SlideShare a Scribd company logo
2013 Fall CCCS Security
Awareness
Why does Security Awareness apply
to me?
What is the Top Cause of
Organizational Breaches?

•
•
•
•

External hackers having fun?
External organized crime mobs stealing data?
Government sponsored hacking?
Negligent Insiders?
I’m an insider, why do I care?
• Our customers expect and demand us to treat
their Personal Private Information (PPI) with
due care.
• State law mandates that we do the right thing
for our students. National law mandates that
we take due care with Payment Card Industry
(PCI) data.
• Our brand name is build on our constant
diligent care and ruined by one careless slip.
Seven Mistakes
we can’t make!

• #1 – Choosing poor passwords.
• #2 – Allowing sensitive data to be
viewed by others.
• #3 – Using unknown USB devices.
• #4 – Clicking bad links in e-mail.
• #5 – Loosing devices with
sensitive data.
• #6 – Using unknown Wi-Fi.
• #7 – Misusing Social Media.
Poor Passwords
• In a large number of physical security audits
passwords were found on and around end
user workstations.

• What to do?
Write yourself a reminder of the password,
not the password itself. Use a password
schema and stick to it.
Clear screen & clean desk
• 71% of office workers say that they have been
able to sneak a peek at a workstation in the
workplace.

• What to do?
Lock your computer screen when you step
out. Store hard copy Personal Private
Information in a cabinet or file folder.
Unknown USB devices
• 35% of users have report having experienced
malware or virus infection via a USB device.
Attackers will leave infected devices in semipublic areas, sometimes with the company
logo and then simply wait.
• What to do?
Only use USB devices that you own or trust.
Ask IT to inspect any suspect USB devices.
Phishing Attacks
• CCCS and other educational organizations are
often the target of sophisticated, custom targeted
email phishing campaigns. While SPAM filters can
help, the human element is critical to stop these
attacks.
• What to do?
CCCS staff will never ask for Credentials via email.
Any email asking for login info should be treated
as bogus and discarded.
Lost Devices
• Almost 90% of people who find lost
smartphones will look through the digital
contents for sensitive information. Around
70% of users do not password protect their
smartphones.
• What to do?
Password protect your smartphone. Notify IT
as soon as possible if you should loose it.
Using Unknown Wi-Fi
• Less than 20% of users will use a VPN when
accessing a public Wi-Fi (Wireless hotspot.)
Rogue Wi-Fi “providers” can easily intercept
sensitive data and compromise CCCS
machines.
• What to do?
Always use the VPN when accessing offsite
guest Wi-Fi services.
Social Media
• As social media norms are changing rapidly, more than
50% of enterprises have seen an increase of malware
infections due to employee use of Social Media. Social
media can also easily make public things that shouldn’t
be disclosed.

• What to do?
Beware of viral videos that require you to install any
application in order to view them.
Be mindful of how others will view what you post
online. It can be very easy for others to find you and
misrepresent your posting.
CCCS Security Defenses
•
•
•
•
•

Firewalls
Malware prevention devices
Intrusion detection devices
Spam filters
System & network vulnerability scanners

• Most importantly – YOU! Educated end users are
the most important part of a good security
posture.
Questions?
• Comments?
• Suggestions?

• CCCS Security Contacts:
cccs.edu/infosec
303-620-HELP (4357)
CCCS-ITHelpDesk@cccs.edu

More Related Content

PPTX
Cybercrime in Nigeria - Technology and Society
PPTX
Data breach
PPTX
PPT
Computer crime
PPTX
Cyber security
PPTX
Investigating & proving cybercrime
PPTX
Updated Cyber Security and Fraud Prevention Tools Tactics
PPTX
Cybercrime Awareness
Cybercrime in Nigeria - Technology and Society
Data breach
Computer crime
Cyber security
Investigating & proving cybercrime
Updated Cyber Security and Fraud Prevention Tools Tactics
Cybercrime Awareness

What's hot (20)

