Weitere ähnliche Inhalte Ähnlich wie Pcs academy october_2020_security Ähnlich wie Pcs academy october_2020_security (20) Mehr von Hugo Ivan Arellano Ibarra Mehr von Hugo Ivan Arellano Ibarra (7) Kürzlich hochgeladen (20) Pcs academy october_2020_security2. FACULTY
Francisca Martinez
PCS SF– EPS Analyst
Bachelor Degree in Business, actually making a
Master Degree in Finance. Joined Accenture in August
2016 as Project Control Services Analyst. She began
working in the invoicing process for customers as
Banorte, Goldcorp, BC Hydro, Level 3 and COX,
providing support to resources from Mexico, US,
Canada and Argentina.
In May 2017, started as PMO in TJX Inc, working as
Resource Manager providing the Staffing updates
directly to the customer, and working with resources
of different countries as US, Canada, India and UK.
She’s a big Harry Potter fan, enjoy bake different
desserts, read and spend time with her family and
friends.
3. 3
Copyright © 2020 Accenture. All rights reserved.
COURSE OBJECTIVES
After this training, you will know
How to protect
your
equipment
Security Tips
for Home
Office
Security Tips
for Office
How to
protect your
information
4. How to protect my
equipment?
Accenture will provide
• Laptop
• Laptop Lock
• Headset
• Backpack
Your laptop must be always locked
Copyright © 2020 Accenture. All rights reserved.
5. Given the COVID-19 situation, more
Accenture people are working remotely than
ever before
When connecting to a new network, select "do not allow my computer to be discoverable by
other devices on the network" to turn off network discovery and folder sharing.
Where you have the ability to control it:
Change the default administrator password on your router to one that is both strong and
unique.
Enable WPA2 or WPA3 on your router to encrypt your online activity.
Create a strong network password of 8 characters or more and only share it with people you
trust.
Monitor your Wireless Router vendor or your Internet Service Provider (ISP) regularly for
security patches and firmware upgrades for your router device(s) and apply them when
available.
For additional information on configuring your home wireless network, reference the Home
Wireless Guidelines.
• If working in public,
• If you can, use your smartphone as a hotspot to connect to the internet.
• If you must use a public network, confirm with the establishment that the network is genuine before connecting and only navigate to sites that begin with "https"—indicating an encrypted connection.
• NOTE: Sensitive Accenture and client applications may require you to connect via VPN to access.
Copyright © 2020 Accenture. All rights reserved.
7. Laptop
• Laptop safe and locked
Alexa
• Turned off when working
Privacy
• Don’t make important calls in
an open space
Personal
information
• Don’t log into your personal
email, facebook, youtube, etc.
Copyright © 2020 Accenture. All rights reserved.
8. Working in
your City
In order to work in another City
different than Monterrey ATC, or if you
need to travel between México, you
need to:
• Get Lead’s approval
• Sign HR disclaimer letter
Working from another
country is not allowed, it
needs to be reviewed by
your Lead and Mobility
Team
Copyright © 2020 Accenture. All rights reserved.
9. Working in the Office
Copyright © 2020 Accenture. All rights reserved.
11. INFORMATION SECURITY
What we do?
Protecting Accenture’s clients, our employees and Accenture’s own data and operations poses challenges that
call for the best from our own professional services, including the people, strategies, processes and
technologies found within Accenture’s Information Security function.
Copyright © 2020 Accenture. All rights reserved.
12. TOP TEN INFORMATION SECURITY BEHAVIORS
1 PISHING
Is a fraudulent attempt to access personal financial account information or
a corporate network.
Watch for signs of Phishing and verify emails are authentic.
• Only open expected emails from known senders
• Review the hyperlinks to ensure they are overwritten by Proofpoint's or
direct you to reputable websites
• Click the Report Phishing button in Outlook if you receive a suspicious
emails to your Accenture account.
Mention the 4 signs of suspicions
of Phishing on this email.
Copyright © 2020 Accenture. All rights reserved.
13. 2 USE APPROVED STORAGE
Unless provided by your client, only save sensitive information to devices or services provided by
Accenture
• Do not put sensitive information on personal devices or in public domain
• Do not email sensitive information to personal email accounts
• Do not store or transmit sensitive Accenture Information via client systems
Good Practices?
