Computer Security Awareness at Home. Presented By Gavin Worden

Size: px
Start display at page:

Download "Computer Security Awareness at Home. Presented By Gavin Worden"

Transcription

1 Computer Security Awareness at Home Presented By Gavin Worden

2 Agenda What is Computer Security? What is at Risk? What can be done to protect your computer? Overview of the Internet and World Wide Web Protecting your Home Network Protecting your Home Computer General On-Line Security Strategies Social Networking Security Privacy and the Internet Smart Phone Security

3 From the News The IC³, which is a partnership between the FBI and the National White Collar Crime Center (NW3C), received an average of 25,317 cybercrime complaints per month last year, noted the 2010 Internet Crime Report. A sophisticated data mining virus (Zeus Trojan) that has emptied bank accounts in the United Kingdom was found to have infected a computer in the Virginia Tech controller's office. About 370 people were affected. Botnets used in banking credential theft and other criminal enterprises made huge gains in 2010, claiming more than seven times as many victims as the previous year, according to a report issued by a security firm that follows the large networks of infected machines.

4 From the News Security experts are warning of a new Facebook phishing scam designed to harvest log-in credentials. The scam promises address to those who register, but is actually a trap to gather log-ins and passwords for the site. A new IRS scam looks convincing. With a subject line declaring "TAX EXEMPTION NOTIFICATION," the message told the recipient to fill out and fax an attached form that asked for personal information so he would not miss out on a special tax immunity. In New York, scam callers have been indicating that they are from the Bureau of Criminal Investigations or the Cyber Crime Unit of the New York State Police and requesting money for a bad debt or an unpaid loan, according to a press release from the New York State

5 What is Computer Security?

6 What is Computer Security? According to the Computer Emergency Response Team (CERT) at Carnegie Mellon University: Computer security is the process of preventing and detecting unauthorized use of your computer. Prevention measures help you to stop unauthorized users (also known as "intruders") from accessing any part of your computer system. Detection helps you to determine whether or not someone attempted to break into your system, if they were successful, and what they may have done.

7 Why should you care about Computer Security?

8 Why should you care about Computer Security? Once again, according to CERT: We use computers for everything from banking and investing to shopping and communicating with others through or chat programs. Although you may not consider your communications "top secret," you probably do not want strangers reading your , using your computer to attack other systems, sending forged from your computer, or examining personal information stored on your computer (such as financial statements).

9 How easy is it to break into your computer? Unfortunately, intruders are always discovering new vulnerabilities (informally called "holes") to exploit in computer software. The complexity of software makes it increasingly difficult to thoroughly test the security of computer systems. There is no such thing as a 100% secure computer. - CERT Coordination Center Home Network Security, (2001),

10 Why would someone break into your computer? Intruders often want to gain control of your computer so they can use it to launch attacks on other computer systems. Having control of your computer gives them the ability to hide their true location as they launch attacks, often against highprofile computer systems such as government or financial systems. Intruders may be able to watch all of your actions on the computer, or cause damage to your computer by reformatting your hard drive or changing your data. - CERT Coordination Center Home Network Security, (2001),

11 What is at risk? Your Personal Information Your Financial Assets Your computer being used to attack others And more

12 What can be done to protect your computer? Use the strategy of Defense in Depth Utilize multiple security layers and methods to reduce the likelihood that you will fall victim to an intruder. Examples include: Use a network firewall and a software firewall on your PC. Perform regular software updates on your operating system and installed applications Install anti-malware software and keep it up to date.

13 Overview of the Internet and the World Wide Web

14 Overview of the Internet and the World Wide Web The History of the Internet: In the 1960 s, basic networking technologies were being developed in support of the telephone systems. In 1969, the Advanced Research Projects Agency (ARPA) launched ARPAnet the foundation for the modern Internet. ARPAnet connected to a number of other networks resulting in a Network of Networks. Between 1972 and 1980, ARPAnet and its partner networks grew from 15 interconnected computerrs to over 100, Kurose, J., & Ross, K. (2008). Computer Networking, 4 th Edition. Boston, MA: Pearson Education.

15 Overview of the Internet and the World Wide Web Video The History of the Internet (YouTube)

16 Overview of the Internet and the World Wide Web The History of the World Wide Web: The Internet is a network that data travels over, while the World Wide Web is a graphical user interface that we interact with directly through web pages. The Web was invented at the European Council for Nuclear Research (CERN) by Tim Berners-Lee between 1989 and Berners-Lee and his associates developed the initial versions of Hypertext Markup Language (HTML), Hypertext Transfer Protocol (HTTP), a web server, and a web browser the four key components of the Web. - Kurose, J., & Ross, K. (2008). Computer Networking, 4 th Edition. Boston, MA: Pearson Education.

17 Protecting your home network

18 Protecting your home network Use a hardware firewall on your home network. Never directly connect your computer to your Internet Service Provider (ISP). Hardware firewalls are often bundled with inexpensive consumer Internet share devices like cable modems, gateways, or wireless routers.

19 Protecting your home network Wireless Security Wireless Security Basics: 1. Change the default password on your wireless router per the manufacturer s instructions. The DEFAULT password is openly published on the internet, allowing anyone with in range to access your wireless network and make security configuration changes. 2. Hide the name of your wireless network. The technical name of your wireless network is the SSID. Change the default SSID name and select the option DO NOT BROADCAST SSID. This means people cannot easily locate and connect to your wireless network without knowing your new SSID.

20 Protecting your home network Wireless Security Wireless Security Basics Continued: 3. Be sure to enable wireless encryption (WPA2 is recommended) per the manufacturer s instructions. Enabling WPA2 will also require that you set a passphrase for access your wireless network. This means that only computers that are configured with your WPA2 passphrase will be able to connect to your wireless network. This will reduce the likely hood of someone stealing your bandwidth or trying to hack your wireless network.

