SlideShare ist ein Scribd-Unternehmen logo
1 von 25
Training Staff in End User IT Security
Community IT Innovators Webinar Series
September 17, 2015
Training Staff in End User IT Security
Community IT Innovators Webinar Series
September 17, 2015
Webinar
Tips
• Interact
Ask questions via chat
Connect on Twitter
• Focus
Avoid multitasking. You may just miss the
best part of the presentation
• Webinar Slides & Recording
PowerPoint and recording links will be
shared after the webinar
About
Community IT
Advancing mission
through the effective
use of technology.
• Invested
Work exclusively with nonprofit
organizations, serving over 900
since 1993.
• Strategic
Help our clients make IT decisions
that support mission.
• Collaborative
Team of over 30 staff who
empower you to make informed IT
choices.
Mark Kraemer
Network Administrator
mkraemer@communityit.com
Nuradeen Aboki
Network Manager
naboki@communityit.com
Common Internet Activities
• Check emails, collaborate and share documents online…
• Communicate with friends on Facebook, Twitter, Whatsapp…
• Pay bills, view health and financial records…
• Read blogs, articles, magazines, and news…
• Order books, electronics, apparel…
• Listen to music, watch videos, and play games..
• Download digital content..
Threat Landscape
• “Digital Extortion” through Malware
• Data Breaches
• Scams through Social Media platforms
• Mobile attacks on the rise
• Internet of Things including wearables, and even cars
• Targeted Attacks
• Web Threats
Corporate IT Security Systems
Some say, “Our organization is SAFE because we have Antivirus software
on computers and servers, Anti-spam filters for email protection,
encryption on our websites, firewall security to secure our local area
network, and password-protected WiFi connections.”
Unfortunately, these alone may not be enough to keep your network
secure from all threats. An organization is more likely to be jeopardized
from employees unintentionally, erroneously, carelessly, or deliberately.
IT Security for End Users
• Trickiest to manage
• Balance between security and
convenience
• Best defense is awareness and education
IT Security - Basics
Physical
Workstation
Password
Email
Web
Mobile
Remote Access
Physical Threats
• Your Workplace, desk, cubicle, office space
• Your Workstation, desktop PC, laptop, and
mobile devices
• Your paperwork
Physical Security
• Lock your screen before you leave your computer or mobile device unattended
– For Windows, press & hold the Windows Key, then press L.
– For Mac, press these keys at the same time:
• Control + Shift + Eject (Mac with eject key)
• Control + Shift + Power (Mac without eject key)
• Store documents containing sensitive data in a lockable safe or cabinet
• When destroying sensitive documents, at least shred them properly
• Report all suspicious activities
Workstation Security
Tips:
1. Antivirus software should always receive the latest
virus signatures, and set to ran full virus scans weekly.
2. Antivirus software should be configured to scan web
pages, attachments, and downloads.
3. Operating System and 3rd party applications should
be patched regularly
Password Security
Tips:
1. Create Strong or hard-to-guess Passwords
• For example, it must have at least 8 characters, 1 uppercase, 1 lowercase,1 numeric, & a special
character. You use a phase with space between words
2. Change passwords after every 90 days
3. Set a lockout threshold for failed logon attempts
4. Disable password caching on workstation and mobile devices
5. When necessary, end users may share passwords with authorized persons only
6. Do not store your password on or near your workstation
7. If available, use two-factor authentication when accessing password protected websites
8. Protect password files
Email Threats
Source - http://cdn2.hubspot.net/hub/204663/file-277596927-
jpg/images/email-security.jpg
Email Security
• Basic Rules
– Do not click unless you are certain that it’s safe
– Think about the source, identify the sender, scan or
preview the attachment, verify the legitimate web address
– Sign out of your email client after use
– If you are in doubt or compromised contact your IT
helpdesk
Web Threats
• Instant Messaging Spam
• Unsecure Websites, & Compromised Sites
• Browser & Plug-in Vulnerabilities
• “Malvertising” or Malicious Advertising
• Denial of Service
Web Security
Tips:
1. Do not click until you are confident about the Internet link or website
2. Make sure that pop-up blocker is enabled on your web browser
3. Look at the actual web address by “hovering” mouse pointer over the link
4. Verify that you are browsing a HTTPS website, especially transmitting personal data
5. Do not assume all plug-ins are safe. Take some time to do a little research.
6. Be sure to update your browser and your plugins regularly or set them to auto update on
your home PC.
1. Firefox, Chrome, Java, Flash
7. When in doubt ask your IT helpdesk
Mobile Threats
• Fake Apps
• Short Messaging Spamming
• Improper use of camera
• Tracking users
• Stealing Information
Mobile Security
Tips:
1. Keep patches updated on your device and mobile applications
2. Do not assume all apps are safe. Fake apps exist!
a. Beware of apps that are mobile websites many ads
b. Read the Reviews/Ratings to learn about the apps
c. Look for apps with most downloads, especially those with labeled “Editor’s choice”
d. Check the developer’s profile
3. Verify the source of any shared images, videos, and links before opening it.
4. Make sure location services are enabled to help find your mobile if lost or stolen.
5. When in doubt, or attacked, contact your IT helpdesk
Remote Access Security
Tips:
– Wireless Networks
1. Home WiFi
 Make sure your home network is password-protected.
 Avoid using your personal information as Network Name or Password.
 Keep firmware updated on your home wireless router.
2. Public WiFi
 Beware of Fake WiFi Hotspots in coffee shops, restaurants, airports, and public areas
3. Switch off the wireless card when not in use to avoid automatically connecting to an unsecure network.
– For Remote Desktop (RD) Connection, do not save your logon credentials on RD client software
– If available, use Virtual Private Network (VPN) encryption when accessing work files remotely across an
untrusted network.
Takeaways
Source - Security Best Practices, https://www.opswat.com/blog/10-things-include-
your-employee-cyber-security-policy
Upcoming Webinar
Guidelines for Annual Nonprofit
IT Budgeting
Thursday October 22
4:00 – 5:00 PM EST
Cedric Boyd
Steve Longenecker
Provide feedback
Short survey after you exit the webinar. Be sure to
include any questions that were not answered.
Missed anything?
Link to slides & recording will be emailed to you.
Connect with us
Author: DuMont Television/Rosen Studios, New York-photographer, Uploaded by We hope at en.wikipedia
http://commons.wikimedia.org/wiki/File:20_questions_1954.JPG

