Member Municipality Security Awareness Training. End- User Informa/on Security Awareness Training
|
|
|
- Geoffrey Preston
- 10 years ago
- Views:
Transcription
1 End- User Informa/on Security Awareness Training 1
2 Why Awareness Training? NCLM sanc:oned mul:ple Security Risk Assessments for a broad spectrum of member municipali:es The assessments iden:fied areas of weakness common throughout the sampled municipali:es regardless of size One of the most common iden:fied weaknesses is a lack of general end- user security awareness training 2
3 What will this training cover? This training will highlight general end- user best prac:ces that apply to the most common informa:on security weaknesses iden:fied during member municipality security risk assessments, including: Ensuring your worksta:on is up- to- date and secure Crea:ng and using secure passwords Using your mobile devices in a secure manner How to surf the net and use securely And how to iden:fy and avoid phishing s 3
4 What will this training cover? (cont d) This training will also teach you: What should be considered sensi:ve and protected informa:on Poten:al consequences of an informa:on security breach How to arm yourself with informa:on security intelligence And what to do if you encounter something suspicious 4
5 What s in it for me? The goal is to educate employees to: Proac:vely secure their compu:ng resources at home and at work. Recognize what types of security issues and incidents may occur. And know what ac:ons to take. 5
6 What is sensi/ve data? And why should we protect it? Sensi:ve data may include: " Credit card numbers " Social Security numbers " Driver s license numbers " Protected health data " Law enforcement data " Business processes " Financial data " Copyrights " Trademarks " HR data It s valuable to our residents, our employees, and our opera:on protect it! 6
7 Threat Sources Threat sources may include both insiders and outsiders, such as the following: Governments Disgruntled employees Hackers Organized crime 7
8 Informa/on Security Sta/s/cs A few things to be aware of: External par:es ( outsiders ) are responsible for far more data breaches than insiders and partners (98% of breaches in 2012). Malware factored in over 2/3 of the breaches inves:gated. Iden:ty theg is the fastest growing crime in the US: More than 750,000 vic:ms a year (or 1 in 20 Americans) with losses exceeding $2 Billion. Over 1,000 viruses are created each month. Source: Verizon Data Breach Report 2012 h8p:// breach- invescgacons- report ebk_en_xg.pdf 8
9 What does this have to do with me? People are the weakest link. You can have the best technology, firewalls, intrusion- detec/on systems, biometric devices and somebody can call an unsuspec/ng employee. That s all she wrote, baby. They got everything. Kevin Mitnick Kevin Mitnick is a computer security consultant, author, and hacker. In the mid 90's, he was the world's most- wanted computer hacker. 9
10 What can happen? Bad things that can happen: Disrup:on of business/personal :me Loss of $$$ (business/personal) Iden:ty theg Heavy fines from regulatory agencies Criminal inves:ga:ons Lawsuits Reputa:onal damage to the municipality and its elected officials 10
11 General Best Prac/ces Make sure your worksta:on is secure: Install ac:ve an:- virus and keep it current. Apply Microsog and third- party sogware security updates. Do not install unauthorized/free sogware on Municipal systems without IT approval. Do not install free sogware at home unless it has been validated by a trusted source. Do not disable security sogware, such as an:- virus, personal firewall and intrusion detec:on sogware. If you re unsure about any of the above, contact IT for guidance. 11
12 Password Best Prac/ce Use a complex password. At least eight characters Use capital and lower- case lemers, numbers and symbols Do not use commonly used passwords like password, or LetMeIn. Use phrases, and subs:tute symbols and numbers for lemers. For example, instead of MyDogSpot use MyD0g$p0t. Change your password at least every days. Do not re- use old passwords. 12
13 Secure your worksta/on Lock your computer when you leave your work area. Set your screensaver to automa:cally start ager a few minutes of inac:vity. Require password entry to deac:vate screensaver. Do not store wrimen passwords. Passwords stored on your desk or monitor, underneath keyboards or in desk drawers are not secure! Do not passwords. Informa:on contained in s isn t encrypted and can be read by anyone. 13
