This document provides guidance to staff and students on maintaining information security at Kingston University. It covers password protection, securing devices from theft, identifying phishing emails and malware, using encryption, and safely handling data. The Service Desk is available to assist with any IT security questions or incidents.
The Internet is inescapable – both in your professional as well as your personal life. With our computers and phones, we are on the net at all times. But the net is dangerous. Whether you use e-mail, e-commerce, or even just a spreadsheet, you may not only be putting yourself in danger, but your whole company.
In this presentation, Prof. Dias explains some of the common ways you may be attacked when using Internet services, and how you can protect yourself against these attacks.
3 aspects where the 'virtual world' interacts now and in the future with us in a very real way.
. Thought Works Introduction to Blockchain
. Cyber Security
. Cloud Accounting
This document summarizes an information technology training session on email etiquette and social networks. It provides 18 rules of email etiquette, such as only discussing public matters, avoiding anger emails, and responding in a timely manner. It also discusses organizing emails and potentially moving email to the cloud for cost savings and security. Finally, it outlines rules for appropriate social media use, noting employers may check profiles, and indicates a borough social media policy is being developed addressing confidentiality and productivity.
This document provides an overview of email, including what it is, how to send and receive emails, attachments, mailing lists, and e-greeting cards. It discusses common email providers like Gmail, Outlook, and Yahoo Mail. It also covers email etiquette, safety, and resources for learning more about using email. Key aspects include that email allows digital messages to be sent over the internet, common email providers are free to use, and attachments, mailing lists, and e-cards are additional email features. Safety tips are also provided around viruses, spam, and phishing scams.
Hiroshima University Information Security & Compliance 2018imc-isec-comp
1. The document provides an overview of information security best practices including threats like phishing scams and viruses, and measures to mitigate risks.
2. It discusses routine security measures like using antivirus software, keeping all software updated, using strong unique passwords, making regular backups, and staying informed of the latest threats.
3. Additional recommendations include using a password manager, cloud services for sharing data securely, multi-factor authentication, sharing security information with others, and being careful when posting personal information online.
Hiroshima University Information Security & Compliance 2018imc-isec-comp
This document provides a summary of an information security training course. It discusses recent threats like phishing scams and virus infections. It emphasizes the importance of taking routine security measures such as using antivirus software, keeping software updated, using strong passwords, making regular backups, and staying informed of the latest threats. Additional good security behaviors include using a password manager, cloud services for sharing data securely, multi-factor authentication, only sharing information with known contacts, promptly reporting problems, and avoiding information leaks on social media. The document stresses practicing key countermeasures and behaviors to protect against security breaches.
Hiroshima University Information Security & Compliance 2018imc-isec-comp
The document outlines important information for improving information security, including recent threats like phishing scams and virus infections, important routine measures such as using antivirus software and strong passwords, and additional good behaviors like using password management tools and cloud services. It emphasizes practicing 5 countermeasures like keeping software updated and 5 behaviors like not clicking suspicious links to help protect against security breaches.
The Internet is inescapable – both in your professional as well as your personal life. With our computers and phones, we are on the net at all times. But the net is dangerous. Whether you use e-mail, e-commerce, or even just a spreadsheet, you may not only be putting yourself in danger, but your whole company.
In this presentation, Prof. Dias explains some of the common ways you may be attacked when using Internet services, and how you can protect yourself against these attacks.
3 aspects where the 'virtual world' interacts now and in the future with us in a very real way.
. Thought Works Introduction to Blockchain
. Cyber Security
. Cloud Accounting
This document summarizes an information technology training session on email etiquette and social networks. It provides 18 rules of email etiquette, such as only discussing public matters, avoiding anger emails, and responding in a timely manner. It also discusses organizing emails and potentially moving email to the cloud for cost savings and security. Finally, it outlines rules for appropriate social media use, noting employers may check profiles, and indicates a borough social media policy is being developed addressing confidentiality and productivity.
This document provides an overview of email, including what it is, how to send and receive emails, attachments, mailing lists, and e-greeting cards. It discusses common email providers like Gmail, Outlook, and Yahoo Mail. It also covers email etiquette, safety, and resources for learning more about using email. Key aspects include that email allows digital messages to be sent over the internet, common email providers are free to use, and attachments, mailing lists, and e-cards are additional email features. Safety tips are also provided around viruses, spam, and phishing scams.
Hiroshima University Information Security & Compliance 2018imc-isec-comp
1. The document provides an overview of information security best practices including threats like phishing scams and viruses, and measures to mitigate risks.
2. It discusses routine security measures like using antivirus software, keeping all software updated, using strong unique passwords, making regular backups, and staying informed of the latest threats.
3. Additional recommendations include using a password manager, cloud services for sharing data securely, multi-factor authentication, sharing security information with others, and being careful when posting personal information online.
Hiroshima University Information Security & Compliance 2018imc-isec-comp
This document provides a summary of an information security training course. It discusses recent threats like phishing scams and virus infections. It emphasizes the importance of taking routine security measures such as using antivirus software, keeping software updated, using strong passwords, making regular backups, and staying informed of the latest threats. Additional good security behaviors include using a password manager, cloud services for sharing data securely, multi-factor authentication, only sharing information with known contacts, promptly reporting problems, and avoiding information leaks on social media. The document stresses practicing key countermeasures and behaviors to protect against security breaches.
Hiroshima University Information Security & Compliance 2018imc-isec-comp
The document outlines important information for improving information security, including recent threats like phishing scams and virus infections, important routine measures such as using antivirus software and strong passwords, and additional good behaviors like using password management tools and cloud services. It emphasizes practicing 5 countermeasures like keeping software updated and 5 behaviors like not clicking suspicious links to help protect against security breaches.
