SlideShare a Scribd company logo
1 of 22
Computer Security Basics 
For UW-Madison Emeritus Faculty and Staff 
Oakwood Village University Woods 
September 17, 2014 
Presented by Nicholas 
Davis, CISA, CISSP 
UW-Madison, Division of 
Information Technology
INTRODUCTION 
2 
This tutorial provides some basic information and practical suggestions for 
protecting your personal information and computer from cyber-attacks. Cyber-safety 
topics covered include:
WHAT IS CYBER-SAFETY? 
3 
 Cyber-safety is a common term used to 
describe a set of practices, measures and/or 
actions you can take to protect personal 
information and your computer from attacks. 
 UW-Madison IT Security website has numerous 
policies. 
 Further, there are services in place to help all 
students, faculty and staff meet the cyber-safety 
standards. Specific information about these 
services is provided on the security website for 
UW-Madison. 
UW-Madison Bascom Hall 
What is…
cio.wisc.edu/security 
4
CYBER-SAFETY THREATS 
First, let’s talk about some common cyber-safety threats and the problems they 
can cause . . . 
5 
Threats
CONSEQUENCES OF INACTION 
In addition to the risks identified on the previous slide, as part of the 
UW-Madison community, you may face a number of other 
consequences if you fail to take actions to protect, personal information 
and your computer. Consequences include: 
6 
Consequ 
ences
CYBER-SAFETY ACTIONS 
 The following slides describe the top seven actions you 
can take to protect personal information and your 
computer. These actions will help you meet the UW-Madison’s 
policy standards. 
 By implementing all seven of these security measures, 
you will protect yourself, others, and your computer from 
many common threats. 
 In most cases, implementing each of these security 
measures will only take a few minutes. 
 You can find more about cyber-safety on the UW-Madison 
security website, located at cio.wisc.edu/security 
7 
Actions
TOP SEVEN CYBER-SAFETY ACTIONS 
8 
For FREE help with all of these, you can call the DoIT Help Desk at 608-264-HELP 
1. Install OS/Software Updates 
2. Run Anti-virus Software 
3. Prevent Identity Theft 
4. Turn on Personal Firewalls 
5. Avoid Spyware/Adware 
6. Protect Passwords 
7. Back up Important Files
 Updates-sometimes called patches-fix problems with your operating system (OS) (e.g., Windows XP, 
Windows Vista, Mac OS X) and software programs (e.g., Microsoft Office applications). 
 Most new operating systems are set to download updates by default. After updates are downloaded, 
you will be asked to install them. Click yes! 
 To download patches for your system and software, visit: 
 Windows Update: http://windowsupdate.microsoft.com to get or ensure you have all the 
latest operating system updates only. Newer Windows systems are set to download these 
updates by default. 
 Microsoft Update: http://www.update.microsoft.com/microsoftupdate/ to get or ensure you 
have all the latest OS and Microsoft Office software updates. You must sign up for this service. 
 Apple: http://www.apple.com/support 
 Be sure to restart your computer after updates are installed so that the patches can be applied 
immediately. 
INSTALL OS/SOFTWARE 
UPDATES 
9
RUN ANTI-VIRUS SOFTWARE 
 To avoid computer problems caused by viruses, install and 
run an anti-virus program like Symantec, which you can 
download for FREE at cio.wisc.edu/security 
 Periodically, check to see if your anti-virus is up to date by 
opening your anti-virus program and checking the Last 
updated: date. 
 Anti-virus software removes viruses, quarantines and 
repairs infected files, and can help prevent future viruses. 
10
PREVENT IDENTITY THEFT 
 Don't give out financial account numbers, Social Security numbers, driver’s license numbers 
or other personal identity information unless you know exactly who's receiving it. Protect 
others people’s information as you would your own. 
11 
 Never send personal or confidential information via email or instant messages as these can 
be easily intercepted. 
 Beware of phishing scams - a form of fraud that uses email messages that appear to be from 
a reputable business (often a financial institution) in an attempt to gain personal or account 
information. These often do not include a personal salutation. Never enter personal 
information into an online form you accessed via a link in an email you were not expecting. 
Legitimate businesses will not ask for personal information online. 
 Order a copy of your credit report from each of the three major credit bureaus-Equifax, 
Experian, and Trans Union. Reports can be ordered online at each of the bureaus’ Web sites. 
Make sure reports are accurate and include only those activities you have authorized.
TURN ON PERSONAL 
FIREWALLS 
 Check your computer's security settings for a built-in personal firewall. If you have 
one, turn it on. Microsoft Vista and Mac OSX have built-in firewalls. For more 
information, see: 
• Mac Firewall 
(docs.info.apple.com/article.html?path=Mac/10.4/en/mh1042.html) 
• Microsoft Firewall 
(www.microsoft.com/windowsxp/using/networking/security/winfirewall.mspx) 
 Once your firewall is turned on, test your firewall for open ports that could allow in 
viruses and hackers. Firewall scanners like the one on 
http://www.auditmypc.com/firewall-test.asp simplify this process. 
 Firewalls act as protective barriers between computers and the internet. 
 Hackers search the Internet by sending out pings (calls) to random computers and 
wait for responses. Firewalls prevent your computer from responding to these calls. 
12
AVOID SPYWARE/ADWARE 
 Spyware and adware take up memory and can slow down 
your computer or cause other problems. 
 Use Spybot and Ad-Aware to remove spyware/adware 