21 Protecting your Computer (Laptop, Tablet, etc.)

22 Protecting your Computer (Laptop, Tablet, etc.) Be sure to install a security software suite that includes at least the following security components: A software firewall Intrusion Prevention Anti-malware (anti-virus, anti-spyware, etc)

23 Protecting your Computer (Laptop, Tablet, etc.) Schedule automatic updates for your computer s operating system. This reduces the number of security wholes that an attacker can use to gain access to your computer. Routinely update the applications installed on your computer. Many software applications now include software update utilities that notify you when new software updates are available.

24 General On-Line Security Strategies

25 General On-Line Security Strategies Be sure to use STRONG PASSWORDS on websites that store personal or otherwise sensitive information. What makes a strong password? Make it lengthy. Each character that you add to your password increases the protection that it provides many times over. Your passwords should be 8 or more characters in length; 14 characters or longer is ideal. Many systems also support use of the space bar in passwords, so you can create a phrase made of many words (a "pass phrase"). A pass phrase is often easier to remember than a simple password, as well as longer and harder to guess. Combine letters, numbers, and symbols. The greater variety of characters that you have in your password, the harder it is to guess. - How to Create and Use Strong Passwords, Microsoft,

26 General On-Line Security Strategies What makes a strong password? (continued) Use words and phrases that are easy for you to remember, but difficult for others to guess. The easiest way to remember your passwords and pass phrases is to write them down. Contrary to popular belief, there is nothing wrong with writing passwords down, but they need to be adequately protected in order to remain secure and effective. In general, passwords written on a piece of paper are more difficult to compromise across the Internet than a password manager, Web site, or other software-based storage tool, such as password managers. - How to Create and Use Strong Passwords, Microsoft,

27 General On-Line Security Strategies Examples of WEAK Passwords: george (someone s name) (someone s birthdate) 1234 (simple number strings) Examples of STRONG Passwords: des*3r!9 (completely random) LO0k@m3! (approximates a word or phrase using special characters)

28 General On-Line Security Strategies How do you securely store all of your passwords? Most if not all of the major consumer security software vendors offer some sort of secure password vault. Secure Password Vault = Encrypted application to securely store usernames and passwords. Many smart phones include secure password vault applications for access to your passwords on the go. IMPORTANT! Only use secure password storage applications from companies you trust! Also, avoid on-line password managers they are only as secure as the company and applications storing your information.

29 General On-Line Security Strategies What is Social Engineering? Social engineering is the act of manipulating people into performing actions or divulging confidential information, rather than by breaking in or using technical cracking techniques.

30 General On-Line Security Strategies Three important Social Engineering concepts: Pretexting Phishing Spoofing

31 General On-Line Security Strategies Pretexting is the act of creating and using an invented scenario (the pretext) to engage a targeted victim in a manner that increases the chance the victim will divulge information or perform actions that would be unlikely in ordinary circumstances. Involves prior research for impersonation (e.g., information about you, your agency, our organization, etc.) to establish legitimacy in the mind of the target.

32 General On-Line Security Strategies Phishing is a technique of fraudulently obtaining private information. The phisher sends an that appears to come from a legitimate source like a government agency requesting information and warning of some dire consequence if it is not provided. The may contain links to a fraudulent web page that seems legitimate with agency logos and content and may initiate a download that is ultimately malware.

33 General On-Line Security Strategies spoofing is a term used to describe activity in which the sender address and other parts of the header are altered to appear as though the originated from a different source.

34 General On-Line Security Strategies Pretexting, Spoofing, & Phishing are often used together. Spear Phishing is a targeted phishing attack specific organizations or individuals are targeted.

35 General On-Line Security Strategies Phishing Examples: Security experts are warning of a new Facebook phishing scam designed to harvest log-in credentials. The scam promises address to those who register, but is actually a trap to gather log-ins and passwords for the site. IRS scam looks convincing. With a subject line declaring "TAX EXEMPTION NOTIFICATION," the message told the recipient to fill out and fax an attached form that asked for personal information so he would not miss out on a special tax immunity. In New York, scam callers have been indicating that they are from the Bureau of Criminal Investigations or the Cyber Crime Unit of the New York State Police and requesting money for a bad debt or an unpaid loan, according to a press release from the New York State

36 General On-Line Security Strategies Important tips for avoiding Phishing scams: Never open an attachment if you have not first verified that both the sender and the attachment are legitimate. Never click on a hyperlink in an until you have verified the sender and know that the link is legitimate. Do not assume that an is legitimate solely based on the sender s address.

37 Social Networking Security

38 Social Networking Security What are some examples of social networking sites that you are aware of?

39 Social Networking Security Social Networking site examples include: Classmates Facebook Flickr Friendster LinkedIn MySpace Twitter Yelp And the list goes on and on

40 Social Networking Security Be careful about what information you post on Social Media Sites! Why??

41 Social Networking Security Information that you post on Social Media sites can potentially reveal sensitive information, including: Your full name Date of birth Address Family members (Mother s Maiden Name) Work and/or work location You schedule (when you are away from home)

42 Social Networking Security When aggregated, these pieces of information can increase your risk of identity theft. Information commonly posted on social networking sites can be used for password retrieval on other sites. Information about your location or schedule can aid burglars and other criminals.

43 Social Networking Security Be sure to use social networking site security features to their maximum potential! Limit who can see your information on-line. Think twice about posting or tweeting information about your location or schedule. Do not post information or pictures that reveal your address. Do not post your full date of birth. Avoid posting information that can be aggregated for use with a password recovery program: High School, Place of Birth, Maiden Name, Etc.

44 Social Networking Security Do YOU know of any examples of Social Networking security mistakes? Let s hear them!

45 Privacy and the Internet

46 Privacy and the Internet Be careful about making personal information available on the Internet. The Internet is a public medium accessible by people all over the world. Think beyond traditional social networking applications. Consider blogs, news articles, school work, business marketing material, etc.

