Key Defense Against Corporate Account Takeover & Cyber Fraud Presented by Tom Garcia President / CEO InfoSight, Inc. 2014 InfoSight What we ll cover today 1. The MFA & NACHA

More information

Online Banking Fraud Prevention Recommendations and Best Practices

Online Banking Fraud Prevention Recommendations and Best Practices Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee at Continental National Bank of Miami needs to know

More information

OmniScriptum. Book marketing: A guide to your cross-media sales campaign. Your Publisher.

OmniScriptum. Book marketing: A guide to your cross-media sales campaign. Your Publisher. Book marketing: A guide to your cross-media sales campaign E-Mail: info@omniscriptum.com Internet: www.omniscriptum.com Page 1 We do our best to publish your book! Your book can be ordered anytime and

More information

Congratulations on getting a grant from the Big Lottery Fund.

Congratulations on getting a grant from the Big Lottery Fund. Publicity guidance 1 Congratulations on getting a grant from the Big Lottery Fund. We want you to promote your project as widely as possible and we have written this guide to help you do this. Promoting

More information

Business ebanking Fraud Prevention Best Practices

Business ebanking Fraud Prevention Best Practices Business ebanking Fraud Prevention Best Practices User ID and Password Guidelines Create a strong password with at least 8 characters that includes a combination of mixed case letters, numbers, and special

More information

POLICY REGULATIONS ON PUBLIC RELATIONS AND COMMUNICATION. Article 1 Introduction. Article 2 Policy Regulations on Public Relations and Communications

POLICY REGULATIONS ON PUBLIC RELATIONS AND COMMUNICATION. Article 1 Introduction. Article 2 Policy Regulations on Public Relations and Communications POLICY REGULATIONS ON PUBLIC RELATIONS AND COMMUNICATION Article 1 Introduction International University of Sarajevo (IUS) is a higher educational institution established by the Foundation for Education

More information

National Cybersecurity Awareness Campaign

National Cybersecurity Awareness Campaign National Cybersecurity Awareness Campaign About Stop.Think.Connect. In 2009, President Obama issued the Cyberspace Policy Review, which tasked the Department of Homeland Security with creating an ongoing

More information

Cyber Security. An Executive Imperative for Business Owners. 77 Westport Plaza, St. Louis, MO 63416 p 314.439.4700 f 314.439.4799

Cyber Security. An Executive Imperative for Business Owners. 77 Westport Plaza, St. Louis, MO 63416 p 314.439.4700 f 314.439.4799 Cyber Security An Executive Imperative for Business Owners SSE Network Services www.ssenetwork.com 77 Westport Plaza, St. Louis, MO 63416 p 314.439.4700 f 314.439.4799 Pretecht SM by SSE predicts and remedies

More information

Information Security Summit 2005

Information Security Summit 2005 Information Security Summit 2005 Forensically Sound Information Security Management in a Risk Compliance Era Keynote Opening Address by Mr. Howard C Dickson Government Chief Information Officer Government

More information

ANDRA ZAHARIA MARCOM MANAGER

ANDRA ZAHARIA MARCOM MANAGER 10 Warning Signs that Your Computer is Malware Infected [Updated] ANDRA ZAHARIA MARCOM MANAGER MAY 16TH, 2016 6:05 Malware affects us all The increasing number of Internet users worldwide creates an equal

More information

Marlon R Clarke, Ph. D., CISSP, CISM Director Network Operations and Services, NSU 10-17-2013

Marlon R Clarke, Ph. D., CISSP, CISM Director Network Operations and Services, NSU 10-17-2013 Marlon R Clarke, Ph. D., CISSP, CISM Director Network Operations and Services, NSU 10-17-2013 Todays Discussion Overview of Computer and Internet Security What is Computer and Internet Security Who Should

More information

Cyber Security and Data Security Courses

Cyber Security and Data Security Courses dsdsds Cyber Security and Data Security Courses Overview 01905 317173 @FriendlyNerdUK www.friendlynerd.co.uk Cyber Basics (half-day) To provide a basic foundation of cyber security knowledge for general

More information

Deliverable 7.1 Web Site and Promotional Materials

Deliverable 7.1 Web Site and Promotional Materials Support Action Big Data Europe Empowering Communities with Data Technologies Project Number: 644564 Start Date of Project: 01/01/2015 Duration: 36 months Deliverable 7.1 Web Site and Promotional Materials

