Netsafe/ AVG New Zealand. NetSafe/ AVG New Zealand. Cyber Security Research. Cyber Security Research. Supplementary Tables. March 2011.

Size: px
Start display at page:

Download "Netsafe/ AVG New Zealand. NetSafe/ AVG New Zealand. Cyber Security Research. Cyber Security Research. Supplementary Tables. March 2011."

Transcription

1 NetSafe/ AVG New Zealand

2 Contents Page 1. Objectives and Methodology 3 2. Summary and Conclusions 6 3. Main Findings 8 Online security a serious issue 9 Concern about online challenges 11 Most important online challenge 12 Reasons concerned about online challenges 13 Knowledge of online security 17 Online behaviour 18 Online behaviour demographic differences 19 Awareness of protection functions and products 20 Computer protected from threats 21 Types of protection used antivirus software 22 Types of protection used automatic updates 23 Types of protection used firewall software 24 Types of protection used anti spyware software 25 Advice on online security 26 Problems with online security 27 Types of problems encountered 28 Barriers to using online protection 29

3 1. Objectives and Methodology

4 Objectives To explore and measure attitudes to cyber security To assess online security behaviour in New Zealand

5 Methodology This report is based on a nation-wide telephone survey of 500 New Zealanders aged 18 years or older. Fieldwork was conducted from February Please note that the Christchurch earthquake occurred during fieldwork. After the first night of interviewing we closed the Christchurch quota and adjusted other South Island quotas accordingly. The margin of error for a 50% figure at the 95% confidence level for the sample of 500 is plus or minus 4.4%. The study was stratified by region, gender and age. On completion of fieldwork, the data was weighted by age, sex, region and ethnicity to reflect population data from Statistics New Zealand. We would usually have a quota of 11% for the Christchurch area however we only obtained 4% due to the earthquake. SAMPLE INFORMATION Sex Un-weighted % Weighted % Male Female Age Plus Region Auckland Wellington Christchurch* 4 11 Other North Island Other South Island* Base: All (n=500)

6 2. Summary and Conclusions

7 Summary and Conclusions 50% of New Zealanders believe online security is a serious issue, with only 14% believing it is not a serious issue. 36% had a neutral view or were unsure. Across a range of online challenges, New Zealanders are most concerned about child predators online, identity theft and computer security. In relation to these three online challenges, respondents are respectively, most concerned for the welfare of children, the loss of personal information and privacy, and acknowledgement of the risk to and importance of computers in their lives. Knowledge of online security risks and solutions is only moderate with 46% of New Zealanders saying they knew a lot or a fair amount. Knowledge is only slightly higher (52%) across those with a home computer and internet access at home. Respondents with home computers and internet access are relatively active online with 46% undertaking 10 or more of the 14 activities tested in the survey, 32% undertake eight to ten of the activities, and 28%, one to seven. Antivirus software (49%) is top-of-mind in terms of the protection and functions that should be enabled to secure a home computer, Cyber followed Security by firewall Research software (25%) and anti spyware software (10%). However, 42% could not nominate any products or functions when posed with this question. 89% of home computer users claim to use antivirus software, 84% automatic updates, 75% firewall software and 60% anti spyware software. However, only 46% have all four measures enabled. 7

8 Summary and Conclusions (cont.) Additionally, declared usage of all the protection software maybe overstated as there is quite low recall of brand for automatic updates, firewall software, and anti spyware software. Even 23% could not nominate their brand of antivirus software. The most common sources of advice for online security are family and friends (52%), followed by consultants or technicians (33%), the internet (15%) and software or hardware providers (12%). 27% claim to have encountered a problem with online security. The main problems are getting a virus from the internet or an , being infected by a Trojan or being hacked. The key barriers identified by home computer users for not enabling all measures to secure their computer are a lack of knowledge, lack of affordability, impact on internet speed and a lack of time or imperative.

9 2. Main Findings

10 Online security a serious issue Seriousness of online security: Around half of New Zealanders (50%) believe online security is a serious issue (combined where 5 means very serious and 1 means not serious at all); 14% felt it was not serious and 36% gave a neutral or unsure response. - Results were almost identical across those with a computer at home. Using a 1 to 5 scale where 1 means not serious at all and 5 means very serious - please rate how serious you think the issue of online security is for New Zealand? All (n=500) Those on higher incomes (household income greater than $100,000, personal income greater then $70,000) were less likely to view it as a serious issue, 38% and 35% respectively. Computer at home (n=425) % 5 Very serious Not serious Unsure

11 Concern about online challenges Concern about online challenges: New Zealanders were most concerned about child predators online (72% total concerned), identity theft (66%), loss of privacy (64%), online scams (61%) and computer security (61%) and online bullying (60%). - They were least concerned about internet addiction (35%), copyright infringement (41%) and pornography (54%). - Results were similar across all New Zealanders and home computer users. Using a 1 to 5 scale where 1 means not concerned at all and 5 means very concerned - how concerned are you are about the following online challenges? Child Predators online Identity Theft Loss of Privacy Online Scams Computer Security Online Bullying and Harassment Child predators online (72%) - Higher concern more likely to be female Identity theft (66%) - Higher concern more likely to be aged years Online scams (61%) - Higher concern more likely to be aged years Computer security (61%) - Higher concern more likely to have non-degree qualification Online bullying/ harassment (60%) - Higher concern more likely to be female, no home computer access Pornography Copyright infringement Internet Addiction Base: All (n=500) % 5 - very concerned not concerned Unsure Pornography (54%) - Higher concern more likely to be females, aged 45 plus years, retired, Internet addiction (35%) - Higher concern more likely to be aged 45 plus years, retired, no home computer access

12 Most important online challenge Most important online challenge: Respondents were asked to nominate the most important online challenge from the list of nine - child predators online, identity theft and computer security were clearly the greatest concerns. - Concern was similar across all New Zealanders and those with computer access at home. Child Predators online Identity Theft Computer Security Pornography Loss of Privacy Online Bullying and Harassment (Cyber bullying) Online Scams Internet Addiction Copyright infringement Which of these are you most concerned about? Unsure % Computer at home (n=425) Wellingtonians (7%) and those on mid-high household incomes ($70-100,000 per annum) (8%) were less concerned about computer security. Parents of dependent children (34%), those aged between years (36%), and with non-degree trade or technical qualifications (40%) were more concerned about child predators online. Those aged 60 years or more (19%), retired (28%) and without any qualifications (18%) were more concerned about pornography. All (n=500)

