Information Security Training. Jason Belford Jimmy Lummis
|
|
- Alvin Gibbs
- 8 years ago
- Views:
Transcription
1 Information Security Training Jason Belford Jimmy Lummis
2 Presenters Who are these guys? Jason Belford Principal Information Security Engineer Jimmy Lummis Information Security Policy and Compliance Manager 2
3 Georgia Tech Information Security OIT Information Security Georgia Tech Security Policy Regulatory Compliance Incident Response Operational IT Security Training and Awareness 3
4 Computer & Network Usage and Security Policy (CNUSP) 4
5 CNUSP - Highlights Applies to Faculty / Staff / Students / Guests / Contractors Encompasses appropriate use of GT computers and networks Defines expectation of privacy 5
6 CNUSP - Do Do: Use IT resources in an ethical and legal manner Follow Intellectual Property laws Use a password-protected screensaver Report issues immediately Stop and ask if you have questions or concerns! 6
7 CNUSP Don t Don t: Circumvent security Install non-approved software Use Institute Resources for personal gain (Incidental Use) Allow others to use your computer Be afraid to ask questions! 7
8 CNUSP - Quiz True or False: The CNUSP allows you to download MP3s to your Georgia Tech computer. True or False: I do not need approval to install or use personal software on my Georgia Tech computer. True of False: If my coworker asks for access to my computer, I should just allow it. 8
9 CNUSP Links Computer & Network Usage and Security Policy 9
10 10 Data Access Policy
11 Data Access Policy (DAP) The Data Access Policy (DAP) provides a structured and consistent process for employees to obtain necessary data access for conducting Georgia Tech operations All employees of Georgia Tech are covered by the DAP All Georgia Tech data (electronic, paper or otherwise) are covered by the DAP All Georgia Tech data is classified into one of four categories 11
12 Data Access Policy - Data Classification Category I Public Use Examples: Institute web site content, press releases, employee work addresses Category II Internal Use Examples: directory listings, internal intranet web sites, gtid (alone) Category III Sensitive Examples: Social Security Number, research data, intellectual property of Georgia Tech Category IV Highly Sensitive Examples: Credit Card Numbers 12
13 Data Access Policy Do Do: Request access to non-public data appropriately Assume all data, unless already classified, is category II Limit the use of data to only what is absolutely necessary Encrypt non-public data at rest and in-flight Be mindful of who you share non-public data with Reach out to Information Security and ask! 13
14 Data Access Policy Don t Don t: Attempt to access data you aren t authorized to access Give data to unauthorized individuals Store data unless absolutely necessary Store data on unsecured systems Store data on mobile devices unless absolutely necessary Be shy, reach out to Information Security and ask! 14
15 Data Access Policy - Quiz True or False: The Data Access Policy states that all data and information should be freely available and made public. Question: What classification category is credit card data? True of False: When I m not sure what to do with sensitive data, I should crawl under my desk and hide. 15
16 Data Access Policy Links Data Access Policy 16
17 17 Current Threats
18 Hacking To circumvent security and break into another's server, Web site, or the like with malicious intent1 Motivation Curiosity Monetary Political Publicity Strategic (State sponsored)
19 Hacktivisim Hack + Activist = Hacktivist Political motivation Most often carried out anonymously 19
20 Hacks (2011) timeline-of-anonymous-lulzsec-hacks.aspx 20
21 Hacks (2012) timeline-of-anonymous-lulzsec-hacks.aspx 21
22 Malware Malicious Software Purpose disrupt computer operation gather sensitive information gain unauthorized access to computer systems Biggest issue on Georgia Tech campus each year 22
23 Social Engineering Art of manipulating people into performing actions or divulging confidential information. Types Baiting Phishing Tailgating Vishing 23
24 Phishing From: GaTech Admin Sent: Friday, September 09, :35 AM To: George Burdell Subject: Upgrade Your You are currently viewing Gatech in basic HTML. Why? Follow the link below for faster, better webmail. Click HERE. 24
25 Phishing From: GaTech Admin Sent: Friday, September 09, :35 AM To: George Burdell Subject: Upgrade Your You are currently viewing Gatech in basic HTML. Why? Follow the link below for faster, better webmail. Click HERE. 25
26 URL Disection
27 Phishing From: GaTech Admin Sent: Friday, September 09, :35 AM To: George Burdell Subject: Upgrade Your You are currently viewing Gatech in basic HTML. Why? Follow the link below for faster, better webmail. Click HERE. 27
28 28 Phishing Quiz
29 Gone Phishing? Is this site legitimate? YES! 29
30 Gone Phishing? Is this site legitimate? NO! 30
31 Gone Phishing? Is this site legitimate? NO! 31
32 Gone Phishing? Username: Password: [SUBMIT] Is this site legitimate? MAYBE. When in doubt.. ASK! 32
33 33 Mobile Device Security
