SlideShare une entreprise Scribd logo
1  sur  18
Internet Safety at Work
Protect company, customer,
and your data online
Not their best days.
3 ways to avoid one of
“those” days.
1. Defend your computer
2. Protect data and sensitive information
3. Protect devices and data on the go
#1: Defend your computer.
Do 3 simple things:
1. Install all updates
2. Log off when you leave your desk
3. Lock up your laptop when you
leave work
#2: Protect sensitive data.
Think before you enter sensitive data
Be suspicious of attachments and links
Look out for scams and fraud
Create strong passwords
Think before you type.
Look for https (the “s” is for secure)
A closed padlock means secure, too
Are there signs the site is trustworthy?
Think before you click.
Be suspicious and aware of:
E-mail and IM attachments and links
Messages within social sites
The tricks that make you click.
Alarming messages
Misspellings and grammatical errors
Great deals
Requests for sensitive info
How to avoid the bait.
Confirm that the message is real
Type the Web address yourself
Use a browser with safety features
Passwords lock data doors.
Keep them secret
Change them often
Make them strong
Which passwords are strong?
1. 555.12.999
2. 06/04/79
3. Exp3d!ti0us
4. Ambl!anc3
5. 135781113
6. MsAw3yOiD
And the answers are…
#3 Protect devices on the go.
Do they have the latest protection?
Guard devices like you do your wallet
Don’t hand-carry sensitive data
Use caution if using a thumb drive in
another computer
On the go: wireless hotspots.
Connect securely
Know who you’re connecting to
Save sensitive uses for more trusted
connections
Sometimes things go wrong.
How do you know a PC is infected?
Your computer might run slowly
Or crash often
Or show other unusual behavior
Contact our IT department immediately
You lost WHAT?
Follow corporate IT policy
Report it immediately. Or sooner
Change all passwords
Mobile phones: get help wiping data
Have a better day…
Internet safety at work presentation

Contenu connexe

Tendances

Cybersecurity Awareness Training
Cybersecurity Awareness TrainingCybersecurity Awareness Training
Cybersecurity Awareness TrainingDave Monahan
 
IT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptOoXair
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness TrainingJen Ruhman
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsKrishna Srikanth Manda
 
Identity Theft: How to Avoid It
Identity Theft: How to Avoid ItIdentity Theft: How to Avoid It
Identity Theft: How to Avoid Ithewie
 
Email Security Awareness
Email Security AwarenessEmail Security Awareness
Email Security AwarenessDale Rapp
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Programdavidcurriecia
 
Customer information security awareness training
Customer information security awareness trainingCustomer information security awareness training
Customer information security awareness trainingAbdalrhmanTHassan
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Jay Nagar
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101mateenzero
 
Social Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness BriefingSocial Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness BriefingDepartment of Defense
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awarenessJason Murray
 
Building An Information Security Awareness Program
Building An Information Security Awareness ProgramBuilding An Information Security Awareness Program
Building An Information Security Awareness ProgramBill Gardner
 
Social Engineering,social engeineering techniques,social engineering protecti...
Social Engineering,social engeineering techniques,social engineering protecti...Social Engineering,social engeineering techniques,social engineering protecti...
Social Engineering,social engeineering techniques,social engineering protecti...ABHAY PATHAK
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationTriCorps Technologies
 

Tendances (20)

Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Cybersecurity Awareness Training
Cybersecurity Awareness TrainingCybersecurity Awareness Training
Cybersecurity Awareness Training
 
IT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.ppt
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness Training
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
 
Identity Theft: How to Avoid It
Identity Theft: How to Avoid ItIdentity Theft: How to Avoid It
Identity Theft: How to Avoid It
 
Email Security Awareness
Email Security AwarenessEmail Security Awareness
Email Security Awareness
 
Basic Security Training for End Users
Basic Security Training for End UsersBasic Security Training for End Users
Basic Security Training for End Users
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Program
 
Customer information security awareness training
Customer information security awareness trainingCustomer information security awareness training
Customer information security awareness training
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101
 
Social Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness BriefingSocial Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness Briefing
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awareness
 
Building An Information Security Awareness Program
Building An Information Security Awareness ProgramBuilding An Information Security Awareness Program
Building An Information Security Awareness Program
 
Social Engineering,social engeineering techniques,social engineering protecti...
Social Engineering,social engeineering techniques,social engineering protecti...Social Engineering,social engeineering techniques,social engineering protecti...
Social Engineering,social engeineering techniques,social engineering protecti...
 