13 Reasons concerned about online challenges Reasons most concerned about child predators online (25%): The main reasons respondents were most concerned about child predators online were the need to protect children, the damage it can cause children and general disgust at this behaviour. Main reasons why most concerned about child predators online? % Need to protect children 65.4 Can cause damage to children/ harm that can happen 13.0 Disgusting and evil 9.5 Many dishonest people online 7.3 Anyone can be targeted, lack of control 5.2 Base: Those most concerned about child predators online; multiple response (n=127) Reasons most concerned about identity theft (18%): The main reasons respondents were most concerned about identity theft were concerns that they would lose personal information and privacy, the harm it can cause and the risk that criminals could access financial information. Main reasons why most concerned about identity theft? % Worried about protecting personal information and privacy 40.0 Harm it can cause 21.9 Risk of divulging financial information 14.6 Anyone can be targeted or reached 8.8 Aware of security risks and don t want it to happen 7.8 Many dishonest people online 3.7 Base: Those most concerned about identity theft; multiple response (n=91) 13

14 Reasons concerned about online challenges (cont.) Reasons most concerned about computer security (17%): The main reasons respondents were most concerned about computer security were a general awareness of the risks and the importance of their computers, concern that they might lose personal information and privacy, and that they might get a computer virus. Main reasons why most concerned about computer security? % Aware of security risks and my computer and its security is very important to me 48.2 Worried about protecting personal information and privacy 22.0 Worried about getting a virus 12.9 Risk of divulging financial information 9.6 Risk of scams 3.4 Base: Those most concerned about computer security; multiple response (n=84) Reasons most concerned about loss of privacy (9%): The main reasons respondents were most concerned about loss of privacy were the risk of losing personal information and privacy, concerns that someone could access their computer and the need to protect children. Main reasons why most concerned about loss of privacy? % Worried about protecting personal information and privacy 58.0 Worried about someone accessing my computer 11.1 Need to protect children 9.1 Worried about getting a virus that causes loss of privacy 6.3 Time required to keep up with it 4.7 Base: Those most concerned about loss of privacy; multiple response (n=47) 14

15 Reasons concerned about online challenges (cont.) Reasons most concerned about pornography (9%): The main reasons respondents were most concerned about pornography were the need to protect children, general disgust, and a belief that it should be illegal. Main reasons why most concerned about pornography? % Need to protect children 40.8 Disgusting and evil 18.3 Should be illegal 12.4 Anyone can be targeted when searching for other things 10.2 Harm it can cause 6.8 Base: Those most concerned about pornography; multiple response (n=47) Reasons most concerned about online bullying and harassment (8%): The main reasons respondents were most concerned about online bullying and harassment were that it can lead to suicide, and the need to protect children. Main reasons why most concerned about online bullying and harassment? Online bullying can lead to suicides 39.0 Need to protect children 33.7 Harm it can cause 10.0 Worried about protecting personal information and privacy 9.8 Supplementary Base: Tables Those most concerned about online bullying and harassment; multiple response (n=39) % 15

16 Reasons concerned about online challenges (cont.) Reasons most concerned about online scams (6%): The main reasons respondents were most concerned about online scams were the prevalence of attempts, the number of people instigating these scams and the risk of losing financial information. Reasons most concerned about internet addiction (2%): The main reason respondents were most concerned about internet addiction was that it the addiction had the potential to ruin lives. Reasons most concerned about copyright infringement (1%): The main reasons respondents were most concerned about copyright infringement were the potential financial impact and loss of their work. 16 Main reasons why most concerned about online scams? % People try scams all the time 35.0 Many dishonest people online 16.8 Risk of divulging financial information 14.1 More likely to happen to me 8.7 Anyone can be targeted 7.7 Base: Those most concerned about online scams; multiple response (n=29) Main reasons why most concerned about internet addiction? % Addiction ruins lives 62.5 Spend too much time on internet 25.0 Kids get addicted 25.0 Base: Those most concerned about internet addiction; multiple response (n=8) Supplementary Main Tables reasons why most concerned about copyright infringement? % Financial impact 50.0 Loss of research, work 50.0 Base: Those most concerned about copyright infringement; multiple response (n=4)

17 Knowledge of online security Knowledge of online security: Declared knowledge of computer security risks and solutions was only moderate with 46% saying they knew a lot or a fair amount while 54% know not that much or nothing at all. - Knowledge was only slightly higher across New Zealanders with a computer at home at 52% ( a lot or a fair amount ) and 48% ( not that much or nothing at all ). How much do you feel you know about computer security risks and solutions? - a lot, a fair amount, not that much or nothing at all? Males (52%) were more knowledgeable than females (41%). All (n=500) Computer at home (n=425) Those on low household incomes were less knowledgeable ($30,000 or less per annum) (29%). Tertiary educated were more knowledgeable (56%) while those with no qualifications (28%) or non-degree qualification (38%) were less knowledgeable % A lot A fair amount Not that much Nothing at all Unsure

18 Online behaviour Online behaviour: Most respondents with internet access at home took part in a range of online activities. The most common activities included checking , getting product information, looking for news, looking for travel information and online banking. - 40% claimed to undertake more than ten of the 14 activities tested, 32% between eight to ten and 28% one to seven activities. Profile ten plus activities Base: Those with a home computer with Internet access, 85% of all (n=425) - More likely to be Aucklanders, younger, in full-time work, higher income, have dependent children, tertiary educated Profile eight-ten activities - More likely to live in provincial North Island, be mid-aged, mid-higher income, New Zealand European Profile less than eight - More likely to be older, retired, lower income, live in a rural area, have no qualifications

19 Online behaviour demographic differences yes Check (97%) - More likely to be tertiary educated, more knowledgeable about online security Look for travel info (79%) - More likely to be aged years, higher income, in part-time work, tertiary educated, more knowledgeable about online security Pay bills online (71%) - More likely to be aged years, higher income, have dependent children, tertiary educated, more knowledgeable about online security Use online phone (50%) - More likely to be aged years, tertiary educated, more knowledgeable about online security Play games (39%) - More likely to be mid-low income, no qualifications, more knowledgeable about online security Get product info (84%) - More likely to be aged years, higher income, have dependent children, tertiary educated, more knowledgeable about online security Online banking (78%) - More likely to be aged years, higher income, in full or part-time work, have dependent children, more knowledgeable about online security Get info about Govt/ council services (65%) - More likely to be aged years, tertiary educated, more knowledgeable about online security Download video/music (50%) - More likely to be aged years, more knowledgeable about online security Conduct business (35%) - More likely to be higher income, in full-time work, have dependent children, more knowledgeable about online security Look for news (80%) - More likely to be aged years, mid-high income, tertiary educated, more knowledgeable about online security Buy things online (73%) - More likely to be aged years, higher income, in full-time work, have dependent children, tertiary educated, more knowledgeable about online security Visit social networking site (57%) - More likely to be aged years, Aucklanders, Wellingtonians, tertiary educated, more knowledgeable about online security Sell things online (48%) - More likely to be aged years, higher income, in full-time work, have dependent children, tertiary educated, more knowledgeable about online security