34 Mobile Device Security What s a Mobile Device? Mobile computing devices at Georgia Tech include, but are not limited to: Cellular telephones Smart phones (e.g. iphones, Android Phones, BlackBerry) Tablet computers (e.g. ipad, Kindle, Kindle Fire, Android Tablets) Personal Digital Assistants (e.g. Palm Pilot) Any other mobile device containing Georgia Tech data (e.g laptops, USB drives) 34
35 Mobile Device Security - Threats Lost or stolen devices Mobile malware Privacy threats Wi-Fi / Bluetooth sniffing 35
36 Mobile Device Security Securing the Device Passwords/Encryption Don t store sensitive data Antivirus Device locators Remote wipe Don t jailbreak! 36
37 Mobile Device Security Device Awareness Keep your mobile devices with you at all times If not with you, store in a secured location Do NOT leave devices unattended in public locations Airports Conference rooms Restaurants 37
38 Mobile Device Security - Quiz True or False: Malware is only an issue for my home computer. True of False: I should always store sensitive data on my mobile device! True of False: It s okay to ask a stranger to hold your mobile device while you tie your shoe. 38
39 Mobile Device Security Links Stay Tuned Currently working to update Data Access Policy and Data Protection Safeguards to include controls for mobile devices 39
40 40 Passwords
41 Policy Changing Soon Passwords must Be 11 to 23 characters Be changed every 120 days Contain at least 3 character classes Lowercase Alphabetic (abcdefg ) Uppercase Alphabetic (ABCDEFG ) Numbers ( ) Special Characters (!@#$%&*) Password cannot Contain your username Be one of your most recent 3 passwords 41
42 Picking a Strong Password Bad Habits Don t share your password with anyone EVER! Don t use the same password for multiple accounts Don t write down your passwords Don t select a password and then keep changing the number on the end DON T USE ANY PASSWORD SEEN IN THIS PRESENTATION! 42
43 Picking a Strong Password (Method 1) Start with a phrase that means something to you I m a Rambling Wreck from Georgia Tech!!! Keep the first letter from each word and the punctuation I a R W f G T!!! Add some numbers or replace letters with numbers 1 a R W f 6 T!!! 1 arwf6t!!! 43
44 Picking a Strong Password (Method 2) Start with a phrase that means something to you And a Heck of an Engineer Replace spaces and letters with special characters &a-heck-of-an-engineer &a-heck-of-an-engineer 44
45 Picking a Strong Password (Method 3) Start with a phrase that means something to you Like all the jolly good fellows Pad the beginning and the end with special characters and numbers 1885jollygoodfellows jollygoodfellows
46 Picking a Strong Password How do our new password compare? Number of Characters Character Classes Buzz arwf6t!!!!! &a-heck-ofan-engineer 1885jollygoodf ellows How Secure? Weak Strong Very Strong Very Strong Time to Crack? 10 hours 19 years 9 billion trillion centuries 6 billion trillion centuries 46 Source:
47 Picking a Strong Password Good Mascot Bad Password 47
48 Quiz 1. (T/F) When my supervisor asks for my password, I am required to give it to them. 2. (T/F) Since the passwords here are supposed to be more complex, it is ok to write it down. 3. (T/F) I should just think of just one password and keep putting a different number on the end each password change. 48
49 49 Physical Security
50 Physical Security - Threats Theft Vandalism Sabotage Espionage 50
51 Physical Security Common Exploitation Methods Hardware key-loggers Posing as a trusted authority or service person Social engineer staff to gain access to facilities Connect a rogue device to wired/wireless network Tailgating to gain access to data center 51
52 Physical Security Combating the Threat Be aware of your surroundings Report anything that appears out of the ordinary Inspect USB and other ports for unknown devices When in doubt ask for ID Don t let your devices out of your sight Keep sensitive items behind locked doors/drawers Don t leave sensitive items in your car 52
53 Physical Security - Quiz True or False: It s okay to hold the door for someone on your way into a secured facility. Question: are devices that can be attached to a computer which capture everything entered on a keyboard. True of False: It s okay to talk about confidential research data on the phone with someone you ve never talked to before. 53
54 What to do if you suspect you ve been hacked! Contact your CSR and report the issue Run virus scan If you are unable to do so: Save your work Shut down your computer Change your GT account password May be a good idea to change all other passwords 54
55 55 Questions
56 Contact Information Jason Belford Jimmy Lummis
BSHSI Security Awareness Training
BSHSI Security Awareness Training Originally developed by the Greater New York Hospital Association Edited by the BSHSI Education Team Modified by HSO Security 7/1/2008 1 What is Security? A requirement
More informationSecure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines
Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines 1. Implement anti-virus software An anti-virus program is necessary to protect your computer from malicious programs,
More informationTMCEC CYBER SECURITY TRAINING
1 TMCEC CYBER SECURITY TRAINING Agenda What is cyber-security? Why is cyber-security important? The essential role you play. Overview cyber security threats. Best practices in dealing with those threats.
