2. Agenda What is Secure Computing? This Means YOU! Common Security Threats Best Secure Computing Practices Summary and Action Items 2
3. What is Secure Computing? Core Principles of Security Confidentiality Integrity Availability Authenticity 3
4. Security is Everyone’s Responsibility. Assess and Manage Risks- Management, Information Security team, and YOU Policies and Procedures- Management, Information Security Team, and YOU Deploy Controls- Information Security Team 4
5. 5 So, why is Security Everyone’sResponsibility? The Bad News?: “Approximately 40% of all security breaches are due to human error” The Good News?: Wecanbetrained! This number is down from 63% in 2006 and 59% in 2008
6. Topics Covered in Training: SPAM What is Phishing? Definition and Examples What Can Happen? Viruses, Worms, and Trojan Horses Spyware Definition and Examples What can YOU do? Desktop Security Best Practices Security at Home Best Practices Security at Home- Social Networking Mobile Security Security While Traveling Best Practices 6