20 Awareness of protection functions and products Awareness of protection functions and products: All respondents were asked to spontaneously nominate the products or functions that should be used to secure a home computer. Antivirus software was nominated the most often at 49%, followed by firewall software (25%) and antispyware software (10%). 42% could not spontaneously nominate any products or functions or gave an unsure response. Would you list the products or functions that should be enabled to secure a home computer? Antivirus software 48.8 Firewall software 24.8 Antispyware software 10.0 Password protect it 3.5 Anti malware software 2.3 Anti spam software 2.1 Automatic updates 1.8 Parental control 1.1 Disable pop-ups 0.8 Prevent cookies 0.6 Add blockers 0.5 Regular scans 0.5 Supplementary Regular back-ups/ Tables Encryption/ Protect breaking of wireless internet 0.3 Filtering software/ Don t use Microsoft/ Use Mac/ Only use sites with secure site symbol AFCO systems/ Maxnet/ IP trackers/ Use Microsoft 0.1 No/ Unsure (first response) 41.6 Base: All; multiple response (n=500) % 0.2

21 Computer protected from threats Computer protected: A large majority (87%) believed that their home computer was protected from online threats. - Younger respondents (18-29 years), those on mid-level personal incomes ($40-50,000 per annum), those with no qualifications and with lower declared knowledge of online risks were less likely to say their computer was protected at 78%, 73%, 72% and 79% respectively. Of those with online protection, 89% claimed to use antivirus software, 84% automatic updates, 75% firewall software and 60% anti spyware software. - However, only 46% (n=197) of home computer users had all four products and functions enabled. 28% had three enabled, 17% had two enabled and 5% had only one enabled. Is your home computer protected from online threats? Unsure, 7 No, 6 Yes, 87 Base: Those with a home computer with Internet access, 85% of all (n=425) Base: Those with computer at home with Internet access, 85% of all (n=425)

22 Types of protection used antivirus software Antivirus software: 89% of respondents with home internet access claimed to use antivirus software. - Usage was lower among those on mid-level personal incomes ($40-50,000 per annum) (78%) and those with lower knowledge of online security risks (83%). Norton (24%) and AVG (20%) were the most commonly used antivirus software, followed by McAfee (10%). - 23% could not nominate their brand of antivirus software. Base: Those with computer at home with Internet access, 85% of all (n=425) Brand of antivirus software (>0.5%) % Norton 24.0 AVG 19.6 McAfee 9.5 Nod, ESET 3.8 Microsoft 3.5 Avast 3.2 Trend Micro 2.8 Symantec 1.9 Kaspersky 0.9 Firefox 0.8 Avero 0.7 Bit Defender 0.5 Unsure 23.4 Base: 89% that use Anti-virus software n=380

23 Types of protection used automatic updates Automatic updates: 84% of respondents with home internet access claimed to use automatic updates. - Usage was lower among those on mid-level personal incomes ($40-50,000 per annum) (63%), those aged between years (73%), Aucklanders (78%) and those with lower knowledge of online security risks (75%). The Microsoft (26%) automatic updates were most commonly used, followed by Norton (9%) and AVG (8%). - An indication that the use of automatic updates was softer than declared was the fact that 42% could not nominate the type of automatic updates they accessed. Brand of automatic updates (>0.5%) % Microsoft 26.0 Norton 8.8 AVG 7.8 McAfee 5.3 MAC, Apple software 3.5 Trend Micro 1.5 Avast 1.3 Nod 0.9 Kaspersky 0.6 Spybot 0.5 Unsure 42.3 Base: Those with computer at home with Internet access, 85% of all (n=425) Base: 84% that use automatic updates n=356

24 Types of protection used firewall software Firewall software: 75% of respondents with home internet access claimed to use firewall software. - Usage was lower among those with lower knowledge of online security risks (62%). Microsoft (15%) was the most commonly used firewall software, followed by Norton (7%), McAfee (7%) and AVG (6%). - As found with automatic updates, actual usage of firewall software maybe lower than declared as 49% could not nominate the type of firewall software they used. Brand of firewall software (>0.5%) % Microsoft 15.2 Norton 7.3 McAfee 6.6 AVG 6.2 Firefox 4.6 Trend Micro 1.8 MAC 1.4 Zone Alarms 0.9 Malware (bytes) 0.8 Router based 0.7 Avast/ Kaspersky/ Nod* 0.6 Comodo 0.5 Unsure 48.6 Base: Those with computer at home with Internet access, 85% of all (n=425) Base: 75% that use firewall software n=318, *all recorded %

25 Types of protection used anti spyware software Anti spyware software: 60% of respondents with home internet access claimed to use anti spyware software. - Usage was lower among those aged between years (53%), those with no qualifications (46%) and those with lower knowledge of online security risks (40%). AVG (11%), Norton (8%), McAfee (6%) and Spybot (6%) were the most commonly used anti spyware software. - As found with others, actual usage of anti spyware software maybe lower than declared as 46% could not nominate the type of software they used. Brand of anti spyware software (>0.5%) % AVG 10.5 Norton 8.0 McAfee 5.9 Spybot 5.6 Malware (bytes) 4.6 Microsoft 4.1 Trend Micro 2.0 Nod, ESET 1.8 Iolo 1.2 Avast 1.0 Spy doctor 0.9 Adware/ Kaspersky* 0.8 Comodo 0.6 Rising 0.5 Unsure 46.3 Base: Those with computer at home with Internet access, 85% of all (n=425) Base: 60% that use Anti-spyware software n=257, *all recorded %

26 Advice on online security Advice on online security: Family and friends was the most common source of advice on online security for home computer users (52%). This was followed by consultants or technicians (33%), the internet (16%) and software/ hardware providers (12%). Females (60%) and those with no qualifications (68%) were more likely to seek advice from friends or family. Those on household incomes greater than $100,000 per annum (42%) or personal incomes greater than $70,000 (46%) were more likely to seek advice from consultants or technicians. Those aged years (21%), Aucklanders (25%), those on household incomes greater than $100,000 per annum (23%) were more likely to seek advice from the internet. Base: Those with computer at home with Internet access, multiple response, 85% of all (n=425)

27 Problems with online security Encountered problem with online security: 27% of home computer users claimed to have experienced a problem with online security. Have you ever had a problem with online security when using your home computer? Unsure, 1 Less educated (no qualifications) were less likely to declare having encountered a problem (17%) while those with a non-degree trade or technical qualification were more likely (39%). Yes, 27 Similarly, those with lower knowledge of online security risks were less likely to declare having encountered a problem (21%) while those with greater knowledge were more likely (32%). This maybe an indication that some are unaware that their security has been breached. No, 72 Base: Those with computer at home with Internet access, 85% of all (n=425)

28 Types of Problems Encountered Types of problems: Of those that had had a problem with online security, 33% claimed to have got a virus from the internet and an additional 13% that they had got a virus from an . A further 12% had been infected by a Trojan, 11% were hacked, 5% had had fraudulent transactions on their credit card and another 5% received nuisance s or SPAM. What was that problem? What happened? % Got a virus from the internet 33 Got a virus from s 13 Infected by Trojan horses, Trojans 12 Was hacked 11 Fraudulent transactions on my credit card 5 Received nuisance s or SPAM 5 Infected by Spyware 4 Someone access our wireless network 3 Infected by worm 2 Phishing of information 2 Computer can be very slow sometimes when doing simple actions 2 Keystroke logging of information 1 Lost information 1 Computer dialling international phone numbers without our knowledge 1 Something purchased from me with a stolen credit card 1 Issues with on line banking 1 Account theft 1 Malware 1 Unsure 14 Base: Those with computer at home with Internet access and have had a problem with online security, (n=114)