from your computer. 
 Watch for allusions to spyware and adware in user 
agreements before installing free software programs. 
 Be wary of invitations to download software from unknown 
internet sources. 
13
PROTECT PASSWORDS 
 Do not share your passwords, and always make new passwords difficult to guess by 
avoiding dictionary words, and mixing letters, numbers and punctuation. 
 Do not use one of these common passwords or any variation of them: qwerty1, abc123, 
letmein, password1, iloveyou1, (yourname1), baseball1, badger, packers, etc. 
 Change your passwords periodically. 
 When choosing a password: 
14 
o Mix upper and lower case letters 
o Use a minimum of 8 characters 
o Use mnemonics to help you remember a difficult password 
 UW-Madison faculty and staff can access Roboform, a cloud based password safe, for 
free, at siber.com.
BACK UP IMPORTANT FILES 
 Reduce your risk of losing important files to a virus, computer crash, theft or 
disaster by creating back-up copies. 
 Keep your critical files in one place on your computer’s hard drive so you can 
easily create a back up copy. 
 Save copies of your important documents and files to a CD, online back up 
service, flash or USB drive, or a server. 
 Store your back-up media in a secure place away from your computer, in 
case of fire or theft. 
 Test your back up media periodically to make sure the files are accessible 
and readable. 
15
CYBER-SAFETY AT HOME 
 Physically secure your computer by using security cables and locking doors 
and windows in the dorms and off-campus housing. 
 Avoid leaving your laptop unsupervised and in plain view in the library or 
coffee house, or in your car, dorm room or home. 
 Set up a user account and password to prevent unauthorized access to your 
computer files. 
 Do not install unnecessary programs on your computer. 
 Microsoft users can download the free Secunia Personal Software Inspector 
(https://psi.secunia.com/), which lets you scan your computer for any missing 
operating system or software patches and provides instructions for getting all 
the latest updates. 
16 
Home
CYBER-SAFETY AT WORK 
 Be sure to work with your technical support coordinator before implementing 
new cyber-safety measures. 
 Talk with your technical support coordinator about what cyber-safety 
measures are in place in your department. 
 Report to your supervisor any cyber-safety policy violations, security 
flaws/weaknesses you discover or any suspicious activity by unauthorized 
individuals in your work area. 
 Physically secure your computer by using security cables and locking 
building/office doors and windows. 
 Do not install unnecessary programs on your work computer. 
 Don’t be afraid to use the great services offered by the DoIT Help Desk 
 608-264-HELP 
17 
Work
CAMPUS CYBER-SAFETY SERVICES 
Campus 
Services 
UW-Madison offers services and software to protect the campus 
Network against cyber-safety attacks. These include: 
18 
Services Software 
 Campus email virus filtering 
 Campus firewall services 
 Email attachment filtering 
 Vulnerability scanning 
 Intrusion prevention system 
 Free anti-virus software: 
Sophos Anti-virus 
Additional information about these and other campus cyber-safety services, visit cio.wisc.edu/security
QUESTIONS? 
 For more information about cyber-safety at UW-Madison, 
visit cio.wisc.edu/security 
 For help implementing a cyber-safety measure 
on your work/school computer, contact the DoiT 
Help Desk at 608-264-HELP or by email, 
help@doit.wisc.edu 
19
CYBER-SAFETY BASICS QUICK QUIZ 
1. True or False? Viruses can be transmitted via email, email attachments or IM. 
2. People who seek out your personal information and then use it to commit crimes are 
called:_____________________ 
3. Which of the following are ways to help prevent identity theft. (Check all that apply.) 
__A. Never send personal information via email or instant messages. 
__B. Always send personal information via email or instant messages. 
__C. Lock my office door. 
__D. Don’t tell anybody my name. 
4. True or False? BuckyBadger is a good password. Why or why not? 
5. Which anti-virus program is available to all UW-Madison students, faculty and staff for free? 
________________________ 
6. I just downloaded a free program online and now my computer is running very, very slowly. Which of the following 
most likely happened? 
__A. I didn’t install the program properly. 
__B. I didn’t have enough space on my hard drive for the new program. 
__C. I downloaded spyware and/or adware, too. 
__D. Someone snuck in while the program was downloading and changed my password. 
7. ___________________help prevent your computer from responding to pings (calls) from hackers. 
8. To fix problems with my operating system and/or application software, I should install __________________. 
Answers on next slide . . . 
20
QUICK QUIZ ANSWERS 
1. True 
2. Identity thieves 
3. A and C are correct. D would probably help too, but seems a bit extreme! 
4. False. BuckyBadger is a very common password. 
5. Symantec Anti-Virus is free to UW-Madison students, faculty and staff. 
6. C. It’s most likely that you downloaded spyware and/or adware. 
7. Firewalls 
8. OS and/or software updates (patches) 
21 
How did you do? 
8-7 correct: Fantastic! You can help write the next quiz! 
6-5 correct: Good. You can help write the next quiz, but we’ll check it for accuracy . . . just in case. 
4-3 correct: You might want to review the material for the questions you missed.
ONE MORE THING . . . 
We want to hear from you! Send stories about your cyber-safety 
experience, or suggestions for additional information that we should 
include in this tutorial or on the security Web site, to Nicholas Davis, 
ndavis1@wisc.edu 
Thank you! 
22