This document provides guidelines for proper email etiquette and use. It discusses responsibilities of email users such as keeping messages brief, giving messages clear titles, protecting passwords, and avoiding sending large files or confidential information by email. The document also outlines activities to avoid like misuse of email, excessive personal use, confrontation, and not backing up email files. It concludes with hints and tips for setting email options and including signatures.
This document provides an overview of privacy and security issues related to personal data and traveling. It discusses the history of cyber threats like spam, viruses, and ransomware. Recent large data breaches are reviewed that have compromised billions of user records. Tips are provided for safe practices while traveling related to WiFi security, password management, social media use, and protecting devices and families at home. Questions from attendees are answered regarding specific cyber threats, safe technology use, and personal security best practices.
Computer Security Guide to Pc Security
“Your Info Guide to Beefing Up Your Personal Computer’s Safety From Malicious Threats
As we do these things on a more regular basis, we open ourselves up to potential hackers, attackers and crackers. While some may be looking to phish your personal information and identity for resale, others simply just want to use your computer as a platform from which to attack other unknowing targets. Computer Security is very important
This document provides tips and information about maintaining internet security. It discusses risks like identity theft and how to prevent it. It offers advice for securing personal information online and tips for safe internet use by teens and when using social media sites like Facebook. It also recommends using parental control software to monitor children's internet activity and protect them from inappropriate content. Overall, the document covers a wide range of internet security issues and provides recommendations for improving online safety.
This document provides a guide to improving PC security. It discusses topics like protecting your system, fighting spam, preventing spyware and adware, protecting against phishing and identity theft, using antivirus software, and recommended security resources. The guide recommends updating software, using a firewall, reviewing browser settings, installing antivirus software, not opening unknown attachments, and disabling hidden file extensions to improve security. It also provides tips to reduce spam like using multiple email addresses and blocking bulk mail. Spyware is discussed along with examples like CoolWebSearch and how to prevent it using antispyware software. Phishing is described as fraudulent emails asking for personal information to steal identities.
The document discusses internet safety and provides tips to protect privacy and security online. It recommends downloading security software like Microsoft Security Essentials, Spyware Blaster, and CCleaner to scan for malware and block pop-ups. Using a secure browser and ensuring websites start with "https://" can also enhance safety. Creating strong, unique passwords and avoiding sharing private information publicly are further advised. Cyberbullying and its forms like harassment through messages are addressed, noting their serious effects on victims' mental health and lives.
Meagan Bonitatibus created design posters to promote her blog that provides quick and easy recipes. Her initial goal was to help busy people cook at home quickly but she changed her focus to promoting her blog specifically. Her audience started as stay at home moms and busy professionals but expanded to anyone wanting to cook at home. Her message is that her blog is a professional resource featuring various recipes that are quick, simple and delicious for home cooks to make.
Fact Sheet_PoliticalAction-Aug2016-FINALAnn Warner
This document discusses political action and participation in the political process as an important part of an effective government relations program. It notes that members of Congress make policy decisions that impact companies' objectives and ability to meet needs. The document also discusses that political action committees (PACs) play an important role in ensuring transparency and alignment between political activity and government relations efforts. It then provides an overview of the political action services offered by Ann Warner LLC, including evaluating, developing, and implementing political action programs; creating PAC education and communication programs; devising PAC solicitation campaigns; developing strategic PAC contribution plans; and ensuring compliance with relevant rules.
Multicore systems have multiple processing cores on a single CPU die to improve performance over single-core processors. This allows the operating system to perceive each core as a separate CPU and schedule threads of multithreaded programs across multiple cores simultaneously. By splitting programs into parallel threads that can run independently on different cores, multicore systems can improve performance and throughput compared to single-core processors which must execute programs sequentially on a single core.
20150224 Dissertation Joost Poort - Table of contents and abstractJoost Poort
This dissertation contains 9 empirical studies on policy issues related to telecommunications, copyright, and broadcasting. The studies employ various methodologies and address topics such as the welfare effects of illegal downloading, evaluating policies to block access to piracy sites, examining fixed e-book pricing regulations, and assessing the valuation of commercial radio licenses. By using the studies as case studies, the role of economic evidence in informing policymaking in these fields is investigated. It is concluded that while legal and social norms primarily guide policy, economic analysis and evidence are increasingly important for policymakers to make informed decisions, understand the consequences of interventions, and optimize decisions within legal boundaries.
This document provides information on FICO credit scores from the three major US credit bureaus - Equifax, Experian, and TransUnion - including the score version, years available, score ranges, and prior brand names for each version dating back to the late 1990s. It shows that FICO scores have evolved over time, with the latest version being FICO Score 9, and that different credit bureaus may have had different brand names for the same FICO score version. Specialized FICO industry scores are also available for auto, bankcard/credit card, mortgage and other loan types.
This document provides a business plan for a proposed computer shop called "AC Computer Shop" in Bulacan, Philippines. The summary is:
1) AC Computer Shop will offer internet access, computer rentals, printing, scanning and computer repair services to students, office workers and nearby residents.
2) The shop will be located along a major road near schools and government offices.
3) Market research found growing demand for internet services in the area. Strategies to attract customers include distributing flyers and using signage.
Videos are also added...
LinkedIn Corporation is a social networking website for people in professional jobs. The company started in December 2002, and the website opened May 5, 2003. Users can make connections with other people they have worked with, post their work experience and skills, look for jobs, and look for workers. The site is available in many languages, including most European languages, Japanese, Korean, Indonesian, and Malay. LinkedIn has more than 200 million members around the world.