29 Barriers to using online protection Barriers to using online protection: The barriers to taking appropriate security measures was explored among those with internet access at home. 29% claimed to undertake all the actions outlined in the preamble. Across the barriers identified, the main barriers were lack of knowledge (14%) and lack of affordability (11%). At a lower level were the impact on internet speed (6%), the lack of time (4%) and lack of imperative (4%). It is recommended that the following computer security steps are taken to protect a computer: installation of antivirus software, antispyware software, all software set to auto update, strong passwords, and regular backups. What do you think would be the barriers to you having all those items in place, all the time? No barriers, what I do 29.2 Lack of knowledge 14.0 Can t afford it 10.5 Slow internet means difficult to keep up to date, impact on download limit 6.1 No time 4.4 Don t care, threat not likely 4.0 Lazy, being organised 1.3 Forget passwords 1.9 Don t use computer very often 1.1 Too complicated, too many things you have to use 0.8 Trust software company 0.5 Forget to do back-ups and updates 0.4 Don t want to install antivirus software, can cause faults 0.6 Dislike automatic updates prefer to be in control 0.3 Trust provider/ Keep backups on hard drives/ Block if firewalls too high/ Limited access to websites/ Have pop-ups* Base: Those with computer at home with Internet access, multiple response (n=425), * all recorded % % 0.2

30

PROTECT YOUR COMPUTER AND YOUR PRIVACY!

PROTECT YOUR COMPUTER AND YOUR PRIVACY! PROTECT YOUR COMPUTER AND YOUR PRIVACY! Fraud comes in many shapes simple: the loss of both money protecting your computer and Take action and get peace of and sizes, but the outcome is and time. That

More information

Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:

Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details: Malicious software About ENISA The European Network and Information Security Agency (ENISA) is an EU agency created to advance the functioning of the internal market. ENISA is a centre of excellence for

More information

Welcome To The L.R.F.H.S. Computer Group Wednesday 27 th November 2013

Welcome To The L.R.F.H.S. Computer Group Wednesday 27 th November 2013 Welcome To The L.R.F.H.S. Computer Group Wednesday 27 th November 2013 BACKUP SECURITY AND THE CLOUD BACK UP ALWAYS BACK UP TO AN EXTERNAL DEVICE OR REMOVAL MEDIA- NEVER DIRECTLY ON TO YOUR COMPUTER IF

More information

2011 NCSA / McAfee Internet Home Users Survey

2011 NCSA / McAfee Internet Home Users Survey 2011 NCSA / McAfee Internet Home Users Survey National Cyber Security Alliance McAfee Zogby International October 2011 Methodology and Sample Characteristics IBOPE Zogby International was commissioned

More information

Viruses, Trojans and Worms Oh My! 2006 Technology Leadership Presentation Series

Viruses, Trojans and Worms Oh My! 2006 Technology Leadership Presentation Series Viruses, Trojans and Worms Oh My! 2006 Technology Leadership Presentation Series Why is my computer running so slow? What are all of these little windows popping up on my system? Why did my home page change?

More information

INTERNET & COMPUTER SECURITY March 20, 2010. Scoville Library. ccayne@biblio.org

INTERNET & COMPUTER SECURITY March 20, 2010. Scoville Library. ccayne@biblio.org INTERNET & COMPUTER SECURITY March 20, 2010 Scoville Library ccayne@biblio.org Internet: Computer Password strength Phishing Malware Email scams Identity Theft Viruses Windows updates Browser updates Backup

More information

Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning

Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning Lee Zelyck Network Administrator Regina Public Library Malware, Spyware, Trojans

More information

Software Engineering 4C03 Class Project. Computer Networks and Computer Security COMBATING HACKERS

Software Engineering 4C03 Class Project. Computer Networks and Computer Security COMBATING HACKERS Software Engineering 4C03 Class Project Computer Networks and Computer Security COMBATING HACKERS Done By: Ratinder Ricky Gill Student Number: 0048973 E-Mail: gillrr@mcmaster.ca Due: Tuesday April 5, 2005

More information

Why is a strong password important?

Why is a strong password important? Internet Security Why is a strong password important? Identity theft motives: To gain access to resources For the challenge/fun Personal reasons Theft methods Brute forcing and other script hacking methods

More information

High Speed Internet - User Guide. Welcome to. your world.

High Speed Internet - User Guide. Welcome to. your world. High Speed Internet - User Guide Welcome to your world. 1 Welcome to your world :) Thank you for choosing Cogeco High Speed Internet. Welcome to your new High Speed Internet service. When it comes to a

More information

Report on Consumer Behaviors and Perceptions of Mobile Security. Presented by NQ Mobile & NCSA January 25, 2012

Report on Consumer Behaviors and Perceptions of Mobile Security. Presented by NQ Mobile & NCSA January 25, 2012 Report on Consumer Behaviors and Perceptions of Mobile Security Presented by NQ Mobile & NCSA January 25, 2012 Methodology Online survey of 1,158 consumers. Participants had to own a smartphone. Respondents

More information

2011 NATIONAL SMALL BUSINESS STUDY

2011 NATIONAL SMALL BUSINESS STUDY 2011 NATIONAL SMALL BUSINESS STUDY The National Cyber Security Alliance has conducted a new study with Symantec to analyze cyber security practices, behaviors and perceptions of small businesses throughout

More information

When you listen to the news, you hear about many different forms of computer infection(s). The most common are:

When you listen to the news, you hear about many different forms of computer infection(s). The most common are: Access to information and entertainment, credit and financial services, products from every corner of the world even to your work is greater than ever. Thanks to the Internet, you can conduct your banking,

More information

BCS IT User Syllabus IT Security for Users Level 2. Version 1.0

BCS IT User Syllabus IT Security for Users Level 2. Version 1.0 BCS IT User Syllabus IT for Users Level 2 Version 1.0 June 2009 ITS2.1 System Performance ITS2.1.1 Unwanted messages ITS2.1.2 Malicious ITS2.1.1.1 ITS2.1.1.2 ITS2.1.2.1 ITS2.1.2.2 ITS2.1.2.3 ITS2.1.2.4

More information

Saheel KHOYRATTY. Partner Technology Advisor

Saheel KHOYRATTY. Partner Technology Advisor Saheel KHOYRATTY Partner Technology Advisor The Internet = A World of Opportunities Look what s at your fingertips A way to communicate with friends, family, colleagues Access to information and entertainment

More information

Certified Secure Computer User

Certified Secure Computer User Certified Secure Computer User Exam Info Exam Name CSCU (112-12) Exam Credit Towards Certification Certified Secure Computer User (CSCU). Students need to pass the online EC-Council exam to receive the

