Audit Marketing Axe Finance

Published on Slideshow
Static slideshow
Download PDF version
Download PDF version
Embed video
Share video
Ask about this video

Scene 1 (0s)

Hello welcome to the Infrastructure and Cloud Department presentation..

Scene 2 (6s)

[Virtual Presenter] Good to know: Security is everyone’s responsibility ! Today, you will learn everything you need to know about security at axe finance as a new joiner.. The Infrastructure team remains at your disposal to answer your questions and to respond to your requests.

Scene 3 (36s)

[Audio] Agenda 1 Choosing good passwords 2 Safe Web browsing 3 Email Security 4 Mobile Devices 5 Physical Security 6 Social Engineering 7 Security Tips The Agenda will Cover : How to to choose Good passwords How to safely browse websites Emails best practices and how to avoid phishing How to protect your mobile devices. How to maintain physical security. social engineering and finally we will wrap up with security tips.

Scene 4 (1m 10s)

[Audio] 1 Password Let’s start with How to choose Good passwords.

Scene 5 (1m 18s)

[Audio] 1 Choosing good passwords 1/2 Use Strong Passwords Lengthy: At least 8 characters more is better. Complex: Mix upper lower numbers and symbols. Change passwords periodically (Each 90 days). Keep your passwords secret: Do not share with others or write them down. Do not use common or predictable passwords: Examples of bad passwords: Your own birthday name your phone number. How to choose strong password? : Your password needs to be lengthy at least 8 characters and more is better. It should be complex containing a mix of uppercase and lowercase letters numbers and symbols. Avoid using common or predictable passwords. Change your passwords periodically ideally every 90 days and always keep your password secret..

Scene 6 (2m 11s)

[Audio] 1 Choosing good passwords 2/2 Strategies for Creating Strong Passwords Avoiding common passwords. Word combinations rather than single word. Incorporating Acronyms or non-English language words. Full sentence phrases. Substitute letters with numbers or symbols. Example: purp!3ClothingDiscOunt Example: P4sswords@reg00d!.

Scene 7 (2m 36s)

[Audio] 2 Safe Web Browsing Let’s move to Safe Web Browsing.

Scene 8 (2m 45s)

[Audio] 2 Safe Web Browsing 1/2 Before logging into or entering sensitive information into a website look for the security padlock symbol in the U-R-L bar. Double clicking the icon will display the certificate information for the page you are viewing to guarantee that you are in a safe and secure website. The “https” is another indication that the page you are viewing is secure. Pay attention to the web address – if it has changed or doesn’t seem right it may be a fraudulent site..

Scene 9 (3m 17s)

[Audio] 2 Safe Web Browsing 2/2 How to safely close Scareware Popups ? Never click on any of these buttons ! Hold the Alt plus F4 key & How to safely close Scareware Popups ? Hold the Alt plus F4 key Never click on any of these buttons !.

Scene 10 (3m 37s)

[Audio] 3 Email Security Best Practices Now we have E-mail Security Best practices.

Scene 11 (3m 45s)

[Audio] 3 Email Security Best Practices 1/2 Don’t use your personal email account for work purposes. Do not open attachment in unfamiliar emails.. Do not click on suspicious links. Use secure email encryption. whenever sending any restricted or sensitive information. Carefully Inspect Emails.

Scene 12 (4m 7s)

[Audio] 3 Email Security Best Practices 2/2. 3- Email Security Best Practices 2/2.

Scene 13 (4m 16s)

[Audio] 4 Mobile Devices. 4- Mobile Devices.

Scene 14 (4m 24s)

[Audio] 4 Mobile Devices Protect your devices with a password|PIN (6 Digit recommended minimums). Encrypt device encryption perform remote wipe ensure physical security. Read what others are saying in the review section before downloading any application. Do not download apps from unknown sources. Avoid using public Wi-Fi hotspots especially when access any password protected sites or where you will enter any personal or confidential information..

Scene 15 (4m 50s)

[Audio] 5 Physical Security And finaly Physical security !.

Scene 16 (4m 59s)

[Audio] 5 Physical Security Question all Strangers alert security guards and|or management to suspicious individuals. Be sure authorized visitors |contractors have properly checked in. Make sure individuals use their own card keys when entering areas. Always lock your computer screen whenever leaving your computer unattended. Secure sensitive paper documents when leaving work areas unattended and at the end of the day. Understand and comply with your organization’s end-of-day closing procedures. Use secure shred bins for disposing of sensitive paper documents and electronic media..

Scene 17 (5m 39s)

[Audio] 6 Social Engineer Email Phishing Example: A social engineer sends an email that appears to come from a fellow employee asking the recipient to download an attachment or click on link..

Scene 18 (5m 52s)

[Audio] 7 Security Tips Follow a clean desk policy. Be aware when creating or disposing paper documents. Consider carefully what information you put out there. Prevent unauthorized people accessing your company. Phishing scams: Don’t bite. Prevent damage from malware. Just because they know you doesn’t mean you know them! Pay Attention !.

Scene 19 (6m 18s)

[Audio] Thank You Security is everyone’s responsibility ! Thanks for joining us today! Always remember Security is everyone’s responsibility! If you have any questions feel free to ask. Have a great day!.