1 / 11

Security Awareness

Security Awareness. Helping our customers keep their computers safe. Are you guilty of poor passwords?. Using your pet’s, business, family, friend’s names Using number or letter sequences (0123, abcd) Using your anniversary, birthday, address, zip code, or even worse…your social security #

galvin
Download Presentation

Security Awareness

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Security Awareness Helping our customers keep their computers safe

  2. Are you guilty of poor passwords? • Using your pet’s, business, family, friend’s names • Using number or letter sequences (0123, abcd) • Using your anniversary, birthday, address, zip code, or even worse…your social security # • Using less than 10 characters • Storing them on your hard drive, on the internet, or posting them on your desk area

  3. Strong Passwords are the New Safe • Use a relevant phrase for the type of site. (eg for your auto loan site, think “my$onWheels” • Use different passwords for different sites & machines. If one gets hacked, you can mitigate the likelihood others will be as well • Make it visual – you’ll remember it easier • Make it more than 10 characters • Make it personal- “Iwakeup@5am” • Include at least 1 from three of the following: • Uppercase • Lowercase • Numbers • Symbols

  4. Files & Devices Need Passwords Too • Always put passwords on sensitive files, not just the computer itself • Password protect your USB, zip drives and smart phones…these devices are easy to lose or leave somewhere, putting your data in anyone’s hands

  5. Unprotected Computers are Risky • Any information you access or input on an unsecured computer is not safe (this includes coffee shop, library, community, hotel and even some home machines) • Make sure you use your computer in User Mode. Administrator Mode should only be used when necessary to make changes • Ensure your firewalls are enabled and current • Install and keep current up-to-date AntiVirus (and only run 1; multiples installed can create their own problems!). For home users, we recommend Microsoft Security Essentials for Windows and Sophos for Macs. Business and networks need more comprehensive programs. Contact us for a free security assessment at 505-954-4400 and we can make recommendations to best suit your environment.

  6. Remember to Lock your Devices • Always lock your computer, whether you are not using it, or just stepping away for a quick break or to speak with a nearby colleague • Always lock your cell phone, especially if you keep it on your desk throughout the day. Cell phones now are like mini computers containing private & sensitive data too

  7. Unlocked Info Causes Leaks • Don’t leave important and private data on your desk • File and lock sensitive data • Lock your office door when you are not present • Shred documents before discarding

  8. Don’t get hooked into scams • Just opening or viewing suspicious emails can put your computer at risk • Delete or report to IT emails that request confidential personal or company information. (Employees, partners, customers won’t use this method for legit requests) • Do not reply to emails requesting additional information for processing (ie reward, prize) • Do not click on links unless you are confident the sender is safe (its best to verify before clicking) • Most emails about banking, funds, accounts, legal matters are scams

  9. Be Careful with Installs & PlugIns • Games, tools, software, & even antivirus can guise as legit, but when installed will infect your computer. Contact IT before doing any installations to ensure they are safe • Personal devices like flash drives, MP3s and smartphones can unleash harm upon plug in as well, as some computers have code that will compromise the devices. Take care & get approval from IT for plug-ins

  10. Don’t Ignore Suspicious Activity • Cyber attacks, email scams, and internet fraud pose real threats. Its not enough to just delete emails, change passwords, etc…you must report suspicious sites and emails to IT or your support providers. • Equally important is to report suspicious activity you may observe, even if it is on the part of a co-worker. It is better to be safe that sorry.

  11. Know who to contact for Help • Stay educated and in contact with your IT department or IT resources provided by your company • At home, have a support resource you can call if you need repairs, or guidance with downloads, security etc. • At ECS, we are available to help you at 505-954-4400

More Related