Security awareness
Security awarenessSecurity awareness
Security awareness
 
Security Awareness Training by Fortinet
Security Awareness Training by FortinetSecurity Awareness Training by Fortinet
Security Awareness Training by Fortinet
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
 
PHISHING attack
PHISHING attack PHISHING attack
PHISHING attack
 

En vedette

研究Introduction part
研究Introduction part研究Introduction part
研究Introduction partakolamlam
 
復修Vs拆卸重建(彻
復修Vs拆卸重建(彻復修Vs拆卸重建(彻
復修Vs拆卸重建(彻akolamlam
 
Stuvwxyz
StuvwxyzStuvwxyz
Stuvwxyznili
 
The art of being well
The art of being wellThe art of being well
The art of being wellrfoaltis
 
To conceive a boy
To conceive a boyTo conceive a boy
To conceive a boyJane Smith
 
Magazines and books_in_the_classroom
Magazines and books_in_the_classroomMagazines and books_in_the_classroom
Magazines and books_in_the_classroomallandone
 
Final presentation compressed
Final presentation compressedFinal presentation compressed
Final presentation compressedLiz S
 
How do organisms maintain body temperature
How do organisms maintain body temperatureHow do organisms maintain body temperature
How do organisms maintain body temperaturecarnaths
 
LowCountryVolkswagen.com_AAA Traffic Safety Index
LowCountryVolkswagen.com_AAA Traffic Safety IndexLowCountryVolkswagen.com_AAA Traffic Safety Index
LowCountryVolkswagen.com_AAA Traffic Safety IndexLowCountry Volkswagen
 
高街鬼屋 保育方式的爭議
高街鬼屋 保育方式的爭議高街鬼屋 保育方式的爭議
高街鬼屋 保育方式的爭議akolamlam
 
Gender baby predictor
Gender baby predictorGender baby predictor
Gender baby predictorJane Smith
 

En vedette (20)

Intro nsl-sc-july
Intro nsl-sc-julyIntro nsl-sc-july
Intro nsl-sc-july
 
Lee y cuenta
Lee     y  cuentaLee     y  cuenta
Lee y cuenta
 
研究Introduction part
研究Introduction part研究Introduction part
研究Introduction part
 
復修Vs拆卸重建(彻
復修Vs拆卸重建(彻復修Vs拆卸重建(彻
復修Vs拆卸重建(彻
 
Gazpacho 2
Gazpacho 2Gazpacho 2
Gazpacho 2
 
Yourprezi
YourpreziYourprezi
Yourprezi
 
Have a girl
Have a girlHave a girl
Have a girl
 
Stuvwxyz
StuvwxyzStuvwxyz
Stuvwxyz
 
The art of being well
The art of being wellThe art of being well
The art of being well
 
Uneecops company profile
Uneecops company profileUneecops company profile
Uneecops company profile
 
To conceive a boy
To conceive a boyTo conceive a boy
To conceive a boy
 
Magazines and books_in_the_classroom
Magazines and books_in_the_classroomMagazines and books_in_the_classroom
Magazines and books_in_the_classroom
 
Final presentation compressed
Final presentation compressedFinal presentation compressed
Final presentation compressed
 
How do organisms maintain body temperature
How do organisms maintain body temperatureHow do organisms maintain body temperature
How do organisms maintain body temperature
 
LowCountryVolkswagen.com_AAA Traffic Safety Index
LowCountryVolkswagen.com_AAA Traffic Safety IndexLowCountryVolkswagen.com_AAA Traffic Safety Index
LowCountryVolkswagen.com_AAA Traffic Safety Index
 
Final project group 3
Final project  group 3Final project  group 3
Final project group 3
 
