Top Banner
Welcome to New Hire Orientation Information Security
8

Welcome to New Hire Orientation Information Security

Feb 14, 2016

Download

Documents

zorion

Welcome to New Hire Orientation Information Security. Information Security Awareness Training. UMMS Information Security CWM Office of Compliance & Review. What is Information Security?. Info Sec is the protection of data in all forms. Electronic files Static files - PowerPoint PPT Presentation
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Welcome to  New Hire  Orientation Information Security

Welcome to New Hire Orientation

Information Security

Page 2: Welcome to  New Hire  Orientation Information Security

Confidential

Information Services

UMMS Information SecurityCWM Office of Compliance &

Review

Information Security Awareness Training

Page 3: Welcome to  New Hire  Orientation Information Security

Confidential

Information Services

What is Information Security?Info Sec is the protection of data in all forms• Electronic files • Static files • Database files

• Paper documents • Printed materials • Hand written notes • Photographs

• Recordings • Video recordings • Audio recordings

• Conversations • Telephone• Cell phone• Face to face

• Messages • Email• Fax• Video• Instant messages• Paper messages

Page 4: Welcome to  New Hire  Orientation Information Security

Confidential

Information Services

Why is this Important?• A data breach could result in:

– Requirement to report the loss• HIPAA, FERPA, MGL c.93H, PCI, SOX, others

– Civil and criminal penalties– Damage to organizational reputation– Loss of revenue– Individual accountability

Page 5: Welcome to  New Hire  Orientation Information Security

Confidential

Information Services

Isn’t this just a technical problem?• Technology defenses comprise roughly

15% of our controls• Technical controls often cannot

compensate for user’s behavior• Cyber-criminals focus on users as a weak

link in security• Having a security-aware workforce is a

requirement in today’s threat landscape

Page 6: Welcome to  New Hire  Orientation Information Security

Confidential

Information Services

What are the risks?Evolving “Threat Landscape”• Older attacks targeted infrastructure• Modern attacks target users

Nature of threat landscape• Over 90% of Cyber thieves are affiliated with organized

crime• Their sophistication rivals those of commercial software

vendorsMethods of infection• Cyber thieves attack high-volume web sites• Computers that visit the site become infected• Email-borne ‘malware’• Infected machine “phones home” to say I’m infected • Use the infected computer to strengthen their hold on the

organizationAmateurs target systems,

Professionals target users --Kevin Mitnick

Page 7: Welcome to  New Hire  Orientation Information Security

Confidential

Information Services

What can I do?

• Become aware of cyber threats• Understand that YOU are often the front

line of defense against cyber threats• Understand data sensitivity and how to

manage data appropriately• Safeguard information that is entrusted to

you• Report suspected InfoSec incidents

Page 8: Welcome to  New Hire  Orientation Information Security

Confidential

Information Services

Security Resources

• On-line security awareness course:http://onlinetraining.umassmed.edu/infosecreg/event/event_info.html

• UMMS IS Help Desk 508-856-8643

• CWM Office of Compliance and Review 508-856-6547