More Related Content

What's hot

Security Awareness Training by HIMSS Louisiana Chapter
Security Awareness Training by HIMSS Louisiana ChapterSecurity Awareness Training by HIMSS Louisiana Chapter
Security Awareness Training by HIMSS Louisiana ChapterAtlantic Training, LLC.
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness TrainingWilliam Mann
 
Kent philip neri (lab 2)
Kent philip neri (lab 2)Kent philip neri (lab 2)
Kent philip neri (lab 2)kent neri
 
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...David Menken
 
Security Awareness Training: Are We Getting Any Better at Organizational and ...
Security Awareness Training: Are We Getting Any Better at Organizational and ...Security Awareness Training: Are We Getting Any Better at Organizational and ...
Security Awareness Training: Are We Getting Any Better at Organizational and ...Enterprise Management Associates
 
Raising information security awareness
Raising information security awarenessRaising information security awareness
Raising information security awarenessTerranovatraining
 
Cscu module 01 foundations of security
Cscu module 01 foundations of securityCscu module 01 foundations of security
Cscu module 01 foundations of securitySejahtera Affif
 
Building An Information Security Awareness Program
Building An Information Security Awareness ProgramBuilding An Information Security Awareness Program
Building An Information Security Awareness ProgramBill Gardner
 
Information Security Awareness And Training Business Case For Web Based Solut...
Information Security Awareness And Training Business Case For Web Based Solut...Information Security Awareness And Training Business Case For Web Based Solut...
Information Security Awareness And Training Business Case For Web Based Solut...Michael Kaishar, MSIA | CISSP
 
Cybersecurity Employee Training
Cybersecurity Employee TrainingCybersecurity Employee Training
Cybersecurity Employee TrainingPaige Rasid
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet SecurityJFashant
 
Executive Information Security Training
Executive Information Security TrainingExecutive Information Security Training
Executive Information Security TrainingAngela Samuels
 
Awareness Training on Information Security
Awareness Training on Information SecurityAwareness Training on Information Security
Awareness Training on Information SecurityKen Holmes
 
Bring your own-computer_to work
Bring your own-computer_to workBring your own-computer_to work
Bring your own-computer_to workNetIQ
 

What's hot (19)

Security Awareness Training by HIMSS Louisiana Chapter
Security Awareness Training by HIMSS Louisiana ChapterSecurity Awareness Training by HIMSS Louisiana Chapter
Security Awareness Training by HIMSS Louisiana Chapter
 
