It may look like this all has to do with your password, but that s not the only factor to worry about.

Size: px
Start display at page:

Download "It may look like this all has to do with your password, but that s not the only factor to worry about."

Transcription

1 Account Security One of the easiest ways to lose control of private information is to use poor safeguards on internet accounts like web-based , online banking and social media (Facebook, Twitter). People make mistakes such as: Using the same password in multiple sites Using an easy to crack password Making it was for someone to guess your password, or reset it against your will. It may look like this all has to do with your password, but that s not the only factor to worry about. How Do Accounts Get Hacked? There are four basic ways for someone to break into your account: Password Cracking Software: A hacker employs software to keep trying to log in until it succeeds. Strong passwords help protect against this. Phishing: A hacker employs a deceptive or website to get you to enter your login information. Never enter your login information after clicking a link in an , and always double check to see if you re signing into to the site you recognize. Look for typos in the site and its web address and other things that look out of the ordinary. Human Cracking: A human being guesses the password, or tricks an administrator or service provider into granting access. This is especially common when the perpetrator is someone the victim knows, such as a (supposed) friend, partner or family member. Properly storing passwords, making them hard to guess, and lying in your security questions all help protect against this. Site Hack: Hackers invade the site or service and get a list of usernames, passwords, or both. The perpetrators may break into your account themselves, or share the information with a third party. The only way you can minimize risk is to stick to online accounts with reputable sites and services. Convenience versus Security These days, we may have over a dozen online accounts for different things, and by looking for an easy way to manage them all, we may end up making our accounts easy to break into. It may be convenient to use the same password for everything, but it isn t secure. You may have to sacrifice some convenience to protect your accounts, but you can make things easier by following the advice in this document. The more of this advice you use, the better protected you ll be. Risk Factors Poor management of your account creates risk factors. The more of these you have, the easier it will be to break into your account. Public Username: You posted your address or username online. Sometimes this is unavoidable people need to know your address to contact you, and some services (such

2 as blogging) put your username in an obvious place, such as the web address you re using. In general, you should avoid letting anyone know what your username is. Weak Password: If your password is too short, too common or otherwise weak, it s easier to hack. Repeated Password: If you use the same password for multiple sites, cracking one lets hackers crack the rest. Guessable Password/Security Question: If your password or any answers to security questions relate to something people know about you, someone might guess them. Sharing: If you share passwords or account access, you greatly increase the chance of your account being hacked. Adults should never share online accounts. Insecure Record: If you leave a note at your desk that lists your password, guests and intruders can find and use it. Protecting Your Login While some attacks may select your account at random, others target it when you make hackers aware of your account s existence, or a possible vulnerability. Here s what you can do to protect yourself: Lie for Security Questions: Many accounts ask for the answer to a question in case you lose your password and need to reset it, or as an additional factor to add security. Unfortunately, it might be easy for people who know you or spy on you online to guess the answers. For example, if you mention your brother s name on Twitter, a hacker will know what to say if the question asks for that name. The best solution is to lie about these answers, as long as the lie is something easy for you to remember. If your mother s maiden name is Jones, you might decide to always say it is Smith instead. Avoid Posting Your Username/ People and automated services may both find your username by looking it up online. Some programs grab every address they come across. Avoid letting anyone know what your username or address except in non-public postings. If you must post your address, don t write it as example@example.com. Type example (at) example (dot) com or something similar instead. Use Separate Accounts for and Sign Ups: If you use one account for everything, someone who breaks into that account may be able to break into others. Consider signing up for a separate account to manage accounts for services such as Facebook. Never post the address of or send from this account. For extra caution, use a third account exclusively for financial services such as online banking. Again, never post the address of or send from this account. Never Sign in to an Account through a Link: Phishing designed to steal your login information will often ask you to click a link to log in. Phishing will often look like from the real site or service. Always go to the site you want to sign into separately, without clicking the link. Do Not Let Web Browsers Remember Your Login or Stay Logged on Unless It s After You Log In to a Computer: All major web browsers give you the option to remember your login, and many services allow you to stay permanently logged on. You should never allow this except on

