Parent$Coffee$Presents:$ The$Security$Geek s$guide$to$your$personal$ Security$

Size: px
Start display at page:

Download "Parent$Coffee$Presents:$ The$Security$Geek s$guide$to$your$personal$ Security$"

Transcription

1 Parent$Coffee$Presents:$ The$Security$Geek s$guide$to$your$personal$ Security$

2 Look$inside$the$mind$of$a$hacker$ h=ps://

3 Introducing$our$speaker$

4 Understanding$risk$

5 Measuring$Threats$ How$worried$you$ Should$be$ Threat$Actor$ Threat$Capability$ Impact$ Threat$Event$ Frequency$ What$you$can$ Do$about$it$ Ability$to$ Detect$ Control$Strength$ Ability$to$ Recover$

6 What$threats$ma=er$at$home?$ How$worried$you$ Should$be$ Threat$Actor$ Threat$Capability$ Impact$ Threat$Event$ Frequency$

7 What$threats$ma=er$at$home?$ How$worried$you$ Should$be$ Threat$Actor$ Threat$Capability$ Impact$ Threat$Event$ Frequency$

8 What$threats$ma=er$at$home?$ See$h=p://geer.Unho.net/geer.uncc.9x13.txt$for$the$most$thoughXul$analysis$

9 An$Example$ Source:$FBI$infographic$

10 What$can$you$do?$

11 What$can$you$do?$ Top Ten Security Tips for Windows 7 at Home 1. Type Windows Firewall into your start menu and turn on Windows Firewall by choosing use recommended settings. 2. Download and install Microsoft Security Essentials here:. 3. Type Action Center into your start menu, open the Action Center to make sure it is turned on and up-to-date. 4. Type Windows Update into the start menu and turn on automatic updates. with the latest version, no matter which one you use, and keep security settings at high. Use a standard user account. That way, if other people (or hackers) gain access to your computer while you re logged on, they can t tamper with the computer s security settings. 7. to encrypt your data: Click Start > Control Panel > System and Security > BitLocker Drive Encryption. Click Turn on BitLocker and follow the instructions. Make sure you print your recovery key and keep it in a safe place. 8. which automatically blocks many common attacks. Follow the simple instructions here:. 9. on any Google, Yahoo, Dropbox, Facebook and Microsoft accounts you have. Enroll in a cloud backup service like. Top Ten Security Tips for Windows 8 at Home 1. Verify that Windows Firewall is on. From the right-hand charms menu, search for Windows Firewall. Open Windows Firewall. In the left-hand menu choose Turn Windows Firewall On or Off and make sure it is turned on. 2. Verify that Windows Defender is turned on for antivirus and antimalware. From the right-hand charms menu, search for Windows Defender and under the settings tab, make sure Turn on real time protection is checked. 3. Update Windows automatically. From the right-hand charms menu, search for Windows Update and ensure you re set up to receive automatic updates. 4. Turn on Windows Smartscreen to help prevent phishing attacks. From the right-hand charms menu, choose change smart screen settings. Under What do you want to do with unrecognized apps? select Get Administrator approval before running an unrecognized app from the internet. 5. Keep your Web browser updated with the latest version, no matter which one you use, and keep security settings at high. 6. Don t use an administrator account for everyday computing. Use a standard user account. That way, if other people (or hackers) gain access to your computer while you re logged on, they can t tamper with the computer s security settings. 7. Turn on BitLocker Encryption to encrypt your data. From the righthand charms menu, search for BitLocker Drive Encryption. Open it and click Turn on BitLocker and follow the instructions. Make sure you print your recovery key and keep it in a safe place. 8. Enable OpenDNS, which automatically blocks many common attacks. Follow the simple instructions here: 9. Enable two-factor authentication on any Google, Yahoo, Dropbox, Facebook and Microsoft accounts you have. 10. Enroll in a cloud backup service like Microsoft Skydrive. Top Ten Security Tips for Mac at Home 1. Go to System Preferences > Security & Privacy > Firewall tab, and turn on. 2. Go to System Preferences > App Store and select Automatically Check for Updates and 3. to make sure all the software you install is from a known developer: System Preferences > Security & Privacy > General and choose 4. Go to System Preferences > Security & Privacy > FileVault tab and make sure it is turned on. 5. by requiring a password immediately after your computer goes to sleep or screensaver begins: System Preferences > Security & Privacy > General and select Require password immediately after sleep or 6. so that strangers can t see your accounts at a login screen: Go to System Preferences > Users & Groups > Login Options. Set automatic login to off, and under Display login window as, select 7. use a standard user account. That way, if other people (or hackers) gain access to your computer while you re logged on, they can t tamper with the computer s security settings. 8. which automatically blocks many common attacks. Choose your version of OS and follow the simple instructions here: 9. on any Google, Yahoo, Dropbox, Facebook and Microsoft accounts you have. Use Apple Time Machine to backup to an external drive or use icloud. win7_security_tips_update.indd 1 11/7/ :39:01 AM win8_security_tips_update.indd 1 11/7/ :38:20 AM mac_security_tips_update.indd 1 11/7/ :39:37 AM

