1 / 0

Cyber Security

Cyber Security. Protecting Your Computer and Your Online Identity Amy Brener and Sarah Morehouse Information Technology Unit George Mason University VLAPF Conference May 20, 2013. Protecting Your Personal Computer. Amy Brener Director of Global IT Projects Deputy Director 4-VA

nikkos
Download Presentation

Cyber Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Cyber Security

    Protecting Your Computer and Your Online Identity Amy Brener and Sarah Morehouse Information Technology Unit George Mason University VLAPF Conference May 20, 2013
  2. Protecting Your Personal Computer Amy Brener Director of Global IT Projects Deputy Director 4-VA Office of the Vice President for IT & C.I.O. Information Technology Unit George Mason University
  3. Screensaver Password Protected? How much time?
  4. Passwords Make them strong Make them unique Multiple users Multiple programs/sites
  5. Critical Updates Automatically!!! Microsoft Office Internet Explorer Other browsers: Firefox Safari Chrome
  6. Anti-Virus Software Configure it properly
  7. Back Up Files Portable hard drive DVDs/CDs Use the Cloud?
  8. Email Never open suspicious looking emails or attachments Phishing Spam Best Practices
  9. SSL or https for Online Transactions Paying bills Using your credit card Transferring data (Secure Shell vs. FTP)
  10. Disposing of Computers Re-format hard drive
  11. Social Media Stranger danger Nothing is private Breaches are contagious Tagging is a no-no Secure settings Monitor
  12. Cyber Security and Social Networking Sarah Morehouse Communications Coordinator ITU Security and Project Management Office Information Technology Unit George Mason University
  13. Social Networking Social Networking – what is it? Social networking service is defined as an “online service, platform, or site that focuses on facilitating the building of social networks or social relations among people who, for example, share interests, activities, backgrounds, or real-life connections.”(http://mashable.com/follow/topics/social-networking/) Social Networking Sites (to name a few): Facebook Twitter LinkedIn MySpace Google Plus Pinterest
  14. Social Networking Statistics: According to Facebook, MacWorld, Socialnomics, Consumer Reports, and Browser Media (data for 2011 - 2012): Total number of Facebook users worldwide were 950 million people Total percentage of 18-24 year olds who already use social media was 98% Total amount of minutes people spend on Facebook each month was 700 billion minutes ConsumerReports Almost 13 million users said they had never set, or didn’t know about Facebook’s privacy tools; 28% shared all, or almost all, of their wall posts with an audience wider than just their friends. Even if you have restricted your information to be seen by friends only, a friend who is using a Facebook app could allow your data to be transferred to a third party without your knowledge.
  15. Social Networking PrivacySettings Why do we need them? Won’t that make it harder for people to find us and friend us? How do they work? What do I need to do?
  16. Social Networking Tips for safely using social networking: Be conscious of what you write. It’s the internet, nothing is ever truly private. Avoid posting your plans, particular personal information, etc. Do not state your location. Make sure you have your privacy settings in place. Be careful what you allow your friends to tag you in. Don’t accept friend requests from people you don’t know. Be careful when playing games and apps that ask for personal information. Make sure your passwords are strong and are not the same for every site. Never use your Facebook or Twitter as logins for other sites.
  17. Social Networking Proof that nothing is private: “We Know What You’re Doing” – http://www.weknowwhatyouredoing.com Takes revealing posts and makes them public, proving you’re not always as private as you would like to hope. Again, think before you type. Failbook– http://failbook.com Embarrassing and funny Facebook statuses. If you’re not careful, you could end up on this site. Again, THINK BEFORE YOU POST.
  18. What To Do If You Think You Are A Victim? If you think you’ve been compromised, immediately change your passwords If you believe your financial accounts may have been compromised, contact your financial institution immediately. Then watch for any unexplainable charges to your account Consider reporting the attack to the police, and filing a report with the Federal Trade Commission (www.ftc.gov)
  19. For More Information: itsecurity.gmu.edu/Awareness/cybersecurity.cfm Home Security Part I: Staying Save Online at Home Home Security Part II: Securing Your PC Email Security: Phishing & Scams Social Networking & Cloud Services
  20. Questions? Contact Information: Sarah Morehouse, Communications CoordinatorITU Security and Project Management Office Information Technology Unit George Mason University 703-993-2906smoreho3@gmu.edu Amy Brener, Director of Global IT Projects& Deputy Director 4-VAOffice of the Vice President for IT & C.I.O.Information Technology UnitGeorge Mason University703-993-8988abrener@gmu.edu
More Related