IT Security DO s and DON Ts



Similar documents
National Cyber Security Month 2015: Daily Security Awareness Tips

ENISA s ten security awareness good practices July 09

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com

How to stay safe online

The following information was provided by SANS and discusses IT Security Awareness. It was last updated in 2015.

How to Encrypt Files Containing Sensitive Data (using 7zip software or Microsoft password protection) How to Create Strong Passwords

Protect Yourself. Who is asking? What information are they asking for? Why do they need it?

Information Security

Malware & Botnets. Botnets

Information Security. Annual Education Information Security Mission Health System, Inc.

Safe Practices for Online Banking

Learn to protect yourself from Identity Theft. First National Bank can help.

A Guide to Information Technology Security in Trinity College Dublin

Avoiding Malware in Your Dental Practice. 10 Best Practices to Defend Your Data

Avoiding Malware in Your Dental Practice. 10 Best Practices to Defend Your Data

+GAMES. Information Security Advisor. Be a Human Firewall! The Human Firewall' s Top Concerns in the Cyber, People & Physical Domains

Security Awareness. A Supplier Guide/Employee Training Pack. May 2011 (updated November 2011)

Infocomm Sec rity is incomplete without U Be aware,

WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY

10 Quick Tips to Mobile Security

Protecting Yourself from Identity Theft

INFORMATION SECURITY GUIDE FOR STAFF

SBA Cybersecurity for Small Businesses. 1.1 Introduction. 1.2 Course Objectives. 1.3 Course Topics

Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines

BSHSI Security Awareness Training

Advice about online security

Helping you to protect yourself against fraud and financial crime

Information Security Code of Conduct

Protecting your business from fraud

SMALL BUSINESS IT SECURITY PRACTICAL GUIDE

October Is National Cyber Security Awareness Month!

How-To Guide: Cyber Security. Content Provided by

& INTERNET FRAUD

Egress Switch Best Practice Security Guide V4.x

How To Protect Your Information From Being Hacked By A Hacker

INFORMATION SECURITY BASICS. A computer security tutorial for Holyoke Community College

PREVENTING HIGH-TECH IDENTITY THEFT

Cyber Security. Securing Your Mobile and Online Banking Transactions

INTERNET & COMPUTER SECURITY March 20, Scoville Library. ccayne@biblio.org

Small businesses: What you need to know about cyber security

Cybersecurity Best Practices

10 Things You Need to Know About Internet Security

STOP. THINK. CONNECT. Online Safety Quiz

When you are prompted to enroll, you will be asked to enter a Security Phrase and select/answer three different Challenge Questions.

Identity Theft. Protecting Yourself and Your Identity. Course objectives learn about:

1. Any requesting personal information, or asking you to verify an account, is usually a scam... even if it looks authentic.

References NYS Office of Cyber Security and Critical Infrastructure Coordination Best Practices and Assessment Tools for the Household

SMALL BUSINESS IT SECURITY PRACTICAL GUIDE

Cyber Security: Beginners Guide to Firewalls

Acceptable Use of ICT Policy. Staff Policy

Identity Theft Protection

NATIONAL CYBER SECURITY AWARENESS MONTH

Cyber Security Beginners Guide to Firewalls A Non-Technical Guide

Small businesses: What you need to know about cyber security

NCS 330. Information Assurance Policies, Ethics and Disaster Recovery. NYC University Polices and Standards 4/15/15.

1. For each of the 25 questions, multiply each question response risk value (1-5) by the number of times it was chosen by the survey takers.

THE LITTLE BIG BOOK OF BADNESS

Intercepting your mail. They can complete change of address forms and receive mail that s intended for you.

INFORMATION SECURITY GUIDE. Employee Teleworking. Information Security Unit. Information Technology Services (ITS) July 2013

Don t Click That Link and other security tips. Laura Perry Jennifer Speegle Mike Trice

Identity Theft Protection

Cyber Security Awareness

Many of these tips are just common sense and others are tips to keep in mind when doing a transaction, at ATMs, restaurants and merchants.

Appendix A. 1 Copyright 2012, Oracle and/or its affiliates. All rights reserved.

NETWORK AND INTERNET SECURITY POLICY STATEMENT

Class 3: Identify Tricks and Scams Online

CYBERSECURITY POLICY

Your Digital Dollars Online & Mobile Banking

Perception and knowledge of IT threats: the consumer s point of view

Reduce your Risk of Credit Card & Identity Fraud

Information Security Guide for Students

Top 10 Tips to Keep Your Small Business Safe

Online Fraud and Identity Theft Guide. A Guide to Protecting Your Identity and Accounts

CBI s Corporate Internet Banking Inquiry Services gives you the ability to view account details and transactions anytime, anywhere.