Online safety and malwares
Online safety and malwaresOnline safety and malwares
Online safety and malwares
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Kent philip neri (lab 2)
Kent philip neri (lab 2)Kent philip neri (lab 2)
Kent philip neri (lab 2)
 
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
 
Understanding Virus
Understanding VirusUnderstanding Virus
Understanding Virus
 
Security Firm Program - Corporate College
Security Firm Program - Corporate CollegeSecurity Firm Program - Corporate College
Security Firm Program - Corporate College
 
Security Awareness Training: Are We Getting Any Better at Organizational and ...
Security Awareness Training: Are We Getting Any Better at Organizational and ...Security Awareness Training: Are We Getting Any Better at Organizational and ...
Security Awareness Training: Are We Getting Any Better at Organizational and ...
 
Raising information security awareness
Raising information security awarenessRaising information security awareness
Raising information security awareness
 
Cscu module 01 foundations of security
Cscu module 01 foundations of securityCscu module 01 foundations of security
Cscu module 01 foundations of security
 
antivirus
antivirusantivirus
antivirus
 
Building An Information Security Awareness Program
Building An Information Security Awareness ProgramBuilding An Information Security Awareness Program
Building An Information Security Awareness Program
 
llagas j.
llagas j.llagas j.
llagas j.
 
Information Security Awareness And Training Business Case For Web Based Solut...
Information Security Awareness And Training Business Case For Web Based Solut...Information Security Awareness And Training Business Case For Web Based Solut...
Information Security Awareness And Training Business Case For Web Based Solut...
 
Cybersecurity Employee Training
Cybersecurity Employee TrainingCybersecurity Employee Training
Cybersecurity Employee Training
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet Security
 
Executive Information Security Training
Executive Information Security TrainingExecutive Information Security Training
Executive Information Security Training
 
Awareness Training on Information Security
Awareness Training on Information SecurityAwareness Training on Information Security
Awareness Training on Information Security
 
Bring your own-computer_to work
Bring your own-computer_to workBring your own-computer_to work
Bring your own-computer_to work
 

Similar to Computer Security Basics for UW-Madison Emeritus Faculty and Staff

An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)Cyber Security Infotech
 
Cybersafety basics.ppt cs
Cybersafety basics.ppt csCybersafety basics.ppt cs
Cybersafety basics.ppt csVinay Soni
 
Cyber security and safety
Cyber security and safetyCyber security and safety
Cyber security and safetyDooremoore
 
Information security for health practitioners
Information security for health practitionersInformation security for health practitioners
Information security for health practitionersDanny Doobay
 
How to Bulletproof Your Data Defenses Locally & In the Cloud
How to Bulletproof Your Data Defenses Locally & In the CloudHow to Bulletproof Your Data Defenses Locally & In the Cloud
How to Bulletproof Your Data Defenses Locally & In the CloudNordic Backup
 
Tips to remove malwares
Tips to remove malwaresTips to remove malwares
Tips to remove malwaresanthnyq
 
Internet security
Internet securityInternet security
Internet securityrfukunaga
 
10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.Khalil Jubran
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & securitypinkutinku26
 
Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?Symptai Consulting Limited
 
Cybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppCybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppWeSecureApp
 
Giarritano concept paper 4
Giarritano concept paper 4Giarritano concept paper 4
Giarritano concept paper 4leahg118
 
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?TechSoup
 

Similar to Computer Security Basics for UW-Madison Emeritus Faculty and Staff (20)

An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)
 
Cybersafety basics.ppt cs
Cybersafety basics.ppt csCybersafety basics.ppt cs
Cybersafety basics.ppt cs
 
Cyber security and safety
Cyber security and safetyCyber security and safety
Cyber security and safety
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber-savvy Cyber-safety
Cyber-savvy Cyber-safety Cyber-savvy Cyber-safety
Cyber-savvy Cyber-safety
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Chapter 5.pptx
Chapter 5.pptxChapter 5.pptx
Chapter 5.pptx
 
Information security for health practitioners
Information security for health practitionersInformation security for health practitioners
Information security for health practitioners
 
How to Bulletproof Your Data Defenses Locally & In the Cloud
How to Bulletproof Your Data Defenses Locally & In the CloudHow to Bulletproof Your Data Defenses Locally & In the Cloud
How to Bulletproof Your Data Defenses Locally & In the Cloud
 
Tips to remove malwares
Tips to remove malwaresTips to remove malwares
Tips to remove malwares
 
Computer Security 101
Computer Security 101Computer Security 101
Computer Security 101
 
Internet security
Internet securityInternet security
Internet security
 
10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre
cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre
cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre
 
Yadav 1(2)
Yadav 1(2)Yadav 1(2)
Yadav 1(2)
 
Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?
 
Cybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppCybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureApp
 
Giarritano concept paper 4
Giarritano concept paper 4Giarritano concept paper 4
Giarritano concept paper 4
 
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
 

More from Nicholas Davis

Conducting a NIST Cybersecurity Framework (CSF) Assessment
Conducting a NIST Cybersecurity Framework (CSF) AssessmentConducting a NIST Cybersecurity Framework (CSF) Assessment
Conducting a NIST Cybersecurity Framework (CSF) AssessmentNicholas Davis
 
Top Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your BusinessTop Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your BusinessNicholas Davis
 
UW-Madison, Information Systems 371 - Decision Support Systems
UW-Madison, Information Systems 371 - Decision Support SystemsUW-Madison, Information Systems 371 - Decision Support Systems
UW-Madison, Information Systems 371 - Decision Support SystemsNicholas Davis
 
Software Development Methodologies
Software Development MethodologiesSoftware Development Methodologies
Software Development MethodologiesNicholas Davis
 
Information systems 365 - Cloud and BYOD Security
Information systems 365 - Cloud and BYOD SecurityInformation systems 365 - Cloud and BYOD Security
Information systems 365 - Cloud and BYOD SecurityNicholas Davis
 
Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Nicholas Davis
 
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...Nicholas Davis
 
Information Systems 371 -The Internet of Things Overview
Information Systems 371 -The Internet of Things OverviewInformation Systems 371 -The Internet of Things Overview
Information Systems 371 -The Internet of Things OverviewNicholas Davis
 
Cyberwar Gets Personal
Cyberwar Gets PersonalCyberwar Gets Personal
Cyberwar Gets PersonalNicholas Davis
 
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...University of Wisconsin-Madison, Information Security 365/765 Course Summary,...
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...Nicholas Davis
 
Bringing the Entire Information Security Semester Together With a Team Project
Bringing the Entire Information Security Semester Together With a Team ProjectBringing the Entire Information Security Semester Together With a Team Project
Bringing the Entire Information Security Semester Together With a Team ProjectNicholas Davis
 
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...Nicholas Davis
 
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...Nicholas Davis
 
Information Security Fall Semester 2016 - Course Wrap Up Summary
Information Security Fall Semester 2016 - Course Wrap Up SummaryInformation Security Fall Semester 2016 - Course Wrap Up Summary
Information Security Fall Semester 2016 - Course Wrap Up SummaryNicholas Davis
 
Organizational Phishing Education
Organizational Phishing EducationOrganizational Phishing Education
Organizational Phishing EducationNicholas Davis
 
Security Operations -- An Overview
Security Operations -- An OverviewSecurity Operations -- An Overview
Security Operations -- An OverviewNicholas Davis
 
Network Design, Common Network Terminology and Security Implications
Network Design, Common Network Terminology and Security ImplicationsNetwork Design, Common Network Terminology and Security Implications
Network Design, Common Network Terminology and Security ImplicationsNicholas Davis
 
Survey Presentation About Application Security
Survey Presentation About Application SecuritySurvey Presentation About Application Security
Survey Presentation About Application SecurityNicholas Davis
 
Information Security 365/765 Lecture 13 – Legal Regulations, Industry Compli...
Information Security 365/765 Lecture 13 – Legal Regulations,  Industry Compli...Information Security 365/765 Lecture 13 – Legal Regulations,  Industry Compli...
Information Security 365/765 Lecture 13 – Legal Regulations, Industry Compli...Nicholas Davis
 

More from Nicholas Davis (20)

Conducting a NIST Cybersecurity Framework (CSF) Assessment
Conducting a NIST Cybersecurity Framework (CSF) AssessmentConducting a NIST Cybersecurity Framework (CSF) Assessment
Conducting a NIST Cybersecurity Framework (CSF) Assessment
 
Top Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your BusinessTop Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your Business
 
UW-Madison, Information Systems 371 - Decision Support Systems
UW-Madison, Information Systems 371 - Decision Support SystemsUW-Madison, Information Systems 371 - Decision Support Systems
UW-Madison, Information Systems 371 - Decision Support Systems
 
Lecture blockchain
Lecture blockchainLecture blockchain
Lecture blockchain
 
Software Development Methodologies
Software Development MethodologiesSoftware Development Methodologies
Software Development Methodologies
 
Information systems 365 - Cloud and BYOD Security
Information systems 365 - Cloud and BYOD SecurityInformation systems 365 - Cloud and BYOD Security
Information systems 365 - Cloud and BYOD Security
 
Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids
 
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...
 