More informationAn Introduction on How to Better Protect Your Computer and Sensitive Data
An Introduction on How to Better Protect Your Computer and Sensitive Data Common Security Problems Computer users who fail to use strong passwords Constant attacks by viruses, worms, key loggers and bots
More information+GAMES. Information Security Advisor. Be a Human Firewall! The Human Firewall' s Top Concerns in the Cyber, People & Physical Domains
Information Security Advisor December 2015 Be a Human Firewall! The Human Firewall' s Top Concerns in the Cyber, People & Physical Domains +GAMES Spot the insider & Human firewall Filtering EXerCISE Good
More informationGeneral Security Best Practices
General Security Best Practices 1. One of the strongest physical security measures for a computer or server is a locked door. 2. Whenever you step away from your workstation, get into the habit of locking
More informationNational Cyber Security Month 2015: Daily Security Awareness Tips
National Cyber Security Month 2015: Daily Security Awareness Tips October 1 New Threats Are Constantly Being Developed. Protect Your Home Computer and Personal Devices by Automatically Installing OS Updates.
More informationSHS Annual Information Security Training
SHS Annual Information Security Training Information Security: What is It? The mission of the SHS Information Security Program is to Protect Valuable SHS Resources Information Security is Everyone s Responsibility
More information10 Quick Tips to Mobile Security
10 Quick Tips to Mobile Security 10 Quick Tips to Mobile Security contents 03 Introduction 05 Mobile Threats and Consequences 06 Important Mobile Statistics 07 Top 10 Mobile Safety Tips 19 Resources 22
More informationGeorgia Institute of Technology Data Protection Safeguards Version: 2.0
Data Protection Safeguards Page 1 Georgia Institute of Technology Data Protection Safeguards Version: 2.0 Purpose: The purpose of the Data Protection Safeguards is to provide guidelines for the appropriate
More informationHIPAA Security Training Manual
HIPAA Security Training Manual The final HIPAA Security Rule for Montrose Memorial Hospital went into effect in February 2005. The Security Rule includes 3 categories of compliance; Administrative Safeguards,
More informationNCS 330. Information Assurance Policies, Ethics and Disaster Recovery. NYC University Polices and Standards 4/15/15.
NCS 330 Information Assurance Policies, Ethics and Disaster Recovery NYC University Polices and Standards 4/15/15 Jess Yanarella Table of Contents: Introduction: Part One: Risk Analysis Threats Vulnerabilities
More informationMust score 89% or above. If you score below 89%, we will be contacting you to go over the material individually.
April 23, 2014 Must score 89% or above. If you score below 89%, we will be contacting you to go over the material individually. What is it? Electronic Protected Health Information There are 18 specific
More informationGuadalupe Regional Medical Center
Guadalupe Regional Medical Center Health Insurance Portability & Accountability Act (HIPAA) By Debby Hernandez, Compliance/HIPAA Officer HIPAA Privacy & Security Training Module 1 This module will address
More informationDesktop and Laptop Security Policy
Desktop and Laptop Security Policy Appendix A Examples of Desktop and Laptop standards and guidelines 1. Implement anti-virus software An anti-virus program is necessary to protect your computer from malicious
More informationCommon Cyber Threats. Common cyber threats include:
Common Cyber Threats: and Common Cyber Threats... 2 Phishing and Spear Phishing... 3... 3... 4 Malicious Code... 5... 5... 5 Weak and Default Passwords... 6... 6... 6 Unpatched or Outdated Software Vulnerabilities...