Weitere ähnliche Inhalte

Was ist angesagt?

IT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeIT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community College
Atlantic Training, LLC.
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@
R_Yanus
 
Cybersecurity Awareness Training Presentation v2021.08
Cybersecurity Awareness Training Presentation v2021.08Cybersecurity Awareness Training Presentation v2021.08
Cybersecurity Awareness Training Presentation v2021.08
DallasHaselhorst
 
Information Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier UniversityInformation Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier University
Atlantic Training, LLC.
 

Was ist angesagt? (20)

IT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeIT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community College
 
Information Security Awareness
Information Security Awareness Information Security Awareness
Information Security Awareness
 
Employee Security Awareness Training
Employee Security Awareness TrainingEmployee Security Awareness Training
Employee Security Awareness Training
 
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@
 
Cybersecurity Awareness Training Presentation v2021.08
Cybersecurity Awareness Training Presentation v2021.08Cybersecurity Awareness Training Presentation v2021.08
Cybersecurity Awareness Training Presentation v2021.08
 
Security Awareness Training by Fortinet
Security Awareness Training by FortinetSecurity Awareness Training by Fortinet
Security Awareness Training by Fortinet
 
Cybersecurity Employee Training
Cybersecurity Employee TrainingCybersecurity Employee Training
Cybersecurity Employee Training
 
14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness
 
Information Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier UniversityInformation Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier University
 
End User Security Awareness Presentation
End User Security Awareness PresentationEnd User Security Awareness Presentation
End User Security Awareness Presentation
 
Security awareness
Security awarenessSecurity awareness
Security awareness
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness Training
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Cybersecurity Awareness
Cybersecurity AwarenessCybersecurity Awareness
Cybersecurity Awareness
 