Information Systems 371 -The Internet of Things Overview
Information Systems 371 -The Internet of Things OverviewInformation Systems 371 -The Internet of Things Overview
Information Systems 371 -The Internet of Things Overview
 
Cyberwar Gets Personal
Cyberwar Gets PersonalCyberwar Gets Personal
Cyberwar Gets Personal
 
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...University of Wisconsin-Madison, Information Security 365/765 Course Summary,...
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...
 
Bringing the Entire Information Security Semester Together With a Team Project
Bringing the Entire Information Security Semester Together With a Team ProjectBringing the Entire Information Security Semester Together With a Team Project
Bringing the Entire Information Security Semester Together With a Team Project
 
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
 
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
 
Information Security Fall Semester 2016 - Course Wrap Up Summary
Information Security Fall Semester 2016 - Course Wrap Up SummaryInformation Security Fall Semester 2016 - Course Wrap Up Summary
Information Security Fall Semester 2016 - Course Wrap Up Summary
 
Organizational Phishing Education
Organizational Phishing EducationOrganizational Phishing Education
Organizational Phishing Education
 
Security Operations -- An Overview
Security Operations -- An OverviewSecurity Operations -- An Overview
Security Operations -- An Overview
 
Network Design, Common Network Terminology and Security Implications
Network Design, Common Network Terminology and Security ImplicationsNetwork Design, Common Network Terminology and Security Implications
Network Design, Common Network Terminology and Security Implications
 
Survey Presentation About Application Security
Survey Presentation About Application SecuritySurvey Presentation About Application Security
Survey Presentation About Application Security
 
Information Security 365/765 Lecture 13 – Legal Regulations, Industry Compli...
Information Security 365/765 Lecture 13 – Legal Regulations,  Industry Compli...Information Security 365/765 Lecture 13 – Legal Regulations,  Industry Compli...
Information Security 365/765 Lecture 13 – Legal Regulations, Industry Compli...
 

Recently uploaded

Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on DeliveryCall Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Deliverybabeytanya
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxellan12
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girladitipandeya
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...aditipandeya
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Roomdivyansh0kumar0
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Delhi Call girls
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Roomdivyansh0kumar0
 
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service PuneVIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service PuneCall girls in Ahmedabad High profile
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024APNIC
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...APNIC
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsThierry TROUIN ☁
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)Damian Radcliffe
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts servicesonalikaur4
 

Recently uploaded (20)

Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on DeliveryCall Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
 
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
 
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
 
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service PuneVIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with Flows
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)
 
