1 / 18

Biography

Protecting Your Identity: Information Security Basics Presented by: Barbara D. Kissner SVP & CIO International Fidelity Insurance Company March 18, 2014. Biography. Barbara Kissner International Fidelity Insurance Company Senior Vice President, Chief Information Officer

abe
Download Presentation

Biography

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Protecting Your Identity:Information Security BasicsPresented by: Barbara D. KissnerSVP & CIO International Fidelity Insurance Company March 18, 2014

  2. Biography Barbara Kissner International Fidelity Insurance Company Senior Vice President, Chief Information Officer Barbara Kissner joined International Fidelity Insurance Company in 2007 as SVP and Chief Information Officer. Her responsibilities include management of the company’s telecommunications, IT and Licensing departments as well as overseeing the company’s Disaster Recovery plan and IFIC’s Regulatory Committee. Prior to joining IFIC, Barbara served as the Chief Information Security Officer for BankAtlantic in Fort Lauderdale, FL, and Senior Vice President of Global IT Risk Management for The CIT Group. Barbara has authored many published articles on subjects ranging from e-commerce to information engineering and holds the CISA, CSTE, CSQA, CGEIT and CRISC designations. This year, she has been named one of Computerworld’s Premier 100 IT Honorees for 2014.

  3. Agenda • Security Awareness • Requests for confidential information • Unexpected email and attachments • SPAM • Internet safety • Phishing attempts • Protecting your laptop and yourself • Q&A

  4. What is Security Awareness? … it is the knowledge and attitude members of an organization possess regarding the protection of the physical and, especially, information assets of that organization. (Wikipedia)

  5. Requests for Confidential Information • Do not provide confidential information to unknown sources • This is especially true for unsolicited email and telephone calls • Verify who is asking before you respond • Spoofers use professional sounding names and organizations to get you to reveal information • Legitimate companies do not ask you to “verify” SSN, PIN, date of birth, account number through email

  6. Unexpected Email Attachments • If you receive email from an unknown source, don’t open it • Never open or forward unexpected attachments • Do not respond to SPAM email • No, you did not win that free trip • Those guys are not really going to put $30 million in your bank account • Do not open or forward chain letters • Do not “unsubscribe” from an unknown email list or SPAM: To unsubscribe from this mailing list: click here or send a blank message to: TopNotchRewards.o-9c93cbb-4c9.xx.xx.com.-bkissner@07.mailmx01.com

  7. Spam

  8. More Spam

  9. And More, Dangerous Spam

  10. Internet Safety • Firewalls are a must, even for Macs • Buy AntiVirus and AntiSpyware and install them on every computer in your home • Wireless Networks • Turn off SSID broadcasting – this tells everyone in the neighborhood who you are • Change the installation passwords – everyone knows them • Enable WPA encryption • Know the names of the machines on your network and regularly look for intruders

  11. Look For Security Features Windows Explorer LOCK HTTPS

  12. Other Browsers Google Chrome Firefox Safari

  13. Social Websites • Popular social sites include Facebook, LinkedIn, Pinterest, Instagram • Anything you post can be discovered • Prospective employers, universities and corrections agencies regularly scan these sites • Remember, even if you delete your entries or responses, someone already has a copy

  14. Phishing – Part 1

  15. Phishing – Part 2

  16. Protect Your Laptops and Phones • Store in secure place when you leave your office • Keep out of view when stored in your car • Don’t leave unattended in public places • Be especially careful in airports and train stations • Watch out for Spam text messages on cell phones • Be wary of strangers asking to borrow your phone

  17. In Conclusion • You can protect personal information and your Identity • Don’t respond to Spam email • Use firewalls, AntiVirus, AntiSpyware at home • Look for security features like HTTPS and the • Use caution when asked for sensitive information • Keep track of your personal articles, including cell phones and laptops • If something doesn’t look right, it probably isn’t!

  18. Questions? Barbara D. Kissner International Fidelity Insurance Company bkissner@ific.com 973/624 7200 x259

More Related