More information

Cyber Security: Software Security and Hard Drive Encryption

Cyber Security: Software Security and Hard Drive Encryption Links in this document have been set for a desktop computer with the resolution set to 1920 x 1080 pixels. Cyber Security: Software Security and Hard Drive Encryption 301-1497, Rev A September 2012 Copyright

More information

Protect your personal data while engaging in IT related activities

Protect your personal data while engaging in IT related activities Protect your personal data while engaging in IT related activities Personal Data (Privacy) Ordinance Six Data Protection Principles Principle 1 purpose and manner of collection of personal data Collection

More information

CISO Certified Information Security Officer in Small and Medium Enterprises

CISO Certified Information Security Officer in Small and Medium Enterprises CISO Certified Information Security Officer in Small and Medium Enterprises This project has been funded with support from the European Commission. This publication [communication] reflects the views only

More information

Multi State Information Sharing and Analysis Center. Briefing Paper. Keeping Your Broadband Internet Connection Secure

Multi State Information Sharing and Analysis Center. Briefing Paper. Keeping Your Broadband Internet Connection Secure Multi State Information Sharing and Analysis Center Briefing Paper Keeping Your Broadband Internet Connection Secure August 2007 Broadband Internet Security Keeping Your Broadband Internet Connection Secure

More information

Sound Business Practices for Businesses to Mitigate Corporate Account Takeover

Sound Business Practices for Businesses to Mitigate Corporate Account Takeover Sound Business Practices for Businesses to Mitigate Corporate Account Takeover This white paper provides sound business practices for companies to implement to safeguard against Corporate Account Takeover.

More information

Small businesses: What you need to know about cyber security

Small businesses: What you need to know about cyber security Small businesses: What you need to know about cyber security March 2015 Contents page What you need to know about cyber security... 3 Why you need to know about cyber security... 4 Getting the basics right...

More information

The Security Overview section describes the FDA Information Security program, consisting of several focus areas whose objectives are to keep FDA

The Security Overview section describes the FDA Information Security program, consisting of several focus areas whose objectives are to keep FDA The FDA Intranet Information Security Program Website is a resource where employees can find the most current information on IT security, the FDA awareness program, who to contact with questions and more.

More information

CERT-GOV-GE Activities & Services

CERT-GOV-GE Activities & Services CERT-GOV-GE Activities & Services Tbilisi, Georgia 2014 CERT-GOV-GE Manager David Kvatadze www.dea.gov.ge CERT-GOV-GE - Structural unit was formed within the Information Security and Policy division of

More information

Reliance Bank Fraud Prevention Best Practices

Reliance Bank Fraud Prevention Best Practices Reliance Bank Fraud Prevention Best Practices May 2013 User ID and Password Guidelines Create a strong password with at least 8 characters that includes a combination of mixed case letters and numbers.

More information

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS ftrsecure.com Can You Separate Myths From Facts? Many Internet myths still persist that could leave you vulnerable to internet crimes. Check out

More information

5 Reasons Why Your Security Education Program isn t Working (and how to fix it)

5 Reasons Why Your Security Education Program isn t Working (and how to fix it) 5 Reasons Why Your Security Education Program isn t Working (and how to fix it) February 2015 Presentation Agenda 5 Reasons Your Program isn t Working 10 Learning Science Principles Continuous Training

More information

Introduction to Computer Security

Introduction to Computer Security Introduction to Computer Security Rev. Sept 2015 What is Computer Security? 2 Computer Security is the protection of computing systems and the data that they store or access 3 Why is Computer Security

More information

Top 10 Tips to Keep Your Small Business Safe

Top 10 Tips to Keep Your Small Business Safe Securing Your Web World Top 10 Tips to Keep Your Small Business Safe Protecting your business against the latest Web threats has become an incredibly complicated task. The consequences of external attacks,

More information

Best Practices Guide to Electronic Banking

Best Practices Guide to Electronic Banking Best Practices Guide to Electronic Banking City Bank & Trust Company offers a variety of services to our customers. As these services have evolved over time, a much higher percentage of customers have

