+GAMES. Information Security Advisor. Be a Human Firewall! The Human Firewall' s Top Concerns in the Cyber, People & Physical Domains
|
|
|
- Maurice Johns
- 10 years ago
- Views:
Transcription
1 Information Security Advisor December 2015 Be a Human Firewall! The Human Firewall' s Top Concerns in the Cyber, People & Physical Domains +GAMES Spot the insider & Human firewall Filtering EXerCISE Good security comes from timely response. Report security incidents immediately!
2 WHAT IS A HUMAN FIREWALL? A human firewall uses street smarts, common sense and situational security awareness to do the same things physical and digital firewalls do keep good things in and bad things out. YOU act as a bidirectional control agent for what comes into and goes out of both the company networks and your personal home networks. YOU help keep company data confidential and secure. YOU help protect against internal and external threats. YOU know what to do in the case of a potential security incident. You, the human firewall, have many responsibilities. You know that threats are everywhere and you must be alert at all times. You also know that threats to our security are constantly changing. We must all maintain constant vigilance and stay aware of the latest tricks that criminals and others use to harm us, our networks, our clients or our reputation. You don t need to be a technical expert to be security aware, you just need to know how and when to call one. Being a strong human firewall is all about using common sense, making good decisions and asking for clarification whenever you are in doubt! BUT HOW DO FIREWALLS WORK? A firewall for your computer or network is just like a firewall in a building a wall that keeps a potential fire from spreading to other areas. In a computer or network, it prevents destructive, hostile or malformed packets, data and programs from crossing and potentially spreading beyond the cyberbarrier. Firewalls also allow companies to control how their networks are being used. Data packets from a network attempt to pass through a firewall. INTERNET There are two types of firewalls: HARDWARE and SOFTWARE. Both types of firewalls work the same way. SOFTWARE FIREWALLS are programs that can be installed on computers, devices or servers. Software firewalls are the best option for most home computers and networks. A good security practice is to install firewall software on every computer or device, even if it is protected by a hardware firewall. HARDWARE FIREWALLS are special network boxes that can hide a company s network from the outside world. It is becoming more popular to isolate resources using intranet, or next generation firewalls, too. This type of firewall is used by small or large enterprises and is managed either internally or by a third party security service. However, many routers for the home also contain some type of simple firewall hardware. SOFTWARE FIREWALL Data packets are analyzed then compared to a set of criteria or filters. If the data is deemed acceptable, it is allowed to continue on to its destination. HARDWARE FIREWALL FireStopper 4000 If the data or programs are deemed to be potentially hostile or damaging, they are discarded. The data is compared to another set of criteria when it reaches the software firewall. Only data that meets the criteria is allowed to pass. Human firewalls function the same way you filter out the bad and only let in the approved.
3 THE HUMAN FIREWALL S TOP SECURITY CONCERNS IN THE CYBER DOMAIN PHISHING: In addition to conventional widespread phishing, the human firewall knows about two specific kinds of targeted attacks. Whale phishing attacks target high profile individuals within organizations. Spear phishing attacks target specific organizations and all of the people who work there. MALWARE: Malware isn t just viruses, and it s not just something you can get on your desktop PC. Mobile malware has exploded; in the first quarter of 2015, Kaspersky Lab saw 3.3 times as many new mobile malware than it did in the final quarter of Check out the link below for a cool infographic about the history of malware. WEBMAIL: Are you clear about work webmail policies and what you are permitted to send out from company networks? If not, ask. SOCIAL NETWORKING: On social networking sites and forums, be exceedingly careful what you say about any aspect of your professional life. PASSWORDS: How confident are you that your passwords are strong and unhackable? Do you use a password manager at home? When was the last time you updated your passwords? Do each of your online accounts have a unique login? DATA CLASSIFICATION: How do you classify data at home? Do you know your data classification responsibilities at work? Do your family members know what data is acceptable to post in public? SECURITY