/
Veysel ERDAG, PhD Chief Information Veysel ERDAG, PhD Chief Information

Veysel ERDAG, PhD Chief Information - PowerPoint Presentation

harmony
harmony . @harmony
Follow
27 views
Uploaded On 2024-02-02

Veysel ERDAG, PhD Chief Information - PPT Presentation

Security Officer CISM CISA CISSP CCIESecurity overdagualredu INFOSEC Components WHY Average cost of a data breach 4 Million Average cost of a breach data 221record Cost of a data breach for Higher Education ID: 1043663

information security data attacks security information attacks data passwords ualr protect charactershould password website breach services detect phishing financial

Share:

Link:

Embed:

Download Presentation from below link

Download Presentation The PPT/PDF document "Veysel ERDAG, PhD Chief Information" is the property of its rightful owner. Permission is granted to download and print the materials on this web site for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.


Presentation Transcript

1. Veysel ERDAG, PhDChief Information Security OfficerCISM, CISA, CISSP, CCIE-Securityoverdag@ualr.edu

2. INFOSEC Components

3. WHY?Average cost of a data breach:4 MillionAverage cost of a breach data:$221/recordCost of a data breach for Higher Education:$246/recordUALR has approximately 500.000 records$123 MillionRoot cause of data breaches:48%: Malicious or criminal attacks27%: System glitches25%: Human errors

4. SNAPSHOT

5.

6.

7. Security Systems in UA Little RockComprehensive, security in depth designNew Active DirectoryNew End-Point Security SolutionSymantecInformation security training.

8. Data Breaches: Huge NumbersDenial of Service Attacks: Un-stoppable

9. How to Detect Phishing Attacks-1?

10. How to Detect Phishing Attacks-2?

11. Protect Your Identity and Financial Information – Secure Web Connection

12. Protect Your Identity and Financial Information – Secure Web Connection – 2

13. Gift Card Attacks

14. Payroll Attacks

15.

16. Password Reset Request

17. Payroll Change Request - Chancellor

18. What should we do?Protect yourself first:Set a strong passwordShould be at least eight characters in lengthShould contain at least one lowercase characterShould contain at least one numberShould contain at least one special characterShould contain at least one uppercase characterShould not contain your first name, last name, or usernameUse different passwords for every different application or website.If you have difficulties to remember your passwords, please use a password-vault application.Social Networks like Twitter, Linkedin and Facebook are providing two factor authentication. Activate two factor authentication if the service is provided by the website.

19. ProtectionControl your visibilityBe careful about your postsSecure your mobile deviceBe careful about USB storage devicesUse VPNDispose your information properlyUpdate your systemsBackup regularly

20. Connected Devices – IoT (Internet of Things)Connected everythingHousehold devicesGame consolesYour personal tracking devices…Attackers can collect personal information:Your locationYour health informationYour behavioral habits, daily routinesFollow the guidelines in UALR IT Services Security website.

21. Last Words and RemindersKeep your passwords secret.Do not share your password with anybodyIT Services never ask your passwordOn the phone or via e-mailChange your passwords as frequent as possible.Use security solutions provided by UALRBe the part of the community and help your community to protect and to be protectedIf you see any suspicious activity, please call IT Services Assistance Center501 – 916 3011Itservices-help@ualr.edu

22. T H A N K Y O Uoverdag@ualr.edu