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
 

Computer Security Basics for UW-Madison Emeritus Faculty and Staff

  • 1. Computer Security Basics For UW-Madison Emeritus Faculty and Staff Oakwood Village University Woods September 17, 2014 Presented by Nicholas Davis, CISA, CISSP UW-Madison, Division of Information Technology
  • 2. INTRODUCTION 2 This tutorial provides some basic information and practical suggestions for protecting your personal information and computer from cyber-attacks. Cyber-safety topics covered include:
  • 3. WHAT IS CYBER-SAFETY? 3  Cyber-safety is a common term used to describe a set of practices, measures and/or actions you can take to protect personal information and your computer from attacks.  UW-Madison IT Security website has numerous policies.  Further, there are services in place to help all students, faculty and staff meet the cyber-safety standards. Specific information about these services is provided on the security website for UW-Madison. UW-Madison Bascom Hall What is…
  • 5. CYBER-SAFETY THREATS First, let’s talk about some common cyber-safety threats and the problems they can cause . . . 5 Threats
  • 6. CONSEQUENCES OF INACTION In addition to the risks identified on the previous slide, as part of the UW-Madison community, you may face a number of other consequences if you fail to take actions to protect, personal information and your computer. Consequences include: 6 Consequ ences
  • 7. CYBER-SAFETY ACTIONS  The following slides describe the top seven actions you can take to protect personal information and your computer. These actions will help you meet the UW-Madison’s policy standards.  By implementing all seven of these security measures, you will protect yourself, others, and your computer from many common threats.  In most cases, implementing each of these security measures will only take a few minutes.  You can find more about cyber-safety on the UW-Madison security website, located at cio.wisc.edu/security 7 Actions
  • 8. TOP SEVEN CYBER-SAFETY ACTIONS 8 For FREE help with all of these, you can call the DoIT Help Desk at 608-264-HELP 1. Install OS/Software Updates 2. Run Anti-virus Software 3. Prevent Identity Theft 4. Turn on Personal Firewalls 5. Avoid Spyware/Adware 6. Protect Passwords 7. Back up Important Files
  • 9.  Updates-sometimes called patches-fix problems with your operating system (OS) (e.g., Windows XP, Windows Vista, Mac OS X) and software programs (e.g., Microsoft Office applications).  Most new operating systems are set to download updates by default. After updates are downloaded, you will be asked to install them. Click yes!  To download patches for your system and software, visit:  Windows Update: http://windowsupdate.microsoft.com to get or ensure you have all the latest operating system updates only. Newer Windows systems are set to download these updates by default.  Microsoft Update: http://www.update.microsoft.com/microsoftupdate/ to get or ensure you have all the latest OS and Microsoft Office software updates. You must sign up for this service.  Apple: http://www.apple.com/support  Be sure to restart your computer after updates are installed so that the patches can be applied immediately. INSTALL OS/SOFTWARE UPDATES 9
  • 10. RUN ANTI-VIRUS SOFTWARE  To avoid computer problems caused by viruses, install and run an anti-virus program like Symantec, which you can download for FREE at cio.wisc.edu/security  Periodically, check to see if your anti-virus is up to date by opening your anti-virus program and checking the Last updated: date.  Anti-virus software removes viruses, quarantines and repairs infected files, and can help prevent future viruses. 10
  • 11. PREVENT IDENTITY THEFT  Don't give out financial account numbers, Social Security numbers, driver’s license numbers or other personal identity information unless you know exactly who's receiving it. Protect others people’s information as you would your own. 11  Never send personal or confidential information via email or instant messages as these can be easily intercepted.  Beware of phishing scams - a form of fraud that uses email messages that appear to be from a reputable business (often a financial institution) in an attempt to gain personal or account information. These often do not include a personal salutation. Never enter personal information into an online form you accessed via a link in an email you were not expecting. Legitimate businesses will not ask for personal information online.  Order a copy of your credit report from each of the three major credit bureaus-Equifax, Experian, and Trans Union. Reports can be ordered online at each of the bureaus’ Web sites. Make sure reports are accurate and include only those activities you have authorized.
  • 12. TURN ON PERSONAL FIREWALLS  Check your computer's security settings for a built-in personal firewall. If you have one, turn it on. Microsoft Vista and Mac OSX have built-in firewalls. For more information, see: • Mac Firewall (docs.info.apple.com/article.html?path=Mac/10.4/en/mh1042.html) • Microsoft Firewall (www.microsoft.com/windowsxp/using/networking/security/winfirewall.mspx)  Once your firewall is turned on, test your firewall for open ports that could allow in viruses and hackers. Firewall scanners like the one on http://www.auditmypc.com/firewall-test.asp simplify this process.  Firewalls act as protective barriers between computers and the internet.  Hackers search the Internet by sending out pings (calls) to random computers and wait for responses. Firewalls prevent your computer from responding to these calls. 12
