SlideShare a Scribd company logo
1 of 3
Computer Security Awareness: Best Practices Practicing safe computing involves understanding threats, vulnerabilities, risks and safety.
Best PracticesDo’s & Don’ts Do! Don’t! Do keep passwords secret Do keep laptops, USB drives and other mobile media secure Do set your antivirus program, operating system and other programs to update automatically  Do use locked screensavers Do follow procedures for proper disposal of Sensitive Information Do NOT include Sensitive Information in email Do NOT allow unauthorized access to your computer Do NOT open electronic cards from unknown users Do NOT open unexpected attachments or links
Get Help! 24hrs / 7days a week If you suspect a problem or have a question: Notify your supervisor.  Notify the Information Security Office. Call the campus IT Help Desk at 919.962.HELP available 24/7, 365 days a year.

More Related Content

What's hot

Basic Security Computere
Basic Security ComputereBasic Security Computere
Basic Security Computere
rashmi1234
 
Noorhidayu Yussof (Presentation 3)
Noorhidayu Yussof (Presentation 3)Noorhidayu Yussof (Presentation 3)
Noorhidayu Yussof (Presentation 3)
Noorhidayu Yussof
 

What's hot (19)

Basic Security Computere
Basic Security ComputereBasic Security Computere
Basic Security Computere
 
The Benefits of a Network Security Plan
The Benefits of a Network Security PlanThe Benefits of a Network Security Plan
The Benefits of a Network Security Plan
 
STUD2014061015290600743071141130140142
STUD2014061015290600743071141130140142STUD2014061015290600743071141130140142
STUD2014061015290600743071141130140142
 
What is CryptoLocker and How Can I Protect My Business From It?
What is CryptoLocker and How Can I Protect My Business From It?What is CryptoLocker and How Can I Protect My Business From It?
What is CryptoLocker and How Can I Protect My Business From It?
 
Video surveillance: Why should my business use it?
Video surveillance: Why should my business use it?Video surveillance: Why should my business use it?
Video surveillance: Why should my business use it?
 
10 critical elements of next generation of endpoint layered security
10 critical elements of next generation of endpoint layered security10 critical elements of next generation of endpoint layered security
10 critical elements of next generation of endpoint layered security
 
Windows XP End of Support
Windows XP End of SupportWindows XP End of Support
Windows XP End of Support
 
15 Tips to Protect Yourself from Cyber Attacks
15 Tips to Protect Yourself from Cyber Attacks15 Tips to Protect Yourself from Cyber Attacks
15 Tips to Protect Yourself from Cyber Attacks
 
Security Awareness 9-10-09 v5 Protect Equipment
Security Awareness 9-10-09 v5 Protect EquipmentSecurity Awareness 9-10-09 v5 Protect Equipment
Security Awareness 9-10-09 v5 Protect Equipment
 
Cybersecurity in 2016
Cybersecurity in 2016Cybersecurity in 2016
Cybersecurity in 2016
 
Computer based crime
Computer based crimeComputer based crime
Computer based crime
 
Health information secuirty session 5 best practise in information security
Health information secuirty session 5 best practise in information securityHealth information secuirty session 5 best practise in information security
Health information secuirty session 5 best practise in information security
 
Noorhidayu Yussof (Presentation 3)
Noorhidayu Yussof (Presentation 3)Noorhidayu Yussof (Presentation 3)
Noorhidayu Yussof (Presentation 3)
 
Safe Internet Banking Cyber Security
Safe  Internet Banking Cyber SecuritySafe  Internet Banking Cyber Security
Safe Internet Banking Cyber Security
 
06. security concept
06. security concept06. security concept
06. security concept
 
Health information security session 4 risk management
Health information security session 4 risk managementHealth information security session 4 risk management
Health information security session 4 risk management
 
How organisations can_avoid_data_breaches_and_thus_meet_their_security_obliga...
How organisations can_avoid_data_breaches_and_thus_meet_their_security_obliga...How organisations can_avoid_data_breaches_and_thus_meet_their_security_obliga...
How organisations can_avoid_data_breaches_and_thus_meet_their_security_obliga...
 