More information

STOP.THINK.CONNECT A NATIONAL CYBERSECURITY AWARENESS CAMPAIGN OLDER AMERICANS PRESENTATION

STOP.THINK.CONNECT A NATIONAL CYBERSECURITY AWARENESS CAMPAIGN OLDER AMERICANS PRESENTATION STOP.THINK.CONNECT A NATIONAL CYBERSECURITY AWARENESS CAMPAIGN OLDER AMERICANS PRESENTATION ABOUT STOP.THINK.CONNECT. In 2009, President Obama issued the Cyberspace Policy Review, which tasked the Department

More information

Social Media Status Update Messages. Twitter

Social Media Status Update Messages. Twitter Social Media Status Update Messages October 2012 is National Cyber Security Awareness Month. Join the social media community and raise awareness about online safety and security. Use the following messages

More information

FURNIT-SAVER Smart Augmented and Virtual Reality Marketplace for Furniture Customisation. Project website and collaboration platform

FURNIT-SAVER Smart Augmented and Virtual Reality Marketplace for Furniture Customisation. Project website and collaboration platform Ref. Ares(2015)3247882-03/08/2015 FURNIT-SAVER Smart Augmented and Virtual Reality Marketplace for Furniture Customisation D5.1 Project website and collaboration platform Grant Agreement Number 645067

More information

PROTECT YOUR COMPUTER AND YOUR PRIVACY!

PROTECT YOUR COMPUTER AND YOUR PRIVACY! PROTECT YOUR COMPUTER AND YOUR PRIVACY! Fraud comes in many shapes simple: the loss of both money protecting your computer and Take action and get peace of and sizes, but the outcome is and time. That

More information

National Cyber Security Month 2015: Daily Security Awareness Tips

National Cyber Security Month 2015: Daily Security Awareness Tips National Cyber Security Month 2015: Daily Security Awareness Tips October 1 New Threats Are Constantly Being Developed. Protect Your Home Computer and Personal Devices by Automatically Installing OS Updates.

More information

Information Security It s Everyone s Responsibility

Information Security It s Everyone s Responsibility Information Security It s Everyone s Responsibility The University of Texas at Dallas Information Security Office (ISO) Purpose of Training Information generated, used, and/or owned by UTD has value. Because

More information

Diabetes Action Now. a joint World Health Organization (WHO) - International Diabetes Federation (IDF) Programme

Diabetes Action Now. a joint World Health Organization (WHO) - International Diabetes Federation (IDF) Programme Diabetes Action Now a joint World Health Organization (WHO) - International Diabetes Federation (IDF) Programme Overview of the presentation Introduction and rationale for the programme Overview of the

More information

Guiding Principles on Cyber Security. Guidance for Internet Service Providers and Government

Guiding Principles on Cyber Security. Guidance for Internet Service Providers and Government Guiding Principles on Cyber Security Guidance for Internet Service Providers and Government December 2013 Contents Contents... 2 Industry Contributors... 3 Introduction... 4 Section 1 - Internet Service

More information

October Is National Cyber Security Awareness Month!

October Is National Cyber Security Awareness Month! (0 West Virginia Executive Branch Privacy Tip October Is National Cyber Security Awareness Month! In recognition of National Cyber Security Month, we are supplying tips to keep you safe in your work life

More information

communications design dialogue inspired

communications design dialogue inspired communications design dialogue Be Be inspired inspired Let us inspire you. We communicate your excellence! Media & Public Relations Writing press releases, arranging interviews, increasing awareness among

More information

CHEST FP7-611333. Collective enhanced Environment for Social Tasks. Deliverable D4.1. CHEST Communication web site and dissemination material PNO

CHEST FP7-611333. Collective enhanced Environment for Social Tasks. Deliverable D4.1. CHEST Communication web site and dissemination material PNO D4.1 - CHEST Communication web site and dissemination material Version: v1.0 CHEST FP7-611333 Collective enhanced Environment for Social Tasks Deliverable D4.1 CHEST Communication web site and dissemination

More information

CERT-GOV-GE Activities & International Partnerships

CERT-GOV-GE Activities & International Partnerships CERT-GOV-GE Activities & International Partnerships Zurich, Switzerland 2014 CERT-GOV-GE Manager David Kvatadze www.dea.gov.ge CERT-GOV-GE - Structural unit was formed within the Information Security and

More information

Spyware. Michael Glenn Technology Management Michael.Glenn@Qwest.com. 2004 Qwest Communications International Inc.