ICT and end user security awareness slides
ICT and end user security awareness slidesICT and end user security awareness slides
ICT and end user security awareness slides
 
Information Security Awareness, Petronas Marketing Sudan
Information Security Awareness, Petronas Marketing SudanInformation Security Awareness, Petronas Marketing Sudan
Information Security Awareness, Petronas Marketing Sudan
 
IT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.ppt
 
User security awareness
User security awarenessUser security awareness
User security awareness
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 

Andere mochten auch

Panamá papers, otro “listado falciani” con sociedades y cuentas offshore
Panamá papers, otro “listado falciani” con sociedades y cuentas offshorePanamá papers, otro “listado falciani” con sociedades y cuentas offshore
Panamá papers, otro “listado falciani” con sociedades y cuentas offshore
Marcos Bravo Catalán
 
Module 5 security
Module 5   securityModule 5   security
Module 5 security
IT
 

Andere mochten auch (18)

Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
 
Security and Cryptography
Security and CryptographySecurity and Cryptography
Security and Cryptography
 
IT Security Awareness - How to?
IT Security Awareness - How to?IT Security Awareness - How to?
IT Security Awareness - How to?
 
Powerful email protection
Powerful email protectionPowerful email protection
Powerful email protection
 
Safety Security Emergency Preparedness
Safety Security Emergency PreparednessSafety Security Emergency Preparedness
Safety Security Emergency Preparedness
 
Panamá papers, otro “listado falciani” con sociedades y cuentas offshore
Panamá papers, otro “listado falciani” con sociedades y cuentas offshorePanamá papers, otro “listado falciani” con sociedades y cuentas offshore
Panamá papers, otro “listado falciani” con sociedades y cuentas offshore
 
Introducing vsRisk 2.6
Introducing vsRisk 2.6Introducing vsRisk 2.6
Introducing vsRisk 2.6
 
Coordination in Emergency
Coordination in EmergencyCoordination in Emergency
Coordination in Emergency
 
TAKLIMAT PENYELARASAN PELAKSANAAN KiDT 2016 UNTUK SEKOLAH (PPD SIBU).pptx
TAKLIMAT PENYELARASAN PELAKSANAAN KiDT 2016 UNTUK SEKOLAH (PPD SIBU).pptxTAKLIMAT PENYELARASAN PELAKSANAAN KiDT 2016 UNTUK SEKOLAH (PPD SIBU).pptx
TAKLIMAT PENYELARASAN PELAKSANAAN KiDT 2016 UNTUK SEKOLAH (PPD SIBU).pptx
 
Nota bantuan teknikal ki dt 2016
Nota bantuan teknikal ki dt 2016Nota bantuan teknikal ki dt 2016
Nota bantuan teknikal ki dt 2016
 
GKK Tindakan Kecemasan
GKK Tindakan KecemasanGKK Tindakan Kecemasan
GKK Tindakan Kecemasan
 
Cybersecurity Priorities and Roadmap: Recommendations to DHS
Cybersecurity Priorities and Roadmap: Recommendations to DHSCybersecurity Priorities and Roadmap: Recommendations to DHS
Cybersecurity Priorities and Roadmap: Recommendations to DHS
 
GAMBARAN TINGKAT KECEMASAN IBU HAMIL TRIMESTER III DALAM MENGHADAPI PERSALINA...
GAMBARAN TINGKAT KECEMASAN IBU HAMIL TRIMESTER III DALAM MENGHADAPI PERSALINA...GAMBARAN TINGKAT KECEMASAN IBU HAMIL TRIMESTER III DALAM MENGHADAPI PERSALINA...
GAMBARAN TINGKAT KECEMASAN IBU HAMIL TRIMESTER III DALAM MENGHADAPI PERSALINA...
 