3 computers user accounts that only you may log into, such as a Windows or Mac login. This login should require a password. Strong Passwords A strong password is critically important. Many sites will no longer let you use weak passwords. The rules for what type of password can be used varies from one site or service to the next, but a strong password always combines two things: Length: The longer the password, the stronger it is. For example, largepillowmanatee2 is better than largepillow2. Complexity: The less it resembles common words, phrases and sets of numbers, the more complex it is. (l)a{r}g[e]p<i>l(l)o{w}2 is better than largepillow. In addition, you should never use the same password in more than one place. Sites will often ask you to use numbers, capital letters and small letters. Do so! In addition, you should use the following guidelines: Make them at least eight characters, preferably more. Do not use any words or information that can be guessed about you, such as a pet, hobby or relative s name. Do not re-use passwords from other sites or services. Using Password Rules to Make Strong Passwords Unfortunately, it may be difficult to think up and remember passwords that are long or complicated enough. One way to get around this is to come up with a set of personal rules you make up for generating passwords. It works like this: 1. Think of two or more root words you ll use. These should be unusual words that cannot be guessed and are not always used together. You will change these words from one password to the next, though you might always decide, say, to combine a food and a vehicle. Example: bacontractor 2. Come up with a rule that changes these words. Examples: Surround every other letter with brackets, starting from the top of the keyboard and work your way down. Result: bacontractor turns into b(a)c{o}n[t]r<a>c(t)o{r}. Add an increasing multiple of 3, starting with 3, after every two letters. Result: bacontractor turns into ba3co6tr9act12or Capitalize every vowel. Result: bacontractor becomes bacontractor. 3. If your rule would not provide a capital letter or number make up a rule to add them, but do not put the capital letter at the beginning or assign the number 1. Example: I might always capitalize the third letter and add 23 before the last letter in my words. 4. Apply one or more rules to the word, making sure you have capital letters and numbers, as noted. So taken together, here s how I might create different passwords: 1. I decide to follow the food + vehicle rule to make up words. I come up with:

4 fishsedan chipsplane burgersled 2. I decide I will always capitalize the last letter of my word and put the number 52 right before it. 3. I make a rule saying that I will add a symbol from SHIFT + the top number row, working back from 0 (running through )(*&^%$#@!) after every second character. 4. After applying these rules to my words, I get the following passwords: Facebook: fi)sh(se*da&52^n Twitter: ch)ip(sp*la&n5^2e bu)ur(ge*rs&le^52%d All I need to do is remember the words and the rules, and I can make very strong passwords, as long as I don t write the words or rules down. Using a Password Manager Password managers (also called password lockers) are programs and services that collect all of your passwords in one place. The password manager submits your login information for you. Instead of memorizing many passwords, you just need to enter one into the password manager. This way, you can create secure passwords for each account without worrying about memorizing them. All you need to do is to log in to the password manager itself. There are some drawbacks, however: You must make sure the password manager s password is secure, and that you don t forget it. If someone guesses that password, they can get into everything. Your password manager only works when you can get to it. On a different computer you may have to log in normally, which means you ll still need to remember your password. Some password managers now operate in the cloud, which means you can sign in to them from any computer, which then grabs your login information from an internet server. Two Factor Authentication Two factor authentication is a service that sends a one-time code you need to enter in addition to your password. Some services like Gmail offer this for free. Otherwise, some software can add this feature for you. Two factor authentication can take many forms. Gmail s version sends you a text message with an extra code to enter. You may want to use two factor authentication for a few very important accounts, but not bother with it for less important things. It s inconvenient, but makes your account more secure. Changing Your Passwords If you ever suspect in the slightest that an account has been hacked or password discovered, change your password immediately! Hackers typically exploit stolen logins right away, so you should fix the problem as soon as possible. The new password should be as different from the old one as possible. In addition, some services, workplaces and other organizations ask that you change your password regularly. This will normally be asked automatically, through security policies. You may wish to do

5 something similar for important personal accounts, changing passwords every few months. In any event, this is no substitute for using a strong password and taking other steps to keep your accounts secure.

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS ftrsecure.com Can You Separate Myths From Facts? Many Internet myths still persist that could leave you vulnerable to internet crimes. Check out

More information

Welcome to the Protecting Your Identity. Training Module

Welcome to the Protecting Your Identity. Training Module Welcome to the Training Module 1 Introduction Does loss of control over your online identities bother you? 2 Objective By the end of this module, you will be able to: Identify the challenges in protecting

More information

Enhanced Security for Online Banking

Enhanced Security for Online Banking Enhanced Security for Online Banking MidSouth Bank is focused on protecting your personal and account information at all times. As instances of internet fraud increase, it is no longer sufficient to use

More information

SMALL BUSINESS IT SECURITY PRACTICAL GUIDE

SMALL BUSINESS IT SECURITY PRACTICAL GUIDE SMALL BUSINESS IT SECURITY PRACTICAL GUIDE How to make sure your business has comprehensive IT security protection #protectmybiz Small businesses come in all shapes and sizes. But in today s world, no

More information

Two-Factor Authentication and Swivel

Two-Factor Authentication and Swivel Two-Factor Authentication and Swivel Abstract This document looks at why the username and password are no longer sufficient for authentication and how the Swivel Secure authentication platform can provide

More information

Server Security. Contents. Is Rumpus Secure? 2. Use Care When Creating User Accounts 2. Managing Passwords 3. Watch Out For Aliases 4

Server Security. Contents. Is Rumpus Secure? 2. Use Care When Creating User Accounts 2. Managing Passwords 3. Watch Out For Aliases 4 Contents Is Rumpus Secure? 2 Use Care When Creating User Accounts 2 Managing Passwords 3 Watch Out For Aliases 4 Deploy A Firewall 5 Minimize Running Applications And Processes 5 Manage Physical Access

More information

Setting up a Personal Email Account

Setting up a Personal Email Account Setting up a Personal Email Account Having a personal email account is vital to accessing many services on the internet. Many sites, both useful and not so useful require you to make an account with them

More information

The following information was provided by SANS and discusses IT Security Awareness. It was last updated in 2015.

