SlideShare una empresa de Scribd logo
1 de 5
	Web Browser Security If you don’t log out when using Web browsers, others may access your private and Sensitive Information.
	Web Browser Security Section: Web Browser Security When using Web browsers (like Internet Explorer or Firefox) log out of sites storing Sensitive Information. banking sites, Payroll services, Student Central, etc. Many Web sites store (cache) personal information, such as login names and passwords, until a user logs out.
Suspect Unauthorized Access? …Steps to Take  Section: Web Browser Security Immediately notify University officials: Your supervisor Office of University Counsel Information Security Office at (919.445.9393) ITS Help Desk at (919.962.HELP) Problems or Questions?  Contact (919.962.HELP) or your departmental IT staff for assistance on downloading and installing any software from the ITS Shareware site.
Your Responsibilities If Unauthorized Access Occurs Section: Web Browser Security The University is required to take reasonable steps to lessen harmful effects of any unauthorized access. Timely notification of the incident is vitalto minimize potential harm. Remember: It is always better to ask questions first rather than risk violating a University policy. Call (919.962.HELP) for advice.
Learning Point # 6 Section: Web Browser Security If you believe that Sensitive Information has been accessed by a hacker, you should inform University staff. Right? Right! Everyone affiliated with the University should report an unauthorized access to Sensitive Information. Notification can occur by calling 919.962.HELP.

Más contenido relacionado

La actualidad más candente

PRESENTATION DATA PROTECTION CONFERENCE ASIAN LEGAL BUSINESS (ALB) 2014 KUALA...
PRESENTATION DATA PROTECTION CONFERENCE ASIAN LEGAL BUSINESS (ALB) 2014 KUALA...PRESENTATION DATA PROTECTION CONFERENCE ASIAN LEGAL BUSINESS (ALB) 2014 KUALA...
PRESENTATION DATA PROTECTION CONFERENCE ASIAN LEGAL BUSINESS (ALB) 2014 KUALA...Norshidah Mohamed
 
Being online
Being onlineBeing online
Being onlinehpinn
 
Cybersafety basics
Cybersafety basicsCybersafety basics
Cybersafety basicsjeeva9948
 
Antivirus
AntivirusAntivirus
Antivirusyuvan80
 
Information Security Awareness And Training Business Case For Web Based Solut...
Information Security Awareness And Training Business Case For Web Based Solut...Information Security Awareness And Training Business Case For Web Based Solut...
Information Security Awareness And Training Business Case For Web Based Solut...Michael Kaishar, MSIA | CISSP
 
Small Business Administration Recommendations
Small Business Administration RecommendationsSmall Business Administration Recommendations
Small Business Administration RecommendationsMeg Weber
 
Security Education Platform_AnilShukla
Security Education Platform_AnilShuklaSecurity Education Platform_AnilShukla
Security Education Platform_AnilShuklaAnil Shukla
 
Et 5083 week 3 assignment - technology safety, security, & filtering traini...
Et 5083   week 3 assignment - technology safety, security, & filtering traini...Et 5083   week 3 assignment - technology safety, security, & filtering traini...
Et 5083 week 3 assignment - technology safety, security, & filtering traini...jsoderst75
 
Addressing todays Governance Risk and Compliance Requirements
Addressing todays Governance Risk and Compliance RequirementsAddressing todays Governance Risk and Compliance Requirements
Addressing todays Governance Risk and Compliance RequirementsWatchful Software
 

La actualidad más candente (11)

PRESENTATION DATA PROTECTION CONFERENCE ASIAN LEGAL BUSINESS (ALB) 2014 KUALA...
PRESENTATION DATA PROTECTION CONFERENCE ASIAN LEGAL BUSINESS (ALB) 2014 KUALA...PRESENTATION DATA PROTECTION CONFERENCE ASIAN LEGAL BUSINESS (ALB) 2014 KUALA...
PRESENTATION DATA PROTECTION CONFERENCE ASIAN LEGAL BUSINESS (ALB) 2014 KUALA...
 
Being online
Being onlineBeing online
Being online
 
Cybersafety basics
Cybersafety basicsCybersafety basics
Cybersafety basics
 
Help Desk Signage
Help Desk SignageHelp Desk Signage
Help Desk Signage
 
Antivirus
AntivirusAntivirus
Antivirus
 
Information Security Awareness And Training Business Case For Web Based Solut...
Information Security Awareness And Training Business Case For Web Based Solut...Information Security Awareness And Training Business Case For Web Based Solut...
Information Security Awareness And Training Business Case For Web Based Solut...
 
Small Business Administration Recommendations
Small Business Administration RecommendationsSmall Business Administration Recommendations
Small Business Administration Recommendations
 
Security Education Platform_AnilShukla
Security Education Platform_AnilShuklaSecurity Education Platform_AnilShukla
Security Education Platform_AnilShukla
 
Security and ethics
Security and ethicsSecurity and ethics
Security and ethics
 
Et 5083 week 3 assignment - technology safety, security, & filtering traini...
Et 5083   week 3 assignment - technology safety, security, & filtering traini...Et 5083   week 3 assignment - technology safety, security, & filtering traini...
Et 5083 week 3 assignment - technology safety, security, & filtering traini...
 
