Send the link below via email or IMCopy
Present to your audienceStart remote presentation
- Invited audience members will follow you as you navigate and present
- People invited to a presentation do not need a Prezi account
- This link expires 10 minutes after you close the presentation
- A maximum of 30 users can follow your presentation
- Learn more about this feature in our knowledge base article
Transcript of Information Management
What are these RESOURCES?
Effective and Efficient
Information Asset Management
You have the right
information assets and
the right technical
capability to meet your
You don’t have
the right (form
assets to meet
You don’t have the right technical capability to use your information assets to meet your business needs
You are maintaining technical support for information assets that you don’t need
You are maintaining
that you don’t need
You are maintaining technical capability that you don’t need
You have business needs
that are not being met
Guess What ???!!!
We will NOT do it !!!
Guess What Again ???!!!
"If you keep doing what you're doing you'll keep getting what you're getting"
You Own the Solution
1- Delete All Private Files (Movies, Music, Photos, ...etc)
2- Archive old Business Documents
3- Don't use business email for private use
4- Avoid sending large-sized emails
5- Use Shared Folder or Portal to share large files with other people
6- Use NG FTP Server to exchange large files with externals
1- We have migrated Email Accounts from PST to OST
2- Resigned Users Files have been backed up on an external storage and removed from servers to spare storage
3- We have stopped the ability to store Movies, Music, Photos, ...etc. unless there is a justified and approved request
Technical Services and Environment
Statistics About Security Threats & Attacks
2011/2012: The Surge of Security Threats
More than 286,000,000 New Threats
More than 55,000 new unique malware samples per day
93% Increase in Web-Attacks
1.3% Of Google search results are infected
30,000 New malicious URL /day
25% is DDOS share, 33% SQL Injection
Dubai Police: More than half of the UAE’s 2.55 million internet users were victims of cybercrime from February 2010 to February 2011. Cyber crime victims lost Dh735m in 12 months
A Cyber War in the Middle East (Jan-Mar, 2012) with mutual DDoS and defacements was raging through the region. Hackers have dumped data using more than :-
450,000 Credit Cards
320,000 Facebook Accounts
105,000 Emails Accounts
Top Security Mistakes
Information leakage to customers, vendors, employees…
Poor and common password selection.
Granting Vendors/Consultants/Trainees/Visitors extra uncontrolled privileges.
Leaving the PC/laptop unlocked while leaving the desk.
Placing Critical Info. Assets in inappropriate locations.
Sending unauthorized copy of Nuqul’s information.
Abusing system privileges.
Don't share suspicious pages on social networks.
Proper Use of Laptops/PCs
Lock your computer once you are away from your desk.
Do not download any software from Internet to Company Computers or Laptops.
Refer to IT HelpDesk for Any support needed.
Shutdown your Laptops before taking it home.
Be careful not to leave your Laptop in the car at
How to avoid becoming
a fraud victim?
Know and follow your work policies and procedures.
Protect your password.
Know where you can get help.
Never be afraid to ask.
Raise a flag.
Protect your Password
Use a unique password for all of your important accounts.
Password change should be enforced every 30 days.
Password length should not be less than 10 characters long.
Password Lock out should be enforced after three false attempts.
Password should be Complex, i.e. contains Capital Letters, Special Characters, and Numbers.
Passwords should be new.
Easy to remember & hard to guess.
Keep your password as a reminder & in a secret place that isn’t easily visible.
Suspicious emails subjects, senders, and domain names
Don’t open URLs and attachments in strange emails (Especially zipped files, Word, Excel, PowerPoint and PDF)
Never provide sensitive information if requested
What to do?
Smart Phones Confidentiality Protection
Enable Security lock.
Use protection screen.
Avoid using unsecure wireless connection. (can be sniffed!).
Make Backup of Contacts/Data.
Use anti virus to protect your data.
Report stolen handsets Immediately to Physical Security & HelpDesk.
Don’t Install apps from untrusted sources.
Don’t Put any confidential documents on it.
Respect the security officer.
Follow Security Procedures.
Keep your personal belongings safe guarded at all times (i.e.; Mobile, Purse, Laptop…).
Report a lost, stolen or damaged Access card or Personal belonging immediately to Security division
Give, share or loan your Access Card.
Hold the door for unidentified individuals; i.e. do not permit “tail gaiting”.
Leave Visitors unescorted.
Ways of submitting
a Helpdesk Ticket
We are running
R E S O U R C E S
World's Biggest Data Breaches
1 - Resource Management
2 - Information Asset Management
3 - Information Security
4 - Help Desk system
Help Desk System
Q & A
Information Management Session