SOFTWARE & CONTROLS: At work, never, ever attempt to bypass any security controls or change any software on your devices. At home, make sure you use anti-virus and antimalware software and keep it updated! POLICY: It is imperative to know and always follow policy at work regarding , social media, passwords, data classification and software installation. If you are ever unsure about anything, be sure to ask ASAP! THE HUMAN FIREWALL S GUIDE TO DATA CLASSIFICATION BORDER CONTROL & FIREWALLS One way to understand firewalls is to look at the border controls between countries. Border controls are designed to monitor, inspect and limit what you are removing from the country such as antiquities and cash and operate in two directions. Countries want to know who is coming in or out, what they are carrying with them and what their intentions are. Often, border control agents have lists of items and people that are not allowed to leave or enter. Their job is to monitor for these items or individuals and prevent them from passing through the borders. It s the same with computer and network-based firewalls. The firewall acts like a border control agent. It checks the data wanting to enter a network for proper credentials, it scans items for potential contraband and then either detains the data or lets it pass through to its destination. Like border control agencies, firewalls can prevent data from leaving a network as well. Whether at work or at home, there are essentially two types of data: at the highest level, data that can be made public and data that requires secrecy and privacy. The key to being a great human firewall is knowing which category data falls into, and where and how to store it. Common sense is the best approach to determining what you should do with each piece of data. Should I post my SSN on Facebook? Common sense would say no. To be a human firewall at home, you can make your own Data Classification Policies. You get to determine what data you keep private, and what data you make public. You decide where and how to store and backup your data. You should note that some data is automatically public. Do a public search online to see what data you can find about yourself. At work you should always follow company policy. If you see misplaced data, be it physical or digital, report it. If you don t know where to store or what to do with specific data, ASK! You, the human firewall, have control of the data you put out into the world.
4 The Human Firewall s TOP SECURITY CONCERNS in the People Domain Human Error According to researchers, human error and failure to follow policy are the two most common causes of data loss, accounting for roughly three quarters of all security incidents. The Insider Threat We must be aware that all insiders pose a potential threat: unintentional errors or omissions as well as intentional hostile acts can all cause the same amount of damage to an organization. Malicious insiders can be motivated by anger, revenge, monetary gain, etc. Social Engineering Remember, social engineering comes in many forms and a social engineer can look like anyone. We must all be alert to scams and con artists trying to get us to reveal sensitive information or give them access to restricted areas. Read more in this article: Think Before You Click This might sound like something that belongs in the cyber domain but who s doing the clicking? You are! You are your organization s greatest defense against phishing scams, malware, advanced persistent threats and criminal hackers. Common Sense Always remember to think like a human firewall - because you are responsible for any action taken with your user ID. We call it situational awareness or street smarts. Policy Stay up to date on policy at work so you know what to do if you suspect someone isn t who they say they are. Read More Here 5 TRAITS OF A SECURITY AWARE EMPLOYEE SPOT THE INSIDER Here are four different people who work for an unnamed tech organization. Read each of their comments and determine who you think could be an inside threat to the organization. GABRIELLA Hey, what s the passcode to the supply closet? I need to get another box of file folders. KADEN Check out this 64 GB thumb drive I found! Let s go to my office and see what s on it! CLAUDIA I can t believe Shelly beat me out for that promotion! I ve been here way longer than she has. RAYMOND Phew, so glad Rachel let me walk in the side door with her! I didn t want to have to drive all the way home for my badge. Answers on next page >>>