47 Privacy and the Internet Even on protected sites, your information is only as secure as the web application or company that stores your information. Information you put on the Internet may still be available long after you delete it. Information about you can be gathered from all over the internet into a single report for use by the good guys, or the bad guys.

48 Privacy and the Internet Information Aggregators What are Personal Information Aggregators? Personal information aggregators aggregate and display personal information collected from a variety of public sources (such as social network accounts, blog posts, phone book listings, customersubmitted reviews, real estate listings, and databases of other aggregators) and sell detailed reports on individuals for anyone who pays for them (free reports are often available as well). - Spokeo. Snopes.com. (2011). Retrieved from

49 Privacy and the Internet Information Aggregators What are personal information aggregators used for? Personal Information Aggregators operate in much the same way as other data aggregators (financial, topical, social). They use automated processes and custom algorithms to gather and correlate related data from across the Internet. The idea is to create a convenient centralized location to access data that normally resides in multiple locations.

50 Privacy and the Internet Information Aggregators Examples of Personal Information Aggregators: Spokeo.com Pipl.com Zabasearch.com There are many more

51 Privacy and the Internet Information Aggregators Often times, personal information aggregators contain more personal information than a person is comfortable with. Identity thieves, or others with bad intentions, can use this information in support of their criminal pursuits.

52 Privacy and the Internet Information Aggregators Threat Mitigation Strategies: Many of these aggregators offer a way to Opt Out for free (still need to deal with source data). Limit the personal information that you put on the Internet. Limit the personal information that you supply to retailers. Conduct regular personal reconnaissance and damage control by researching your personal information that is available on search engines and aggregator sites.

53 Smart Phone Security

54 Smart Phone Security Today s Smart Phones are essentially fully functional hand held computers. Smart Phones can: Browse the web. Provide access. Take and send pictures or video to anyone anywhere Support numerous applications that take advantage of state of the art technology like the Internet and global positioning systems (GPS).

55 Smart Phone Security Location-Based Services Location-Based Services: Use internet-connected mobile devices geolocation capabilities to let users notify others of their locations by checking in to that location. Some of these geosocial services emphasize social networking functions, and can notify friends on the service when the user is nearby. Other services take a gaming approach, in which check-ins are used to unlock levels or badges, or can be used to earn a certain title when the user has checked in to that location more than any other user. - Zickuhr, K., and Smith, A. 4% of online Americans use location-based services. Pew Internet. November 4, 2010.

56 Smart Phone Security Location-Based Services Foursquare is a web and mobile application that allows registered users to connect with friends and update their location. Points are awarded for "checking in" at venues. Users can choose to have their check-ins posted on their accounts on Twitter, Facebook or both. Facebook Places Facebook Places, like existing location-based apps, uses GPS so people can "check in" on their mobile phones, letting friends know where they are and what they're up to. Gowalla Primarily a mobile web application that allows users to checkin to locations that they visit using their mobile device. Upon checking-in, users may receive items as a bonus and these can be swapped or dropped at Spots. - Wikipeida.org

57 Smart Phone Security Geotagging Geotagging is the process of adding geographical identification information to various media such as photographs, video, websites, SMS messages, or RSS feeds. It is commonly used for photographs. Some cell phones like the iphone and Motorola Backflip utilize a GPS chip along with built-in cameras to allow users to automatically geotag photos. Geographic coordinates can also be added to a photograph after the photograph is taken by attaching the photograph to a map using programs such as Flickr and Panoramio. - Geotagging. Wikipedia. Retrieved from

58 Read the full story here: Smart Phone Security - U.S. ARMY Social Medaia Roundup. Geotags and Location-Based Social Networking. Retreived from Geotagging In August of 2010, Adam Savage, of MythBusters, took a photo of his vehicle using his smartphone. He then posted the photo to his Twitter account including the phrase off to work. Since the photo was taken by his smartphone, the image contained metadata reveling the exact geographical location the photo was taken. So by simply taking and posting a photo, Savage revealed the exact location of his home, the vehicle he drives and the time he leaves for work.

59 Smart Phone Security Risks of using Location-Based Services and geotagging: Establishing patterns of where you go and when. Could be used to determine when you are not home. Could be used to determine the location of your home and/or work. These pieces of information can be used by criminals or other ill-intentioned individuals.

60 Conclusion Review: What is Computer Security? What is at Risk? What can be done to protect your computer? Overview of the Internet and World Wide Web Protecting your Home Network Protecting your Home Computer General On-Line Security Strategies Social Networking Security Privacy and the Internet Smart Phone Security

61 Conclusion 1. Be aware of basic computer security concepts. 2. Protect your personal information. 3. Protect your home network (Wireless Security!) 4. Protect your home computers 5. Be SMART when you are on-line! 6. Avoid publicly sharing personal information 7. Be aware of the security risks with mobile computing devices (Smart Phones)

62 QUESTIONS??

63 Computer Security at Home Presented By Gavin Worden

Malware & Botnets. Botnets

Malware & Botnets. Botnets - 2 - Malware & Botnets The Internet is a powerful and useful tool, but in the same way that you shouldn t drive without buckling your seat belt or ride a bike without a helmet, you shouldn t venture online

More information

Social Media and Cyber Safety

Social Media and Cyber Safety Social Media and Cyber Safety Presented to the National Association of REALTORS by Andrew Wooten Safety and Security Consultant andrew@justbesafe.com Social Media and Cyber Safety Our instructor today

More information

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS ftrsecure.com Can You Separate Myths From Facts? Many Internet myths still persist that could leave you vulnerable to internet crimes. Check out

More information

Protect Yourself. Who is asking? What information are they asking for? Why do they need it?

