SlideShare a Scribd company logo
1 of 32
Medical Center-
Computer Safety and
Awareness Training
MODULE 01: Email scams, phishing, and
virus attachments
Keyword- Awareness
• Increasing and diverse populations connecting to the internet
• Dramatically increasing vectors
• Increasingly available tools for hacking
• Increasing value of patient data, market price for one CC
record= 1.00US, one full medical record= 50.00US.
• Small hospitals are an exceptionally vulnerable target: low
budgets = weakened security.
The Changing Reality of Computing in Today’s World
makes continual training needed.
• Human nature
• We do not want barriers to our work,
• we seek the most expedient path,
• A call to action,
• respond to seemingly sincere requests for help. EX- Franklin
Jyubuti, displaced refugee from South Africa.
• People become victims, avoid blaming others- counter
productive, need an open environment of reporting.
• Human nature
• We do not want barriers to our work,
• we seek the most expedient path,
• A call to action,
• respond to seemingly sincere requests for help. EX- Franklin
Jyubuti, displaced refugee from South Africa.
• People become victims, avoid blaming others- counter
productive, need an open environment of reporting.
The Changing Reality of Computing in Today’s World
makes continual training needed.
• Human nature
• We do not want barriers to our work,
• we seek the most expedient path,
• A call to action,
• respond to seemingly sincere requests for help. EX- Franklin
Jyubuti, displaced refugee from South Africa.
• People become victims, avoid blaming others- counter
productive, need an open environment of reporting.
The Changing Reality of Computing in Today’s World
makes continual training needed.
The Changing Reality of Computing in Today’s World
makes continual training needed.
• Human nature
• We do not want barriers to our work,
• we seek the most expedient path,
• A call to action,
• respond to seemingly sincere requests for help. EX- Franklin
Jyubuti, displaced refugee from South Africa.
• People become victims, avoid blaming others- counter
productive, need an open environment of reporting.
The Changing Reality of Computing in Today’s World
makes continual training needed.
• Human nature
• We do not want barriers to our work,
• we seek the most expedient path,
• A call to action,
• respond to seemingly sincere requests for help. EX- Franklin
Jyubuti, displaced refugee from South Africa.
• People become victims, avoid blaming ourselves or others-
counter productive, need an open environment of reporting.
The Changing Reality of Computing in Today’s World
makes continual training needed.
• Human nature
• We do not want barriers to our work,
• we seek the most expedient path,
• A call to action,
• respond to seemingly sincere requests for help. EX- Franklin
Jyubuti, displaced refugee from South Africa.
• People become victims, avoid blaming ourselves or others-
counter productive, need an open environment of reporting.
The Changing Reality of Computing in Today’s World
makes continual training needed.
• Human nature
• We do not want barriers to our work,
• we seek the most expedient path,
• A call to action,
• respond to seemingly sincere requests for help. EX- Franklin
Jyubuti, displaced refugee from South Africa.
• People become victims, avoid blaming ourselves or others-
counter productive, need an open environment of reporting.
Keyword- Awareness
Cost 2015 2016
Healthcare 42,000,000 71,000,000
Hollywood Presbyterian Hospital said
it had paid $17,000 in ransom
money to regain access to files that
had been locked in a ransomware
attack.
Expect such attacks to increase, says James Scott,
senior fellow at the Institute for Critical
Infrastructure Security (ICIT), which recently
released a report on the ransomware threat to
organizations in critical infrastructure sectors.
“Hospitals are an easy target for many reasons,”
Scott says. “Employees typically lack cyber hygiene
training and their technology landscape, in most
cases, is eerily absent of layered security centric
protocols.“
Scott predicts that adversaries are going to start
using ransomware as a diversionary tactic while
they steal electronic health records and other
sensitive data from healthcare networks. “The
ransom will be secondary to the primary revenue
generated by the sale of the data,” Scott says.
Firms that fall victim to infection
from file encrypting ransomware
should simply pay the ransom, Joseph
Bonavolonta, an assistant special
agent with the FBI.
Keyword- Awareness-Email
Keyword- Awareness-Email
Keyword- Awareness-Email
Keyword- Awareness-Email
Keyword- Awareness-Email
Keyword- Awareness-Email
Keyword- Awareness-Email
Keyword- Awareness-Email
Keyword- Awareness-Email
Keyword- Awareness-Email
Keyword- Awareness-Email
Keyword- Awareness-Email
Keyword- Awareness-Websites
Keyword- Awareness-Websites
Keyword- Awareness-Websites
Keyword- Awareness-Websites
Keyword- Awareness-Websites
Keyword- Awareness-Websites
Keyword- Awareness= Defense
Keyword- Awareness= Defense
Watch what you click In most cases, computers are unwittingly infected
by users clicking on cleverly disguised malware links.
Browse trusted websites. Avoid suspicious-looking sites and be wary of
pop-up boxes that ask you to click on unfamiliar links.
Be wary of social media notifications
Scrutinize social media notifications and check links by hovering your
mouse over them to confirm link addresses before clicking.
If you suspect you are infected- UNPLUG, DO NOT SHUT DOWN!
Call for help!
What symptoms indicate a computer has been compromised?
Computer performs unusually slow
Computer reboots on its own
Web browser jumps to the wrong pages
Web browser won’t display certain pages
Emails aren’t displayed properly
Emails randomly disappear
Pop-up ads randomly display on your screen
Keyword- Awareness= Defense
If you suspect:
UNPLUG,
CALL FOR HELP,
SING SOFTLY WHILE YOU
WAIT HELP TO ARRIVE.
COMPUTERSAFETY-Mod01-email