More informationSecurity for the Road Warrior
Security for the Road Warrior Mark K. Mellis Associate Information Security Officer Stanford University Information Security Office Version 1.1 We are all mobile We all travel from home to campus or from
More informationHow To Protect Your Information From Being Hacked By A Hacker
DOL New Hire Training: Computer Security and Privacy Table of Contents Introduction Lesson One: Computer Security Basics Lesson Two: Protecting Personally Identifiable Information (PII) Lesson Three: Appropriate
More informationCyber Security Best Practices
Cyber Security Best Practices 1. Set strong passwords; Do not share them with anyone: They should contain at least three of the five following character classes: o Lower case letters o Upper case letters
More informationGeneral Rules of Behavior for Users of DHS Systems and IT Resources that Access, Store, Receive, or Transmit Sensitive Information
General Rules of Behavior for Users of DHS Systems and IT Resources that Access, Store, Receive, or Transmit Sensitive Information The following rules of behavior apply to all Department of Homeland Security
More informationHELPFUL TIPS: MOBILE DEVICE SECURITY
HELPFUL TIPS: MOBILE DEVICE SECURITY Privacy tips for Public Bodies/Trustees using mobile devices This document is intended to provide general advice to organizations on how to protect personal information
More informationAcceptable Use Guidelines
Attachment to the Computer and Information Security and Information Management Policies Acceptable Use Guidelines NZQA Quality Management System Supporting Document Purpose These Acceptable Use Guidelines
More informationInformation Security It s Everyone s Responsibility
Information Security It s Everyone s Responsibility The University of Texas at Dallas Information Security Office (ISO) Purpose of Training Information generated, used, and/or owned by UTD has value. Because
More informationInformation Security Training 2012
Information Security Training 2012 Authored by: Gwinnett Medical Center Information Security Department Modified for affiliated schools students & instructors by: Linda Horst, RN, BSN, BC Objectives After
More informationWelcome to Information Security Training
Welcome to Information Security Training Welcome to Georgia Perimeter College s Information Security Training. Information security consists of processes, measures, and technologies employed to protect
More informationYour Digital Dollars Online & Mobile Banking
Your Digital Dollars Online & Mobile Banking There are a lot of benefits to being able to bank or make payments from just about anywhere, but it s important to know how to do these things safely. Understanding
More informationHIPAA and Health Information Privacy and Security
HIPAA and Health Information Privacy and Security Revised 7/2014 What Is HIPAA? H Health I Insurance P Portability & A Accountability A - Act HIPAA Privacy and Security Rules were passed to protect patient
More informationMobile Medical Devices and BYOD: Latest Legal Threat for Providers
Presenting a live 90-minute webinar with interactive Q&A Mobile Medical Devices and BYOD: Latest Legal Threat for Providers Developing a Comprehensive Usage Strategy to Safeguard Health Information and
More informationInternet threats: steps to security for your small business
Internet threats: 7 steps to security for your small business Proactive solutions for small businesses A restaurant offers free WiFi to its patrons. The controller of an accounting firm receives a confidential
More information10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)
1- A (firewall) is a computer program that permits a user on the internal network to access the internet but severely restricts transmissions from the outside 2- A (system failure) is the prolonged malfunction
More informationThe following information was provided by SANS and discusses IT Security Awareness. It was last updated in 2015.