More information

STRONGER ONLINE SECURITY

STRONGER ONLINE SECURITY STRONGER ONLINE SECURITY Enhanced online banking without compromise Manage your business banking efficiently and securely Internet banking has given business leaders and treasurers greater control of financial

More information

Identity Theft Protection

Identity Theft Protection Identity Theft Protection Email Home EDUCATION on DANGER ZONES Internet Payments Telephone ID theft occurs when someone uses your personal information with out your knowledge to commit fraud. Some terms

More information

Laura Royer, Extension Faculty, University of Florida/IFAS Osceola County Extension Services

Laura Royer, Extension Faculty, University of Florida/IFAS Osceola County Extension Services Consumer Choices: Computer Security Software Prepared by: Dave Palmer, Instructional Media Faculty, University of Florida/IFAS Extension, South Central Extension District Laura Royer, Extension Faculty,

More information

Essentials of PC Security: Central Library Tech Center Evansville Vanderburgh Public Library

Essentials of PC Security: Central Library Tech Center Evansville Vanderburgh Public Library Essentials of PC Security: Central Library Tech Center Evansville Vanderburgh Public Library Why should you be concerned? There are over 1 million known computer viruses. An unprotected computer on the

More information

HOME COMPUTER SECURITY AWARENESS

HOME COMPUTER SECURITY AWARENESS HOME COMPUTER SECURITY AWARENESS Sponsoring faculty: Dr Rose Shumba Students: Melissa A Karolewski, Alicia Coon, Sara Raffensperger, Louisa Ehinlaiye Ometere Computer Science Department Indiana University

More information

2012 NCSA / McAfee Online Safety Survey

2012 NCSA / McAfee Online Safety Survey 2012 NCSA / McAfee Online Safety Survey National Cyber Security Alliance McAfee JZ Analytics October 2012 Methodology and Sample Characteristics JZ Analytics was commissioned by the National Cyber Security

More information

Ohio University Computer Services Center October, 2004 Spyware, Adware, and Virus Guide

Ohio University Computer Services Center October, 2004 Spyware, Adware, and Virus Guide Ohio University Computer Services Center October, 2004 Spyware, Adware, and Virus Guide Definitions Malware is term meaning malicious software. Malware is software designed to disrupt a computer system.

More information

2009 Antispyware Coalition Public Workshop

2009 Antispyware Coalition Public Workshop 2009 Antispyware Coalition Public Workshop Jeffrey Fox Technology Editor, Consumer Reports Media contact: Lauren Hackett, 914-378-2561 Background For several years, Consumer Reports has been testing and

More information

Bookmarks for Desktop Self-Defense

Bookmarks for Desktop Self-Defense Basic Security Tips Bookmarks for Desktop Self-Defense Get Safe Online http://www.getsafeonline.org/ Get Safe Online will help you protect yourself against Internet threats. The site is sponsored by government

More information

Computer Security Maintenance Information and Self-Check Activities

Computer Security Maintenance Information and Self-Check Activities Computer Security Maintenance Information and Self-Check Activities Overview Unlike what many people think, computers are not designed to be maintenance free. Just like cars they need routine maintenance.

More information

Fully supported Antivirus software (Managed Antivirus)

Fully supported Antivirus software (Managed Antivirus) You are here: Antivirus > Managed Antivirus Vendors Fully supported Antivirus software (Managed Antivirus) Antivirus (AV) vendors often release software updates. We hard-code the update into our RMM agent

More information

Spyware. Michael Glenn Technology Management Michael.Glenn@Qwest.com. 2004 Qwest Communications International Inc.

Spyware. Michael Glenn Technology Management Michael.Glenn@Qwest.com. 2004 Qwest Communications International Inc. Spyware Michael Glenn Technology Management Michael.Glenn@Qwest.com Agenda Security Fundamentals Current Issues Spyware Definitions Overlaps of Threats Best Practices What Service Providers are Doing References

More information

thriller INTERNET SECURITY

thriller INTERNET SECURITY + thriller INTERNET SECURITY Saturday, October 31, 2009 1:30 PM 3:00 PM Matthew 28:18-20 Website Ministry + Agenda 2 Scripture (Col 3:12-15) Prayer Internet Security Security Threats Security Protection

More information

Willem Wiechers 3 rd March 2015

Willem Wiechers 3 rd March 2015 Willem Wiechers 3 rd March 2015 1 Why do we want Malware & Virus Protection? To make our computers save Wish to keep our data private Wish to have a safe environment to do our online banking, shopping,

More information

OCT Training & Technology Solutions Training@qc.cuny.edu (718) 997-4875

OCT Training & Technology Solutions Training@qc.cuny.edu (718) 997-4875 OCT Training & Technology Solutions Training@qc.cuny.edu (718) 997-4875 Understanding Information Security Information Security Information security refers to safeguarding information from misuse and theft,

More information

2014 Teen Internet Safety Survey. Conducted by The Futures Company

2014 Teen Internet Safety Survey. Conducted by The Futures Company 2014 Teen Internet Safety Survey Conducted by The Futures Company Contents Background, Objectives, Methodology Major Findings Important Trends Next Steps 2 Background + Objectives Cox s commitment to Online

More information

Introduction to Computer Security Table of Contents

Introduction to Computer Security Table of Contents Introduction to Computer Security Table of Contents Introduction... 2 1 - Viruses... 3 Virus Scanners... 3 2 - Spyware... 7 Spyware Scanners... 8 3 - Firewalls... 10 Windows Firewall... 10 4 - References...

More information

LAW OFFICE SECURITY for Small Firms and Sole Practitioners. Prepared by Andrew Mason, Scott Phelps & Mason, Saskatoon Saskatchewan

LAW OFFICE SECURITY for Small Firms and Sole Practitioners. Prepared by Andrew Mason, Scott Phelps & Mason, Saskatoon Saskatchewan LAW OFFICE SECURITY for Small Firms and Sole Practitioners Prepared by Andrew Mason, Scott Phelps & Mason, Saskatoon Saskatchewan 1. Introduction CONTENTS 2. Security Consciousness Having a Firm Security

More information

Survey on the Internet Security Awareness

Survey on the Internet Security Awareness Survey on the Internet Security Awareness Implementation date: March 2009 *This survey was conducted as part of Academic Frontier Project for Private Universities funded by MEXT(Ministry of Education,

More information

BE SAFE ONLINE: Lesson Plan

BE SAFE ONLINE: Lesson Plan BE SAFE ONLINE: Lesson Plan Overview Danger lurks online. Web access, social media, computers, tablets and smart phones expose users to the possibility of fraud and identity theft. Learn the steps to take

More information

Computer Security: Best Practices for Home Computing. Presented by Student Help Desk Merced Community College

Computer Security: Best Practices for Home Computing. Presented by Student Help Desk Merced Community College Computer Security: Best Practices for Home Computing Presented by Student Help Desk Merced Community College Defining the Problem Symantec documented 2,636 new vulnerabilities in 2003, an average of seven