More Related Content

Similar to COMPUTERSAFETY-Mod01-email

Airport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyAirport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyRussell Publishing
 
Catella e-Crime London2015
Catella e-Crime London2015Catella e-Crime London2015
Catella e-Crime London2015Patrick Wheeler
 
Saving Money, Saving Lives: 
How local software developers helped defeat Ebola
Saving Money, Saving Lives: 
How local software developers helped defeat EbolaSaving Money, Saving Lives: 
How local software developers helped defeat Ebola
Saving Money, Saving Lives: 
How local software developers helped defeat EbolaSalton Massally
 
"Security on the Brain" Security & Risk Psychology Workshop Nov 2013
"Security on the Brain" Security & Risk Psychology Workshop Nov 2013"Security on the Brain" Security & Risk Psychology Workshop Nov 2013
"Security on the Brain" Security & Risk Psychology Workshop Nov 2013Adrian Wright
 
The Art of Human Hacking : Social Engineering
The Art of Human Hacking : Social Engineering The Art of Human Hacking : Social Engineering
The Art of Human Hacking : Social Engineering OWASP Foundation
 
Essay On Wuthering Heights.pdf
Essay On Wuthering Heights.pdfEssay On Wuthering Heights.pdf
Essay On Wuthering Heights.pdfVicki Ardon
 
Pin On Volunteer Luncheon. Online assignment writing service.
Pin On Volunteer Luncheon. Online assignment writing service.Pin On Volunteer Luncheon. Online assignment writing service.
Pin On Volunteer Luncheon. Online assignment writing service.Lorie Harris
 
Writing Essay Questions For Students. Online assignment writing service.
Writing Essay Questions For Students. Online assignment writing service.Writing Essay Questions For Students. Online assignment writing service.
Writing Essay Questions For Students. Online assignment writing service.Tia Williams
 
Sample Conclusion Of A Research Paper What Is A Co
Sample Conclusion Of A Research Paper What Is A CoSample Conclusion Of A Research Paper What Is A Co
Sample Conclusion Of A Research Paper What Is A CoBrittney Simmons
 
500 Word College Essay Examples
500 Word College Essay Examples500 Word College Essay Examples
500 Word College Essay ExamplesJennifer Mower
 
cyber crime, terrorism and corruption public spear
cyber crime, terrorism and corruption public spearcyber crime, terrorism and corruption public spear
cyber crime, terrorism and corruption public spearNIST, berhampur
 
War Against Terrorism - CIO's Role
War Against Terrorism - CIO's RoleWar Against Terrorism - CIO's Role
War Against Terrorism - CIO's RoleAyodeji Rotibi
 
Process Essay How To Save Money
Process Essay How To Save MoneyProcess Essay How To Save Money
Process Essay How To Save MoneyJamie Belknap
 
14 Trusted Freelance Writing Jobs For Beginners 2023
14 Trusted Freelance Writing Jobs For Beginners 202314 Trusted Freelance Writing Jobs For Beginners 2023
14 Trusted Freelance Writing Jobs For Beginners 2023Sara Lewis
 
My College Life Paragraph. Paragraph On Memorable
My College Life Paragraph. Paragraph On MemorableMy College Life Paragraph. Paragraph On Memorable
My College Life Paragraph. Paragraph On MemorableLaura Taylor
 
Essay About Medicine And Ethics
Essay About Medicine And EthicsEssay About Medicine And Ethics
Essay About Medicine And EthicsLydia Jana
 
Prevention_Works!2007-08[1]
Prevention_Works!2007-08[1]Prevention_Works!2007-08[1]
Prevention_Works!2007-08[1]Mary Beth Levin
 