14 Stay informed Arm yourself with informa:on: If your an:- virus vendor offers an alert no:fica:on service, subscribe to it. Check other vendors to see if they have an alert list as well. Some an:- virus developers will release warnings ahead of others; therefore, it may be good prac:ce to subscribe to a number of lists. Symantec s Guide to Scary Internet Stuff series provides useful informa:on in a humorous manner (YouTube). Topics include: Phishing, Botnets, Underground Economy, Drive- by Downloads, Misleading Applica:ons, Net Threats, Losing Your Data, etc. Microsog offers a security bulle:n mailing list as well. Subscribing to this list will allow you to stay on top of security- related patches and could prevent problems such as falling vic:m to known amacks: hmp://technet.microsog.com/en- us/security/ Sources: h8p:// viruses- and- malicious- code- part- two- proteccon and h8p:// labs/signup.aspx?region=us 14
15 Mobile Device Security Never leave mobile devices unamended in a public area such as a restaurant or coffee shop. Never leave mobile devices in plain view through the windows of a car. Use device locks such as a PIN/passcode on phones or tablets. Use an:- virus. Use remote wipe technology. 15
16 More Mobile Device Security Be mindful of QR codes. Scanning a QR code is just like clicking on a link! Just like a link, a QR code can be used for malicious purposes. Use an app like Norton Snap to make sure they re legi:mate. When in a store or restaurant, make sure the QR code you re about to scan is not a s:cker and is actually printed on the item or marke:ng material. 16
17 More Mobile Device Security Be mindful of what you install. Make sure apps are from reputable sources. Check permissions. Are they appropriate for the app you re downloading? If in doubt, ask IT for guidance. Don t store sensi:ve data on your mobile devices. This includes laptops, phones, tablets and removable storage devices like USB drives. Report loss or theg of mobile devices asap! 17
18 Internet Security Best Prac/ces While on the Internet: Configure your computer to ask before installing sogware, and do not browse the web while logged on as administrator. Social networking websites do not verify any content they display, so make sure you trust the poster before viewing videos or media files (many contain embedded malicious code). Avoid using Remember this password for websites. Free music and file sharing programs are wide- open doors for hackers BitTorrent, Kazaa, P2P (peer- to- peer). Before you ever enter sensi:ve informa:on, look for the browser lock and hmps:// 18
19 Internet Security Best Prac/ces Beware of malware and spyware: Sogware could be installed that tracks and records keystrokes, mouse movements and clicks, websites visited and virtually any other ac:vity on a computer including your bank account login ID and password. Ever get pop- ups that constantly ask for you to click OK and won t go away? This is ogen due to malicious code. Helpful toolbars? Once the toolbar program is installed, it could collect anything it wants, and it s almost impossible to remove it can ogen automa:cally reinstall. If you suspect malware or spyware, contact IT for assistance. And be careful how you make purchases: When making online purchases, always use a credit card, which usually limits your personal liability. Avoid paying with debit cards. 19
20 Security Best Prac/ces Keep personal personal. Use work only for work purposes don t mix them up. Don t register on personal websites with your work . If you didn t expect an , don t open it check with the sender first. No valid source will ever ask for your password contact IT immediately if you receive an reques:ng your login creden:als. Never open amachments from unexpected sources. Always check links before you click them! 20
21 How do I check a link in an ? Hover over a link before you click it: Some:mes a link masks the website to which it links. If you hover over a link without clicking it, you ll no:ce the full URL of the link s des:na:on in your browser. For example, both of these links connect you to NCLM s home page but you wouldn t know it without hovering: Click Here! hmp:// hmp:// 21
22 What is Phishing? Phishing is a term used for fraudulent Internet scams that set out to deceive users into providing personal informa:on that ogen is used for iden:ty theg. It stands for password fishing. Phishing s appear to be from a well- known and trusted company that are sent to a large number of addresses. It may direct the recipient to a fraudulent website that looks exactly like the real website, where he/she is asked for personal informa:on. Designed to get data from users without their knowledge. This data is usually sensi:ve in nature, like credit card informa:on, usernames or passwords. Phishing s commonly pretend to be from organiza:ons such as PayPal, an airline, or a bank. Source: h8p:// 22