The following information was provided by SANS and discusses IT Security Awareness. It was last updated in 2015. By completing this module and the quiz, you will receive credit for CW 170, which is required
More informationWorking Practices for Protecting Electronic Information
Information Security Framework Working Practices for Protecting Electronic Information 1. Purpose The following pages provide more information about the minimum working practices which seek to ensure that
More informationWeb Security School Final Exam
Web Security School Final Exam By Michael Cobb 1.) Which of the following services is not required to run a Windows server solely configured to run IIS and publish a Web site on the Internet? a. IIS Admin
More informationDSHS CA Security For Providers
DSHS CA Security For Providers Pablo F Matute DSHS Children's Information Security Officer 7/21/2015 1 Data Categories: An Overview All DSHS-owned data falls into one of four categories: Category 1 - Public
More informationCOLORADO COMMUNITY COLLEGE SYSTEM SYSTEM PRESIDENT S PROCEDURE GENERAL COMPUTER AND INFORMATION SYSTEMS PROCEDURES
Page 1 of 12 SP 3-125c COLORADO COMMUNITY COLLEGE SYSTEM SYSTEM PRESIDENT S PROCEDURE GENERAL COMPUTER AND INFORMATION SYSTEMS PROCEDURES APPROVED: May 1, 2006 EFFECTIVE: May 1, 2006 REVISED: August 4,
More informationSecurity Awareness Quiz Questions
Category Question Awareness Quiz Questions Answer 1. Why is backing up data files important? Backups ensure that the information you need is there when you need it If the information is damaged it can
More informationData Loss Prevention in the Enterprise
Data Loss Prevention in the Enterprise ISYM 525 Information Security Final Paper Written by Keneth R. Rhodes 12-01-09 In today s world data loss happens multiple times a day. Statistics show that there
More informationBest Practices Guide to Electronic Banking
Best Practices Guide to Electronic Banking City Bank & Trust Company offers a variety of services to our customers. As these services have evolved over time, a much higher percentage of customers have
More informationIT Security DO s and DON Ts
For more advice contact: IT Service Centre T: (01332) 59 1234 E: ITServiceCentre@derby.ac.uk Online: http://itservicecentre.derby.ac.uk Version: February 2014 www.derby.ac.uk/its IT Security DO s and DON
More informationThe Security Rule of The Health Insurance Portability and Accountability Act (HIPAA) Security Training
The Security Rule of The Health Insurance Portability and Accountability Act (HIPAA) Security Training Introduction The HIPAA Security Rule specifically requires training of all members of the workforce.
More informationMobile Security Standard
Mobile Security Standard Title Mobile Security Standard Mobile Device Security Category Version: 18/07/2013 PUBLISHED Author:, IT Services Contact: itsecurity@contacts.bham.ac.uk Mobile Security Standard
More informationAVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com
AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS ftrsecure.com Can You Separate Myths From Facts? Many Internet myths still persist that could leave you vulnerable to internet crimes. Check out
More informationSmall Business Cybersecurity Dos and Don ts. Helping Businesses Grow and Succeed For Over 30 Years. September 25, 2015 Dover Downs
Small Business Cybersecurity Dos and Don ts September 25, 2015 Dover Downs Helping Businesses Grow and Succeed For Over 30 Years Statistics 2 Results from the Cybersecurity Readiness Survey 25% of Respondents
More informationA Guide to Information Technology Security in Trinity College Dublin
A Guide to Information Technology Security in Trinity College Dublin Produced by The IT Security Officer & Training and Publications 2003 Web Address: www.tcd.ie/itsecurity Email: ITSecurity@tcd.ie 1 2
More informationHow to Practice Safely in an era of Cybercrime and Privacy Fears
How to Practice Safely in an era of Cybercrime and Privacy Fears Christina Harbridge INFORMATION PROTECTION SPECIALIST Information Security The practice of defending information from unauthorised access,
More informationGeneral Service Level Agreement
General Service Level Agreement Pricing We offer an unlimited Break / Fix for each device. Cost is below. Server Management = $199 / month per server Network Management = $199 / month per company Desktop
More informationONE Mail Direct for Mobile Devices
ONE Mail Direct for Mobile Devices User Guide Version: 2.0 Document ID: 3292 Document Owner: ONE Mail Product Team Copyright Notice Copyright 2014, ehealth Ontario All rights reserved No part of this document
More informationCyber Security. An Executive Imperative for Business Owners. 77 Westport Plaza, St. Louis, MO 63416 p 314.439.4700 f 314.439.4799
Cyber Security An Executive Imperative for Business Owners SSE Network Services www.ssenetwork.com 77 Westport Plaza, St. Louis, MO 63416 p 314.439.4700 f 314.439.4799 Pretecht SM by SSE predicts and remedies
More informationCOMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING
COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING INFORMATION TECHNOLOGY STANDARD Name Of Standard: Mobile Device Standard Domain: Security Date Issued: 09/07/2012 Date Revised:
More informationInformation Security Policy for Associates and Contractors
Policy for Associates and Contractors Version: 1.12 Status: Issued Date: 30 July 2015 Reference: 61418080 Location: Livelink Review cycle: Annual Contents Introduction... 3 Purpose... 3 Scope... 3 Responsibilities...
