Security Officer CISM CISA CISSP CCIESecurity overdagualredu INFOSEC Components WHY Average cost of a data breach 4 Million Average cost of a breach data 221record Cost of a data breach for Higher Education ID: 1043663
Download Presentation The PPT/PDF document "Veysel ERDAG, PhD Chief Information" is the property of its rightful owner. Permission is granted to download and print the materials on this web site for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.
1. Veysel ERDAG, PhDChief Information Security OfficerCISM, CISA, CISSP, CCIE-Securityoverdag@ualr.edu
2. INFOSEC Components
3. WHY?Average cost of a data breach:4 MillionAverage cost of a breach data:$221/recordCost of a data breach for Higher Education:$246/recordUALR has approximately 500.000 records$123 MillionRoot cause of data breaches:48%: Malicious or criminal attacks27%: System glitches25%: Human errors
4. SNAPSHOT
5.
6.
7. Security Systems in UA Little RockComprehensive, security in depth designNew Active DirectoryNew End-Point Security SolutionSymantecInformation security training.
8. Data Breaches: Huge NumbersDenial of Service Attacks: Un-stoppable
9. How to Detect Phishing Attacks-1?
10. How to Detect Phishing Attacks-2?
11. Protect Your Identity and Financial Information – Secure Web Connection
12. Protect Your Identity and Financial Information – Secure Web Connection – 2
13. Gift Card Attacks
14. Payroll Attacks
15.
16. Password Reset Request
17. Payroll Change Request - Chancellor
18. What should we do?Protect yourself first:Set a strong passwordShould be at least eight characters in lengthShould contain at least one lowercase characterShould contain at least one numberShould contain at least one special characterShould contain at least one uppercase characterShould not contain your first name, last name, or usernameUse different passwords for every different application or website.If you have difficulties to remember your passwords, please use a password-vault application.Social Networks like Twitter, Linkedin and Facebook are providing two factor authentication. Activate two factor authentication if the service is provided by the website.
19. ProtectionControl your visibilityBe careful about your postsSecure your mobile deviceBe careful about USB storage devicesUse VPNDispose your information properlyUpdate your systemsBackup regularly
20. Connected Devices – IoT (Internet of Things)Connected everythingHousehold devicesGame consolesYour personal tracking devices…Attackers can collect personal information:Your locationYour health informationYour behavioral habits, daily routinesFollow the guidelines in UALR IT Services Security website.
21. Last Words and RemindersKeep your passwords secret.Do not share your password with anybodyIT Services never ask your passwordOn the phone or via e-mailChange your passwords as frequent as possible.Use security solutions provided by UALRBe the part of the community and help your community to protect and to be protectedIf you see any suspicious activity, please call IT Services Assistance Center501 – 916 3011Itservices-help@ualr.edu
22. T H A N K Y O Uoverdag@ualr.edu