biography

18
Protecting Your Identity: Information Security Basics Presented by: Barbara D. Kissner SVP & CIO International Fidelity Insurance Company March 18, 2014 3/18/2014 1

Upload: abe

Post on 19-Jan-2016

32 views

Category:

Documents


2 download

DESCRIPTION

Protecting Your Identity: Information Security Basics Presented by:Barbara D. Kissner SVP & CIO International Fidelity Insurance Company March 18, 2014. Biography. Barbara Kissner International Fidelity Insurance Company Senior Vice President, Chief Information Officer - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Biography

1

Protecting Your Identity:Information Security Basics Presented by: Barbara D. Kissner

SVP & CIOInternational Fidelity Insurance Company

March 18, 2014

3/18/2014

Page 2: Biography

2

BiographyBarbara KissnerInternational Fidelity Insurance CompanySenior Vice President, Chief Information Officer Barbara Kissner joined International Fidelity Insurance Company in 2007 as SVP and Chief Information Officer. Her responsibilities include management of the company’s telecommunications, IT and Licensing departments as well as overseeing the company’s Disaster Recovery plan and IFIC’s Regulatory Committee.

Prior to joining IFIC, Barbara served as the Chief Information Security Officer for BankAtlantic in Fort Lauderdale, FL, and Senior Vice President of Global IT Risk Management for The CIT Group. Barbara has authored many published articles on subjects ranging from e-commerce to information engineering and holds the CISA, CSTE, CSQA, CGEIT and CRISC designations. This year, she has been named one of Computerworld’s Premier 100 IT Honorees for 2014.

3/18/2014

Page 3: Biography

3

AgendaSecurity Awareness Requests for confidential informationUnexpected email and attachmentsSPAMInternet safetyPhishing attemptsProtecting your laptop and yourself Q&A

3/18/2014

Page 4: Biography

4

What is Security Awareness?

… it is the knowledge and attitude members of an organization possess regarding the protection of the physical and, especially, information assets of that

organization. (Wikipedia)

3/18/2014

Page 5: Biography

5

Requests for Confidential InformationDo not provide confidential information to unknown sources

This is especially true for unsolicited email and telephone callsVerify who is asking before you respondSpoofers use professional sounding names and organizations

to get you to reveal informationLegitimate companies do not ask you to “verify” SSN, PIN, date

of birth, account number through email

3/18/2014

Page 6: Biography

6

Unexpected Email AttachmentsIf you receive email from an unknown source, don’t open itNever open or forward unexpected attachmentsDo not respond to SPAM email

No, you did not win that free trip Those guys are not really going to put $30 million in your bank

accountDo not open or forward chain lettersDo not “unsubscribe” from an unknown email list or SPAM:

To unsubscribe from this mailing list: click here or send a blank message to: TopNotchRewards.o-9c93cbb-4c9.xx.xx.com.-bkissner@07.mailmx01.com

3/18/2014

Page 7: Biography

7

Spam

3/18/2014

Page 8: Biography

8

More Spam

3/18/2014

Page 9: Biography

9

And More, Dangerous Spam

3/18/2014

Page 10: Biography

10

Internet SafetyFirewalls are a must, even for MacsBuy AntiVirus and AntiSpyware and install them on every

computer in your homeWireless Networks

Turn off SSID broadcasting – this tells everyone in the neighborhood who you are

Change the installation passwords – everyone knows themEnable WPA encryptionKnow the names of the machines on your network and

regularly look for intruders

3/18/2014

Page 11: Biography

113/18/2014

Look For Security Features

LOCKHTTPS

Windows Explorer

Page 12: Biography

12

Other Browsers

3/18/2014

Google Chrome

Firefox

Safari

Page 13: Biography

13

Social WebsitesPopular social sites include Facebook, LinkedIn, Pinterest,

Instagram

Anything you post can be discovered

Prospective employers, universities and corrections agencies regularly scan these sites

Remember, even if you delete your entries or responses, someone already has a copy

3/18/2014

Page 14: Biography

14

Phishing – Part 1

3/18/2014

Page 15: Biography

15

Phishing – Part 2

3/18/2014

Page 16: Biography

16

Protect Your Laptops and Phones

3/18/2014

Store in secure place when you leave your office

Keep out of view when stored in your car

Don’t leave unattended in public places

Be especially careful in airports and train stations

Watch out for Spam text messages on cell phones

Be wary of strangers asking to borrow your phone

Page 17: Biography

In ConclusionYou can protect personal information and your Identity

Don’t respond to Spam email

Use firewalls, AntiVirus, AntiSpyware at home

Look for security features like HTTPS and the

Use caution when asked for sensitive information

Keep track of your personal articles, including cell phones and laptops

If something doesn’t look right, it probably isn’t!

Page 18: Biography

18

Questions?

3/18/2014

Barbara D. KissnerInternational Fidelity Insurance Company

[email protected]

973/624 7200 x259