SlideShare a Scribd company logo
1 of 2
Download to read offline
OFFICE OF THE
CHIEF HUMAN CAPITAL OFFICER
Contact Information:
1000 Independence Ave, SW
Washington, DC 20585
Glenn Goldsmith
Cyber Security Program Manager
202-287-5328
Glenn.Goldsmith@Hq.Doe.Gov
	 Maintain a dialogue with your
Cyber security Professional, friends,
family, and work colleagues about
internal security.
PASSWORDS
SOCIAL ENGINEERING
	 Use passwords that contain at
least 12 characters including special
characters (if possible).
	 Do not share your password
with anyone. Your password should
be private and confidential.
	 Canyouchangeyourpassword...
Cyber Security &
Prevention tips
Compromised Home Email
http://energy.gov/hc/office-chief-human-capital-officer
COMPROMISED
EMAIL
	 When email is compromised,
it can cause a host of problems
ranging from an email account
breach, to identity theft if account
names and passwords are stored in
the email system that you use.
KEY CYBER
SECURITY TIPS

More Related Content

Viewers also liked

51131 - AAPI Banner
51131 - AAPI Banner51131 - AAPI Banner
51131 - AAPI BannerSarah Harman
 
cover, spine,back jacket
cover, spine,back jacketcover, spine,back jacket
cover, spine,back jacketSarah Harman
 
43539 NHHM Banner Final revised 9-13 FINAL FOR PRINT
43539 NHHM Banner Final revised 9-13 FINAL FOR PRINT43539 NHHM Banner Final revised 9-13 FINAL FOR PRINT
43539 NHHM Banner Final revised 9-13 FINAL FOR PRINTSarah Harman
 
EMN_Infographic- Proof 6
EMN_Infographic- Proof 6EMN_Infographic- Proof 6
EMN_Infographic- Proof 6Sarah Harman
 
Black Women In American Culture & History revised FINAL USE ME
Black Women In American Culture & History revised FINAL USE MEBlack Women In American Culture & History revised FINAL USE ME
Black Women In American Culture & History revised FINAL USE MESarah Harman
 
50363 2015 NEJC Conference - Informational Poster
50363 2015 NEJC Conference - Informational Poster50363 2015 NEJC Conference - Informational Poster
50363 2015 NEJC Conference - Informational PosterSarah Harman
 
32022 Knowledge Capture Transfer Program 6
32022 Knowledge Capture Transfer Program 632022 Knowledge Capture Transfer Program 6
32022 Knowledge Capture Transfer Program 6Sarah Harman
 
43539 NHHM 20x30 Poster Final
43539 NHHM 20x30 Poster Final43539 NHHM 20x30 Poster Final
43539 NHHM 20x30 Poster FinalSarah Harman
 
SC Earthday brochure revised final
SC Earthday brochure revised finalSC Earthday brochure revised final
SC Earthday brochure revised finalSarah Harman
 

Viewers also liked (20)

51131 - AAPI Banner
51131 - AAPI Banner51131 - AAPI Banner
51131 - AAPI Banner
 
cover, spine,back jacket
cover, spine,back jacketcover, spine,back jacket
cover, spine,back jacket
 
OST FINAL
OST FINALOST FINAL
OST FINAL
 
43539 NHHM Banner Final revised 9-13 FINAL FOR PRINT
43539 NHHM Banner Final revised 9-13 FINAL FOR PRINT43539 NHHM Banner Final revised 9-13 FINAL FOR PRINT
43539 NHHM Banner Final revised 9-13 FINAL FOR PRINT
 
EMN_Infographic- Proof 6
EMN_Infographic- Proof 6EMN_Infographic- Proof 6
EMN_Infographic- Proof 6
 
Black Women In American Culture & History revised FINAL USE ME
Black Women In American Culture & History revised FINAL USE MEBlack Women In American Culture & History revised FINAL USE ME
Black Women In American Culture & History revised FINAL USE ME
 
Council Brochure2
Council Brochure2Council Brochure2
Council Brochure2
 
50363 2015 NEJC Conference - Informational Poster
50363 2015 NEJC Conference - Informational Poster50363 2015 NEJC Conference - Informational Poster
50363 2015 NEJC Conference - Informational Poster
 
Savannah FINAL
Savannah FINALSavannah FINAL
Savannah FINAL
 
32022 Knowledge Capture Transfer Program 6
32022 Knowledge Capture Transfer Program 632022 Knowledge Capture Transfer Program 6
32022 Knowledge Capture Transfer Program 6
 