The document outlines plans for filming the opening scene of a thriller film. It will take place in a house where a young couple is watching a movie unaware that a kidnapper has entered. The kidnapper will knock out the boyfriend and take the girlfriend hostage. When the boyfriend wakes up he will find a clue that kicks off the rest of the film, leaving the opening on a cliffhanger. Details are provided about costumes, filming location, lighting, camera angles, music, typography, and the sequence of shots.
El documento propone varias medidas legislativas para mejorar el ambiente de negocios, la infraestructura, el equilibrio fiscal y la protección social en Brasil. Algunas de las propuestas incluyen perfeccionar la seguridad jurídica de los contratos, reformar marcos regulatorios como el de concesiones y minería, vender activos estatales, establecer una edad mínima para jubilaciones y compatibilizar las leyes de educación con el desarrollo económico y la reducción de desigualdades.
Multimedia refers to content that uses a combination of different media types, such as text, images, audio, video, and interactivity. It can be linear, with a set progression, or non-linear, allowing user control over navigation. Common multimedia elements include text, photographs, sound, video clips, and animations. Multimedia has various uses in fields like business and education, providing opportunities for creative and engaging learning experiences. While costly and time-consuming to create, multimedia can effectively convey concepts through multiple media forms.
This document provides guidelines for proper email etiquette and use. It discusses responsibilities of email users such as keeping messages brief, giving messages clear titles, protecting passwords, and avoiding sending large files or confidential information by email. The document also outlines activities to avoid like misuse of email, excessive personal use, confrontation, and not backing up email files. It concludes with hints and tips for setting email options and including signatures.
This document provides an overview of privacy and security issues related to personal data and traveling. It discusses the history of cyber threats like spam, viruses, and ransomware. Recent large data breaches are reviewed that have compromised billions of user records. Tips are provided for safe practices while traveling related to WiFi security, password management, social media use, and protecting devices and families at home. Questions from attendees are answered regarding specific cyber threats, safe technology use, and personal security best practices.
Computer Security Guide to Pc Security
“Your Info Guide to Beefing Up Your Personal Computer’s Safety From Malicious Threats
As we do these things on a more regular basis, we open ourselves up to potential hackers, attackers and crackers. While some may be looking to phish your personal information and identity for resale, others simply just want to use your computer as a platform from which to attack other unknowing targets. Computer Security is very important
This document provides tips and information about maintaining internet security. It discusses risks like identity theft and how to prevent it. It offers advice for securing personal information online and tips for safe internet use by teens and when using social media sites like Facebook. It also recommends using parental control software to monitor children's internet activity and protect them from inappropriate content. Overall, the document covers a wide range of internet security issues and provides recommendations for improving online safety.
This document provides a guide to improving PC security. It discusses topics like protecting your system, fighting spam, preventing spyware and adware, protecting against phishing and identity theft, using antivirus software, and recommended security resources. The guide recommends updating software, using a firewall, reviewing browser settings, installing antivirus software, not opening unknown attachments, and disabling hidden file extensions to improve security. It also provides tips to reduce spam like using multiple email addresses and blocking bulk mail. Spyware is discussed along with examples like CoolWebSearch and how to prevent it using antispyware software. Phishing is described as fraudulent emails asking for personal information to steal identities.
The document discusses internet safety and provides tips to protect privacy and security online. It recommends downloading security software like Microsoft Security Essentials, Spyware Blaster, and CCleaner to scan for malware and block pop-ups. Using a secure browser and ensuring websites start with "https://" can also enhance safety. Creating strong, unique passwords and avoiding sharing private information publicly are further advised. Cyberbullying and its forms like harassment through messages are addressed, noting their serious effects on victims' mental health and lives.
Meagan Bonitatibus created design posters to promote her blog that provides quick and easy recipes. Her initial goal was to help busy people cook at home quickly but she changed her focus to promoting her blog specifically. Her audience started as stay at home moms and busy professionals but expanded to anyone wanting to cook at home. Her message is that her blog is a professional resource featuring various recipes that are quick, simple and delicious for home cooks to make.
Fact Sheet_PoliticalAction-Aug2016-FINALAnn Warner
This document discusses political action and participation in the political process as an important part of an effective government relations program. It notes that members of Congress make policy decisions that impact companies' objectives and ability to meet needs. The document also discusses that political action committees (PACs) play an important role in ensuring transparency and alignment between political activity and government relations efforts. It then provides an overview of the political action services offered by Ann Warner LLC, including evaluating, developing, and implementing political action programs; creating PAC education and communication programs; devising PAC solicitation campaigns; developing strategic PAC contribution plans; and ensuring compliance with relevant rules.
Multicore systems have multiple processing cores on a single CPU die to improve performance over single-core processors. This allows the operating system to perceive each core as a separate CPU and schedule threads of multithreaded programs across multiple cores simultaneously. By splitting programs into parallel threads that can run independently on different cores, multicore systems can improve performance and throughput compared to single-core processors which must execute programs sequentially on a single core.
20150224 Dissertation Joost Poort - Table of contents and abstractJoost Poort
This dissertation contains 9 empirical studies on policy issues related to telecommunications, copyright, and broadcasting. The studies employ various methodologies and address topics such as the welfare effects of illegal downloading, evaluating policies to block access to piracy sites, examining fixed e-book pricing regulations, and assessing the valuation of commercial radio licenses. By using the studies as case studies, the role of economic evidence in informing policymaking in these fields is investigated. It is concluded that while legal and social norms primarily guide policy, economic analysis and evidence are increasingly important for policymakers to make informed decisions, understand the consequences of interventions, and optimize decisions within legal boundaries.
This document provides information on FICO credit scores from the three major US credit bureaus - Equifax, Experian, and TransUnion - including the score version, years available, score ranges, and prior brand names for each version dating back to the late 1990s. It shows that FICO scores have evolved over time, with the latest version being FICO Score 9, and that different credit bureaus may have had different brand names for the same FICO score version. Specialized FICO industry scores are also available for auto, bankcard/credit card, mortgage and other loan types.
