1Have a strong password A t least 10 characters long 12 for IOM3 A mixture of numbers uppercase and lowercase letters Include other symbols Avoid common words Do not reuse passwords Change your password regularly ID: 803227
Download The PPT/PDF document "Staying safe in a digital age" is the property of its rightful owner. Permission is granted to download and print the materials on this web site for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.
Slide1
Staying safe in a digital age
Slide21)Have a strong password
A
t least 10 characters long, (12 for IOM3)
A
mixture of numbers, uppercase and lowercase letters
Include other symbolsAvoid common wordsDo not reuse passwordsChange your password regularly
Slide3Passwords to avoid
Password
same a
s username.
Personal information as password (name, city, birthday, family member names)
123456
123456789
qwerty
1234567811111112345678901234567password123123987654321qwertyuiopmynoob12332166666618atcskd2w77777771q2w3e4r6543215555553rjs1la7qegoogle1q2w3e4r5t123qwezxcvbnm1q2w3e
Slide4One suggestion for a secure password is to think of a phrase and use the initial letters of the words
eg
IwohtGi2017
I went on holiday to Greece in 2017
Slide52) Don’t use an unprotected computer
When
you access sensitive information from a non-secure computer, like one in an Internet café or a shared machine at home, you put the information you’re viewing at risk
.
Slide6Make sure your computer is running the latest approved security patches, antivirus and firewall.
You should work
in user mode, not administrator mode, whenever possible.
Slide73
) Don’t be tricked into giving away confidential information
Don’t respond to emails or phone calls requesting confidential company
information —
including
employee information, financial information, data or information about members or other internal information.
Slide8It’s easy for an unauthorised person to call us and pretend to be an employee, supplier, business partner or related institution
.
Report any suspicious activity to the IT manager
Slide94)
Don’t leave sensitive info lying around the officeDon’t
leave printouts containing private information
/ personal data on
your desk. Lock them in a drawer or shred them. It’s very easy for a visitor to glance down at your desk and see sensitive documents.
Slide10Keep
your desk tidy and documents locked away.
It makes the office look more organised, and reduces the risk of information leaks
.
Slide115
) Lock your devices –
computer, mobile phone,
ipad
etc when not in useAlways lock your computer and mobile phone when you’re not using them, especially when you move away from your desk.
You
need to
make sure that the documents you work on stay safe and secure.Locking your phone and computer keeps your data and contacts safe from prying eyes.
Slide126
) Password-protect sensitive files and devices
Always
password-protect sensitive files on your computer, USB, smartphone, etc
.
This is especially relevant to any files containing member/customer data or financial information.
Slide13Anyone
can lose a device
– protecting your devices with strong passwords means you make it more difficult for someone to break in and steal data
.
Slide147) Be cautious of suspicious emails and links
Always
delete suspicious emails and links. Even opening or viewing these emails and links can compromise your computer and create unwanted problems without your knowledge
.
Don’t let curiosity get the better of you.
If something looks too good to be true, it probably is.
Slide15The usual give away in Phishing emails is the
“From”
email address
On 17/11/2017 16:57, "Amber
Trower
" <mederova@ff.jcu.cz> wrote:>Good day Nuna Staniaszek,>Sending you your invoice below.I am available if you have any questions >or concerns at 01367 992425.>>#4 Invoice secondary Notice:
>
http://
o-intention.co.jp/Invoice-number-29940/>>Thank you!>Amber Trower
Slide168
)
Don’t plug in personal devices without the OK from IT
Don’t
plug in personal devices like USB flash drives, MP3 players and smartphones without permission from
the IT manager.These devices can be compromised with code waiting to launch as soon as you plug them into a computer.
Slide179
)
Always use the correct charger for your device
Never
use a cheap, non branded version as they can overheat and cause fires
If you move away from your desk unplug the device before leaving … plug in again on return.
Slide1810)
Do not use your IOM3 email address to sign up for personal accounts
Keep your work and personal online accounts totally separate – use your IOM3 email address for activities directly related to your work at IOM3, and a personal email address for your personal online accounts
Slide19Always stay
alert and report
any suspicious activity to the IT team. Part of our job is to stop cyber attacks and to make sure our data isn’t lost or stolen.
All
of our jobs depend on keeping our information safe. In case something goes wrong, the faster we know about it, the faster we can deal with
it.Better safe than sorry!
Slide20Keep your personal data safe
Slide21Protect yourself on social media
The use of social media to get your personal details is increasing. Many people will instantly think of hacking – but a great deal of fraud on social media comes from fraudsters piecing together information about users from various social channels – such as your name, date of birth, location – and even your bank details.
Once
they’ve gathered enough information, fraudsters can pretend to be you in order to take out loans or make purchases online
.
Slide22https://youtu.be/w2tW50CD6Aw
Slide23Think twice before posting personal information on any social media channel.
Slide24Take care when using public Wi-Fi
The security risk associated with using public Wi-Fi is that fraudsters could intercept anything you’re doing online. They could capture passwords for any account you sign in to, and read your private emails.
This can happen if the connection between your device and the Wi-Fi network isn’t encrypted – or if someone created a spoof hotspot that fools you into thinking it’s a real one.
Slide25U
nless
you’re using a secure web page, don’t send or receive private
information
Wherever
possible, use well-known hotspot providersWant to check your work emails or company network? You should use a secure and encrypted Virtual Private Network (VPN)Don’t leave your smartphone, tablet, laptop or dongle unattendedBe aware of who’s around you and may be watching what you’re doing onlineRemember that using a secure Wi-Fi connection doesn’t mean you shouldn’t take other online security precautions
Ways to keep your device safe on public Wi-Fi:
Slide26Never give away your PIN or password, payment or bank details to anyone requesting them by phone,
sms
, email or social media, even if they claim to be from the police or your bank
Slide27Never allow anyone you don’t know to access your computer remotely
Slide28Be safe!