高街鬼屋 保育方式的爭議
高街鬼屋 保育方式的爭議高街鬼屋 保育方式的爭議
高街鬼屋 保育方式的爭議
 
Bombas berlinesas
Bombas  berlinesasBombas  berlinesas
Bombas berlinesas
 
CC
CCCC
CC
 
Gender baby predictor
Gender baby predictorGender baby predictor
Gender baby predictor
 

Similaire à Internet safety at work presentation

The Net is Dangerous
The Net is DangerousThe Net is Dangerous
The Net is DangerousGihan Dias
 
Employee Security Awareness Training
Employee Security Awareness TrainingEmployee Security Awareness Training
Employee Security Awareness TrainingDenis kisina
 
CYBER SECURITY AWARENESS.pptx
CYBER SECURITY AWARENESS.pptxCYBER SECURITY AWARENESS.pptx
CYBER SECURITY AWARENESS.pptxTapan Khilar
 
Home and Business Computer Security 2014
Home and Business Computer Security 2014Home and Business Computer Security 2014
Home and Business Computer Security 2014B2BPlanner Ltd.
 
7 Small Business Security Tips
7 Small Business Security Tips7 Small Business Security Tips
7 Small Business Security TipsInfusionsoft
 
Internet Security at Work Presentation
Internet Security at Work PresentationInternet Security at Work Presentation
Internet Security at Work Presentationredbackacademy
 
Notes to The Ten Commandments of Online Security and Privacy
Notes to The Ten Commandments of Online Security and PrivacyNotes to The Ten Commandments of Online Security and Privacy
Notes to The Ten Commandments of Online Security and PrivacyJonathan Bacon
 
Rothke Sia 2006
Rothke   Sia 2006Rothke   Sia 2006
Rothke Sia 2006Ben Rothke
 
Keep Your Computers Safe And Secure
Keep Your Computers Safe And SecureKeep Your Computers Safe And Secure
Keep Your Computers Safe And SecureRob Clement
 
6 Cyber Security Introduction - sec101-idtheft .pptx
6 Cyber Security Introduction - sec101-idtheft .pptx6 Cyber Security Introduction - sec101-idtheft .pptx
6 Cyber Security Introduction - sec101-idtheft .pptxDevenderDahiya9
 
It security,malware,phishing,information theft
It security,malware,phishing,information theftIt security,malware,phishing,information theft
It security,malware,phishing,information theftDeepak John
 
A Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the InternetA Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the Internet- Mark - Fullbright
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pestspeterhitch
 
ICT and end user security awareness slides
ICT and end user security awareness slidesICT and end user security awareness slides
ICT and end user security awareness slidesjubke
 
Data theft
Data theftData theft
Data theftLaura
 
DTI_Information Security Trainig_07-12-2020.pptx
DTI_Information Security Trainig_07-12-2020.pptxDTI_Information Security Trainig_07-12-2020.pptx
DTI_Information Security Trainig_07-12-2020.pptxabhishekkumar807235
 

Similaire à Internet safety at work presentation (20)

The Net is Dangerous
The Net is DangerousThe Net is Dangerous
The Net is Dangerous
 
Employee Security Awareness Training
Employee Security Awareness TrainingEmployee Security Awareness Training
Employee Security Awareness Training
 
CYBER SECURITY AWARENESS.pptx
CYBER SECURITY AWARENESS.pptxCYBER SECURITY AWARENESS.pptx
CYBER SECURITY AWARENESS.pptx
 
Home and Business Computer Security 2014
Home and Business Computer Security 2014Home and Business Computer Security 2014
Home and Business Computer Security 2014
 
7 Small Business Security Tips
7 Small Business Security Tips7 Small Business Security Tips
7 Small Business Security Tips
 
Internet Security at Work Presentation
Internet Security at Work PresentationInternet Security at Work Presentation
Internet Security at Work Presentation
 
Notes to The Ten Commandments of Online Security and Privacy
Notes to The Ten Commandments of Online Security and PrivacyNotes to The Ten Commandments of Online Security and Privacy
Notes to The Ten Commandments of Online Security and Privacy
 
Building a culture of security
Building a culture of securityBuilding a culture of security
Building a culture of security
 
