990 likes | 1.01k Views
Join us for the HR Liaison Network Meeting to discuss continuous improvement in HR programs and services for the UCF community. Engage in dialogue, ask questions, and provide feedback for better practices.
E N D
HR Liaison Network Meeting Meeting Purpose • Provide a forum for communication between HR Staff and the HR Liaisons for continuous improvement in HR programs, services, and best practices for the UCF community • Build partnerships with colleges/departments Meeting Guidelines • Goal is to establish dialogue, while keeping flow of the meeting on track • Maximum of three questions following each presentation • Questions & Feedback – 3x5 cards • Submit questions • Tell us what worked well • What would you improve • Suggestions for topics for future meetings
Shelia Daniels, Executive Director Human Resources Welcome & introductions
Maureen Binder, Assoc. Vice President/Chief HR Officer Opening
Keeping University Information SafeChris VakhordjianInformation Security Officer, UCF
Computer Viruses You Don't Wish to Have • ARNOLD SCHWARZENEGGER VIRUS… Terminates and stays resident. It vill be bahk. • TITANIC VIRUS… Makes your whole computer go down • DISNEY VIRUS… Everything in the computer goes Goofy • VIAGRA VIRUS… Makes a new hard drive out of an old floppy • JANE FONDA VIRUS… Attacks your hard drive's FAT • JACK KEVORKIAN VIRUS… Deletes all old files
Information Security Awareness Chris Vakhordjian Information Security Officer
Agenda • What Is Information Security? • What Do We Need To Protect? • Why Do We Need To Protect It? • What Are The Threats? • Steps Toward Better Information Security • Some Parting Words
What is Information Security? It is to maintain... • Confidentiality • Integrity • Availability
Confidentiality Keep information… • Private • Safe • Secure
Integrity Information should be… • Unaltered • Accurate • Sound
Availability Information and resources are …. • Available for authorized users • Redundant • Failsafe
What Information Must Be Protected & CIA Incorporated? • Restricted Data • Highly Restricted Data • Social Security Numbers (SSN) • Electronic Protected Health Information (ePHI) • Credit card account numbers • Financial and tax information • Driver’s license numbers • Passport numbers • Restricted Data • Academic Records (FERPA protected) • Business sensitive information, infrastructure information, system configurations, application settings, etc. • Regardless of whether it is on paper or in electronic form UCF POLICY 4-008 Go to policies.ucf.edu
Whose Information? • Students (& Alumni) • Employees • Applicants • Prospects • Third Parties
Whose Information? • Students (& Alumni) (~ 250k) • Employees (~ 60k) • Applicants (~ 880k) • Prospects (~ 2,500k) • Third Parties (negligible, but growing)
Why Security? FERPA - Family Educational Rights and Privacy Act of 1974, as Amended • Protects the privacy of student educational and personal records • PCI DSS - Payment Card Industry (PCI) Data Security Standards (DSS) • All merchants who process transmit or store credit card data are required to be compliant with PCI DSS • HIPAA - Health Insurance Portability and Accountability Act of 1996 • Provides guidelines on how electronic protected health information (ePHI) may be used and disclosed
Why Security? (Cont.) • Florida Statutes • All state, county, and municipal records are open for personal inspection and copying by any person. Providing access to public records is a duty of each agency. However, there are general exemptions…F.S. 119.07 (4)(d)1-7 • UCF Policies(http://policies.ucf.edu) • Data Classification and Protection Policy (Policy 4-008) • Use of Information Technologies and Resources (Policy 4-002) • Security of Mobile Computing, Data Storage, and Communication Devices (Policy 4-007) • Etc.
Florida Information Protection Act of 2014 • Any person who conducts business in this state and maintains computerized data in a system that includes personal information shall provide notice of any breach of the security… • Notification must be made no later than 30 days after determination of the breach or reason to believe a breach occurred. • Personal Information - first name, first initial and last name, or any middle name and last name, in combination with any one or more of the following • Social Security number • A driver license or identification card number, passport number, etc. • Financial account numbers, credit or debit card number, in combination with any required security code, access code, or password that would permit access to an individual’s financial account • Information regarding an individual’s medical history, mental or physical condition • A user name or e-mail address, in combination with a password or security question and answer that would permit access to an online account
Information Security Challenges • University Culture – “Academic Freedom” • Distributed IT, inconsistent standards, processes and technologies, or none at all • Faculty/GAs doing System Administration • Sensitive data distributed throughout campus • Multiple locations where data is collected and stored • Cloud Computing • Lack of employee awareness • High turnover – student employees • Lack of training (no mandatory training)
Threats to Information Security • Malware: Ransomware, Malware, Trojans, Keystroke Loggers, etc. • Social Engineering Attacks • Phishing • Spear Phishing • Inadvertent disclosure (human mistakes) • Missing or stolen portable devices • Hacked servers due to poorly written code or un-patched systems
Steps Toward Better Information Security • Protect Your PC • Email Security • Encryption • Cloud Storage Security • Password Security • Physical Security
Protect Your PC • Beware of Internet browser pop-ups asking you to accept plug-ins (e.g., Flash Player, Java, etc.) • Install only necessary and trusted applications • Keep your system up-to-date and run anti-malware software!