What are the common online dangers?

Protect yourself online

CYBER-SAFETY BASICS. A computer security tutorial for UC Davis students, faculty and staff

Basic Computer Security Part 2

Security Breaches. There are unscrupulous individuals, like identity thieves, who want your information to commit fraud.

Senaca Shield Presents 10 Top Tip For Small Business Cyber Security

When registering on a jobsite, first ensure that the site is reputable and has a physical address and landline phone number.

Acceptable Use Guidelines

How To Protect Yourself Online

PROTECT YOURSELF AND YOUR IDENTITY. Chase Identity Theft Tool Kit

Working Practices for Protecting Electronic Information

Transcription:

For more advice contact: IT Service Centre T: (01332) 59 1234 E: ITServiceCentre@derby.ac.uk Online: http://itservicecentre.derby.ac.uk Version: February 2014 www.derby.ac.uk/its IT Security DO s and DON Ts What to do What not to do What to look out for What to report How to stay secure www.derby.ac.uk/its

IT Security DO s and DONT s 1 Security is the responsibility of us all Follow the tips in this handbook and you ll be helping to keep yourself, your colleagues and our University safe. Security sets us free to do what we do best. It s simple, and mostly common sense. An ongoing threat Computers are here to stay, and that means threats are here to stay too. So this top 10 list will change over time as we encounter and overcome new threats. Keep an eye out for updates to the IT Security DO s and DONT s Employee Handbook so you don t accidentally put yourself and our business in a compromised position. Make sure you let your family and friends know what to do too, so they re safe online.

2 IT Security DO s and DONT s 3 1. Don t be tricked into giving away confidential information Don t respond to emails or phone calls requesting confidential company information - including employee information, student information or company secrets. It s easy for an unauthorised person to call us and pretend to be an employee or one of our business partners. Stay on guard to avoid falling for this scam, and report any suspicious activity to IT Services. Protect your personal information just as closely.

4 IT Security DO s and DONT s 5 2. Don t use an unprotected computer When you access sensitive information from a non-secure computer, like one in an Internet cafe or a shared machine at home, you put the information you re viewing at risk. 3. Don t leave sensitive info lying around the office Don t leave printouts containing private information on your desk. Lock them in a drawer or shred them. It s easy for a visitor to glance down at your desk and see sensitive documents. 4. Lock your computer and mobile phone when not in use Always lock your computer and mobile phone when you re not using them. You work on important things, and we want to make sure they stay safe and secure. Make sure your computer is running the latest approved security software, anti-virus and firewall. Keep your desk tidy and documents locked away. It makes the office look more organised, and reduces the risk of information leaks. Locking your phone and computer keeps your data and contacts safe from prying eyes.

6 IT Security DO s and DONT s 7 5. Stay alert and report suspicious activity Always report any suspicious activity to IT Services. Part of our job is to stop cyber-attacks and to make sure our data isn t lost or stolen. 6. Always use encrypted and password protected devices Losing items like phones, USB flash drives and laptops can happen to anyone. Encrypting and protecting your devices with strong passwords means you make it incredibly difficult for someone to break in and steal data. Keeping our information safe depends on everyone being vigilant. In case something goes wrong, the faster we know about it, the faster we can deal with it. Only carry the data you need on your device and if your device has password protection on it - use it!

8 IT Security DO s and DONT s 9 7. Always use hard-toguess passwords Don t use obvious passwords, like password, cat, or obvious character sequences on the qwerty keyboard, like asdfg and 12345. It s better to use complex passwords. Include different letter cases, numbers and even punctuation. Use different passwords for different websites and computers. So if one gets hacked, your other accounts aren t compromised.

10 IT Security DO s and DONT s 11 8. Be cautious of suspicious emails and links Always delete suspicious emails and links. Even opening or viewing these emails and links can compromise your computer and create unwanted problems without your knowledge. Remember, if something looks too good to be true, it probably is. Don t let curiosity get the better of you.

12 IT Security DO s and DONT s 13 9. Don t plug in personal devices without the OK from IT Services Don t plug in personal devices like USB flash drives, MP3 players and smart phones without permission from IT. These devices can be compromised with code waiting to launch as soon as you plug them into a computer. 10. Don t install unauthorised programs on your work computer Malicious applications often pose as legitimate programs, like games, tools or even anti-virus software. They aim to fool you into infecting your computer or network. Talk to IT Services about your devices and let us make the call. If you like an application and think it will be useful, contact IT Services to look into it for you before installing.