About this presentation

About this presentation

Security is everyones business Name // Date Overview of information security best practices You are the key to our security Were counting on you: Your actions can help keep us safe. The bad guys are out there and ready to take advantage of any vulnerabilities they can. Cyber criminals have been targeting small and midsized businesses for yearsand their tactics are getting better Over 50% of SMBs have suffered a cyber attack or security

breach.1 SMBs experience month 1 1 security incident per 2 State of Cybersecurity in SMB (USA),stolen Ponemon, 2016; Smallbizdaily, January 2018 including phishing, passwords, and23,stolen

laptops2 PASSWORD BEST PRACTICES Create and use strong passwords Mix upper and lowercase characters Add in special characters and numbers Do not choose a dictionary word Avoid personal references that could easily be discovered, such as your birthday or the names of relatives

Two-factor authentication significantly increases security ADDITIONAL PASSWORD BEST PRACTICES Help keep your accounts safe Never tell anyone else your password Use a different password for each system Dont keep your password on a sticky note or an unencrypted file on your computer WHAT IS PHISHING? Fake email that appears to

come from a trusted friend or organization. Typically tries to trick you into giving away sensitive information such as a password or credit card number. May also try to get you to download malicious programs by clicking on an attachment. THE ANATOMY OF A PHISHING EMAIL 7

PHISHING DEFENSES WHAT TO DO Never give out personal or sensitive information based on an email Do not trust links or attachments in unsolicited emails Hover your mouse over email links in email messages to verify a links actual email location

Type in website addresses rather than using links from unsolicited emails Be suspicious of phone numbers in emails. Use the phone number on your credit card or statement instead Alert the IT team at [email protected] ntact co is fi r when you receive a suspicious email u

h yo Add tion on t ma bullet r o f in PUBLIC WI-FI RISKS Risky behaviors on a public network Installing any updates or programs on your phone or

computer Accessing emails, social networks, online shopping, or banking servers Configuring your devices to connect to unknown Wi-Fi networks without prompting you first Allowing others to shoulder surf while you work with sensitive information 9

PUBLIC WI-FI BEST PRACTICES Safer use of public Wi-Fi Verify with the provider that you are logging onto the correct network. Use a trusted VPN service to secure your traffic Choosing mobile data services such as 4G, instead of public Wi-Fi wherever possible 10 COMMON MALWARE RANSOMWARE

encrypts the victims data storage drives so data is inaccessible to the owner unless the owner pays a ransom for the encryption key TROJANS masquerades as a legitimate program to trick victims into installing it on their systems WORMS programs that can self-replicate and spread through a variety of means, such as emails 11 MALWARE DEFENSES How to protect yourself:

Install software updates and security patches promptly Beware of fake tech support Log out at the end of the day Be smart about email Be savvy about entering information only on secured sites Back up your data Maintain strong passwords 12 Thank you 13

Recently Viewed Presentations

  • www.f1s.org


    South Florence High School. Course Syllabus. World History. Coach Clay Owens. Mobile 1. MISSION STATEMENT. The Mission of South Florence High School is to prepare students to become responsible, world-class citizens and high-achieving lifelong learners.
  • PowerPoint Guidelines

    PowerPoint Guidelines

    Grant permissions on registry keys. When programmatically authorizing users based on their credentials or validating input, always follow a specific pattern. First, attempt to authorize or validate the data.
  • 394392 APM Terminals Itaja  COMEX IMPORTAO TIPOS DE

    394392 APM Terminals Itaja COMEX IMPORTAO TIPOS DE

    Ao clicar no consultar é realizado a consulta do documento no Siscomex, Siscarga e ICMS. Encontrando algum problema será informado a direita nos avisos. Quadro de avisos DTA ou DTA-LCL Existindo algum problema na consulta não é habilitado o opção...
  • Parable of… The Lazy Ant - Teacher Bulletin

    Parable of… The Lazy Ant - Teacher Bulletin

    THE END Parable of… The Lazy Ant Written by Jeffrey S. Martella -1- -2- In the backyard of the big red house there was an ant colony. Every ant in the colony worked hard…except Albert. Albert was a lazy ant....
  • Resource Exchange in Action Treating Waste as a

    Resource Exchange in Action Treating Waste as a

    SMILE's Key Objective. versus. Move from linear economy to circular economy. i.e. move from take, make, consume, throw-away to sharing, leasing, reuse, repair, refurbishment and recycling, in a closed loop, where products and the materials they contain are highly valued.
  •   :  .6  :   :  1389 1 Advanced Organizational

    : .6 : : 1389 1 Advanced Organizational

    ساختار. سيستم‏ها. استراتژي. مهارت. سبک. کارکنان. منظور مجموعه‏اي از ويژگي ‏ هاي سازماني است كه با ابعادي نظير تمركز ، پيچيدگي و رسميت سر و كار دارند و برخي از آنها در نمودار سازماني نشان داده مي‏شوند.
  • Anatomy of the neck

    Anatomy of the neck

    Anatomy of the neck By Dr. Rasha Sabry Muscular triangle Outlines : Infront : midline of the neck Behind and above :superior belly of omohyoid muscle Behind and below : the sternomastoid muscle Contents of the Muscular triangle It contains...
  • Implementing THRIVE Phase 1: Developing a full understanding

    Implementing THRIVE Phase 1: Developing a full understanding

    skill mix of professionals required to meet these needs . resources required to meet the needs and/or choices of people in that group. Input offered. Description of the . THRIVE-groups. THRIVE Elaborated, Second Edition (Wolpert .