The following information was provided by SANS and discusses IT Security Awareness. It was last updated in 2015. The following information was provided by SANS and discusses IT Security Awareness. It was last updated in 2015. By completing this module and the quiz, you will receive credit for CW 170, which is required

More information

SMALL BUSINESS IT SECURITY PRACTICAL GUIDE

SMALL BUSINESS IT SECURITY PRACTICAL GUIDE SMALL BUSINESS IT SECURITY PRACTICAL GUIDE How to make sure your business has comprehensive IT security protection #protectmybiz Small businesses come in all shapes and sizes. But in today s world, no

More information

MANAGING RISK: SECURING DIGITAL IDENTITIES Striking the balance between user experience and security

MANAGING RISK: SECURING DIGITAL IDENTITIES Striking the balance between user experience and security MANAGING RISK: SECURING DIGITAL IDENTITIES Striking the balance between user experience and security You re more connected, but more at risk too Enterprises are increasingly engaging with partners, contractors

More information

Remote Access Securing Your Employees Out of the Office

Remote Access Securing Your Employees Out of the Office Remote Access Securing Your Employees Out of the Office HSTE-NB0011-RV 1.0 Hypersecu Information Systems, Inc. #200-6191 Westminster Hwy Richmond BC V7C 4V4 Canada 1 (855) 497-3700 www.hypersecu.com Introduction

More information

Cybersecurity Best Practices

Cybersecurity Best Practices Ten Essential Cybersecurity Best Practices Banking Business Employees Brought to you by: 1 Did you know? One in five small-to-medium-sized companies were the victims of cyber breaches in 2013.1 In 76%

More information

10 Things You Need to Know About Internet Security

10 Things You Need to Know About Internet Security INFORMATION SECURITY 10 Things You Need to Know About Internet Security Presented by: Steven Blanc IT Security Officer, Bowdoin College Internet Security Versus Internet Safety Security: We must secure

More information

Frequently Asked Questions (FAQ)

Frequently Asked Questions (FAQ) Your personal information and account security is important to us. This product employs a Secure Sign On process that includes layers of protection at time of product log in to mitigate risk, and thwart

More information

Cyber Security. Maintaining Your Identity on the Net

Cyber Security. Maintaining Your Identity on the Net Cyber Security Maintaining Your Identity on the Net Why Cyber Security? There are three points of failure in any secure network: Technology (hardware and software) Technology Support (ITS) End Users (USD

More information

DSHS CA Security For Providers

DSHS CA Security For Providers DSHS CA Security For Providers Pablo F Matute DSHS Children's Information Security Officer 7/21/2015 1 Data Categories: An Overview All DSHS-owned data falls into one of four categories: Category 1 - Public

More information

SPICE EduGuide EG0015 Security of Administrative Accounts

SPICE EduGuide EG0015 Security of Administrative Accounts This SPICE EduGuide applies to HSC information systems, specifically Administrative login accounts; (aka Admin accounts) and the faculty, staff and students who use them. Admin accounts are logon IDs and

More information

Keeping your online health and social care records safe and secure

Keeping your online health and social care records safe and secure Keeping your online health and social care records safe and secure Keeping your online health and social care records safe and secure By 2015, everyone in England will have access to their GP medical records

More information

Computer Security Self-Test: Questions & Scenarios

Computer Security Self-Test: Questions & Scenarios Computer Security Self-Test: Questions & Scenarios Rev. Sept 2015 Scenario #1: Your supervisor is very busy and asks you to log into the HR Server using her user-id and password to retrieve some reports.

More information

Security Awareness for Social Media in Business. Scott Wright

Security Awareness for Social Media in Business. Scott Wright Security Awareness for Social Media in Business Scott Wright Security Perspectives Inc COUNTERMEASURE 2012 10/29/2012 Copyright 2012. Security Perspectives Inc. 1 10/29/2012 Copyright 2012. Security Perspectives

More information

Data protection. Protecting your personal information online

Data protection. Protecting your personal information online Data protection Protecting your personal information online 3 Introduction More and more people are conducting their personal affairs online. Online shopping, social networking, job hunting and the ability

More information

Multi-Factor Authentication

Multi-Factor Authentication Making the Most of Multi-Factor Authentication Introduction The news stories are commonplace: Hackers steal or break passwords and gain access to a company s data, often causing huge financial losses to

