SETA (Security Education, Training, and Awareness)

• Training on access tools • Limitations of passwords • Formulating a password • Changing passwords periodically • Using multi-factor authentication • Using password managers

© 2016 John Wi ley & Sons, Inc. 21

SETA (Security Education, Training, and Awareness)

• BYOD • Rules • How to follow them

• Social Media • Rules • How to follow them • Cases from the past that created problems

© 2016 John Wi ley & Sons, Inc. 22

SETA (Security Education, Training, and Awareness)

• Vigilance: Recognizing: • Bogus warning messages • Phishing emails • Physical intrusions • Ports and access channels to examine

© 2016 John Wi ley & Sons, Inc. 23

Classic Signs of Phishing

• Account is being closed

• Email in-box is full

• Winning a contest or lottery

• Inheritance or commission to handle funds

• Product delivery failed

• Odd URL when hovering

• Familiar name but strange email address

• Poor grammar/spelling

• Impossibly low prices

• Attachment with EXE, ZIP, or BAT (etc.)

© 2016 John Wi ley & Sons, Inc. 24

Managing and Using Information Systems:

A Strategic Approach – Sixth Edition

Keri Pearlson, Carol Saunders, and Dennis Galletta

© Copyright 2016 John Wiley & Sons, Inc.