Audit Marketing Axe Finance

Published on Slideshow
Static slideshow
Download PDF version
Download PDF version
Embed video
Share video
Ask about this video

Scene 1 (0s)

New joiner Infrastructure & Cloud Presentation. Let the journey begin….

Scene 2 (9s)

[Audio] We are happy to have you on board. We are happy to have you on board.

Scene 3 (16s)

Good to know:. This Infrastructure & Cloud Presentation has useful information on Travel for Axe finance new joiners. The Infrastructure team is at your disposal to answer your questions and to respond to any other Travel requests..

Scene 4 (32s)

Agenda. 1- Choosing good passwords 2- Safe Web browsing 3- Email Security 4- Mobile Devices 5- Physical Security 6- Social Engineering.

Scene 5 (47s)

[Audio] 1 Choosing good passwords 1/2 Use Strong Passwords Lengthy: At lest 8 more is better. Complex: Mix upper lower numbers and symbols Do not use common or predictable passwords: Examples of bad passwords: Your own birthday people’s names your phone number Change passwords periodically (Each 90 days) Keep your passwords secret: Do not share with others or write them down..

Scene 6 (1m 17s)

[Audio] 1 Choosing good passwords 1/2 Strategies for Creating Strong Passwords Avoiding common passwords Word combinations rather than single word Incorporating Acronyms or non-English language words Full sentence phrases Substitute letters with numbers or symbols Example: purp!3ClothingDiscOunt Example: P4sswords@reg00d!.

Scene 7 (1m 43s)

[Audio] 2 Safe Web Browsing 1/2 Before logging into or entering sensitive information into a website look for the security padlock symbol in the U-R-L bar. Double clicking the icon will display the certificate information for the page you are viewing to guarantee that you re as a safe secure website. The “https” is another indication that the page you are viewing is secure. Pay attention to the web address – if it has changed or doesn’t seem right it may be a fraudulent site..

Scene 8 (2m 17s)

[Audio] 2 Safe Web Browsing 2/2 How to safely close Scareware Popups Never click on any of these buttons ! Hold the Alt plus F4 key.

Scene 9 (2m 31s)

[Audio] 3 Email Security Best Practices 1/3 Don’t use your personal email account for work purposes. Do not open attachment in unfamiliar emails. Do not click on suspicious links. Use secure email encryption whenever sending any restricted or sensitive information..

Scene 10 (2m 50s)

[Audio] 3 Email Security Best Practices 1/3 Don’t use your personal email account for work purposes. Do not open attachment in unfamiliar emails. Do not click on suspicious links. Use secure email encryption whenever sending any restricted or sensitive information..

Scene 11 (3m 11s)

[Audio] 3 Email Security Best Practices 2/3 Carefully Inspect Emails.

Scene 12 (3m 23s)

[Audio] 3 Email Security Best Practices 3/3 Carefully Inspect Emails.

Scene 13 (3m 33s)

[Audio] 4 Mobile Devices Protect your devices with a password/PIN (6 Digit recommended minimum) Device encryption Remote wipe GPS location physical security Do not download apps from unknown sources Read what others are saying about the app in the review section Avoid using public Wi-Fi hotspots especially when access any password protected sites or where you will enter any personal or confidential information.

Scene 14 (3m 59s)

[Audio] 5 Physical Security Question all Strangers. Alert security guards and/or management to suspicious individuals. Be sure authorized visitors/contractors have properly checked in. Make sure individuals use their own card keys when entering areas. Always lock your computer screen whenever leaving your computer unattended. Secure sensitive paper documents when leaving work areas unattended and at the end of the day. Understand and comply with your organization’s end-of-day closing procedures. Use secure shred bins for disposing of sensitive paper documents and electronic media.

Scene 15 (4m 37s)

[Audio] 6 Social Engineer Email Phishing Example: A social engineer sends an email that appears to come from a fellow employee asking the recipient to download an attachment or click on link..

Scene 16 (4m 49s)

[Audio] 7 Security Tips Follow a clean desk policy Be aware when creating or disposing paper documents. Consider carefully what information you put out there. Prevent unauthorized people accessing your company. Just because they know you doesn’t mean you know them! Phishing scams: Don’t bite. Prevent damage from malware..

Scene 17 (5m 10s)

[Audio] Thank You Thanks for joining us today! If you have any questions feel free to ask. Have a great day!.