SlideShare a Scribd company logo
1 of 13
2013 Fall CCCS Security
Awareness
Why does Security Awareness apply
to me?
What is the Top Cause of
Organizational Breaches?

•
•
•
•

External hackers having fun?
External organized crime mobs stealing data?
Government sponsored hacking?
Negligent Insiders?
I’m an insider, why do I care?
• Our customers expect and demand us to treat
their Personal Private Information (PPI) with
due care.
• State law mandates that we do the right thing
for our students. National law mandates that
we take due care with Payment Card Industry
(PCI) data.
• Our brand name is build on our constant
diligent care and ruined by one careless slip.
Seven Mistakes
we can’t make!

• #1 – Choosing poor passwords.
• #2 – Allowing sensitive data to be
viewed by others.
• #3 – Using unknown USB devices.
• #4 – Clicking bad links in e-mail.
• #5 – Loosing devices with
sensitive data.
• #6 – Using unknown Wi-Fi.
• #7 – Misusing Social Media.
Poor Passwords
• In a large number of physical security audits
passwords were found on and around end
user workstations.

• What to do?
Write yourself a reminder of the password,
not the password itself. Use a password
schema and stick to it.
Clear screen & clean desk
• 71% of office workers say that they have been
able to sneak a peek at a workstation in the
workplace.

• What to do?
Lock your computer screen when you step
out. Store hard copy Personal Private
Information in a cabinet or file folder.
Unknown USB devices
• 35% of users have report having experienced
malware or virus infection via a USB device.
Attackers will leave infected devices in semipublic areas, sometimes with the company
logo and then simply wait.
• What to do?
Only use USB devices that you own or trust.
Ask IT to inspect any suspect USB devices.
Phishing Attacks
• CCCS and other educational organizations are
often the target of sophisticated, custom targeted
email phishing campaigns. While SPAM filters can
help, the human element is critical to stop these
attacks.
• What to do?
CCCS staff will never ask for Credentials via email.
Any email asking for login info should be treated
as bogus and discarded.
Lost Devices
• Almost 90% of people who find lost
smartphones will look through the digital
contents for sensitive information. Around
70% of users do not password protect their
smartphones.
• What to do?
Password protect your smartphone. Notify IT
as soon as possible if you should loose it.
Using Unknown Wi-Fi
• Less than 20% of users will use a VPN when
accessing a public Wi-Fi (Wireless hotspot.)
Rogue Wi-Fi “providers” can easily intercept
sensitive data and compromise CCCS
machines.
• What to do?
Always use the VPN when accessing offsite
guest Wi-Fi services.
Social Media
• As social media norms are changing rapidly, more than
50% of enterprises have seen an increase of malware
infections due to employee use of Social Media. Social
media can also easily make public things that shouldn’t
be disclosed.

• What to do?
Beware of viral videos that require you to install any
application in order to view them.
Be mindful of how others will view what you post
online. It can be very easy for others to find you and
misrepresent your posting.
CCCS Security Defenses
•
•
•
•
•

Firewalls
Malware prevention devices
Intrusion detection devices
Spam filters
System & network vulnerability scanners

• Most importantly – YOU! Educated end users are
the most important part of a good security
posture.
Questions?
• Comments?
• Suggestions?

• CCCS Security Contacts:
cccs.edu/infosec
303-620-HELP (4357)
CCCS-ITHelpDesk@cccs.edu

More Related Content

What's hot

E commerce fraud chapter 17 B Ahmed
E commerce fraud chapter 17 B AhmedE commerce fraud chapter 17 B Ahmed
E commerce fraud chapter 17 B Ahmed
VidaB
 

What's hot (20)

Protecting Yourself Against Mobile Phishing
Protecting Yourself Against Mobile PhishingProtecting Yourself Against Mobile Phishing
Protecting Yourself Against Mobile Phishing
 
Jitter Bugslec
Jitter BugslecJitter Bugslec
Jitter Bugslec
 
The disadvantages of ict
The disadvantages of ictThe disadvantages of ict
The disadvantages of ict
 
Unit 2
Unit 2Unit 2
Unit 2
 
Rajveer choudhary cyber crime presentation
Rajveer choudhary cyber crime presentationRajveer choudhary cyber crime presentation
Rajveer choudhary cyber crime presentation
 