5 THE HUMAN FIREWALL S TOP SECURITY CONCERNS IN THE PHYSICAL DOMAIN CLEAN DESK Keep your work area neat, especially when handling data of different sensitivities. POLICY Always be sure to follow policy, even if it seems like extra work. Policies are in place to protect data and the networks, and it is your job to respect and follow that policy no matter what. DISASTERS At home, make sure your family has a disaster recovery plan. What would happen if your house got flooded or robbed? Are all of your important family documents backed up somewhere? At work, ask about disaster recovery and make sure you know what the backup plans are! SHRED At home, be sure to shred documents containing personal info before disposing. At work, ask about company shredding policy. LOCK SCREEN USB STICKS Never stick an unknown USB stick or external drive into your machine. These devices can be infected with malware set to auto-run. HARD COPIES Always check and double check that you have not left any documents in public areas, printers, copy or fax machines or conference rooms. Be sure to not only set a lock screen with a passphrase or PIN on your mobile device, but to also lock your workstation every time you leave your desk! Human Firewall Filtering Exercise WAYFINDER CORPORAT BADGES Do you know your organization s badge policy? TMI Don t talk loudly in public when discussing sensitive or confidential information. Always be aware of who can be listening. Sometimes the decisions human firewalls must make are easy, like deleting an obvious phishing or always following policy. But sometimes the decisions are more complex, like, Should I question that unfamiliar person entering the building without a badge? or Who do I give this unmarked USB drive to? Remember, when you are in doubt, always ask an admin or manager. A good human firewall recognizes potential security incidents and always reports them to the proper individuals. Take a look at the wall to the right and decide: Should these things be filtered in or out? A. from the boss. B. from the IRS claiming you owe $7,500 in back taxes. C. from boss with misspellings and weird links. D. Colleague wearing a badge. E. Someone talking loudly on cell phone about company information. F. A mobile phone with a PIN code lock screen. G. Delivery man without identification. H. A zip file labeled zwd459h24.zip sent to you by a name that sounds vaguely familiar. I. from a colleague with a zip file labeled PresentationForMeeting.zip. J. Unmarked USB you found in the break room. K. This password: i@m$3cure@w0rk! L. Colleague who regularly ignores policy. M. This password: admin123. N. A friend request from someone you met at a conference. O. A shredder. P. A piece of paper on your colleague s desk with all of his passwords. Q. A friend request from someone in another country whose name you don t know. SPOT THE INSIDER: Trick question! ALL of these people could be threats to the organization. Whether it s tailgating, unknown USBs, asking for restricted access or an insider gone bad, we must always be on the look out for potential threats in the human domain! HUMAN FIREWALL FILTERING EXERCISE: Filter In - A, D, F, I, K, N, O. Filter Out - B, C, E, G, H, J, L, M, P, Q.
NCS 330. Information Assurance Policies, Ethics and Disaster Recovery. NYC University Polices and Standards 4/15/15.
NCS 330 Information Assurance Policies, Ethics and Disaster Recovery NYC University Polices and Standards 4/15/15 Jess Yanarella Table of Contents: Introduction: Part One: Risk Analysis Threats Vulnerabilities
National Cyber Security Month 2015: Daily Security Awareness Tips
National Cyber Security Month 2015: Daily Security Awareness Tips October 1 New Threats Are Constantly Being Developed. Protect Your Home Computer and Personal Devices by Automatically Installing OS Updates.
Information Security
Information Security A staff guide to the University's Information Systems Security Policy Issued by the IT Security Group on behalf of the University. Information Systems Security Guidelines for Staff
Malware & Botnets. Botnets
- 2 - Malware & Botnets The Internet is a powerful and useful tool, but in the same way that you shouldn t drive without buckling your seat belt or ride a bike without a helmet, you shouldn t venture online
IT Security DO s and DON Ts
For more advice contact: IT Service Centre T: (01332) 59 1234 E: [email protected] Online: http://itservicecentre.derby.ac.uk Version: February 2014 www.derby.ac.uk/its IT Security DO s and DON
How to Identify Phishing E-Mails
How to Identify Phishing E-Mails How to recognize fraudulent emails and avoid being phished. Presented by : Miguel Fra, Falcon IT Services ([email protected]) http://www.falconitservices.com
BSHSI Security Awareness Training
BSHSI Security Awareness Training Originally developed by the Greater New York Hospital Association Edited by the BSHSI Education Team Modified by HSO Security 7/1/2008 1 What is Security? A requirement
Protect Yourself. Who is asking? What information are they asking for? Why do they need it?
