Transcript IT Security

Information Technology Security
Office of the Vice President for Information Technology
New Employee Orientation II
What is Phishing?
Phishing - spoofed e-mails and fraudulent web sites
designed to fool recipients into divulging personal
financial data
Risks
Identity theft
Credit card fraud
What is Malware?
Malware (malicious software) is software that is
intended to damage or disable your computer.
Risks
Viruses
Worms
Trojans
Data loss/stolen
Ransom-ware
http://security.vpit.txstate.edu/awareness/videos.html
What is Spyware?
Spyware is software that allows
information to be obtained about someone elses
computer by transmitting data without their
knowledge, and
can cause your computer to not work properly
Web Attacks
Target Personal Information such as
Credit Card Information
Passwords
Bank Account Information
Best Practices : Mobile Devices
Enable a lock
Use password rather than 4-digit pins or pattern locks
Disable Bluetooth, infrared, or Wi-Fi when not in use
Set Bluetooth to non-discoverable mode
Never leave your devices unattended
Best Practices : Passwords
Has at least 15 characters
Use a mixture of letters, numbers and symbols
Use a memorable phrase
Keep safe and confidential
Do not share or write down your passwords
Always lock your computer or laptop when you walk away
from it
DO NOT USE THE FOLLWING PASSWORD EXAMPLE
L!t$wDiamonds2015!
Best Practices : Email Encryption
Don’t share confidential information via email
Use a secure file share, SharePoint, TRACS, or using
encrypted USB drives
SEND ENCRYPTED – This option will encrypt and send your
original e-mail. This is recommended for university‐related email with a true business need and also an optional choice for
personal e-mail.
Example
Subject: [Encrypt] Hello
Best Practices : Laptop Encryption
Reduce the risk of university confidential data exposure
through stolen or lost equipment.
Implement full-disk encryption solutions that meets industry
and State of Texas Administrative Code (TAC 202) standards.
Best Practices : Browser Security
Configure Privacy and security settings
Clear history
Disable third party cookies
Enable phishing and malware protection
Disable Autofill, javascript, plugins, location tracking
Enable pop-up blocker
 Automatically update
http://security.vpit.txstate.edu
Security Software
Anti-Virus

Identity Finder
Windows Updates
Contact Information
Information Technology Security (IT Security)
(512) 245-4225
[email protected]
http://security.vpit.txstate.edu
Information Technology Assistance Center (ITAC)
(512) 245-ITAC (4822)
[email protected]