• https://mylearning.accenture.com/myl-ui/learner/activityDetails?activityID=1454679
• https://mylearning.accenture.com/myl-ui/learner/activityDetails?activityID=1230976
3 SCRUBBING
Confirm sharing of work products is permissible and scrub all sensitive data prior to distribution
• Only store documents with those who have business need
• Remove all logos and identifying features from documents
• Provide file links to data repositories, like SharePoint, rather than emailing attachments
4 RESTRICT ACCESS
Access Control, Restrict Access to work products with Accenture and client provided tools.
• Restrict Access to Accenture work products with the Permissions Toolbar, WinZip Encryption
controlled OneDriver/SharePoitn, restrict access to client work products with client provided
• Verify users who have access to your work products have business need
Copyright © 2020 Accenture. All rights reserved.
14. 5 CHECK EMAILS BEFORE SENDING
Before sending, ensure emails are address to the correct person and only intended files are attach
• Always confirm you are sending the right information to the right people
6 CREATE UNIQUE PASSWORDS
Keep your work passwords unique and only use your Accenture Account credentials for business
Read through the following do`s and don'ts' of handling your credentials
• Do not document your passwords
• Do not use your Accenture credentials for personal websites
• Use two-factor identification whenever possible
7 ENABLE SECURITY SOFTWARE
Keep your security software's enable and restart computer regularly to keep the software current
• Do not circumvent security controls on Accenture workstation
• Do not install or use peer software
Delete all sensitive information from your storage location when rolling off on assignment
• Delete all sensitive information from your storage locations
• If you have permission to keep the files, scrub all work products.
Copyright © 2020 Accenture. All rights reserved.
15. 9 DELETE WORK PRODUCTS AFTER ACCENTURE
Do not keep any work products if you stop working on Accenture
• Understand Accenture owns all work products during your time at Accenture
• Do not email sensitive information to personal email account
10 CALL ASOC
Call Accenture Security Operation Center (ASOC) immedialty at +1 202 728 0645 if you
cyber or personal security indecent.
For Further Security Support you can visit
-Policy 57-
https://in.accenture.com/protectingaccenture/about-is/
https://in.accenture.com/protectingaccenture/top-is-behaviors/
Copyright © 2020 Accenture. All rights reserved.
16. Accenture’s Social Engineering
16
AWARENESS & ENABLEMENT
Branded awareness messaging
with links to resources
Phishing Prevention and Social Engineering awareness videos
Packaged material for local
Information Security leads to
cascade
Incentivized and interactive
training on recognizing Social
Engineering attempts
Management of the
PHISHING
PROTECTION
PROGRAM (PPP)
for those who fail
multiple tests
TESTING & REPORTING
QUARTERLY
SOCIAL
ENGINEERING
tests sent to all
of Accenture
people globally
REPORT
PHISHING
PHISHME
Copyright © 2020 Accenture. All rights reserved.
17. IS Advocate Program
17
IS Advocates identify social
engineering attempts at a higher rate
than non-advocates.
IS Advocates consistently score
better than the rest of the
company on our bi-annual
behavior survey. IS Advocates are 50% less likely to
contribute to a security incident,
compared to the general Accenture
population.
Advocate program has grown
significantly in popularity and impact
since inception.
I have done this training and
I am very confident now that I am
following all the right ways to
protect Accenture and my client
from vulnerable attacks.
• Learning program with highly tailored, immersive scenarios that employees can relate to and learn from.
• Largest driver of real, lasting behavioral change for information security awareness and secure behavior
adoption throughout the company.
• Mandatory for all employees and accelerated for high-risk groups.
Copyright © 2020 Accenture. All rights reserved.
20. Accenture Offices
Located in Monterrey, Nuevo León, you can find the offices in
Oficinas en el Parque, Blvd. Antonio L. Rodríguez #1884, Santa
Maria, 64650.
• Tower 1
• Floor 3 to 7
• Tower 2
• Reception - Lobby
• Floor 3
• Floor 9 to 10