More information

Avoiding Malware in Your Dental Practice. 10 Best Practices to Defend Your Data

Avoiding Malware in Your Dental Practice. 10 Best Practices to Defend Your Data Avoiding Malware in Your Dental Practice 10 Best Practices to Defend Your Data Avoiding Malware in Your Dental Practice Like most small business owners, you must protect your dental practice s computer

More information

Avoiding Malware in Your Dental Practice. 10 Best Practices to Defend Your Data

Avoiding Malware in Your Dental Practice. 10 Best Practices to Defend Your Data Avoiding Malware in Your Dental Practice 10 Best Practices to Defend Your Data Avoiding Malware in Your Dental Practice Like most small business owners, you must protect your dental practice s computer

More information

Internet Banking. Business Call Account. Keeping things simple. That s what we do.

Internet Banking. Business Call Account. Keeping things simple. That s what we do. Internet Banking Business Call Account Keeping things simple. That s what we do. Heartland Internet Banking Heartland s Internet Banking service is a fast and convenient way to keep up-to-date with, and

More information

Safe Practices for Online Banking

Safe Practices for Online Banking November 2012 Follow these guidelines to help protect your information while banking online. At First Entertainment Credit Union, our goal is to provide you with the best all around banking experience.

More information

Single Sign-On for the Internet: A Security Story. Eugene Tsyrklevich eugene@tsyrklevich.name Vlad Tsyrklevich vlad902@gmail.com

Single Sign-On for the Internet: A Security Story. Eugene Tsyrklevich eugene@tsyrklevich.name Vlad Tsyrklevich vlad902@gmail.com Single Sign-On for the Internet: A Security Story Eugene Tsyrklevich eugene@tsyrklevich.name Vlad Tsyrklevich vlad902@gmail.com BlackHat USA, Las Vegas 2007 Introduction With the explosion of Web 2.0 technology,

More information

User Identity and Authentication

User Identity and Authentication User Identity and Authentication WordPress, 2FA, and Single Sign-On Isaac Potoczny-Jones ijones@tozny.com http://tozny.com About the Speaker Galois, Inc. - @galoisinc. Research & Development for computer

More information

1. For each of the 25 questions, multiply each question response risk value (1-5) by the number of times it was chosen by the survey takers.

1. For each of the 25 questions, multiply each question response risk value (1-5) by the number of times it was chosen by the survey takers. Employee Security Awareness Survey Trenton Bond trent.bond@gmail.com Admin - Version 1.3 Security Awareness One of the most significant security risks that organizations and corporations face today is

More information

Multi-Factor Authentication FAQs

Multi-Factor Authentication FAQs General FAQs What is Multi-factor Authentication (MFA)? Multi-factor authentication (MFA) seeks to decrease the likelihood that others can access your data. Specifically, it enhances the security of your

More information

Egress Switch Best Practice Security Guide V4.x

Egress Switch Best Practice Security Guide V4.x Egress Switch Best Practice Security Guide V4.x www.egress.com 2007-2013 Egress Software Technologies Ltd Table of Contents Introduction... 4 Best Practice Installation... 4 System Administrators... 5

More information

National Cyber Security Month 2015: Daily Security Awareness Tips

National Cyber Security Month 2015: Daily Security Awareness Tips National Cyber Security Month 2015: Daily Security Awareness Tips October 1 New Threats Are Constantly Being Developed. Protect Your Home Computer and Personal Devices by Automatically Installing OS Updates.

More information

How To Protect Your Information From Being Hacked By A Hacker

How To Protect Your Information From Being Hacked By A Hacker DOL New Hire Training: Computer Security and Privacy Table of Contents Introduction Lesson One: Computer Security Basics Lesson Two: Protecting Personally Identifiable Information (PII) Lesson Three: Appropriate

More information

Boston University Security Awareness. What you need to know to keep information safe and secure

Boston University Security Awareness. What you need to know to keep information safe and secure What you need to know to keep information safe and secure Introduction Welcome to Boston University s Security Awareness training. Depending on your reading speed, this presentation will take approximately

More information

Email Security. 01-15-09 Fort Mac

Email Security. 01-15-09 Fort Mac Email Security 01-15-09 Fort Mac Most Common Mistakes in Email Security Email Security 1. Using just one email account. 2. Holding onto spammed-out accounts too long. 3. Not closing the browser after logging

More information

2. _General Help and Technical Support

2. _General Help and Technical Support 1. _Welcome Welcome to Business Internet Banking. Our online service is available 06:00 AM ET 12:00 AM (Midnight) ET, seven days a week, so you and your employees can manage your business banking accounts

More information

Infocomm Sec rity is incomplete without U Be aware,

Infocomm Sec rity is incomplete without U Be aware, Infocomm Sec rity is incomplete without U Be aware, responsible secure! HACKER Smack that What you can do with these five online security measures... ANTI-VIRUS SCAMS UPDATE FIREWALL PASSWORD [ 2 ] FASTEN

More information

Would You Like To Earn $1000 s With The Click Of A Button?