PDF
Protecting Yourself Against Mobile Phishing
PPT
Jitter Bugslec
PPTX
The disadvantages of ict
PPSX
Unit 2
PPTX
Rajveer choudhary cyber crime presentation
PPTX
Traditional problem associated with cyber crime
PPTX
Online privacy & security
PPTX
Cyber Crime
PPTX
Cyber security (2) (2)
PPTX
E commerce fraud chapter 17 B Ahmed
PPTX
PPTX
Disadvantages of-i ct-woww
PPTX
Cyber crime in india
PPTX
Computer Security and Ethics
PPTX
Mobile security
PPTX
Disadvantages of-i ct-woww
PDF
SOCIAL NETWORK SECURITY
PDF
Center for Identity Webcast: The Internet of Things
PPTX
Online Safety and Security
Protecting Yourself Against Mobile Phishing
Jitter Bugslec
The disadvantages of ict
Unit 2
Rajveer choudhary cyber crime presentation
Traditional problem associated with cyber crime
Online privacy & security
Cyber Crime
Cyber security (2) (2)
E commerce fraud chapter 17 B Ahmed
Disadvantages of-i ct-woww
Cyber crime in india
Computer Security and Ethics
Mobile security
Disadvantages of-i ct-woww
SOCIAL NETWORK SECURITY
Center for Identity Webcast: The Internet of Things
Online Safety and Security
Ad

Similar to Security Awareness Presentation Fall 2013 (20)

PPTX
Cyberattacks.pptx
PPSX
csa2014 IBC
PPTX
Info Session on Cybersecurity & Cybersecurity Study Jams
PPT
IT Security Awareness-v1.7.ppt
PDF
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
PPTX
Cyber Crime
PPTX
Cyber Security Motivation
PPTX
OSAC: Personal Digital Security Presentation
PPTX
Digital Security and Hygiene.pptx
DOCX
Cyber crime in pakistan by zubair
PDF
day-1-presentation-on-cyber-threats-by-anni-kumar.pptx.pdf
PDF
day-1-presentation-on-cyber-threats-by-anni-kumar.pptx.pdf
PPTX
[r]evolution Digital Literacy Workshop Slides
PPTX
10TH FEB CYBER SECURITY by C-DAC Noida.pptx
PPTX
Basic Cyber security presentation part 1
PPTX
Cyber Security Awareness Session for Executives and Non-IT professionals
PPTX
CCIAOR Cyber Security Forum
PPTX
1.2 Best Practices of Cyber Security sbk.pptx
PPTX
Impact-of-Cybercrime ppt presentation /cybercrime and digital hygine
PPTX
What is Cybercrime and How to Prevent Cybercrime?
Cyberattacks.pptx
csa2014 IBC
Info Session on Cybersecurity & Cybersecurity Study Jams
IT Security Awareness-v1.7.ppt
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
Cyber Crime
Cyber Security Motivation
OSAC: Personal Digital Security Presentation
Digital Security and Hygiene.pptx
Cyber crime in pakistan by zubair
day-1-presentation-on-cyber-threats-by-anni-kumar.pptx.pdf
day-1-presentation-on-cyber-threats-by-anni-kumar.pptx.pdf
[r]evolution Digital Literacy Workshop Slides
10TH FEB CYBER SECURITY by C-DAC Noida.pptx
Basic Cyber security presentation part 1
Cyber Security Awareness Session for Executives and Non-IT professionals
CCIAOR Cyber Security Forum
1.2 Best Practices of Cyber Security sbk.pptx
Impact-of-Cybercrime ppt presentation /cybercrime and digital hygine
What is Cybercrime and How to Prevent Cybercrime?
Ad

More from COCommunityCollegeSystem (20)

Recently uploaded (20)