More informationPROTECT YOUR COMPUTER AND YOUR PRIVACY!
PROTECT YOUR COMPUTER AND YOUR PRIVACY! Fraud comes in many shapes simple: the loss of both money protecting your computer and Take action and get peace of and sizes, but the outcome is and time. That
More informationInformation Security Manager Training
Information Security Manager Training Kent Swagler CCEP Director, Corporate Compliance Direct line (314) 923-3097 Cell (314) 575-8334 kswagler@metrostlouis.org Information Security Manager Training Overview
More informationOUTLOOK WEB ACCESS. User Guide
OUTLOOK WEB ACCESS User Guide V3 2 August 2013 Not protectively marked GETTING STARTED Outlook Web Access (OWA) provides a useful means to remotely access Council email from outside of the council access.
More informationHigh Speed Internet - User Guide. Welcome to. your world.
High Speed Internet - User Guide Welcome to your world. 1 Welcome to your world :) Thank you for choosing Cogeco High Speed Internet. Welcome to your new High Speed Internet service. When it comes to a
More informationComputer Network and Internet Security Awareness and Responsible Use. Indian River County School District 2014-2015
Computer Network and Internet Security Awareness and Responsible Use Indian River County School District 2014-2015 1 Through the availability of electronic resources provided by the School District of
More informationData Protection and Information Security. Data Security - Guidelines for the use of Personal Data
Data Protection and Information Data - Guidelines for the use of Personal Data Page 1 of 10 Created on: 21/06/2013 Contents 1. Introduction... 3 2. Definitions... 3 4. Physical... 4 5 Electronic... 6 6
More informationPeace Corps Office of the OCIO Information and Information Technology Governance and Compliance Rules of Behavior for General Users
Table of Contents... 1 A. Accountability... 1 B. System Use Notification (Login Banner)... 1 C. Non-... 1 D. System Access... 2 E. User IDs... 2 F. Passwords... 2 G. Electronic Information... 3 H. Agency
More informationInformation Security
Information Security Table of Contents Statement of Confidentiality and Responsibility... 2 Policy and Regulation... 2 Protect Our Information... 3 Protect Your Account... 4 To Change Your Password...
More informationMobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.
Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information. Mobile Devices: Risks to Health Information Risks vary based on the mobile device and its use. Some risks include:
More informationBCS IT User Syllabus IT Security for Users Level 2. Version 1.0
BCS IT User Syllabus IT for Users Level 2 Version 1.0 June 2009 ITS2.1 System Performance ITS2.1.1 Unwanted messages ITS2.1.2 Malicious ITS2.1.1.1 ITS2.1.1.2 ITS2.1.2.1 ITS2.1.2.2 ITS2.1.2.3 ITS2.1.2.4
More informationPart 14: USB Port Security 2015
Part 14: USB Port Security This article is part of an information series provided by the American Institute of Healthcare Compliance in response to questions we receive related to Meaningful Use and CEHRT
More informationNC DPH: Computer Security Basic Awareness Training
NC DPH: Computer Security Basic Awareness Training Introduction and Training Objective Our roles in the Division of Public Health (DPH) require us to utilize our computer resources in a manner that protects
More informationComputer Security Basics For UW-Madison Emeritus Faculty and Staff Oakwood Village University Woods September 17, 2014
Computer Security Basics For UW-Madison Emeritus Faculty and Staff Oakwood Village University Woods September 17, 2014 Presented by Nicholas Davis, CISA, CISSP UW-Madison, Division of Information Technology
More informationOctober Is National Cyber Security Awareness Month!
(0 West Virginia Executive Branch Privacy Tip October Is National Cyber Security Awareness Month! In recognition of National Cyber Security Month, we are supplying tips to keep you safe in your work life
More informationWHAT YOU NEED TO KNOW ABOUT CYBER SECURITY
SMALL BUSINESSES WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY ONE CLICK CAN CHANGE EVERYTHING SMALL BUSINESSES My reputation was ruined by malicious emails ONE CLICK CAN CHANGE EVERYTHING Cybercrime comes
More informationMobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.
Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information. Mobile Devices: Risks to to Health Mobile Information Devices: Risks to Health Information Risks vary based on the
More informationHFS DATA SECURITY TRAINING WITH TECHNOLOGY COMES RESPONSIBILITY
HFS DATA SECURITY TRAINING WITH TECHNOLOGY COMES RESPONSIBILITY Illinois Department of Healthcare and Family Services Training Outline: Training Goals What is the HIPAA Security Rule? What is the HFS Identity
More informationInformation Security Addressing Your Advanced Threats
Information Security Addressing Your Advanced Threats Where We are Going Information Security Landscape The Threats You Face How To Protect Yourself This Will Not Be Boring What Is Information Security?
More informationFranciscan University of Steubenville Information Security Policy
Franciscan University of Steubenville Information Security Policy Scope This policy is intended for use by all personnel, contractors, and third parties assisting in the direct implementation, support,
More informationPimaCountyCommunityCollegeDistrict Standard Practice Guide Administrative Procedure
PimaCountyCommunityCollegeDistrict Standard Practice Guide Administrative Procedure SPG AP Title: Portable College-Issued Mobile Device Security SPG AP Number: SPG-5702/AD AP 9.01.04 Effective Date: 11/13/06
More informationBoston University Security Awareness. What you need to know to keep information safe and secure
What you need to know to keep information safe and secure Introduction Welcome to Boston University s Security Awareness training. Depending on your reading speed, this presentation will take approximately
More informationSecuritySecuritySecurity!
SecuritySecuritySecurity! It was the best of times and the worst of times... I suspect Dickens would be quite surprised to learn how prophetic his words would be over 150 years after he penned them. THE
More informationLearn to protect yourself from Identity Theft. First National Bank can help.
Learn to protect yourself from Identity Theft. First National Bank can help. Your identity is one of the most valuable things you own. It s important to keep your identity from being stolen by someone
More informationComputer Security at Columbia College. Barak Zahavy April 2010
Computer Security at Columbia College Barak Zahavy April 2010 Outline 2 Computer Security: What and Why Identity Theft Costs Prevention Further considerations Approach Broad range of awareness Cover a
More information10 Best Practices to Protect Your Network presented by Saalex Information Technology and Citadel Group
10 Best Practices to Protect Your Network presented by Saalex Information Technology and Citadel Group Presented by: Michael Flavin and Stan Stahl Saalex Information Technology Overview Saalex Information
More information10 best practice suggestions for common smartphone threats
10 best practice suggestions for common smartphone threats Jeff R Fawcett Dell SecureWorks Security Practice Executive M Brandon Swain Dell SecureWorks Security Practice Executive When using your Bluetooth
More informationPaul Nguyen. 2014 CSG Interna0onal
Paul Nguyen 2014 CSG Interna0onal Security is Top- of- Mind Everywhere High- profile breaches: 2K+ breaches expose nearly 1B records in 2013 Increased regulatory pressure State- sponsored hacking around
More informationIbrahim Yusuf Presales Engineer at Sophos ibz@sophos.com. Smartphones and BYOD: what are the risks and how do you manage them?
Ibrahim Yusuf Presales Engineer at Sophos ibz@sophos.com Smartphones and BYOD: what are the risks and how do you manage them? Tablets on the rise 2 Diverse 3 The Changing Mobile World Powerful devices
More informationWhy is a strong password important?
