Service Desk - Security
Chris Prewitt
Service Desk – Why is it a threat?
Attacking the Service Desk
Security and the Service Desk
Responsibility
6
Security is everyone’s concern
The key to Security Awareness is found in the word itself:
“Security… a team effort, but an individual responsibility”
SEC- -Y
Employee Responsibility
7
The OPM hack, the RSA hack, and many others were initiated by an
employee making 2 mistakes. First, clicking a link that led to malware.
Second, not reporting it immediately when something weird happened.
What can you do to help your company?
Be aware; see something, say something
*Malware is software that is intended to damage or disable computers and computer systems
Most Common Passwords (2017)
1. 123456 (Unchanged)
2. Password (Unchanged)
3. 12345678 (Up 1)
4. qwerty (Up 2)
5. 12345 (Down 2)
6. 123456789 (New)
7. letmein (New)
8. 1234567 (Unchanged)
9. football (Down 4)
10.iloveyou (New)
11.admin (Up 4)
12.welcome (Unchanged)
13.monkey (New)
8
14. login (Down 3)
15. abc123 (Down 1)
16. starwars (New)
17. 123123 (New)
18. dragon (Up 1)
19. passw0rd (Down 1)
20. master (Up 1)
21. hello (New)
22. freedom (New)
23. whatever (New)
24. qazwsx (New)
25. trustno1 (New)
The password policy within Active
Directory enforces password length,
complexity, and history. This does not in
any way control what the password is, just
how long it is and what characters are
inside of it.
Many people will use easily guessable
passwords like Winter2017 or
Password!@# because they technically
meet the standards but are easy for them
to remember.
Is Your Password Secure?
Ensure that your password:
 Is a minimum of 8 characters
 Is comprised of at least 3 of the following:
• uppercase letter (A, B, C..)
• lowercase letter (a, b, c…)
• numeric (1, 2, 3…)
• special character (#, $,*…)
 Has no sequentially repeated characters
 Rotate password every 90 days
 Is not a dictionary word
 Create or Use a passphrase
 Is never shared and (never written down)
9
Sensitive Data Types
• Employee Data
• Names, addresses, national ID or social security numbers
• Employee Medical Information
• Insurance, accidents
• Financial Information/Payment Card
• Credit Card information: internal and customer
• Bank routing numbers
• Consumer/Customer Information
• Names, email addresses, login, passwords
• Intellectual Property
• Machine drawings, assembly instructions, chemical formulations, recipe
• Source code, what’s your companies secret sauce?
10
How information is stored, transferred
• Email
• Corporate file transfer tools
• File Servers
• Online personal storage
• Dropbox, Google Drive, OneDrive, Box.com, etc.
• Password protected files (Office, Zip)
• USB
11
Risks
Acceptable Use Policy - Email & Internet
Limited personal use is permissible under most policies. However…
 Using company networks to access
pornography or gambling sites is strictly
prohibited.
 These tools are to help your productivity –
not interfere with your job performance.
 Do not use e-mail to distribute files that are
obscene, pornographic, threatening, or harassing.
 Do not open attachments or links in unknown or
suspicious email.
 Using company resources to establish or maintain your own
personal business should be strictly prohibited.
13
Data Leakage
14
Data Leakage is the unauthorized transmission of data (or information) from within an
organization to an external destination or recipient. This may be electronic, or may be via a
physical method.
Be mindful that unauthorized leakage does not automatically mean intentional or malicious.
Unintentional or inadvertent data leakage is also unauthorized.
Examples
Sharing confidential or restricted documents with anyone that shouldn’t see them.
Storing confidential or restricted documents on non-Lincoln Electric assets, such as Dropbox,
your home computer.
Transferring confidential or restricted documents using your personal email or other methods.
Social Engineering
 Watch out for phishing attempts through email trying to trick you into
providing sensitive information over the internet.
 Protect against “dumpster diving” - dispose of sensitive information
properly (e.g., appropriately shredding sensitive paper documents).
Social Engineering occurs when techniques
such as trickery and manipulation are used to
deceive associates into providing useful
Company or personal information. This
information can be used to gain unauthorized
access to company’s most sensitive
information assets. Here are some tips:
 Never give out sensitive Company
information or your personal
information over the phone, internet, e-
mail, etc.
15
Phishing
16
Phishing email messages, websites, and phone calls are designed to steal
information or money. Cybercriminals can do this by installing malware or
malicious software on your computer.
Cybercriminals also use social engineering to convince you to install
malware or hand over personal information under false pretenses. You
could be sent an email, at work or home, they could call you on the phone,
or you may even see a popup asking you to download and run software.
Phishing Phone Calls
17
Treat all unsolicited phone calls with
skepticism. Do not provide any
personal information of yourself or co-
workers.
Cybercriminals might call you on the phone and offer to help solve your computer
problems or sell you a software license. Neither Microsoft nor other partners make
unsolicited phone calls (also known as cold calls) to charge you for computer security or
software fixes.
Physical Loss
Before After
18
What is the real cost of a lost
laptop, tablet or smart phone?
• How much private
information could be stolen?
• How many trade secrets?
• How much will you have to
spend to restore your
customers' privacy? Not to
mention their trust - or your
reputation?
Response
Service Desk Responsibility
Do you know who to call?
Do you know what to do?
What tools do you have?
What is your responsibility?
Why should the Service Desk care about Security?
1. Everyone’s Responsible for Security
2. Service Desks Are the Eyes and Ears of IT
3. Service Desks Can Communicate Information
Security Messages to Users
4. Service Desks Have a Major Role to Play in
Security Incident Management
5. Service Desk Staff Are Role Models