12 What$can$you$do?$ Think$before$you$click$ Use$OpenDNS$ Use$a$password$manager$ Automate$Security$ Patching$ Don t$be$root$ Backup$your$files$ Setup$2FA$for$ Important$accounts$ Use$updated$ AnU]malware$ Encrypt$your$ Computers$ Use$your$OS$ Firewall$

13 Level$Up$ Segment$your$network$ Harden$your$browser$ Lockdown$your$OS$ If you want to dig deeper: csi.websense.com Security classification and malware checking sitereview.bluecoat.com Checks enterprise site classification Checks website reputation Online malware scanner Multiple tools to lookup information about a site What$did$I$miss?$

14 ProtecUng$your$children$online$ Understand$the$threats:$ 1. Strangers,$(o`en$adults)$who$try$to$ contact$children$online$ 2. Friends,$who$leverage$online$ communiues$to$move$bullying$and$ other$harassment$to$new$levels$ 3. Themselves,$for$making$statements$ that$have$consequences$in$the$ future$ What you can do: 1. Set clear rules 2. Education about the risks 3. Use a dedicated computer 4. Control mobile devices 5. Monitor social networking 6. Technology is not perfect, but use it where it makes sense OS Parental Controls OpenDNS or BlueCoat K9 Child-friendly services Source:

Protecting your Data, Devices, and Digital Life in a BYOD World: A Security Primer GLENDA ROTVOLD AND SANDY BRAATHEN NBEA APRIL 2, 2015

Protecting your Data, Devices, and Digital Life in a BYOD World: A Security Primer GLENDA ROTVOLD AND SANDY BRAATHEN NBEA APRIL 2, 2015 Protecting your Data, Devices, and Digital Life in a BYOD World: A Security Primer GLENDA ROTVOLD AND SANDY BRAATHEN NBEA APRIL 2, 2015 What are You Trying to Protect? If someone got into your email, what

More information

Protect Yourself from Cyber Risks

Protect Yourself from Cyber Risks Protect Yourself from Cyber Risks 2012 SEAS Cybersecurity Awareness Day 10/17/12 Jay Carter, CISSP CISA Agenda Overview Notable Targets of Hackers What You Can Do to Protect Yourself Identity Theft Questions

More information

Manual for Android 1.5

Manual for Android 1.5 Manual for Android 1.5 1 Table of Content 1. Scope of Service... 3 1.1 About Boxcryptor Classic... 3 1.2 About this manual... 3 2. Installation... 4 3. Basic functionality... 5 3.1. Setting up Boxcryptor

More information

In the Cloud. Scoville Memorial Library February, 2013 ccayne@biblio.org

In the Cloud. Scoville Memorial Library February, 2013 ccayne@biblio.org In the Cloud Scoville Memorial Library February, 2013 ccayne@biblio.org What is the Cloud? You may have heard people using terms like the cloud, cloud computing, or cloud storage. But what exactly is the

More information

Why you need. McAfee. Multi Acess PARTNER SERVICES

Why you need. McAfee. Multi Acess PARTNER SERVICES Why you need McAfee Multi Acess PARTNER SERVICES McAfee Multi Access is an online security app that protects all types of devices. All at once. The simple monthly subscription covers up to five devices