WAPA FINAL
WAPA FINALWAPA FINAL
WAPA FINAL
 
supercomputers2
supercomputers2supercomputers2
supercomputers2
 
NSO FINAL
NSO FINALNSO FINAL
NSO FINAL
 
43539 NHHM 20x30 Poster Final
43539 NHHM 20x30 Poster Final43539 NHHM 20x30 Poster Final
43539 NHHM 20x30 Poster Final
 
SC Earthday brochure revised final
SC Earthday brochure revised finalSC Earthday brochure revised final
SC Earthday brochure revised final
 
DFO Coin 5
DFO Coin 5DFO Coin 5
DFO Coin 5
 
Council Brochure
Council BrochureCouncil Brochure
Council Brochure
 
FEVS Coin
FEVS CoinFEVS Coin
FEVS Coin
 
Content 6x11
Content 6x11Content 6x11
Content 6x11
 
Women in Science2
Women in Science2Women in Science2
Women in Science2
 

Similar to Compromised Home Email Trifold- full bleed - revised 4-10-14

Customer information security awareness training
Customer information security awareness trainingCustomer information security awareness training
Customer information security awareness trainingAbdalrhmanTHassan
 
Security and the Service Desk
Security and the Service DeskSecurity and the Service Desk
Security and the Service DeskNorthCoastHDI
 
The Net is Dangerous
The Net is DangerousThe Net is Dangerous
The Net is DangerousGihan Dias
 
Lesson learned from linked in
Lesson learned from linked inLesson learned from linked in
Lesson learned from linked inPayza
 
Cyber security and privacy
Cyber security and privacyCyber security and privacy
Cyber security and privacyJIJO CLEETUS
 
Email threat detection and mitigation
Email threat detection and mitigationEmail threat detection and mitigation
Email threat detection and mitigationNimishaRawat
 
Confidentiality in a Wired World
Confidentiality in a Wired WorldConfidentiality in a Wired World
Confidentiality in a Wired WorldDavid Whelan
 
The strategies of pass0word
The strategies of pass0wordThe strategies of pass0word
The strategies of pass0wordAlimasmali3
 
Internet Security Comp Refurb
Internet Security  Comp RefurbInternet Security  Comp Refurb
Internet Security Comp RefurbLuis Terron
 
Importance Of Email Encryption In Organizations
Importance Of Email Encryption In Organizations  Importance Of Email Encryption In Organizations
Importance Of Email Encryption In Organizations ZixMailEncryption.com
 
Watch Your Back: Let’s Talk Web Safety and Personal Identity Theft
Watch Your Back: Let’s Talk Web Safety and Personal Identity TheftWatch Your Back: Let’s Talk Web Safety and Personal Identity Theft
Watch Your Back: Let’s Talk Web Safety and Personal Identity TheftSchipul - The Web Marketing Company
 
Microsoft 365 security in the cloud
Microsoft 365 security in the cloudMicrosoft 365 security in the cloud
Microsoft 365 security in the cloudNovaQuantum
 
Internet safety gerard and saul
Internet safety gerard and saulInternet safety gerard and saul
Internet safety gerard and saulSaul Vidal Swales
 
Cyber Security Awareness (Reduce Personal & Business Risk)
Cyber Security Awareness (Reduce Personal & Business Risk)Cyber Security Awareness (Reduce Personal & Business Risk)
Cyber Security Awareness (Reduce Personal & Business Risk)Gian Gentile
 

Similar to Compromised Home Email Trifold- full bleed - revised 4-10-14 (20)

Customer information security awareness training
Customer information security awareness trainingCustomer information security awareness training
Customer information security awareness training
 
Web20security
Web20securityWeb20security
Web20security
 
Security and the Service Desk
Security and the Service DeskSecurity and the Service Desk
Security and the Service Desk
 
The Net is Dangerous
The Net is DangerousThe Net is Dangerous
The Net is Dangerous
 
Lesson learned from linked in
Lesson learned from linked inLesson learned from linked in
Lesson learned from linked in
 
Information Secuirty
Information SecuirtyInformation Secuirty
Information Secuirty
 
Cyber security and privacy
Cyber security and privacyCyber security and privacy
Cyber security and privacy
 
Email threat detection and mitigation
Email threat detection and mitigationEmail threat detection and mitigation
Email threat detection and mitigation
 
Confidentiality in a Wired World
Confidentiality in a Wired WorldConfidentiality in a Wired World
Confidentiality in a Wired World
 
The strategies of pass0word
The strategies of pass0wordThe strategies of pass0word
The strategies of pass0word
 
Securing password
Securing passwordSecuring password
Securing password
 
Internet Security Comp Refurb
Internet Security  Comp RefurbInternet Security  Comp Refurb
Internet Security Comp Refurb
 
Importance Of Email Encryption In Organizations
Importance Of Email Encryption In Organizations  Importance Of Email Encryption In Organizations
Importance Of Email Encryption In Organizations
 
