A digital training brought to you by RSAT Security in partnership with Supreme Technologies Group.
Digital Security Training A digital training brought to you by RSAT - - PowerPoint PPT Presentation
Digital Security Training A digital training brought to you by RSAT - - PowerPoint PPT Presentation
Digital Security Training A digital training brought to you by RSAT Security in partnership with Supreme Technologies Group. Topics Covered Week 5 Week 1 Social Media Introduction to Information Security Week 6 Week 2 Responsible
Topics Covered
Week 1
Introduction to Information Security
Week 2
Responsible Organizations Use of Information
Week 3
Data Leakage
Week 4
Responsible Use of the Internet
Week 5
Social Media
Week 6
Email and Website Best Practices
Week 7
Mobile Devices
Week 8
Clean Desk Principle
Re Responsible Organizations Use of Information
WEEK #2
Wha What is s Information? n?
- Information can be considered as data (both factual and numeric) that is
- rganized and imbued with meaning or as intelligence resulting from the
assembly, analysis, or summary of data into a meaningful form.
- The value of information is determined by its importance to the decision maker
- r to the outcome of the decision being made.
Th The Infor
- rmation
ion Lif ife Cycl cle
Wha What is s “I “Information n lifecycle”? ”?
- Information lifecycle is the effort to oversee
data, from creation through retirement, in
- rder to optimize its utility, security, lower
costs, as well as minimize the legal and compliance risks that may be introduced through that data.
Th The Information lifecycle
- Creation
- Storage
- Use
- Sharing – Next Week / Data leakage
- Archive
- Destruction – Next Week / Data leakage
Th The Information lifecycle - St Stor
- rage
Where is your data?
Th The Information lifecycle - St Stor
- rage
My files are “somewhere” on my computer (or network).
Th The Information lifecycle - St Stor
- rage
Last week conversation with a client:
Client: I have a very important presentation tomorrow and I cannot find my document. Me: Where was the file located? Client: On my laptop. Me: Where on your laptop? Client: Somewhere, I’m not sure. Me: Did you have a USB drive plugged in? Client: Oh…..yeah. I did. Me: Its probably on the USB drive. Therefore its not on your laptop. Go and find the drive.
Th The Information lifecycle - St Stor
- rage
You cannot protect or secure your data if you are not sure where it is located.
Da Data Storage – Be Best Practices
Da Data S a Storag age B Best P Pract actice ices
1) Start using a Cloud based data storage service. Online cloud storage services provide you the ability to “synchronize” your important local data files to storage systems
- ver the Internet. They provide backup against data loss as well
as having secure access to your data from a variety of locations.
Da Data S a Storag age B Best P Pract actice ices
The Top Cloud Based Storage services:
Da Data S a Storag age B Best P Pract actice ices
2) Have a backup of your data. Its easy! You should have multiple backups of your files. A backup will capture your files in “time” and will typically give you access to restore files from different periods of time. Our recommended backup software is in last weeks presentation.
Da Data S a Storag age B Best P Pract actice ices
3) Do not store your important data on USB flash drives! Have you ever misplaced your favorite pen? Its just that easy to misplace a USB drive. You are practically giving your data away.
Time for Q&A
rsatinfo@rsatsecurity.com (212) 634-7276 est. 702 www.rsatsecurity.com