Protect Yourself. Who is asking? What information are they asking for? Why do they need it? Protect Yourself Your home computer serves many purposes: email, shopping, social networking and more. As you surf the Internet, you should be aware of the various ways to protect yourself. Of primary

More information

Marlon R Clarke, Ph. D., CISSP, CISM Director Network Operations and Services, NSU 10-17-2013

Marlon R Clarke, Ph. D., CISSP, CISM Director Network Operations and Services, NSU 10-17-2013 Marlon R Clarke, Ph. D., CISSP, CISM Director Network Operations and Services, NSU 10-17-2013 Todays Discussion Overview of Computer and Internet Security What is Computer and Internet Security Who Should

More information

Tips for Banking Online Safely

Tips for Banking Online Safely If proper attention is given to safety and security, banking and monetary activities can be completed online in a convenient and effective fashion. This guide helps to establish procedures for remaining

More information

White paper. Phishing, Vishing and Smishing: Old Threats Present New Risks

White paper. Phishing, Vishing and Smishing: Old Threats Present New Risks White paper Phishing, Vishing and Smishing: Old Threats Present New Risks How much do you really know about phishing, vishing and smishing? Phishing, vishing, and smishing are not new threats. They have

More information

National Cyber Security Month 2015: Daily Security Awareness Tips

National Cyber Security Month 2015: Daily Security Awareness Tips National Cyber Security Month 2015: Daily Security Awareness Tips October 1 New Threats Are Constantly Being Developed. Protect Your Home Computer and Personal Devices by Automatically Installing OS Updates.

More information

Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines

Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines 1. Implement anti-virus software An anti-virus program is necessary to protect your computer from malicious programs,

More information

Learn to protect yourself from Identity Theft. First National Bank can help.

Learn to protect yourself from Identity Theft. First National Bank can help. Learn to protect yourself from Identity Theft. First National Bank can help. Your identity is one of the most valuable things you own. It s important to keep your identity from being stolen by someone

More information

Online Security Awareness - UAE Exchange - Foreign Exchange Send Money UAE Exchange

Online Security Awareness - UAE Exchange - Foreign Exchange Send Money UAE Exchange The responsibility of safeguarding your personal information starts with you. Your information is critical and it must be protected from unauthorised disclosure, modification or destruction. Here we are

More information

High Speed Internet - User Guide. Welcome to. your world.

High Speed Internet - User Guide. Welcome to. your world. High Speed Internet - User Guide Welcome to your world. 1 Welcome to your world :) Thank you for choosing Cogeco High Speed Internet. Welcome to your new High Speed Internet service. When it comes to a

More information

Protection from Fraud and Identity Theft

Protection from Fraud and Identity Theft Table of Contents Protection from Fraud & Identity Theft... 1 Simple Steps to Secure Your Devices... 1 Setting Up Your Computer and/or Mobile Device... 2 Adding Security Software... 2 Internet Safety Tips...

More information

ONLINE IDENTITY THEFT KEEP YOURSELF SAFE FROM BESTPRACTICES WHAT DO YOU NEED TO DO IF YOU SUSPECT YOUR WHAT DO YOU NEED TO DO IF YOU SUSPECT YOUR

ONLINE IDENTITY THEFT KEEP YOURSELF SAFE FROM BESTPRACTICES WHAT DO YOU NEED TO DO IF YOU SUSPECT YOUR WHAT DO YOU NEED TO DO IF YOU SUSPECT YOUR ONLINE IDENTITY THEFT KEEP YOURSELF SAFE FROM BESTPRACTICES 01 One must remember that everyone and anyone is a potential target. These cybercriminals and attackers often use different tactics to lure different

More information

ONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS

ONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS $ ONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS Boston Private Bank & Trust Company takes great care to safeguard the security of your Online Banking transactions. In addition to our robust security

More information

The following information was provided by SANS and discusses IT Security Awareness. It was last updated in 2015.

The following information was provided by SANS and discusses IT Security Awareness. It was last updated in 2015. The following information was provided by SANS and discusses IT Security Awareness. It was last updated in 2015. By completing this module and the quiz, you will receive credit for CW 170, which is required

More information

Online Banking Fraud Prevention Recommendations and Best Practices

Online Banking Fraud Prevention Recommendations and Best Practices Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee at Continental National Bank of Miami needs to know

More information

OPSEC and Safe Social Networking

OPSEC and Safe Social Networking OPSEC and Safe Social Networking Agenda Introduction Did you know? Social media access What not to post Privacy settings Geotagging Social Media OPSEC for units Social media concerns for Families and Family

More information

Fraud Prevention Tips

Fraud Prevention Tips Fraud Prevention Tips The best defense against fraud or identity theft is a proactive approach. Here are a few steps you can take to help protect yourself. Protect your identity Copy the front and back

More information

When visiting online banking's sign-on page, your browser establishes a secure session with our server.

When visiting online banking's sign-on page, your browser establishes a secure session with our server. The privacy of communications between you (your browser) and our servers is ensured via encryption. Encryption scrambles messages exchanged between your browser and our online banking server. How Encryption

More information

BE SAFE ONLINE: Lesson Plan

BE SAFE ONLINE: Lesson Plan BE SAFE ONLINE: Lesson Plan Overview Danger lurks online. Web access, social media, computers, tablets and smart phones expose users to the possibility of fraud and identity theft. Learn the steps to take

More information

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft) 1- A (firewall) is a computer program that permits a user on the internal network to access the internet but severely restricts transmissions from the outside 2- A (system failure) is the prolonged malfunction

More information

Proactive Credential Monitoring as a Method of Fraud Prevention and Risk Mitigation. By Marc Ostryniec, vice president, CSID

