330 likes | 343 Views
Learn about the importance of protecting data, our responsibility to safeguard it, and the legal responsibilities involved. Discover the costs of breaches and exposure and find out what can be done to enhance IT security infrastructure. Recognize various threats, including social engineering, phishing, and phone scams, and learn how to protect yourself. Finally, strengthen your password and lock down your login for maximum security.
E N D
INFORMATION SECURITYAwareness and Best Practices Brandon Jones, Information Security Analyst
WHY IS THIS IMPORTANT? • What data do we have? • Why do we have to protect it? • What can you do?
OUR RESPONSIBILITY We all have a responsibility to protect the college • Loss of Privacy / Confidentiality • Identity Theft • Monetary Theft • Legal Consequences • Financial Ramifications
DATA WE MUST PROTECT • Student Records • Financial Data • Confidential / Sensitive Information • Personally Identifiable Information (PII)
WHAT IS PII? • Name • Social Security Number (even partial) • Driver’s license / Passport • Citizenship, legal status, gender, ethnicity • Birth date / location • Home address, phone numbers • Email address • Religious preference • Mother’s maiden name, father’s middle name, etc. • Marital status, spouse details, child information • Emergency contact information • Financial, medical, disability information • Criminal record, employment information, educational history • Military records
LEGAL RESPONSIBILITIES • Federal Educational Records Privacy Act (FERPA) • Graham-Leach-Bliley Act (GLBA) • California Privacy Act of 2018 • Health Insurance Portability and Accountability Act (HIPAA) • Americans with Disabilities Act (ADA) • Children’s Online Privacy Protection Act of 1998 (COPPA) • Electronic Communications Privacy Act (ECPA) • Fair and Accurate Credit Transaction Act (FACTA) and Fair Credit Reporting Act (FCRA) • Federal Information Security Management Act (FISMA) • Freedom of Information Act • Payment Card Industry Data Security Standard (PCI DSS) • Health Information Technology for Economic and Clinical Health (HITEC) Act of 2009 • General Data Protection Regulation (GDPR) — Higher Education Compliance Alliance
COSTS OF ABREACH OR EXPOSURE • Lawsuits • Legal Fees • Consulting Fees • Remediation Costs • Mail Notifications • Providing Identity Theft Prevention • Loss of Reputation
COSTS OF ABREACH OR EXPOSURE • Cost of each stolen record containing sensitive/confidential information = $141 • Average cost of a breach = $3,620,000 — 2017 Ponemon Cost of Data Breach Study • Solano (1200 records), CCSF (7500 records)
IT SECURITY INFRASTRUCTURE • Internet Firewall • Intrusion Detection & Prevention Appliance • Anti-virus / Anti-malware Software • Operating System Updates • Monitoring Software • Security Assessments
RECOGNIZE THE THREATS • Insider Threat • Unwitting Insider • Witting Insider • Untrusted Insider • Malware • Virus • Adware • Spyware • Worm • Trojan • Ransomware • External Threats • Fraudulent Applicant • Burglar/Thief • Social Engineer • Hacker • Criminal Group • Advanced Persistent Threat
SOCIAL ENGINEERING • Attempts to manipulate you into performing actions or divulging confidential information This is Chris from the IT department. What is your password?
“PHISHING” = FAKE EMAIL • Pretends to be a trustworthy entity • Claims there is a problem with your account • Asks for sensitive information • May have a file attached (hides a virus) • May direct you to click a link (goes to a fake login page)
“PHISHING” EXAMPLES • “Change your password immediately” • “Your mailbox is over quota” • “Your account has been migrated to our new system” • “Your account has been reactivated” • “There is a problem with your billing info” • “CLICK HERE”
“PHARMING” = FAKE WEB PAGE • Looks like a legitimate login page • Might look like the real thing • Captures your username & password • Check the URL (web address)
“SPEAR PHISHING” = TARGETED • Sender knows your personal details • Pretends to be friend, mutual friend, or other trusted entity • Asks for specific information they know you have • “Please send me copies of the W-2 for all employees”
BEWARE OF PHONE SCAMS • Know the signs of a tech support scam • Caller claims to be ISP or tech support • Claims your computer is infected • Malware pop-up directs you to call • Do not call an unknown call center • Do not comply with cold-caller’s demands • Never give credentials to anyone over the phone
WHEN IN DOUBT, THROW IT OUT • Links in emails, social media posts and online advertising are often how cybercriminals try to steal your personal information. Even if you know the source, if something looks suspicious, delete it.
You Control What You Choose to Click. STOP.THINK.CLICK. When in doubt, Ask the Helpdesk!
MAKE YOUR PASSWORD A SENTENCE A strong password is a sentence that is at least 12 characters long. Focus on positive sentences or phrases that you like to think about and are easy to remember. On many sites, you can even use spaces! I like 2 eat pizza!
LOCK DOWN YOUR LOGIN • Keep your password safe • Password managers: LastPass, Roboform, 1Password, KeePass • Use two-factor authentication where possible • Unique account, unique login • Do not share with anyone • Change it once a year
BE WEB WISE • Look for “https” in URL and padlock icon in status bar when providing sensitive information (credit card, banking, SSNs, etc.) • Be careful what programs you download • Hover before you click!
CONNECT WITH CARE • Be cautious of public/open WiFi networks. • Limit what you do on free WiFi. • Infected USB drives are often left unattended by hackers in public places.
MOBILE DEVICES • Lock your device with a screen passcode • Turn on encryption • iPhone/iPad: http://tinyurl.com/nkz88gy — Android: http://tinyurl.com/num7q9r • Enable “find my device” and “remote wipe” • Only download apps from app store • Do not “jailbreak” your device • Do not store confidential/sensitive data on your mobile device
CLOUD SERVICES • What is the “cloud”? • Using someone else’s servers to host, process or store data • Examples: Dropbox, OneDrive, Box.net • We use OneDrive • College data should be on your campus OneDrive account, not any other public cloud service
DATA HANDLING AND STORAGE • Understand the sensitivity of data • Be careful where you store data • Store sensitive data on department share drive • Use “Documents” folder for other files • Check sharing permissions • Be careful how you transfer data • Do not email confidential/sensitive data • Do not leave paper files lying around • Lock your computer, Log out
YOUR HOME COMPUTER KEEP A CLEAN MACHINE • Keep your operating system up-to-date • Use anti-virus & anti-malware software • Use a personal firewall • Do not store or access confidential or sensitive college information on your home computer
OWN YOUR ONLINE PRESENCE • Personal information is like money. Value it. Protect it. • Be aware of what’s being shared. • Share with care.
IT’S UP TO YOU • You represent the college at all times. • Be a good example. • You have trusted access to confidential information. • You are a high profile target. • Security is everyone’s responsibility… lead the way!
QUESTIONS? Help Desk Contact Info: Moorpark:mchelpdesk@vcccd.edu Oxnard: ochelpdesk@vcccd.edu Ventura: vchelpdesk@vcccd.edu Report E-mail Abuse: Emailabuse@vcccd.edu Credit to Jim Clark, Santa Barbara City College