More Related Content

PPTX
Cyber Security Awareness Session for Executives and Non-IT professionals
PPTX
Cyber Security Update: How to Train Your Employees to Prevent Data Breaches
PPTX
Hyphenet Security Awareness Training
PPT
Ia 124 1621324160 ia_124_lecture_02
PPT
Safety And Security Of Data Student Work
PPTX
Information security
PPTX
Cyber 101 for smb execs v1
PPTX
Data breach
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Update: How to Train Your Employees to Prevent Data Breaches
Hyphenet Security Awareness Training
Ia 124 1621324160 ia_124_lecture_02
Safety And Security Of Data Student Work
Information security
Cyber 101 for smb execs v1
Data breach

What's hot (20)

PPTX
Hacking
PPT
Module 3 social engineering-b
PPTX
Hacking (cs192 report )
PDF
The History of Hacking in 5minutes (for dummie)
PPT
Cybersecurity
PPTX
Hacking ppt
PPT
TYPES OF HACKING
PPTX
Internet security
PPTX
Hacking Vs Cracking in Computer Networks
PPTX
Hacking
PPTX
Cybersecurity for the non-technical
PPT
All about Hacking
PDF
Cybersecurity: What the GC and CEO Need to Know
PPT
9 ethics in it space
PPTX
Eset cybersecurity awareness (laxman giri)
PPT
Rothke Sia 2006
PPT
UW School of Medicine Social Engineering and Phishing Awareness
PPTX
Is hacking good or bad
PPTX
Ict lec#9
PPT
Internet safety v 4 slides and notes
Hacking
Module 3 social engineering-b
Hacking (cs192 report )
The History of Hacking in 5minutes (for dummie)
Cybersecurity
Hacking ppt
TYPES OF HACKING
Internet security
Hacking Vs Cracking in Computer Networks
Hacking
Cybersecurity for the non-technical
All about Hacking
Cybersecurity: What the GC and CEO Need to Know
9 ethics in it space
Eset cybersecurity awareness (laxman giri)
Rothke Sia 2006
UW School of Medicine Social Engineering and Phishing Awareness
Is hacking good or bad
Ict lec#9
Internet safety v 4 slides and notes
Ad

Similar to Security and the Service Desk (20)