Protect Your PC • Do not save Highly Restricted data (e.g., SSNs, credit card numbers, etc.) on your workstation, laptop, smartphone or flash drive. • Use UCFID/EmplID to communicate identity related information between offices • Do not send Highly Restricted data via instant messenger or other third party chat tools
Protect Your PC and Yourself (Cont.) Social Media Security Threats • Koobface • The Mikeyy Worm • Acai Attack • Facebook Phishing • BE SKEPTICAL • USE GOOD JUDGMENT • KNOW YOUR CONTACTS • KNOW YOUR PRIVACY SETTINGS
Received Email • Question ALL unsolicited emails • Avoid opening attachments - especially executable attachments (e.g., .exe, .com, .bat, etc.) • Verify with sender before you open attachments • Do not click on links in an e-mail • Copy & paste URL • Type URL • Beware of Phishing
Sending Email • Email is analogous to a postcard • Never send Highly Restricted Data via email without encryption • Encryption is the only way to guarantee privacy, confidentiality, and integrity. • Postcard
What are the consequences of Being Hacked? • Losing your files to Ransomware • Your PC attacking others • Your identity being stolen • Your bank account being emptied • UCF confidential information leaking • Sending spam and phishing messages to thousands of people • Storing and delivering pornography, stolen software and media to anyone • Listening in on your meetings or phone calls at work or at home through the PC microphone
Use Encryption(Protecting Restricted Information) • Could someone capture and view information I’m sending or receiving? • Is someone eavesdropping on the network? • Encryption transforms information to make it unreadable to anyone except those possessing special knowledge or a key.
Use Encryption (Cont.) (Protecting Restricted Information) • To keep data confidential, use encryption • Common applications offer encryption;e.g., Word, Excel, Adobe PDF writer, etc. • Never send Highly Restricted data through email without encryption. Restricted data is acceptable using our @ucf.edu addresses. • Always verify the address (URL) in your browser and look for a secure web connection (https://) before entering passwords or other sensitive data
Using Encryption in MS Office Click on “Encrypt Document”
Using Encryption in Adobe • Click on “Properties…”
UCF POLICY 4-008 Go to policies.ucf.edu Cloud Storage Security • Pros • Provides easy access to your data • Convenient and generally “free” • For storing university data (not Highly Restricted Data) only university provided cloud storage (Office365/OneDrive) is permitted- coming soon… • Personal cloud storage (e.g., iCloud, Dropbox, etc.) is not permitted for university data • Cons • No guarantee that your data will be secure or treated confidentially • Terms of Service is via a "click-through" agreement, which is a legal contract between the individual and the service provide – not with the university
Top 10 most hacked passwords: • 123456 • ninja • password • welcome • princess • 12345678 • qwerty • sunshine • abc123 • 123456789 And others….
Password Security Protecting encrypted data or access to your account begins with a strong password
Password Security (Cont.) • Do not use dictionary words • Do not use easy to guess passwords • password 123456 computer hello love • Do not write it down, don’t share it • Do not use the same password on multiple sites, such as using your NID password for your Facebook password • Be careful when entering passwords on public or suspicious computers
Password Security (Cont.) • Use a password management tool to simplify your life with saving and protecting passwords • Password Safe • KeePass
Physical Security • Is there Highly Restricted data on your laptop? • Laptop went missing or stolen • Drive crashed… • What do you do? • Highly Restricted data must not reside on laptops, smartphones, flash drives, external drives, etc.
Physical Security (Cont.) • Always store Restricted data on secure servers • Use Remote Desktop to get to your documents • Do not leave your computers unlocked when not at your desk • CTRL+ALT+DEL, then “Lock Computer” • Or set your screen saver to lock • Lock laptops when not in use • Use laptops with encrypted drives • Password protect your Smartphone • UCF Policy 4-007