This document provides a business plan for a proposed computer shop called "AC Computer Shop" in Bulacan, Philippines. The summary is:
1) AC Computer Shop will offer internet access, computer rentals, printing, scanning and computer repair services to students, office workers and nearby residents.
2) The shop will be located along a major road near schools and government offices.
3) Market research found growing demand for internet services in the area. Strategies to attract customers include distributing flyers and using signage.
Videos are also added...
LinkedIn Corporation is a social networking website for people in professional jobs. The company started in December 2002, and the website opened May 5, 2003. Users can make connections with other people they have worked with, post their work experience and skills, look for jobs, and look for workers. The site is available in many languages, including most European languages, Japanese, Korean, Indonesian, and Malay. LinkedIn has more than 200 million members around the world.
The document outlines plans for filming the opening scene of a thriller film. It will take place in a house where a young couple is watching a movie unaware that a kidnapper has entered. The kidnapper will knock out the boyfriend and take the girlfriend hostage. When the boyfriend wakes up he will find a clue that kicks off the rest of the film, leaving the opening on a cliffhanger. Details are provided about costumes, filming location, lighting, camera angles, music, typography, and the sequence of shots.
El documento propone varias medidas legislativas para mejorar el ambiente de negocios, la infraestructura, el equilibrio fiscal y la protección social en Brasil. Algunas de las propuestas incluyen perfeccionar la seguridad jurídica de los contratos, reformar marcos regulatorios como el de concesiones y minería, vender activos estatales, establecer una edad mínima para jubilaciones y compatibilizar las leyes de educación con el desarrollo económico y la reducción de desigualdades.
Multimedia refers to content that uses a combination of different media types, such as text, images, audio, video, and interactivity. It can be linear, with a set progression, or non-linear, allowing user control over navigation. Common multimedia elements include text, photographs, sound, video clips, and animations. Multimedia has various uses in fields like business and education, providing opportunities for creative and engaging learning experiences. While costly and time-consuming to create, multimedia can effectively convey concepts through multiple media forms.
This document provides summaries of numerous articles on home repairs and improvements from various publications between 2013-2015. The articles discuss options for upgrading decks, completing renovations like kitchen remodels, creating outdoor showers on a budget, and general tips for common home repairs like fixing holes in drywall or broken toilets. Many emphasize the importance of planning, budgeting adequately, and using proper techniques for repairs and renovations.
The document appears to be a portfolio by graphic designer Jonathan Tucker showcasing various branding, print, and web design projects. Some of the projects summarized include:
- A logo design for William & Company consisting of a three-part logo to prolong the brand's life.
- A logo for hair stylist Brat Da Barberist featuring scissors to represent her profession and brackets around her name.
- A paper airplane logo symbolizing the lifestyle of Dallas for a branding project called "Hi Dallas".
- A logo incorporating a Pegasus for the "Local Over Everything" radio show to represent Dallas.
- Redesigning layouts for an organization helping retired NFL players plan financially.
This document provides a 12-point summary of tips for protecting educational records and maintaining cyber security compliance at Wilmington University. The tips include locking computers when stepped away from, destroying sensitive documents, using strong and unique passwords, not storing confidential documents in public clouds, and being wary of phishing attempts. Completing a quiz is required to receive credit for reviewing the cyber security training.
This document provides an overview of information security awareness training based on ISO/IEC 27001:2013. It discusses what information is, the key aspects of information security including confidentiality, integrity and availability. It then outlines various practices for maintaining confidentiality, integrity and availability such as access controls, backups and policies. The document also discusses the benefits of information security, key drivers, why security breaches occur, and important security topics for end users including policies, asset classification, physical security, passwords and more.
In today's digital world, cybersecurity and Information security has become an essential concern for every organization. Irrespective of the size and strength of an organization, a minor cyber attack can cost millions to recover. This informative blog includes the Dos and Don'ts of Internet security that help understand the best cybersecurity practices.
This document provides an employee technology handbook for Sumter County Schools covering important information about password security, recognizing security breaches, network accounts, internet and email use, and social media guidelines. Key points include requiring complex passwords that are kept secure, locking computers when unattended, using caution when downloading files or installing programs, and reporting any suspicious technology use or potential breaches to technical support. The greatest security risks are social engineering, unauthorized access to accounts, malware/viruses, and lost computing devices containing sensitive data.
Cybersecurity Tips For Schools - Reviewing Approaches To Keeping Students Saf...Education 2Conf
How can educational institutions stay safe from spammers, scammers, fraudsters, and cybercriminals? This presentation by the Education 2.0 Conference elucidates and reviews approaches to how schools & universities can protect their valuable data and financial assets.
The document provides an overview of an employee information security awareness training. It summarizes key topics covered in the training including identifying security risks, developing good security practices, protecting classified and sensitive company information, securing workstations and mobile devices, safe email practices, and guarding against social engineering. It emphasizes the importance of protecting company information and passwords at all times.
This document provides an overview of cybersecurity awareness and training. It discusses the importance of cybersecurity awareness, common cyber threats like phishing, malware, and social engineering. It also covers best practices for password security, using multi-factor authentication, assessing link safety, and being cautious of email attachments. The document emphasizes that regular security updates, backups, and awareness training are necessary for protection as attackers are constantly evolving their tactics.
This document provides an overview of information technology security awareness training at Northern Virginia Community College. It aims to assist faculty and staff in safely using computing systems and data by understanding security threats and taking reasonable steps to prevent them. Everyone who uses a computer is responsible for security. New employees must complete training within 30 days, and refresher training is required annually. Users have personal responsibilities around reporting violations, securing devices and data, and safe email practices. Security violations can result in consequences like data loss, costs, and disciplinary action. Training must be documented and various delivery methods are outlined.
