320 likes | 391 Views
Information Security Awareness Training. Why Information Security?. Information is a valuable asset for all kinds of business More and more information related crimes happen Information leakage, damage will impact, even finish business. Do’s and don’ts. Do use licensed and supported software
E N D
Why Information Security? • Information is a valuable asset for all kinds of business • More and more information related crimes happen • Information leakage, damage will impact, even finish business
Do’s and don’ts • Do use licensed and supported software • Do have anti-virus tool, keep it up to date, and scan portable media before usage
Do’s and don’ts (continued) • Do have your Personal Firewall set to ON
Do’s and don’ts (continued) • Do keep Windows XP security patches up to date • Do keep software up to date • Do choose a strong password, change it periodically, and make sure that you are the only person that knows it
Pa55VV0RD!! • Don't use your login name in any form • Don’t use word or words contained in any language dictionary • Don't use numbers significant to you or someone close to you, or associated with the University • Don't use passwords based on simple keyboard patterns • Remember it or keep it in a protected place, such as a locked safe
Do’s and don’ts (continued) • Do use Laurier’s resources for business purposes, please! • Do lock your screen/computer when unattended • For laptop users, do keep your eyes on it, use chain locks when necessary • Do contact the ITS Help Desk when necessary • Do report incidents, abnormal things to designated people, and leave the scene untouched if don’t know what to do • Do back up your documents • Do think about IT security on a regular basis
Do’s and don’ts (continued) • Do not shut down security applications on your computer, including anti-virus tool, Firewall, automated update etc • Do not let unknown people touch your computer, feel free to challenge his/her ID when necessary • Do not give out your password to anyone, including ITS staff • Do not provide your password in an email reply • Do not connect personal computing devices to the WLU wired network • Do not use insecure wireless connections • Do not open an email attachment unless you are certain of the veracity of its contents • Do not open an unknown website or URL unless you are certain of its veracity
Social Engineering • Social Engineering is the acquisition of sensitive information or inappropriate access privileges by an outsider, based upon the building of an inappropriate trust relationship with insiders • The goal of social engineering is to trick someone into providing valuable information or access to that information
Suggestion 1 • If you cannot personally identify a caller who asks for personal information about you or anyone else, for information about your computer system, or for any other sensitive information, do not provide the information. Insist on verifying the caller’s identity by calling them back at their proper telephone number as listed in telephone directory. This procedure creates minimal inconvenience to legitimate activity when compared with the scope of potential losses.
Suggestion 2 • Remember that passwords are sensitive. A password for your personal account should be known ONLY to you. Systems administrators or maintenance technicians who need to do something to your account will not require your password. They have their own password with system privileges that will allow them to work on your account without the need for you to reveal your password. If a system administrator or maintenance technician asks you for your password, be suspicious.
Suggestion 3 • Systems maintenance technicians from outside vendors who come on site should be accompanied by the local site administrator. If the site administrator is not familiar to you, or if the technician comes alone, it is wise to give a call to your known site administrator to check if the technician should be there. Unfortunately, many people are reluctant to do this because it makes them look paranoid, and it is embarrassing to show that they do not trust a visitor.
Thanks for your time !Any questions or suggestions?To download this slides, go to computersecurity.wlu.ca, Security Awareness TrainingRecommend : Tips of The Day Guidelines to Password Selection Grant Li Ex. 2797 Email: gli@wlu.ca