it security training
DESCRIPTION
TRANSCRIPT
![Page 1: It security training](https://reader033.vdocuments.us/reader033/viewer/2022061218/54b5ebe04a79591a7f8b47b1/html5/thumbnails/1.jpg)
IT Security Awareness Training
MCN IT Support
![Page 2: It security training](https://reader033.vdocuments.us/reader033/viewer/2022061218/54b5ebe04a79591a7f8b47b1/html5/thumbnails/2.jpg)
IT Computer Security Practices
End-User Password Management
Malicious Code Prevention
Safe & Secure Internet Surfing
Client level Data Protection /
Backup
Email Data Security
Patch Up gradation / Distribution1
![Page 3: It security training](https://reader033.vdocuments.us/reader033/viewer/2022061218/54b5ebe04a79591a7f8b47b1/html5/thumbnails/3.jpg)
Password Management Policies
Complexity requirements are enforced
when passwords are created or changed
Keep your password private
- Do not post / share / write1
![Page 4: It security training](https://reader033.vdocuments.us/reader033/viewer/2022061218/54b5ebe04a79591a7f8b47b1/html5/thumbnails/4.jpg)
Anti Malware Protection
Trend Micro Anti Virus Solutions
Automated virus definition update / scan
Frequent Manual Scan -Advisable 1
![Page 5: It security training](https://reader033.vdocuments.us/reader033/viewer/2022061218/54b5ebe04a79591a7f8b47b1/html5/thumbnails/5.jpg)
Web-Content Filtering
1
Web Traffic— customers, partners, employees
Email Traffic
Applications/Web Services Traffic partners, customers, internal
VPN Trafficremote and mobile users
Internal security threatContractors/disgruntled employees
![Page 6: It security training](https://reader033.vdocuments.us/reader033/viewer/2022061218/54b5ebe04a79591a7f8b47b1/html5/thumbnails/6.jpg)
Data Protection / Backup Methodologies
Data Encryption
- Protects from unauthorized
access when laptops are lost
or stolen
Data Backup
All Network Shared Drives are
backup on schedule basis with
two levels
1
![Page 7: It security training](https://reader033.vdocuments.us/reader033/viewer/2022061218/54b5ebe04a79591a7f8b47b1/html5/thumbnails/7.jpg)
Email Data Security
Lotus Notes 8.5.3
Provide database encryption with the use
of Public Key Cryptography.
Certificate based authentication which
prevents unauthorized access of email DB 1
![Page 8: It security training](https://reader033.vdocuments.us/reader033/viewer/2022061218/54b5ebe04a79591a7f8b47b1/html5/thumbnails/8.jpg)
Patch Up gradation / Distribution
Windows Server Update Services 3.0.2
SP2
Deploy the latest Microsoft product updates
to computers that ensure the systems are
up-to date
Centralize / Automated Distribution
Mechanism
1
![Page 9: It security training](https://reader033.vdocuments.us/reader033/viewer/2022061218/54b5ebe04a79591a7f8b47b1/html5/thumbnails/9.jpg)
IT Security Guidance For Employees
Protect computer hardware from fire,
water, theft and power surges.
Completely shut down the desktop
computer at the end of the workday.
Do not open unexpected e-mail
attachments.
Do not download and install unknown
programs.
![Page 10: It security training](https://reader033.vdocuments.us/reader033/viewer/2022061218/54b5ebe04a79591a7f8b47b1/html5/thumbnails/10.jpg)
IT Security Guidance For Employees
Do not keep unnecessary data on
network shares
Do not disclose your confidential
information such as password
Keep computer in locked mode
manually when you move .
Physically secure all data storage
devices such as Tata Photon +, against
theft
1
![Page 11: It security training](https://reader033.vdocuments.us/reader033/viewer/2022061218/54b5ebe04a79591a7f8b47b1/html5/thumbnails/11.jpg)
Thank you