Traditional problem associated with cyber crime
Traditional problem associated with cyber crimeTraditional problem associated with cyber crime
Traditional problem associated with cyber crime
 
Online privacy & security
Online privacy & securityOnline privacy & security
Online privacy & security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber security (2) (2)
Cyber security (2) (2)Cyber security (2) (2)
Cyber security (2) (2)
 
E commerce fraud chapter 17 B Ahmed
E commerce fraud chapter 17 B AhmedE commerce fraud chapter 17 B Ahmed
E commerce fraud chapter 17 B Ahmed
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Disadvantages of-i ct-woww
Disadvantages of-i ct-wowwDisadvantages of-i ct-woww
Disadvantages of-i ct-woww
 
Cyber crime in india
Cyber crime in indiaCyber crime in india
Cyber crime in india
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Computer Security and Ethics
Computer Security and EthicsComputer Security and Ethics
Computer Security and Ethics
 
Mobile security
Mobile security Mobile security
Mobile security
 
Disadvantages of-i ct-woww
Disadvantages of-i ct-wowwDisadvantages of-i ct-woww
Disadvantages of-i ct-woww
 
SOCIAL NETWORK SECURITY
SOCIAL NETWORK SECURITYSOCIAL NETWORK SECURITY
SOCIAL NETWORK SECURITY
 
Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things
 
Online Safety and Security
Online Safety and Security Online Safety and Security
Online Safety and Security
 

Similar to Security Awareness Presentation Fall 2013

csa2014 IBC
csa2014 IBCcsa2014 IBC
csa2014 IBC
apyn
 
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdfitsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
MansoorAhmed57263
 

Similar to Security Awareness Presentation Fall 2013 (20)

Cyberattacks.pptx
Cyberattacks.pptxCyberattacks.pptx
Cyberattacks.pptx
 
csa2014 IBC
csa2014 IBCcsa2014 IBC
csa2014 IBC
 
Info Session on Cybersecurity & Cybersecurity Study Jams
Info Session on Cybersecurity & Cybersecurity Study JamsInfo Session on Cybersecurity & Cybersecurity Study Jams
Info Session on Cybersecurity & Cybersecurity Study Jams
 
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdfitsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
 
IT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.ppt
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Security Motivation
Cyber Security MotivationCyber Security Motivation
Cyber Security Motivation
 
OSAC: Personal Digital Security Presentation
OSAC: Personal Digital Security PresentationOSAC: Personal Digital Security Presentation
OSAC: Personal Digital Security Presentation
 
Digital Security and Hygiene.pptx
Digital Security and Hygiene.pptxDigital Security and Hygiene.pptx
Digital Security and Hygiene.pptx
 
Cyber crime in pakistan by zubair
Cyber crime in pakistan by zubairCyber crime in pakistan by zubair
Cyber crime in pakistan by zubair
 
[r]evolution Digital Literacy Workshop Slides
[r]evolution Digital Literacy Workshop Slides[r]evolution Digital Literacy Workshop Slides
[r]evolution Digital Literacy Workshop Slides
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
 
CCIAOR Cyber Security Forum
CCIAOR Cyber Security ForumCCIAOR Cyber Security Forum
CCIAOR Cyber Security Forum
 
What is Cybercrime and How to Prevent Cybercrime?
What is Cybercrime and How to Prevent Cybercrime?What is Cybercrime and How to Prevent Cybercrime?
What is Cybercrime and How to Prevent Cybercrime?
 
Internet safety and security
Internet safety and securityInternet safety and security
Internet safety and security
 
Unveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity postureUnveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity posture
 
Data security
Data securityData security
Data security
 
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptxCYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of Cybercrime
 
5 Technology Trends Construction Contractors Can't Afford To Ignore
5 Technology Trends Construction Contractors Can't Afford To Ignore5 Technology Trends Construction Contractors Can't Afford To Ignore
5 Technology Trends Construction Contractors Can't Afford To Ignore
 

More from COCommunityCollegeSystem (20)

High schoolers
High schoolersHigh schoolers
High schoolers
 
Graduate
GraduateGraduate
Graduate
 
Historical
HistoricalHistorical
Historical
 
Ged
GedGed
Ged
 
Concert
ConcertConcert
Concert
 
Tsjc ladies
Tsjc ladiesTsjc ladies
Tsjc ladies
 
Golf and ladies
Golf and ladiesGolf and ladies
Golf and ladies
 
Hot classes
Hot classesHot classes
Hot classes
 
Show
ShowShow
Show
 
Art
ArtArt
Art
 
Valley campus 2 21-15 1
Valley campus 2 21-15 1Valley campus 2 21-15 1
Valley campus 2 21-15 1
 