More information

Certified Secure Computer User

Certified Secure Computer User Certified Secure Computer User Course Outline Module 01: Foundations of Security Essential Terminologies Computer Security Why Security? Potential Losses Due to Security Attacks Elements of Security The

More information

Northwestern IT Tech Talk

Northwestern IT Tech Talk Northwestern IT Tech Talk Top 5 Tools for Securing Your Devices Mary Carp Data Security Analyst Northwestern Information Technology Information and Systems Security/Compliance May 19, 2016 Antimalware

More information

It s 2 o clock: Who Has Your Data? Josh Krueger Chief Technology Officer Integrity Technology Solutions

It s 2 o clock: Who Has Your Data? Josh Krueger Chief Technology Officer Integrity Technology Solutions It s 2 o clock: Who Has Your Data? Josh Krueger Chief Technology Officer Integrity Technology Solutions Your home is your business and your farm is your network. But who has access to it? Can you protect

More information

Welcome to Office 365!

Welcome to Office 365! This document includes: Welcome to Office 365! What is Office 365? How do I access Office 365? Create and Access Your Documents from Anywhere with SkyDrive Pro Connect and Collaborate through Office 365

More information

CyberSecurity & Keeping your data safe. October 20, 2015

CyberSecurity & Keeping your data safe. October 20, 2015 CyberSecurity & Keeping your data safe Medway Business Council John Haddad, Bisinet Technologies October 20, 2015 We are under attack!!! 2013 110 million records compromised 2014 56 million payment cards

More information

Quick View. Folder Details

Quick View. Folder Details Quick View You MUST be logged in to access any information inside the IONU system. If you aren t logged in, you will not see the folders and the data and files cannot be accessed and decrypted. All files,

More information

Quick Start Guide to Logging in to Online Banking

Quick Start Guide to Logging in to Online Banking Quick Start Guide to Logging in to Online Banking Log In to Internet Banking: Note: The first time you log in you are required to use your Customer ID. Your Customer ID is the primary account holder s

More information

Connecting With Lifesize Cloud

Connecting With Lifesize Cloud There are several different ways to connect to a Lifesize Cloud video conference meeting. This guide will provide you instructions for each way. Ways to Join a Lifesize Cloud Video Conference After getting

More information

Certified Secure Computer User

Certified Secure Computer User Certified Secure Computer User Exam Info Exam Name CSCU (112-12) Exam Credit Towards Certification Certified Secure Computer User (CSCU). Students need to pass the online EC-Council exam to receive the

More information

The SMB Cyber Security Survival Guide

The SMB Cyber Security Survival Guide The SMB Cyber Security Survival Guide Stephen Cobb, CISSP Security Evangelist The challenge A data security breach can put a business out of business or create serious unbudgeted costs To survive in today

More information

Chapter 15: Computer and Network Security

Chapter 15: Computer and Network Security Chapter 15: Computer and Network Security Complete CompTIA A+ Guide to PCs, 6e What is in a security policy Mobile device security methods and devices To perform operating system and data protection How

More information

INTRODUCTION TO CLOUD STORAGE

INTRODUCTION TO CLOUD STORAGE University of North Carolina at Chapel Hill Libraries Carrboro Cybrary Chapel Hill Public Library Durham County Public Library INTRODUCTION TO CLOUD STORAGE GETTING STARTED PAGE 02 Class Overview What

More information

Connecting With Lifesize Cloud

Connecting With Lifesize Cloud There are several different ways to connect to a Lifesize Cloud video conference meeting. This guide will provide you instructions for each way. Ways to Join a Lifesize Cloud Video Conference After getting

More information

Protect Yourself in the Cloud Age

Protect Yourself in the Cloud Age Protect Yourself in the Cloud Age Matthew Wu Consultant Hong Kong Computer Emergency Response Team Coordination Centre About HKCERT HKCERT ( 香 港 電 腦 保 安 事 故 協 調 中 心 ) Established in 2001 Funding & Operation

More information

Administering FileVault 2 on OS X Lion with the Casper Suite. Technical Paper July 2012

Administering FileVault 2 on OS X Lion with the Casper Suite. Technical Paper July 2012 Administering FileVault 2 on OS X Lion with the Casper Suite Technical Paper July 2012 JAMF Software, LLC 2012 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts to ensure that

More information

Introduction to Cloud Storage GOOGLE DRIVE

Introduction to Cloud Storage GOOGLE DRIVE Introduction to Cloud Storage What is Cloud Storage? Cloud computing is one method to store and access data over the internet instead of using a physical hard drive (e.g. computer s hard drive, flash drive,

More information

Online Backup and Recovery Manager Setup for Microsoft Windows.

