1 / 15

HUIT IT Security | Cyber Security Month

Taming Lions, Tigers, and…Windows How to turn your system into a lean, mean, malware fighting machine. HUIT IT Security | Cyber Security Month. Agenda:. Introduction Why are we here ? General Guidelines & Best Practices Differences between OSX and Windows Summary Q & A. Breadcrumb.

Download Presentation

HUIT IT Security | Cyber Security Month

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Taming Lions, Tigers, and…WindowsHow to turn your system into a lean, mean, malware fighting machine. HUIT IT Security | Cyber Security Month

  2. Agenda: • Introduction • Why are we here? • General Guidelines & Best Practices • Differences between OSX and Windows • Summary • Q & A

  3. Breadcrumb Oct 16 2012 Introduction Citation HUIT IT Security | Taming Lions, Tigers, and…Windows

  4. Oct 16 2012 Introduction • This October, HUIT IT Security is conducting a series of informational sessions on “Surviving the Internet”. The efforts are part of the National Cyber Security Awareness Month (NCSAM). • Each session will take the form of a 30-40 minute presentation which will be recorded. Please raise your hand at any time to ask a question. The remainder of each session is an open floor e.g. for questions you do not want recorded! HUIT IT Security | Taming Lions, Tigers, and…Windows

  5. Breadcrumb Oct 16 2012 Introduction • The sessions: • Oct 2: Cloudy with a chance of Identity Theft • Oct 9: Is it ever not Social? • Oct 16: Taming Lions, Tigers… and Windows • Oct 23: Have device, will travel • Oct 31: By user demand • Use the survey and feedback tool: http://hvrd.me/RMk15l Citation HUIT IT Security | Taming Lions, Tigers, and…Windows

  6. Breadcrumb Oct 2 2012 Introduction • The Longwood sessions: • Oct 4: HMS: TMEC 227: 10-11am • Cloudy with a chance of Identity Theft • Is it ever not Social? • Oct 10: HSPH: Kresge G-1: 12-1pm • Is it ever not Social? • Have device, will travel • Oct 17: HMS: TMEC 227: 2-3pm • Taming Lions, Tigers… and Windows • Have device, will travel Citation HUIT IT Security | Taming Lions, Tigers, and…Windows

  7. Breadcrumb Oct 16 2012 Introduction • Open office hours are 9-12 every Friday through October. • To reserve a timeslot or if you have any questions about a presentation, please email ithelp@harvard.edu or call x57777 • The same place you report a security incident….. Citation HUIT IT Security | Taming Lions, Tigers, and…Windows

  8. Breadcrumb Oct 16 2012 • Why are we here? Citation HUIT IT Security | Taming Lions, Tigers, and…Windows

  9. General Guidelines & Best Practices Password Policy Hard Drive Encryption Patch Management Anti-virus Updates Enable Firewall Backup Oct 16 2012 HUIT IT Security | Taming Lions, Tigers, and…Windows

  10. Window Specifics BitLocker Drive Encryption Windows Updates Software Updates Backup and Restore Windows Defender Windows Firewall Oct 16 2012 HUIT IT Security | Taming Lions, Tigers, and….Windows

  11. MAC OSX Specifics FileVault Software Update Time Machine iCloud Firewall Oct 16 2012 HUIT IT Security | Taming Lions, Tigers, and…Windows

  12. Summary Requires vigilance Benefits outweigh costs All Operating Systems vulnerable Always have a backup plan You’re not alone Oct 16 2012 HUIT IT Security | Taming Lions, Tigers, and….Windows

  13. IT Security Contact Info ithelp@harvard.edu Helpdesk at x 57777 These slides and the video will be on http://security.harvard.edu Oct 16 2012 HUIT IT Security | Taming Lions, Tigers, and…Windows

  14. Breadcrumb Oct 16 2012 • Q & A Citation HUIT IT Security | Taming Lions, Tigers, and…Windows

  15. Thank you. HUIT IT Security | Taming Lions, Tigers, and…Windows October 16, 2012

More Related