Biography

Post on 19-Jan-2016

32 Views

Category:

Documents

2 Downloads

Preview:

Click to see full reader

DESCRIPTION

Protecting Your Identity: Information Security Basics Presented by:Barbara D. Kissner SVP & CIO International Fidelity Insurance Company March 18, 2014. Biography. Barbara Kissner International Fidelity Insurance Company Senior Vice President, Chief Information Officer - PowerPoint PPT Presentation

Transcript

1

Protecting Your Identity:Information Security Basics Presented by: Barbara D. Kissner

SVP & CIOInternational Fidelity Insurance Company

March 18, 2014

3/18/2014

2

BiographyBarbara KissnerInternational Fidelity Insurance CompanySenior Vice President, Chief Information Officer Barbara Kissner joined International Fidelity Insurance Company in 2007 as SVP and Chief Information Officer. Her responsibilities include management of the company’s telecommunications, IT and Licensing departments as well as overseeing the company’s Disaster Recovery plan and IFIC’s Regulatory Committee.

Prior to joining IFIC, Barbara served as the Chief Information Security Officer for BankAtlantic in Fort Lauderdale, FL, and Senior Vice President of Global IT Risk Management for The CIT Group. Barbara has authored many published articles on subjects ranging from e-commerce to information engineering and holds the CISA, CSTE, CSQA, CGEIT and CRISC designations. This year, she has been named one of Computerworld’s Premier 100 IT Honorees for 2014.

3/18/2014

3

AgendaSecurity Awareness Requests for confidential informationUnexpected email and attachmentsSPAMInternet safetyPhishing attemptsProtecting your laptop and yourself Q&A

3/18/2014

4

What is Security Awareness?

… it is the knowledge and attitude members of an organization possess regarding the protection of the physical and, especially, information assets of that

organization. (Wikipedia)

3/18/2014

5

Requests for Confidential InformationDo not provide confidential information to unknown sources

This is especially true for unsolicited email and telephone callsVerify who is asking before you respondSpoofers use professional sounding names and organizations

to get you to reveal informationLegitimate companies do not ask you to “verify” SSN, PIN, date

of birth, account number through email

3/18/2014

6

Unexpected Email AttachmentsIf you receive email from an unknown source, don’t open itNever open or forward unexpected attachmentsDo not respond to SPAM email

No, you did not win that free trip Those guys are not really going to put $30 million in your bank

accountDo not open or forward chain lettersDo not “unsubscribe” from an unknown email list or SPAM:

To unsubscribe from this mailing list: click here or send a blank message to: TopNotchRewards.o-9c93cbb-4c9.xx.xx.com.-bkissner@07.mailmx01.com

3/18/2014

7

Spam

3/18/2014

8

More Spam

3/18/2014

9

And More, Dangerous Spam

3/18/2014

10

Internet SafetyFirewalls are a must, even for MacsBuy AntiVirus and AntiSpyware and install them on every

computer in your homeWireless Networks

Turn off SSID broadcasting – this tells everyone in the neighborhood who you are

Change the installation passwords – everyone knows themEnable WPA encryptionKnow the names of the machines on your network and

regularly look for intruders

3/18/2014

113/18/2014

Look For Security Features

LOCKHTTPS

Windows Explorer

12

Other Browsers

3/18/2014

Google Chrome

Firefox

Safari

13

Social WebsitesPopular social sites include Facebook, LinkedIn, Pinterest,

Instagram

Anything you post can be discovered

Prospective employers, universities and corrections agencies regularly scan these sites

Remember, even if you delete your entries or responses, someone already has a copy

3/18/2014

14

Phishing – Part 1

3/18/2014

15

Phishing – Part 2

3/18/2014

16

Protect Your Laptops and Phones

3/18/2014

Store in secure place when you leave your office

Keep out of view when stored in your car

Don’t leave unattended in public places

Be especially careful in airports and train stations

Watch out for Spam text messages on cell phones

Be wary of strangers asking to borrow your phone

In ConclusionYou can protect personal information and your Identity

Don’t respond to Spam email

Use firewalls, AntiVirus, AntiSpyware at home

Look for security features like HTTPS and the

Use caution when asked for sensitive information

Keep track of your personal articles, including cell phones and laptops

If something doesn’t look right, it probably isn’t!

18

Questions?

3/18/2014

Barbara D. KissnerInternational Fidelity Insurance Company

bkissner@ific.com

973/624 7200 x259

top related