This document provides an overview and objectives for an information security awareness training. It covers topics like electronic communication, email viruses, phishing, internet usage, social networking, password management, and physical security. The training aims to help users understand cybersecurity threats, how to safely use technology, and their role in protecting company information assets. It emphasizes the importance of having strong, unique passwords and avoiding opening attachments or clicking links from unknown sources.
This document discusses various cyber threats and provides tips to protect against them. It begins by outlining groups that may want personal information, such as nation states, cyber criminals, and corporate spies. It then details common cyber threats like malware, viruses, worms, spyware, and social engineering. The document provides examples of these threats and discusses how to prevent identity theft, protect sensitive data, use social media securely, and identify phishing attempts. It concludes by offering advice on mobile, wireless, and internet security best practices.
This document discusses cyber safety and provides information on protecting personal information and computers from cyber attacks. It defines cyber bullying and outlines some of its negative consequences, including that 20% of cyberbullied kids think about suicide. It also discusses common cyber threats like identity theft, malware, and weak passwords. The document recommends top actions for cyber safety like installing updates, using antivirus software, and enabling firewalls. Finally, it outlines some cyber safety services and software that can help protect networks and devices.
This document provides best practices for online security and protecting personal information. It discusses the risks of sharing personal data online like passwords being cracked, social engineering, phishing emails, malware, and man-in-the-middle attacks. The document recommends using strong, unique passwords, two-factor authentication, privacy screens, firewalls, antivirus software, web filtering, encrypted backups, HTTPS browsing, and avoiding phishing. Following these practices can help better secure personal information in an increasingly connected digital world.
The complete guide on how to prevent an IT security breach.
Some of the tips include:
♦ Why keeping a clean desk matters
♦ How to avoid email threats, including five ways to block phishing attack
♦ How your employees can secure their mobile devices
♦ Website browsing best practices.
The complete guide for staying protected online.
Some of the tips include:
♦ Why keeping a clean desk matters
♦ How to avoid email threats, including five ways to block phishing attack
♦ How your employees can secure their mobile devices
♦ Website browsing best practices.
"The 7 Most Important Steps to Cyber protection for SME's -"
or " Software that can cost less than a Latte and could get you Enterprise Level Cyber Security !..."
Updated List of Software /Services
http://vciso.co/lattesecurity
Master of Information Technology Australia viteduau
Master of Information Technology Australia industry is a dynamic and rapidly growing market. You'll graduate from our Master of Information Technology with the technical, analytical, managerial, leadership and interpersonal skills required for success in the IT industry.
This document provides guidance and information on various information security and data protection topics. It discusses protecting personal data, security best practices like using strong passwords and updating antivirus software. It also covers topics like phishing scams, email encryption, social media usage, and software/website controls. The document seeks to educate users on security policies and why certain controls are in place to protect sensitive information and systems from unauthorized access or cyber threats.
This document contains revision material on safety and security for an ICT IGCSE exam, including:
1) Four strategies for minimising dangers when making friends online, such as only meeting in public and telling an adult.
2) An explanation that encryption is needed to scramble data to protect it from being understood if intercepted.
3) Three computer safety issues like electrocution, tripping, and fire from too many plugs.
This document discusses how to protect yourself from online identity theft. It describes common identity theft techniques used by criminals such as phishing, impersonating service providers, and using malware. It then provides an overview of steps someone can take to better protect their personal information online, including keeping browsers and operating systems updated, using strong and unique passwords for all accounts, signing out of websites completely, using secure networks, locking devices when not in use, and avoiding suspicious emails and scams.
Similar to KEEP IT SAFE FINAL IT Security A6 FINAL 2 (1) (20)
This document outlines communication action items for promoting an updated intranet site. Key actions include:
1. A pre-launch teaser campaign with news feed banners counting down to the launch date.
2. Developing FAQs to address why the intranet needs updating.
3. Coordinating weekly communications group meetings to discuss launch preparations.
4. Creating posters and e-posters to promote a launch day event with food and presentations about new features.
5. Including information about the launch in the internal newsletter.
6. Planning the launch day event for May 12th with demonstrations of new features.
7. Creating a guide or video on how to use the
This document outlines a community safety communications plan to raise awareness of various issues through different channels over the course of a year. It identifies topics like alcohol awareness, burglary, distraction burglary, fly-tipping, and vehicle crime that can be focused on in specific months. For each topic, it lists potential communication channels and materials that can be used to educate the public, such as press releases, posters, newsletters, social media, and presentations. The plan provides a framework but is meant to be flexible so messages can be tailored and distributed as needed.
The document thanks the recipient for signing up for the Future Energy tariff, which supports renewable energy sources and environmental education programs. It contributes £2 per month to match electricity usage with renewable sources through the National Grid and support a fund for schools to reduce emissions and teach green values. As a thank you, signees receive 20% off energy efficient gadgets with a provided code. The tariff is one of many British Gas programs to help customers live sustainably and save money through an energy savings report.
The International Youth Foundation is partnering with ACS International Schools to host a workshop from October 1-4. The workshop will bring together award winning youth leaders from IYF's YouthActionNet program with students from ACS' three campuses. The goals of the workshop are to develop the youth leaders' skills in areas like leadership and communication, and to expose ACS students to social issues and empower them to take action. The workshop will include lunch discussions, a question and answer session, and interviews between ACS students and the youth leaders. An awards dinner will also be held to celebrate the youth leaders' achievements in addressing community needs. ACS hopes to continue its partnership with IYF to further positive youth development globally
The ACS Marketing team has been working to launch a new brand identity for ACS International Schools. Presentations were given to introduce the new brand which went live on February 21, 2005. The document discusses why ACS is rebranding to better reflect the truly international nature of the schools today and to increase brand awareness. The new brand identity features a new logo for the overall organization and individual logos for each school incorporating their school colors. The rebranding includes a new name, ACS International Schools, and strapline "A passion for achievement" to represent the passion of teachers and staff.
