44
Using Your Email Safely to Protect Personal/Sensitive Data & to Prevent Security Attacks Communication and Collaboration with Office 365 Workshop Series #4

Using Your Email Safely to Protect Personal/Sensitive Data ... · Be extremely wary of any Microsoft Office email attachment that advises you to enable macros to view its content.Do

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Using Your Email Safely to Protect Personal/Sensitive Data ... · Be extremely wary of any Microsoft Office email attachment that advises you to enable macros to view its content.Do

Using Your Email Safely to Protect Personal/Sensitive Data

& to Prevent Security AttacksCommunication and Collaboration with Office 365 Workshop Series #4

Page 2: Using Your Email Safely to Protect Personal/Sensitive Data ... · Be extremely wary of any Microsoft Office email attachment that advises you to enable macros to view its content.Do

Agenda

Email Attacks

Protect Personal / Sensitive Data in Staff Email System

Page 3: Using Your Email Safely to Protect Personal/Sensitive Data ... · Be extremely wary of any Microsoft Office email attachment that advises you to enable macros to view its content.Do

Email Attacks

Spam/Junk Mail

Page 4: Using Your Email Safely to Protect Personal/Sensitive Data ... · Be extremely wary of any Microsoft Office email attachment that advises you to enable macros to view its content.Do

What is SPAM?

Page 5: Using Your Email Safely to Protect Personal/Sensitive Data ... · Be extremely wary of any Microsoft Office email attachment that advises you to enable macros to view its content.Do

Best Practices to Avoid Receiving Spam

Don’t publish your work or your primary email address on any web site or discussion forum.

Have a separate email address for signing up for newsletters and posting online, etc., then if the mailbox starts receiving lots of unwanted mail, it can be deleted or more aggressively filtered.

Page 6: Using Your Email Safely to Protect Personal/Sensitive Data ... · Be extremely wary of any Microsoft Office email attachment that advises you to enable macros to view its content.Do

Email Attacks

Spam/Junk Mail

Virus

Page 7: Using Your Email Safely to Protect Personal/Sensitive Data ... · Be extremely wary of any Microsoft Office email attachment that advises you to enable macros to view its content.Do

What is Virus?

A computer virus is a program which can replicate itself and then spread from one computer to another.

Sometimes, malware, adware and spyware are called viruses, although they cannot replicate themselves. Instead, they can exploit the security of the computer as well as computers within their network. Viruses can harm a computer’s data or performance.

Page 8: Using Your Email Safely to Protect Personal/Sensitive Data ... · Be extremely wary of any Microsoft Office email attachment that advises you to enable macros to view its content.Do

Best Practices in Preventing Virus Infection

Install anti-virus software and make sure that it is up-to-date.

Enable your firewall as this will prevent unwanted PC access from the internet.

Regularly update software installed in your computer. Otherwise, malicious users may exploit these software bugs to attack your computers.

Do not open emails from unknown senders as they may have attachments that are infected with viruses.

Page 9: Using Your Email Safely to Protect Personal/Sensitive Data ... · Be extremely wary of any Microsoft Office email attachment that advises you to enable macros to view its content.Do

Email Attacks

Spam/Junk Mail

Virus

Phishing/Spoofing Mail

Page 10: Using Your Email Safely to Protect Personal/Sensitive Data ... · Be extremely wary of any Microsoft Office email attachment that advises you to enable macros to view its content.Do

What is Phishing Mail?

Phishing refers to the malicious attack method which imitates legitimate companies in sending emails to entice people to share their passwords, credit card number or other sensitive personal information.

Phishing emails will almost always tell you to click on a link that will take you to a website where your personal information will be requested.

Page 11: Using Your Email Safely to Protect Personal/Sensitive Data ... · Be extremely wary of any Microsoft Office email attachment that advises you to enable macros to view its content.Do

Example of Phishing Mail

Page 12: Using Your Email Safely to Protect Personal/Sensitive Data ... · Be extremely wary of any Microsoft Office email attachment that advises you to enable macros to view its content.Do

Example of Phishing Mail

Page 13: Using Your Email Safely to Protect Personal/Sensitive Data ... · Be extremely wary of any Microsoft Office email attachment that advises you to enable macros to view its content.Do

Best Practices Protect yourself from Phishing Emails

We will NEVER ask for your password over email.

Registered financial institutions such as banks normally WILL NOT request users to confirm or update their password or any personal information by clicking on a link and visiting their web sites.

Be suspicious of emails with urgent request for personal information.

Never give out personal information upon email request.

Page 14: Using Your Email Safely to Protect Personal/Sensitive Data ... · Be extremely wary of any Microsoft Office email attachment that advises you to enable macros to view its content.Do

Best Practices Protect yourself from Phishing Emails (Con’t)

Don’t open unexpected email attachments or instant messaging download links.