Internet Security Why is a strong password important? Identity theft motives: To gain access to resources For the challenge/fun Personal reasons Theft methods Brute forcing and other script hacking methods
More informationSPICE EduGuide EG0015 Security of Administrative Accounts
This SPICE EduGuide applies to HSC information systems, specifically Administrative login accounts; (aka Admin accounts) and the faculty, staff and students who use them. Admin accounts are logon IDs and
More informationInformation Security Code of Conduct
Information Security Code of Conduct IT s up to us >Passwords > Anti-Virus > Security Locks >Email & Internet >Software >Aon Information >Data Protection >ID Badges > Contents Aon Information Security
More informationUnderstanding Security Threats in the Cyber World. Beth Chancellor, Chief Information Security Officer
Understanding Security Threats in the Cyber World Beth Chancellor, Chief Information Security Officer Agenda Phishing Credit Card Fraud & Identity Theft Cloud Services Social Networking Wireless Phishing
More informationAll Users of DCRI Computing Equipment and Network Resources
July 21, 2015 MEMORANDUM To: From Subject: All Users of DCRI Computing Equipment and Network Resources Eric Peterson, MD, MPH, Director, DCRI Secure System Usage The purpose of this memorandum is to inform
More information10 Smart Ideas for. Keeping Data Safe. From Hackers
0100101001001010010001010010101001010101001000000100101001010101010010101010010100 0100101001001010010001010010101001010101001000000100101001010101010010101010010100000 0100101001001010010001010010101001010101001000000100101001010101010010101010010100000
More information2014 Core Training 1
2014 Core Training 1 Course Agenda Review of Key Privacy Laws/Regulations: Federal HIPAA/HITECH regulations State privacy laws Privacy & Security Policies & Procedures Huntsville Hospital Health System
More informationHow-To Guide: Cyber Security. Content Provided by
How-To Guide: Cyber Security Content Provided by Who needs cyber security? Businesses that have, use, or support computers, smartphones, email, websites, social media, or cloudbased services. Businesses
More informationNetwork Security for End Users in Health Care
Network Security for End Users in Health Care Virginia Health Information Technology Regional Extension Center is funded by grant #90RC0022/01 from the Office of the National Coordinator for Health Information
More informationThreat Events: Software Attacks (cont.)
ROOTKIT stealthy software with root/administrator privileges aims to modify the operation of the OS in order to facilitate a nonstandard or unauthorized functions unlike virus, rootkit s goal is not to
More informationINFORMATION SECURITY GUIDE. Employee Teleworking. Information Security Unit. Information Technology Services (ITS) July 2013
INFORMATION SECURITY GUIDE Employee Teleworking Information Security Unit Information Technology Services (ITS) July 2013 CONTENTS 1. Introduction... 2 2. Teleworking Risks... 3 3. Safeguards for College
More informationResponsible Access and Use of Information Technology Resources and Services Policy
Responsible Access and Use of Information Technology Resources and Services Policy Functional Area: Information Technology Services (IT Services) Applies To: All users and service providers of Armstrong
More informationLAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable
More informationEnsuring the security of your mobile business intelligence
IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive
More informationOCR LEVEL 3 CAMBRIDGE TECHNICAL
Cambridge TECHNICALS OCR LEVEL 3 CAMBRIDGE TECHNICAL CERTIFICATE/DIPLOMA IN IT NETWORKED SYSTEMS SECURITY J/601/7332 LEVEL 3 UNIT 28 GUIDED LEARNING HOURS: 60 UNIT CREDIT VALUE: 10 NETWORKED SYSTEMS SECURITY
More informationITSC Training Courses Student IT Competence Programme SIIS1 Information Security
ITSC Training Courses Student IT Competence Programme SI1 2012 2013 Prof. Chan Yuen Yan, Rosanna Department of Engineering The Chinese University of Hong Kong SI1-1 Course Outline What you should know
More informationHow to Deploy the Survey Below are some ideas and elements to consider when deploying this survey.
SECURITY AWARENESS SURVEY Is a survey necessary A survey will give you insight into information security awareness within your company. The industry has increasingly realized that people are at least as
More informationCOLLEGE POLICY MANUAL
Policy No. & Title: C202: ACCEPTABLE USE OF COLLEGE TECHNOLOGY Effective: 2015-07-14 Next Review: 2020-07-14 Policy Sponsor: Chief Information Officer Ref Cttee: Senior Leadership Council Approvals: 2000-05-03/SA-99-09;
More informationU.S. Department of the Interior's Federal Information Systems Security Awareness Online Course
U.S. Department of the Interior's Federal Information Systems Security Awareness Online Course Rules of Behavior Before you print your certificate of completion, please read the following Rules of Behavior
More informationMobile security and your EMR. Presented by: Shawn Tester & Allen Cornwall
Mobile security and your EMR Presented by: Shawn Tester & Allen Cornwall Date: October 14, 2011 Overview General Security Challenges & best practices Mobile EMR interfaces - EMR Access - Today & Future
More informationOnline Banking Fraud Prevention Recommendations and Best Practices
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee at Continental National Bank of Miami needs to know
More information