Would You Like To Earn $1000 s With The Click Of A Button? Would You Like To Earn $1000 s With The Click Of A Button? (Follow these easy step by step instructions and you will) This Version of the ebook is for all countries other than the USA. If you need the

More information

Internet Banking. Keeping things simple. That s what we do.

Internet Banking. Keeping things simple. That s what we do. Internet Banking Keeping things simple. That s what we do. Heartland Internet Banking Heartland s Internet Banking service is a fast and convenient way to keep up-to-date with, and manage your accounts

More information

Digital Citizenship Lesson Plan

Digital Citizenship Lesson Plan Digital Citizenship Lesson Plan This course is to help people to understand how to use the Internet in a safe, productive way. Additional resources and links are available on the TechTECS website. http://techtecs.com/digital-citizenship

More information

Half Bridge mode }These options are all found under Misc Configuration

Half Bridge mode }These options are all found under Misc Configuration Securing Your NB1300 - Once connected. There are eleven areas that need your attention to secure your NB1300 from unauthorised access - these areas or features are; Physical Security Admin Password User

More information

Configuring Facebook for a More Secure Social Networking Experience

Configuring Facebook for a More Secure Social Networking Experience CPF 00009-15-CID361-9H-Facebook* 10 November 2015 Configuring Facebook for a More Secure Social Networking Experience Settings Settings are available under the Facebook Configuration Arrow. General Settings

More information

Cybercrime Prevention and Awareness

Cybercrime Prevention and Awareness April, 2014 Cybercrime Prevention and Awareness Basic Security Principles to Help You Better Navigate Through Cyberspace To join conference call dial (305) 433-6663 option 4 PIN # 42014 Presented by: Miguel

More information

Managing Your Network Password Using MyPassword

Managing Your Network Password Using MyPassword Managing Your Network Password Using MyPassword Your Otterbein network password allows you to log in to O-Zone, Blackboard, the OtterbeinU wireless network, and other network resources. Using MyPassword,

More information

Member FAQ. General Information: Security:

Member FAQ. General Information: Security: General Information: Security: Why did you change Robins Federal Online Banking? Great question! We listened to an overwhelming response from you, our members that we needed to make these changes. We are

More information

Siena College Password Management Policy

Siena College Password Management Policy Siena College Password Management Policy Updated: 5/29/14 Note: Status: Approved. I. Purpose: The purpose of this policy is to establish a standard for the creation of strong passwords, the protection

More information

RFG Secure FTP. Web Interface

RFG Secure FTP. Web Interface RFG Secure FTP Web Interface Step 1: Getting to the Secure FTP Web Interface: Open your preferred web browser and type the following address: http://ftp.raddon.com After you hit enter, you will be taken

More information

DIGITAL LIFE E-GUIDE. Keeping Your Cloud Data in Check

DIGITAL LIFE E-GUIDE. Keeping Your Cloud Data in Check A DIGITAL LIFE E-GUIDE Keeping Your Cloud Data in Check Creating passwords, installing security software, practicing safe surfing habits these typical security measures are not enough to protect your

More information

9 Simple steps to secure your Wi-Fi Network.

9 Simple steps to secure your Wi-Fi Network. 9 Simple steps to secure your Wi-Fi Network. Step 1: Change the Default Password of Modem / Router After opening modem page click on management - access control password. Select username, confirm old password

More information

Flexible Identity. Tokenless authenticators guide. Multi-Factor Authentication. version 1.0

Flexible Identity. Tokenless authenticators guide. Multi-Factor Authentication. version 1.0 Flexible Identity Multi-Factor Authentication Tokenless authenticators guide version 1.0 Publication History Date Description Revision 2014.02.07 initial release 1.0 Copyright Orange Business Services

More information

Defense Media Activity Guide To Keeping Your Social Media Accounts Secure

Defense Media Activity Guide To Keeping Your Social Media Accounts Secure Guide To Keeping Your Social Media Accounts Secure Social media is an integral part of the strategic communications and public affairs missions of the Department of Defense. Like any asset, it is something

More information

Information Security Awareness. IT Security

Information Security Awareness. IT Security Information Security Awareness IT Security Agenda Recognizing Confidential Information Protecting Yourself Your Password Recognizing Secure Websites Email Security Phishing Protect Your Computer Antivirus

More information

Class Outline. Part 1 - Introduction Explaining email Parts of an email address Types of email services Acquiring an email account

Class Outline. Part 1 - Introduction Explaining email Parts of an email address Types of email services Acquiring an email account EMAIL Basics Class Outline Part 1 - Introduction Explaining email Parts of an email address Types of email services Acquiring an email account Part 3 Managing Your Messages Deleting messages The Trash

More information

Hospitality Cloud+Plus. How Technology Can Benefit Your Hotel LIMOTTA IT. LIMOTTAIT.com/hospitality 888 884 6278