Protect Yourself Your home computer serves many purposes: email, shopping, social networking and more. As you surf the Internet, you should be aware of the various ways to protect yourself. Of primary
Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines
Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines 1. Implement anti-virus software An anti-virus program is necessary to protect your computer from malicious programs,
NATIONAL CYBER SECURITY AWARENESS MONTH
NATIONAL CYBER SECURITY AWARENESS MONTH Tip 1: Security is everyone s responsibility. Develop an awareness framework that challenges, educates and empowers your customers and employees to be part of the
Cyber Security. Securing Your Mobile and Online Banking Transactions
Cyber Security Securing Your Mobile and Online Banking Transactions For additional copies or to download this document, please visit: http://msisac.cisecurity.org/resources/guides 2014 Center for Internet
Cybercrime Prevention and Awareness
April, 2014 Cybercrime Prevention and Awareness Basic Security Principles to Help You Better Navigate Through Cyberspace To join conference call dial (305) 433-6663 option 4 PIN # 42014 Presented by: Miguel
Bad Ads Trend Alert: Shining a Light on Tech Support Advertising Scams. May 2014. TrustInAds.org. Keeping people safe from bad online ads
Bad Ads Trend Alert: Shining a Light on Tech Support Advertising Scams May 2014 TrustInAds.org Keeping people safe from bad online ads OVERVIEW Today, even the most tech savvy individuals can find themselves
Safe Practices for Online Banking
November 2012 Follow these guidelines to help protect your information while banking online. At First Entertainment Credit Union, our goal is to provide you with the best all around banking experience.
Internet threats: steps to security for your small business
Internet threats: 7 steps to security for your small business Proactive solutions for small businesses A restaurant offers free WiFi to its patrons. The controller of an accounting firm receives a confidential
Cybersecurity Best Practices
Ten Essential Cybersecurity Best Practices Banking Business Employees Brought to you by: 1 Did you know? One in five small-to-medium-sized companies were the victims of cyber breaches in 2013.1 In 76%
Cyber Security Best Practices
Cyber Security Best Practices 1. Set strong passwords; Do not share them with anyone: They should contain at least three of the five following character classes: o Lower case letters o Upper case letters
Avoiding Malware in Your Dental Practice. 10 Best Practices to Defend Your Data
Avoiding Malware in Your Dental Practice 10 Best Practices to Defend Your Data Avoiding Malware in Your Dental Practice Like most small business owners, you must protect your dental practice s computer
Information Security Training. Jason Belford Jimmy Lummis
Information Security Training Jason Belford Jimmy Lummis Presenters Who are these guys? Jason Belford Principal Information Security Engineer Jimmy Lummis Information Security Policy and Compliance Manager
1. For each of the 25 questions, multiply each question response risk value (1-5) by the number of times it was chosen by the survey takers.
Employee Security Awareness Survey Trenton Bond [email protected] Admin - Version 1.3 Security Awareness One of the most significant security risks that organizations and corporations face today is
Information Security It s Everyone s Responsibility
Information Security It s Everyone s Responsibility Developed By The University of Texas at Dallas (ISO) Purpose of Training As an employee, you are often the first line of defense protecting valuable
2014 Entry Form (Complete one for each entry.) Fill out the entry name exactly as you want it listed in the program.
2014 Entry Form (Complete one for each entry.) Fill out the entry name exactly as you want it listed in the program. Entry Name HFA Submission Contact Phone Email Qualified Entries must be received by
Certified Secure Computer User
Certified Secure Computer User Exam Info Exam Name CSCU (112-12) Exam Credit Towards Certification Certified Secure Computer User (CSCU). Students need to pass the online EC-Council exam to receive the
Infocomm Sec rity is incomplete without U Be aware,
Infocomm Sec rity is incomplete without U Be aware, responsible secure! HACKER Smack that What you can do with these five online security measures... ANTI-VIRUS SCAMS UPDATE FIREWALL PASSWORD [ 2 ] FASTEN
10 Best Practices to Protect Your Network presented by Saalex Information Technology and Citadel Group
10 Best Practices to Protect Your Network presented by Saalex Information Technology and Citadel Group Presented by: Michael Flavin and Stan Stahl Saalex Information Technology Overview Saalex Information
What Spammers Don t Want You To Know About Permanently Blocking Their Vicious E-mails
2000 Linwood Ave Suite 19J Fort Lee, NJ 07024-3012 What Spammers Don t Want You To Know About Permanently Blocking Their Vicious E-mails Following Last Year s Hack Attack At Epsilon, You May Be Overwhelmed
Kaseya White Paper. Endpoint Security. Fighting Cyber Crime with Automated, Centralized Management. www.kaseya.com
Kaseya White Paper Endpoint Security Fighting Cyber Crime with Automated, Centralized Management www.kaseya.com To win the ongoing war against hackers and cyber criminals, IT professionals must do two
INFORMATION SECURITY GUIDE FOR STAFF
INFORMATION SECURITY GUIDE FOR STAFF December 2013 TABLE OF CONTENTS Why is information security so important for you and the university...1 Use strong passwords and keep them safe...2 E-mail use...2 Beware
An Introduction on How to Better Protect Your Computer and Sensitive Data
An Introduction on How to Better Protect Your Computer and Sensitive Data Common Security Problems Computer users who fail to use strong passwords Constant attacks by viruses, worms, key loggers and bots
Computer Security Maintenance Information and Self-Check Activities
Computer Security Maintenance Information and Self-Check Activities Overview Unlike what many people think, computers are not designed to be maintenance free. Just like cars they need routine maintenance.
