Pcs security waves

HugoIvanArellanoIbar 39 views 20 slides May 25, 2021
Slide 1
Slide 1 of 20
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20

About This Presentation

junta de 26 may 2021


Slide Content

PCS SF WAVE 3.0 Security Information Francisca Martínez

Faculty Francisca Martinez PCS SF– EPS Analyst Bachelor Degree in Business, actually making a Master Degree in Finance. Joined Accenture in August 2016 as Project Control Services Analyst. She began working in the invoicing process for customers as Banorte , Goldcorp, BC Hydro, Level 3 and COX, providing support to resources from Mexico, US, Canada and Argentina. In May 2017, started as PMO in TJX Inc, working as Resource Manager providing the Staffing updates directly to the customer, and working with resources of different countries as US, Canada, India and UK. She’s a big Harry Potter fan, enjoy bake different desserts, read and spend time with her family and friends.

3 Copyright © 2020 Accenture. All rights reserved. Course Objectives After this training, you will know How to protect your equipment Security Tips for Home Office Security Tips for Office How to protect your information

How to protect my equipment? Accenture will provide Laptop Laptop Lock Headset Backpack Your laptop must be always locked Copyright © 2020 Accenture. All rights reserved.

Given the COVID-19 situation, more Accenture people are working remotely than ever before When connecting to a new network, select "do not allow my computer to be discoverable by other devices on the network" to  turn off network discovery and folder sharing.   Where you have the ability to control it: Change the default administrator password on your router to one that is both strong and unique. Enable WPA2 or WPA3 on your router to encrypt your online activity. Create a strong network password  of 8 characters or more and only share it with people you trust. Monitor your Wireless Router vendor or your Internet Service Provider (ISP) regularly for security patches and firmware upgrades for your router device(s) and apply them when available.  For additional information on configuring your home wireless network, reference the Home Wireless Guidelines . If working in public, If you can, use your smartphone as a hotspot to connect to the internet. If you must use a public network, confirm with the establishment that the network is genuine before connecting and only navigate to sites that begin with "https"—indicating an encrypted connection . NOTE:  Sensitive Accenture and client applications may require you to connect via VPN  to access. Copyright © 2020 Accenture. All rights reserved.

Copyright © 2020 Accenture. All rights reserved.

Copyright © 2020 Accenture. All rights reserved.

Working in your City In order to work in another City different than Monterrey ATC, or if you need to travel between México, you need to: Get Lead’s approval Sign HR disclaimer letter Working from another country is not allowed, it needs to be reviewed by your Lead and Mobility Team Copyright © 2020 Accenture. All rights reserved.

Working in the Office Copyright © 2020 Accenture. All rights reserved.

Copyright © 2020 Accenture. All rights reserved.

INFORMATION SECURITY What we do? Protecting Accenture’s clients, our employees and Accenture’s own data and operations poses challenges that call for the best from our own professional services, including the people, strategies, processes and technologies found within Accenture’s Information Security function. Copyright © 2020 Accenture. All rights reserved.

TOP TEN INFORMATION SECURITY BEHAVIORS 1 PISHING Is a fraudulent attempt to access personal financial account information or a corporate network. Watch for signs of Phishing and verify emails are authentic. Only open expected emails from known senders Review the hyperlinks to ensure they are overwritten by Proofpoint's or direct you to reputable websites Click the Report Phishing button in Outlook if you receive a suspicious emails to your Accenture account. Mention the 4 signs of suspicions of Phishing on this email. Copyright © 2020 Accenture. All rights reserved.

2 USE APPROVED STORAGE Unless provided by your client, only save sensitive information to devices or services provided by Accenture Do not put sensitive information on personal devices or in public domain Do not email sensitive information to personal email accounts Do not store or transmit sensitive Accenture Information via client systems Good Practices? https://mylearning.accenture.com/myl-ui/learner/activityDetails?activityID=1454679 https://mylearning.accenture.com/myl-ui/learner/activityDetails?activityID=1230976 3 SCRUBBING Confirm sharing of work products is permissible and scrub all sensitive data prior to distribution Only store documents with those who have business need Remove all logos and identifying features from documents Provide file links to data repositories, like SharePoint, rather than emailing attachments 4 RESTRICT ACCESS Access Control, Restrict Access to work products with Accenture and client provided tools. Restrict Access to Accenture work products with the Permissions Toolbar, WinZip Encryption or access controlled OneDriver / SharePoitn , restrict access to client work products with client provided tool Verify users who have access to your work products have business need Copyright © 2020 Accenture. All rights reserved.

5 CHECK EMAILS BEFORE SENDING Before sending, ensure emails are address to the correct person and only intended files are attach Always confirm you are sending the right information to the right people 6 CREATE UNIQUE PASSWORDS Keep your work passwords unique and only use your Accenture Account credentials for business purpose. Read through the following do`s and don'ts' of handling your credentials Do not document your passwords Do not use your Accenture credentials for personal websites Use two-factor identification whenever possible 7 ENABLE SECURITY SOFTWARE Keep your security software's enable and restart computer regularly to keep the software current Do not circumvent security controls on Accenture workstation Do not install or use peer software Delete all sensitive information from your storage location when rolling off on assignment Delete all sensitive information from your storage locations If you have permission to keep the files, scrub all work products. Copyright © 2020 Accenture. All rights reserved.

9 DELETE WORK PRODUCTS AFTER ACCENTURE Do not keep any work products if you stop working on Accenture Understand Accenture owns all work products during your time at Accenture Do not email sensitive information to personal email account 10 CALL ASOC Call Accenture Security Operation Center (ASOC) immedialty at +1 202 728 0645 if you experience a cyber or personal security indecent. For Further Security Support you can visit -Policy 57- https://in.accenture.com/protectingaccenture/about-is/ https://in.accenture.com/protectingaccenture/top-is-behaviors/ Copyright © 2020 Accenture. All rights reserved.

Accenture’s Social Engineering 16 AWARENESS & ENABLEMENT Branded awareness messaging with links to resources Phishing Prevention and Social Engineering awareness videos Packaged material for local Information Security leads to cascade Incentivized and interactive training on recognizing Social Engineering attempts Management of the PHIShING PROTECTION PROGRAM ( ppp ) for those who fail multiple tests TESTING & REPORTING Quarterly Social Engineering tests sent to all of Accenture people globally REPORT PHISHING PHISHME Copyright © 2020 Accenture. All rights reserved.

IS Advocate Program 17 IS Advocates identify social engineering attempts at a higher rate than non-advocates. IS Advocates consistently score better than the rest of the company on our bi-annual behavior survey. IS Advocates are 50% less likely to contribute to a security incident, compared to the general Accenture population. Advocate program has grown significantly in popularity and impact since inception. I have done this training and I am very confident now that I am following all the right ways to protect Accenture and my client from vulnerable attacks. Learning program with highly tailored, immersive scenarios that employees can relate to and learn from. Largest driver of real, lasting behavioral change for information security awareness and secure behavior adoption throughout the company. Mandatory for all employees and accelerated for high-risk groups. Copyright © 2020 Accenture. All rights reserved.

Questions? 18

Accenture Offices Located in Monterrey, Nuevo León, you can find the offices in Oficinas en el Parque, Blvd. Antonio L. Rodríguez #1884, Santa Maria, 64650. Tower 1 Floor 3 to 7 Tower 2 Reception - Lobby Floor 3 Floor 9 to 10
Tags