IM Aware Session Email March 12, 2015. Panel Members



Similar documents
Strategy for Management in Canadian Jurisdictions

Polar Help Desk 4.1. User s Guide

Monitoring and Logging Policy. Document Status. Security Classification. Level 1 - PUBLIC. Version 1.0. Approval. Review By June 2012

Encrypting*a*Windows*7*Hard*Disk* with%bitlocker%disk%encryption!

ONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS

CJIS Online Security Awareness Training. TAC Guide

Directory of Personal Information Banks. Collection Tool Instructions

Information Security It s Everyone s Responsibility

BE SAFE ONLINE: Lesson Plan

Policy. London School of Economics & Political Science. Remote Access Policy. IT Services. Jethro Perkins. Information Security Manager.

Encrypted Users Guide. Revised 6/8/2015

Why you need. McAfee. Multi Acess PARTNER SERVICES

Information Security It s Everyone s Responsibility

Know the Risks. Protect Yourself. Protect Your Business.

Network Security for End Users in Health Care

MOBILE DEVICE SECURITY POLICY

PaperClip. em4 Cloud Client. Setup Guide

Information Management

HOW TO SAVE AND FILE LOTUS NOTES S

Perspectives on Cybersecurity in Healthcare June 2015

+GAMES. Information Security Advisor. Be a Human Firewall! The Human Firewall' s Top Concerns in the Cyber, People & Physical Domains

IT Security Standard: Patch Management

- Training. Getting Started with Outlook Information Technology Services - Training The University of Texas at Austin

Procedures on Data Security Breach Management Version Control Date Version Reason Owner Author 16/09/2009 Draft 1 Outline Draft Jackie Groom

Remote Deposit Quick Start Guide

Data Protection Policy. Information Security Review Group. Version Date Author Notes on Revisions

WEBTIME CLEARING HOUSE Version 7.1.4

Internet Basics. Meg Wempe, Adult Services Librarian ABOUT THIS CLASS. P a g e 1

Fleet Maintenance Software

EMPLOYEE TRAINING MANAGER USER MANUAL

ADMINISTRATORS SERIES PRIVACY AND SECURITY AT UF. Cheryl Granto Information Security Manager, UFIT Information Security

Bad Ads Trend Alert: Shining a Light on Tech Support Advertising Scams. May TrustInAds.org. Keeping people safe from bad online ads

ReadySpace Limited Unit J, 16/F Reason Group Tower, Castle PeakRoad, Kwai Chung, N.T.

Think Before You Click. UH Information Security Team

IBM Tivoli Asset Management for IT

ShareNet. Maintenance Software

Information Security Awareness Training. Course Outline. Provides a brief orientation to the topics covered in the module.

Information Services. Protecting information. It s everyone s responsibility

ITIL A guide to Event Management

Malware & Botnets. Botnets

Understand Backup and Recovery Methods

Virtual Phone System User Guide v4.7

DIIMS Frequently Asked Questions

Must score 89% or above. If you score below 89%, we will be contacting you to go over the material individually.

Expanded Header: Viewing in Microsoft Outlook

Reynoldsburg City Schools Computer and Technology Acceptable Use Policy Staff, Volunteers and Students

Mailbox control panel. User guide

SAMPLE TEMPLATE. Massachusetts Written Information Security Plan

Data Protection Breach Management Policy

ExchangeDefender. Understanding the tool that can save and secure your business

MINISTRY MOBILIZER. Paperless Risk Management Solution. Client Manual

Copyright and Disclaimer

M i m o s a A r c h i v e S o f t w a r e ~ S e a r c h i n g f o r m e s s a g e s. Outline. Introduction to Mimosa Archive

Using Microsoft Office 2013: Outlook. Gerry Kruyer

Lync Quick Start Guide for MAC OS

Medical Information Breaches: Are Your Records Safe?

INITIAL APPROVAL DATE INITIAL EFFECTIVE DATE

CUSTOMER SECURITY AWARENESS: A Key Defense Against Corporate Account Takeover & Cyber Fraud

High Peak CVS Disciplinary Policy and Procedure

Policy. Government of Newfoundland and Labrador (GNL)

Managing e-records without an EDRMS. Linda Daniels-Lewis Senior IM Consultant Systemscope

OCT Training & Technology Solutions Training@qc.cuny.edu (718)

Identity Finder Quick Start Guide for Windows

Guidelines. London School of Economics & Political Science. Remote Access and Mobile Working Guidelines. Information Management and Technology

Outlook 2010 Desk Reference Guide

Service Desk Edition

Service Level Agreement for Microsoft Online Services

Your security is our priority

DEFENDER SERVICES

HIPAA ephi Security Guidance for Researchers

Dell Active Administrator 8.0

Getting Started Guide - Desktop

WHITE PAPER. CRM Evolved. Introducing the Era of Intelligent Engagement

Mail Merge. Course Description. Objectives: Design a Main Document. Design a Data Source. Directories. Merge the Main Document with the Data

Division of Student Affairs Quota Practices / Guidelines

STUDENT S INFORMATION SECURITY GUIDE

APPROPRIATE USE OF INFORMATION TECHNOLOGY SYSTEMS INFRASTRUCTURE RESOURCES

anomaly, thus reported to our central servers.

