990 likes | 1.01k Views
HR Liaison Network Meeting. Meeting Purpose Provide a forum for communication between HR Staff and the HR Liaisons for continuous improvement in HR programs, services, and best practices for the UCF community Build partnerships with colleges/departments Meeting Guidelines
E N D
HR Liaison Network Meeting Meeting Purpose • Provide a forum for communication between HR Staff and the HR Liaisons for continuous improvement in HR programs, services, and best practices for the UCF community • Build partnerships with colleges/departments Meeting Guidelines • Goal is to establish dialogue, while keeping flow of the meeting on track • Maximum of three questions following each presentation • Questions & Feedback – 3x5 cards • Submit questions • Tell us what worked well • What would you improve • Suggestions for topics for future meetings
Shelia Daniels, Executive Director Human Resources Welcome & introductions
Maureen Binder, Assoc. Vice President/Chief HR Officer Opening
Keeping University Information SafeChris VakhordjianInformation Security Officer, UCF
Computer Viruses You Don't Wish to Have • ARNOLD SCHWARZENEGGER VIRUS… Terminates and stays resident. It vill be bahk. • TITANIC VIRUS… Makes your whole computer go down • DISNEY VIRUS… Everything in the computer goes Goofy • VIAGRA VIRUS… Makes a new hard drive out of an old floppy • JANE FONDA VIRUS… Attacks your hard drive's FAT • JACK KEVORKIAN VIRUS… Deletes all old files
Information Security Awareness Chris Vakhordjian Information Security Officer
Agenda • What Is Information Security? • What Do We Need To Protect? • Why Do We Need To Protect It? • What Are The Threats? • Steps Toward Better Information Security • Some Parting Words
What is Information Security? It is to maintain... • Confidentiality • Integrity • Availability
Confidentiality Keep information… • Private • Safe • Secure
Integrity Information should be… • Unaltered • Accurate • Sound
Availability Information and resources are …. • Available for authorized users • Redundant • Failsafe
What Information Must Be Protected & CIA Incorporated? • Restricted Data • Highly Restricted Data • Social Security Numbers (SSN) • Electronic Protected Health Information (ePHI) • Credit card account numbers • Financial and tax information • Driver’s license numbers • Passport numbers • Restricted Data • Academic Records (FERPA protected) • Business sensitive information, infrastructure information, system configurations, application settings, etc. • Regardless of whether it is on paper or in electronic form UCF POLICY 4-008 Go to policies.ucf.edu
Whose Information? • Students (& Alumni) • Employees • Applicants • Prospects • Third Parties
Whose Information? • Students (& Alumni) (~ 250k) • Employees (~ 60k) • Applicants (~ 880k) • Prospects (~ 2,500k) • Third Parties (negligible, but growing)
Why Security? FERPA - Family Educational Rights and Privacy Act of 1974, as Amended • Protects the privacy of student educational and personal records • PCI DSS - Payment Card Industry (PCI) Data Security Standards (DSS) • All merchants who process transmit or store credit card data are required to be compliant with PCI DSS • HIPAA - Health Insurance Portability and Accountability Act of 1996 • Provides guidelines on how electronic protected health information (ePHI) may be used and disclosed
Why Security? (Cont.) • Florida Statutes • All state, county, and municipal records are open for personal inspection and copying by any person. Providing access to public records is a duty of each agency. However, there are general exemptions…F.S. 119.07 (4)(d)1-7 • UCF Policies(http://policies.ucf.edu) • Data Classification and Protection Policy (Policy 4-008) • Use of Information Technologies and Resources (Policy 4-002) • Security of Mobile Computing, Data Storage, and Communication Devices (Policy 4-007) • Etc.
Florida Information Protection Act of 2014 • Any person who conducts business in this state and maintains computerized data in a system that includes personal information shall provide notice of any breach of the security… • Notification must be made no later than 30 days after determination of the breach or reason to believe a breach occurred. • Personal Information - first name, first initial and last name, or any middle name and last name, in combination with any one or more of the following • Social Security number • A driver license or identification card number, passport number, etc. • Financial account numbers, credit or debit card number, in combination with any required security code, access code, or password that would permit access to an individual’s financial account • Information regarding an individual’s medical history, mental or physical condition • A user name or e-mail address, in combination with a password or security question and answer that would permit access to an online account
Information Security Challenges • University Culture – “Academic Freedom” • Distributed IT, inconsistent standards, processes and technologies, or none at all • Faculty/GAs doing System Administration • Sensitive data distributed throughout campus • Multiple locations where data is collected and stored • Cloud Computing • Lack of employee awareness • High turnover – student employees • Lack of training (no mandatory training)
Threats to Information Security • Malware: Ransomware, Malware, Trojans, Keystroke Loggers, etc. • Social Engineering Attacks • Phishing • Spear Phishing • Inadvertent disclosure (human mistakes) • Missing or stolen portable devices • Hacked servers due to poorly written code or un-patched systems
Steps Toward Better Information Security • Protect Your PC • Email Security • Encryption • Cloud Storage Security • Password Security • Physical Security
Protect Your PC • Beware of Internet browser pop-ups asking you to accept plug-ins (e.g., Flash Player, Java, etc.) • Install only necessary and trusted applications • Keep your system up-to-date and run anti-malware software!