PPT
Employee Security Training[1]@
PPT
Social Engineering: Protecting Yourself on the Campus Network
PPTX
Security Awareness 101
PPTX
Information Security Awareness Training Open
PDF
Introduction to information security
PPTX
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
PPT
DNR-Security-Awareness-Training expert.ppt
PPTX
Cyber security - Trend Micro
PDF
Customer information security awareness training
PDF
Information Security Awareness Training
PDF
Free_business_IT_security_policy_template_v5.pdf
PPT
Cyber Security Awareness Training by Win-Pro
PDF
iSchoolConnect_Information Security User Awareness Training_16th Nov 2021.ppt...
PPTX
TheCyberThreatAndYou2_deck.pptx
PPTX
Awareness Security 123.pptx
PPTX
USG_Security_Awareness_Primer (1).pptx
PPTX
USG_Security_Awareness_Primer.pptx
PPTX
USG_Security_Awareness_Primer.pptx
PDF
Security awareness-checklist 2019
PPTX
Security_Awareness_Primer.pptx
Employee Security Training[1]@
Social Engineering: Protecting Yourself on the Campus Network
Security Awareness 101
Information Security Awareness Training Open
Introduction to information security
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
DNR-Security-Awareness-Training expert.ppt
Cyber security - Trend Micro
Customer information security awareness training
Information Security Awareness Training
Free_business_IT_security_policy_template_v5.pdf
Cyber Security Awareness Training by Win-Pro
iSchoolConnect_Information Security User Awareness Training_16th Nov 2021.ppt...
TheCyberThreatAndYou2_deck.pptx
Awareness Security 123.pptx
USG_Security_Awareness_Primer (1).pptx
USG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptx
Security awareness-checklist 2019
Security_Awareness_Primer.pptx
Ad

More from NorthCoastHDI (10)

PDF
Is AI the Future of IT Operations?
PDF
Major Incident Management
PPTX
WiFi 101
PDF
Shift Left Strategy
PDF
Proactive Project Management w/Machine Learning
PDF
Learn More about HDI
PDF
Good Practice Discussion - itSMF
PDF
Continuous Service Improvement (CSI)
PPT
The Future of Desktop Support - HDI Northcoast Chapter
PPT
NorthCoast HDI September 2014
Is AI the Future of IT Operations?
Major Incident Management
WiFi 101
Shift Left Strategy
Proactive Project Management w/Machine Learning
Learn More about HDI
Good Practice Discussion - itSMF
Continuous Service Improvement (CSI)
The Future of Desktop Support - HDI Northcoast Chapter
NorthCoast HDI September 2014

Recently uploaded (20)

PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
PDF
sustainability-14-14877-v2.pddhzftheheeeee
PPT
What is a Computer? Input Devices /output devices
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
DOCX
search engine optimization ppt fir known well about this
PDF
Enhancing emotion recognition model for a student engagement use case through...
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PDF
August Patch Tuesday
PDF
CloudStack 4.21: First Look Webinar slides
PPT
Module 1.ppt Iot fundamentals and Architecture
PPTX
Chapter 5: Probability Theory and Statistics
PPT
Geologic Time for studying geology for geologist
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PPTX
Tartificialntelligence_presentation.pptx
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
PDF
STKI Israel Market Study 2025 version august
PDF
Developing a website for English-speaking practice to English as a foreign la...
A contest of sentiment analysis: k-nearest neighbor versus neural network
sustainability-14-14877-v2.pddhzftheheeeee
What is a Computer? Input Devices /output devices
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
search engine optimization ppt fir known well about this
Enhancing emotion recognition model for a student engagement use case through...
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
August Patch Tuesday
CloudStack 4.21: First Look Webinar slides
Module 1.ppt Iot fundamentals and Architecture
Chapter 5: Probability Theory and Statistics
Geologic Time for studying geology for geologist
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
Tartificialntelligence_presentation.pptx
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
Final SEM Unit 1 for mit wpu at pune .pptx
Assigned Numbers - 2025 - Bluetooth® Document
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
STKI Israel Market Study 2025 version august
Developing a website for English-speaking practice to English as a foreign la...