Enable anti-phishing features of web browser.

Inspect the web address carefully. Don’t trust links in an email. An email that appears to be from PayPal could direct you to a fraudulent website such as http://www.2paypal.com or http://www.gotyouscammed.com/paypal/login.htm

Look for https:// and a lock icon in the address bar before entering any private information on the website.

Page 15: Using Your Email Safely to Protect Personal/Sensitive Data ... · Be extremely wary of any Microsoft Office email attachment that advises you to enable macros to view its content.Do

Responded to Phishing Emails?

Page 16: Using Your Email Safely to Protect Personal/Sensitive Data ... · Be extremely wary of any Microsoft Office email attachment that advises you to enable macros to view its content.Do

Responded to Phishing Emails?

If you have ever responded to a phishing e-mail or submitted your NetID/NetPasswordto a phishing web site, change your NetPassword IMMEDIATELY.

Call IT Help Centre at 2766 5900 to clean your computer.

Page 17: Using Your Email Safely to Protect Personal/Sensitive Data ... · Be extremely wary of any Microsoft Office email attachment that advises you to enable macros to view its content.Do

Email Attacks

Spam/Junk Mail

Virus

Phishing/Spoofing Mail

Zero day attack (e.g. Ransomware)

Page 18: Using Your Email Safely to Protect Personal/Sensitive Data ... · Be extremely wary of any Microsoft Office email attachment that advises you to enable macros to view its content.Do

What is Ransomware?

Spreading via spam or phishing emails carrying malicious file attachments.

Once infected, victims' files become encrypted, which is currently unbreakable, and they receive a message saying they need to pay a ransom (e.g., bitcoin) to get their files back.

Page 19: Using Your Email Safely to Protect Personal/Sensitive Data ... · Be extremely wary of any Microsoft Office email attachment that advises you to enable macros to view its content.Do

Example of Ransomware (e.g. Cerber)

Page 20: Using Your Email Safely to Protect Personal/Sensitive Data ... · Be extremely wary of any Microsoft Office email attachment that advises you to enable macros to view its content.Do

Best Practices Protect yourself from Ransomware

Be extremely wary of any Microsoft Office email attachment that advises you to enable macros to view its content. Do not enable it if in doubt.

Please DO NOT open suspicious email attachment or URL link.

Delete any suspicious-looking emails you receive, especially if they contain links or attachments.

Regularly backup the files stored on your computer, and keep an offline copy of the backup.

Always keep your security software up to date.

Keep your operating system and other software updated.

Page 21: Using Your Email Safely to Protect Personal/Sensitive Data ... · Be extremely wary of any Microsoft Office email attachment that advises you to enable macros to view its content.Do

Responded to Ransomware?

Page 22: Using Your Email Safely to Protect Personal/Sensitive Data ... · Be extremely wary of any Microsoft Office email attachment that advises you to enable macros to view its content.Do

Unfortunately Infected Ransomware?

You shall isolate the infected computer from the network and external storage immediately and do not open any file before clearing the malware.

Call ITS Help Centre at 2766 5900 to clean your computer.

Restore the backup

Page 23: Using Your Email Safely to Protect Personal/Sensitive Data ... · Be extremely wary of any Microsoft Office email attachment that advises you to enable macros to view its content.Do

Email Security Enhancements Pilot Stage

Two server side rules will be implemented. Then spoofing emails claiming to be from "@polyu.edu.hk" will be classified as spoofing and moved into Outlook “Junk Mail” folder.

Page 24: Using Your Email Safely to Protect Personal/Sensitive Data ... · Be extremely wary of any Microsoft Office email attachment that advises you to enable macros to view its content.Do

Email Security Enhancements (Con’t)Pilot Stage

Page 25: Using Your Email Safely to Protect Personal/Sensitive Data ... · Be extremely wary of any Microsoft Office email attachment that advises you to enable macros to view its content.Do
Page 26: Using Your Email Safely to Protect Personal/Sensitive Data ... · Be extremely wary of any Microsoft Office email attachment that advises you to enable macros to view its content.Do

Staff Email OWA

Page 27: Using Your Email Safely to Protect Personal/Sensitive Data ... · Be extremely wary of any Microsoft Office email attachment that advises you to enable macros to view its content.Do

Staff Email OWA

Page 28: Using Your Email Safely to Protect Personal/Sensitive Data ... · Be extremely wary of any Microsoft Office email attachment that advises you to enable macros to view its content.Do

Other Authentication Methods

Page 29: Using Your Email Safely to Protect Personal/Sensitive Data ... · Be extremely wary of any Microsoft Office email attachment that advises you to enable macros to view its content.Do

Email Security Enhancements (Con’t)Evaluation Stage

Advanced Threat Protection (ATP)

With Advanced Threat Protection, you can protect your mailboxes against new, sophisticated attacks in real time.