Keeping Your Computer Secure
Keeping Your Computer SecureKeeping Your Computer Secure
Keeping Your Computer Secure
 
Wizard Technical Designs One2Three Networking Club Presentation April 2015
Wizard Technical Designs One2Three Networking Club Presentation April 2015Wizard Technical Designs One2Three Networking Club Presentation April 2015
Wizard Technical Designs One2Three Networking Club Presentation April 2015
 

Similar to Security Awareness 9 10 09 V4 Best Prac

IT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeIT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community College
Atlantic Training, LLC.
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness Training
Randy Bowman
 
Basic_computerHygiene
Basic_computerHygieneBasic_computerHygiene
Basic_computerHygiene
EricK Gasana
 
InformationSecurity
InformationSecurityInformationSecurity
InformationSecurity
learnt
 

Similar to Security Awareness 9 10 09 V4 Best Prac (20)

IT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeIT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community College
 
Cyber pledge infoMagnum
Cyber pledge infoMagnumCyber pledge infoMagnum
Cyber pledge infoMagnum
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness Training
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Module 5: Safety
Module 5: SafetyModule 5: Safety
Module 5: Safety
 
INFORMATION SECURITY SYSTEM
INFORMATION SECURITY SYSTEMINFORMATION SECURITY SYSTEM
INFORMATION SECURITY SYSTEM
 
Basic_computerHygiene
Basic_computerHygieneBasic_computerHygiene
Basic_computerHygiene
 
Dev Abhijet Gagan Chaitanya VII-A ....Salwan public school
Dev Abhijet Gagan Chaitanya VII-A  ....Salwan public schoolDev Abhijet Gagan Chaitanya VII-A  ....Salwan public school
Dev Abhijet Gagan Chaitanya VII-A ....Salwan public school
 
Cyber security for small businesses
Cyber security for small businessesCyber security for small businesses
Cyber security for small businesses
 
Digital Security and Hygiene.pptx
Digital Security and Hygiene.pptxDigital Security and Hygiene.pptx
Digital Security and Hygiene.pptx
 
Cybersecurity Awareness Month Tips
Cybersecurity Awareness Month TipsCybersecurity Awareness Month Tips
Cybersecurity Awareness Month Tips
 
Secure End User
Secure End UserSecure End User
Secure End User
 
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
 
Computer Security Basics for UW-Madison Emeritus Faculty and Staff
Computer Security Basics for UW-Madison Emeritus Faculty and StaffComputer Security Basics for UW-Madison Emeritus Faculty and Staff
Computer Security Basics for UW-Madison Emeritus Faculty and Staff
 
ISMS Awareness Training (2) (1).pptx
ISMS Awareness Training (2) (1).pptxISMS Awareness Training (2) (1).pptx
ISMS Awareness Training (2) (1).pptx
 
Information Security
Information Security Information Security
Information Security
 
It security,malware,phishing,information theft
It security,malware,phishing,information theftIt security,malware,phishing,information theft
It security,malware,phishing,information theft
 
Cyber security
Cyber securityCyber security
Cyber security
 
An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)
 
InformationSecurity
InformationSecurityInformationSecurity
InformationSecurity
 

More from Megan Bell

Week 1 ppt and-lecture-transcript-with audio2slides
Week 1 ppt and-lecture-transcript-with audio2slidesWeek 1 ppt and-lecture-transcript-with audio2slides
Week 1 ppt and-lecture-transcript-with audio2slides
Megan Bell
 
Week 1 ppt and-lecture-transcript-with audio
Week 1 ppt and-lecture-transcript-with audioWeek 1 ppt and-lecture-transcript-with audio
Week 1 ppt and-lecture-transcript-with audio
Megan Bell
 
Security Awareness 9 10 09 V4 Overview
Security Awareness 9 10 09 V4 OverviewSecurity Awareness 9 10 09 V4 Overview
Security Awareness 9 10 09 V4 Overview
Megan Bell
 
Security Awareness 9 10 09 V4 Web Browser
Security Awareness 9 10 09 V4 Web BrowserSecurity Awareness 9 10 09 V4 Web Browser
Security Awareness 9 10 09 V4 Web Browser
Megan Bell
 
Security Awareness 9 10 09 V4 Virus Trojan
Security Awareness 9 10 09 V4 Virus TrojanSecurity Awareness 9 10 09 V4 Virus Trojan
Security Awareness 9 10 09 V4 Virus Trojan
Megan Bell
 
