1 / 19

Data Security at Albemarle County:

Data Security at Albemarle County:. Keeping You and Your Computer Safe. Levels of Cyber Security. Maintaining a high level of cyber security requires you to focus on the four different areas shown in this diagram. The slides that follow explore these topics in greater detail.

satya
Download Presentation

Data Security at Albemarle County:

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Data Security at Albemarle County: Keeping You and Your Computer Safe

  2. Levels of Cyber Security Maintaining a high level of cyber security requires you to focus on the four different areas shown in this diagram. The slides that follow explore these topics in greater detail. For any additional information, or if you have follow-up questions, please contact the Albemarle County Government Help Desk, x 5895 or 296-5895.

  3. Lack of Physical Security Undercuts All Other Security Measures • Don’t lose track of your laptop. • Don’t walk away from your machine without “locking” it (Hold down the Windows and L keys to lock). • Create strong passwords. The Windows key is located between the Ctrl and Alt keys in the lower-right corner of a standard keyboard.

  4. Computer Theft Prevention Never leave your laptop unattended in plain sight Don't leave a laptop in an unlocked vehicle, even if the vehicle is in your driveway or garage. If you must leave your laptop in a vehicle, cover it up or put it in a locked trunk. Carry your laptop in a nondescript carrying case, briefcase, or bag. Going to lunch, or taking a break? Don't leave a meeting or conference room without your laptop. Take it with you, or you run the risk that it won't be there when you return. Lock the laptop in your office during off-hours.

  5. Data Theft Prevention Don’t work on sensitive data in a public place – you never know who is watching Use passwords and encryption whenever working on important data Back up your information on disks and store them at home or the office.

  6. Protecting Mini Storage Devices Mini Storage devices include CDs, IPods, or any type of flash drive (thumb drives, memory sticks, USB drives, or pen drives). We recommend strongly against storing ANY county data on these types of devices; we have the network capability and tools available to anyone who needs to “transport” presentations or documents to other PCs. Attach important items like flash drives to your key chain so you don’t lose them. Never leave a storage device in plain sight when you leave your office, car, or workplace. If you are using one of these devices always back up the information to another source.

  7. Locking Your Computer The Windows key is located between the Ctrl and Alt keys in the lower-right corner of a standard keyboard. • If you are leaving you computer for 90 minutes or less you should always lock it. • Why? To ensure that no one else uses your computer while you are away. • Use one of these methods: • Press the Windows and L keys • Press the Ctrl-Alt-Delete keys. When the Windows Security Menu appears, click on the Lock Computer button • Safe some energy! If you leave your computer for more than 90 minutes, shut down.

  8. Strong Passwords • Any password should be at least 7 characters long. • Add complexity to your password: • Use a combination of upper- and lowercase letters • Add numbers • Substitute special characters or numbers for letters (@ for a, $ for s, 3 for e, ! for l) • Think of a sentence that you will remember and turn that into your password by using the first letter of each word to create a password string. • Sample password using the above suggestions: “All passwords must be at least seven characters long” becomes: Apmb@l7cL • Keep your password a secret: Treat your passwords with as much care as the information that they protect. DO NOT keep your password written down in plain sight or in any place accessible by other people.

  9. How the IT Dept. Secures Your PC • Keeps software up-to-date. • Maintains a firewall. • Automatically updates and runs antivirus program. • Offers anti-spy & adware programs as needed.

  10. Safe Emailing: 3 Things to Know • Know who you are sending mail to. • Know who you are getting mail from. • Know who you expect attachments from. • Just because you know the person the mail came from does not mean it’s a legitimate email. • Don’t believe everything you read.

  11. The Never Never Email List: • Never never open an attachment from an unknown source. • Never never open an attachment you were not expecting. • Never never click on a link in an email from an unknown source. • Never never share your email password.

  12. What Is Phishing? • An attempt via email to get you to disclose personal information that will be used in a malicious manner. • Often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one.

  13. Recognizing Phishing Emails:

  14. Clues To Identify A Phishing Email • If it sounds too good to be true, it probably is! • Spelling errors and bad grammar. • Odd formatting (e.g., incorrect use of capital letters or punctuation). • No real person's name included in either the greeting or signature of the email. • No legitimate business will ever request your password. • No mention of a phone number to call or person to contact. • Threatening to delete an account due to lack of response: legitimate businesses don’t do that.

  15. The s in the http indicates that this is a secure site. A padlock icon also indicates that this is a secure site (the icon’s location depends on your browser; it may be at the top of the screen or in the lower-right corner). Verifying Website Security • Know how to identify secure sites when you’re online.

  16. Tips To Protect Yourself • Be careful about what you reveal online: • Age • Address • Whereabouts • Itinerary/routine • Phone number, IM name

  17. Maintain Your Physical Security • Mail • Stealing from mailbox, change of address forms • Theft • Wallet/purse stolen, home/car break-ins • “Dumpster diving” at homes and businesses • Cell Phone Cameras • Sneaky photos taken of your private info ID theft not just a cybercrime; it occurs in the real world too.

  18. How to Prevent ID Theft • Secure your trash • Think before you toss; buy & use a shredder • Secure your mailbox • Stop mail and newspapers when out of town • Mail letters from P.O. or dropboxes • Note anything unusual • Monitor your credit • Opt out of pre-approved offers. Call 1-888-5-OPTOUT (1-888-567-8688) to request such offers be stopped. Note that you will be asked to provide your Social Security number when you call. • Check your statements & credit reports

  19. If You Are A Victim of ID Theft… • Place a fraud alert on your credit reports, and review your credit reports. • Close the accounts that you know, or believe, have been tampered with or opened fraudulently. • File a complaint with the Federal Trade Commission. • File a report with your local police.

More Related