Rothke Sia 2006
Rothke   Sia 2006Rothke   Sia 2006
Rothke Sia 2006
 
Keep Your Computers Safe And Secure
Keep Your Computers Safe And SecureKeep Your Computers Safe And Secure
Keep Your Computers Safe And Secure
 
6 Cyber Security Introduction - sec101-idtheft .pptx
6 Cyber Security Introduction - sec101-idtheft .pptx6 Cyber Security Introduction - sec101-idtheft .pptx
6 Cyber Security Introduction - sec101-idtheft .pptx
 
It security,malware,phishing,information theft
It security,malware,phishing,information theftIt security,malware,phishing,information theft
It security,malware,phishing,information theft
 
A Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the InternetA Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the Internet
 
security.pptx
security.pptxsecurity.pptx
security.pptx
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pests
 
IT Security DOs and DON'Ts
IT Security DOs and DON'TsIT Security DOs and DON'Ts
IT Security DOs and DON'Ts
 
ICT and end user security awareness slides
ICT and end user security awareness slidesICT and end user security awareness slides
ICT and end user security awareness slides
 
Data theft
Data theftData theft
Data theft
 
Protect
ProtectProtect
Protect
 
DTI_Information Security Trainig_07-12-2020.pptx
DTI_Information Security Trainig_07-12-2020.pptxDTI_Information Security Trainig_07-12-2020.pptx
DTI_Information Security Trainig_07-12-2020.pptx
 

Dernier

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Principled Technologies
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024SynarionITSolutions
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024The Digital Insurer
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 

Dernier (20)

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 

Internet safety at work presentation

  • 1. Internet Safety at Work Protect company, customer, and your data online
  • 3. 3 ways to avoid one of “those” days. 1. Defend your computer 2. Protect data and sensitive information 3. Protect devices and data on the go
  • 4. #1: Defend your computer. Do 3 simple things: 1. Install all updates 2. Log off when you leave your desk 3. Lock up your laptop when you leave work
  • 5. #2: Protect sensitive data. Think before you enter sensitive data Be suspicious of attachments and links Look out for scams and fraud Create strong passwords
  • 6. Think before you type. Look for https (the “s” is for secure) A closed padlock means secure, too Are there signs the site is trustworthy?
  • 7. Think before you click. Be suspicious and aware of: E-mail and IM attachments and links Messages within social sites
  • 8. The tricks that make you click. Alarming messages Misspellings and grammatical errors Great deals Requests for sensitive info
  • 9. How to avoid the bait. Confirm that the message is real Type the Web address yourself Use a browser with safety features
  • 10. Passwords lock data doors. Keep them secret Change them often Make them strong
  • 11. Which passwords are strong? 1. 555.12.999 2. 06/04/79 3. Exp3d!ti0us 4. Ambl!anc3 5. 135781113 6. MsAw3yOiD
  • 12. And the answers are…
  • 13. #3 Protect devices on the go. Do they have the latest protection? Guard devices like you do your wallet Don’t hand-carry sensitive data Use caution if using a thumb drive in another computer
  • 14. On the go: wireless hotspots. Connect securely Know who you’re connecting to Save sensitive uses for more trusted connections
  • 15. Sometimes things go wrong. How do you know a PC is infected? Your computer might run slowly Or crash often Or show other unusual behavior Contact our IT department immediately
  • 16. You lost WHAT? Follow corporate IT policy Report it immediately. Or sooner Change all passwords Mobile phones: get help wiping data
  • 17. Have a better day…