Avoiding Malware in Your Dental Practice. 10 Best Practices to Defend Your Data
Avoiding Malware in Your Dental Practice 10 Best Practices to Defend Your Data Avoiding Malware in Your Dental Practice Like most small business owners, you must protect your dental practice s computer
How to stay safe online
How to stay safe online Everyone knows about computer viruses...or at least they think they do. Nearly 30 years ago, the first computer virus was written and since then, millions of viruses and other malware
Deter, Detect, Defend
Deter, Detect, Defend Deter Never provide personal information, including social security number, account numbers or passwords over the phone or Internet if you did not initiate the contact Never click
The Increasing Threat of Malware for Android Devices. 6 Ways Hackers Are Stealing Your Private Data and How to Stop Them
The Increasing Threat of Malware for Android Devices 6 Ways Hackers Are Stealing Your Private Data and How to Stop Them INTRODUCTION If you own a smartphone running the Android operating system, like the
Version: 2.0. Effective From: 28/11/2014
Policy No: OP58 Version: 2.0 Name of Policy: Anti Virus Policy Effective From: 28/11/2014 Date Ratified 17/09/2014 Ratified Health Informatics Assurance Committee Review Date 01/09/2016 Sponsor Director
CBI s Corporate Internet Banking Inquiry Services gives you the ability to view account details and transactions anytime, anywhere.
Benefits & Features CBI s Corporate Internet Banking Inquiry Services gives you the ability to view account details and transactions anytime, anywhere. What can I do with Internet Banking? You can inquire
Business ebanking Fraud Prevention Best Practices
Business ebanking Fraud Prevention Best Practices User ID and Password Guidelines Create a strong password with at least 8 characters that includes a combination of mixed case letters, numbers, and special
IT Checklist. for Small Business INFORMATION TECHNOLOGY & MANAGEMENT INTRODUCTION CHECKLIST
INFORMATION TECHNOLOGY & MANAGEMENT IT Checklist INTRODUCTION A small business is unlikely to have a dedicated IT Department or Help Desk. But all the tasks that a large organization requires of its IT
INTERNET & COMPUTER SECURITY March 20, 2010. Scoville Library. [email protected]
INTERNET & COMPUTER SECURITY March 20, 2010 Scoville Library [email protected] Internet: Computer Password strength Phishing Malware Email scams Identity Theft Viruses Windows updates Browser updates Backup
Cyber Security Awareness
Cyber Security Awareness User IDs and Passwords Home Computer Protection Protecting your Information Firewalls Malicious Code Protection Mobile Computing Security Wireless Security Patching Possible Symptoms
Annual HIPAA Security & Information Security Competency
Annual HIPAA Security & Information Security Competency 1 General Information FISO- What is a FISO? Facility Information Security Officer Responsible for the physical protection and recovery of all electronic
Guide to Preventing Social Engineering Fraud
Guide to Preventing Social Engineering Fraud GUIDE TO PREVENTING SOCIAL ENGINEERING FRAUD CONTENTS Social Engineering Fraud Fundamentals and Fraud Strategies... 4 The Psychology of Social Engineering (And
Social Media and Cyber Safety
Social Media and Cyber Safety Presented to the National Association of REALTORS by Andrew Wooten Safety and Security Consultant [email protected] Social Media and Cyber Safety Our instructor today
Online Security Information. Tips for staying safe online
Online Security Information ProCredit Bank is committed to protecting the integrity of your transactions and bank account details. ProCredit Bank therefore uses the latest security software and procedures
Stable and Secure Network Infrastructure Benchmarks
Last updated: March 4, 2014 Stable and Secure Network Infrastructure Benchmarks 501 Commons has developed a list of key benchmarks for maintaining a stable and secure IT Infrastructure for conducting day-to-day
White Paper - Crypto Virus. A guide to protecting your IT
White Paper - Crypto Virus A guide to protecting your IT Contents What is Crypto Virus?... 3 How to protect yourself from Crypto Virus?... 3 Antivirus or Managed Agents... 3 Enhanced Email Services & Extra
Belmont Savings Bank. Are there Hackers at the gate? 2013 Wolf & Company, P.C.