23 What does a phishing look like? Here s an actual phishing sent to customers of Barclay s bank with a link to a fraudulent website. No:ce the errors this is a common trait of phishing s: 23
24 How do I keep from gepng phished? The most powerful weapons against phishing are common sense and the following rules: If you are not a customer of the site, delete the immediately. Don t click on the link or reply. If you are a customer and you are not sure if the is legit, do one of the following: Contact the ins:tute by phone or contact via the official website (do not use the link of course) and ask if the is official. Instead of using the link provided, visit the website by typing in the official URL. The site should have news about the on their Home page. If not, use 2A to verify the . Source: h8p:// 24
25 If you see something suspicious at work: Report any unusual system ac:vity to the IT Help Desk. Do not inves:gate the incident yourself the IT Team will lead the inves:ga:on. Never amempt to prove a security weakness. You will never be cri:cized or get in trouble for repor:ng something that you feel is suspicious. When in doubt report it! 25
26 Informa/on Security is Everyone s Responsibility Security is NOT merely about checking boxes! The intent of awareness training is to prevent fraud, protect customers and residents, and secure our data. Requirements must be met, but the goal is to provide robust informa:on security within our network. 26
27 End- User Informa/on Security Awareness Training Ques:ons? 27
28 End- User Informa/on Security Awareness Training Secure Enterprise Compu:ng has been performing network and applica:on security assessments for over 13 years. We are happy to help you with any and all compliance efforts. Website: hmp:// enterprise.com/ Phone:
Corporate Account Takeover & Information Security Awareness
Corporate Account Takeover & Information Security Awareness The information contained in this session may contain privileged and confidential information. This presentation is for information purposes
Corporate Account Take Over (CATO) Guide
Corporate Account Take Over (CATO) Guide This guide was created to increase our customers awareness of the potential risks and threats that are associated with Internet and electronic- based services,
National Cyber Security Month 2015: Daily Security Awareness Tips
National Cyber Security Month 2015: Daily Security Awareness Tips October 1 New Threats Are Constantly Being Developed. Protect Your Home Computer and Personal Devices by Automatically Installing OS Updates.
AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com
AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS ftrsecure.com Can You Separate Myths From Facts? Many Internet myths still persist that could leave you vulnerable to internet crimes. Check out
Malware & Botnets. Botnets
- 2 - Malware & Botnets The Internet is a powerful and useful tool, but in the same way that you shouldn t drive without buckling your seat belt or ride a bike without a helmet, you shouldn t venture online
Financial Fraud Threats & Preven3on. Mark Frank EVP, Senior Opera3ons Officer Colorado Business Bank
Financial Fraud Threats & Preven3on Mark Frank EVP, Senior Opera3ons Officer Colorado Business Bank Why Pay ACen3on to Fraud Risks? Fraud occurs everywhere, and NO organiza3on is immune Changing business
Protect Yourself. Who is asking? What information are they asking for? Why do they need it?
Protect Yourself Your home computer serves many purposes: email, shopping, social networking and more. As you surf the Internet, you should be aware of the various ways to protect yourself. Of primary
Identity Theft Protection
Identity Theft Protection Email Home EDUCATION on DANGER ZONES Internet Payments Telephone ID theft occurs when someone uses your personal information with out your knowledge to commit fraud. Some terms
Cyber Security. Securing Your Mobile and Online Banking Transactions
Cyber Security Securing Your Mobile and Online Banking Transactions For additional copies or to download this document, please visit: http://msisac.cisecurity.org/resources/guides 2014 Center for Internet
Corporate Account Takeover & Information Security Awareness. Customer Training
Corporate Account Takeover & Information Security Awareness Customer Training No computer system can provide absolute security under all conditions. NO SECURITY MEASURE OR LIST OF SECURITY MEASURES CAN
Reneaué Railton Sr. Informa2on Security Analyst, Duke Medicine Cyber Defense & Response
Reneaué Railton Sr. Informa2on Security Analyst, Duke Medicine Cyber Defense & Response Incident Response What is the most importance component of an Incident Response Program? Tools? Processes? Governance?
