A digital training brought to you by RSAT Security in partnership with Supreme Technologies Group.
Digit Digital al Se Security y Training Be Best Practices A - - PowerPoint PPT Presentation
Digit Digital al Se Security y Training Be Best Practices A - - PowerPoint PPT Presentation
Digit Digital al Se Security y Training Be Best Practices A digital training brought to you by RSAT Security in partnership with Supreme Technologies Group. Topics Covered Week 5 Week 1 Social Media Introduction to Information Security
Topics Covered
Week 1
Introduction to Information Security
Week 2
Responsible Organizations Use of Information
Week 3
Data Leakage & How to prevent it
Week 4
Responsible Use of the Internet – Protecting your identity
Week 5
Social Media
Week 6
Email and Website Best Practices
Week 7
Mobile Devices
Week 8
Clean Desk Principle
Re Responsible Use of the Internet – Pr Protecting your identity
WEEK #4
Wh What do we me mean by “responsible us use”?
“Responsible Use of the Internet” means, using the Internet in a manner that protects the identity of yourself and others as well as your values and the overall organization.
Re Responsible Us Use of
- f the Internet
Protecting your Identity
Re Responsible Us Use of
- f the Internet
Pr Protecting your identity
“Up to 9 million Americans have their identities stolen each year according to the FTC, and at least 534 million personal records have been compromised since 2005 through attacks on the databases of businesses, government bodies, institutions, and organizations.”
Pr Protecting your identity
Protect your computer and smartphone
with strong, up-to-date security software. If your computer or phone is infected with malicious software, other safeguards are of little help because you’ve given the criminals the key to all your online actions. Also be sure that any operating system updates are installed.
Pr Protecting your identity
Learn to spot spam and scams.
Though some phishing scams are easy to identify, other phishing attempts in an email, IM, on social networking sites, or websites can look very legitimate. The only way to never fall for phishing scam is to never click on a link that has been sent to you.
Pr Protecting your identity
Monitor your credit scores.
By law you have the right to three free credit reports per year; from Experian, Transunion, and Equifax. These three credit bureaus work together through a website called AnnualCreditReport.com so you can quest all three reports at once.
Pr Protecting your identity
Identity Theft Monitoring & Alerts
Seriously consider subscribing to an identity theft monitoring
- service. Receive ongoing identity theft monitoring, proactive alert,
dark web surveillance and credit protection.
Pr Protecting your identity
Identity Theft Monitoring Services
Pr Protecting your identity
What is the Dark Web?
The dark web is a part of the internet that isn't indexed by search engines. You can buy credit card numbers, all manner of drugs, guns, counterfeit money, stolen subscription credentials, hacked Netflix accounts and software that helps you break into other people’s computers.
“Thankfully, no passwords were available, but the data included email addresses, names, Facebook IDs, dates of birth and phone
- numbers. All of which is a perfect set of data
with which to craft a text or email phishing campaign on behalf of Facebook. And if a small percentage of users click the link and enter their details into a spoofed Facebook login page, much more valuable data can be stolen.”
Time for Q&A
rsatinfo@rsatsecurity.com (212) 634-7276 est. 702 www.rsatsecurity.com