Online Backup and Recovery Manager Setup for Microsoft Windows. Online Backup and Recovery Manager Setup for Microsoft Windows. Backup Wizard Default Interface Recovery Wizard Online Backup and Recovery Manager Setup Backup Wizard After installing and launching the

More information

COMPUTER SECURITY PRINCIPLES AND PRACTICES BY COREY@MARK5MINISTRIES.ORG

COMPUTER SECURITY PRINCIPLES AND PRACTICES BY COREY@MARK5MINISTRIES.ORG COMPUTER SECURITY PRINCIPLES AND PRACTICES BY COREY@MARK5MINISTRIES.ORG INTRODUCTION My Background Some questions for you Why computer security? Principle of Incarnation What this presentation covers (and

More information

Accessing TP SSL VPN

Accessing TP SSL VPN Accessing TP SSL VPN This guide describes the steps to install, connect and disconnect the SSL VPN for remote access to TP intranet systems using personal notebooks. A. Installing the SSL VPN client Junos

More information

Corporate Information & Computing Services. IT Services For University Staff.

Corporate Information & Computing Services. IT Services For University Staff. Corporate Information & Computing Services. IT Services For University Staff. Working at the University of Sheffield This guide will help you get started with the key IT services provided by Corporate

More information

Administering FileVault 2 on OS X Mavericks with the Casper Suite v9.2 or Later. Technical Paper October 2013

Administering FileVault 2 on OS X Mavericks with the Casper Suite v9.2 or Later. Technical Paper October 2013 Administering FileVault 2 on OS X Mavericks with the Casper Suite v9.2 or Later Technical Paper October 2013 JAMF Software, LLC 2013 JAMF Software, LLC. All rights reserved. JAMF Software has made all

More information

Course: Information Security Management in e-governance. Day 1. Session 5: Securing Data and Operating systems

Course: Information Security Management in e-governance. Day 1. Session 5: Securing Data and Operating systems Course: Information Security Management in e-governance Day 1 Session 5: Securing Data and Operating systems Agenda Introduction to information, data and database systems Information security risks surrounding

More information

2.6.1 Creating an Acronis account... 11 2.6.2 Subscription to Acronis Cloud... 11. 3 Creating bootable rescue media... 12

2.6.1 Creating an Acronis account... 11 2.6.2 Subscription to Acronis Cloud... 11. 3 Creating bootable rescue media... 12 USER'S GUIDE Table of contents 1 Introduction...3 1.1 What is Acronis True Image 2015?... 3 1.2 New in this version... 3 1.3 System requirements... 4 1.4 Install, update or remove Acronis True Image 2015...

More information

Welcome To The L.R.F.H.S. Computer Group Wednesday 27 th November 2013

Welcome To The L.R.F.H.S. Computer Group Wednesday 27 th November 2013 Welcome To The L.R.F.H.S. Computer Group Wednesday 27 th November 2013 BACKUP SECURITY AND THE CLOUD BACK UP ALWAYS BACK UP TO AN EXTERNAL DEVICE OR REMOVAL MEDIA- NEVER DIRECTLY ON TO YOUR COMPUTER IF

More information

Research Information Security Guideline

Research Information Security Guideline Research Information Security Guideline Introduction This document provides general information security guidelines when working with research data. The items in this guideline are divided into two different

More information

Citrix : Remediation - MAC

Citrix : Remediation - MAC Citrix : Remediation - MAC Key Points: 1. 2. 3. 4. 5. 6. 7. Understanding End Point Scan Analysis Supported anti-virus and firewall products Configuring AVAST/SOPHOS and the Mac OS X Firewall Installing

More information

ORU IT 2014-15. Oral Roberts University Information Technology Student Guide

ORU IT 2014-15. Oral Roberts University Information Technology Student Guide ORU IT 2014-15 Oral Roberts University Information Technology Student Guide August 2014 Contents Contacting ORU IT... 2 Accessing ORU-Student Wireless on Campus... 2 How to Log into the ORU Web Apps...

