are your security aware?
TRANSCRIPT
![Page 1: Are Your Security Aware?](https://reader035.vdocuments.site/reader035/viewer/2022062905/586e133d1a28ab8a588b5d09/html5/thumbnails/1.jpg)
Are You Security Aware?
Common practices to increase security awareness and protect your information and computers
Chris Duncan, ITeck Solutions
![Page 2: Are Your Security Aware?](https://reader035.vdocuments.site/reader035/viewer/2022062905/586e133d1a28ab8a588b5d09/html5/thumbnails/2.jpg)
Security breaches are on the rise . . .
![Page 3: Are Your Security Aware?](https://reader035.vdocuments.site/reader035/viewer/2022062905/586e133d1a28ab8a588b5d09/html5/thumbnails/3.jpg)
Security breaches are on the rise . . .
even in firms that have ample resources to prevent them.
![Page 4: Are Your Security Aware?](https://reader035.vdocuments.site/reader035/viewer/2022062905/586e133d1a28ab8a588b5d09/html5/thumbnails/4.jpg)
Unfortunately, today’s antivirus programs alone can’t stop these attacks.
![Page 5: Are Your Security Aware?](https://reader035.vdocuments.site/reader035/viewer/2022062905/586e133d1a28ab8a588b5d09/html5/thumbnails/5.jpg)
Fishing Phishing is the practice of gaining information or access under the guise of something else.
![Page 6: Are Your Security Aware?](https://reader035.vdocuments.site/reader035/viewer/2022062905/586e133d1a28ab8a588b5d09/html5/thumbnails/6.jpg)
A few common methods for tricking users into giving access to their information or allowing dangerous programs to install:
![Page 7: Are Your Security Aware?](https://reader035.vdocuments.site/reader035/viewer/2022062905/586e133d1a28ab8a588b5d09/html5/thumbnails/7.jpg)
Updates you didn’t request to install
![Page 8: Are Your Security Aware?](https://reader035.vdocuments.site/reader035/viewer/2022062905/586e133d1a28ab8a588b5d09/html5/thumbnails/8.jpg)
Links to Dropbox or other file sharing programs
Updates you didn’t request to install
![Page 9: Are Your Security Aware?](https://reader035.vdocuments.site/reader035/viewer/2022062905/586e133d1a28ab8a588b5d09/html5/thumbnails/9.jpg)
Links to Dropbox or other file sharing programs
Emails with an invoice saying you purchased something
Updates you didn’t request to install
![Page 10: Are Your Security Aware?](https://reader035.vdocuments.site/reader035/viewer/2022062905/586e133d1a28ab8a588b5d09/html5/thumbnails/10.jpg)
Links to Dropbox or other file sharing programs
Emails with an invoice saying you purchased something
Emails from the bank or IRS saying you owe or should receive money
Updates you didn’t request to install
![Page 11: Are Your Security Aware?](https://reader035.vdocuments.site/reader035/viewer/2022062905/586e133d1a28ab8a588b5d09/html5/thumbnails/11.jpg)
Links to Dropbox or other file sharing programs
Emails with an invoice saying you purchased something
Emails from the bank or IRS saying you owe or should receive money
Emails from FedEx or UPS saying a package is arriving or has shipped
Updates you didn’t request to install
![Page 12: Are Your Security Aware?](https://reader035.vdocuments.site/reader035/viewer/2022062905/586e133d1a28ab8a588b5d09/html5/thumbnails/12.jpg)
Links to Dropbox or other file sharing programs
Emails with an invoice saying you purchased something
Emails from the bank or IRS saying you owe or should receive money
Emails from FedEx or UPS saying a package is arriving or has shipped
Emails saying you have a fax or message
Updates you didn’t request to install
![Page 13: Are Your Security Aware?](https://reader035.vdocuments.site/reader035/viewer/2022062905/586e133d1a28ab8a588b5d09/html5/thumbnails/13.jpg)
Even well know websites can be compromised with false
ads that are infected.
![Page 14: Are Your Security Aware?](https://reader035.vdocuments.site/reader035/viewer/2022062905/586e133d1a28ab8a588b5d09/html5/thumbnails/14.jpg)
The only sure line of prevention is common sense and vigilance.