Notes de l'éditeur

  1. This presentation is part of the Microsoft Trustworthy Computing Internet Safety at Work Kit for large organizations. It introduces employees in your organization to ways they can help keep company, customer, and personal information safe when using the Internet from their corporate desktop or mobile computers and phones.
  2. This is a hidden slide and should not be a part of your presentation. HIGH LEVEL OUTLINE for this presentation which covers three ways to protect data online: Defending your computer. Protecting sensitive data. Protecting devices and data on the go, away from work. As you proceed through the slides, you’ll get practical specific, advice about how to do each one. LENGTH: As written, the presentation is about 20 minutes long. SUPPLEMENTAL MATERIALS: You may want to distribute the card “Top Tips for Internet Safety at Work” at the end of your presentation. CUSTOMIZING THIS PRESENTATION: You may want to insert information specific to your organization at certain points. For example: After the title slide: You may want to kick off your presentation with the video included in this kit (Slide 3). Slide 6 (Defend your computer): An opportunity to give an overview of your company’s/organization’s key IT policies. Slides 16 & 17 (When things go wrong): You may want to edit these to be consistent with your own policies and procedures. Before Slide 20 (the last slide): If you haven’t already, you may want to show the video here to recap your presentation. Please see the card that came with the thumb drive for more information about this kit and how to make best use of it. (If you’ve misplaced it, the Internet Safety at Work Readme has all of the information.)
  3. PREPARATION NOTES: Before you begin, you may first want to show the three-minute video, “Stay Sharp on Internet Safety.” (You can also show it before Slide 20 as a recap of your presentation.) This is a hidden slide. If you want to show the video, before the presentation right-click the slide, and click Unhide to make the slide visible in the presentation. You may want to make a test run before your presentation to ensure the video is functioning properly. To show the video: Make sure that both this presentation and the video are copied to the same directory on your computer so you can run the video right from the deck. Double-click the link in the slide to start the video. When it is complete, make sure your mouse is not hovering over the video image, but rather in the white space around the video. Then click to continue with your presentation.
  4. In the world of online security at work, none of us want to stand out like this. But these are the kinds of things that happen in companies everywhere: A thief steals a company laptop or mobile phone. Someone opens a virus-laden e-mail attachment from a friend or colleague—or someone posing as that friend. An employee loses customer data on a thumb drive or to a computer virus or other malicious software. These kinds of things are happening in organizations everywhere, and in the end, the company pays the price in reputation, customers, liability. So, for the next 20 minutes or so, I’m going to talk about things to do so that you and our company have good days—and not bad ones.
  5. We’ll cover three areas: How to defend your computer. How to protect company, customer, and personal data and sensitive information. How to protect devices and data when you’re away from the office. These are easy things. And they work really well if you do them all the time.
  6. PREPARATION NOTES:Here’s an opportunity to add an overview of how your company works to protect computers, laptops, mobile phones, and other devices against viruses, spyware, and other threats to network security and sensitive data. First, let’s talk about the three simple steps you can take to help guard your computer. 1. INSTALL ALL SECURITY UPDATES that our IT department requires. These are our first line of defense and include: Windows and Office updates. Browser updates. Antivirus and antispyware software. (To make sure you update them regularly, take advantage of automated updates.) Software that you use to connect securely from remote locations. Settings for e-mail filters. Two other easy things you can do to help keep your data safe: 2. LOG OFF your computer. 3. LOCK UP YOUR LAPTOP.
  7. 2. Defending sensitive data is the most important area we’ll talk about today. There are four basic strategies: Think before entering sensitive data on Web sites. Be suspicious of attachments and links. Know what phishing and scams look like. Create strong passwords.
  8. For starters, before you enter sensitive data on a Web form or page, look for two things: 1. Signs that the site uses data encryption: https (“s” is for secure). A closed padlock. It must be here, beside the Web address, or in the lower right corner of the window. 2. Signs of a trusted site, such as the green address bar in Windows® Internet Explorer®. The graphic in the slide shows what each of those things looks like in your browser. That’s the first strategy for protecting sensitive information. Another precaution you can take is to think before you click.