Learn to protect yourself from Identity Theft. First National Bank can help.
Learn to protect yourself from Identity Theft. First National Bank can help. Your identity is one of the most valuable things you own. It s important to keep your identity from being stolen by someone
Remote Deposit Quick Start Guide
Treasury Management Fraud Prevention How to Protect Your Business Remote Deposit Quick Start Guide What s Inside We re committed to the safety of your company s financial information. We want to make you
Infocomm Sec rity is incomplete without U Be aware,
Infocomm Sec rity is incomplete without U Be aware, responsible secure! HACKER Smack that What you can do with these five online security measures... ANTI-VIRUS SCAMS UPDATE FIREWALL PASSWORD [ 2 ] FASTEN
NATIONAL CYBER SECURITY AWARENESS MONTH
NATIONAL CYBER SECURITY AWARENESS MONTH Tip 1: Security is everyone s responsibility. Develop an awareness framework that challenges, educates and empowers your customers and employees to be part of the
Business Internet Banking / Cash Management Fraud Prevention Best Practices
Business Internet Banking / Cash Management Fraud Prevention Best Practices This document provides fraud prevention best practices that can be used as a training tool to educate new Users within your organization
Cybersecurity Best Practices
Ten Essential Cybersecurity Best Practices Banking Business Employees Brought to you by: 1 Did you know? One in five small-to-medium-sized companies were the victims of cyber breaches in 2013.1 In 76%
Retail/Consumer Client. Internet Banking Awareness and Education Program
Retail/Consumer Client Internet Banking Awareness and Education Program Table of Contents Securing Your Environment... 3 Unsolicited Client Contact... 3 Protecting Your Identity... 3 E-mail Risk... 3 Internet
ONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS
$ ONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS Boston Private Bank & Trust Company takes great care to safeguard the security of your Online Banking transactions. In addition to our robust security
1. Any email requesting personal information, or asking you to verify an account, is usually a scam... even if it looks authentic.
Your identity is one of the most valuable things you own. It s important to keep your identity from being stolen by someone who can potentially harm your good name and financial well-being. Identity theft
Protecting your business from fraud
Protecting your business from fraud KEY TAKEAWAYS > Understand the most common types of fraud and how to identify them. > What to do if you uncover fraudulent activity or suspect you are a victim of fraud.
Information Security Awareness
Corporate Account Takeover & Corporate Account Takeover & Information Security Awareness The information contained in this session may contain privileged and confidential information. This presentation
SMALL BUSINESS IT SECURITY PRACTICAL GUIDE
SMALL BUSINESS IT SECURITY PRACTICAL GUIDE How to make sure your business has comprehensive IT security protection #protectmybiz Small businesses come in all shapes and sizes. But in today s world, no
How to stay safe online
How to stay safe online Everyone knows about computer viruses...or at least they think they do. Nearly 30 years ago, the first computer virus was written and since then, millions of viruses and other malware
Business ebanking Fraud Prevention Best Practices
Business ebanking Fraud Prevention Best Practices User ID and Password Guidelines Create a strong password with at least 8 characters that includes a combination of mixed case letters, numbers, and special
Don t Click That Link and other security tips. Laura Perry Jennifer Speegle Mike Trice
Don t Click That Link and other security tips Laura Perry Jennifer Speegle Mike Trice About Us Laura Perry Information Security Jennifer Speegle Firewall Administrator Mike Trice Network Engineer Mail
Information Security. Annual Education 2014. Information Security. 2014 Mission Health System, Inc.
