information security awareness training open

44
Information Security Awareness Training SECURITY IS EVERYONE'S RESPONSIBILITY

Upload: fred-beck-mba-cpa

Post on 26-Jan-2017

770 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Information Security Awareness Training Open

Information Security Awareness Training

SECURITY IS EVERYONE'S RESPONSIBILITY

Page 2: Information Security Awareness Training Open

Training Objectives and Overview

Page 3: Information Security Awareness Training Open

ObjectivesAfter completing this training, you should be able to:• Understand cyber security threats associated with

email and other forms of electronic communications• Learn tips on how to safely maneuver through the

internet• Understand why it is important to protect our

information assets and your role in the process• Learn how to better secure your computer and data• Understand the importance of passwords and how

to create a strong password• Understand how international travel can pose risks

to information assets• Locate policies, standards and travel preparation on

the Employee Portal

Page 4: Information Security Awareness Training Open

Electronic Communication

Page 5: Information Security Awareness Training Open

Electronic Communication• Any Communication (email, instant messaging, text

messaging, etc.)sent in support of the corporate business is considered the corporate message and is subject to monitoring.

Do not Send:

• Anything which could be interpreted as abusive or harassing• Unsolicited advertising or anything that could be

interpreted as a scam

Page 6: Information Security Awareness Training Open

Electronic Communication-Do’s• Be careful of the information shared outside of the

company and its competitive value.

• Protect information inside the company by not sharing it with those without a need-to-know.

• Use approved “Chat” applications (set up by IT helpdesk) for instant messaging needs. The use of other commercial instant messaging products could allow viruses to infect your computer.

• Be mindful of the Information Security Policies and procedures restrictions on information sharing.

Improper use of electronic communication in support of the corporate business can put the corporate at risk and is a violation of company policy.

Page 7: Information Security Awareness Training Open

Email VirusesEmail is the most common source of computer viruses. What can you do to avoid computer viruses?

When receiving email from questionable sources:• Do not open attachments.• Do not click on web links.• Do not respond to the email.• If you don’t know the sender or what it concerns, the safest

thing to do is delete the email.• Forward the email to [email protected]

Even be cautious of email which appears to be from someone you know. The email could have been forwarded from a questionable or unknown email address. Be certain of the source before you click on a link.

Page 8: Information Security Awareness Training Open

Email• Email is inherently unsafe because it is the easiest way for

someone to breach the system and to trick you.

• Do not forward any confidential company email outside of the corporate policy (i.e., personal email accounts , etc.).

• If your job requires you to email confidential information to outside parties, including personal information, use the e-mail policy for the policy, Secure Email*.

*encrypt-to convert or scramble computer data and messages into something incomprehensible.

Page 9: Information Security Awareness Training Open

Spam• Spam is unsolicited email ( junk email). It may be

targeted to a certain group or a mass mailing.

• the corporate e-mail spam service blocks millions of spam email everyday; however some do manage to get through.

• For the majority of cases, delete the spam.

• If you feel someone should be alerted , call the help desk or forward the email to [email protected]

Page 10: Information Security Awareness Training Open

PhishingPhishing is a type of cyber attack involving forged emails and websites. Typically, an email is sent with a disturbing message such as “Your bank account has been suspended” and includes a website link or an attachment. The website link looks like a viable website, such as a financial institution, but is actually the hacker’s website.

To avoid being caught by a phishing email, individuals should:• Contact the business directly.• Be suspicious of any email requesting personal

information.• Do not open links or attachments from questionable

sources.• Delete the email.

Page 11: Information Security Awareness Training Open

Internet Usage

Page 12: Information Security Awareness Training Open

Use Good Judgmentthe corporate monitors internet usage and block certain websites for a variety of reasons.

Please be aware that anything you do on the internet can be traced.

When accessing the internet from email links use sound judgment. Be extremely wary of emails asking for information or asking you to click a link. If the email states “You’ve got to see this,” ask yourself why.

Please use sound judgement when accessing personal web-based email such as Yahoo, Gmail, or other non-the corporate email systems from your the corporate Computer.

Page 13: Information Security Awareness Training Open

Blocked Website CategoriesCertain types of websites are blocked from the the corporate network. Some examples include:

• Adult/Mature Content• Gambling• Games• Hacking• Personals/Dating• Social Media• Violence/Hate/Racism• Weapons

Contact IT for a complete list of Blocked Websites Categories.

Page 14: Information Security Awareness Training Open

Malware• Malware is a term for malicious software which is

designed to be installed on a computer without the owner’s knowledge.

