/
Staying safe in a digital age Staying safe in a digital age

Staying safe in a digital age - PowerPoint Presentation

blackwidownissan
blackwidownissan . @blackwidownissan
Follow
343 views
Uploaded On 2020-08-26

Staying safe in a digital age - PPT Presentation

1Have a strong password A t least 10 characters long 12 for IOM3 A mixture of numbers uppercase and lowercase letters Include other symbols Avoid common words Do not reuse passwords Change your password regularly ID: 803227

personal information don

Share:

Link:

Embed:

Download Presentation from below link

Download The PPT/PDF document "Staying safe in a digital age" is the property of its rightful owner. Permission is granted to download and print the materials on this web site for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.


Presentation Transcript

Slide1

Staying safe in a digital age

Slide2

1)Have a strong password

A

t least 10 characters long, (12 for IOM3)

A

mixture of numbers, uppercase and lowercase letters

Include other symbolsAvoid common wordsDo not reuse passwordsChange your password regularly

Slide3

Passwords to avoid

Password

same a

s username.

Personal information as password (name, city, birthday, family member names)

123456

123456789

qwerty

1234567811111112345678901234567password123123987654321qwertyuiopmynoob12332166666618atcskd2w77777771q2w3e4r6543215555553rjs1la7qegoogle1q2w3e4r5t123qwezxcvbnm1q2w3e

Slide4

One suggestion for a secure password is to think of a phrase and use the initial letters of the words

eg

IwohtGi2017

I went on holiday to Greece in 2017

Slide5

2) Don’t use an unprotected computer

When

you access sensitive information from a non-secure computer, like one in an Internet café or a shared machine at home, you put the information you’re viewing at risk

.

Slide6

Make sure your computer is running the latest approved security patches, antivirus and firewall.

You should work

in user mode, not administrator mode, whenever possible.

Slide7

3

) Don’t be tricked into giving away confidential information

Don’t respond to emails or phone calls requesting confidential company

information —

including

employee information, financial information, data or information about members or other internal information.

Slide8

It’s easy for an unauthorised person to call us and pretend to be an employee, supplier, business partner or related institution

.

Report any suspicious activity to the IT manager

Slide9

4)

Don’t leave sensitive info lying around the officeDon’t

leave printouts containing private information

/ personal data on

your desk. Lock them in a drawer or shred them. It’s very easy for a visitor to glance down at your desk and see sensitive documents.

Slide10

Keep

your desk tidy and documents locked away.

It makes the office look more organised, and reduces the risk of information leaks

.

Slide11

5

) Lock your devices –

computer, mobile phone,

ipad

etc when not in useAlways lock your computer and mobile phone when you’re not using them, especially when you move away from your desk.

You

need to

make sure that the documents you work on stay safe and secure.Locking your phone and computer keeps your data and contacts safe from prying eyes.

Slide12

6

) Password-protect sensitive files and devices

Always

password-protect sensitive files on your computer, USB, smartphone, etc

.

This is especially relevant to any files containing member/customer data or financial information.

Slide13

Anyone

can lose a device

– protecting your devices with strong passwords means you make it more difficult for someone to break in and steal data

.

Slide14

7) Be cautious of suspicious emails and links

Always

delete suspicious emails and links. Even opening or viewing these emails and links can compromise your computer and create unwanted problems without your knowledge

.

Don’t let curiosity get the better of you.

If something looks too good to be true, it probably is.

Slide15

The usual give away in Phishing emails is the

“From”

email address

On 17/11/2017 16:57, "Amber

Trower

" <mederova@ff.jcu.cz> wrote:>Good day Nuna Staniaszek,>Sending you your invoice below.I am available if you have any questions >or concerns at 01367 992425.>>#4 Invoice secondary Notice:

>

http://

o-intention.co.jp/Invoice-number-29940/>>Thank you!>Amber Trower

Slide16

8

)

Don’t plug in personal devices without the OK from IT

Don’t

plug in personal devices like USB flash drives, MP3 players and smartphones without permission from

the IT manager.These devices can be compromised with code waiting to launch as soon as you plug them into a computer.

Slide17

9

)

Always use the correct charger for your device

Never

use a cheap, non branded version as they can overheat and cause fires

If you move away from your desk unplug the device before leaving … plug in again on return.

Slide18

10)

Do not use your IOM3 email address to sign up for personal accounts

Keep your work and personal online accounts totally separate – use your IOM3 email address for activities directly related to your work at IOM3, and a personal email address for your personal online accounts

Slide19

Always stay

alert and report

any suspicious activity to the IT team. Part of our job is to stop cyber attacks and to make sure our data isn’t lost or stolen.

All

of our jobs depend on keeping our information safe. In case something goes wrong, the faster we know about it, the faster we can deal with

it.Better safe than sorry!

Slide20

Keep your personal data safe

Slide21

Protect yourself on social media

 

The use of social media to get your personal details is increasing. Many people will instantly think of hacking – but a great deal of fraud on social media comes from fraudsters piecing together information about users from various social channels – such as your name, date of birth, location – and even your bank details.

Once

they’ve gathered enough information, fraudsters can pretend to be you in order to take out loans or make purchases online

.

Slide22

https://youtu.be/w2tW50CD6Aw

Slide23

Think twice before posting personal information on any social media channel.

Slide24

Take care when using public Wi-Fi

 

The security risk associated with using public Wi-Fi is that fraudsters could intercept anything you’re doing online. They could capture passwords for any account you sign in to, and read your private emails.

This can happen if the connection between your device and the Wi-Fi network isn’t encrypted – or if someone created a spoof hotspot that fools you into thinking it’s a real one.

Slide25

U

nless

you’re using a secure web page, don’t send or receive private

information

Wherever

possible, use well-known hotspot providersWant to check your work emails or company network? You should use a secure and encrypted Virtual Private Network (VPN)Don’t leave your smartphone, tablet, laptop or dongle unattendedBe aware of who’s around you and may be watching what you’re doing onlineRemember that using a secure Wi-Fi connection doesn’t mean you shouldn’t take other online security precautions

Ways to keep your device safe on public Wi-Fi:

Slide26

Never give away your PIN or password, payment or bank details to anyone requesting them by phone,

sms

, email or social media, even if they claim to be from the police or your bank

Slide27

Never allow anyone you don’t know to access your computer remotely

Slide28

Be safe!