Belmont Savings Bank Are there Hackers at the gate? 2013 Wolf & Company, P.C. MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2013 Wolf & Company, P.C. About Wolf & Company, P.C.
High Speed Internet - User Guide. Welcome to. your world.
High Speed Internet - User Guide Welcome to your world. 1 Welcome to your world :) Thank you for choosing Cogeco High Speed Internet. Welcome to your new High Speed Internet service. When it comes to a
Basic Computer Security Part 2
Basic Computer Security Part 2 Presenter David Schaefer, MBA OCC Manager of Desktop Support Adjunct Security Instructor: Walsh College, Oakland Community College, Lawrence Technology University Welcome
Identity Theft Protection
Identity Theft Protection Email Home EDUCATION on DANGER ZONES Internet Payments Telephone ID theft occurs when someone uses your personal information with out your knowledge to commit fraud. Some terms
NETWORK AND INTERNET SECURITY POLICY STATEMENT
TADCASTER GRAMMAR SCHOOL Toulston, Tadcaster, North Yorkshire. LS24 9NB NETWORK AND INTERNET SECURITY POLICY STATEMENT Written by Steve South November 2003 Discussed with ICT Strategy Group January 2004
Retail/Consumer Client. Internet Banking Awareness and Education Program
Retail/Consumer Client Internet Banking Awareness and Education Program Table of Contents Securing Your Environment... 3 Unsolicited Client Contact... 3 Protecting Your Identity... 3 E-mail Risk... 3 Internet
The Importance of Security Awareness Training
SECURITY The Importance of Security Awareness Training Security Awareness Training provides the knowledge to protect information systems and sensitive data from internal and external threats. Online security
Business Internet Banking / Cash Management Fraud Prevention Best Practices
Business Internet Banking / Cash Management Fraud Prevention Best Practices This document provides fraud prevention best practices that can be used as a training tool to educate new Users within your organization
Desktop and Laptop Security Policy
Desktop and Laptop Security Policy Appendix A Examples of Desktop and Laptop standards and guidelines 1. Implement anti-virus software An anti-virus program is necessary to protect your computer from malicious
Top 10 Tips to Keep Your Small Business Safe
Securing Your Web World Top 10 Tips to Keep Your Small Business Safe Protecting your business against the latest Web threats has become an incredibly complicated task. The consequences of external attacks,
Common Cyber Threats. Common cyber threats include:
Common Cyber Threats: and Common Cyber Threats... 2 Phishing and Spear Phishing... 3... 3... 4 Malicious Code... 5... 5... 5 Weak and Default Passwords... 6... 6... 6 Unpatched or Outdated Software Vulnerabilities...
AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com
AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS ftrsecure.com Can You Separate Myths From Facts? Many Internet myths still persist that could leave you vulnerable to internet crimes. Check out
Internet Security Protecting Your Business. Hayden Johnston & Rik Perry WYSCOM
Internet Security Protecting Your Business Hayden Johnston & Rik Perry WYSCOM Introduction Protecting Your Network Securing Your Information Standards & Best Practices Tools & Options Into The Future Creating
Learn to protect yourself from Identity Theft. First National Bank can help.