Proactive Credential Monitoring as a Method of Fraud Prevention and Risk Mitigation. By Marc Ostryniec, vice president, CSID Proactive Credential Monitoring as a Method of Fraud Prevention and Risk Mitigation By Marc Ostryniec, vice president, CSID The increase in volume, severity, publicity and fallout of recent data breaches

More information

Identity Theft and Online Security

Identity Theft and Online Security Identity Theft and Online Security ACI-588788 American Century Investment Services, Inc. Goals for Presentation Identity Theft - What is it and how are we at risk? Social Media - How much online security

More information

Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning

Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning Lee Zelyck Network Administrator Regina Public Library Malware, Spyware, Trojans

More information

10 Quick Tips to Mobile Security

10 Quick Tips to Mobile Security 10 Quick Tips to Mobile Security 10 Quick Tips to Mobile Security contents 03 Introduction 05 Mobile Threats and Consequences 06 Important Mobile Statistics 07 Top 10 Mobile Safety Tips 19 Resources 22

More information

NATIONAL CYBER SECURITY AWARENESS MONTH

NATIONAL CYBER SECURITY AWARENESS MONTH NATIONAL CYBER SECURITY AWARENESS MONTH Tip 1: Security is everyone s responsibility. Develop an awareness framework that challenges, educates and empowers your customers and employees to be part of the

More information

It may look like this all has to do with your password, but that s not the only factor to worry about.

It may look like this all has to do with your password, but that s not the only factor to worry about. Account Security One of the easiest ways to lose control of private information is to use poor safeguards on internet accounts like web-based email, online banking and social media (Facebook, Twitter).

More information

Safe Practices for Online Banking

Safe Practices for Online Banking November 2012 Follow these guidelines to help protect your information while banking online. At First Entertainment Credit Union, our goal is to provide you with the best all around banking experience.

More information

Chapter 11 Manage Computing Securely, Safely and Ethically. Discovering Computers 2012. Your Interactive Guide to the Digital World

Chapter 11 Manage Computing Securely, Safely and Ethically. Discovering Computers 2012. Your Interactive Guide to the Digital World Chapter 11 Manage Computing Securely, Safely and Ethically Discovering Computers 2012 Your Interactive Guide to the Digital World Objectives Overview Define the term, computer security risks, and briefly

More information

Internet Scout Patch Workbook

Internet Scout Patch Workbook Workbook This workbook can help you but you still need to read the program guide. The work space provided for each requirement should be used by the Scout to make notes for discussing the item with his

More information

Remote Deposit Quick Start Guide

Remote Deposit Quick Start Guide Treasury Management Fraud Prevention How to Protect Your Business Remote Deposit Quick Start Guide What s Inside We re committed to the safety of your company s financial information. We want to make you

More information

INFOCOMM SEC RITY. is INCOMPLETE WITHOUT. Be aware, responsible. secure!

INFOCOMM SEC RITY. is INCOMPLETE WITHOUT. Be aware, responsible. secure! INFOCOMM SEC RITY is INCOMPLETE WITHOUT Be aware, responsible secure! U HACKER Smack that What you can do with these five online security measures... ANTI-VIRUS SCAMS UPDATE FIREWALL PASSWORD FASTEN UP!

More information

INTERNET & COMPUTER SECURITY March 20, 2010. Scoville Library. ccayne@biblio.org

INTERNET & COMPUTER SECURITY March 20, 2010. Scoville Library. ccayne@biblio.org INTERNET & COMPUTER SECURITY March 20, 2010 Scoville Library ccayne@biblio.org Internet: Computer Password strength Phishing Malware Email scams Identity Theft Viruses Windows updates Browser updates Backup

More information

Why is a strong password important?

Why is a strong password important? Internet Security Why is a strong password important? Identity theft motives: To gain access to resources For the challenge/fun Personal reasons Theft methods Brute forcing and other script hacking methods

More information

Tahoe Tech Group serves as your technology partner with a focus on providing cost effective and long term solutions.

Tahoe Tech Group serves as your technology partner with a focus on providing cost effective and long term solutions. Tahoe Tech Group LLC Cyber Security Briefing Truckee Donner Chamber of Commerce March 6, 2015 Tahoe Tech Group serves as your technology partner with a focus on providing cost effective and long term solutions.

More information

Cyber Security. Securing Your Mobile and Online Banking Transactions

Cyber Security. Securing Your Mobile and Online Banking Transactions Cyber Security Securing Your Mobile and Online Banking Transactions For additional copies or to download this document, please visit: http://msisac.cisecurity.org/resources/guides 2014 Center for Internet

More information

Desktop and Laptop Security Policy

Desktop and Laptop Security Policy Desktop and Laptop Security Policy Appendix A Examples of Desktop and Laptop standards and guidelines 1. Implement anti-virus software An anti-virus program is necessary to protect your computer from malicious

More information

The Hidden Dangers of Public WiFi

The Hidden Dangers of Public WiFi WHITEPAPER: OCTOBER 2014 The Hidden Dangers of Public WiFi 2 EXECUTIVE SUMMARY 4 MARKET DYNAMICS 4 The Promise of Public WiFi 5 The Problem with Public WiFi 6 MARKET BEHAVIOR 6 Most People Do Not Protect

More information

1. Any email requesting personal information, or asking you to verify an account, is usually a scam... even if it looks authentic.

1. Any email requesting personal information, or asking you to verify an account, is usually a scam... even if it looks authentic. Your identity is one of the most valuable things you own. It s important to keep your identity from being stolen by someone who can potentially harm your good name and financial well-being. Identity theft

More information

Reliance Bank Fraud Prevention Best Practices

Reliance Bank Fraud Prevention Best Practices Reliance Bank Fraud Prevention Best Practices May 2013 User ID and Password Guidelines Create a strong password with at least 8 characters that includes a combination of mixed case letters and numbers.

