Professional Documents
Culture Documents
Secuty Important
Secuty Important
Secuty Important
4
Cyber Security and Privacy Starts
and Ends with Us!
Security Tips
5
Information Stewardship
6
Cyber Security Defined
7
Privacy Defined
8
The CIA and N
9
Sensitive Data
10
Tips to Help Protect PII
• Minimize PII
• Secure PII
• Safeguard the Transfer
of PII
• Dispose of PII Properly
11
Prevent Spillage
12
If You Suspect a PII Breach
13
Threats and Vulnerabilities
14
Securing the Department
16
Secure Passwords
Do Don’t
• Use a combination of: • Use personal
lower and upper case information
letters, numbers, and, • Dictionary words
special characters (including foreign
• Change it every 90 languages)
days • Write it down
• Create a complex, • Share it with anyone
strong password, and
protect its secrecy
17
Protect Your Facility
18
Situational Awareness
19
Social Engineering
20
Social Engineering
Do Don’t
• Document the • Participate in
situation—verify the
surveys
caller identity, obtain
as much information • Share personal
as possible, if Caller ID information
is available, write
down the caller's • Give out
telephone number, computer
take detailed notes of systems or
the conversation network
• Contact your ISSO information
21
Mobile Computing
22
Report Suspicious Computer
Problems
If your system acts
unusual!
Report immediately to
your ISSO or EDCIRC!
24
Congratulations!
You have completed New Employee
Introduction to Security and Privacy
Privacy
this is to certify that
completion date
26