Tcn 2015 02_24_final 1
Tcn 2015 02_24_final 1Tcn 2015 02_24_final 1
Tcn 2015 02_24_final 1
 
Tsjc foundation
Tsjc foundationTsjc foundation
Tsjc foundation
 
Rep
RepRep
Rep
 
Best
BestBest
Best
 
Acat
AcatAcat
Acat
 
Tough
ToughTough
Tough
 
Valley campus 2 6-15 1
Valley campus 2 6-15 1Valley campus 2 6-15 1
Valley campus 2 6-15 1
 
Three sports stories
Three sports storiesThree sports stories
Three sports stories
 
Sweep
SweepSweep
Sweep
 

Recently uploaded

Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 

Recently uploaded (20)

PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 

Security Awareness Presentation Fall 2013

  • 1. 2013 Fall CCCS Security Awareness Why does Security Awareness apply to me?
  • 2. What is the Top Cause of Organizational Breaches? • • • • External hackers having fun? External organized crime mobs stealing data? Government sponsored hacking? Negligent Insiders?
  • 3. I’m an insider, why do I care? • Our customers expect and demand us to treat their Personal Private Information (PPI) with due care. • State law mandates that we do the right thing for our students. National law mandates that we take due care with Payment Card Industry (PCI) data. • Our brand name is build on our constant diligent care and ruined by one careless slip.
  • 4. Seven Mistakes we can’t make! • #1 – Choosing poor passwords. • #2 – Allowing sensitive data to be viewed by others. • #3 – Using unknown USB devices. • #4 – Clicking bad links in e-mail. • #5 – Loosing devices with sensitive data. • #6 – Using unknown Wi-Fi. • #7 – Misusing Social Media.
  • 5. Poor Passwords • In a large number of physical security audits passwords were found on and around end user workstations. • What to do? Write yourself a reminder of the password, not the password itself. Use a password schema and stick to it.
  • 6. Clear screen & clean desk • 71% of office workers say that they have been able to sneak a peek at a workstation in the workplace. • What to do? Lock your computer screen when you step out. Store hard copy Personal Private Information in a cabinet or file folder.
  • 7. Unknown USB devices • 35% of users have report having experienced malware or virus infection via a USB device. Attackers will leave infected devices in semipublic areas, sometimes with the company logo and then simply wait. • What to do? Only use USB devices that you own or trust. Ask IT to inspect any suspect USB devices.
  • 8. Phishing Attacks • CCCS and other educational organizations are often the target of sophisticated, custom targeted email phishing campaigns. While SPAM filters can help, the human element is critical to stop these attacks. • What to do? CCCS staff will never ask for Credentials via email. Any email asking for login info should be treated as bogus and discarded.
  • 9. Lost Devices • Almost 90% of people who find lost smartphones will look through the digital contents for sensitive information. Around 70% of users do not password protect their smartphones. • What to do? Password protect your smartphone. Notify IT as soon as possible if you should loose it.
  • 10. Using Unknown Wi-Fi • Less than 20% of users will use a VPN when accessing a public Wi-Fi (Wireless hotspot.) Rogue Wi-Fi “providers” can easily intercept sensitive data and compromise CCCS machines. • What to do? Always use the VPN when accessing offsite guest Wi-Fi services.
  • 11. Social Media • As social media norms are changing rapidly, more than 50% of enterprises have seen an increase of malware infections due to employee use of Social Media. Social media can also easily make public things that shouldn’t be disclosed. • What to do? Beware of viral videos that require you to install any application in order to view them. Be mindful of how others will view what you post online. It can be very easy for others to find you and misrepresent your posting.
  • 12. CCCS Security Defenses • • • • • Firewalls Malware prevention devices Intrusion detection devices Spam filters System & network vulnerability scanners • Most importantly – YOU! Educated end users are the most important part of a good security posture.
  • 13. Questions? • Comments? • Suggestions? • CCCS Security Contacts: cccs.edu/infosec 303-620-HELP (4357) CCCS-ITHelpDesk@cccs.edu