Abila Grant Management. Document Management

CJIS Online Security Awareness Training. Vendor Guide

ITIL A guide to event management

Cyber Security Incident Reporting Scheme

CÚRAM. Government of Alberta. Privacy Impact Assessment. Final Report. March 2009

So the security measures you put in place should seek to ensure that:

[Company Name] HIPAA Security Awareness and Workforce Training Program Manual

Best Practices Guide to Electronic Banking

OCS Student / Parent Laptop Agreement

How to Use Windows Firewall With User Account Control (UAC)

Fulbright Distinguished Awards in Teaching Program Overview of Online Application Process

Cyber Security. John Leek Chief Strategist

QUARTERLY REPORT 2015 INFOBLOX DNS THREAT INDEX POWERED BY

Polar Help Desk 4.1. Administration Guide

Service Level Agreement for Microsoft Online Services

Help Desk Web User Guide

Outlook Agent. For the latest version of this document please go to: v 1.0 May 16,2011 Audience: Staff

Non-Profit Records Management Tool Kit

Small Firm Focus: A Practical Approach to Cybersecurity Friday, May 29 9:00 a.m. 10:15 a.m.

Introduction Purpose... 2 Scope... 2 Icons Tasks and ehealth Processes Incident Management... 3 Change Management...

Salesforce CRM Content Implementation Guide

Extending SharePoint for Real-time Collaboration: Five Business Use Cases and Enhancement Opportunities

Transcription:

IM Aware Session Email March 12, 2015 Panel Members Linda Borys - RIM Program Support Manager, Service Alberta. - With Information Management Branch for over 20 years. - Has been the Alberta Records Management Committee (ARMC) Secretary for about 10 years. - Provides guidance on the enterprise records management program. - Supports the enterprise applications used to manage Records Retention and Disposition. Schedules, and the movement of inactive records from storage to disposition. Ken Lummis - Manager of IT Security Policy. Responsible for Information Technology Security Policy for the Government of Alberta. - Security side of phishing. GoA IT Security have produced tip sheets on phishing and social engineering. Phishing goes beyond the theft of information; criminals are now using phishing emails to encrypt files which have caused downtime for the GoA in being able to access its information. Lori Lindquist - Strategic IMT Initiative Program Manager and Information Security Officer, Corporate Human Resources. - Lori Lindquist has 16 years of IT experience with the Government of Alberta primarily with Public Affairs Bureau and Executive Council. - She is knowledgeable regarding the policy and guidelines for acceptable and unacceptable activities regarding email (Use of Government of Alberta Internet and E-mail Policy) and social media. - As a Ministry Information Security Officer, she is responsible for managing security related risks and issues regarding GoA email usage.

Topic 1: From your perspective, what is the biggest obstacle for email? What piece of advice would you give to overcome that obstacle? Lori: Users are our biggest challenge. - Their ability to circumvent all rules creates a difficult environment to manage emails from a CHR perspective. The separation between business and personal email use can become complex; learning what can and can t be done with GoA email (i.e. whether they can be used for personal use, or whether they are FOIPable) is important. It s also important to note that they are GoA assets, and as such we have a commitment to the GoA to be professional; if the email accounts are not used in a professional manner, the Department has the ability (and the right) to monitor the accounts and follow up with disciplinary actions. - Becoming familiar with rules and regulations, such as social media rules and restrictions and any policies, is very important. Learning the rules is essential (i.e. be aware of copyright infringement, social media rules, and restrictions, or policies). - The Internet and Email Usage Policy outlines acceptable and unacceptable activities. - The Social Media Policy Ken: Security measures are our biggest challenge. - There are all sorts of malware, phishing scams, and ransomware. Filtering email becomes very important. - Users are our first line of defence. All of our systems are reactive. Testing of staff awareness is important. Linda: Managing information is our biggest challenge. - The volume of emails in our system is part of a bigger, more problematic picture, which is the lack of email retention policy. Most of our emails are transient, and can be deleted; only emails that document a business decision must be kept. - We need rules and regulations on email retention.

Topic 2: Speak to the evolving email environment and the evolving tools to mitigate risks. Lori: From a user perspective, managing identity will be essential to mitigate risks. We can use tools to define access and level of permissions. - Policy tools. - Knowing responsibilities. - Using responsibly. Ken: We must use the functionality we have, such as the preview pane. - Tip sheets and educational tools are available. - Presentations are available this can provide clarity on who to contact regarding email security. - Learning about integrity and accountability. Linda: We must use training to mitigate risk around emails. - Auto classification is coming and will help separate business emails from personal. - Integration of recordkeeping practices with different platforms will highlight the records component. - Automate classification and retention schedules.

Additional Questions: 1. What are the rules regarding Facebook and personal emails (personal usage on Government emails?) Ken: Facebook can be a source of malware. There is a risk of encryption and we should try to avoid using these webpages on government computers. Use your personal smart phone instead. 2. In the event of a phishing incident, what is the process that takes place? Lori: Send the phishing email as an email attachment to the GoA Service Desk, MISO, or notify your designated support team. Blocking the phishing site is first priority and letting everyone know is important. Ken: The security alerts process is a 30 minute window. They get notification, look at it (what s it doing, who it affects, what impact it will have), notify everyone, and then they fix it. 3. Is there a way to set a mandatory desktop training on email awareness (i.e. desktop cleaning day?) Linda: Not yet. 4. When is autoclassification integration coming? Linda: We have tools, but whether they are good enough hasn t been determined yet. In Microsoft office, there is autoclassification functionality, but there are issues with retention. 5. Where can I find basic rules for email is there a website? Linda: The information management website contains a managing Information Management at Work ecourse. There are no enterprise standards for emails just yet; this will entail collaboration between many groups. 6. Are emails records and do they have retention schedules? Linda: The what is information question falls into the same category as email, it needs policy to deal with it. The decision on what to keep/who keeps it-we must ask the same question of all media.

Closing Remarks: Lori: Think before you click! Take a step back and consider what you re doing. Linda: Think after you click! Consider what you should keep and what you should get rid of. Organize your emails. Take the Managing Information at Work ecourse. Ken: Think I am the first line of defence! Think about security.