Annual Education 2014 Why? Protecting patient information is an essential part of providing quality healthcare. As Mission Health grows as a health system and activities become more computerized, new information
Information Security
Information Security Table of Contents Statement of Confidentiality and Responsibility... 2 Policy and Regulation... 2 Protect Our Information... 3 Protect Your Account... 4 To Change Your Password...
Internet threats: steps to security for your small business
Internet threats: 7 steps to security for your small business Proactive solutions for small businesses A restaurant offers free WiFi to its patrons. The controller of an accounting firm receives a confidential
Protect yourself online
Protect yourself online Advice from Nottinghamshire Police s Pre Crime Unit Get daily updates: www.nottinghamshire.police.uk www.twitter.com/nottspolice www.facebook.com/nottspolice www.youtube.com/nottinghampolice
Payment Fraud and Risk Management
Payment Fraud and Risk Management Act Today! 1. Help protect your computer against viruses and spyware by using anti-virus and anti-spyware software and automatic updates. Scan your computer regularly
WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY
SMALL BUSINESSES WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY ONE CLICK CAN CHANGE EVERYTHING SMALL BUSINESSES My reputation was ruined by malicious emails ONE CLICK CAN CHANGE EVERYTHING Cybercrime comes
10 Quick Tips to Mobile Security
10 Quick Tips to Mobile Security 10 Quick Tips to Mobile Security contents 03 Introduction 05 Mobile Threats and Consequences 06 Important Mobile Statistics 07 Top 10 Mobile Safety Tips 19 Resources 22
Email/Endpoint Security and More Rondi Jamison
Email/Endpoint Security and More Rondi Jamison Sr. Marke)ng Manager - Enterprise Security Strategy Agenda 1 Why Symantec? 2 Partnership 3 APS2 Packages 4 What s next Copyright 2014 Symantec Corpora)on
Small businesses: What you need to know about cyber security
Small businesses: What you need to know about cyber security March 2015 Contents page What you need to know about cyber security... 3 Why you need to know about cyber security... 4 Getting the basics right...
Deter, Detect, Defend
Deter, Detect, Defend Deter Never provide personal information, including social security number, account numbers or passwords over the phone or Internet if you did not initiate the contact Never click
When visiting online banking's sign-on page, your browser establishes a secure session with our server.
The privacy of communications between you (your browser) and our servers is ensured via encryption. Encryption scrambles messages exchanged between your browser and our online banking server. How Encryption
The information contained in this session may contain privileged and confidential information. This presentation is for information purposes only.
The information contained in this session may contain privileged and confidential information. This presentation is for information purposes only. Before acting on any ideas presented in this session;
Encrypted Email Opening and Replying to a Secure Message
First Time User Registration Opening a Secure Encrypted Email Where to go for Help Frequently Asked Questions Information Technology Encrypted Email Opening and Replying to a Secure Message First Time
Information Security It s Everyone s Responsibility
Information Security It s Everyone s Responsibility Developed By The University of Texas at Dallas (ISO) Purpose of Training As an employee, you are often the first line of defense protecting valuable
BE SAFE ONLINE: Lesson Plan
BE SAFE ONLINE: Lesson Plan Overview Danger lurks online. Web access, social media, computers, tablets and smart phones expose users to the possibility of fraud and identity theft. Learn the steps to take
What are the common online dangers?
ONLINE SECURITY GUIDELINES Internet Banking is convenient and times saving. You can do remittances, place online deposit and other transactions through online banking with the convenience and privacy of
The following information was provided by SANS and discusses IT Security Awareness. It was last updated in 2015.