More information

OUR DIOCESAN ENCOUNTER WITH CYBER THEFT. Roni Argetsinger Diocese of Des Moines FACTS AND INVESTIGATION

OUR DIOCESAN ENCOUNTER WITH CYBER THEFT. Roni Argetsinger Diocese of Des Moines FACTS AND INVESTIGATION OUR DIOCESAN ENCOUNTER WITH CYBER THEFT Roni Argetsinger Diocese of Des Moines FACTS AND INVESTIGATION 1 RETRIEVAL PROCESS CHANGE 2 PROCESSES IMMEDIATELY AFFECTED Update Server Administrator Passwords

More information

Cyber Security Awareness. Internet Safety Intro. www.staysafeonline.org

Cyber Security Awareness. Internet Safety Intro. www.staysafeonline.org Cyber Security Awareness Internet Safety Intro www.staysafeonline.org 1 What is Cyber Security? Cyber Security is the body of technologies, processes and practices designed to protect from attack, damage

More information

Cyber Security Education & Awareness. Guide for User s

Cyber Security Education & Awareness. Guide for User s Cyber Security Education & Awareness Guide for User s Release Q1 2010 Version 1.1 CONTENTS 1. Introduction 2. Protection against Nasty Code 3. System Security Maintenance 4. Personal Firewalls 5. Wireless

More information

Internet Safety & Awareness. Dan Tomlinson 02/23/2013

Internet Safety & Awareness. Dan Tomlinson 02/23/2013 Internet Safety & Awareness Dan Tomlinson 02/23/2013 Internet risks Top six tips for online safety What to do if there is a problem Online safety resources Internet Risks Primary Threats to your Computer

More information

OCR LEVEL 3 CAMBRIDGE TECHNICAL

OCR LEVEL 3 CAMBRIDGE TECHNICAL Cambridge TECHNICALS OCR LEVEL 3 CAMBRIDGE TECHNICAL CERTIFICATE/DIPLOMA IN IT NETWORKED SYSTEMS SECURITY J/601/7332 LEVEL 3 UNIT 28 GUIDED LEARNING HOURS: 60 UNIT CREDIT VALUE: 10 NETWORKED SYSTEMS SECURITY

More information

Infocomm Sec rity is incomplete without U Be aware,

Infocomm Sec rity is incomplete without U Be aware, Infocomm Sec rity is incomplete without U Be aware, responsible secure! HACKER Smack that What you can do with these five online security measures... ANTI-VIRUS SCAMS UPDATE FIREWALL PASSWORD [ 2 ] FASTEN

More information

Introduction (Contd )

Introduction (Contd ) Introduction In 2008, mobile devices continue to rapidly replace desktop computers. Mobile devices create easier ways to communicate and work more efficiently while away from the corporate office. In addition,

More information

AOL/NCSA Online Safety Study. Conducted by America Online and the National Cyber Security Alliance December 2005

AOL/NCSA Online Safety Study. Conducted by America Online and the National Cyber Security Alliance December 2005 AOL/NCSA Online Safety Study Conducted by America Online and the National Cyber Security Alliance December 2005 AOL/NCSA Online Safety Study Conducted by America Online and the National Cyber Security

More information

Who Needs Parental Controls?

Who Needs Parental Controls? A Survey Of Awareness, Attitudes, And Use Of Online Parental Controls Findings From A National Survey Among Parents Supported by: A Survey Of Awareness, Attitudes, And Use Of Online Parental Controls Findings

More information

SPYWARE: AN EXPLORATION OF INCIDENCE AND STUDENT PERCEPTION

SPYWARE: AN EXPLORATION OF INCIDENCE AND STUDENT PERCEPTION SPYWARE: AN EXPLORATION OF INCIDENCE AND STUDENT PERCEPTION Carl J. Case, St. Bonaventure University, ccase@sbu.edu ABSTRACT Spyware has been identified as one of the emerging and growing threats to organizations.

More information

Supported Anti Virus from ESAP 2-6-1

Supported Anti Virus from ESAP 2-6-1 Supported Anti Virus from ESAP 2-6-1 avast! Antivirus (4.8.x) avast! Antivirus (4.x) avast! Antivirus (managed) (4.x) avast! Antivirus Professional (4.8.x) avast! Antivirus Professional (4.x) avast! Business

More information

Cyber Security Solutions for Small Businesses Comparison Report: A Sampling of Cyber Security Solutions Designed for the Small Business Community

Cyber Security Solutions for Small Businesses Comparison Report: A Sampling of Cyber Security Solutions Designed for the Small Business Community Cyber Security Solutions for Small Businesses Comparison Report: A Sampling of Cyber Security Solutions Designed for the Small Business Community A Sampling of Cyber Security Solutions Designed for the

More information

How are we keeping Hackers away from our UCD networks and computer systems?

How are we keeping Hackers away from our UCD networks and computer systems? How are we keeping Hackers away from our UCD networks and computer systems? Cybercrime Sony's Hacking Scandal Could Cost The Company $100 Million - http://www.businessinsider.com/sonys-hacking-scandal-could-cost-the-company-100-million-2014-12

More information

Certified Secure Computer User

Certified Secure Computer User Certified Secure Computer User Course Outline Module 01: Foundations of Security Essential Terminologies Computer Security Why Security? Potential Losses Due to Security Attacks Elements of Security The

More information

Survey of Spyware Tools and Counter Measures

Survey of Spyware Tools and Counter Measures Survey of Spyware Tools and Counter Measures Dr. Robert W. Baldwin Plus Five Consulting, Inc. Kevin W. Kingdon Intellitrove, Inc. Outline Spyware Demonstration Spyware: Architecture & Features Ethics Counter

More information

Corporate Account Takeover & Information Security Awareness

Corporate Account Takeover & Information Security Awareness Corporate Account Takeover & Information Security Awareness The information contained in this session may contain privileged and confidential information. This presentation is for information purposes

More information

THE HOME LOAN SAVINGS BANK. Corporate Account Takeover & Information Security Awareness

THE HOME LOAN SAVINGS BANK. Corporate Account Takeover & Information Security Awareness THE HOME LOAN SAVINGS BANK Corporate Account Takeover & Information Security Awareness The information contained in this session may contain privileged and confidential information. This presentation is

More information

SecuritySecuritySecurity!

