Cyber Security Best Practices



Similar documents
Cyber Self Assessment

Information Security

SUBJECT: Effective Date Policy Number Security of Mobile Computing, Data Storage, and Communication Devices

HELPFUL TIPS: MOBILE DEVICE SECURITY

HIPAA Security Alert

Safe Practices for Online Banking

plantemoran.com What School Personnel Administrators Need to know

National Cyber Security Month 2015: Daily Security Awareness Tips

DRAFT National Rural Water Association Identity Theft Program Model September 22, 2008

BSHSI Security Awareness Training

Network and Workstation Acceptable Use Policy

Data Access Request Service

HIPAA: Bigger and More Annoying

PROPOSED PROCEDURES FOR AN IDENTITY THEFT PROTECTION PROGRAM Setoff Debt Collection and GEAR Collection Programs

SAFEGUARDING PRIVACY IN A MOBILE WORKPLACE

SBA Cybersecurity for Small Businesses. 1.1 Introduction. 1.2 Course Objectives. 1.3 Course Topics

Cybersecurity Best Practices

TASK TDSP Web Portal Project Cyber Security Standards Best Practices

Appendix 4-2: Sample HIPAA Security Risk Assessment For a Small Physician Practice

The Ministry of Information & Communication Technology MICT

Computing Services Information Security Office. Security 101

Making the leap to the cloud: IS my data private and secure?

DHHS Information Technology (IT) Access Control Standard

Franciscan University of Steubenville Information Security Policy

Guide to INFORMATION SECURITY FOR THE HEALTH CARE SECTOR

Your Digital Dollars Online & Mobile Banking

How To Protect A Hampden County Hmis From Being Hacked

Responsible Access and Use of Information Technology Resources and Services Policy

Cyber Security Awareness

HIPAA Security Training Manual

INFORMATION SECURITY GUIDE. Employee Teleworking. Information Security Unit. Information Technology Services (ITS) July 2013

Appendix A. 1 Copyright 2012, Oracle and/or its affiliates. All rights reserved.

IT Checklist. for Small Business INFORMATION TECHNOLOGY & MANAGEMENT INTRODUCTION CHECKLIST

Cyber Security Awareness

Information Security Awareness Training Gramm-Leach-Bliley Act (GLB Act)

Decision on adequate information system management. (Official Gazette 37/2010)

Information Technology Acceptable Usage Policy

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com

ALTA OFFICE SECURITY AND PRIVACY GUIDELINES ALTA

Supplier Information Security Addendum for GE Restricted Data

Chapter 8: Security Measures Test your knowledge

Internet threats: steps to security for your small business

Online Security Awareness - UAE Exchange - Foreign Exchange Send Money UAE Exchange

Information Security Policy. Policy and Procedures

Wellesley College Written Information Security Program

1 Purpose Scope Roles and Responsibilities Physical & Environmental Security Access Control to the Network...

Information Technology Security Procedures

How To Protect The Time System From Being Hacked

Information Security Policy

TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL

Sample Employee Agreement for Business Use of Employee-Owned Personal Computing Devices (Including Wearables 1 )

MIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10)

Windows Operating Systems. Basic Security

MONTSERRAT COLLEGE OF ART WRITTEN INFORMATION SECURITY POLICY (WISP)

+GAMES. Information Security Advisor. Be a Human Firewall! The Human Firewall' s Top Concerns in the Cyber, People & Physical Domains

A practical guide to IT security

Identity Theft Prevention Program Compliance Model

OCT Training & Technology Solutions Training@qc.cuny.edu (718)

Stable and Secure Network Infrastructure Benchmarks

SUPREME COURT OF COLORADO OFFICE OF THE CHIEF JUSTICE

NETWORK AND INTERNET SECURITY POLICY STATEMENT

Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation

Computer Security at Columbia College. Barak Zahavy April 2010

F G F O A A N N U A L C O N F E R E N C E

NCS 330. Information Assurance Policies, Ethics and Disaster Recovery. NYC University Polices and Standards 4/15/15.

A Guide to Information Technology Security in Trinity College Dublin

Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation

Protect yourself online

Certified Secure Computer User

Hot Topics in IT Security PREP#28 May 1, David Woska, Ph.D. OCIO Security

Introduction. Keeping Data Safe and Secure. Topics of Interest. Disclaimer. How Is Data Lost In General? Reasons for Data Loss by 3 rd Parties

2011 NATIONAL SMALL BUSINESS STUDY

Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines

Open an attachment and bring down your network?