Watch Your Back: Let’s Talk Web Safety and Personal Identity Theft
Watch Your Back: Let’s Talk Web Safety and Personal Identity TheftWatch Your Back: Let’s Talk Web Safety and Personal Identity Theft
Watch Your Back: Let’s Talk Web Safety and Personal Identity Theft
 
Microsoft 365 security in the cloud
Microsoft 365 security in the cloudMicrosoft 365 security in the cloud
Microsoft 365 security in the cloud
 
Gone Phishing
Gone Phishing Gone Phishing
Gone Phishing
 
Phishing and prevention
Phishing and preventionPhishing and prevention
Phishing and prevention
 
Internet safety gerard and saul
Internet safety gerard and saulInternet safety gerard and saul
Internet safety gerard and saul
 
Cyber Security Awareness (Reduce Personal & Business Risk)
Cyber Security Awareness (Reduce Personal & Business Risk)Cyber Security Awareness (Reduce Personal & Business Risk)
Cyber Security Awareness (Reduce Personal & Business Risk)
 
Cyber security training
Cyber security trainingCyber security training
Cyber security training
 

More from Sarah Harman

51601-HR Recruitment Mock-up 3
51601-HR Recruitment Mock-up 351601-HR Recruitment Mock-up 3
51601-HR Recruitment Mock-up 3Sarah Harman
 
2015 FEVS T-Shirt Concept
2015 FEVS T-Shirt Concept2015 FEVS T-Shirt Concept
2015 FEVS T-Shirt ConceptSarah Harman
 
Updated Transition Covers
Updated Transition CoversUpdated Transition Covers
Updated Transition CoversSarah Harman
 
43590 FFF Festival Banner final
43590 FFF Festival Banner final43590 FFF Festival Banner final
43590 FFF Festival Banner finalSarah Harman
 
49217 - Veteran's Day Program- Banner 72x30-option 2
49217 - Veteran's Day Program- Banner 72x30-option 249217 - Veteran's Day Program- Banner 72x30-option 2
49217 - Veteran's Day Program- Banner 72x30-option 2Sarah Harman
 
DOE Veteran's Lapel Pin
DOE Veteran's Lapel PinDOE Veteran's Lapel Pin
DOE Veteran's Lapel PinSarah Harman
 
Program content final
Program content finalProgram content final
Program content finalSarah Harman
 

More from Sarah Harman (10)

CEMI Cover
CEMI CoverCEMI Cover
CEMI Cover
 
51601-HR Recruitment Mock-up 3
51601-HR Recruitment Mock-up 351601-HR Recruitment Mock-up 3
51601-HR Recruitment Mock-up 3
 
2015 FEVS T-Shirt Concept
2015 FEVS T-Shirt Concept2015 FEVS T-Shirt Concept
2015 FEVS T-Shirt Concept
 
Updated Transition Covers
Updated Transition CoversUpdated Transition Covers
Updated Transition Covers
 
43590 FFF Festival Banner final
43590 FFF Festival Banner final43590 FFF Festival Banner final
43590 FFF Festival Banner final
 
DOE Labs
DOE LabsDOE Labs
DOE Labs
 
49217 - Veteran's Day Program- Banner 72x30-option 2
49217 - Veteran's Day Program- Banner 72x30-option 249217 - Veteran's Day Program- Banner 72x30-option 2
49217 - Veteran's Day Program- Banner 72x30-option 2
 
BPA FINAL
BPA FINALBPA FINAL
BPA FINAL
 
DOE Veteran's Lapel Pin
DOE Veteran's Lapel PinDOE Veteran's Lapel Pin
DOE Veteran's Lapel Pin
 
Program content final
Program content finalProgram content final
Program content final
 

Compromised Home Email Trifold- full bleed - revised 4-10-14

  • 1. OFFICE OF THE CHIEF HUMAN CAPITAL OFFICER Contact Information: 1000 Independence Ave, SW Washington, DC 20585 Glenn Goldsmith Cyber Security Program Manager 202-287-5328 Glenn.Goldsmith@Hq.Doe.Gov Maintain a dialogue with your Cyber security Professional, friends, family, and work colleagues about internal security. PASSWORDS SOCIAL ENGINEERING Use passwords that contain at least 12 characters including special characters (if possible). Do not share your password with anyone. Your password should be private and confidential. Canyouchangeyourpassword... Cyber Security & Prevention tips Compromised Home Email http://energy.gov/hc/office-chief-human-capital-officer
  • 2. COMPROMISED EMAIL When email is compromised, it can cause a host of problems ranging from an email account breach, to identity theft if account names and passwords are stored in the email system that you use. KEY CYBER SECURITY TIPS