Pretty good privacy
Pretty good privacyPretty good privacy
Pretty good privacy
 
Latihan kecemasan 2014
Latihan kecemasan 2014Latihan kecemasan 2014
Latihan kecemasan 2014
 
Module 5 security
Module 5   securityModule 5   security
Module 5 security
 
National Cybersecurity - Roadmap and Action Plan
National Cybersecurity - Roadmap and Action PlanNational Cybersecurity - Roadmap and Action Plan
National Cybersecurity - Roadmap and Action Plan
 
Email security - Netwroking
Email security - Netwroking Email security - Netwroking
Email security - Netwroking
 

Ähnlich wie Basic Security Training for End Users

Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
amiinaaa
 
Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety
Sadaf Walliyani
 
Online reputation
Online reputationOnline reputation
Online reputation
esl2m
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness Training
Randy Bowman
 

Ähnlich wie Basic Security Training for End Users (20)

Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
 
Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety
 
Users awarness programme for Online Privacy
Users awarness programme for Online PrivacyUsers awarness programme for Online Privacy
Users awarness programme for Online Privacy
 
001 ho basic computer
001 ho basic computer001 ho basic computer
001 ho basic computer
 
Securing your cyberspace_Watson
Securing your cyberspace_WatsonSecuring your cyberspace_Watson
Securing your cyberspace_Watson
 
Online reputation
Online reputationOnline reputation
Online reputation
 
It security,malware,phishing,information theft
It security,malware,phishing,information theftIt security,malware,phishing,information theft
It security,malware,phishing,information theft
 
Internet
InternetInternet
Internet
 
Online reputation
Online reputationOnline reputation
Online reputation
 
Security Best Practices for Regular Users
Security Best Practices for Regular UsersSecurity Best Practices for Regular Users
Security Best Practices for Regular Users
 
Security best practices for regular users
Security best practices for regular usersSecurity best practices for regular users
Security best practices for regular users
 
Computer security
Computer securityComputer security
Computer security
 
Cyber security for small businesses
Cyber security for small businessesCyber security for small businesses
Cyber security for small businesses
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptx
 
Internet security
Internet securityInternet security
Internet security
 
Harbin clinic iot-mobile-no-vid
Harbin clinic iot-mobile-no-vidHarbin clinic iot-mobile-no-vid
Harbin clinic iot-mobile-no-vid
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness Training
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness Training
 
Wfh security risks - Ed Adams, President, Security Innovation
Wfh security risks  - Ed Adams, President, Security InnovationWfh security risks  - Ed Adams, President, Security Innovation
Wfh security risks - Ed Adams, President, Security Innovation
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 

Mehr von Community IT Innovators

Slack, Microsoft Teams, Zoom: What Works Best for Nonprofits?
Slack, Microsoft Teams, Zoom: What Works Best for Nonprofits?Slack, Microsoft Teams, Zoom: What Works Best for Nonprofits?
Slack, Microsoft Teams, Zoom: What Works Best for Nonprofits?
Community IT Innovators
 
Cybersecurity Training for Nonprofits
Cybersecurity Training for NonprofitsCybersecurity Training for Nonprofits
Cybersecurity Training for Nonprofits
Community IT Innovators
 
SharePoint Online for Nonprofits
SharePoint Online for NonprofitsSharePoint Online for Nonprofits
SharePoint Online for Nonprofits
Community IT Innovators
 
Microsoft Dynamics and Salesforce: What You Need To Know Before Choosing a Pl...
Microsoft Dynamics and Salesforce: What You Need To Know Before Choosing a Pl...Microsoft Dynamics and Salesforce: What You Need To Know Before Choosing a Pl...
Microsoft Dynamics and Salesforce: What You Need To Know Before Choosing a Pl...
Community IT Innovators
 

Mehr von Community IT Innovators (20)

Slack, Microsoft Teams, Zoom: What Works Best for Nonprofits?
Slack, Microsoft Teams, Zoom: What Works Best for Nonprofits?Slack, Microsoft Teams, Zoom: What Works Best for Nonprofits?
Slack, Microsoft Teams, Zoom: What Works Best for Nonprofits?
 
