GPL Network Security starts with YOU - PowerPoint PPT Presentation

1 / 16
About This Presentation
Title:

GPL Network Security starts with YOU

Description:

The IT department uses the latest technology ... Compromised information can inhibit our success as an institution. ... Your ability to work can be hampered. ... – PowerPoint PPT presentation

Number of Views:47
Avg rating:3.0/5.0
Slides: 17
Provided by: VNdl
Category:

less

Transcript and Presenter's Notes

Title: GPL Network Security starts with YOU


1
GPL Network Security starts with YOU !
2
We need your help
  • The IT department uses the latest technology and
    techniques to maintain the highest level of
    security possible, but we cant do the job
    without your help.
  • Every employee plays a critical role in keeping
    the GPLs computer network secure.
  • When you log on to your computer, send an e-mail,
    share a file, or use an instant messaging
    program, you can help or hurt network security.

3
Why bother with security?
  • Compromised information can inhibit our success
    as an institution.
  • Hackers and viruses can destroy your work and
    others in the network.
  • Your private information can be compromised.
  • Your ability to work can be hampered.
  • The authorisation hierarchy can be compromised
    with devastating results.

4
What should be kept secure?
Obvious examples
  • Your password (s)
  • Human resources personnel files
  • SAP related activities
  • Research and development data
  • Your Personal files and e-mails
  • All internal hearings
  • Confidential resolutions
  • Any confidential internal documents

5
Protect your password
  • Never share your password with anyone.
  • Do not write it down and leave it in your work
    area, however well-hidden you think it is.
  • Do not create passwords from personal information
    like family or pet names.
  • Ask your line manager/supervisor to have IT
    create a temporary account if you need access to
    information when a co-worker is out.
  • Always protect your work area, lock your desktop
    if its going to be left unattended.

6
E-mail
  • E-mail represents our single biggest security
    concern.
  • Viruses are most commonly spread through e-mail
    attachments.
  • Viruses can also be sent through instant
    messaging attachments.
  • Confidential information can very easily be
    accidentally and/or purposefully compromised
    through both e-mail and instant messaging.

7
Viruses can come from
  • E-mail and instant messaging attachments.
  • Infected files shared via removable storage
    (diskettes, CDs, and other media) or over the
    network.
  • Software downloaded from the Internet.

8
Basic virus defense
  • Dont open files that you are not expecting
  • Many viruses automatically send files without the
    e-mail account owners knowledge.
  • Ask the sender to confirm unexpected files.
  • Suspect messages that appear more than once in
    your Inbox
  • You may receive the same e-mail from a virus
    repeatedly.

9
Basic virus defense (cont.)
  • Learn file extensions
  • Your computer will display both an icon and a
    file extension for files you receive. Open only
    file extensions you know are safe.
  • When in doubt, call the help desk.

10
Here is what you should do
  • Do not open unexpected e-mail or instant
    messaging attachments, even from coworkers or
    other trusted sources.
  • Never open attachments from an unknown or
    suspicious source.
  • Never download freeware or shareware from the
    Internet without express permission from the IT
    department.
  • Disable macros on questionable documents.

11
More of what you should do
  • Shut down your PC if you believe your user ID or
    session has been compromised.
  • Understand that any instant messaging or e-mail
    message sent over the Internet can be read by
    others.
  • Never send passwords, credit card numbers, or
    other access information via e-mail.
  • Remember GPL owns all incoming and outgoing
    instant messaging and e-mail messages.

12
Report computer security issues and viruses to IT
unit
  • If you believe someone has stolen your password
    or illicitly accessed your computer, call the
    help desk.
  • If you forget your password or need to have a
    temporary account created, call the help desk.
  • If you receive a suspicious e-mail, call the help
    desk for instructions.
  • If you put infected media into your computer, the
    anti-virus software will ask you to eject, scan
    or format the disk. Eject the disk and contact
    the help desk.
  • If an infected file is critical, the IT
    department will attempt to rescue the data.
    Success is not guaranteed.

13
How to contact the Help Desk
  • Telephone
  • Dial these extension from any Gauteng Legislature
    telephone
  • 5934 Cynthia Maqhiza on SAP R/3 Services
  • 5751 Praxis for all Network Related Services
  • E-mail
  • Cmaqhiza_at_gautengleg.gov.za for SAP R/3
  • praxis_at_gautengleg.gov.za for Network related
    services
  • Intranet
  • Click the Help Desk link from Gauteng
    Legislatures Intranet home page.
  • Enter http//www.osizweni.co.za into the address
    bar of your Internet browser.

14
If you receive no joy from the Help Desk
  • Dial these extension from any Gauteng Legislature
    telephone
  • Veli Ndlovu Technology Unit -extn 5444
  • John Des Fountain Director OSS -extn 5902

15
Help desk hours of operation
  • Normal hours of operation 800 A.M. to 1630 P.M.
    Monday through Friday

16
Questions
Write a Comment
User Comments (0)
About PowerShow.com