More information

AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION PROGRAM UNIT FIVE. Microsoft Windows Security. www.uscyberpatriot.

AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION PROGRAM UNIT FIVE. Microsoft Windows Security. www.uscyberpatriot. AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION PROGRAM UNIT FIVE Microsoft Windows Security www.uscyberpatriot.org AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION

More information

Backing Up Your Files. External Hard Drives

Backing Up Your Files. External Hard Drives Backing Up Your Files As we become more and more dependent on technology to help accomplish our everyday tasks, we tend to forget how easily the information stored on our computers can be lost. Imagine

More information

Portal Instructions for Mac

Portal Instructions for Mac Portal Instructions for Mac Table of Contents Introduction... 1 Preparing Safari... 2 Advanced Access Instructions... 3 Installing Java... 3 Setting the Default Browser... 3 Installing the Browser Plug-in...

More information

Accessing Citrix on a MAC using OS X (Mountain Lion and Newer)

Accessing Citrix on a MAC using OS X (Mountain Lion and Newer) These instructions are specifically designed for OS X Mountain Lion and Mavericks. Earlier versions of the OS will require a different installation. These instructions assume that there are no Java, Citrix

More information

Password Depot for Android

Password Depot for Android Password Depot for Android Table Of Contents Table Of Contents... 2 User interface... 3 Action Bar... 3 Overflow Menu... 4 Entry menu... 5 Context Bar... 6 Settings... 7 Creating a password file... 8 Opening

More information

Business ebanking Fraud Prevention Best Practices

Business ebanking Fraud Prevention Best Practices Business ebanking Fraud Prevention Best Practices User ID and Password Guidelines Create a strong password with at least 8 characters that includes a combination of mixed case letters, numbers, and special

More information

Defense Media Activity Guide To Keeping Your Social Media Accounts Secure

Defense Media Activity Guide To Keeping Your Social Media Accounts Secure Guide To Keeping Your Social Media Accounts Secure Social media is an integral part of the strategic communications and public affairs missions of the Department of Defense. Like any asset, it is something

More information

GadgetTrak Mobile Security Android & BlackBerry Installation & Operation Manual

GadgetTrak Mobile Security Android & BlackBerry Installation & Operation Manual GadgetTrak Mobile Security Android & BlackBerry Installation & Operation Manual Overview GadgetTrak Mobile Security is an advanced software application designed to assist in the recovery of your mobile

More information

Password Depot for ios

Password Depot for ios Password Depot for ios Table Of Contents First steps... 1 Creating a password file... 1 Creating new entries... 3 Adding entries / groups... 3 Copying or relocating entries / groups... 3 Deleting entries

More information

Information Security It s Everyone s Responsibility

Information Security It s Everyone s Responsibility Information Security It s Everyone s Responsibility The University of Texas at Dallas Information Security Office (ISO) Purpose of Training Information generated, used, and/or owned by UTD has value. Because

More information

Mac OS X User Manual Version 2.0

Mac OS X User Manual Version 2.0 Mac OS X User Manual Version 2.0 Welcome to ncrypted Cloud! ncrypted Cloud is a Privacy, Security, and Collaboration application that uses Industry Standard Encryption Technology (AES-256 bit encryption)

More information

Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines

Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines 1. Implement anti-virus software An anti-virus program is necessary to protect your computer from malicious programs,

More information

How to get Office 365 through your Student Email

How to get Office 365 through your Student Email How to get Office 365 through your Student Email Locating and installing Microsoft Office 365 ProPlus is a quick and simple process. To begin the installation, log into your GCU email account, either by

More information

Computer Backup Issues For Windows 8

Computer Backup Issues For Windows 8 Computer Backup Issues For Windows 8 Backup Basic information backup Copy your personal information from the hard drive to another media / location CD (700 MB) DVD (4.7 GB) Flash drive (16 GB ± $10) External