More information

Digital Safety and Privacy

Digital Safety and Privacy Digital Safety and Privacy Class Description: As computers and the Internet become more and more the way we communicate, we need to be aware of potential threats to our security online. This class discusses

More information

Information Security It s Everyone s Responsibility

Information Security It s Everyone s Responsibility Information Security It s Everyone s Responsibility Developed By The University of Texas at Dallas (ISO) Purpose of Training As an employee, you are often the first line of defense protecting valuable

More information

Introduction to Cyber Security

Introduction to Cyber Security Mark R. Herring Attorney General Commonwealth of Virginia Office of the Attorney General 900 East Main Street Richmond, Virginia 23219 (804) 786-2071 (Telephone) (804) 786-1991 (Facsimile) Introduction

More information

Cyber Security Awareness

Cyber Security Awareness Cyber Security Awareness User IDs and Passwords Home Computer Protection Protecting your Information Firewalls Malicious Code Protection Mobile Computing Security Wireless Security Patching Possible Symptoms

More information

Common Cyber Threats. Common cyber threats include:

Common Cyber Threats. Common cyber threats include: Common Cyber Threats: and Common Cyber Threats... 2 Phishing and Spear Phishing... 3... 3... 4 Malicious Code... 5... 5... 5 Weak and Default Passwords... 6... 6... 6 Unpatched or Outdated Software Vulnerabilities...

More information

Retail/Consumer Client. Internet Banking Awareness and Education Program

Retail/Consumer Client. Internet Banking Awareness and Education Program Retail/Consumer Client Internet Banking Awareness and Education Program Table of Contents Securing Your Environment... 3 Unsolicited Client Contact... 3 Protecting Your Identity... 3 E-mail Risk... 3 Internet

More information

STOP. THINK. CONNECT. Online Safety Quiz

STOP. THINK. CONNECT. Online Safety Quiz STOP. THINK. CONNECT. Online Safety Quiz Round 1: Safety and Security Kristina is on Facebook and receives a friend request from a boy she doesn t know. What should she do? A. Accept the friend request.

More information

What are the common online dangers?

What are the common online dangers? ONLINE SECURITY GUIDELINES Internet Banking is convenient and times saving. You can do remittances, place online deposit and other transactions through online banking with the convenience and privacy of

More information

PROTECT YOUR COMPUTER AND YOUR PRIVACY!

PROTECT YOUR COMPUTER AND YOUR PRIVACY! PROTECT YOUR COMPUTER AND YOUR PRIVACY! Fraud comes in many shapes simple: the loss of both money protecting your computer and Take action and get peace of and sizes, but the outcome is and time. That

More information

INFORMATION SECURITY FOR YOUR AGENCY

INFORMATION SECURITY FOR YOUR AGENCY INFORMATION SECURITY FOR YOUR AGENCY Presenter: Chad Knutson Secure Banking Solutions, LLC CONTACT INFORMATION Dr. Kevin Streff Professor at Dakota State University Director - National Center for the Protection

More information

Basic Security Considerations for Email and Web Browsing

Basic Security Considerations for Email and Web Browsing Basic Security Considerations for Email and Web Browsing There has been a significant increase in spear phishing and other such social engineering attacks via email in the last quarter of 2015, with notable

More information

2016 Digital Safety Class UNDERSTAND YOUR RISKS AND STAY TOTALLY SECURE JESSE ROBERTSON, TECH 4 LIFE

2016 Digital Safety Class UNDERSTAND YOUR RISKS AND STAY TOTALLY SECURE JESSE ROBERTSON, TECH 4 LIFE 2016 Digital Safety Class UNDERSTAND YOUR RISKS AND STAY TOTALLY SECURE JESSE ROBERTSON, TECH 4 LIFE WHO ARE WE? 12 years of local Tech, Training and Website services Service the 4 areas of life Regularly

More information

What you need to know to keep your computer safe on the Internet

What you need to know to keep your computer safe on the Internet What you need to know to keep your computer safe on the Internet Tip 1: Always install Operating System updates The most important steps for any computer user is to always install updates, especially security

More information

Business Identity Fraud Prevention Checklist

Business Identity Fraud Prevention Checklist Business Identity Fraud Prevention Checklist 9 Critical Things Every Business Owner Should Do Business identity thieves and fraudsters are clever and determined, and can quickly take advantage of business

More information

Defense Media Activity Guide To Keeping Your Social Media Accounts Secure

Defense Media Activity Guide To Keeping Your Social Media Accounts Secure Guide To Keeping Your Social Media Accounts Secure Social media is an integral part of the strategic communications and public affairs missions of the Department of Defense. Like any asset, it is something

More information

Payment Systems Department

Payment Systems Department v Note: Please follow these guidelines for your safety as you enjoy the convenience of technology. However these guidelines are general; therefore, specific precautions may be taken as warranted by the

More information

Fraud Detection and Prevention. Timothy P. Minahan Vice President Government Banking TD Bank

Fraud Detection and Prevention. Timothy P. Minahan Vice President Government Banking TD Bank Fraud Detection and Prevention Timothy P. Minahan Vice President Government Banking TD Bank Prevention vs. Detection Prevention controls are designed to keep fraud from occurring Detection controls are

More information

Basic Computer Security Part 2

Basic Computer Security Part 2 Basic Computer Security Part 2 Presenter David Schaefer, MBA OCC Manager of Desktop Support Adjunct Security Instructor: Walsh College, Oakland Community College, Lawrence Technology University Welcome

More information

Cybercrimes NATIONAL CRIME PREVENTION COUNCIL

Cybercrimes NATIONAL CRIME PREVENTION COUNCIL NATIONAL CRIME PREVENTION COUNCIL What is Cybercrime? A crime committed or facilitated via the Internet is a cybercrime. Cybercrime is any criminal activity involving computers and networks. It can range