By protecting against unsafe attachments and expanding protection against malicious links, it can provide better zero-day protection.

Page 30: Using Your Email Safely to Protect Personal/Sensitive Data ... · Be extremely wary of any Microsoft Office email attachment that advises you to enable macros to view its content.Do

Protect Personal / Sensitive Data

Page 31: Using Your Email Safely to Protect Personal/Sensitive Data ... · Be extremely wary of any Microsoft Office email attachment that advises you to enable macros to view its content.Do
Page 32: Using Your Email Safely to Protect Personal/Sensitive Data ... · Be extremely wary of any Microsoft Office email attachment that advises you to enable macros to view its content.Do

Solution

Page 33: Using Your Email Safely to Protect Personal/Sensitive Data ... · Be extremely wary of any Microsoft Office email attachment that advises you to enable macros to view its content.Do

Rights Management sharing application (RMS Sharing App) - Objectives

Can protect single/multiple attachment.

Can protect any type of attachment (office/non-office file types).

Sender can track how people are using a protected document in the document tracking site.

In case the message is accidentally attached an incorrect attachment, sender can “revoke” the assigned permission so that the recipient(s) cannot make access to it.

Remarks: RMS Sharing Apps only protect email attachment. Sender is recommended to put sensitive data into attachment instead of email body.

Page 34: Using Your Email Safely to Protect Personal/Sensitive Data ... · Be extremely wary of any Microsoft Office email attachment that advises you to enable macros to view its content.Do

How to Send Email with Protected Attachments

Page 35: Using Your Email Safely to Protect Personal/Sensitive Data ... · Be extremely wary of any Microsoft Office email attachment that advises you to enable macros to view its content.Do

How to Send Email with Protected Attachments (Con’t)

Page 36: Using Your Email Safely to Protect Personal/Sensitive Data ... · Be extremely wary of any Microsoft Office email attachment that advises you to enable macros to view its content.Do

How to Send Email with Protected Attachments (Con’t)

Page 37: Using Your Email Safely to Protect Personal/Sensitive Data ... · Be extremely wary of any Microsoft Office email attachment that advises you to enable macros to view its content.Do

RMS Sharing Apps (Con’t)Track and Revoke Documents

Users can track how people are using a protected document in the document tracking site. If necessary, they can also revoke access to these documents when sharing is no longer needed by clicking Revoke access against a document.

Page 38: Using Your Email Safely to Protect Personal/Sensitive Data ... · Be extremely wary of any Microsoft Office email attachment that advises you to enable macros to view its content.Do

RMS Sharing Apps (Con’t)Track and Revoke Documents

Page 39: Using Your Email Safely to Protect Personal/Sensitive Data ... · Be extremely wary of any Microsoft Office email attachment that advises you to enable macros to view its content.Do

Data Loss Prevention (DLP)Objectives

Reduce the possibility of data leakage (sensitive data) through email communication by Data Loss Protection (DLP).

Page 40: Using Your Email Safely to Protect Personal/Sensitive Data ... · Be extremely wary of any Microsoft Office email attachment that advises you to enable macros to view its content.Do

Data Loss Prevention (DLP) (Con’t)Features and Benefits

To detect whether the message content and/or the attachment (not encrypted by other method) containing some sensitive data.

The detection is based on our defined pattern such as

Hong Kong ID card number

China Resident Identity Card (PRC) Number

Credit Card number

PolyU Student Number

If PolyU Student Number is found, the sender will receive MailTips alerts.

If other sensitive data is found, and the mail will be blocked and sender will receive a non-delivery report (NDR).

Sender is recommended to put sensitive data into RMS protected attachment instead of email body.

Page 41: Using Your Email Safely to Protect Personal/Sensitive Data ... · Be extremely wary of any Microsoft Office email attachment that advises you to enable macros to view its content.Do

Data Loss Prevention (DLP) (Con’t)

Page 42: Using Your Email Safely to Protect Personal/Sensitive Data ... · Be extremely wary of any Microsoft Office email attachment that advises you to enable macros to view its content.Do

What’s Next?

Page 43: Using Your Email Safely to Protect Personal/Sensitive Data ... · Be extremely wary of any Microsoft Office email attachment that advises you to enable macros to view its content.Do

Regular IT Training Workshophttps://www.polyu.edu.hk/its

Page 44: Using Your Email Safely to Protect Personal/Sensitive Data ... · Be extremely wary of any Microsoft Office email attachment that advises you to enable macros to view its content.Do

Q & AsFor particular issue, please contact IT HelpCentre at x5900.