Transcript IT Security
Information Technology Security
Office of the Vice President for Information Technology
New Employee Orientation II
What is Phishing?
Phishing - spoofed e-mails and fraudulent web sites
designed to fool recipients into divulging personal
financial data
Risks
Identity theft
Credit card fraud
What is Malware?
Malware (malicious software) is software that is
intended to damage or disable your computer.
Risks
Viruses
Worms
Trojans
Data loss/stolen
Ransom-ware
http://security.vpit.txstate.edu/awareness/videos.html
What is Spyware?
Spyware is software that allows
information to be obtained about someone elses
computer by transmitting data without their
knowledge, and
can cause your computer to not work properly
Web Attacks
Target Personal Information such as
Credit Card Information
Passwords
Bank Account Information
Best Practices : Mobile Devices
Enable a lock
Use password rather than 4-digit pins or pattern locks
Disable Bluetooth, infrared, or Wi-Fi when not in use
Set Bluetooth to non-discoverable mode
Never leave your devices unattended
Best Practices : Passwords
Has at least 15 characters
Use a mixture of letters, numbers and symbols
Use a memorable phrase
Keep safe and confidential
Do not share or write down your passwords
Always lock your computer or laptop when you walk away
from it
DO NOT USE THE FOLLWING PASSWORD EXAMPLE
L!t$wDiamonds2015!
Best Practices : Email Encryption
Don’t share confidential information via email
Use a secure file share, SharePoint, TRACS, or using
encrypted USB drives
SEND ENCRYPTED – This option will encrypt and send your
original e-mail. This is recommended for university‐related email with a true business need and also an optional choice for
personal e-mail.
Example
Subject: [Encrypt] Hello
Best Practices : Laptop Encryption
Reduce the risk of university confidential data exposure
through stolen or lost equipment.
Implement full-disk encryption solutions that meets industry
and State of Texas Administrative Code (TAC 202) standards.
Best Practices : Browser Security
Configure Privacy and security settings
Clear history
Disable third party cookies
Enable phishing and malware protection
Disable Autofill, javascript, plugins, location tracking
Enable pop-up blocker
Automatically update
http://security.vpit.txstate.edu
Security Software
Anti-Virus
Identity Finder
Windows Updates
Contact Information
Information Technology Security (IT Security)
(512) 245-4225
[email protected]
http://security.vpit.txstate.edu
Information Technology Assistance Center (ITAC)
(512) 245-ITAC (4822)
[email protected]