Addressing todays Governance Risk and Compliance Requirements
Addressing todays Governance Risk and Compliance RequirementsAddressing todays Governance Risk and Compliance Requirements
Addressing todays Governance Risk and Compliance Requirements
 

Similar a Security Awareness 9 10 09 V4 Web Browser

10+ Web Security Threats You Can’ Ignore
10+ Web Security Threats You Can’ Ignore10+ Web Security Threats You Can’ Ignore
10+ Web Security Threats You Can’ IgnoreTheAntFrim
 
Information security a new era technology_
Information security a new era technology_Information security a new era technology_
Information security a new era technology_Tahmid Munaz
 
Social Engineering: Protecting Yourself on the Campus Network
Social Engineering: Protecting Yourself on the Campus NetworkSocial Engineering: Protecting Yourself on the Campus Network
Social Engineering: Protecting Yourself on the Campus Networkthowell
 
Cybersafety basics.ppt cs
Cybersafety basics.ppt csCybersafety basics.ppt cs
Cybersafety basics.ppt csVinay Soni
 
An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)Cyber Security Infotech
 
Dev Abhijet Gagan Chaitanya VII-A ....Salwan public school
Dev Abhijet Gagan Chaitanya VII-A  ....Salwan public schoolDev Abhijet Gagan Chaitanya VII-A  ....Salwan public school
Dev Abhijet Gagan Chaitanya VII-A ....Salwan public schoolDevku45
 
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptxCYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptxBarakaMuyengi
 
Document safer online for nonprofits guide
Document safer online for nonprofits guideDocument safer online for nonprofits guide
Document safer online for nonprofits guideNguyen Xuan Quang
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptxMBRoman1
 
Cysecc.pptx
Cysecc.pptxCysecc.pptx
Cysecc.pptxjondon17
 
I’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take NextI’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take NextBrian Pichman
 

Similar a Security Awareness 9 10 09 V4 Web Browser (20)

Cyber Safety
Cyber Safety Cyber Safety
Cyber Safety
 
10+ Web Security Threats You Can’ Ignore
10+ Web Security Threats You Can’ Ignore10+ Web Security Threats You Can’ Ignore
10+ Web Security Threats You Can’ Ignore
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Information security a new era technology_
Information security a new era technology_Information security a new era technology_
Information security a new era technology_
 
Social Engineering: Protecting Yourself on the Campus Network
Social Engineering: Protecting Yourself on the Campus NetworkSocial Engineering: Protecting Yourself on the Campus Network
Social Engineering: Protecting Yourself on the Campus Network
 
Protect
ProtectProtect
Protect
 
Cybersafety basics.ppt cs
Cybersafety basics.ppt csCybersafety basics.ppt cs
Cybersafety basics.ppt cs
 
An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)
 
Dev Abhijet Gagan Chaitanya VII-A ....Salwan public school
Dev Abhijet Gagan Chaitanya VII-A  ....Salwan public schoolDev Abhijet Gagan Chaitanya VII-A  ....Salwan public school
Dev Abhijet Gagan Chaitanya VII-A ....Salwan public school
 
Cyber-savvy Cyber-safety
Cyber-savvy Cyber-safety Cyber-savvy Cyber-safety
Cyber-savvy Cyber-safety
 
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptxCYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
 
Document safer online for nonprofits guide
Document safer online for nonprofits guideDocument safer online for nonprofits guide
Document safer online for nonprofits guide
 
Securing Your Business
Securing Your BusinessSecuring Your Business
Securing Your Business
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Cysecc.pptx
Cysecc.pptxCysecc.pptx
Cysecc.pptx
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Cyber-Security2.pptx
Cyber-Security2.pptxCyber-Security2.pptx
Cyber-Security2.pptx
 
Cyber-Security1.pptx
Cyber-Security1.pptxCyber-Security1.pptx
Cyber-Security1.pptx
 
I’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take NextI’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take Next
 

Más de Megan Bell

Week 1 ppt and-lecture-transcript-with audio2slides
Week 1 ppt and-lecture-transcript-with audio2slidesWeek 1 ppt and-lecture-transcript-with audio2slides
Week 1 ppt and-lecture-transcript-with audio2slidesMegan Bell
 
Week 1 ppt and-lecture-transcript-with audio
Week 1 ppt and-lecture-transcript-with audioWeek 1 ppt and-lecture-transcript-with audio
Week 1 ppt and-lecture-transcript-with audioMegan Bell
 
Security Awareness 9 10 09 V4 Overview
Security Awareness 9 10 09 V4 OverviewSecurity Awareness 9 10 09 V4 Overview
Security Awareness 9 10 09 V4 OverviewMegan Bell
 
