Information Security. Louis Morgan, CISSP Information Security Officer

Similar documents
October is Cyber Security Month

Security Tips You are here: Home» Security Tips

Business ebanking Fraud Prevention Best Practices

BCS IT User Syllabus IT Security for Users Level 2. Version 1.0

OCT Training & Technology Solutions Training@qc.cuny.edu (718)

ONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS

Reliance Bank Fraud Prevention Best Practices

Business Internet Banking / Cash Management Fraud Prevention Best Practices

Safe Practices for Online Banking

Retail/Consumer Client. Internet Banking Awareness and Education Program

Common Cyber Threats. Common cyber threats include:

Online Banking Fraud Prevention Recommendations and Best Practices

Customer Awareness for Security and Fraud Prevention

Mifflinburg Bank & Trust. Corporate Account Takeover & Information Security Awareness

An Introduction on How to Better Protect Your Computer and Sensitive Data

Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning

Why is a strong password important?

Identity Theft Protection

OKPAY guides. Security Guide

Corporate Account Takeover & Information Security Awareness

How to stay safe online

THE HOME LOAN SAVINGS BANK. Corporate Account Takeover & Information Security Awareness

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security

Online Security Awareness - UAE Exchange - Foreign Exchange Send Money UAE Exchange

Corporate Account Takeover & Information Security Awareness. Customer Training

INTERNET & COMPUTER SECURITY March 20, Scoville Library. ccayne@biblio.org

Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines

Information Security It s Everyone s Responsibility

Internet basics 2.3 Protecting your computer

TRAINING FOR AMERICAN MOMENTUM BANK CLIENTS. Corporate Account Takeover & Information Security Awareness

The information contained in this session may contain privileged and confidential information. This presentation is for information purposes only.

Secure FAQs for External Stakeholders

Information Security Guide for Students

CBI s Corporate Internet Banking Inquiry Services gives you the ability to view account details and transactions anytime, anywhere.

BE SAFE ONLINE: Lesson Plan

Multi-Factor Authentication (FMA) A new security feature for Home Banking. Frequently Asked Questions 8/17/2006

Learn to protect yourself from Identity Theft. First National Bank can help.

Infocomm Sec rity is incomplete without U Be aware,

Information Security

Remote Deposit Quick Start Guide

1. Any requesting personal information, or asking you to verify an account, is usually a scam... even if it looks authentic.

Protect yourself online

Protection from Fraud and Identity Theft

PROTECT YOUR COMPUTER AND YOUR PRIVACY!

Essentials of PC Security: Central Library Tech Center Evansville Vanderburgh Public Library

Safety& Security Tips

Information Security Threat Trends

Corporate Account Takeover & Information Security Awareness

Keeping you and your computer safe in the digital world.

Spyware. Michael Glenn Technology Management 2004 Qwest Communications International Inc.

Protect Yourself. Who is asking? What information are they asking for? Why do they need it?

Desktop and Laptop Security Policy

When you listen to the news, you hear about many different forms of computer infection(s). The most common are:

Protecting your business from fraud

Recognizing Spam. IT Computer Technical Support Newsletter

HIPAA Training Part III. Health Insurance Portability and Accountability Act

National Cyber Security Month 2015: Daily Security Awareness Tips

Don t Fall Victim to Cybercrime:

Information Security Awareness

Think Before You Click. UH Information Security Team

ORU IT Oral Roberts University Information Technology Student Guide

Computer Network and Internet Security Awareness and Responsible Use. Indian River County School District

Welcome To The L.R.F.H.S. Computer Group Wednesday 27 th November 2013

Best Practices Guide to Electronic Banking

Tips for Banking Online Safely

PREVENTING HIGH-TECH IDENTITY THEFT

Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:

How to Identify Phishing s

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

INFOCOMM SEC RITY. is INCOMPLETE WITHOUT. Be aware, responsible. secure!

Cyber Security Awareness

Barracuda Security Service User Guide

Malware, Spyware, Adware, Viruses. Gracie White, Scott Black Information Technology Services

IT Service Desk

10 Things You Need to Know About Internet Security

THE OPEN UNIVERSITY OF TANZANIA INSTITUTE OF EDUCATIONAL AND MANAGEMENT TECHNOLOGIES. ICT security procedures for staff

Online Banking Customer Awareness and Education Program

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com

Appendix A. 1 Copyright 2012, Oracle and/or its affiliates. All rights reserved.