• Spyware is a type of malware which monitors your computer activity and reports this activity back to the owner of the spyware. Spyware can keep track of the websites you visit.

• Based on this information, spam or phishing emails can be created by hackers to target your interests or work profession.

• Therefore, visiting unfamiliar sites could infect your computer with malware.

Page 15: Information Security Awareness Training Open

Caution Before You ClickComputers can get infected with malware by simply visiting an infected website. That is why it is very important to be careful when clicking a link in email, search lists, or web pages.

Malware can also steal data. This includes personal data such as computer ID’s, passwords, social security and account numbers.

To avoid having your identity compromised by malware:• Be careful what internet sites you visit.• Do not open attachments or links from unknown

sources.• Don’t download without your managers approval for

free software download offers.

Page 16: Information Security Awareness Training Open

Social Networking (i.e. Facebook, LinkedIn, Twitter)• Be very careful what information is shared on these

sites . Always consider what could be done with this information and the possible impact it may have.

• Certain data posted on these sites may allow a targeted email fraud, phishing, or spam attack to be developed.

• In addition, the personal information posted may be used in a social engineering attack, where someone masquerades as you or a person close to you.

• Access to many social networking sites is blocked from the the corporate network due to the risk of exposure.

Page 17: Information Security Awareness Training Open

Public Wireless Access• Public Wireless Internet is available at many

locations. It is important to understand when you use these networks you are no longer on a network controlled by either you or the corporate.

• Many of the security controls in place at work are not available on a public network. You cannot assume a public network is secure.

• Protect company information by ALWAYS using your the corporate secure Virtual Private Network (VPN) connection when accessing a public network.

• Always use extreme caution when handling the corporate information.

Page 18: Information Security Awareness Training Open

Personal Devices

Do not connect personal devices to the corporate network. Examples include:

• IPads• Tablets• Wireless camera• Wireless Printers

Do not use personal software for company business.

• Using personal software for company business violates company license agreements.

Page 19: Information Security Awareness Training Open

Data Security

Page 20: Information Security Awareness Training Open

Protecting Information• Non-public company information should be

protected, both inside and outside the company.

• Unauthorized disclosure of company information can put the corporate at risk. We could lose competitive advantage, create legal problems, violate regulatory requirements, or tarnish the image of the company.

• Information should only be shared with individuals on a need-to-know basis. the corporate uses access restrictions on File Shares to protect stored information and Secure File Transfer Protocol (SFTP) to securely transfer information.

Page 21: Information Security Awareness Training Open

Information ProtectionConfidential information should never be left unattended in place such as :• Meeting rooms• Fax machines• Printers• Desks• Dry erase boards• Unlocked file cabinets• Unsecured shared drives

Dispose of personal or confidential information in a secure manner (i.e., shred, delete data from hard drive according to company guidelines, or incinerate).

Use a clean desk approach. Lock up confidential/sensitive papers when you are not using them.

Page 22: Information Security Awareness Training Open

File Share Ownership for “Common Drive” Information

• Per the corporate policy, File Share owners must be a manager or supervisor.

• File Share owners are responsible for all content and access they own.

• Ownership roles must be reviewed annually and updated when there is a change in job responsibilities.

• Owners should limit access to only those who have a business need to access the information.

• Data owners should adhere to the the corporate Information Security Handling and Classification Policy (NO-POL-0026) to ensure content is retained based on regulatory obligations, industry benchmarks and sound business practices. The policy is available on the corporate’s intranet.

• Do not store Personally Identifiable Information (PII) on a File Share that is accessible by any employee who does not have a legitimate business purpose for accessing that information.

Page 23: Information Security Awareness Training Open

Unauthorized Software• Installing unauthorized software is a violation of

company policy that may result in disciplinary action. Software downloaded from the internet can contain vulnerabilities that put the entire association at risk.

• the corporate catalogs, tracks, and updates the software contained in the standard computer image for vulnerabilities. However, updates cannot be done for unauthorized software thus putting the association’s at risk.

• Software downloaded to share music can often make other files on your computer available for sharing to others and lead to disclosure of sensitive information.

• These precautions apply to all the corporate owned devices, including mobile devices (NO-POL-0013).

Page 24: Information Security Awareness Training Open

Mobile Device SecurityEvery individual at the corporate is responsible for protecting the company’s information and equipment.

• Laptops, smart phones, tablets and other mobile devices(i.e., thumb drives) should be locked or kept in your personal possession at all times.

• When traveling, be sensitive to where and when you use mobile devices such as phones , laptops, and tablets. Don't allow others to “look over your shoulder”.