More information

Cyber Security. Maintaining Your Identity on the Net

Cyber Security. Maintaining Your Identity on the Net Cyber Security Maintaining Your Identity on the Net Why Cyber Security? There are three points of failure in any secure network: Technology (hardware and software) Technology Support (ITS) End Users (USD

More information

Understand What s Going On

Understand What s Going On Internet Safety Tips For Dummies In This Book Recognizing how online risks occur Staying safer with technology Taking care with shared photos Understanding how crooks collect information Reporting fraud

More information

Infocomm Sec rity is incomplete without U Be aware,

Infocomm Sec rity is incomplete without U Be aware, Infocomm Sec rity is incomplete without U Be aware, responsible secure! HACKER Smack that What you can do with these five online security measures... ANTI-VIRUS SCAMS UPDATE FIREWALL PASSWORD [ 2 ] FASTEN

More information

Recognizing Spam. IT Computer Technical Support Newsletter

Recognizing Spam. IT Computer Technical Support Newsletter IT Computer Technical Support Newsletter March 23, 2015 Vol.1, No.22 Recognizing Spam Spam messages are messages that are unwanted. If you have received an e-mail from the Internal Revenue Service or the

More information

Cyber Security, Fraud and Corporate Account Takeovers LBA Bank Counsel Conference December 2014

Cyber Security, Fraud and Corporate Account Takeovers LBA Bank Counsel Conference December 2014 Cyber Security, Fraud and Corporate Account Takeovers LBA Bank Counsel Conference December 2014 Lisa D. Traina, CPA, CITP, CGMA Lisa Traina utilizes her 30+ years of experience as a CPA, CITP and CGMA

More information

General Security Best Practices

General Security Best Practices General Security Best Practices 1. One of the strongest physical security measures for a computer or server is a locked door. 2. Whenever you step away from your workstation, get into the habit of locking

More information

Protecting Yourself Against Identity Theft. Identity theft is a serious. What is Identity Theft?

Protecting Yourself Against Identity Theft. Identity theft is a serious. What is Identity Theft? Protecting Yourself Against Identity Theft Identity theft is a serious crime. Identity theft happens when someone steals your personal information and uses it without your permission. It is a growing threat

More information

SMALL BUSINESS IT SECURITY PRACTICAL GUIDE

SMALL BUSINESS IT SECURITY PRACTICAL GUIDE SMALL BUSINESS IT SECURITY PRACTICAL GUIDE How to make sure your business has comprehensive IT security protection #protectmybiz Small businesses come in all shapes and sizes. But in today s world, no

More information

Anti-Phishing Best Practices for ISPs and Mailbox Providers

Anti-Phishing Best Practices for ISPs and Mailbox Providers Anti-Phishing Best Practices for ISPs and Mailbox Providers Version 2.01, June 2015 A document jointly produced by the Messaging, Malware and Mobile Anti-Abuse Working Group (M 3 AAWG) and the Anti-Phishing

More information

Getting a Secure Intranet

Getting a Secure Intranet 61-04-69 Getting a Secure Intranet Stewart S. Miller The Internet and World Wide Web are storehouses of information for many new and legitimate purposes. Unfortunately, they also appeal to people who like

More information

Creating a Culture of Cyber Security at Work

Creating a Culture of Cyber Security at Work Creating a Culture of Cyber Security at Work Webinar Why is this important? Cybersecurity is a people problem. Cybersecurity is no longer just the IT department s responsibility. It is everyone s responsibility.

More information

9 Simple steps to secure your Wi-Fi Network.

9 Simple steps to secure your Wi-Fi Network. 9 Simple steps to secure your Wi-Fi Network. Step 1: Change the Default Password of Modem / Router After opening modem page click on management - access control password. Select username, confirm old password

More information

STOP THINK CLICK Seven Practices for Safer Computing

STOP THINK CLICK Seven Practices for Safer Computing Seven Practices for Safer Computing Access to information and entertainment, credit and financial services, products from every corner of the world even to your work is greater than earlier generations

More information

Internet threats: steps to security for your small business

Internet threats: steps to security for your small business Internet threats: 7 steps to security for your small business Proactive solutions for small businesses A restaurant offers free WiFi to its patrons. The controller of an accounting firm receives a confidential

More information

Course: Information Security Management in e-governance. Day 1. Session 5: Securing Data and Operating systems

Course: Information Security Management in e-governance. Day 1. Session 5: Securing Data and Operating systems Course: Information Security Management in e-governance Day 1 Session 5: Securing Data and Operating systems Agenda Introduction to information, data and database systems Information security risks surrounding

More information

Cyber Security Awareness

Cyber Security Awareness Cyber Security Awareness William F. Pelgrin Chair Page 1 Introduction Information is a critical asset. Therefore, it must be protected from unauthorized modification, destruction and disclosure. This brochure

More information

Firewalls for small business

Firewalls for small business By James Thomas DTEC 6823 Summer 2004 What is a firewall? Firewalls for small business A firewall is either hardware, software or a combination of both that is used to prevent, block or should I say try

More information

How-To Guide: Cyber Security. Content Provided by

How-To Guide: Cyber Security. Content Provided by How-To Guide: Cyber Security Content Provided by Who needs cyber security? Businesses that have, use, or support computers, smartphones, email, websites, social media, or cloudbased services. Businesses

More information

WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY

WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY SMALL BUSINESSES WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY ONE CLICK CAN CHANGE EVERYTHING SMALL BUSINESSES My reputation was ruined by malicious emails ONE CLICK CAN CHANGE EVERYTHING Cybercrime comes

More information

Welcome To The L.R.F.H.S. Computer Group Wednesday 27 th November 2013

Welcome To The L.R.F.H.S. Computer Group Wednesday 27 th November 2013 Welcome To The L.R.F.H.S. Computer Group Wednesday 27 th November 2013 BACKUP SECURITY AND THE CLOUD BACK UP ALWAYS BACK UP TO AN EXTERNAL DEVICE OR REMOVAL MEDIA- NEVER DIRECTLY ON TO YOUR COMPUTER IF

More information

Avoid completing forms in email messages that ask for personal financial information.