  9. BE SUSPICIOUS OF ATTACHMENTS AND LINKS. There are several reasons to use caution: Senders can be phony. A virus (the colds and flu of computing, designed to spread to other computers) may have sent the mail you just received. Spyware can hide in e-mail attachments. Open one and you may download spyware which can track what you do on your computer. It may enable criminals to collect company or personal information, record account numbers and passwords as you type, or bombard you with pop-up ads. Click links or download videos and photos and you could be downloading a virus along with them. Links can go to phony Web sites. Toll-free numbers can go to fraudulent call centers. Keep in mind: If you click, you catch. MESSAGES ON SOCIAL SITES: Just because the e-mail message says it’s a LinkedIn update, doesn’t mean it is. Messages you get when you’re using a social site such as Facebook, LinkedIn, and Twitter can have viruses or be trying to entice you to divulge sensitive information, too. TO REPEAT: “THINK BEFORE YOU CLICK” IS A BEST PRACTICE FOR PROTECTING SENSITIVE DATA, but you also need to be on the lookout for scams and fraud in e-mail and instant messages.
  10. Phishing scams, for example, are a sneaky form of spam designed by criminals to fool us. It can look like a message from a company you trust—supplier or company’s bank, even from within your own company. It may ask you to reveal sensitive data. It can be very convincing. To protect yourself, LEARN THE SIGNS OF PHISHING: Alarmist messages: When we’re alarmed, we sometimes put our suspicions aside. “Your account will be closed if we don’t hear from you.” “A virus has corrupted our database. Please re-confirm your information NOW.” Misspellings and grammatical errors. If a deal sounds too good to be true, it probably is. Requests for sensitive info (for example, account numbers or help in “transferring funds.”) It’s important to note that reputable companies DON’T send e-mail that asks for sensitive info. DON’T THINK THAT YOU CAN BE FOOLED? WOULD YOU FALL FOR THIS? A newly-hired COO received e-mail from what looked like his company’s travel agency. He was asked to click the link and make sure his details were accurate. He did and went to an official-looking site where he found his personal data. He was asked to download software that would link his Outlook e-mail account to the travel agency’s booking system. In so doing, he downloaded Trojan horse malware which spread quickly through his new company. THOSE ARE SOME OF THE PHISHING TRICKS. Staying alert to the warning signs is your first defense. But what else can you do if you get a suspicious message?
  11. CONFIRM WITH THE SENDER THAT THE E-MAIL OR INSTANT MESSAGE IS REAL Call the company using a number you already have for it. Or check it against what you find on Bing, Google, or an online phone directory. To visit the site, TYPE THE WEB ADDRESS YOURSELF instead of clicking the link in the message. Or, use your own bookmark or favorite. USE A BROWSER WITH SAFETY FEATURES Such as the anti-phishing feature (SmartScreen® Filter) and the pop-up blocker that’s on by default in Internet Explorer 8. If you’re ever in doubt about a site, consult a Web site that identifies known scams: Such as www.snopes.com. Another way to protect sensitive data is to use strong passwords.
  12. You lock your house, your car, your bike. You also need to lock up corporate assets, client info, accounts, computers, mobile phones, etc. To do this on your computer: KEEP PASSWORDS SECRET If stolen, everything they protect is at risk. Don’t share them with friends, colleagues, or businesses. Don’t use the same password (or simple variations) for different accounts or services. Don’t store passwords on your phone or in a file on your computer or on a post-it on your computer. It’s okay to store them on a well-hidden sheet of paper. Don’t let someone trick you into revealing them. CHANGE THEM OFTEN: Change the important ones regularly—like the one for your computer or mobile phone. MAKE THEM STRONG At least eight characters. Upper and lower case letters, numbers, and symbols. Easy for you to remember and hard for others to guess. Avoid number sequences, your pet’s name, birth date, Social Security numbers, and the like. Don’t use words that you can find in the dictionary. Avoid using only look-alike substitutions of numbers or symbols. Choose a sentence that’s easy to remember and difficult for others to guess and use it as the basis of a password. (See below for an idea about how to present this.) CUSTOMIZING THE PRESENTATION: Ask the group to create a phrase that’s eight words or longer—like the first line of a favorite song. Take the first letter of each word to make the password. Substitute numbers or symbols for some of the letters—like “3” for “E” or “!” for “L.”