• Never Leave laptops or other mobile devices in clear view inside a vehicle.

• Immediately report any stolen mobile device storing corporate information to Help Desk.

Mobile devices, including smart phones and tablets, must be password protected.

Page 25: Information Security Awareness Training Open

Corporate Mobile Devices and Personal Information• the corporate may elect to to provide corporately owned

mobile devices to enable the Company workforce. These devices may include tablets such as iPads, smart phones, Androids or other types of mobile devices.

• Though the devices are for corporate use, it is easy to commingle personal information with corporate data on the device.

• To ‘commingle’ company information and personal information means to mix them in some fashion. Commingling company information and personal information has privacy and security consequences.

• Examples of commingling data include:• Personal emails and/or documents stored on a

corporate device• Corporate email stored on a personal email account• Call records of personal telephone calls made on a

corporate device

Page 26: Information Security Awareness Training Open

Commingling – No Expectation of Privacy

• the corporate permits limited personal use of corporate computing resources .

• There are many consequences, to storing personal information on a corporate device, including mobile devices. Some of these consequences are :• Employees can have no expectation of privacy related to

personal information stored on the corporate device• If the employee is involved in personal litigation, and

relevant personal data is on the corporate device, that device may be subject to discovery and :• The Company may be compelled to provide the

personal information to counsel, placing personal information at risk of exposure, and

• The device may be unavailable to the company for a time which could place company data at risk of exposure.

Page 27: Information Security Awareness Training Open

USB Flash/Thumb Drives• USB drives are becoming a way to spread unwanted

malicious progrthe corporate.• It is important no to insert personal-use USB drives into

the corporate equipment. This may inadvertently transport a virus or other unwanted progrthe corporate.

• One hacking trick is to leave infected USB drives laying around in public places for people to pick up and use. While it is enticing to find a ‘free’ USB drive, inserting it into your corporate or home computer is strongly discouraged.

• To protect information contained on USB drives, look for devices that use a password or allow encryption (scrambling the information into secret code).A user manual often comes with the device to explain these features.

• If you work inside process control environments use only dedicated portable media to transfer information to Supervisory Control and Data Acquisition (SCADA) systems or process computer systems. Do not use this portable media for any other purpose.

Page 28: Information Security Awareness Training Open

What to do if you notice a Security Issue

If you suspect the corporate’s security has been compromised, a security issue has occurred or unauthorized information has been accessed or released, contact:

• The Help Desk• Your Manager or Supervisor

Page 29: Information Security Awareness Training Open

Social Engineering• Social Engineering is the art of manipulating people

into performing actions or divulging confidential information. Email is a common method used.

• They create a scenario based on a few known facts(names ,phone numbers, etc.) which seems believable. If the story is credible, then most people are more than willing to help the social engineer.

• For example, a social engineer may claim to be an the corporate IT employee who needs your password to fix a computer problem. In reality, they are trying to gain access to the corporate computers using your ID and password.

• Be very cautious and think twice before giving out the corporate information.

Page 30: Information Security Awareness Training Open

Physical Security

Page 31: Information Security Awareness Training Open

Physical Security for Information Assets• Facilities housing the corporate information assets

are physically restricted to authorized individuals and require a valid the corporate ID.

• These facilities or buildings must be protected by physical security controls that prevent unauthorized individuals from gaining access. Visitors are required to sign in and be accompanied by an escort while in company facilities.

• Remember:• Never allow others to user your badge• Never allow tailgating (holding a door or gate

open for another person that requires a badge).• Report lost or stolen badges immediately:

• HR Administration• Mangers or Supervisors• Help Desk

Page 32: Information Security Awareness Training Open

Sabotage on the corporate FacilitiesIndividuals should watch for one or more of the following signs:

• Physical surveillance of the corporate facilities• Any threats to individuals or property• Attempts to gain unauthorized access to restricted areas• Vandalism to company property

What should you do ?

• If threated or in danger , move to safety and call 911.• Notify HR Administration.• Do not touch anything. Preserve evidence for investigators.

Page 33: Information Security Awareness Training Open

Lock Your Computer• Lock your computer when you walk away. It is easy to do :• 1. Press the Ctrl+Alt+Del KEYS AT THE SAME TIME• 2. Then select the “Lock Computer” option

• You are responsible for all actions that occur with your ID. if you leave your computer unattended and unlocked, someone else could take action ( such as send email) using your identity or access your personal information (view your paycheck) via Portal.

• Your computer should always be in a physically secured location.

• Use the provided cable lock/tether to secure laptops left unattended.