The following information was provided by SANS and discusses IT Security Awareness. It was last updated in 2015. By completing this module and the quiz, you will receive credit for CW 170, which is required
Online Security Awareness - UAE Exchange - Foreign Exchange Send Money UAE Exchange
The responsibility of safeguarding your personal information starts with you. Your information is critical and it must be protected from unauthorised disclosure, modification or destruction. Here we are
General Security Best Practices
General Security Best Practices 1. One of the strongest physical security measures for a computer or server is a locked door. 2. Whenever you step away from your workstation, get into the habit of locking
Tips for Banking Online Safely
If proper attention is given to safety and security, banking and monetary activities can be completed online in a convenient and effective fashion. This guide helps to establish procedures for remaining
BSHSI Security Awareness Training
BSHSI Security Awareness Training Originally developed by the Greater New York Hospital Association Edited by the BSHSI Education Team Modified by HSO Security 7/1/2008 1 What is Security? A requirement
SMALL BUSINESS IT SECURITY PRACTICAL GUIDE
SMALL BUSINESS IT SECURITY PRACTICAL GUIDE How to make sure your business has comprehensive IT security protection #protectmybiz Small businesses come in all shapes and sizes. But in today s world, no
Best Practices Guide to Electronic Banking
Best Practices Guide to Electronic Banking City Bank & Trust Company offers a variety of services to our customers. As these services have evolved over time, a much higher percentage of customers have
Common Cyber Threats. Common cyber threats include:
Common Cyber Threats: and Common Cyber Threats... 2 Phishing and Spear Phishing... 3... 3... 4 Malicious Code... 5... 5... 5 Weak and Default Passwords... 6... 6... 6 Unpatched or Outdated Software Vulnerabilities...
Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning
Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning Lee Zelyck Network Administrator Regina Public Library Malware, Spyware, Trojans
SBA Cybersecurity for Small Businesses. 1.1 Introduction. 1.2 Course Objectives. 1.3 Course Topics
SBA Cybersecurity for Small Businesses 1.1 Introduction Welcome to SBA s online training course: Cybersecurity for Small Businesses. SBA s Office of Entrepreneurship Education provides this self-paced
PROTECT YOUR COMPUTER AND YOUR PRIVACY!
PROTECT YOUR COMPUTER AND YOUR PRIVACY! Fraud comes in many shapes simple: the loss of both money protecting your computer and Take action and get peace of and sizes, but the outcome is and time. That
Information Security. Louis Morgan, CISSP Information Security Officer
Information Security By Louis Morgan, CISSP Information Security Officer Why Bother with IT Security? Recent estimate - 900 million personal computers worldwide. Computer hackers are out there. How long
Activities for Protecting Your Identity and Computer for Middle and High School Students
Activities for Protecting Your Identity and Computer for Middle and High School Students Overview There are three posters about protecting your computer for this grade span. We recommend that these be
An Introduction on How to Better Protect Your Computer and Sensitive Data
An Introduction on How to Better Protect Your Computer and Sensitive Data Common Security Problems Computer users who fail to use strong passwords Constant attacks by viruses, worms, key loggers and bots
Top 10 Tips to Keep Your Small Business Safe
Securing Your Web World Top 10 Tips to Keep Your Small Business Safe Protecting your business against the latest Web threats has become an incredibly complicated task. The consequences of external attacks,
This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit.
The hidden risks of mobile applications This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit. To learn more about TraceSecurity visit www.tracesecurity.com
Phishing Scams Security Update Best Practices for General User
Phishing Scams Security Update Best Practices for General User hishing refers to the malicious attack Pmethod by attackers who imitate legitimate companies in sending emails in order to entice people to
Protection from Fraud and Identity Theft
Table of Contents Protection from Fraud & Identity Theft... 1 Simple Steps to Secure Your Devices... 1 Setting Up Your Computer and/or Mobile Device... 2 Adding Security Software... 2 Internet Safety Tips...
