A digital training brought to you by RSAT Security in partnership with Supreme Technologies Group.
Be Best Practices
Digit Digital al Se Security y Training Topics Covered Week 5 - - PowerPoint PPT Presentation
Be Best Practices A digital training brought to you by RSAT Security in partnership with Supreme Technologies Group. Digit Digital al Se Security y Training Topics Covered Week 5 Week 1 Social Media Introduction to Information Security
A digital training brought to you by RSAT Security in partnership with Supreme Technologies Group.
Be Best Practices
Week 1
Introduction to Information Security
Week 2
Responsible Organizations Use of Information
Week 3
Data Leakage & How to prevent it
Week 4
Responsible Use of the Internet – Protecting your identity
Week 5
Social Media
Week 6
Email Security
Week 7
Mobile Device Security
Week 8
Clean Desk Policy - Recap
WEEK #8
What is a Clean Desk Policy?
A clean desk policy ensures that all important documents, confidential letters, binders, books, etc are removed from a desk and locked away when the items are not in use or an employee leaves his/her workstation. It is one of the top strategies to utilize when trying to reduce the risk of security breaches. Having a clean desk helps to not only eliminate clutter, but also helps prevent the likelihood that anyone can gain access to your company’s information or the information
What is a Clean Desk Policy?
So what are we saying? Basically, the Clean Desk Policy is all about being aware of your valuable information and the Threats to it!
Ex Externa nal thr threats ts to your ur Informa mati tion
Four of the biggest external threats to our organizations today are:
Social Engineering Phishing Ransomware Unsecure Wifi
trust, such as:
then direct you to a website that looks just like the real website, but whose sole purpose is to steal information.
https://www.youtube.com/watch?v=PWVN3Rq4gzw
try to trick you into giving out sensitive information rather than breaking into your computer.
the purpose of getting access to your private information. They typically do the following:
Most likely you are using some form of Microsoft software). They attempt to win your trust by either frightening you then letting you know that they can protect you. For example, they claim that they received a message that your computer is compromised, and they have to login to your system to fix it.
to pay them to remove the virus. If you decline to pay, they will attempt to activate the virus that they installed on your computer out of vengeance to destroy your computer.
(malicious software) which criminals use to extort money. It holds data to ransom using encryption or by locking users out of their device.
through a link in a malicious email. When the user clicks the link, the ransomware is downloaded to the user’s computer, smartphone or other device. Ransomware may spread through connected networks.
https://www.youtube.com/watch?v=VX59Gf-Twwo
WEEK #8
Unsecured WiFi A major risk of connecting to an unsecured Wi-Fi connection comes from using services that require login information. Data transmitted over unsecured Wi-Fi can be intercepted by third
and passwords from this intercepted data and use it to fraudulently access your services.
Unsecured WiFi There is just 1 solution to the threats of using unsecured wireless networks……Don’t use them. Just turn on your hotspot feature on your cell phone and use that as your WiFi if needed.
https://www.youtube.com/watch?v=lFo49yL06Qg
Three of the top recommended password managers (Specifications are on the cheat sheet):
rsatinfo@rsatsecurity.com (212) 634-7276 est. 702 www.rsatsecurity.com
For additional support for your organization, please email us at rsatinfo@rsatsecurity.com