Page 34: Information Security Awareness Training Open

Password Management

Page 35: Information Security Awareness Training Open

Your Password• Your password is an integral part of the overall

protection of the corporate’s information assets.

• Hackers will try to steal passwords and IDs to break into the corporate systems.

• If your password is compromised , the hacker has the ability to access anything you can access, using your identity.

• Never use your the corporate ID or account password on non the corporate systems such as Amazon, Facebook or EBay. Once a password is compromised, the next logical step for a hacker is to try that password on other systems that you access.

Page 36: Information Security Awareness Training Open

Password Guidelines & SuggestionsThe science of password cracking has been simplified with the use of high speed progrthe corporate that employ databases containing words and phrases. There are ways to protect your password from these types of attacks, such as creating a password by using a password phrase.

Tips: What Not to Do:• Do not write down or share your password.• Do not use the same password for everything(i.e., work,

personal banking, etc.)• Do not use information that others could associate with you,

like names of family members or pets.• Do not use cyclical, incremental, or patterned passwords.• Do not use words spelled backwards.• Do not use keyboard patterns (i.e., “asdf”).

For information on creating a strong password, see Password Requirements located on the Password Policy (NO-POL- 0022).

Page 37: Information Security Awareness Training Open

Tips for Creating a Strong PasswordCreate a strong , secure password that is easy to remember. Use a combination of upper case, lower case, numbers, and special characters to make your password complex.

• Example: Use the phrase "it is not enough to do your best ; you must know what to do, and Then do your best.” W.Edwards Deming• Take the first letter from each word, separate every four letters with a

comma, and then put a two digit number at the end.• Add a number or punctuation every few letters or between syllables.• A 12 character password would then be “iine,tdyb,12”.

• Your the corporate password should only be used for your the corporate’s account. Use a different password for all personal email accounts.

Page 38: Information Security Awareness Training Open

38

Privacy• Privacy is a set of fair information practices to ensure:

• Personal information is accurate, relevant, and current.• All collections, uses, and disclosures of personal information are known and appropriate.• Personal information is protected.

The Policy for Privacy:• Implements procedures and controls at all levels to protect the confidentiality and integrity of

information stored and processed on systems.

Page 39: Information Security Awareness Training Open

39

Different types and forms of Personally Identifiable

Information (PII)

•Social Security number (SSN)

• Health Insurance Claim Number (HICN)

• Date of birth (DOB)

• National Provider Identification (NPI)

• Driver’s license number

• Passport number

• Personal Health Information (PHI)

• Biometric Information

• PII must be protected in any form : paper, electronic, oral.

Page 40: Information Security Awareness Training Open

40

Recognize threats to information systems and privacy• Share information on a need to know basis.• Never access PII unless authorized to do so to perform your job.• Only store PII on encrypted devices.• Encrypt emails and double – check that the recipient name(s) is correct before sending.• When faxing, confirm that you have the correct fax number and call the recipient to confirm receipt.

Page 41: Information Security Awareness Training Open

41

Privacy Roles and Responsibilities Objective: Understand personal responsibility to protect information systems.

Privacy policies and procedures require you to:

• Collect, use, and disclose personal information for reasons that are for a

legitimate job function, support the mission of the corporate and are allowed by law.

• Disclose only the minimum amount of information.

• Access information only for authorized purposes.

• Follow standards to safeguard personal information throughout the information

life cycle.

• Report suspected privacy violations or incidents.

• Comply with all applicable privacy laws.

• Shred documents containing PII; NEVER place them in the trash. Contact the IT

Department for proper disposal of equipment like copy machines and

computers.

As a member of the the corporate workforce, you are responsible for privacy policies and procedures.

Page 42: Information Security Awareness Training Open

42

Privacy Violations • Privacy violations can result in severe consequences including:

Page 43: Information Security Awareness Training Open

Security Summary

Page 44: Information Security Awareness Training Open

Things You Can Do To Help Keep the Company Secure

It is the responsibility of each member of the corporate workforce to protect our enterprise information assets.Here are some things you can do to help:• Only the corporate equipment can be connected to the internal business

network.• Do not load any unapproved software on your the corporate equipment.• Do not change any corporate security settings.• Avoid opening email and attachments from questionable sources.• Lock your workstation before you walk away.• Protect the corporate data in all formats(i.e., thumb drive, hard copy, CD,

etc.)• Use a strong password.• Do not write down or share your password.• Ensure each member of the workforce has access to only what they need.• Beware of social engineering.• Report any lost or stolen company information asset (laptop, mobile

phone ,etc.) to the Help Desk.