Hospitality Cloud+Plus. How Technology Can Benefit Your Hotel LIMOTTA IT. LIMOTTAIT.com/hospitality 888 884 6278 Hospitality Cloud+Plus How Technology Can Benefit Your Hotel LIMOTTA IT LIMOTTAIT.com/hospitality 888 884 6278 Content + + About Us PCI Compliance + Virtualization + + + Unified Technology Single Sign

More information

Why Centralized Cloud ID Management Is Crucial For The Enterprise

Why Centralized Cloud ID Management Is Crucial For The Enterprise Why Centralized Cloud ID Management Is Crucial For The Enterprise Executive Overview It is well established that we are experiencing a radical model shift in enterprise computing to hybrid-cloud models.

More information

Tips for Banking Online Safely

Tips for Banking Online Safely If proper attention is given to safety and security, banking and monetary activities can be completed online in a convenient and effective fashion. This guide helps to establish procedures for remaining

More information

Secure Mail Registration and Viewing Procedures

Secure Mail Registration and Viewing Procedures Secure Mail Registration and Viewing Procedures May 2011 For External Secure Mail Recipients Contents This document provides a brief, end user oriented overview of the Associated Banc Corp s Secure Email

More information

Information Security. Louis Morgan, CISSP Information Security Officer

Information Security. Louis Morgan, CISSP Information Security Officer Information Security By Louis Morgan, CISSP Information Security Officer Why Bother with IT Security? Recent estimate - 900 million personal computers worldwide. Computer hackers are out there. How long

More information

SECURING YOUR REMOTE DESKTOP CONNECTION

SECURING YOUR REMOTE DESKTOP CONNECTION White Paper SECURING YOUR REMOTE DESKTOP CONNECTION HOW TO PROPERLY SECURE REMOTE ACCESS 2015 SecurityMetrics SECURING YOUR REMOTE DESKTOP CONNECTION 1 SECURING YOUR REMOTE DESKTOP CONNECTION HOW TO PROPERLY

More information

WEB ATTACKS AND COUNTERMEASURES

WEB ATTACKS AND COUNTERMEASURES WEB ATTACKS AND COUNTERMEASURES February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in

More information

PASSWORD MANAGEMENT. February 2008. The Government of the Hong Kong Special Administrative Region

PASSWORD MANAGEMENT. February 2008. The Government of the Hong Kong Special Administrative Region PASSWORD MANAGEMENT February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without

More information

Internet threats: steps to security for your small business

Internet threats: steps to security for your small business Internet threats: 7 steps to security for your small business Proactive solutions for small businesses A restaurant offers free WiFi to its patrons. The controller of an accounting firm receives a confidential

More information

www.mission-computers.com www.street-smarts.ca 1

www.mission-computers.com www.street-smarts.ca 1 Hosted by Spruce Grove & District Chamber of Commerce Passwords Protecting yourself & your business Phishing scams Connie Clark, Mission Computers Dannielle Street, Street Smarts Marketing www.street-smarts.ca

More information

Identity Access Management: Beyond Convenience

Identity Access Management: Beyond Convenience Identity Access Management: Beyond Convenience June 1st, 2014 Identity and Access Management (IAM) is the official description of the space in which OneLogin operates in but most people who are looking

More information

From Data Breaches and Information Hacks, to Unsecure Computing - Know Your Defense

From Data Breaches and Information Hacks, to Unsecure Computing - Know Your Defense 1 of 5 11/17/2014 4:14 PM 800.268.2440 From Data Breaches and Information Hacks, to Unsecure Computing - Know Your Defense Share This Every other week it seems like there is another secure data breach

More information

Reset Virtual Gateway Password Job Aid

Reset Virtual Gateway Password Job Aid Summary of Job Aid In order to access a Virtual Gateway s business service, you must first log on to the Virtual Gateway (VG). From the Virtual Gateway s website (www.mass.gov/vg), click Logon to Virtual

More information

6 Strategies Lawyers Can Use to Streamline Digital Marketing Work

6 Strategies Lawyers Can Use to Streamline Digital Marketing Work 6 Strategies Lawyers Can Use to Streamline Digital Marketing Work By James Druman Online marketing opens up some fantastic opportunities for attorneys to increase exposure, generate new leads, and grow

More information

Tahoe Tech Group serves as your technology partner with a focus on providing cost effective and long term solutions.

Tahoe Tech Group serves as your technology partner with a focus on providing cost effective and long term solutions. Tahoe Tech Group LLC Cyber Security Briefing Truckee Donner Chamber of Commerce March 6, 2015 Tahoe Tech Group serves as your technology partner with a focus on providing cost effective and long term solutions.

More information

Intro to Password Management. January 5, 2015

Intro to Password Management. January 5, 2015 Intro to Password Management January 5, 2015 Listen up! A USERNAME and password combination has long been the standard security mechanism for online accounts. But that method just isn t cutting it anymore.