Spyware. Michael Glenn Technology Management Michael.Glenn@Qwest.com. 2004 Qwest Communications International Inc. Spyware Michael Glenn Technology Management Michael.Glenn@Qwest.com Agenda Security Fundamentals Current Issues Spyware Definitions Overlaps of Threats Best Practices What Service Providers are Doing References

More information

Small businesses: What you need to know about cyber security

Small businesses: What you need to know about cyber security Small businesses: What you need to know about cyber security Contents Why you need to know about cyber security... 3 Understanding the risks to your business... 4 How you can manage the risks... 5 Planning

More information

Communication Plan. for the. ATLANTIC AREA 2007-2013 Transnational Cooperation Programme

Communication Plan. for the. ATLANTIC AREA 2007-2013 Transnational Cooperation Programme Communication Plan for the ATLANTIC AREA 2007-2013 Transnational Cooperation Programme Prepared by the Managing Authority 18 January 2008 Index 0. Introduction... 2 1. Communication Strategy... 2 1.1

More information

When you listen to the news, you hear about many different forms of computer infection(s). The most common are:

When you listen to the news, you hear about many different forms of computer infection(s). The most common are: Access to information and entertainment, credit and financial services, products from every corner of the world even to your work is greater than ever. Thanks to the Internet, you can conduct your banking,

More information

Policing Together. A quick guide for businesses to Information Security and Cyber Crime

Policing Together. A quick guide for businesses to Information Security and Cyber Crime Policing Together A quick guide for businesses to Information Security and Cyber Crime This leaflet has been produced by the Surrey and Sussex Cyber Crime Unit Who is this leaflet for? This leaflet will

More information

NetGroups.com. (scheduled release date 7/01 never released)

NetGroups.com. (scheduled release date 7/01 never released) NetGroups.com (scheduled release date 7/01 never released) 2001 was a rough year for Internet companies as the investment community became fearful of the overheated Internet and many good companies were

More information

Deter, Detect, Defend

Deter, Detect, Defend Deter, Detect, Defend Deter Never provide personal information, including social security number, account numbers or passwords over the phone or Internet if you did not initiate the contact Never click

More information

Computer Security Maintenance Information and Self-Check Activities

Computer Security Maintenance Information and Self-Check Activities Computer Security Maintenance Information and Self-Check Activities Overview Unlike what many people think, computers are not designed to be maintenance free. Just like cars they need routine maintenance.

More information

Report on Hong Kong SME Cloud Adoption and Security Readiness Survey

Report on Hong Kong SME Cloud Adoption and Security Readiness Survey Report on Hong Kong SME Cloud Adoption and Security Readiness Survey Collaborated by Internet Society Hong Kong and Cloud Security Alliance (HK & Macau Chapter) Sponsored by Microsoft Hong Kong Jointly

More information

Training and education framework for fertility nursing

Training and education framework for fertility nursing Training and education framework for fertility nursing Carmel Bagness November 2013 A training and education framework for fertility nursing: grant usage feedback report Contents Introduction 3 Background

More information

99 Ways a Virtual Assistant Can Support Your Business

99 Ways a Virtual Assistant Can Support Your Business 99 Ways a Virtual Assistant Can Support Your Business Considering outsourcing to a Virtual Assistant, but you re not really sure what they can do? Well here are 99 ways that this virtual service can help

More information

Communication and Marketing Strategy 2012-2016

Communication and Marketing Strategy 2012-2016 Communication and Marketing Strategy 2012-2016 September 2012 1 Contents: Table of Contents 1. Aim of the Strategy... 3 2. Introduction... 3 3. Scope of the Communications and Marketing Strategy... 4 4.

More information

Information Security Awareness Program Proposal

Information Security Awareness Program Proposal Information Security Awareness Program Proposal Michael E. Whitman, Ph.D. Purpose The purpose of information security awareness is improving coherence of the need to protect information and system resources,

More information

Identity Theft, Fraud & You. Prepare. Protect. Prevent.

Identity Theft, Fraud & You. Prepare. Protect. Prevent. Prepare. Protect. Prevent. Identity Theft, Fraud & You Fraud and identity theft incidents claimed fewer victims in 2010 than in previous years. But don t get too comfortable. Average out-of-pocket consumer

More information

NEW ZEALAND S CYBER SECURITY STRATEGY

NEW ZEALAND S CYBER SECURITY STRATEGY Appendix 1 NEW ZEALAND S CYBER SECURITY STRATEGY June 2011 New Zealand Government 7 June 2011 ISBN: 978-0-478-38200-6 www.med.govt.nz/cyberstrategy MED11 Foreword from the Minister The Internet and digital

More information

User manual for the visitors of Interreg Danube Programme website

User manual for the visitors of Interreg Danube Programme website User manual for the visitors of Interreg Danube Programme website Table of contents National contact points... 2 Newsletter subscription... 2 Subscribe... 2 Unsubscribe... 2 Forum... 2 Approved projects...

