digit digital
play

Digit Digital al Se Security y Training Be Best Practices A - PowerPoint PPT Presentation

Digit Digital al Se Security y Training Be Best Practices A digital training brought to you by RSAT Security in partnership with Supreme Technologies Group. Topics Covered Week 5 Week 1 Social Media Introduction to Information Security


  1. Digit Digital al Se Security y Training Be Best Practices A digital training brought to you by RSAT Security in partnership with Supreme Technologies Group.

  2. Topics Covered Week 5 Week 1 Social Media Introduction to Information Security Week 6 Week 2 Responsible Organizations Use of Information Email and Website Best Practices Week 3 Week 7 Data Leakage & How to prevent it Mobile Devices Week 4 Week 8 Responsible Use of the Internet – Clean Desk Principle Protecting your identity

  3. WEEK #4 Re Responsible Use of the Internet – Pr Protecting your identity

  4. Wh What do we me mean by “responsible us use”? “Responsible Use of the Internet” means, using the Internet in a manner that protects the identity of yourself and others as well as your values and the overall organization.

  5. Re Responsible Us Use of of the Internet Protecting your Identity

  6. Re Responsible Us Use of of the Internet

  7. Pr Protecting your identity “Up to 9 million Americans have their identities stolen each year according to the FTC, and at least 534 million personal records have been compromised since 2005 through attacks on the databases of businesses, government bodies, institutions, and organizations.”

  8. Pr Protecting your identity Protect your computer and smartphone with strong, up-to-date security software. If your computer or phone is infected with malicious software, other safeguards are of little help because you’ve given the criminals the key to all your online actions. Also be sure that any operating system updates are installed.

  9. Pr Protecting your identity Learn to spot spam and scams. Though some phishing scams are easy to identify, other phishing attempts in an email, IM, on social networking sites, or websites can look very legitimate. The only way to never fall for phishing scam is to never click on a link that has been sent to you.

  10. Pr Protecting your identity Monitor your credit scores. By law you have the right to three free credit reports per year; from Experian, Transunion, and Equifax. These three credit bureaus work together through a website called AnnualCreditReport.com so you can quest all three reports at once.

  11. Pr Protecting your identity Identity Theft Monitoring & Alerts Seriously consider subscribing to an identity theft monitoring service. Receive ongoing identity theft monitoring, proactive alert, dark web surveillance and credit protection.

  12. Pr Protecting your identity Identity Theft Monitoring Services

  13. Pr Protecting your identity What is the Dark Web? The dark web is a part of the internet that isn't indexed by search engines. You can buy credit card numbers, all manner of drugs, guns, counterfeit money, stolen subscription credentials, hacked Netflix accounts and software that helps you break into other people’s computers.

  14. “Thankfully, no passwords were available, but the data included email addresses, names, Facebook IDs, dates of birth and phone numbers. All of which is a perfect set of data with which to craft a text or email phishing campaign on behalf of Facebook. And if a small percentage of users click the link and enter their details into a spoofed Facebook login page, much more valuable data can be stolen.”

  15. Time for Q&A

  16. For additional support for your organization, please email us at rsatinfo@rsatsecurity.com rsatinfo@rsatsecurity.com (212) 634-7276 est. 702 www.rsatsecurity.com

Recommend


More recommend