STOLEN ACCESS: Keeping Information Secure DVD
This program helps viewers understand their responsibility in defending against IT system infiltrators. Raises awareness of social engineering, industrial espionage, wireless security, and more.
Training topics include: "Social Engineering" and "hacker attacks" as well as knowing when
you're "being had".
What is "social engineering"?
Pretext phone calls: a voice at the other end of the line could be anyone
An email message could come from anywhere
Warning signs that you could be a target of "social engineering"
How to handle unusual or suspicious calls
Information security off-site:
Conversations in public places and away from the office
Password protection: your first line of defense
Creating passwords "dos and don'ts"
Password selection - making passwords hard to guess
Random-character passwords - how to make them memorable
Vulnerability to password-scanning software - how long it takes to crack a weak password
Stolen access via email:
Email, websites, or online forms that ask for access information
Responding to unfamiliar or unusual messages
Reporting unusual or suspicious incidents immediately
Is your workplace secure? Practical security steps:
Log off when you leave your workstation
Never write down your passwords
Secure sensitive documents and media
Never leave documents unattended on desks, fax machines, copiers
Dispose of sensitive originals and copies properly
Public wireless access:
Awareness of risks
Compliance with established enterprise guidelines from IT
Overview:
Social engineers trick unsuspecting employees into revealing sensitive and confidential information over the phone, via e-mail, and in public. This video dramatically illustrates the threats from information thieves, hackers, and industrial espionage agents, and offers practical tips on preventing information loss.
*Part of the INFORMATION/COMPUTER SECURITY VIDEO LIBRARY
*Closed Captioned
*Includes Study Guide
*20% discount to Education & Government
[Search Again] [Home]