More information

Marketing Online: How to Get Found, Generate Leads, and Convert Customers

Marketing Online: How to Get Found, Generate Leads, and Convert Customers Marketing Online: How to Get Found, Generate Leads, and Convert Customers July 21, 2010 NFIB Webinar About Web.com at: www.nfib.com/webdotcom 2 What We Will Cover In This Webinar 1. How to Claim A Google

More information

Preparing Your Personal Computer to Connect to the VPN

Preparing Your Personal Computer to Connect to the VPN Preparing Your Personal Computer to Connect to the VPN (Protecting Your Personal Computer Running Windows) Using the VPN to connect your computer to the campus network is the same as bringing your computer

More information

PREVENTING HIGH-TECH IDENTITY THEFT

PREVENTING HIGH-TECH IDENTITY THEFT 1 PREVENTING HIGH-TECH IDENTITY THEFT Presented by The Monument Group Companies Featured speaker: David Floyd November 19, 2014 2 Introduction Preventing Identity Theft (this session) Monitoring for Theft

More information

Romanian National Computer Security Incident Response Team CERT-RO. dan.tofan@cert-ro.eu http://www.cert-ro.eu

Romanian National Computer Security Incident Response Team CERT-RO. dan.tofan@cert-ro.eu http://www.cert-ro.eu Romanian National Computer Security Incident Response Team CERT-RO dan.tofan@cert-ro.eu http://www.cert-ro.eu About A Digital Agenda for Europe, Pillar : Trust and Security, Action 38 Member States to

More information

PUBLIC INFORMATION ASSISTANT/READY COORDINATOR

PUBLIC INFORMATION ASSISTANT/READY COORDINATOR Are you Ready to join us? PUBLIC INFORMATION ASSISTANT/READY COORDINATOR FOR THOSE INTERESTED IN: Exploring exciting and challenging issues in the cutting-edge field of emergency management. Working alongside

More information

Business Internet Banking / Cash Management Fraud Prevention Best Practices

Business Internet Banking / Cash Management Fraud Prevention Best Practices Business Internet Banking / Cash Management Fraud Prevention Best Practices This document provides fraud prevention best practices that can be used as a training tool to educate new Users within your organization

More information

Certified Secure Computer User

Certified Secure Computer User Certified Secure Computer User Exam Info Exam Name CSCU (112-12) Exam Credit Towards Certification Certified Secure Computer User (CSCU). Students need to pass the online EC-Council exam to receive the

More information

AusCERT Home Users Computer Security Survey 2008

AusCERT Home Users Computer Security Survey 2008 AusCERT Home Users Computer Security Survey 2008 Kathryn Kerr Manager, Analysis and Assessments 1 Agenda Scope Purpose Methodology Key findings Conclusion Copyright 2007 AusCERT 2 Survey scope Random sample

More information

Patch Management. FITS OM Directory Services Administration Contents. Key

Patch Management. FITS OM Directory Services Administration Contents. Key Patch Management FITS OM Directory Services Administration Contents PM 1 Overview........................................................................1 PM 2 Implementation guide...........................................................3

More information

Your opportunities with media

Your opportunities with media Your opportunities with mediakit WELCOME TO BOATS.COM EUROPE What is boats.com? boats.com is the largest global marine website with new and used boats for sale. With over 350,000 boat listings offered

More information

SMALL BUSINESS PRESENTATION

SMALL BUSINESS PRESENTATION STOP.THINK.CONNECT NATIONAL CYBERSECURITY AWARENESS CAMPAIGN SMALL BUSINESS PRESENTATION ABOUT STOP.THINK.CONNECT. In 2009, President Obama issued the Cyberspace Policy Review, which tasked the Department

More information

Step One Create a featured listing landing page on your website. Step Two Name your photos of the listing with the full property address

Step One Create a featured listing landing page on your website. Step Two Name your photos of the listing with the full property address OVERVIEW We have set in place a 10-Step Real Estate Marketing strategy at our associated brokerage, GoodLife Realty, because we want our website to be the authority on our listings. In order to compete