Avoid completing forms in email messages that ask for personal financial information. INTERNET FRAUD Online scams and viruses are constantly evolving and they threaten the security of computers worldwide. As criminals evolve their tactics, you need to keep your PC's security software (virus

More information

TMCEC CYBER SECURITY TRAINING

TMCEC CYBER SECURITY TRAINING 1 TMCEC CYBER SECURITY TRAINING Agenda What is cyber-security? Why is cyber-security important? The essential role you play. Overview cyber security threats. Best practices in dealing with those threats.

More information

Computer Security Maintenance Information and Self-Check Activities

Computer Security Maintenance Information and Self-Check Activities Computer Security Maintenance Information and Self-Check Activities Overview Unlike what many people think, computers are not designed to be maintenance free. Just like cars they need routine maintenance.

More information

Protecting Your Organisation from Targeted Cyber Intrusion

Protecting Your Organisation from Targeted Cyber Intrusion Protecting Your Organisation from Targeted Cyber Intrusion How the 35 mitigations against targeted cyber intrusion published by Defence Signals Directorate can be implemented on the Microsoft technology

More information

Government Entity located in St. Louis Serving Government for over 40 Years

Government Entity located in St. Louis Serving Government for over 40 Years Government Entity located in St. Louis Serving Government for over 40 Years Primary Focus - Law Enforcement/Court Systems, Infrastructure Support, and Colocation Services 140 employees (100+ are IT) Dumb

More information

Deter, Detect, Defend

Deter, Detect, Defend Deter, Detect, Defend Deter Never provide personal information, including social security number, account numbers or passwords over the phone or Internet if you did not initiate the contact Never click

More information

Detailed Description about course module wise:

Detailed Description about course module wise: Detailed Description about course module wise: Module 1: Basics of Networking and Major Protocols 1.1 Networks and its Types. 1.2 Network Topologies 1.3 Major Protocols and their Functions 1.4 OSI Reference

More information

Corporate Account Take Over (CATO) Guide

Corporate Account Take Over (CATO) Guide Corporate Account Take Over (CATO) Guide This guide was created to increase our customers awareness of the potential risks and threats that are associated with Internet and electronic- based services,

More information

Advice about online security

Advice about online security Advice about online security May 2013 Contents Report a suspicious email or website... 3 Security advice... 5 Genuine DWP contacts... 8 Recognising and reporting phishing and bogus emails... 9 How DWP

More information

Helping you to protect yourself against fraud and financial crime

Helping you to protect yourself against fraud and financial crime Helping you to protect yourself against fraud and financial crime first direct takes fraud & other financial crimes very seriously. Even though we have market-leading fraud detection systems, we want you

More information

Security Breaches. There are unscrupulous individuals, like identity thieves, who want your information to commit fraud.

Security Breaches. There are unscrupulous individuals, like identity thieves, who want your information to commit fraud. IDENTITY THEFT Security Breaches Our economy generates an enormous amount of data. Most users of that information are from honest businesses - getting and giving legitimate information. Despite the benefits

More information

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things. What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things. AGENDA Current State of Information Security Data Breach Statics Data Breach Case Studies Why current

More information

Your Personal Information: Protecting it from Exploitation

Your Personal Information: Protecting it from Exploitation Your Personal Information: Protecting it from Exploitation Data breaches involving personal information result in a broad range of risks to individuals and organizations. This includes identity theft,

More information

It s 2 o clock: Who Has Your Data? Josh Krueger Chief Technology Officer Integrity Technology Solutions

It s 2 o clock: Who Has Your Data? Josh Krueger Chief Technology Officer Integrity Technology Solutions It s 2 o clock: Who Has Your Data? Josh Krueger Chief Technology Officer Integrity Technology Solutions Your home is your business and your farm is your network. But who has access to it? Can you protect

More information

Best Practices Guide to Electronic Banking

Best Practices Guide to Electronic Banking Best Practices Guide to Electronic Banking City Bank & Trust Company offers a variety of services to our customers. As these services have evolved over time, a much higher percentage of customers have

More information

Open an attachment and bring down your network?

Open an attachment and bring down your network? Open an attachment and bring down your network? Many people think this will never happen to them, but virus attacks can come from unlikely sources and can strike when you least expect it. They can wreak

More information

Statistical Analysis of Internet Security Threats. Daniel G. James

Statistical Analysis of Internet Security Threats. Daniel G. James Statistical Analysis of Internet Security Threats Daniel G. James ABSTRACT The purpose of this paper is to analyze the statistics surrounding the most common security threats faced by Internet users. There

More information

OCT Training & Technology Solutions Training@qc.cuny.edu (718) 997-4875

OCT Training & Technology Solutions Training@qc.cuny.edu (718) 997-4875 OCT Training & Technology Solutions Training@qc.cuny.edu (718) 997-4875 Understanding Information Security Information Security Information security refers to safeguarding information from misuse and theft,

More information

Protecting Yourself from Identity Theft

Protecting Yourself from Identity Theft Protecting Yourself from Identity Theft Guide 4 Because you don t have to be the next victim Desert Schools Money Matters Series Guiding you toward financial success Table of Contents How ID theft happens.............................

More information

Identity Theft. Protecting Yourself and Your Identity. Course objectives learn about:

Identity Theft. Protecting Yourself and Your Identity. Course objectives learn about: financialgenius.usbank.com Course objectives learn about: Avoiding Identity Theft Recognize Phishing Attempts Getting Help for ID Theft Victims Identity Theft Protecting Yourself and Your Identity Index

More information