Computer Security. Do s and Don ts for Connecticut College staff and faculty. v.1.0

Similar documents
CYBER-SAFETY BASICS. A computer security tutorial for UC Davis students, faculty and staff

AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION PROGRAM UNIT FIVE. Microsoft Windows Security.

CYBER-SAFETY. A computer security tutorial for UC Davis students, faculty and staff

CBI s Corporate Internet Banking Inquiry Services gives you the ability to view account details and transactions anytime, anywhere.

Getting Connected. Student Technology Services

Quick Start Guide to Logging in to Online Banking

Getting Started with a Mac For businesses with a Windows Server

1. Any requesting personal information, or asking you to verify an account, is usually a scam... even if it looks authentic.

INTERNET & COMPUTER SECURITY March 20, Scoville Library. ccayne@biblio.org

Internet basics 2.3 Protecting your computer

BCS IT User Syllabus IT Security for Users Level 2. Version 1.0

Accessing Restricted University Online Resources Using Network Connect. on the Secure Remote Access Service

Best Practices Guide to Electronic Banking

Introduction to WSU

What you need to know to keep your computer safe on the Internet

How To Protect Yourself Online

Desktop and Laptop Security Policy

Information Security. Louis Morgan, CISSP Information Security Officer

How To Use Secureanything On A Mac Or Ipad (For A Mac)

Deutsche Bank db easynet. Secure method of use of the db easynet e-banking system

avast! Free Antivirus for Mac Quick Start Guide avast! Free Antivirus for Mac Quick Start Guide

Student Affairs Information Technology Policies. January 2013

Safe Practices for Online Banking

Contents. McAfee Internet Security 3

ONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS

Paul Nguyen CSG Interna0onal

Why you need. McAfee. Multi Acess PARTNER SERVICES

High Speed Internet - User Guide. Welcome to. your world.

General tips for increasing the security of using First Investment Bank's internet banking

About This Guide. Security considerations are denoted by a lock icon.

Quick Start Guide. www. K7Computing.com

ViRobot Desktop 5.5. User s Guide

Computer Security Basics For UW-Madison Emeritus Faculty and Staff Oakwood Village University Woods September 17, 2014

How To Sync Google Drive On A Mac Computer With A Gmail Account On A Gcd (For A Student) On A Pc Or Mac Or Mac (For An Older Person) On An Ipad Or Ipad (For Older People) On

Back to My Mac User s Guide

National Cyber Security Month 2015: Daily Security Awareness Tips

Instructions For Opening UHA Encrypted

Mac OS X. Staff members using NEIU issued laptops and computers on Active Directory can access NEIU resources that are available on the wired network.

Certified Secure Computer User

Massey University Wireless Network Client Configuration Mac OS X

Online Banking Fraud Prevention Recommendations and Best Practices

Office of Information Technology Desktop Security and Best Practices

Norton Personal Firewall for Macintosh

Antivirus. Quick Start Guide. Antivirus

Retail/Consumer Client. Internet Banking Awareness and Education Program

Internet Basics. Meg Wempe, Adult Services Librarian ABOUT THIS CLASS. P a g e 1

Frequently Asked Questions

Malware & Botnets. Botnets

Basic PC Maintenance. Instructors. Action Center

10 Simple Computer Maintenance Tips For The Laptop

estatement Consent and Disclosure Agreement (Agreement to Receive or Access

Networking in the Colleges

Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning

Think Before You Click. UH Information Security Team

Florida National University Online Courses Platform

Computer and Information Security End User Questionnaire

INFORMATION SECURITY BASICS. A computer security tutorial for Holyoke Community College

VPN Overview. The path for wireless VPN users

PROTECT YOUR COMPUTER AND YOUR PRIVACY!

TCC INTERNET. Setup and Configuration. Comtrend DSL Modem with built-in Wireless Router

Defense Media Activity Guide To Keeping Your Social Media Accounts Secure

Welcome To The L.R.F.H.S. Computer Group Wednesday 27 th November 2013

Johns Hopkins

Reliance Bank Fraud Prevention Best Practices

Junos Pulse VPN Client Installation

Pendragon Forms Industrial

GENERAL TRAINING ACCOUNTS

MacScan. MacScan User Guide. Detect, Isolate and Remove Spyware

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

McAfee Internet Security Suite Quick-Start Guide

Know the Risks. Protect Yourself. Protect Your Business.