More information

7 PRACTICES FOR SAFER COMPUTING

7 PRACTICES FOR SAFER COMPUTING 7 7 PRACTICES FOR SAFER COMPUTING EFFICIENT SHOPPING ACCESS TO INFORMATION, MUSIC, AND GAMES EDUCATIONAL RESOURCES TRAVEL PLANNING SPORTS, HOBBIES, AND SOCIAL NETWORKS CONNECTIONS TO FAMILY AND FRIENDS

More information

TMCEC CYBER SECURITY TRAINING

TMCEC CYBER SECURITY TRAINING 1 TMCEC CYBER SECURITY TRAINING Agenda What is cyber-security? Why is cyber-security important? The essential role you play. Overview cyber security threats. Best practices in dealing with those threats.

More information

Dalton State College Password Management System

Dalton State College Password Management System Dalton State s new password management system (PortalGuard) provides a convenient means for DSC students, faculty, and staff to unlock their Active Directory account or reset their Active Directory password

More information

Learn to protect yourself from Identity Theft. First National Bank can help.

Learn to protect yourself from Identity Theft. First National Bank can help. Learn to protect yourself from Identity Theft. First National Bank can help. Your identity is one of the most valuable things you own. It s important to keep your identity from being stolen by someone

More information

Using Foundstone CookieDigger to Analyze Web Session Management

Using Foundstone CookieDigger to Analyze Web Session Management Using Foundstone CookieDigger to Analyze Web Session Management Foundstone Professional Services May 2005 Web Session Management Managing web sessions has become a critical component of secure coding techniques.

More information

Advice about online security

Advice about online security Advice about online security May 2013 Contents Report a suspicious email or website... 3 Security advice... 5 Genuine DWP contacts... 8 Recognising and reporting phishing and bogus emails... 9 How DWP

More information

A Guide to Information Technology Security in Trinity College Dublin

A Guide to Information Technology Security in Trinity College Dublin A Guide to Information Technology Security in Trinity College Dublin Produced by The IT Security Officer & Training and Publications 2003 Web Address: www.tcd.ie/itsecurity Email: ITSecurity@tcd.ie 1 2

More information

Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning

Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning Lee Zelyck Network Administrator Regina Public Library Malware, Spyware, Trojans

More information

Website Security: What do I need to know? What do I need to do?

Website Security: What do I need to know? What do I need to do? Website Security: What do I need to know? What do I need to do? This document describes some of the emerging security issues for and threats to websites as well as some of the options to address them.

More information

Protect Yourself. Who is asking? What information are they asking for? Why do they need it?

Protect Yourself. Who is asking? What information are they asking for? Why do they need it? Protect Yourself Your home computer serves many purposes: email, shopping, social networking and more. As you surf the Internet, you should be aware of the various ways to protect yourself. Of primary

More information

How to stay safe online

How to stay safe online How to stay safe online Everyone knows about computer viruses...or at least they think they do. Nearly 30 years ago, the first computer virus was written and since then, millions of viruses and other malware

More information

Security in an Increasingly Threatened World. SMS: A better way of doing Two Factor Authentication (2FA)

Security in an Increasingly Threatened World. SMS: A better way of doing Two Factor Authentication (2FA) Security in an Increasingly Threatened World SMS: A better way of doing Two Factor Authentication (2FA) January 2015 The Proliferation of The App World The revolution of the smart phone forever affected

More information

It s 2 o clock: Who Has Your Data? Josh Krueger Chief Technology Officer Integrity Technology Solutions

It s 2 o clock: Who Has Your Data? Josh Krueger Chief Technology Officer Integrity Technology Solutions It s 2 o clock: Who Has Your Data? Josh Krueger Chief Technology Officer Integrity Technology Solutions Your home is your business and your farm is your network. But who has access to it? Can you protect

More information

Working Practices for Protecting Electronic Information

Working Practices for Protecting Electronic Information Information Security Framework Working Practices for Protecting Electronic Information 1. Purpose The following pages provide more information about the minimum working practices which seek to ensure that

More information

1. Any email requesting personal information, or asking you to verify an account, is usually a scam... even if it looks authentic.