SecuritySecuritySecurity! SecuritySecuritySecurity! It was the best of times and the worst of times... I suspect Dickens would be quite surprised to learn how prophetic his words would be over 150 years after he penned them. THE

More information

Corporate Account Takeover & Information Security Awareness. Customer Training

Corporate Account Takeover & Information Security Awareness. Customer Training Corporate Account Takeover & Information Security Awareness Customer Training No computer system can provide absolute security under all conditions. NO SECURITY MEASURE OR LIST OF SECURITY MEASURES CAN

More information

TRAINING FOR AMERICAN MOMENTUM BANK CLIENTS. Corporate Account Takeover & Information Security Awareness

TRAINING FOR AMERICAN MOMENTUM BANK CLIENTS. Corporate Account Takeover & Information Security Awareness TRAINING FOR AMERICAN MOMENTUM BANK CLIENTS Corporate Account Takeover & Information Security Awareness The information contained in this session may contain privileged and confidential information. This

More information

Development and Certification of Skills for European Educators Focused on Safe ICT and Cyber Threat Prevention

Development and Certification of Skills for European Educators Focused on Safe ICT and Cyber Threat Prevention Development and Certification of Skills for European Educators Focused on Safe ICT and Cyber Threat Prevention RenataDanieliene,EugenijusTelesius, Information Technologies Institute Lithuania Abstract

More information

Statistical Analysis of Internet Security Threats. Daniel G. James

Statistical Analysis of Internet Security Threats. Daniel G. James Statistical Analysis of Internet Security Threats Daniel G. James ABSTRACT The purpose of this paper is to analyze the statistics surrounding the most common security threats faced by Internet users. There

More information

Protect Yourself. Who is asking? What information are they asking for? Why do they need it?

Protect Yourself. Who is asking? What information are they asking for? Why do they need it? Protect Yourself Your home computer serves many purposes: email, shopping, social networking and more. As you surf the Internet, you should be aware of the various ways to protect yourself. Of primary

More information

Mifflinburg Bank & Trust. Corporate Account Takeover & Information Security Awareness

Mifflinburg Bank & Trust. Corporate Account Takeover & Information Security Awareness Mifflinburg Bank & Trust Corporate Account Takeover & Information Security Awareness The information contained in this session may contain privileged and confidential information. This presentation is

More information

This guide will go through the common ways that a user can make their computer more secure.

This guide will go through the common ways that a user can make their computer more secure. A beginners guide in how to make a Laptop/PC more secure. This guide will go through the common ways that a user can make their computer more secure. Here are the key points covered: 1) Device Password

More information

2012 NORTON CYBERCRIME REPORT

2012 NORTON CYBERCRIME REPORT 2012 NORTON CYBERCRIME REPORT 2012 NORTON CYBERCRIME REPORT 24 COUNTRIES AUSTRALIA, BRAZIL, CANADA, CHINA, COLOMBIA, DENMARK, FRANCE, GERMANY, INDIA, ITALY, JAPAN, MEXICO, NETHERLANDS, NEW ZEALAND, POLAND,

More information

Welcome to Part 2 of the online course, Spyware and Adware What s in Your Computer?

Welcome to Part 2 of the online course, Spyware and Adware What s in Your Computer? Welcome to Part 2 of the online course, Spyware and Adware What s in Your Computer? 1 2 This is the second part of a two-part course on spyware and adware. In this portion of the course we will: Review

More information

Policy No: 2-B8. Originally Released: 2001. Date for Review: 2016

Policy No: 2-B8. Originally Released: 2001. Date for Review: 2016 Topic: Information and Communication Technology use by Students Policy No: 2-B8 Policy Area: Standing Committee: Education Religious Education and Curriculum Committee Originally Released: 2001 Date for

More information

Youth Online Behavior

Youth Online Behavior Youth Online Behavior Created by: Andrea Pieters, Project Researcher, Youth and Education Christine Krupin, Project Researcher, Youth and Education June 1, 2010 Harris Interactive 6/21/2010 1 Methodology

More information

Special Eurobarometer 423 CYBER SECURITY SUMMARY

Special Eurobarometer 423 CYBER SECURITY SUMMARY Special Eurobarometer 423 CYBER SECURITY SUMMARY Fieldwork: October 2014 Publication: February 2015 This survey has been requested by the European Commission, Directorate-General for Home Affairs and co-ordinated

More information

Securing small business. Firewalls Anti-virus Anti-spyware

Securing small business. Firewalls Anti-virus Anti-spyware Securing small business Firewalls Anti-virus Anti-spyware Introduction Due to the phenomenal growth of the Internet in the last decade companies and individuals find it hard to operate without a presence

More information

Network Security. Demo: Web browser

Network Security. Demo: Web browser Network Security Demo: Web browser Email Messages An email message can be instantly forwarded around the globe, even if accidentally. Do not write anything in a message that you will later regret! Read

More information

It s 2 o clock: Who Has Your Data? Josh Krueger Chief Technology Officer Integrity Technology Solutions

It s 2 o clock: Who Has Your Data? Josh Krueger Chief Technology Officer Integrity Technology Solutions It s 2 o clock: Who Has Your Data? Josh Krueger Chief Technology Officer Integrity Technology Solutions Your home is your business and your farm is your network. But who has access to it? Can you protect

More information

Computer and Information Security End User Questionnaire

Computer and Information Security End User Questionnaire Computer and Information Security End User Questionnaire Human Factors Issues in Computer and Information Security Funded by the National Science Foundation: EIA-0120092 Project http://cis.engr.wisc.edu/

More information

C-SAVE. Scenario #1 Jake and the Bad Virus. The two major C3 concepts this scenario illustrates are:

C-SAVE. Scenario #1 Jake and the Bad Virus. The two major C3 concepts this scenario illustrates are: Scenario #1 Jake and the Bad Virus The two major C3 concepts this scenario illustrates are: Cyber Security: Jake compromised his computer s security by providing personal information to an unknown online

More information

Computer Viruses: How to Avoid Infection

Computer Viruses: How to Avoid Infection Viruses From viruses to worms to Trojan Horses, the catchall term virus describes a threat that's been around almost as long as computers. These rogue programs exist for the simple reason to cause you

More information

Internet threats: steps to security for your small business

Internet threats: steps to security for your small business Internet threats: 7 steps to security for your small business Proactive solutions for small businesses A restaurant offers free WiFi to its patrons. The controller of an accounting firm receives a confidential

More information

Cyber Security. An Executive Imperative for Business Owners. 77 Westport Plaza, St. Louis, MO 63416 p 314.439.4700 f 314.439.4799

Cyber Security. An Executive Imperative for Business Owners. 77 Westport Plaza, St. Louis, MO 63416 p 314.439.4700 f 314.439.4799 Cyber Security An Executive Imperative for Business Owners SSE Network Services www.ssenetwork.com 77 Westport Plaza, St. Louis, MO 63416 p 314.439.4700 f 314.439.4799 Pretecht SM by SSE predicts and remedies

More information

Internet tools and techniques at this level will be defined as advanced because:

Internet tools and techniques at this level will be defined as advanced because: Unit Title: Using the Internet OCR unit number: 41 Level: 3 Credit value: 5 Guided learning hours: 40 Unit reference number: F/502/4298 Unit purpose and aim This is the ability to set up and use appropriate

More information

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft) 1- A (firewall) is a computer program that permits a user on the internal network to access the internet but severely restricts transmissions from the outside 2- A (system failure) is the prolonged malfunction