2021 Nonprofit Cybersecurity Incident Report
2021 Nonprofit Cybersecurity Incident Report2021 Nonprofit Cybersecurity Incident Report
2021 Nonprofit Cybersecurity Incident Report
 
Cybersecurity Training for Nonprofits
Cybersecurity Training for NonprofitsCybersecurity Training for Nonprofits
Cybersecurity Training for Nonprofits
 
SharePoint Online for Nonprofits
SharePoint Online for NonprofitsSharePoint Online for Nonprofits
SharePoint Online for Nonprofits
 
Microsoft Dynamics and Salesforce: What You Need To Know Before Choosing a Pl...
Microsoft Dynamics and Salesforce: What You Need To Know Before Choosing a Pl...Microsoft Dynamics and Salesforce: What You Need To Know Before Choosing a Pl...
Microsoft Dynamics and Salesforce: What You Need To Know Before Choosing a Pl...
 
Nonprofit Cybersecurity Risk Assessment Basics
Nonprofit Cybersecurity Risk Assessment BasicsNonprofit Cybersecurity Risk Assessment Basics
Nonprofit Cybersecurity Risk Assessment Basics
 
Does Your Organization Need a Better Technology Roadmap?
Does Your Organization Need a Better Technology Roadmap?Does Your Organization Need a Better Technology Roadmap?
Does Your Organization Need a Better Technology Roadmap?
 
2020 Nonprofit Technology Trends Roundtable
2020 Nonprofit Technology Trends Roundtable2020 Nonprofit Technology Trends Roundtable
2020 Nonprofit Technology Trends Roundtable
 
5 Security Tips to Protect Your Login Credentials and More
5 Security Tips to Protect Your Login Credentials and More5 Security Tips to Protect Your Login Credentials and More
5 Security Tips to Protect Your Login Credentials and More
 
How Data Quality Defines Your Organization Webinar November 2019
How Data Quality Defines Your Organization Webinar November 2019How Data Quality Defines Your Organization Webinar November 2019
How Data Quality Defines Your Organization Webinar November 2019
 
Nonprofit Cybersecurity Readiness - Community IT Innovators Webinar
Nonprofit Cybersecurity Readiness - Community IT Innovators WebinarNonprofit Cybersecurity Readiness - Community IT Innovators Webinar
Nonprofit Cybersecurity Readiness - Community IT Innovators Webinar
 
5 Steps to Create an Information Strategy for Your Organization
5 Steps to Create an Information Strategy for Your Organization5 Steps to Create an Information Strategy for Your Organization
5 Steps to Create an Information Strategy for Your Organization
 
Server 2008 and Windows 7 End of Life: 3 Things You Need to Know
Server 2008 and Windows 7 End of Life: 3 Things You Need to KnowServer 2008 and Windows 7 End of Life: 3 Things You Need to Know
Server 2008 and Windows 7 End of Life: 3 Things You Need to Know
 
What Makes Nonprofit Tech Projects Succeed?
What Makes Nonprofit Tech Projects Succeed?What Makes Nonprofit Tech Projects Succeed?
What Makes Nonprofit Tech Projects Succeed?
 
Community IT Webinar: Working with an Outsourced IT Manager
Community IT Webinar: Working with an Outsourced IT ManagerCommunity IT Webinar: Working with an Outsourced IT Manager
Community IT Webinar: Working with an Outsourced IT Manager
 
Nonprofit Cybersecurity Incident Report
Nonprofit Cybersecurity Incident ReportNonprofit Cybersecurity Incident Report
Nonprofit Cybersecurity Incident Report
 
Improving Nonprofit CRM Data Management in 2019 - Build Consulting and Commun...
Improving Nonprofit CRM Data Management in 2019 - Build Consulting and Commun...Improving Nonprofit CRM Data Management in 2019 - Build Consulting and Commun...
Improving Nonprofit CRM Data Management in 2019 - Build Consulting and Commun...
 
Community IT Innovators Technology Trends Round Table 2019
Community IT Innovators Technology Trends Round Table 2019Community IT Innovators Technology Trends Round Table 2019
Community IT Innovators Technology Trends Round Table 2019
 
Selecting Nonprofit Software: Technology Comes Last
Selecting Nonprofit Software: Technology Comes LastSelecting Nonprofit Software: Technology Comes Last
Selecting Nonprofit Software: Technology Comes Last
 
IT Security Incident Response for Nonprofits
IT Security Incident Response for NonprofitsIT Security Incident Response for Nonprofits
IT Security Incident Response for Nonprofits
 