Building a secure cyberspace for innovative enterprise, a collective responsi...
Building a secure cyberspace for innovative enterprise, a collective responsi...Building a secure cyberspace for innovative enterprise, a collective responsi...
Building a secure cyberspace for innovative enterprise, a collective responsi...Kayode Yussuf
 
Workshop PT 1 given at InfoPoverty World Conference: UN
Workshop PT 1 given at InfoPoverty World Conference: UNWorkshop PT 1 given at InfoPoverty World Conference: UN
Workshop PT 1 given at InfoPoverty World Conference: UNNeelley Hicks
 

Similar to COMPUTERSAFETY-Mod01-email (20)

Airport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyAirport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthy
 
Catella e-Crime London2015
Catella e-Crime London2015Catella e-Crime London2015
Catella e-Crime London2015
 
Saving Money, Saving Lives: 
How local software developers helped defeat Ebola
Saving Money, Saving Lives: 
How local software developers helped defeat EbolaSaving Money, Saving Lives: 
How local software developers helped defeat Ebola
Saving Money, Saving Lives: 
How local software developers helped defeat Ebola
 
"Security on the Brain" Security & Risk Psychology Workshop Nov 2013
"Security on the Brain" Security & Risk Psychology Workshop Nov 2013"Security on the Brain" Security & Risk Psychology Workshop Nov 2013
"Security on the Brain" Security & Risk Psychology Workshop Nov 2013
 
The Art of Human Hacking : Social Engineering
The Art of Human Hacking : Social Engineering The Art of Human Hacking : Social Engineering
The Art of Human Hacking : Social Engineering
 
Essay On Wuthering Heights.pdf
Essay On Wuthering Heights.pdfEssay On Wuthering Heights.pdf
Essay On Wuthering Heights.pdf
 
Pin On Volunteer Luncheon. Online assignment writing service.
Pin On Volunteer Luncheon. Online assignment writing service.Pin On Volunteer Luncheon. Online assignment writing service.
Pin On Volunteer Luncheon. Online assignment writing service.
 
Chapter2
Chapter2Chapter2
Chapter2
 
Writing Essay Questions For Students. Online assignment writing service.
Writing Essay Questions For Students. Online assignment writing service.Writing Essay Questions For Students. Online assignment writing service.
Writing Essay Questions For Students. Online assignment writing service.
 
Sample Conclusion Of A Research Paper What Is A Co
Sample Conclusion Of A Research Paper What Is A CoSample Conclusion Of A Research Paper What Is A Co
Sample Conclusion Of A Research Paper What Is A Co
 
500 Word College Essay Examples
500 Word College Essay Examples500 Word College Essay Examples
500 Word College Essay Examples
 
cyber crime, terrorism and corruption public spear
cyber crime, terrorism and corruption public spearcyber crime, terrorism and corruption public spear
cyber crime, terrorism and corruption public spear
 
War Against Terrorism - CIO's Role
War Against Terrorism - CIO's RoleWar Against Terrorism - CIO's Role
War Against Terrorism - CIO's Role
 
Process Essay How To Save Money
Process Essay How To Save MoneyProcess Essay How To Save Money
Process Essay How To Save Money
 
14 Trusted Freelance Writing Jobs For Beginners 2023
14 Trusted Freelance Writing Jobs For Beginners 202314 Trusted Freelance Writing Jobs For Beginners 2023
14 Trusted Freelance Writing Jobs For Beginners 2023
 
My College Life Paragraph. Paragraph On Memorable
My College Life Paragraph. Paragraph On MemorableMy College Life Paragraph. Paragraph On Memorable
My College Life Paragraph. Paragraph On Memorable
 
Essay About Medicine And Ethics
Essay About Medicine And EthicsEssay About Medicine And Ethics
Essay About Medicine And Ethics
 
Prevention_Works!2007-08[1]
Prevention_Works!2007-08[1]Prevention_Works!2007-08[1]
Prevention_Works!2007-08[1]
 
Building a secure cyberspace for innovative enterprise, a collective responsi...
Building a secure cyberspace for innovative enterprise, a collective responsi...Building a secure cyberspace for innovative enterprise, a collective responsi...
Building a secure cyberspace for innovative enterprise, a collective responsi...
 