  13. CUSTOMIZING THIS PRESENTATION This is an opportunity for the audience to test their password knowledge. There are several ways you can handle this: If you have a white board or flip chart, you can do this as a group activity: One password at a time, ask the group to decide whether it’s strong or not and discuss why. If people have paper and pen, ask everyone to do this as a task either by themselves or in pairs. Or simply give everyone a minute or two to think about which of these are strong, and which weak. When you’re ready to see the results, go to the next slide.
  14. EXPLAINING THE ANSWERS: WEAK. Only numbers, possibly a Social Security number, which criminals can easily find online. WEAK. A date—birth or anniversary date, for example—can be known and easily found by a criminal. WEAK. Don’t use words you can find in any dictionary in any language (expeditious). Criminals will not be fooled by common look-alike replacements such as “3” for “e”. STRONG. Letters, symbols, numbers, not a word found in the dictionary. WEAK. Only numbers. Avoid sequences (or repeated numbers, like 22222222). STRONG. A sentence that’s easy to remember, but difficult for others to guess. Eight characters or longer. Take the first letters of this sentence: My son Aiden was 3 years Old in December. Add complexity by mixing upper and lower case letters, symbols, and numbers. Having reviewed many ways you can protect sensitive information, let’s look at the third way to avoid a bad day…
  15. …protecting devices when you’re away from work These include laptops, thumb drives (USB or flash drives), mobile phones. DO YOUR DEVICES HAVE THE LATEST PROTECTION? Make it part of your travel routine. Update before you leave. GUARD YOUR DEVICES LIKE YOU DO YOUR WALLET. For example, lock your mobile phone when you’re not using it. DON’T HAND-CARRY SENSITIVE DATA. On your laptop or thumb drive. It’s not worth the risk. If you lose it, anyone can access it. If you must take sensitive data, encrypt it. However, encryption only slows access to data; it doesn’t prevent access from a determined hacker after really valuable data. IF YOU USE YOUR THUMB DRIVE IN ANOTHER COMPUTER: That computer may be infected and could corrupt the thumb drive and ultimately your computer. When you re-insert the drive into your computer, click the Close button in any message that pops up so you don’t give any malware a chance to run. But you need to do more than protect the physical devices when you’re on the road…
  16. …Wireless hotspots can be risky, so here are ways to connect to the Web more safely: CONNECT SECURELY. Choose: The most secure connection, even if it means paying for it. Ask about it before you connect. WEP (at least) that encrypts (or scrambles) data as it travels between your laptop and the wireless access point. (WEP stands for Wired Equivalent Privacy. It is a system of data encryption that prevents access to a wireless network.) A password-protected connection, ideally one that is unique for your use. KNOW WHO YOU’RE CONNECTING TO Confirm the exact spelling of the network you’re connecting to. Beware of clever (slightly misspelled) fakes. For example: HLTONHOTELSNET vs. HILTONHOTELSNET. (There’s no “I” in the first Hilton.) Check the privacy statement on the network's Web site. No privacy statement? Wait until you return to the office to conduct sensitive business. SAVE SENSITIVE USES FOR MORE TRUSTED CONNECTIONS Don’t bank or make other financial transactions at a wireless hotspot. Don’t download, install, or update software. Use e-mail with the understanding that it can open the door to illegal access to corporate networks and data. Turn off the wireless connection when you’re not using it.
  17. INFECTED PC Despite all our best efforts, sometimes a virus or spyware can slip through. How would you know? Your computer exhibits unusual behavior: slows to a crawl, crashes often. Programs don’t save files properly. And so on. CONTACT THE IT DEPT If you have the slightest suspicion that your computer or other device might be infected, contact IT. They can help you fix the problem. The security of sensitive data on your computer depends on this, and possibly the security of the company network.
  18. IF A DEVICE OR DATA GOES MISSING: Make sure to follow corporate IT policy when this happens. This might include: Reporting it immediately. Changing all passwords. Getting help from IT in remote wiping of data on mobile phones. CUSTOMIZING THIS PRESENTATION You may want to adjust this slide so it’s consistent with your organization’s IT policies.
  19. We want all of you to have THESE kinds of better days. In the last few minutes, we’ve covered three ways to avoid a bad day: Defend your computer, protect sensitive data, and protect devices when you’re away from the office. Remember these top tips: Keep up with updates. Think before you share sensitive information on Web sites. Think before you click links or open attachments. Watch out for e-mail scams and phishing. Use strong passwords. Keep them secret. On the go: be on guard, be wireless-wary. PREPARATION NOTES: At this point, you may want to: Distribute the TIP CARD, “Top Tips for Internet Safety at Work,” and review it with the group. If you haven’t already done so, show the video (hidden Slide 3), “Stay Sharp At Work,” as a recap of your presentation. Thanks for your time.