1 / 47

Cyber Security Awareness Month

Cyber Security Awareness Month. Off-Campus Safe Computing Part 2. Using Your Laptop Safely On the Road. Introductions. Allen Monette Security Coordinator Office of Campus Information Security. OCIS Brown Bag Series. Worst Practices, or 10 Easy Steps to Loosing Your Data

tale
Download Presentation

Cyber Security Awareness Month

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Cyber Security Awareness Month Off-Campus Safe Computing Part 2 Using Your Laptop Safely On the Road

  2. Introductions Allen Monette Security Coordinator Office of Campus Information Security

  3. OCIS Brown Bag Series • Worst Practices, or 10 Easy Steps to Loosing Your Data • Protecting Your Laptop’s Data • Using Your Laptop Safely on the Road • Finding and Protecting Sensitive Data on Your Computer • Protecting Data by Using Network and Server Scanning Tools

  4. Rick’s Road Trip

  5. Rick’s New Laptop

  6. Rick visits his favorite coffee shop

  7. Hey, Free WiFi!

  8. Rick on the Road

  9. Rick’s New Laptop

  10. Rick’s New Laptop

  11. Rick’s return

  12. Account Balance: $0

  13. 2005 Wisconsin Act 138 requires entities to notify individuals of certain unauthorized acquisitions of personal information. “Personal information” means an individual’s last name and the individual’s first name or first initial, in combination with and linked to any of the following elements, if the element is not publicly available information and is not encrypted, redacted, or altered in any manner that renders the element unreadable: (a) the individual’s Social Security number; (b) the individual’s driver’s license number or state identification number; (c) the number of the individual’s financial account number, including a credit or debit card account number, or any security code, access code, or password that would permit access to the individual’s financial account; (d) the individual’s DNA profile; and (e) the individual’s unique biometric data, including fingerprint, voice print, retina or iris image, or any other unique physical characteristic.

  14. Let’s go Back In Time

  15. Rick isn’t a bad user • Did workto secure his computer • What he did is good for a desktop on a protected network • Not so good for the wilds of Free WiFi

  16. Credit Card What happened?

  17. Solutions What to do?

  18. Solutions • File on desktop • don’t store that data! • If you must store it, encrypt it! • Lock your workstation; use screensaver passwords • Don’t leave your laptop unattended • Be aware of those around you

  19. Email + Break-in What happened?

  20. Solutions What to do?

  21. Solutions • Know how to spot a phishing attempt • Use different credentials for different accounts • Use a VPN

  22. Laptop Lost; Cash gone What happened?

  23. Solutions What to do?

  24. Solutions • OS hardening • require username/password to login • Encrypt! • Use removable storage; better yet use network storage • Lojack for laptops • Security screening line strategies

  25. Rules of the Road • Store no data locally • Since we know 1 is hard: Encrypt! • Practice Defensive Networking – Use VPN • Know where your laptop is at all times

  26. Questions?

More Related