C-SAVE. Scenario #1 Jake and the Bad Virus. The two major C3 concepts this scenario illustrates are:
Scenario #1 Jake and the Bad Virus The two major C3 concepts this scenario illustrates are: Cyber Security: Jake compromised his computer s security by providing personal information to an unknown online
CLEO Remote Access Services CLEO Remote Desktop Access User Guide v1.3
CLEO ~Remote Access Services Remote Desktop Access User guide CLEO Remote Access Services CLEO Remote Desktop Access User Guide v1.3 August 2007 page 1 of 16 CLEO 2007 CLEO Remote Access Services 3SGD
Security Bank of California Internet Banking Security Awareness
Security Bank of California Internet Banking Security Awareness INTRODUCTION Fraudsters are using increasingly sophisticated and malicious techniques to thwart existing authentication controls and gain
INFORMATION SECURITY BASICS. A computer security tutorial for Holyoke Community College
INFORMATION SECURITY BASICS A computer security tutorial for Holyoke Community College I NTRODUCTION This tutorial provides some basic information and practical suggestions for protecting your personal
What you need to know to keep your computer safe on the Internet
What you need to know to keep your computer safe on the Internet Tip 1: Always install Operating System updates The most important steps for any computer user is to always install updates, especially security
Internet Basics. Meg Wempe, Adult Services Librarian ABOUT THIS CLASS. P a g e 1
P a g e 1 Internet Basics ABOUT THIS CLASS This class is designed to provide a basic introduction to accessing and navigating the internet (a.k.a. the world wide web or the web ). Throughout the class,
TRAINING FOR AMERICAN MOMENTUM BANK CLIENTS. Corporate Account Takeover & Information Security Awareness
TRAINING FOR AMERICAN MOMENTUM BANK CLIENTS Corporate Account Takeover & Information Security Awareness The information contained in this session may contain privileged and confidential information. This
Advice about online security
Advice about online security May 2013 Contents Report a suspicious email or website... 3 Security advice... 5 Genuine DWP contacts... 8 Recognising and reporting phishing and bogus emails... 9 How DWP
IT Security DO s and DON Ts
For more advice contact: IT Service Centre T: (01332) 59 1234 E: [email protected] Online: http://itservicecentre.derby.ac.uk Version: February 2014 www.derby.ac.uk/its IT Security DO s and DON
Phishing Past, Present and Future
White Paper Phishing Past, Present and Future By Theodore Green, President, SpamStopsHere.com Abstract A particularly dangerous and now common type of spam known as "Phishing attempts to trick recipients
Security Breaches. There are unscrupulous individuals, like identity thieves, who want your information to commit fraud.
IDENTITY THEFT Security Breaches Our economy generates an enormous amount of data. Most users of that information are from honest businesses - getting and giving legitimate information. Despite the benefits
Guide to credit card security
Contents Click on a title below to jump straight to that section. What is credit card fraud? Types of credit card fraud Current scams Keeping your card and card details safe Banking and shopping securely
How To Protect Yourself Online
NetBank security guide Commonwealth Bank Personal 1 Contents Page 4 5 5 5 7 7 9 9 9 11 12 12 13 13 13 14 14 14 16 16 16 17 18 18 19 19 20 21 Section Peace of mind with NetBank What are the common online
CYBER-SAFETY BASICS. A computer security tutorial for UC Davis students, faculty and staff
CYBER-SAFETY BASICS A computer security tutorial for UC Davis students, faculty and staff INTRODUCTION This tutorial provides some basic information and practical suggestions for protecting your personal
High Speed Internet - User Guide. Welcome to. your world.
High Speed Internet - User Guide Welcome to your world. 1 Welcome to your world :) Thank you for choosing Cogeco High Speed Internet. Welcome to your new High Speed Internet service. When it comes to a
Don t Fall Victim to Cybercrime:
Don t Fall Victim to Cybercrime: Best Practices to Safeguard Your Business Agenda Cybercrime Overview Corporate Account Takeover Computer Hacking, Phishing, Malware Breach Statistics Internet Security
Social Media and Cyber Safety
Social Media and Cyber Safety Presented to the National Association of REALTORS by Andrew Wooten Safety and Security Consultant [email protected] Social Media and Cyber Safety Our instructor today
Cyber Opsec. Protecting Yourself Online. Think. Protect. OPSEC. www.ioss.gov
Cyber Opsec Protecting Yourself Online Think. Protect. OPSEC. www.ioss.gov CYBER OPSEC: section 1 Internet Communication in General Our carelessness makes the job easy for the adversary. The Internet was