Data Backup Procedure for Mac Users (Mac OS 10.4)

Student Home

Back Up Data On Network Drive For MAC OS X

Welcome to the UVU IT Help Desk

Computing From Home. How to Access Rowan Network Resources When you Are Not On Campus. Marc Fleischner Network and System Services

THE. solution. STORe it. SHARE it.

Quick Start. Installing the software. for Webroot Internet Security Complete, Version 7.0

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com

Cyber Security Awareness

HomeNet. Gateway User Guide

Basic Citrix Manual. Apple Computers and Laptops. Version 1.3. Created by Joshua Lindemann

Verizon Internet Security Suite Powered by McAfee User Guide

Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012

2.8.1 Creating an Acronis account Subscription to Acronis Cloud Creating bootable rescue media... 16

Instructions for use the VPN at the Warsaw School of Economics

Back to My Mac User s Guide

Policy for Staff and Post 16 Student BYOD (Bring Your Own Device)

How To Manage A Network Safely

How To Install A Cisco Vpn Client V4.9.9 On A Mac Or Ipad (For A University)

isupplygw Site Login Troubleshooting

Law College Computer and Technology Information

Student Tech Security Training. ITS Security Office

HWS Virtual Private Network Configuration and Setup Mac OS X 12/19/2006

Computer Network and Internet Security Awareness and Responsible Use. Indian River County School District

Cyber Security: Beginners Guide to Firewalls

Preparing Your Personal Computer to Connect to the VPN

Learn to protect yourself from Identity Theft. First National Bank can help.

Setting Up on Your Palm. Treo 700wx Smartphone

BlackBerry Web Desktop Manager. Version: 5.0 Service Pack: 4. User Guide

Transcription:

Computer Security Do s and Don ts for Connecticut College staff and faculty v.1.0 1

Objective To ensure that users are aware of information security threats and concerns, and are equipped to support organizational security policy in the course of their normal work. -ISO 17799/BS 7799 code of practice 2

Why is this training mandatory Compliance with recent legislation regarding the handling of sensitive personal information* Many of us deal with sensitive/ confidential information The Internet is a dangerous place Computer software is vulnerable Identity theft is a serious problem *Failure to comply with this can result in legal and or financial repercussions to the college or employee 3

Things To Worry About Is my data secure? Is my computer secure? Is the network that you re using secure? 4

What Are The Threats? Lost/Stolen Computer Hackers, identity thieves Viruses, Worms, Trojan Horses Keystroke Loggers Spyware and Adware Data Interception Wired and Wireless Spam/Phishing emails 5

What Are The Key Concerns? Any computer connected to another computer Computers left unsecured and unattended Notebook computers can be lost/stolen 6

Vulnerability When Connected To A Network Internet via Cable modem, DSL or dialup modem Wireless access in cafes, hotels, airports Local network Direct connection to another computer 7

What Can Be Done? The following 10 tips should be used to protect valuable data for both you and the college 8

Keep Software Up-To-Date (Windows) Run Windows update through Internet Explorer Automatic update notification - run Microsoft Updates when notified (lower right hand side corner - yellow shield with exclamation mark Search for available updates using: http://www.windowsupdate.microsoft.com Tip 1 for protecting data 9

Keep Software Up-To-Date (Apple) Mac OS X & Apple Applications Automatic updates enabled in System Preferences Microsoft Office & Adobe applications Automatic update notification Enable automatic version checking in other applications when available Easy search for available updates using: http://www.versiontracker.com/ http://www.macupdate.com/ Tip 1 continued for protecting data 10

Always Run Anti-Virus Software (Windows) Symantec Anti-virus software installed Virus definitions are kept up-to-date by via an automatic update while on campus network Manual update via Symantec Shield - LIVE UPDATE Tip 2 for protecting data 11

Always Run Anti-Virus Software (Apple) Symantec Anti-virus software installed Virus definitions are kept up-to-date by via a scheduled daily update (@ 12:00pm) Hard drives scanned on a regular schedule (user directory every day @ 12:15pm, entire hard drive every Friday @ 12:30pm) Use Symantec Scheduler (via menu bar icon) to adjust schedule if not convenient Tip 2 continued for protecting data 12

Use Personal Firewall Software and VPN (Apple) Firewall built-in to OS X, located in the Sharing pane of System Preferences Already turned on for new Macs and Windows machines on campus Minimize open ports (Apple) Ports automatically opened in OS X when services turned on in Sharing pane in System Preferences Tip 3 for protecting data 13