Learn to protect yourself from Identity Theft. First National Bank can help. Your identity is one of the most valuable things you own. It s important to keep your identity from being stolen by someone
How to Deploy the Survey Below are some ideas and elements to consider when deploying this survey.
SECURITY AWARENESS SURVEY Is a survey necessary A survey will give you insight into information security awareness within your company. The industry has increasingly realized that people are at least as
Preparing Your Personal Computer to Connect to the VPN
Preparing Your Personal Computer to Connect to the VPN (Protecting Your Personal Computer Running Windows) Using the VPN to connect your computer to the campus network is the same as bringing your computer
The following information was provided by SANS and discusses IT Security Awareness. It was last updated in 2015.
The following information was provided by SANS and discusses IT Security Awareness. It was last updated in 2015. By completing this module and the quiz, you will receive credit for CW 170, which is required
Chapter 8: Security Measures Test your knowledge
Security Equipment Chapter 8: Security Measures Test your knowledge 1. How does biometric security differ from using password security? Biometric security is the use of human physical characteristics (such
October Is National Cyber Security Awareness Month!
(0 West Virginia Executive Branch Privacy Tip October Is National Cyber Security Awareness Month! In recognition of National Cyber Security Month, we are supplying tips to keep you safe in your work life
NC DPH: Computer Security Basic Awareness Training
NC DPH: Computer Security Basic Awareness Training Introduction and Training Objective Our roles in the Division of Public Health (DPH) require us to utilize our computer resources in a manner that protects
Online Security Awareness - UAE Exchange - Foreign Exchange Send Money UAE Exchange
The responsibility of safeguarding your personal information starts with you. Your information is critical and it must be protected from unauthorised disclosure, modification or destruction. Here we are
Cybercrime and Identity Theft: Awareness and Protection 2015 HLC Conference
Cybercrime and Identity Theft: Awareness and Protection 2015 HLC Conference Christopher T. Van Marter Senior Deputy Prosecuting Attorney Chief White Collar Crime Unit Department of the Prosecuting Attorney
HIPAA and Health Information Privacy and Security
HIPAA and Health Information Privacy and Security Revised 7/2014 What Is HIPAA? H Health I Insurance P Portability & A Accountability A - Act HIPAA Privacy and Security Rules were passed to protect patient
IDENTITY & ACCESS. Privileged Identity Management. controlling access without compromising convenience
IDENTITY & ACCESS Privileged Identity Management controlling access without compromising convenience Introduction According to a recent Ponemon Institute study, mistakes made by people Privilege abuse
Computing Services Information Security Office. Security 101
Computing Services Information Security Office Security 101 Definition of Information Security Information security is the protection of information and systems from unauthorized access, disclosure, modification,
HIPAA Security Training Manual
HIPAA Security Training Manual The final HIPAA Security Rule for Montrose Memorial Hospital went into effect in February 2005. The Security Rule includes 3 categories of compliance; Administrative Safeguards,
Section 12 MUST BE COMPLETED BY: 4/22
Test Out Online Lesson 12 Schedule Section 12 MUST BE COMPLETED BY: 4/22 Section 12.1: Best Practices This section discusses the following security best practices: Implement the Principle of Least Privilege
WEB ATTACKS AND COUNTERMEASURES
WEB ATTACKS AND COUNTERMEASURES February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in
Jumpstarting Your Security Awareness Program
Jumpstarting Your Security Awareness Program Michael Holcomb Director, Information Security HO20110473 1 Jumpstarting Your Security Awareness Program Classification: Confidential Owner: Michael Holcomb
Activities for Protecting Your Identity and Computer for Middle and High School Students
Activities for Protecting Your Identity and Computer for Middle and High School Students Overview There are three posters about protecting your computer for this grade span. We recommend that these be
ONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS
$ ONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS Boston Private Bank & Trust Company takes great care to safeguard the security of your Online Banking transactions. In addition to our robust security
Know the Risks. Protect Yourself. Protect Your Business.
Protect while you connect. Know the Risks. Protect Yourself. Protect Your Business. GETCYBERSAFE TIPS FOR S MALL AND MEDIUM BUSINESSES If you re like most small or medium businesses in Canada, the Internet