Kürzlich hochgeladen

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 

Kürzlich hochgeladen (20)

MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 

Basic Security Training for End Users

  • 1. Training Staff in End User IT Security Community IT Innovators Webinar Series September 17, 2015
  • 2. Training Staff in End User IT Security Community IT Innovators Webinar Series September 17, 2015
  • 3. Webinar Tips • Interact Ask questions via chat Connect on Twitter • Focus Avoid multitasking. You may just miss the best part of the presentation • Webinar Slides & Recording PowerPoint and recording links will be shared after the webinar
  • 4. About Community IT Advancing mission through the effective use of technology. • Invested Work exclusively with nonprofit organizations, serving over 900 since 1993. • Strategic Help our clients make IT decisions that support mission. • Collaborative Team of over 30 staff who empower you to make informed IT choices.
  • 5. Mark Kraemer Network Administrator mkraemer@communityit.com Nuradeen Aboki Network Manager naboki@communityit.com
  • 6. Common Internet Activities • Check emails, collaborate and share documents online… • Communicate with friends on Facebook, Twitter, Whatsapp… • Pay bills, view health and financial records… • Read blogs, articles, magazines, and news… • Order books, electronics, apparel… • Listen to music, watch videos, and play games.. • Download digital content..
  • 7. Threat Landscape • “Digital Extortion” through Malware • Data Breaches • Scams through Social Media platforms • Mobile attacks on the rise • Internet of Things including wearables, and even cars • Targeted Attacks • Web Threats
  • 8. Corporate IT Security Systems Some say, “Our organization is SAFE because we have Antivirus software on computers and servers, Anti-spam filters for email protection, encryption on our websites, firewall security to secure our local area network, and password-protected WiFi connections.” Unfortunately, these alone may not be enough to keep your network secure from all threats. An organization is more likely to be jeopardized from employees unintentionally, erroneously, carelessly, or deliberately.
  • 9. IT Security for End Users • Trickiest to manage • Balance between security and convenience • Best defense is awareness and education
  • 10. IT Security - Basics Physical Workstation Password Email Web Mobile Remote Access
  • 11. Physical Threats • Your Workplace, desk, cubicle, office space • Your Workstation, desktop PC, laptop, and mobile devices • Your paperwork
  • 12. Physical Security • Lock your screen before you leave your computer or mobile device unattended – For Windows, press & hold the Windows Key, then press L. – For Mac, press these keys at the same time: • Control + Shift + Eject (Mac with eject key) • Control + Shift + Power (Mac without eject key) • Store documents containing sensitive data in a lockable safe or cabinet • When destroying sensitive documents, at least shred them properly • Report all suspicious activities
  • 13. Workstation Security Tips: 1. Antivirus software should always receive the latest virus signatures, and set to ran full virus scans weekly. 2. Antivirus software should be configured to scan web pages, attachments, and downloads. 3. Operating System and 3rd party applications should be patched regularly
  • 14. Password Security Tips: 1. Create Strong or hard-to-guess Passwords • For example, it must have at least 8 characters, 1 uppercase, 1 lowercase,1 numeric, & a special character. You use a phase with space between words 2. Change passwords after every 90 days 3. Set a lockout threshold for failed logon attempts 4. Disable password caching on workstation and mobile devices 5. When necessary, end users may share passwords with authorized persons only 6. Do not store your password on or near your workstation 7. If available, use two-factor authentication when accessing password protected websites 8. Protect password files
  • 15. Email Threats Source - http://cdn2.hubspot.net/hub/204663/file-277596927- jpg/images/email-security.jpg
  • 16. Email Security • Basic Rules – Do not click unless you are certain that it’s safe – Think about the source, identify the sender, scan or preview the attachment, verify the legitimate web address – Sign out of your email client after use – If you are in doubt or compromised contact your IT helpdesk
  • 17. Web Threats • Instant Messaging Spam • Unsecure Websites, & Compromised Sites • Browser & Plug-in Vulnerabilities • “Malvertising” or Malicious Advertising • Denial of Service
  • 18. Web Security Tips: 1. Do not click until you are confident about the Internet link or website 2. Make sure that pop-up blocker is enabled on your web browser 3. Look at the actual web address by “hovering” mouse pointer over the link 4. Verify that you are browsing a HTTPS website, especially transmitting personal data 5. Do not assume all plug-ins are safe. Take some time to do a little research. 6. Be sure to update your browser and your plugins regularly or set them to auto update on your home PC. 1. Firefox, Chrome, Java, Flash 7. When in doubt ask your IT helpdesk
  • 19. Mobile Threats • Fake Apps • Short Messaging Spamming • Improper use of camera • Tracking users • Stealing Information
  • 20. Mobile Security Tips: 1. Keep patches updated on your device and mobile applications 2. Do not assume all apps are safe. Fake apps exist! a. Beware of apps that are mobile websites many ads b. Read the Reviews/Ratings to learn about the apps c. Look for apps with most downloads, especially those with labeled “Editor’s choice” d. Check the developer’s profile 3. Verify the source of any shared images, videos, and links before opening it. 4. Make sure location services are enabled to help find your mobile if lost or stolen. 5. When in doubt, or attacked, contact your IT helpdesk
  • 21. Remote Access Security Tips: – Wireless Networks 1. Home WiFi  Make sure your home network is password-protected.  Avoid using your personal information as Network Name or Password.  Keep firmware updated on your home wireless router. 2. Public WiFi  Beware of Fake WiFi Hotspots in coffee shops, restaurants, airports, and public areas 3. Switch off the wireless card when not in use to avoid automatically connecting to an unsecure network. – For Remote Desktop (RD) Connection, do not save your logon credentials on RD client software – If available, use Virtual Private Network (VPN) encryption when accessing work files remotely across an untrusted network.
  • 22. Takeaways Source - Security Best Practices, https://www.opswat.com/blog/10-things-include- your-employee-cyber-security-policy
  • 23. Upcoming Webinar Guidelines for Annual Nonprofit IT Budgeting Thursday October 22 4:00 – 5:00 PM EST Cedric Boyd Steve Longenecker
  • 24. Provide feedback Short survey after you exit the webinar. Be sure to include any questions that were not answered. Missed anything? Link to slides & recording will be emailed to you. Connect with us
  • 25. Author: DuMont Television/Rosen Studios, New York-photographer, Uploaded by We hope at en.wikipedia http://commons.wikimedia.org/wiki/File:20_questions_1954.JPG