TMCEC CYBER SECURITY TRAINING

REGION 19 HEAD START. Acceptable Use Policy

Statistical Analysis of Internet Security Threats. Daniel G. James

Protecting Yourself from Identity Theft

Spyware: Securing gateway and endpoint against data theft

& INTERNET FRAUD

SHS Annual Information Security Training

Fraud Detection and Prevention. Timothy P. Minahan Vice President Government Banking TD Bank

Stopping zombies, botnets and other - and web-borne threats

FILTERING FAQ

Cyber Security Survival Guide

Deter, Detect, Defend

Advice about online security

AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION PROGRAM UNIT FIVE. Microsoft Windows Security.


OIG Fraud Alert Phishing

This guide will go through the common ways that a user can make their computer more secure.

Internet Security Protecting Your Business. Hayden Johnston & Rik Perry WYSCOM

Cybersecurity Best Practices

Joomla Admin Protection

The Importance of Security Awareness Training

Transcription:

Information Security By Louis Morgan, CISSP Information Security Officer

Why Bother with IT Security? Recent estimate - 900 million personal computers worldwide. Computer hackers are out there. How long do you think an unprotected PC will remain uninfected after it is connected to the internet?

Responsible Computing @ PVAMU Since you're using PVAMU computing resources, you're obligated to: Abide by PVAMU s University Rules, Information Security Standards, and all relevant local, state, and federal laws. Protect your computing account(s). For example: Log out of sites that require authentication and log off of shared computers such as those in Open Access Labs.

Responsible Computing @ PVAMU Don't: Let someone use your account (e.g., log-in as "you ). Use PVAMU computing resources for illegal purposes, or commercial activities.

Password - First Line of Defense Passwords, in combination with a username, help authenticate users. They are the first line of defense against unauthorized access to your computing devices and your accounts. Therefore, it is important that you create strong passwords and keep them secure from disclosure.

Creating Strong Passwords Strong Passwords Should Contain: At least 2 upper case letters (A-Z) At least 2 lower case letters (a-z) At least 2 numbers (one of which is NOT the first or last character of the password) At least 2 special characters (*$#-^) At least 8 characters

Password Example Think of a phrase or sentence that's easy for you to remember. Such as Look before you leap Lb4u!3@P

Protecting Your Passwords Don't allow websites or Internet Browsers to "remember" your passwords. Use caution when typing in a password in public, someone may be watching. Change your password when you suspect that someone else may know it.

Portable Device Security Keep track of your portable device(s), especially those flash drives. Don't leave your laptop (or other portable device) lying around or unattended in public areas; and store it in a safe place (out of sight) when you're not using it.

Protecting Your Data with Encryption You can encrypt: Files Folders USB/Flash Drives Email Attachments Images Videos Hard Drives and more... For more information see PVAMU encryption training

Backing Up Your Data Back up anything that's important to you. Papers/essays, Projects, Research data, Pictures, Music files, and more... Methods: Save the file to your share drive. Save the file on a CD/DVD, flash drive, etc.

Malware Malware is software designed to infiltrate and/or damage a computer system. The most common forms of malware are: Viruses and Worms Trojan Horses, Root kits, Backdoors Spyware

Web Threats How can you avoid online threats? Watch out for "phishy" emails. Beware of fraudulent ("spoofed") websites. Seeing spam pop-ups or ads? Click with caution.

Beware of Fraudulent Sites Pharming, a form of phishing, is becoming one of the most popular forms of web attack. Just by typing in a URL and visiting a website, you could be directed to a fraudulent site. Before disclosing any personal information online, check the website certificate to make sure you're not at a fraudulent site. Open the website certificate. Make sure the name following "Issued to" matches the site you think you're on.

To click, or not to click? Web threats come in various forms, and understandably some are more obvious than others. Phishing attacks and pop-up downloads are easier to detect and protect against than pharming attacks and drive-by downloads, however one thing that will assist in avoiding these threats is paying attention to what you click on. Don't click on: Pop-ups or spam mail. Links within email that ask for your personal information.

If You Are Still Unsure Contact the supposed/claimed sender (e.g., your bank or credit card company) using the contact information on the company's official website. Never respond to an email requesting your password, username, Social Security number, credit/debit card number, or other personal information, no matter how official it looks.

5 Ways to Protect Your Computer Patches/Updates Anti-Virus Software Personal Firewall - Install a third-party 'bidirectional' firewall (one that protects against inbound and outbound threats) Anti-Spyware - Install an anti-spyware program, Caution: Free Downloads - Download only from trusted websites (e.g., Download.com)

File Sharing & Copyright Law (DMCA)* Be aware that file-sharing can: Expose your computer to malware Accidentally expose personal/confidential information Lead to copyright infringement Keep in mind... your online activity is not anonymous and it is traceable * The Digital Millennium Copyright Act

THINK BEFORE YOU CLICK!

QUESTIONS?

Contact Information Louis Morgan lamorgan@pvamu.edu 936-261-2126