Internet Security at Work Presentation

24
Internet Security at Work Protect company, customer, and employee data online Selva Redback Acaddemy

description

Internet Security at Work Presentation Template

Transcript of Internet Security at Work Presentation

Page 1: Internet Security at Work Presentation

Internet Security at WorkProtect company, customer, and employee data online

SelvaRedback Acaddemy

Page 2: Internet Security at Work Presentation

Small and midsize

businesses at risk online

Page 3: Internet Security at Work Presentation

1/3of businesses surveyed

experienced fraud

attempts online

Small and midsize

businesses at risk online

Page 4: Internet Security at Work Presentation

Five steps to stronger

cyber security

1 Strengthen your computer’s defenses

2 Avoid downloading malware

3 Protect company data & financial assets

4 Create strong passwords & keep them private

5 Guard data & devices when you’re on the go

Page 5: Internet Security at Work Presentation

Step 1Strengthen

your computer’s

defenses

Page 6: Internet Security at Work Presentation

Strengthen your

computer’s defenses

Keep the firewall on

Install legitimate antimalware software

Keep software up to date, automatically

Page 7: Internet Security at Work Presentation

Step 2Don’t be tricked

into downloading

malware

Page 8: Internet Security at Work Presentation

Don’t be tricked into

downloading malware

Think before you click

Confirm that the message is legitimate

Close pop-up messages carefully

Ctrl F4

Page 9: Internet Security at Work Presentation

Step 3Protect company

data and

financial assets

Page 10: Internet Security at Work Presentation

Protect company data

and financial assets

Handle sensitive data with special care

Beware of scams and fraud

Page 11: Internet Security at Work Presentation

Protect company data and financial assets

How to evade scams

Look for telltale signs

Think before you click

Keep sensitive information private

www.snopes.com

Page 12: Internet Security at Work Presentation

Step 4Create strong

passwords

Keep them private

Page 13: Internet Security at Work Presentation

Create strong passwords

Which passwords are strong?

WEAKSTRONG

Password106/04/79Advan!age0us!$wanR!ceRedD00r510152025MsAw3yO!D

SwanRiceRedDoorAdvantageous!My son Aiden was 3 years old in December

Page 14: Internet Security at Work Presentation

Create strong passwords

Keep them private

Make passwords strong

Keep them private

Use unique passwords

Page 15: Internet Security at Work Presentation

Step 5Guard data and

devices when

you’re on the go

Page 16: Internet Security at Work Presentation

Guard company data

when you’re on the go

Connect securely

Confirm the connection

Encrypt confidential data

Save sensitive activities for trusted connections

Flash drives: watch out for unknowns

HLTONHOTELS.NET

Page 17: Internet Security at Work Presentation

Step 1Strengthen

your computer’s

defenses

Page 18: Internet Security at Work Presentation

Step 2Don’t be tricked

into downloading

malware

Page 19: Internet Security at Work Presentation

Step 3Protect company

data and

financial assets

Page 20: Internet Security at Work Presentation

Step 4Create strong

passwords

Keep them private

Page 21: Internet Security at Work Presentation

Step 5Guard data and

devices when

you’re on the go

Page 22: Internet Security at Work Presentation

What to do if there are problems

Report abuse and other problems

Immediately report phishing

Immediately report missing devices

or theft of company data

Change all passwords

Wipe mobile phones

Page 23: Internet Security at Work Presentation

More helpful information

Learn how

Get the latest: microsoft.com/security

Comments? Questions?

Page 24: Internet Security at Work Presentation

Your gateway to the latest information from Microsoft about how to work more securely on the Internet and better protect

company, customer, and personal data: microsoft.com/security.

© 2012 Microsoft Corporation. All rights reserved.