Hinweis der Redaktion

  1. GTM starts recording after first slide change. Advance to second Title slide after hitting Record.
  2. Johan’s
  3. Johan’s
  4. Johan’s
  5. Mark first, then Nura
  6. Trk
  7. Trk
  8. Trk
  9. Here are examples of threats with suggestions on how to protect yourself, your data, your organization from harm: Abstract – “You control what you choose to Click.”
  10. Trk
  11. Locking all your mobile devices is important in case of theft- if the have no barriers to get into your phone, they not only have the devices, they have your data! Don't leave your PW on a sticky note on your laptop, don't make it obvious.
  12. Locking all your mobile devices is important in case of theft- if the have no barriers to get into your phone, they not only have the devices, they have your data! Don't leave your PW on a sticky note on your laptop, don't make it obvious.
  13. For physical documents this especially includes passwords, pin numbers etc.
  14. All of this is for work and  home
  15. Trk
  16. Trk Data Breaches Malicious URLs Harmful attachments Phishing attacks Social Engineering Attacks Scams
  17. Trk
  18. Trk
  19. Trk
  20. Trk – Not Apps are created equal
  21. Trk 1. Netflix, Angry Birds, have multiple fake versions. Take some time to examine the apps, and do a little research on the apps 2. Beware of apps that are just mobile websites with a lot of ads. Mostly, approached free app sites with caution. 3.
  22. Clarify "Any public wifi“ – Someone may easily be accessing your information, emails, and passwords without your knowledge when your connected to a WiFi hotspot at your local coffee shop, library, or at the airport. Steal transmitted data. If you are banking online or sending work e-mail from this fake hotspot, a hacker can see and steal your information. Don’t use any personal information.
  23. Trk
  24. Trk
  25. Johan
  26. Johan
  27. Johan.