Air Products has developed a new process for producing hydrogen that reduces costs by 15% compared to previous methods. The process involves reforming natural gas combined with carbon capture technology to minimize carbon dioxide emissions. Initial testing of the process at Air Products' research facility has been successful and the company plans to deploy the technology across its hydrogen plants worldwide over the next 5 years.
1. KEEP IT SAFEAn Information and Technology Services guide to
security for staff and students
INFORMATION AND TECHNOLOGY SERVICES
@KU_ServiceDesk
Follow us on Twitter Contact the Service Desk on
63355 or 020 8417 3355
2. Contents
01 Welcome from the Vice-Chancellor and CIO
02 Help and Support
03 Password Guidance
05 Email Security
09 Physical Security
11 Virus Protection
15 Data Handling
17 Credit / Debit Card and Online Payments
18 Reporting Security Incidents
INFORMATION AND TECHNOLOGY SERVICES
3. Welcome – From the Vice Chancellor and CIO
Everyone works with digital information and whilst the benefits are enormous for education,
research and administration, technology exposes us to many security risks.
A failure to secure the information we store has serious implications for the University, staff
and students. Breaches carry significant financial penalties, not to mention damaging the
reputation of the University or individuals. We continue to invest heavily in information security
but the weakest link can often be people.
This booklet provides some practical advice for staff and students to help identify security
risks and remain safe whilst using IT at the University or elsewhere. The University has a duty
to protect the personal, sensitive and financial information processed by its IT services, and
you will no doubt be keen to ensure that the work you produce during your time here is safe
from theft, loss or plagiarism.
If you have questions after reading this booklet you can either visit the dedicated IT Security
pages on StaffSpace or MyKingston or contact the Service Desk, who will be happy to help.
Julius Weinberg
Vice-Chancellor
01
Simon Harrison
Chief Information Officer
4. 02
Keep IT Safe – Help and Support
IT Service Desk
The Service Desk offers help and support for any IT and Library related problems you may
encounter throughout your time here. Support is available via the telephone, Monday to
Friday between 08:00 and 18:30 by calling 020 8417 3355, or you can visit the IT Support
pages at mykingston.kingston.ac.uk/mysupport/itsupport and
staffspace.kingston.ac.uk/dep/it-services for online help and support.
However if you are unable to login to the Service Desk Portal, please submit an online form
at kusdpw.kingston.ac.uk giving us as much detail as possible about the problems you
are experiencing with your computer.
Follow the Service Desk on Twitter for regular IT service updates, news and support.
Please also see the IT System Status on the My Kingston and StaffSpace homepages.
Opening Hours
Monday - Friday: 0800 - 1830
T: 020 8417 3355
W: portal.kingston.ac.uk
@KU_ServiceDesk
If you are concerned about a possible security incident, you should contact the Service Desk.
Further information about security can also be found on My Kingston
mykingston.kingston.ac.uk/mysupport/itsupport/Pages/security
and StaffSpace staffspace.kingston.ac.uk/dep/it-services/Pages/Security
StaffSpaceService Desk My Kingston
5. 03
Keep IT Safe – Password Guidance
Your password is crucial to protecting the
security of your account.
Passwords ensure that only authorised users
can access the University’s IT facilities.
Your password keeps your stored data and
information private and secure.
What is a strong password?
Criminals have developed programs that
automate the ability to guess your password.
Someone with minimal skills and with the
right tools can easily guess short or normal words. The longer and more complex your
password is, the more difficult it is to deduce or guess.
Password strength tips:
• Use long words, or preferably phrases, that are more difficult to guess
• Use at least one upper case letter and a number to make it even harder to guess
• Some examples of strong passwords based on the phrase ‘day follows night’ include:
• ‘Dyfllwsnght’ which has the vowels removed
• ‘D2yf0ll0wsn1ght’ which has all vowels replaced by numeric characters
How can I protect my password?
Do
• Do use a ‘strong’ password
• Do change it regularly, or if you think someone else may know it
• Do use different passwords for different IT services, so that if someone gains access
to your password it is of limited use to them
Don’t
• Don’t write your password down
• Don’t let anyone else know your password
• Don’t let anyone see you typing it
• Don’t type your password into an open-text field, such as your username
6. 04
How do I change my password?
Staff
If you have forgotten your password you can change your password using the Password Changer.
To use the staff email based Password Changer kusdpw.kingston.ac.uk/pass you will
need to add your personal email address to the Content section of ‘Yourself’.
If you have any questions please contact the Service Desk.
Students
If you have forgotten your password you can change your password using the Password
Changer.
To use the student Password Changer you should update your personal email address in
‘OSIS’. If you didn’t provide a personal email address, then you can contact the Service Desk.
Yourself
Password
Changer
7. 05
Keep IT Safe – Email Security
Phishing
Email phishing is where a legitimate looking
email is sent by a fraudster in an attempt
to acquire sensitive information such as
usernames, passwords, credit card details,
bank details or other information.
It is not uncommon to receive an email
claiming to be from trustworthy sources
with the intention of tricking you into
providing sensitive and valuable data.