1. Any email requesting personal information, or asking you to verify an account, is usually a scam... even if it looks authentic. Your identity is one of the most valuable things you own. It s important to keep your identity from being stolen by someone who can potentially harm your good name and financial well-being. Identity theft

More information

Fraud Prevention Tips

Fraud Prevention Tips Fraud Prevention Tips The best defense against fraud or identity theft is a proactive approach. Here are a few steps you can take to help protect yourself. Protect your identity Copy the front and back

More information

INTERNET & COMPUTER SECURITY March 20, 2010. Scoville Library. ccayne@biblio.org

INTERNET & COMPUTER SECURITY March 20, 2010. Scoville Library. ccayne@biblio.org INTERNET & COMPUTER SECURITY March 20, 2010 Scoville Library ccayne@biblio.org Internet: Computer Password strength Phishing Malware Email scams Identity Theft Viruses Windows updates Browser updates Backup

More information

Introduction to Email. Jan 24 th 2010

Introduction to Email. Jan 24 th 2010 Introduction to Email Jan 24 th 2010 Email Need special software (called email-reader or emailclient) to connect to the email-server and download the emails Email-server has limited space for each user

More information

Social Media and Cyber Safety

Social Media and Cyber Safety Social Media and Cyber Safety Presented to the National Association of REALTORS by Andrew Wooten Safety and Security Consultant andrew@justbesafe.com Social Media and Cyber Safety Our instructor today

More information

Password Recovery. Charles Miller <cmiller@pastiche.org> 20th October 2002

Password Recovery. Charles Miller <cmiller@pastiche.org> 20th October 2002 Password Recovery Charles Miller 20th October 2002 Copying Copyright c 2002 Charles Miller Permission is granted to copy, distribute, and/or modify this document

More information

Objectives. What is Cloud Computing? Security Problems and Liability Privacy Concerns Solutions Recap Challenges for the Customer

Objectives. What is Cloud Computing? Security Problems and Liability Privacy Concerns Solutions Recap Challenges for the Customer 1 Objectives What is Cloud Computing? Security Problems and Liability Privacy Concerns Solutions Recap Challenges for the Customer 2 What is Cloud Computing? Not single, agreed upon definition exists yet,

More information

EVALUATION GUIDE. Evaluating a Self-Service Password Reset Tool. Usability. The password reality

EVALUATION GUIDE. Evaluating a Self-Service Password Reset Tool. Usability. The password reality EVALUATION GUIDE Evaluating a Self-Service Password Reset Tool This guide presents the criteria to consider when evaluating a self-service password reset solution and can be referenced for a new implementation

More information

National Cybersecurity Awareness Campaign

National Cybersecurity Awareness Campaign National Cybersecurity Awareness Campaign About Stop.Think.Connect. In 2009, President Obama issued the Cyberspace Policy Review, which tasked the Department of Homeland Security with creating an ongoing

More information

WLAN Security Networking with Confidence

WLAN Security Networking with Confidence WLAN Security Networking with Confidence Introduction So you ve just installed a new wireless local area network (WLAN) in your small business or home. The access point is on and connected, the client

More information

Top 10 Tips to Keep Your Small Business Safe

Top 10 Tips to Keep Your Small Business Safe Securing Your Web World Top 10 Tips to Keep Your Small Business Safe Protecting your business against the latest Web threats has become an incredibly complicated task. The consequences of external attacks,

More information

CSC 474 -- Network Security. User Authentication Basics. Authentication and Identity. What is identity? Authentication: verify a user s identity

CSC 474 -- Network Security. User Authentication Basics. Authentication and Identity. What is identity? Authentication: verify a user s identity CSC 474 -- Network Security Topic 6.2 User Authentication CSC 474 Dr. Peng Ning 1 User Authentication Basics CSC 474 Dr. Peng Ning 2 Authentication and Identity What is identity? which characteristics

More information

THE FUTURE OF MOBILE SECURITY http://www.cs-networks.net

THE FUTURE OF MOBILE SECURITY http://www.cs-networks.net http://www.cs-networks.net 1 The Future Of Mobile Security Stefan Certic CS Network Solutions Limited http://www.cs-networks.net 2 Introduction Mobile devices are more than just phones, they are a lifeline

More information

MSI Secure Mail Tutorial. Table of Contents

MSI Secure Mail Tutorial. Table of Contents Posted 1/12/12 Table of Contents 1 - INTRODUCTION... 1-1 INTRODUCTION... 1-1 Summary... 1-1 Why Secure Mail?... 1-1 Which Emails Must Be Encrypted?... 1-2 Receiving Email from MSI... 1-2 Sending Email

More information

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 10 Authentication and Account Management

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 10 Authentication and Account Management Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 10 Authentication and Account Management Objectives Describe the three types of authentication credentials Explain what single sign-on

More information

POLARIS INSTALLATION

POLARIS INSTALLATION POLARIS INSTALLATION BELS runs the Polaris 4.1 Integrated Library System (ILS)- the same system as BCCLS. BELS users will connect to Polaris via a terminal server using Remote Desktop Connection (RDC).

More information

TWITTER AND YOUR CHILD, A PARENT S GUIDE TO PRIVACY AND SAFETY

TWITTER AND YOUR CHILD, A PARENT S GUIDE TO PRIVACY AND SAFETY TWITTER AND YOUR CHILD, A PARENT S GUIDE TO PRIVACY AND SAFETY What is Twitter? Twitter is one of the leading tools for connecting users with bite-sized pieces of information and status updates. Each message

More information