Security and the Service Desk

  • 1. Service Desk - Security Chris Prewitt
  • 2. Service Desk – Why is it a threat?
  • 6. 6 Security is everyone’s concern The key to Security Awareness is found in the word itself: “Security… a team effort, but an individual responsibility” SEC- -Y
  • 7. Employee Responsibility 7 The OPM hack, the RSA hack, and many others were initiated by an employee making 2 mistakes. First, clicking a link that led to malware. Second, not reporting it immediately when something weird happened. What can you do to help your company? Be aware; see something, say something *Malware is software that is intended to damage or disable computers and computer systems
  • 8. Most Common Passwords (2017) 1. 123456 (Unchanged) 2. Password (Unchanged) 3. 12345678 (Up 1) 4. qwerty (Up 2) 5. 12345 (Down 2) 6. 123456789 (New) 7. letmein (New) 8. 1234567 (Unchanged) 9. football (Down 4) 10.iloveyou (New) 11.admin (Up 4) 12.welcome (Unchanged) 13.monkey (New) 8 14. login (Down 3) 15. abc123 (Down 1) 16. starwars (New) 17. 123123 (New) 18. dragon (Up 1) 19. passw0rd (Down 1) 20. master (Up 1) 21. hello (New) 22. freedom (New) 23. whatever (New) 24. qazwsx (New) 25. trustno1 (New) The password policy within Active Directory enforces password length, complexity, and history. This does not in any way control what the password is, just how long it is and what characters are inside of it. Many people will use easily guessable passwords like Winter2017 or Password!@# because they technically meet the standards but are easy for them to remember.
  • 9. Is Your Password Secure? Ensure that your password:  Is a minimum of 8 characters  Is comprised of at least 3 of the following: • uppercase letter (A, B, C..) • lowercase letter (a, b, c…) • numeric (1, 2, 3…) • special character (#, $,*…)  Has no sequentially repeated characters  Rotate password every 90 days  Is not a dictionary word  Create or Use a passphrase  Is never shared and (never written down) 9
  • 10. Sensitive Data Types • Employee Data • Names, addresses, national ID or social security numbers • Employee Medical Information • Insurance, accidents • Financial Information/Payment Card • Credit Card information: internal and customer • Bank routing numbers • Consumer/Customer Information • Names, email addresses, login, passwords • Intellectual Property • Machine drawings, assembly instructions, chemical formulations, recipe • Source code, what’s your companies secret sauce? 10
  • 11. How information is stored, transferred • Email • Corporate file transfer tools • File Servers • Online personal storage • Dropbox, Google Drive, OneDrive, Box.com, etc. • Password protected files (Office, Zip) • USB 11
  • 12. Risks
  • 13. Acceptable Use Policy - Email & Internet Limited personal use is permissible under most policies. However…  Using company networks to access pornography or gambling sites is strictly prohibited.  These tools are to help your productivity – not interfere with your job performance.  Do not use e-mail to distribute files that are obscene, pornographic, threatening, or harassing.  Do not open attachments or links in unknown or suspicious email.  Using company resources to establish or maintain your own personal business should be strictly prohibited. 13
  • 14. Data Leakage 14 Data Leakage is the unauthorized transmission of data (or information) from within an organization to an external destination or recipient. This may be electronic, or may be via a physical method. Be mindful that unauthorized leakage does not automatically mean intentional or malicious. Unintentional or inadvertent data leakage is also unauthorized. Examples Sharing confidential or restricted documents with anyone that shouldn’t see them. Storing confidential or restricted documents on non-Lincoln Electric assets, such as Dropbox, your home computer. Transferring confidential or restricted documents using your personal email or other methods.
  • 15. Social Engineering  Watch out for phishing attempts through email trying to trick you into providing sensitive information over the internet.  Protect against “dumpster diving” - dispose of sensitive information properly (e.g., appropriately shredding sensitive paper documents). Social Engineering occurs when techniques such as trickery and manipulation are used to deceive associates into providing useful Company or personal information. This information can be used to gain unauthorized access to company’s most sensitive information assets. Here are some tips:  Never give out sensitive Company information or your personal information over the phone, internet, e- mail, etc. 15
  • 16. Phishing 16 Phishing email messages, websites, and phone calls are designed to steal information or money. Cybercriminals can do this by installing malware or malicious software on your computer. Cybercriminals also use social engineering to convince you to install malware or hand over personal information under false pretenses. You could be sent an email, at work or home, they could call you on the phone, or you may even see a popup asking you to download and run software.
  • 17. Phishing Phone Calls 17 Treat all unsolicited phone calls with skepticism. Do not provide any personal information of yourself or co- workers. Cybercriminals might call you on the phone and offer to help solve your computer problems or sell you a software license. Neither Microsoft nor other partners make unsolicited phone calls (also known as cold calls) to charge you for computer security or software fixes.
  • 18. Physical Loss Before After 18 What is the real cost of a lost laptop, tablet or smart phone? • How much private information could be stolen? • How many trade secrets? • How much will you have to spend to restore your customers' privacy? Not to mention their trust - or your reputation?
  • 20. Service Desk Responsibility Do you know who to call? Do you know what to do? What tools do you have? What is your responsibility? Why should the Service Desk care about Security? 1. Everyone’s Responsible for Security 2. Service Desks Are the Eyes and Ears of IT 3. Service Desks Can Communicate Information Security Messages to Users 4. Service Desks Have a Major Role to Play in Security Incident Management 5. Service Desk Staff Are Role Models