Workshop PT 1 given at InfoPoverty World Conference: UN
Workshop PT 1 given at InfoPoverty World Conference: UNWorkshop PT 1 given at InfoPoverty World Conference: UN
Workshop PT 1 given at InfoPoverty World Conference: UN
 

COMPUTERSAFETY-Mod01-email

  • 1. Medical Center- Computer Safety and Awareness Training MODULE 01: Email scams, phishing, and virus attachments
  • 2. Keyword- Awareness • Increasing and diverse populations connecting to the internet • Dramatically increasing vectors • Increasingly available tools for hacking • Increasing value of patient data, market price for one CC record= 1.00US, one full medical record= 50.00US. • Small hospitals are an exceptionally vulnerable target: low budgets = weakened security.
  • 3. The Changing Reality of Computing in Today’s World makes continual training needed. • Human nature • We do not want barriers to our work, • we seek the most expedient path, • A call to action, • respond to seemingly sincere requests for help. EX- Franklin Jyubuti, displaced refugee from South Africa. • People become victims, avoid blaming others- counter productive, need an open environment of reporting.
  • 4. • Human nature • We do not want barriers to our work, • we seek the most expedient path, • A call to action, • respond to seemingly sincere requests for help. EX- Franklin Jyubuti, displaced refugee from South Africa. • People become victims, avoid blaming others- counter productive, need an open environment of reporting. The Changing Reality of Computing in Today’s World makes continual training needed.
  • 5. • Human nature • We do not want barriers to our work, • we seek the most expedient path, • A call to action, • respond to seemingly sincere requests for help. EX- Franklin Jyubuti, displaced refugee from South Africa. • People become victims, avoid blaming others- counter productive, need an open environment of reporting. The Changing Reality of Computing in Today’s World makes continual training needed.
  • 6. The Changing Reality of Computing in Today’s World makes continual training needed. • Human nature • We do not want barriers to our work, • we seek the most expedient path, • A call to action, • respond to seemingly sincere requests for help. EX- Franklin Jyubuti, displaced refugee from South Africa. • People become victims, avoid blaming others- counter productive, need an open environment of reporting.
  • 7. The Changing Reality of Computing in Today’s World makes continual training needed. • Human nature • We do not want barriers to our work, • we seek the most expedient path, • A call to action, • respond to seemingly sincere requests for help. EX- Franklin Jyubuti, displaced refugee from South Africa. • People become victims, avoid blaming ourselves or others- counter productive, need an open environment of reporting.
  • 8. The Changing Reality of Computing in Today’s World makes continual training needed. • Human nature • We do not want barriers to our work, • we seek the most expedient path, • A call to action, • respond to seemingly sincere requests for help. EX- Franklin Jyubuti, displaced refugee from South Africa. • People become victims, avoid blaming ourselves or others- counter productive, need an open environment of reporting.
  • 9. The Changing Reality of Computing in Today’s World makes continual training needed. • Human nature • We do not want barriers to our work, • we seek the most expedient path, • A call to action, • respond to seemingly sincere requests for help. EX- Franklin Jyubuti, displaced refugee from South Africa. • People become victims, avoid blaming ourselves or others- counter productive, need an open environment of reporting.
  • 10. Keyword- Awareness Cost 2015 2016 Healthcare 42,000,000 71,000,000 Hollywood Presbyterian Hospital said it had paid $17,000 in ransom money to regain access to files that had been locked in a ransomware attack. Expect such attacks to increase, says James Scott, senior fellow at the Institute for Critical Infrastructure Security (ICIT), which recently released a report on the ransomware threat to organizations in critical infrastructure sectors. “Hospitals are an easy target for many reasons,” Scott says. “Employees typically lack cyber hygiene training and their technology landscape, in most cases, is eerily absent of layered security centric protocols.“ Scott predicts that adversaries are going to start using ransomware as a diversionary tactic while they steal electronic health records and other sensitive data from healthcare networks. “The ransom will be secondary to the primary revenue generated by the sale of the data,” Scott says. Firms that fall victim to infection from file encrypting ransomware should simply pay the ransom, Joseph Bonavolonta, an assistant special agent with the FBI.
  • 30. Keyword- Awareness= Defense Watch what you click In most cases, computers are unwittingly infected by users clicking on cleverly disguised malware links. Browse trusted websites. Avoid suspicious-looking sites and be wary of pop-up boxes that ask you to click on unfamiliar links. Be wary of social media notifications Scrutinize social media notifications and check links by hovering your mouse over them to confirm link addresses before clicking. If you suspect you are infected- UNPLUG, DO NOT SHUT DOWN! Call for help! What symptoms indicate a computer has been compromised? Computer performs unusually slow Computer reboots on its own Web browser jumps to the wrong pages Web browser won’t display certain pages Emails aren’t displayed properly Emails randomly disappear Pop-up ads randomly display on your screen
  • 31. Keyword- Awareness= Defense If you suspect: UNPLUG, CALL FOR HELP, SING SOFTLY WHILE YOU WAIT HELP TO ARRIVE.