How to spot a phishing email
• The ‘from’ address may not be a real organisation domain
• Think whether you are expecting an email correspondence from the organisation
• The link in the email is different from the URL specified in the mail
• The subject field is a generic statement
• The message contains poor spelling and grammar
• Unknown or suspicious attachments
Do
• Do hover your mouse over links and check the sender is legitimate
• Do report incidents and phishing attacks to it-security@kingston.ac.uk
Don’t
• Don’t open any attachments you may consider suspicious
• Don’t click on links you may consider suspicious
• Don’t reply to the email
8. 06
From: Vincenzo Recupero <v.recupero@esattori.it> Sent: Mon 20/07/2015 11:07
To: Vincenzo Recupero
Cc:
Subject: R: Faculty and Staff Form Submission
1 2 3 4 5 6 7 8 9 10
Dear E-mail User.
Your EMAIL ACCOUNT PASSWORD Expires TODAY, to UPDATE Please Click LOGON and Follow Instructions.
Thanks
2015 ITS Help Desk Support Center
Subject: Is too generic
From: Not a Kingston University address
I&TS never ask for users to provide user credentials
Link: Not a Kingston University link
http://facultyportalmail.tripod.com
Click to follow link
The example below illustrates the points previously described.
9. Keep IT Safe – Email Security
SPAM
SPAM is defined as the sending of
unsolicited email to large groups of people.
This will include large groups of University
students and/or staff. If not necessarily
malicious, SPAM can have a detrimental
effect on the University’s computer network
and, in some cases, can prevent important
emails from reaching the intended recipient.
Do
• Do report large or excessive volumes of SPAM emails to it-security@kingston.ac.uk
• Do look for tick-boxes that allow you to opt out of newsletters and special offers etc.
Don’t
• Don’t reply to SPAM emails
• Don’t ‘reply all’ to University-wide emails
• Don’t publish your email address on any website unless absolutely necessary,
particularly on message boards and forums
• Don’t give your email address to suspicious websites in order to download shareware
or free programs
07
10. 08
Reporting suspicious emails
You can help us handle phishing and SPAM emails by reporting any suspicious emails.
We will submit suspicious emails to the Microsoft’s junk mail service, which in turn will
mean they are marked and dealt with appropriately in the future.
You should report any suspicious emails to it-security@kingston.ac.uk
Don’t forward the original email, attach it to a new email as follows:
In your University Outlook account:
1. Create a new email
2. Click on ‘Attach Item’ (envelope and paperclip icon at the top, just to the right of
centre) then select ‘Outlook Item’ and the phishing email from the list of items
3. Send to it-security@kingston.ac.uk
11. 09
Keep IT Safe – Physical Security
Laptop crime is on the rise and unattended
devices are easy targets for thieves.
Thieves will target computers, laptops and
mobile phones in cars, coffee bars, libraries
and even on public transport.
Apple has a service called find my phone,
which is available for users of Apple
computers or phones. It is advisable to
enable this feature if you can as it can help
to protect or locate your devices if they are
lost or stolen.
Users of Windows or Linux devices can look at the https://preyproject.com/, which
offers a similar service for such devices.
If you have an android phone, then please go to www.lookout.com
Reducing computer theft
Staff computers or laptops should be secured and offices locked when unoccupied.
A simple lock, cable and locked office door will deter the majority of opportunist thefts.
Security locks
Laptops, LCD monitors and most computers can be secured with a security lock and
plastic coated steel cable. These come in a number of forms such as Kensington, the most
well-known manufacturer. Variations on this theme include security plates that are bonded
to two or more items and secured via a cable and lock.
12. 10
Locking your Computer
If you are office based it is important to lock your device when leaving it unattended, and to
turn it off at the end of each working day. This not only protects your device and its data,
but also supports the University’s green agenda by using less power.
If you are using one of the desktops in the LRC, then please remember to log out.
All staff laptops provided since summer 2015 now use BitLocker encryption to provide
an additional level of security for sensitive information stored on laptops. Staff with older
laptops who deal with sensitive information and would benefit from Bitlocker (or FileVault for
Apple devices) should please contact the Service Desk.
Extra care should be taken when working on systems that contain sensitive data such as
student information and financial data. Data loss incidents are far more likely to occur when
a user leaves their workstation logged in but not locked. You should always ensure that you
save your work to the H: drive.
When working in open areas such as LRCs, computer labs or teaching rooms, you
should never leave a computer unattended while it is logging off. The logoff process is not
immediate and can be interrupted if someone chooses to. You should always wait until you
see the login screen or the computer has powered off.
13. 11
Keep IT Safe – Virus Protection
What is a Virus?
A computer virus is a malware program
that, when executed, replicates by inserting
copies of itself (possibly modified) into
other computer programs, data files, or the
boot sector of the hard drive. When this
replication succeeds, the affected areas are
then said to be ‘infected’.
Viruses often perform some type of harmful
activity on infected hosts, such as stealing
hard disk space or CPU time, accessing
private information, corrupting data,
displaying political or humorous messages on the user’s screen, SPAMming their contacts,
logging their keystrokes, or even rendering the computer useless.
What is Anti-virus?
Anti-virus software is used to safeguard a computer from malware, including viruses,
computer worms, and Trojan horses. Antivirus software may also remove or prevent
spyware and adware, along with other forms of malicious programs.
The detection used in these programs is reliant on the user performing regular anti-virus
updates. On a University managed workstation, this update is performed automatically by
the system administrators. However on personal devices such as laptops and home PCs,
regular updates must be run.
There are a number of free and commercially available anti-virus software packages such
as AVG, ClamAV, McAfee, Norton and Kaspersky available on the market.
