Careersource Suncoast Security Awareness Training
Careersource Suncoast Security Awareness Training
Never leave
fax machines
unattended
Dispose of
documents
properly
Course Objectives
By the end of this course you should be able to:
Explain the importance of security for yourself,
our workplace and the people we serve.
Be aware of the benefits of safely using the
internet, email, mobile devices and equipment.
Be familiar with how to protect yourself and
customer data from identity theft in the
workplace.
Recognize when to report security incidents.
Be able to locate policies and procedures to get
more information.
Client Information
Casual viewing of employee or customer data, even data
that is not confidential or otherwise exempt from disclosure
as a public record, constitutes misuse of access and is not
acceptable (i.e., viewing a family or friends case file that is
not assigned to you)
iLiveGr8!
Virus Protection
Your IT staff is responsible for making sure antivirus
software is loaded on each computer device in your office,
however :
By identifying and responding appropriately to potential
computer problems, you can protect yourself and your
organization against unauthorized access to information.
Spamming
Spam, is also known as unsolicited bulk e-mail messages or any email
messages irrespective of content that is unwanted or unrequested by the
recipient. Spam messages are mostly commercial advertising, although
chain letters, political mailings and other forms of non-commercial mailings
are often included under the same categorization. A large portion of spam
has also been found to be comprised of ads for products of dubious quality
and services of questionable legality.
There are two types of spam: intentional and unintentional.
Intentional spam comes from spammers who are soliciting products or
attempting to commit fraud.
Unintentional spam originates from computers that are infected with a
virus or worm that activates e-mail distribution processes in the background.
The virus or worm attempts to send bulk messages from the infected
computer without the awareness of the computer owner.
Phishing
Phishing is a special type of spam that is intended to trick you into entering
your personal or account information for the purpose of breaching your
account and committing identity theft or fraud.
Typically, a false e-mail message is delivered to you. The e-mail appears
to come from a legitimate source, for example eBay, your bank,
government departments etc. The message may contain a legitimate
corporation's logo, and appear to be sent from the corporation's e-mail
address. The message may ask you to click a link in the message to
update your account, or run a software program to upgrade your computer.
Although the message looks legitimate, it is really trying to compel you to
submit your personal and confidential information, which will be used to
steal your credentials. Normally you are asked to enter information such as
your name, date of birth, place of birth, social security number, mother's
maiden name, bank account number, and bank account PIN. Web sites
that are frequently spoofed by phishers include PayPal, eBay, MSN,
Yahoo, BestBuy, and America Online.
Spoofing
Spoofing is the forgery of an e-mail header so that the message appears to have
originated from someone or somewhere other than the actual source. Spoofing is
often used by spammers and can be accomplished by changing your "FROM" email address.
E-mail spoofing may occur in different forms, but all have a similar result: a user
receives email that appears to have originated from one source when it actually
was sent from another source. E-mail spoofing is often an attempt to trick the
user into making a damaging statement or releasing sensitive information, such
as a password. E-mail spammers often use spoofing in an attempt to get
recipients to open, and possibly even respond to, their solicitations.
To send spoofed e-mail, senders insert commands in headers that will alter
message information. It is possible to send a message that appears to be from
anyone, anywhere, saying whatever the sender wants it to say. Thus, someone
could send spoofed e-mail that appears to be from you with a message that you
didn't write.
Spam and phishing emails typically use such spoofing to mislead the recipient
about the origin of the message.
Incident Reporting
Physical Security
Being aware of your personal safety and surroundings is also
important in safeguarding CSS information and resources
Never let unescorted visitors follow you into a secured office. If the visitor is
uncooperative or threatening, initiate your security protocols. Make sure you
are up to date with CSS protocols in case of a threatening situation. Do not get
into a confrontation.
Do not prop open doors that should be locked.
To reduce the risk of loss and/or prevent identity theft, you should secure
valuables, such as purses and briefcases, in locked drawers or cabinets when
you are not in your office.
When in doubt about your safety or the security of information, ask for help.
Personal Safety
Physical Security and Safety
Keep all personal belongings in a secure place
Always park in designated areas
Be aware of your surroundings when entering and exiting buildings
Report all threatening phone calls to your supervisor
Report any suspicious incident(s) to your supervisor
Safety Tips
Post a list of emergency telephone numbers by your telephone
Pay attention to unexpected changes in your environment
If it is valuable to you - LOCK IT UP!
Lock your car with valuables hidden or locked in the trunk
Park in well lighted areas, if you are out at night
Get someone to walk you to your car at night
careersourcesuncoast.com