![Page 15: Are Your Security Aware?](https://reader035.vdocuments.site/reader035/viewer/2022062905/586e133d1a28ab8a588b5d09/html5/thumbnails/15.jpg)
If the email pertains to something you didn’t do, buy, ship or ask for, don’t open it.
![Page 16: Are Your Security Aware?](https://reader035.vdocuments.site/reader035/viewer/2022062905/586e133d1a28ab8a588b5d09/html5/thumbnails/16.jpg)
If you are not expecting a fax or voice mail message via email, don’t open it.
![Page 17: Are Your Security Aware?](https://reader035.vdocuments.site/reader035/viewer/2022062905/586e133d1a28ab8a588b5d09/html5/thumbnails/17.jpg)
No bank or government agency will communicate urgent matters via email.
![Page 18: Are Your Security Aware?](https://reader035.vdocuments.site/reader035/viewer/2022062905/586e133d1a28ab8a588b5d09/html5/thumbnails/18.jpg)
No legitimate institution will ever ask you for private information via email.
![Page 19: Are Your Security Aware?](https://reader035.vdocuments.site/reader035/viewer/2022062905/586e133d1a28ab8a588b5d09/html5/thumbnails/19.jpg)
Sometimes the display name you see in an email or the sentence that is a hot link might not actually go to the
correct email address or link destination implied.
![Page 20: Are Your Security Aware?](https://reader035.vdocuments.site/reader035/viewer/2022062905/586e133d1a28ab8a588b5d09/html5/thumbnails/20.jpg)
If you see a URL or link in an email or website, first put your mouse over it and look in the bottom left corner of the window to see it’s true destination.
![Page 21: Are Your Security Aware?](https://reader035.vdocuments.site/reader035/viewer/2022062905/586e133d1a28ab8a588b5d09/html5/thumbnails/21.jpg)
Read URL’s in their entirety and look for any typos or peculiar endings. For example: www.amazone.com.ru where amazon is misspelled or a country code is at
the end.
![Page 22: Are Your Security Aware?](https://reader035.vdocuments.site/reader035/viewer/2022062905/586e133d1a28ab8a588b5d09/html5/thumbnails/22.jpg)
When reading a subject line or email, look for phrasing or language that doesn’t fit or seem right.
![Page 23: Are Your Security Aware?](https://reader035.vdocuments.site/reader035/viewer/2022062905/586e133d1a28ab8a588b5d09/html5/thumbnails/23.jpg)
At the moment, smart phones and Apple and Google tablets are safe places to open any suspicious emails or links.
If you suspect anything, use your phone or tablet to open the message or website. This will prevent viruses, but do
not provide any personal information.
![Page 24: Are Your Security Aware?](https://reader035.vdocuments.site/reader035/viewer/2022062905/586e133d1a28ab8a588b5d09/html5/thumbnails/24.jpg)
When suspicious, manually create and address an email in reply to something or manually type the
address of the site you want to go to rather clicking on a link within an email.
![Page 25: Are Your Security Aware?](https://reader035.vdocuments.site/reader035/viewer/2022062905/586e133d1a28ab8a588b5d09/html5/thumbnails/25.jpg)
When in doubt, delete.
![Page 26: Are Your Security Aware?](https://reader035.vdocuments.site/reader035/viewer/2022062905/586e133d1a28ab8a588b5d09/html5/thumbnails/26.jpg)
When sending emails out with any confidential or personal information, use an encryption program to
protect your information.
![Page 27: Are Your Security Aware?](https://reader035.vdocuments.site/reader035/viewer/2022062905/586e133d1a28ab8a588b5d09/html5/thumbnails/27.jpg)
If you connect your computer to a public WiFi
service . . .
![Page 28: Are Your Security Aware?](https://reader035.vdocuments.site/reader035/viewer/2022062905/586e133d1a28ab8a588b5d09/html5/thumbnails/28.jpg)
If you connect your computer to a public WiFi
service . . .
you are vulnerable to anyone and everyone else on that network.
![Page 29: Are Your Security Aware?](https://reader035.vdocuments.site/reader035/viewer/2022062905/586e133d1a28ab8a588b5d09/html5/thumbnails/29.jpg)
You are more secure using a cellular hotspot.
![Page 30: Are Your Security Aware?](https://reader035.vdocuments.site/reader035/viewer/2022062905/586e133d1a28ab8a588b5d09/html5/thumbnails/30.jpg)
Protecting private information is not just about securing your computer.