14. 12
Do
• Do make sure portable devices such as USB sticks are clean before transferring the
data from them
• Do contact the Service Desk If you experience issues
Don’t
• Don’t open attachments from unknown or suspicious sources
• Don’t click on links within emails
Malware
‘Malware’ is short for malicious software. Malware infections on your computer or other
data storage devices can have a serious impact, depending on what the malware was
designed to do. For example, it can:
• Corrupt or make important data inaccessible;
• Introduce hidden software which can detect usernames and passwords to University
systems, or personal data such as bank and credit card details, and transmit them to
criminals to use in fraudulent activities
15. 13
Keep IT Safe – Virus Protection
Spyware
Spyware is any technology that aids in
gathering information about a person or
organisation without their knowledge.
Spyware can get into a computer as a
software virus or as a result of installing a
new program, which could secretly capture
your username, password, email address,
banking credentials or credit card details.
Usually visiting websites for free downloads,
illegal software downloads, or illegal music
downloads can often result in a Spyware infection.
What is Anti-spyware?
Anti-spyware is used to detect and remove malware and advertising software.
Anti-spyware software such as ‘MalwareBytes’ can be used to remove spyware and malware.
Do
• Do avoid sites offering pirated software/videos and games
• Do pay attention to freeware you install, much of it these days is packaged with
spyware and users should be vigilant to ensure they only install what they want
• Do make sure your Windows/MAC/Linux OS installation is up to date with the latest
patches and updates
• Do report to Service Desk and stop using immediately if you think your PC is infected
with spyware
Don’t
• Don’t enter any personal details on websites unless the website is from a trustworthy
organisation and you can verify it
• Don’t open any email attachments that you are not expecting to receive. If it is a
known sender, under no circumstances should you ever give out or send personal
data back or follow any links unless you are absolutely sure
16. 14
What is a Firewall?
A Firewall is software or hardware that monitors incoming and outgoing traffic and restricts
or allows access to and from your computer depending on your firewall settings. Make sure
you keep it turned on at all times.
17. Keep IT Safe– Data Handling
The Data Protection Act states that you are
responsible and liable for any personal or
sensitive data you handle, so it is essential
you do so securely.
This section refers mainly to the handling of
information on non-University devices.
My Desktop Anywhere
Whenever possible, remote access to
University IT services should be via My Desktop Anywhere. This service is a secure method of
working with your normal KU desktop from any device anywhere in the world.
My Desktop Anywhere allows you to access University software applications and securely
work on sensitive, personal or financial information without the need to save anything on your
local device.
My Desktop Anywhere can be accessed from both My Kingston at
mykingston.kingston.ac.uk/tools/Pages/My-Desktop-Anywhere
and StaffSpace staffspace.kingston.ac.uk/applications/Pages/My-Desktop-Anywhere
USB Memory Sticks
Popular for their ease of use, USB memory sticks are used by many people across the
University to store and transport files and other data to work with remotely. USB memory
sticks are an insecure method of storing information, and are easily lost or misplaced.
The University strongly advises against the use of USB memory sticks to hold sensitive data
unless they are encrypted. Encryption can be either ‘hardware encrypted’ in which case the
USB device has a small numeric keypad on it, and access to data on the device requires
entry of a valid PIN, or ‘software encrypted’ requiring the entry of a valid PIN or password
once the device has been inserted and recognised by a computer. Encrypted USB sticks are
available widely through high street and online stores.
15
18. Encryption
Encryption, put simply, means the translation of data into a secret code. Encryption is the
most effective way to achieve data security. To read an encrypted file, you must have access
to a secret key or password that enables you to decrypt it.
Full disk encryption ensures that everything stored on your device is encrypted. It is
recommended that you consider using this facility to ensure the privacy of your data.
On Windows computers you can use BitLocker, which is part of the standard Windows
operating system, and the equivalent on Apple computers is FileVault.
Before adopting either of these tools you should perform a full backup of your computer.
Email encryption is supported by Office 365. However, the University does not offer email
encryption as a standard service at this time, although it is expected that future Office 365
implementations at the University will include this.
‘Remember Me’
Many IT services require a username and password in order to identify and authenticate you.
It is common for many computers to offer a ‘Remember Me’ function to avoid the need to
enter these credentials every time you need to use the service. It is strongly recommended
that you do not tick this option to ensure that your credentials are not stored on the computer.
Email Attachments
Email is an insecure communication medium. Email attachments are stored in temporary
folders and will often remain there long after you have closed your email application and left
the device. It is strongly recommended that information of a sensitive nature is not sent or
viewed as an email attachment.
Sending or Receiving Large Files
Occasionally it may be necessary to transfer large files of information between the University
and a third party. In such cases a secure file transfer protocol (FTP over SSL or FTPS)
mechanism, or similar, should be used. If unsure, contact the Service Desk for assistance.
16
19. Keep IT Safe – Credit / Debit Card & Online Payments
Telephone Payments
When making payment over the telephone
you should be careful that you are not
overheard. When possible make sure that
you are in a room alone, or can be certain
that others are out of hearing distance.
Online Payments
When making payments using a website’s
online payment facility, it’s important that the
page you enter your details onto is using a secure connection. This ensures that your details
are encrypted as they pass between your device and the supplier’s website over the internet.
Always look for the padlock symbol in your web browser’s address bar, and the HTTPS://
prefix to the URL. If you are unsure or can’t easily identify it as being secure then don’t enter
your details. When you do enter your details into a secure website it’s also important to make
sure that nobody can see you do it.
17
20. Keep IT Safe – Reporting Security Incidents
Remember, if your system suffers
from a security incident,
you should contact the
Service Desk
or email
it-security@kingston.ac.uk
18
W portal.kingston.ac.uk
NEED
SUPPORT?Contact the Service Desk
T 020 8417 3355
(internal)63355
OPENING HOURS Monday - Friday: 0800 - 1830
@KU_ServiceDesk
Follow us on Twitter