Audit Marketing Axe Finance

1 of
Published on Video
Go to video
Download PDF version
Download PDF version
Embed video
Share video
Ask about this video

Page 1 (0s)

[Virtual Presenter] Everything You Need to Know About Security ! Infrastructure & Cloud Department We are happy to have you on board Hi welcome to the Infrastructure and Cloud Department presentation. Today you will learn everything you need to know about security.

Page 2 (16s)

[Virtual Presenter] Good to know: Security is everyone’s responsibility ! This Infrastructure & Cloud Presentation has useful information on Security for Axe finance new joiners. The Infrastructure team is at your disposal to answer your questions and to respond to any other Infrastructure requests. This Infrastructure & Cloud Presentation has useful information on Security for Axe finance new joiners. The Infrastructure team is at your disposal to answer your questions.

Page 3 (45s)

[Audio] Agenda 1 Choosing good passwords 2 Safe Web browsing 3 Email Security 4 Mobile Devices 5 Physical Security 6 Social Engineering Let's move to the agenda: First of all we have choosing good passwords. Next we'll cover safe web browsing. Then we'll discuss email security. After that we'll talk about mobile devices. Following that we'll focus on physical security. And finally we'll wrap up with social engineering.

Page 4 (1m 16s)

[Audio] Let’s start with choosing a good password.

Page 5 (1m 23s)

[Audio] 1 Choosing good passwords 1/2 Use Strong Passwords Lengthy: At lest 8 more is better. Complex: Mix upper lower numbers and symbols Do not use common or predictable passwords: Examples of bad passwords: Your own birthday names your phone number. Change passwords periodically (Each 90 days) Keep your passwords secret: Do not share with others or write them down. Your password needs to be lengthy at least 8 characters and more is better. It should be complex containing a mix of uppercase and lowercase letters numbers and symbols. Avoid using common or predictable passwords. Change your passwords periodically ideally every 90 days and always keep your password secret..

Page 6 (2m 11s)

[Audio] 1 Choosing good passwords 1/2 Strategies for Creating Strong Passwords Avoiding common passwords Word combinations rather than single word Incorporating Acronyms or non-English language words Full sentence phrases Substitute letters with numbers or symbols Example: purp!3ClothingDiscOunt Example: P4sswords@reg00d!.

Page 7 (2m 37s)

[Audio] 2 Safe Web Browsing. 2- Safe Web Browsing.

Page 8 (2m 45s)

[Audio] 2 Safe Web Browsing 1/2 Before logging into or entering sensitive information into a website look for the security padlock symbol in the U-R-L bar. Double clicking the icon will display the certificate information for the page you are viewing to guarantee that you re as a safe secure website. The “https” is another indication that the page you are viewing is secure. Pay attention to the web address – if it has changed or doesn’t seem right it may be a fraudulent site..

Page 9 (3m 18s)

[Audio] 2 Safe Web Browsing 2/2 How to safely close Scareware Popups ? Never click on any of these buttons ! Hold the Alt plus F4 key & How to safely close Scareware Popups ? Hold the Alt plus F4 key Never click on any of these buttons !.

Page 10 (3m 36s)

[Audio] 3 Email Security Best Practices. 3- Email Security Best Practices.

Page 11 (3m 44s)

[Audio] 3 Email Security Best Practices 1/2 Don’t use your personal email account for work purposes. Do not open attachment in unfamiliar emails. Do not click on suspicious links. Use secure email encryption whenever sending any restricted or sensitive information. Carefully Inspect Emails Email Security Best Practices: Don’t use your personal email Do not open attachment in unfamiliar emails Do not click on suspicious links. Use secure email.

Page 12 (4m 16s)

[Audio] 3 Email Security Best Practices 3/3 Carefully Inspect Emails Carefully Inspect Emails.

Page 13 (4m 28s)

[Audio] 4 Mobile Devices. 4- Mobile Devices.

Page 14 (4m 36s)

[Audio] 4 Mobile Devices Protect your devices with a password/PIN (6 Digit recommended minimum). Device encryption Remote wipe GPS location physical security. Do not download apps from unknown sources. Read what others are saying about the app in the review section. Avoid using public Wi-Fi hotspots especially when access any password protected sites or where you will enter any personal or confidential information.

Page 16 (5m 12s)

[Audio] 5 Physical Security Question all Strangers. Alert security guards and/or management to suspicious individuals. Be sure authorized visitors/contractors have properly checked in. Make sure individuals use their own card keys when entering areas. Always lock your computer screen whenever leaving your computer unattended. Secure sensitive paper documents when leaving work areas unattended and at the end of the day. Understand and comply with your organization’s end-of-day closing procedures. Use secure shred bins for disposing of sensitive paper documents and electronic media.

Page 17 (5m 48s)

[Audio] 6 Social Engineer Email Phishing Example: A social engineer sends an email that appears to come from a fellow employee asking the recipient to download an attachment or click on link..

Page 18 (6m 1s)

[Audio] 7 Security Tips Follow a clean desk policy Be aware when creating or disposing paper documents. Consider carefully what information you put out there. Prevent unauthorized people accessing your company. Just because they know you doesn’t mean you know them! Phishing scams: Don’t bite. Prevent damage from malware..

Page 19 (6m 22s)

[Audio] Thank You Security is everyone’s responsibility ! Thanks for joining us today! If you have any questions feel free to ask. Have a great day!.