Use Strong Passwords Password complexity Uppercase, lowercase, numbers & symbols Password expiration Passwords expire after 180 days Warning via email 14 days before it expires Only Help Desk can change it after expiration Password history Can t reuse your last 3 passwords Tip 4 for protecting data 14

Password Guidelines Minimum password length At least 7 characters for any network password Never share your password Change password after working with a technician or any IS staff who has been in contact with your machine. (Apple) Use OS X keychain to store passwords. Make sure to choose a very secure password for your OS X keychain Tip 4 continued for protecting data 15

Beware of Password Phishing Information Services will never ask for your password in an email message Emails that ask for your email account password or that warn you that your email account is over quota and provided a link for you to log in to your email account are phishing attempts even if they appear to have been sent by the college s network services Tip 5 for protecting data 16

Protect Notebook Computers Locks, cables and alarms Not in checked luggage Inconspicuous carrying case Don t leave notebook unattended Tip 6 for protecting data 17

Protect Personal Information* Confidential data Non-public financial information Protected health information Private educational records Usernames and passwords *"Personal Information" means information capable of being associated with a particular individual through one or more identifiers, including, but not limited to, a Social Security number, a driver's license number, a state identification card number, an account number, a credit or debit card number, a passport number, an alien registration number or a health insurance identification number, and does not include publicly available information that is lawfully made available to the general public from federal, state or local government records or widely distributed media Tip 7 for protecting data 18

Use Encryption Both Apple and Windows machines offer built in encryption tools, please contact the Help Desk at ext. 4357 to arrange for assistance in this area IS strongly encourages users to use encryption for any sensitive data that must reside on a computer Tip 8 for protecting data 19

Back Up Your Data Users are responsible for data backups (Apple) OS X 10.5 and later includes Time Machine backup software (Windows) Users can manually backup data as needed Methods of back up include: CD, DVD, USB drive, network storage IS strongly recommends that users DO NOT store confidential data of any kind on their computer. Tip 9 for protecting data 20

Beware of copyright laws Illegal File Sharing It s this simple: it is a federal crime to distribute or download copyrighted music, movies or software on the Internet without permission from the copyright owner. The RIAA (Recording Industry Association of America) continues to search peer-to-peer (P2P) networks such as Limewire, BitTorrent and Ares in its efforts to identify illegal file sharing activity and seek compensation for its clients in the music industry. You are not anonymous when using P2P file sharing sites! http://www.conncoll.edu/libraries/policies/mediadownloadpolicy.html http://www.conncoll.edu/libraries/policies/copyright.html?tm=102055471 http://www.conncoll.edu/libraries/policies/employeecopyright.html?tm=102507543 Members of the campus community are advised to become as knowledgeable as possible regarding copyright and fair use as it pertains to their discipline. Connecticut College does not accept legal responsibility for copyright infringement by individual members of the College community. Individuals who willfully disregard College policy and guidelines do so at their own risk and assume all liability. Tip 10 for protecting data 21

Overview of what can be done Keep software up-to-date Always run antivirus software Use personal firewall software Use strong passwords Beware of Phishing attempts Protect notebooks when traveling Protect Personal/Confidential Data Encrypt sensitive files and folders Back up your data files Follow and be aware of Copyright laws Top 10 Tips to remember for Protecting Your Data 22

Other things you should do to secure Your Computer Require a password to log in, wake from sleep or wake from screen saver Put computer to sleep or lock the computer when walking away 23

Use care with Email and Instant Messaging Never send sensitive information without encryption Be very cautious before clicking on links Check configuration settings for unnecessary or unsecure features Turn off file sharing features 24

Web Browsing and Software Downloading Keep your web browser up-to-date Safari, Firefox and Chrome web browsers all use Google s malware database to alert you to bad sites and support Extended Validation (EV) Certificates Campus Macs are configured to handle all common video formats No need for Windows Media Player or extra codecs Only download files from trusted sources Watch installations for optional applications Pay attention to requests for your to enter your administrator password 25

Questions? Contact the Help Desk Basement of Shain Library x4357 help@conncoll.edu AIM: camelcomphelp 26

Send Us Your Feedback Email mcdre@conncoll.edu (Apple) kjdim@conncoll.edu (Windows) Send an anonymous note to: Attn: Kevin DiMinno or Mike Dreimiller - Hamilton Basement 27

This has been a presentation of Information Services 28