More information

Risks REGIONAL IT COORDINATOR UNIVERSITY OF MARYLAND EXTENSION FEBRUARY 2012

Risks REGIONAL IT COORDINATOR UNIVERSITY OF MARYLAND EXTENSION FEBRUARY 2012 Minimizing Technology-Related Risks NAN STENZEL NAN STENZEL REGIONAL IT COORDINATOR UNIVERSITY OF MARYLAND EXTENSION FEBRUARY 2012 Current Computer Topics Buying a New Computer In-home Wireless Security

More information

Remote Deposit Quick Start Guide

Remote Deposit Quick Start Guide Treasury Management Fraud Prevention How to Protect Your Business Remote Deposit Quick Start Guide What s Inside We re committed to the safety of your company s financial information. We want to make you

More information

Anti-Virus Comparative

Anti-Virus Comparative Anti-Virus Comparative On-demand Detection of Malicious Software includes false alarm and on-demand scanning speed test Language: English August 2010 Last Revision: 5 th October 2010 Table of Contents

More information

National Cyber Security Month 2015: Daily Security Awareness Tips

National Cyber Security Month 2015: Daily Security Awareness Tips National Cyber Security Month 2015: Daily Security Awareness Tips October 1 New Threats Are Constantly Being Developed. Protect Your Home Computer and Personal Devices by Automatically Installing OS Updates.

More information

Secure Your Mobile Workplace

Secure Your Mobile Workplace Secure Your Mobile Workplace Sunny Leung Senior System Engineer Symantec 3th Dec, 2013 1 Agenda 1. The Threats 2. The Protection 3. Q&A 2 The Mobile Workplaces The Threats 4 Targeted Attacks up 42% in

More information

USING SOFTWARE TO STAY SAFE ON THE INTERNET INFORMATION FOR PARENTS AND CARERS

USING SOFTWARE TO STAY SAFE ON THE INTERNET INFORMATION FOR PARENTS AND CARERS USING SOFTWARE TO STAY SAFE ON THE INTERNET INFORMATION FOR PARENTS AND CARERS HOW CAN I KEEP MY CHILD SAFE ONLINE? Children love the Internet and go online to have fun, do homework, stay in touch with

More information

Study into the Sales of Add-on General Insurance Products

Study into the Sales of Add-on General Insurance Products Study into the Sales of Add-on General Insurance Quantitative Consumer Research Report Prepared For: Financial Conduct Authority (FCA) March, 2014 Authorised Contact Persons Frances Green Research Director

More information

Kiwis Managing their Online Identity Information

Kiwis Managing their Online Identity Information Kiwis Managing their Online Identity Information Interim Report Survey Findings Professor Miriam Lips, Dr Elizabeth Eppel, Dr Dalice Sim, Lynn Barlow and Dr Karl Lofgren Victoria University of Wellington

More information

Seven Practices for Computer Security

Seven Practices for Computer Security A WorkLife4You Guide Seven Practices for Computer Security Access to information and entertainment, credit and financial services, products from every corner of the world even to your work is greater than

More information

Information Technology

Information Technology Information Technology Symantec Endpoint Protection Download and Installation The packages on the web include virus and spyware protection for 32 and 64 bit Microsoft Windows systems. Minimum system requirements:

More information

Protecting Your Computer and Your Identity. Security Awareness

Protecting Your Computer and Your Identity. Security Awareness Protecting Your Computer and Your Identity Security Awareness Office of Enterprise Security Department of Information Technology August 2007 1 Table of Contents Why Protect Your Computer 3 Viruses, Worms,

More information

Is your business secure in a hosted world?

Is your business secure in a hosted world? Is your business secure in a hosted world? Threats to the security of business data are constantly growing and evolving - What can you do ensure your data remains secure? Introduction The safe use of computer

More information

WORTHING COLLEGE STUDENT IT SECURITY POLICY. October 2014

WORTHING COLLEGE STUDENT IT SECURITY POLICY. October 2014 WORTHING COLLEGE STUDENT IT SECURITY POLICY October 2014 Policy name Student Information Technology Security Policy Author: Lesley May/Michael Perry Approved by SLT October 2014 Approved by Corporation

More information

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS ftrsecure.com Can You Separate Myths From Facts? Many Internet myths still persist that could leave you vulnerable to internet crimes. Check out

More information

Additional details >>> HERE <<<

Additional details >>> HERE <<< Additional details >>> HERE http://dbvir.com/noadware/pdx/chsd32085/

More information

Digital Barracuda Information Security Reports that the Risk from Viruses and Worms is Only the Tip of the Iceberg FACT SHEET

Digital Barracuda Information Security Reports that the Risk from Viruses and Worms is Only the Tip of the Iceberg FACT SHEET Digital Barracuda Information Security Worms is Only the Tip FACT SHEET from Viruses and Worms is Only the Tip Do you have security with teeth? You had better, because if the worms don t get you, the viruses

More information

WISE Online: An Internet and Mobile Phone Guide. http://esafety.ngfl-cymru.org.uk

WISE Online: An Internet and Mobile Phone Guide. http://esafety.ngfl-cymru.org.uk WISE Online: An Internet and Mobile Phone Guide http://esafety.ngfl-cymru.org.uk File sharing and Copyright Everyone loves to file share to get music files. But here are some points to take note of: Downloading

More information

EA USA Online Data Protection Suite. Frequently Asked Questions

EA USA Online Data Protection Suite. Frequently Asked Questions EA USA Online Data Protection Suite Frequently Asked Questions TABLE OF CONTENTS EA USA ONLINE DATA PROTECTION SUITE ABOUT THE ONLINE DATA PROTECTION SUITE... 3 What is included in the Online Data Protection

More information

Cyber Security Solutions:

Cyber Security Solutions: ThisIsCable for Business Report Series Cyber Security Solutions: A Sampling of Cyber Security Solutions Designed for the Small Business Community Comparison Report Produced by BizTechReports.com Editorial

More information

Emerging Security Technological Threats

Emerging Security Technological Threats Emerging Security Technological Threats Jamie Gillespie Training and Education Team Leader, AusCERT About AusCERT Australia s national CERT Collect, monitor, advise on threats and vulnerabilities Incident

More information

National Cyber Security Awareness Month Kicks Off Today with Official Launch Event, Business Summit and Release of Online Safety Survey

National Cyber Security Awareness Month Kicks Off Today with Official Launch Event, Business Summit and Release of Online Safety Survey PRESS RELEASE Oct. 1, 2012, 9:00 a.m. EDT National Cyber Security Awareness Month Kicks Off Today with Official Launch Event, Business Summit and Release of Online Safety Survey WASHINGTON, Oct. 1, 2012

More information

Information Security. Louis Morgan, CISSP Information Security Officer

Information Security. Louis Morgan, CISSP Information Security Officer Information Security By Louis Morgan, CISSP Information Security Officer Why Bother with IT Security? Recent estimate - 900 million personal computers worldwide. Computer hackers are out there. How long

More information