More information

News and Information. Advertising and Marketing. Web. Design, Hosting, Promotion, Advertising, SEO

News and Information. Advertising and Marketing. Web. Design, Hosting, Promotion, Advertising, SEO SEARCH ENGINE ADVERTISING PROMOTION News and Information. Advertising and Marketing. WEB HOSTING Web WEB DESIGN REVISED: MAY, 2008 Design, Hosting, Promotion, Advertising, SEO McLeod County Road 1 and

More information

Keeping Windows 8.1 safe and secure

Keeping Windows 8.1 safe and secure Keeping Windows 8.1 safe and secure 14 IN THIS CHAPTER, YOU WILL LEARN HOW TO Work with the User Account Control. Use Windows Firewall. Use Windows Defender. Enhance the security of your passwords. Security

More information

We get companies into the media. Press work Media contacts Online PR

We get companies into the media. Press work Media contacts Online PR We get companies into the media Press work Media contacts Online PR We get our clients noticed by the media: with traditional press work, excellent editor contacts and modern dissemination channels. We

More information

Tech Report. Targeted attack on. France s TV5Monde

Tech Report. Targeted attack on. France s TV5Monde Tech Report Targeted attack on France s TV5Monde May 05, 2015 Tabel of Content Introduction... 3 Attack Outline... 3 Findings #1: Njrat and Njworm, based in the Middle East... 6 Findings #2: Source code

More information

SMALL BUSINESS PRESENTATION

SMALL BUSINESS PRESENTATION STOP.THINK.CONNECT NATIONAL CYBERSECURITY AWARENESS CAMPAIGN SMALL BUSINESS PRESENTATION ABOUT STOP.THINK.CONNECT. In 2009, President Obama issued the Cyberspace Policy Review, which tasked the Department

More information

Instant Messaging and Security

Instant Messaging and Security Strategic Guide Instant Messaging and Security Businesses recognise that instant messaging can help to improve employee productivity, but are often reluctant to sanction its use due to concerns about security.

More information

Priority III: A National Cyberspace Security Awareness and Training Program

Priority III: A National Cyberspace Security Awareness and Training Program Priority III: A National Cyberspace Security Awareness and Training Program Everyone who relies on part of cyberspace is encouraged to help secure the part of cyberspace that they can influence or control.

More information

Some Perspectives On Cybersecurity. Shernon Osepa Manager Regional Affairs Latin America & Caribbean www.internetsociety.org

Some Perspectives On Cybersecurity. Shernon Osepa Manager Regional Affairs Latin America & Caribbean www.internetsociety.org Some Perspectives On Cybersecurity Shernon Osepa Manager Regional Affairs Latin America & Caribbean www.internetsociety.org Agenda What is the Internet Society (ISOC) On the IETF Cyber Security Themes

More information

Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning

Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning Lee Zelyck Network Administrator Regina Public Library Malware, Spyware, Trojans

More information

What Do You Mean My Cloud Data Isn t Secure?

What Do You Mean My Cloud Data Isn t Secure? Kaseya White Paper What Do You Mean My Cloud Data Isn t Secure? Understanding Your Level of Data Protection www.kaseya.com As today s businesses transition more critical applications to the cloud, there

More information

3 day Workshop on Cyber Security & Ethical Hacking

3 day Workshop on Cyber Security & Ethical Hacking 3 day Workshop on Cyber Security & Ethical Hacking 1 st day-highlights-hands On Phishing Attack Hammad Mashkoor Lari Freelancer What is Cyber Security? What is Ethical hacking? What is Computer Science?

More information

Social Media WARNING - THIS INFORMATION HAS EXPIRED Please contact the OSDG department

Social Media WARNING - THIS INFORMATION HAS EXPIRED Please contact the OSDG department NOT PROTECTIVELY MARKED Policy owned by OSDG Social Media WARNING - THIS INFORMATION HAS EXPIRED Please contact the OSDG department 1. Policy Purpose and key drivers 1. Introduction Staffordshire Police

More information

4/20/2015. Fraud Watch Campaign. AARP is Fighting for You. AARP is Fighting for You. Campaign Tactics. AARP can help you Spot & Report Fraud