Be aware of your surroundings, including what people can see on your computer screen and what
you talk about.
![Page 31: Are Your Security Aware?](https://reader035.vdocuments.site/reader035/viewer/2022062905/586e133d1a28ab8a588b5d09/html5/thumbnails/31.jpg)
Thumb drives are virus vectors. Be overly cautious when accepting them from other persons.
![Page 32: Are Your Security Aware?](https://reader035.vdocuments.site/reader035/viewer/2022062905/586e133d1a28ab8a588b5d09/html5/thumbnails/32.jpg)
Data never truly deletes. Do not give away thumb
drives or hardware that had Personally Identifiable
Information on it.
![Page 33: Are Your Security Aware?](https://reader035.vdocuments.site/reader035/viewer/2022062905/586e133d1a28ab8a588b5d09/html5/thumbnails/33.jpg)
Erase all information from cell phones before
trading them in.
![Page 34: Are Your Security Aware?](https://reader035.vdocuments.site/reader035/viewer/2022062905/586e133d1a28ab8a588b5d09/html5/thumbnails/34.jpg)
Change your passwords every 45 - 90 days using a “complex” password.
![Page 35: Are Your Security Aware?](https://reader035.vdocuments.site/reader035/viewer/2022062905/586e133d1a28ab8a588b5d09/html5/thumbnails/35.jpg)
Passwords must not contain your entire account name, or your full name.
![Page 36: Are Your Security Aware?](https://reader035.vdocuments.site/reader035/viewer/2022062905/586e133d1a28ab8a588b5d09/html5/thumbnails/36.jpg)
To increase security, passwords should contain characters from three of the
following five categories:
![Page 37: Are Your Security Aware?](https://reader035.vdocuments.site/reader035/viewer/2022062905/586e133d1a28ab8a588b5d09/html5/thumbnails/37.jpg)
1Uppercase Characters
of European languages
(A through Z, with diacritic marks, Greek and Cyrillic
characters)
![Page 38: Are Your Security Aware?](https://reader035.vdocuments.site/reader035/viewer/2022062905/586e133d1a28ab8a588b5d09/html5/thumbnails/38.jpg)
2Lowercase Characters
of European languages
(a through z, sharp-s, with diacritic marks, Greek and
Cyrillic characters)
![Page 39: Are Your Security Aware?](https://reader035.vdocuments.site/reader035/viewer/2022062905/586e133d1a28ab8a588b5d09/html5/thumbnails/39.jpg)
3
Base 10 Digits
(0 - 9)
![Page 40: Are Your Security Aware?](https://reader035.vdocuments.site/reader035/viewer/2022062905/586e133d1a28ab8a588b5d09/html5/thumbnails/40.jpg)
4Non-Alphanumeric
Characters
(~!@#$%^&*_-+=`|\(){}[]:;"'<>,.?/)
![Page 41: Are Your Security Aware?](https://reader035.vdocuments.site/reader035/viewer/2022062905/586e133d1a28ab8a588b5d09/html5/thumbnails/41.jpg)
5Any Unicode character that is categorized as an alphabetic
character but is not uppercase or lowercase. This includes Unicode characters
from Asian languages.
![Page 42: Are Your Security Aware?](https://reader035.vdocuments.site/reader035/viewer/2022062905/586e133d1a28ab8a588b5d09/html5/thumbnails/42.jpg)
Think outside the box when creating your password.
![Page 43: Are Your Security Aware?](https://reader035.vdocuments.site/reader035/viewer/2022062905/586e133d1a28ab8a588b5d09/html5/thumbnails/43.jpg)
We know you love them, but try not to use the names of spouse, children or pets when creating your password.
And don’t just change the last number of your old password!
![Page 44: Are Your Security Aware?](https://reader035.vdocuments.site/reader035/viewer/2022062905/586e133d1a28ab8a588b5d09/html5/thumbnails/44.jpg)
Congratulations on becoming more security aware!
Want to find out more about securing your company, personnel and personal information?
![Page 45: Are Your Security Aware?](https://reader035.vdocuments.site/reader035/viewer/2022062905/586e133d1a28ab8a588b5d09/html5/thumbnails/45.jpg)
Contact us to discuss your IT and data security needs:Phone: 1-866-483-2544
Email: [email protected]