  • 13. AVOID SPYWARE/ADWARE  Spyware and adware take up memory and can slow down your computer or cause other problems.  Use Spybot and Ad-Aware to remove spyware/adware from your computer.  Watch for allusions to spyware and adware in user agreements before installing free software programs.  Be wary of invitations to download software from unknown internet sources. 13
  • 14. PROTECT PASSWORDS  Do not share your passwords, and always make new passwords difficult to guess by avoiding dictionary words, and mixing letters, numbers and punctuation.  Do not use one of these common passwords or any variation of them: qwerty1, abc123, letmein, password1, iloveyou1, (yourname1), baseball1, badger, packers, etc.  Change your passwords periodically.  When choosing a password: 14 o Mix upper and lower case letters o Use a minimum of 8 characters o Use mnemonics to help you remember a difficult password  UW-Madison faculty and staff can access Roboform, a cloud based password safe, for free, at siber.com.
  • 15. BACK UP IMPORTANT FILES  Reduce your risk of losing important files to a virus, computer crash, theft or disaster by creating back-up copies.  Keep your critical files in one place on your computer’s hard drive so you can easily create a back up copy.  Save copies of your important documents and files to a CD, online back up service, flash or USB drive, or a server.  Store your back-up media in a secure place away from your computer, in case of fire or theft.  Test your back up media periodically to make sure the files are accessible and readable. 15
  • 16. CYBER-SAFETY AT HOME  Physically secure your computer by using security cables and locking doors and windows in the dorms and off-campus housing.  Avoid leaving your laptop unsupervised and in plain view in the library or coffee house, or in your car, dorm room or home.  Set up a user account and password to prevent unauthorized access to your computer files.  Do not install unnecessary programs on your computer.  Microsoft users can download the free Secunia Personal Software Inspector (https://psi.secunia.com/), which lets you scan your computer for any missing operating system or software patches and provides instructions for getting all the latest updates. 16 Home
  • 17. CYBER-SAFETY AT WORK  Be sure to work with your technical support coordinator before implementing new cyber-safety measures.  Talk with your technical support coordinator about what cyber-safety measures are in place in your department.  Report to your supervisor any cyber-safety policy violations, security flaws/weaknesses you discover or any suspicious activity by unauthorized individuals in your work area.  Physically secure your computer by using security cables and locking building/office doors and windows.  Do not install unnecessary programs on your work computer.  Don’t be afraid to use the great services offered by the DoIT Help Desk  608-264-HELP 17 Work
  • 18. CAMPUS CYBER-SAFETY SERVICES Campus Services UW-Madison offers services and software to protect the campus Network against cyber-safety attacks. These include: 18 Services Software  Campus email virus filtering  Campus firewall services  Email attachment filtering  Vulnerability scanning  Intrusion prevention system  Free anti-virus software: Sophos Anti-virus Additional information about these and other campus cyber-safety services, visit cio.wisc.edu/security
  • 19. QUESTIONS?  For more information about cyber-safety at UW-Madison, visit cio.wisc.edu/security  For help implementing a cyber-safety measure on your work/school computer, contact the DoiT Help Desk at 608-264-HELP or by email, help@doit.wisc.edu 19
  • 20. CYBER-SAFETY BASICS QUICK QUIZ 1. True or False? Viruses can be transmitted via email, email attachments or IM. 2. People who seek out your personal information and then use it to commit crimes are called:_____________________ 3. Which of the following are ways to help prevent identity theft. (Check all that apply.) __A. Never send personal information via email or instant messages. __B. Always send personal information via email or instant messages. __C. Lock my office door. __D. Don’t tell anybody my name. 4. True or False? BuckyBadger is a good password. Why or why not? 5. Which anti-virus program is available to all UW-Madison students, faculty and staff for free? ________________________ 6. I just downloaded a free program online and now my computer is running very, very slowly. Which of the following most likely happened? __A. I didn’t install the program properly. __B. I didn’t have enough space on my hard drive for the new program. __C. I downloaded spyware and/or adware, too. __D. Someone snuck in while the program was downloading and changed my password. 7. ___________________help prevent your computer from responding to pings (calls) from hackers. 8. To fix problems with my operating system and/or application software, I should install __________________. Answers on next slide . . . 20
  • 21. QUICK QUIZ ANSWERS 1. True 2. Identity thieves 3. A and C are correct. D would probably help too, but seems a bit extreme! 4. False. BuckyBadger is a very common password. 5. Symantec Anti-Virus is free to UW-Madison students, faculty and staff. 6. C. It’s most likely that you downloaded spyware and/or adware. 7. Firewalls 8. OS and/or software updates (patches) 21 How did you do? 8-7 correct: Fantastic! You can help write the next quiz! 6-5 correct: Good. You can help write the next quiz, but we’ll check it for accuracy . . . just in case. 4-3 correct: You might want to review the material for the questions you missed.
  • 22. ONE MORE THING . . . We want to hear from you! Send stories about your cyber-safety experience, or suggestions for additional information that we should include in this tutorial or on the security Web site, to Nicholas Davis, ndavis1@wisc.edu Thank you! 22