PPTX
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PPTX
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
PPTX
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
PDF
Hazard Identification & Risk Assessment .pdf
PDF
LNK 2025 (2).pdf MWEHEHEHEHEHEHEHEHEHEHE
PDF
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PPTX
Unit 4 Skeletal System.ppt.pptxopresentatiom
PPTX
Introduction to Building Materials
PPTX
Cell Types and Its function , kingdom of life
PDF
LDMMIA Reiki Yoga Finals Review Spring Summer
PDF
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
PDF
Complications of Minimal Access Surgery at WLH
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PPTX
UV-Visible spectroscopy..pptx UV-Visible Spectroscopy – Electronic Transition...
PDF
Computing-Curriculum for Schools in Ghana
PDF
Paper A Mock Exam 9_ Attempt review.pdf.
PPTX
Radiologic_Anatomy_of_the_Brachial_plexus [final].pptx
PDF
Practical Manual AGRO-233 Principles and Practices of Natural Farming
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
Supply Chain Operations Speaking Notes -ICLT Program
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
Hazard Identification & Risk Assessment .pdf
LNK 2025 (2).pdf MWEHEHEHEHEHEHEHEHEHEHE
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
Unit 4 Skeletal System.ppt.pptxopresentatiom
Introduction to Building Materials
Cell Types and Its function , kingdom of life
LDMMIA Reiki Yoga Finals Review Spring Summer
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
Complications of Minimal Access Surgery at WLH
Final Presentation General Medicine 03-08-2024.pptx
UV-Visible spectroscopy..pptx UV-Visible Spectroscopy – Electronic Transition...
Computing-Curriculum for Schools in Ghana
Paper A Mock Exam 9_ Attempt review.pdf.
Radiologic_Anatomy_of_the_Brachial_plexus [final].pptx
Practical Manual AGRO-233 Principles and Practices of Natural Farming

Security Awareness Presentation Fall 2013

  • 1. 2013 Fall CCCS Security Awareness Why does Security Awareness apply to me?
  • 2. What is the Top Cause of Organizational Breaches? • • • • External hackers having fun? External organized crime mobs stealing data? Government sponsored hacking? Negligent Insiders?
  • 3. I’m an insider, why do I care? • Our customers expect and demand us to treat their Personal Private Information (PPI) with due care. • State law mandates that we do the right thing for our students. National law mandates that we take due care with Payment Card Industry (PCI) data. • Our brand name is build on our constant diligent care and ruined by one careless slip.
  • 4. Seven Mistakes we can’t make! • #1 – Choosing poor passwords. • #2 – Allowing sensitive data to be viewed by others. • #3 – Using unknown USB devices. • #4 – Clicking bad links in e-mail. • #5 – Loosing devices with sensitive data. • #6 – Using unknown Wi-Fi. • #7 – Misusing Social Media.
  • 5. Poor Passwords • In a large number of physical security audits passwords were found on and around end user workstations. • What to do? Write yourself a reminder of the password, not the password itself. Use a password schema and stick to it.
  • 6. Clear screen & clean desk • 71% of office workers say that they have been able to sneak a peek at a workstation in the workplace. • What to do? Lock your computer screen when you step out. Store hard copy Personal Private Information in a cabinet or file folder.
  • 7. Unknown USB devices • 35% of users have report having experienced malware or virus infection via a USB device. Attackers will leave infected devices in semipublic areas, sometimes with the company logo and then simply wait. • What to do? Only use USB devices that you own or trust. Ask IT to inspect any suspect USB devices.
  • 8. Phishing Attacks • CCCS and other educational organizations are often the target of sophisticated, custom targeted email phishing campaigns. While SPAM filters can help, the human element is critical to stop these attacks. • What to do? CCCS staff will never ask for Credentials via email. Any email asking for login info should be treated as bogus and discarded.
  • 9. Lost Devices • Almost 90% of people who find lost smartphones will look through the digital contents for sensitive information. Around 70% of users do not password protect their smartphones. • What to do? Password protect your smartphone. Notify IT as soon as possible if you should loose it.
  • 10. Using Unknown Wi-Fi • Less than 20% of users will use a VPN when accessing a public Wi-Fi (Wireless hotspot.) Rogue Wi-Fi “providers” can easily intercept sensitive data and compromise CCCS machines. • What to do? Always use the VPN when accessing offsite guest Wi-Fi services.
  • 11. Social Media • As social media norms are changing rapidly, more than 50% of enterprises have seen an increase of malware infections due to employee use of Social Media. Social media can also easily make public things that shouldn’t be disclosed. • What to do? Beware of viral videos that require you to install any application in order to view them. Be mindful of how others will view what you post online. It can be very easy for others to find you and misrepresent your posting.
  • 12. CCCS Security Defenses • • • • • Firewalls Malware prevention devices Intrusion detection devices Spam filters System & network vulnerability scanners • Most importantly – YOU! Educated end users are the most important part of a good security posture.
  • 13. Questions? • Comments? • Suggestions? • CCCS Security Contacts: cccs.edu/infosec 303-620-HELP (4357) CCCS-ITHelpDesk@cccs.edu