Security Awareness 9 10 09 V4 Virus Trojan
Security Awareness 9 10 09 V4 Virus TrojanSecurity Awareness 9 10 09 V4 Virus Trojan
Security Awareness 9 10 09 V4 Virus TrojanMegan Bell
 
Security Awareness 9 10 09 V4 Sens Info Wireless
Security Awareness 9 10 09 V4 Sens Info WirelessSecurity Awareness 9 10 09 V4 Sens Info Wireless
Security Awareness 9 10 09 V4 Sens Info WirelessMegan Bell
 
Security Awareness 9 10 09 V4 Sens Info
Security Awareness 9 10 09 V4 Sens InfoSecurity Awareness 9 10 09 V4 Sens Info
Security Awareness 9 10 09 V4 Sens InfoMegan Bell
 
Security Awareness 9 10 09 V4 Got Mail
Security Awareness 9 10 09 V4 Got MailSecurity Awareness 9 10 09 V4 Got Mail
Security Awareness 9 10 09 V4 Got MailMegan Bell
 
Security Awareness 9 10 09 V4 Protect Equip
Security Awareness 9 10 09 V4 Protect EquipSecurity Awareness 9 10 09 V4 Protect Equip
Security Awareness 9 10 09 V4 Protect EquipMegan Bell
 
Security Awareness 9 10 09 V4 Best Prac
Security Awareness 9 10 09 V4 Best PracSecurity Awareness 9 10 09 V4 Best Prac
Security Awareness 9 10 09 V4 Best PracMegan Bell
 

Más de Megan Bell (9)

Week 1 ppt and-lecture-transcript-with audio2slides
Week 1 ppt and-lecture-transcript-with audio2slidesWeek 1 ppt and-lecture-transcript-with audio2slides
Week 1 ppt and-lecture-transcript-with audio2slides
 
Week 1 ppt and-lecture-transcript-with audio
Week 1 ppt and-lecture-transcript-with audioWeek 1 ppt and-lecture-transcript-with audio
Week 1 ppt and-lecture-transcript-with audio
 
Security Awareness 9 10 09 V4 Overview
Security Awareness 9 10 09 V4 OverviewSecurity Awareness 9 10 09 V4 Overview
Security Awareness 9 10 09 V4 Overview
 
Security Awareness 9 10 09 V4 Virus Trojan
Security Awareness 9 10 09 V4 Virus TrojanSecurity Awareness 9 10 09 V4 Virus Trojan
Security Awareness 9 10 09 V4 Virus Trojan
 
Security Awareness 9 10 09 V4 Sens Info Wireless
Security Awareness 9 10 09 V4 Sens Info WirelessSecurity Awareness 9 10 09 V4 Sens Info Wireless
Security Awareness 9 10 09 V4 Sens Info Wireless
 
Security Awareness 9 10 09 V4 Sens Info
Security Awareness 9 10 09 V4 Sens InfoSecurity Awareness 9 10 09 V4 Sens Info
Security Awareness 9 10 09 V4 Sens Info
 
Security Awareness 9 10 09 V4 Got Mail
Security Awareness 9 10 09 V4 Got MailSecurity Awareness 9 10 09 V4 Got Mail
Security Awareness 9 10 09 V4 Got Mail
 
Security Awareness 9 10 09 V4 Protect Equip
Security Awareness 9 10 09 V4 Protect EquipSecurity Awareness 9 10 09 V4 Protect Equip
Security Awareness 9 10 09 V4 Protect Equip
 
Security Awareness 9 10 09 V4 Best Prac
Security Awareness 9 10 09 V4 Best PracSecurity Awareness 9 10 09 V4 Best Prac
Security Awareness 9 10 09 V4 Best Prac
 

Último

A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 

Último (20)

A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 

Security Awareness 9 10 09 V4 Web Browser

  • 1. Web Browser Security If you don’t log out when using Web browsers, others may access your private and Sensitive Information.
  • 2. Web Browser Security Section: Web Browser Security When using Web browsers (like Internet Explorer or Firefox) log out of sites storing Sensitive Information. banking sites, Payroll services, Student Central, etc. Many Web sites store (cache) personal information, such as login names and passwords, until a user logs out.
  • 3. Suspect Unauthorized Access? …Steps to Take Section: Web Browser Security Immediately notify University officials: Your supervisor Office of University Counsel Information Security Office at (919.445.9393) ITS Help Desk at (919.962.HELP) Problems or Questions? Contact (919.962.HELP) or your departmental IT staff for assistance on downloading and installing any software from the ITS Shareware site.
  • 4. Your Responsibilities If Unauthorized Access Occurs Section: Web Browser Security The University is required to take reasonable steps to lessen harmful effects of any unauthorized access. Timely notification of the incident is vitalto minimize potential harm. Remember: It is always better to ask questions first rather than risk violating a University policy. Call (919.962.HELP) for advice.
  • 5. Learning Point # 6 Section: Web Browser Security If you believe that Sensitive Information has been accessed by a hacker, you should inform University staff. Right? Right! Everyone affiliated with the University should report an unauthorized access to Sensitive Information. Notification can occur by calling 919.962.HELP.