Protect Your PC • Do not save Highly Restricted data (e.g., SSNs, credit card numbers, etc.) on your workstation, laptop, smartphone or flash drive. • Use UCFID/EmplID to communicate identity related information between offices • Do not send Highly Restricted data via instant messenger or other third party chat tools
Protect Your PC and Yourself (Cont.) Social Media Security Threats • Koobface • The Mikeyy Worm • Acai Attack • Facebook Phishing • BE SKEPTICAL • USE GOOD JUDGMENT • KNOW YOUR CONTACTS • KNOW YOUR PRIVACY SETTINGS
Received Email • Question ALL unsolicited emails • Avoid opening attachments - especially executable attachments (e.g., .exe, .com, .bat, etc.) • Verify with sender before you open attachments • Do not click on links in an e-mail • Copy & paste URL • Type URL • Beware of Phishing
Sending Email • Email is analogous to a postcard • Never send Highly Restricted Data via email without encryption • Encryption is the only way to guarantee privacy, confidentiality, and integrity. • Postcard
What are the consequences of Being Hacked? • Losing your files to Ransomware • Your PC attacking others • Your identity being stolen • Your bank account being emptied • UCF confidential information leaking • Sending spam and phishing messages to thousands of people • Storing and delivering pornography, stolen software and media to anyone • Listening in on your meetings or phone calls at work or at home through the PC microphone
Use Encryption(Protecting Restricted Information) • Could someone capture and view information I’m sending or receiving? • Is someone eavesdropping on the network? • Encryption transforms information to make it unreadable to anyone except those possessing special knowledge or a key.
Use Encryption (Cont.) (Protecting Restricted Information) • To keep data confidential, use encryption • Common applications offer encryption;e.g., Word, Excel, Adobe PDF writer, etc. • Never send Highly Restricted data through email without encryption. Restricted data is acceptable using our @ucf.edu addresses. • Always verify the address (URL) in your browser and look for a secure web connection (https://) before entering passwords or other sensitive data
Using Encryption in MS Office Click on “Encrypt Document”
Using Encryption in Adobe • Click on “Properties…”
UCF POLICY 4-008 Go to policies.ucf.edu Cloud Storage Security • Pros • Provides easy access to your data • Convenient and generally “free” • For storing university data (not Highly Restricted Data) only university provided cloud storage (Office365/OneDrive) is permitted- coming soon… • Personal cloud storage (e.g., iCloud, Dropbox, etc.) is not permitted for university data • Cons • No guarantee that your data will be secure or treated confidentially • Terms of Service is via a "click-through" agreement, which is a legal contract between the individual and the service provide – not with the university
Top 10 most hacked passwords: • 123456 • ninja • password • welcome • princess • 12345678 • qwerty • sunshine • abc123 • 123456789 And others….
Password Security Protecting encrypted data or access to your account begins with a strong password
Password Security (Cont.) • Do not use dictionary words • Do not use easy to guess passwords • password 123456 computer hello love • Do not write it down, don’t share it • Do not use the same password on multiple sites, such as using your NID password for your Facebook password • Be careful when entering passwords on public or suspicious computers
Password Security (Cont.) • Use a password management tool to simplify your life with saving and protecting passwords • Password Safe • KeePass
Physical Security • Is there Highly Restricted data on your laptop? • Laptop went missing or stolen • Drive crashed… • What do you do? • Highly Restricted data must not reside on laptops, smartphones, flash drives, external drives, etc.
Physical Security (Cont.) • Always store Restricted data on secure servers • Use Remote Desktop to get to your documents • Do not leave your computers unlocked when not at your desk • CTRL+ALT+DEL, then “Lock Computer” • Or set your screen saver to lock • Lock laptops when not in use • Use laptops with encrypted drives • Password protect your Smartphone • UCF Policy 4-007