4/20/2015. Fraud Watch Campaign. AARP is Fighting for You. AARP is Fighting for You. Campaign Tactics. AARP can help you Spot & Report Fraud AARP can help you Spot & Report Fraud Fraud Fighter Call Center: Talk to a volunteer trained in how to spot and report fraud. Call the Fraud Fighter Call Center at (877) 908-3360 Fraud Watch Campaign What

More information

TOP 10 TIPS FOR EDUCATING EMPLOYEES ABOUT CYBERSECURITY

TOP 10 TIPS FOR EDUCATING EMPLOYEES ABOUT CYBERSECURITY TOP 10 TIPS FOR EDUCATING EMPLOYEES ABOUT CYBERSECURITY An Inside Job Cyberthreats to your business are usually blamed on outsiders nefarious programmers writing malicious code designed to pilfer your

More information

IMPROVE AWARENESS AND SKILLS

IMPROVE AWARENESS AND SKILLS SECURITY FOR INDUSTRIAL CONTROL SYSTEMS IMPROVE AWARENESS AND SKILLS A GOOD PRACTICE GUIDE Disclaimer Reference to any specific commercial product, process or service by trade name, trademark, manufacturer,

More information

TASK -040. TDSP Web Portal Project Cyber Security Standards Best Practices

TASK -040. TDSP Web Portal Project Cyber Security Standards Best Practices Page 1 of 10 TSK- 040 Determine what PCI, NERC CIP cyber security standards are, which are applicable, and what requirements are around them. Find out what TRE thinks about the NERC CIP cyber security

More information

Code of Practice for Cyber Security in the Built Environment

Code of Practice for Cyber Security in the Built Environment Brochure More information from http://www.researchandmarkets.com/reports/3085299/ Code of Practice for Cyber Security in the Built Environment Description: This code of practice explains why and how cyber

More information

Website Security: What do I need to know? What do I need to do?

Website Security: What do I need to know? What do I need to do? Website Security: What do I need to know? What do I need to do? This document describes some of the emerging security issues for and threats to websites as well as some of the options to address them.

More information

Writing a press release and speaking to the media: for local and national support groups in. England, Northern Ireland, Scotland and Wales

Writing a press release and speaking to the media: for local and national support groups in. England, Northern Ireland, Scotland and Wales Writing a press release and speaking to the media: for local and national support groups in England, Northern Ireland, Scotland and Wales 2 Contents page Introduction 3 What should be in your press release?

More information

WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY

WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY SMALL BUSINESSES WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY ONE CLICK CAN CHANGE EVERYTHING SMALL BUSINESSES My reputation was ruined by malicious emails ONE CLICK CAN CHANGE EVERYTHING Cybercrime comes

More information

Council of Europe Project on Cybercrime in Georgia Report by Virgil Spiridon and Nigel Jones. Tbilisi 28-29, September 2009

Council of Europe Project on Cybercrime in Georgia Report by Virgil Spiridon and Nigel Jones. Tbilisi 28-29, September 2009 Council of Europe Project on Cybercrime in Georgia Report by Virgil Spiridon and Nigel Jones Tbilisi 28-29, September 2009 Presentation Contents An assessment of the Georgian view of cybercrime and current

More information

Internet threats: steps to security for your small business

Internet threats: steps to security for your small business Internet threats: 7 steps to security for your small business Proactive solutions for small businesses A restaurant offers free WiFi to its patrons. The controller of an accounting firm receives a confidential

More information

Cyber Essentials Scheme. Protect your business from cyber threats and gain valuable certification

Cyber Essentials Scheme. Protect your business from cyber threats and gain valuable certification Cyber Essentials Scheme Protect your business from cyber threats and gain valuable certification Why you need it Cybercrime appears in the news on an almost daily basis - but it s not just the large and

More information

Keeping Your Computers Safe

Keeping Your Computers Safe LOUISIANA BROADBAND INITIATIVE Keeping Your Computers Safe First in a series of White Papers: Staying Safe Online David Moore State Broadband Grant Program Director The 2012 Louisiana State Broadband Survey,

More information

ESSENTIAL REFERENCE PAPER F East Herts Draft District Plan Consultation Strategy

ESSENTIAL REFERENCE PAPER F East Herts Draft District Plan Consultation Strategy ESSENTIAL REFERENCE PAPER F East Herts Draft District Plan Consultation Strategy 2014 Purpose of the Consultation This consultation strategy has been prepared in accordance with the Council s Statement

More information