Security Awareness 9 10 09 V4 Sens Info Wireless
Security Awareness 9 10 09 V4 Sens Info WirelessSecurity Awareness 9 10 09 V4 Sens Info Wireless
Security Awareness 9 10 09 V4 Sens Info Wireless
Megan Bell
 
Security Awareness 9 10 09 V4 Sens Info
Security Awareness 9 10 09 V4 Sens InfoSecurity Awareness 9 10 09 V4 Sens Info
Security Awareness 9 10 09 V4 Sens Info
Megan Bell
 
Security Awareness 9 10 09 V4 Got Mail
Security Awareness 9 10 09 V4 Got MailSecurity Awareness 9 10 09 V4 Got Mail
Security Awareness 9 10 09 V4 Got Mail
Megan Bell
 
Security Awareness 9 10 09 V4 Protect Equip
Security Awareness 9 10 09 V4 Protect EquipSecurity Awareness 9 10 09 V4 Protect Equip
Security Awareness 9 10 09 V4 Protect Equip
Megan Bell
 

More from Megan Bell (9)

Week 1 ppt and-lecture-transcript-with audio2slides
Week 1 ppt and-lecture-transcript-with audio2slidesWeek 1 ppt and-lecture-transcript-with audio2slides
Week 1 ppt and-lecture-transcript-with audio2slides
 
Week 1 ppt and-lecture-transcript-with audio
Week 1 ppt and-lecture-transcript-with audioWeek 1 ppt and-lecture-transcript-with audio
Week 1 ppt and-lecture-transcript-with audio
 
Security Awareness 9 10 09 V4 Overview
Security Awareness 9 10 09 V4 OverviewSecurity Awareness 9 10 09 V4 Overview
Security Awareness 9 10 09 V4 Overview
 
Security Awareness 9 10 09 V4 Web Browser
Security Awareness 9 10 09 V4 Web BrowserSecurity Awareness 9 10 09 V4 Web Browser
Security Awareness 9 10 09 V4 Web Browser
 
Security Awareness 9 10 09 V4 Virus Trojan
Security Awareness 9 10 09 V4 Virus TrojanSecurity Awareness 9 10 09 V4 Virus Trojan
Security Awareness 9 10 09 V4 Virus Trojan
 
Security Awareness 9 10 09 V4 Sens Info Wireless
Security Awareness 9 10 09 V4 Sens Info WirelessSecurity Awareness 9 10 09 V4 Sens Info Wireless
Security Awareness 9 10 09 V4 Sens Info Wireless
 
Security Awareness 9 10 09 V4 Sens Info
Security Awareness 9 10 09 V4 Sens InfoSecurity Awareness 9 10 09 V4 Sens Info
Security Awareness 9 10 09 V4 Sens Info
 
Security Awareness 9 10 09 V4 Got Mail
Security Awareness 9 10 09 V4 Got MailSecurity Awareness 9 10 09 V4 Got Mail
Security Awareness 9 10 09 V4 Got Mail
 
Security Awareness 9 10 09 V4 Protect Equip
Security Awareness 9 10 09 V4 Protect EquipSecurity Awareness 9 10 09 V4 Protect Equip
Security Awareness 9 10 09 V4 Protect Equip
 

Recently uploaded

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Recently uploaded (20)

TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 

Security Awareness 9 10 09 V4 Best Prac

  • 1. Computer Security Awareness: Best Practices Practicing safe computing involves understanding threats, vulnerabilities, risks and safety.
  • 2. Best PracticesDo’s & Don’ts Do! Don’t! Do keep passwords secret Do keep laptops, USB drives and other mobile media secure Do set your antivirus program, operating system and other programs to update automatically Do use locked screensavers Do follow procedures for proper disposal of Sensitive Information Do NOT include Sensitive Information in email Do NOT allow unauthorized access to your computer Do NOT open electronic cards from unknown users Do NOT open unexpected attachments or links
  • 3. Get Help! 24hrs / 7days a week If you suspect a problem or have a question: Notify your supervisor. Notify the Information Security Office. Call the campus IT Help Desk at 919.962.HELP available 24/7, 365 days a year.