Hengtian Information Security White Paper

Transcription:

Cyber Security Best Practices 1. Set strong passwords; Do not share them with anyone: They should contain at least three of the five following character classes: o Lower case letters o Upper case letters o Numbers o Punctuation o Special characters (example: @#%^&*()+= {} etc) They should contain at least eight characters. Try to create passwords that can be easily remembered. One way is to create a password based on a phrase. o For example, phrase could be This May Be One Way to Remember and the password could be TmB1w2R! or Tmb1W>r~. Never use the Remember Password software feature offered by various applications. Never use personal information when creating passwords. Change your password periodically. 2. Promote erisk Hub usage and educate employees: Become familiar with erisk Hub. Security can be set so that your IT vendor/department can access the erisk Hub on the portal without access to any other information on the Interact portal. Educate employees about what PII is, what a breach is, and how to report potential or suspected breaches. o PII (Personal Identifiable Information) is defined as: a Nebraska resident s first name or first initial and last name in combination with any one or more of the following data elements that relate to the resident if either the name or the data elements are not encrypted, redacted or otherwise altered by any method or

technology in such a manner that the name or data elements are unreadable: Social security number; Motor vehicle operator s license number or state identification card number; Account number or credit or debit card number, I combination with any required security code, access code, or password that would permit access to a resident s financial account; Unique electronic identification or routing code, in combination with any required security code, access code, or password; or Unique biometric data, such as a fingerprint, voice print, or retina or iris image, or other unique physical representation. Personal information does not include publicly available information that is lawfully made available to the general public from federal, state, or local government records. Protect all PII as if it were your own. 3. Develop a Server/Desktop/Laptop/Portable Device media security policy: House network hardware (servers, firewall, switches, routers, etc), in a secure environment. Develop a secure procedure for any backup media that is taken offsite for disaster recovery purposes. Loss of a laptop or thumb drive with PII information contained on it constitutes a data breach. Computers should be locked when user is away and cannot monitor its usage. All devices should be password protected. If a device is lost or stolen, establish a policy and time frame for reporting.

Establish a policy for taking mobile equipment off premise. Include safeguards for protecting the data. Remove PII from the mobile device that is not critical for offsite use. Avoid storing PII on laptop/portable devices. Don t allow vendors to store your PII for ease of future use. If PII is stored on the device, do not access public Wi-Fi networks or Bluetooth. 4. Install and maintain critical software updates: Microsoft and application software should be kept current. These are designed to help keep your environment secure. Consider restricting employees ability to download unauthorized software. Downloads could include malware or viruses. 5. Maintain only critical PII: Assess the need to maintain data. (i.e. credit card information, SSN, etc.) If it is not critical, do not store it. Do not use social security numbers as an employee or customer identification number. 6. Maintain current up to date firewall and anti-virus protection: Ensure your firewall equipment is up to date, the manufacturer still supports it and updates are being installed. Ensure you have up to date anti-virus software. Consider malware monitoring software for added protection. 7. Use trusted vendors for data collection: Check your contracts with vendors and establish who maintains the liability if the vendor has a data breach. Require your vendors to notify you of any cyber security incidents they experience, even if the incident did not led to an actual compromise of your data.

8. Use caution when opening websites and emails: If an email is not from a trusted source, do not open any attachments. Delete the email from your inbox and deleted items folder without opening. o Attachments are primarily the way viruses and malware are spread. Always type the URL directly into the address bar. Do not click on it from an advertisement or listing. This prevents you from being redirected to a malicious website. 9. Adopt equipment disposal policy: Identify who is responsible for disposal. Reformat or remove and securely dispose of hard drives. This includes but not limited to: o Computer hard drives o External usb devices (flash drives, external drives) o Most printers and scanners now contain hard drives. o Cell phones o Tablets o Back-up tapes (video and data) o This also pertains to any leased equipment before it is returned to the vendor. 10. Adopt employee data access policy: Limit data access to specific job functions. If they don t need access, don t allow it. Review data access on a regular basis (i.e. annually). Establish a policy/checklist to follow upon hiring/termination of personnel. o Upon termination, disconnect all access to internal information/websites/email, etc. and secure any mobile equipment. o Upon hiring, determine what data the new employee needs to access.

o Ensure employees know and follow the published data access and security policies. We recommend review of these Best Practices with legal counsel and IT department/vendor.