More information

2016 Digital Safety Class UNDERSTAND YOUR RISKS AND STAY TOTALLY SECURE JESSE ROBERTSON, TECH 4 LIFE

2016 Digital Safety Class UNDERSTAND YOUR RISKS AND STAY TOTALLY SECURE JESSE ROBERTSON, TECH 4 LIFE 2016 Digital Safety Class UNDERSTAND YOUR RISKS AND STAY TOTALLY SECURE JESSE ROBERTSON, TECH 4 LIFE WHO ARE WE? 12 years of local Tech, Training and Website services Service the 4 areas of life Regularly

More information

Using Mac OS X 10.7 Filevault with Centrify DirectControl

Using Mac OS X 10.7 Filevault with Centrify DirectControl Using Mac OS X 10.7 Filevault with Centrify DirectControl August 2011, Revision 2 OS X 10.7's Filevault has the ability to encrypt the entire disk. Full Disk Encryption is compatible with Centrify Active

More information

How To Connect Your Cloud

How To Connect Your Cloud How To Connect Your Cloud This tutorial will show you how to connect ncrypted Cloud to multiple cloud storage accounts after installation. This will allow you to apply privacy to all cloud data right from

More information

imail Frequently Asked Questions (FAQs) 27 July 2015 Version 2.2

imail Frequently Asked Questions (FAQs) 27 July 2015 Version 2.2 imail Frequently Asked Questions (FAQs) 27 July 2015 Version 2.2 Owner: Cynthia Tan IT Services Table of Contents GENERAL FAQS... 4 1. How to access to Sunway imail account?... 4 2. I can t login to my

More information

PaperStream Connect. Setup Guide. Version 1.0.0.0. Copyright Fujitsu

PaperStream Connect. Setup Guide. Version 1.0.0.0. Copyright Fujitsu PaperStream Connect Setup Guide Version 1.0.0.0 Copyright Fujitsu 2014 Contents Introduction to PaperStream Connect... 2 Setting up PaperStream Capture to Release to Cloud Services... 3 Selecting a Cloud

More information

Information Security It s Everyone s Responsibility

Information Security It s Everyone s Responsibility Information Security It s Everyone s Responsibility Developed By The University of Texas at Dallas (ISO) Purpose of Training As an employee, you are often the first line of defense protecting valuable

More information

GUIDE TO KEEPING YOUR SOCIAL MEDIA ACCOUNTS SECURE

GUIDE TO KEEPING YOUR SOCIAL MEDIA ACCOUNTS SECURE GUIDE TO KEEPING YOUR SOCIAL MEDIA ACCOUNTS SECURE Defense Media Activity TABLE OF CONTENTS PROTECTIVE MEASURES... 2 PREPARATION CHECKLIST... 2 IF YOU SUSPECT YOUR ACCOUNT IS COMPROMISED, THE FOLLOWING

More information

NATIONAL CYBER SECURITY AWARENESS MONTH

NATIONAL CYBER SECURITY AWARENESS MONTH NATIONAL CYBER SECURITY AWARENESS MONTH Tip 1: Security is everyone s responsibility. Develop an awareness framework that challenges, educates and empowers your customers and employees to be part of the

More information

Client Security Guide

Client Security Guide Client Security Guide NEXT GENERATION CLOUD-SECURITY www.exacttarget.com NEXT GENERATION CLOUD-SECURITY Companies across the globe are facing continuously evolving threats focused on obtaining an individual

More information

Joining my MAC laptop to the domain

Joining my MAC laptop to the domain Joining my MAC laptop to the domain Follow these steps to join your Apple Mac laptop to the University domain. An account must exist on the domain before the laptop can join it. Contact the Service Desk

More information

Using TS-ACCESS for Remote Desktop Access

Using TS-ACCESS for Remote Desktop Access Using TS-ACCESS for Remote Desktop Access Introduction TS-ACCESS is a remote desktop access feature available to CUA faculty and staff who need to access administrative systems or other computing resources

More information

Beginning Windows 8. Mike Halsey Microsoft MVP for Windows. Apress*

Beginning Windows 8. Mike Halsey Microsoft MVP for Windows. Apress* Beginning Windows 8 Mike Halsey Microsoft MVP for Windows Apress* Contents at a Glance About the Author About the Technical Reviewers Acknowledgments Introduction xxi xxiii xxv xxvii Chapter 1: Introducing

More information

Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.

Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information. Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information. Mobile Devices: Risks to Health Information Risks vary based on the mobile device and its use. Some risks include:

More information

Internet basics 2.3 Protecting your computer

Internet basics 2.3 Protecting your computer Basics Use this document with the glossary Beginner s guide to Internet basics 2.3 Protecting your computer How can I protect my computer? This activity will show you how to protect your computer from

More information

What you need to know to keep your computer safe on the Internet

What you need to know to keep your computer safe on the Internet What you need to know to keep your computer safe on the Internet Tip 1: Always install Operating System updates The most important steps for any computer user is to always install updates, especially security

More information

ACCESSING MICROSOFT OFFICE 365 FREE STUDENT RESOURCES

ACCESSING MICROSOFT OFFICE 365 FREE STUDENT RESOURCES ACCESSING MICROSOFT OFFICE 365 FREE STUDENT RESOURCES Download and Installation instructions 1. Go here and sign into Office 365 with your username and password. Username: Unitecusername@myunitec.ac.nz

More information

Business Internet Banking / Cash Management Fraud Prevention Best Practices

Business Internet Banking / Cash Management Fraud Prevention Best Practices Business Internet Banking / Cash Management Fraud Prevention Best Practices This document provides fraud prevention best practices that can be used as a training tool to educate new Users within your organization

More information

Reliance Bank Fraud Prevention Best Practices

Reliance Bank Fraud Prevention Best Practices Reliance Bank Fraud Prevention Best Practices May 2013 User ID and Password Guidelines Create a strong password with at least 8 characters that includes a combination of mixed case letters and numbers.

More information

Cyber Security. Securing Your Mobile and Online Banking Transactions

Cyber Security. Securing Your Mobile and Online Banking Transactions Cyber Security Securing Your Mobile and Online Banking Transactions For additional copies or to download this document, please visit: http://msisac.cisecurity.org/resources/guides 2014 Center for Internet

More information

What are the common online dangers?

What are the common online dangers? ONLINE SECURITY GUIDELINES Internet Banking is convenient and times saving. You can do remittances, place online deposit and other transactions through online banking with the convenience and privacy of

More information

E-MAIL & INTERNET FRAUD

E-MAIL & INTERNET FRAUD FRAUD ALERT! FRAUD ALERT! Guarding Against E-MAIL & INTERNET FRAUD What credit union members should know to counter Phishing Pharming Spyware Online fraud On-Line Fraud Is Growing E-Mail and Internet Fraud

More information

USER MANUAL. v. 1.0.0.95 Windows Client ------------------------ January 2014 ------------------------

USER MANUAL. v. 1.0.0.95 Windows Client ------------------------ January 2014 ------------------------ USER MANUAL v. 1.0.0.95 Windows Client ------------------------ January 2014 ------------------------ 1 Contents At a Glance Troubleshoot 3 About SkyCrypt 23 FAQ 4 About this manual 23 Contact support

More information

What Do You Mean My Cloud Data Isn t Secure?

What Do You Mean My Cloud Data Isn t Secure? Kaseya White Paper What Do You Mean My Cloud Data Isn t Secure? Understanding Your Level of Data Protection www.kaseya.com As today s businesses transition more critical applications to the cloud, there

More information

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS ftrsecure.com Can You Separate Myths From Facts? Many Internet myths still persist that could leave you vulnerable to internet crimes. Check out

More information

How to use Dropbox. What is Dropbox. Please read the University of Melbourne Guidelines on Dropbox and University Information prior to use.

How to use Dropbox. What is Dropbox. Please read the University of Melbourne Guidelines on Dropbox and University Information prior to use. How to use Dropbox Please read the University of Melbourne Guidelines on Dropbox and University Information prior to use. What is Dropbox Dropbox lets you easily share and collaborate on documents with

More information

Online Banking Fraud Prevention Recommendations and Best Practices

Online Banking Fraud Prevention Recommendations and Best Practices Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee at Continental National Bank of Miami needs to know

More information

EndUser Protection. Peter Skondro. Sophos

EndUser Protection. Peter Skondro. Sophos EndUser Protection Peter Skondro Sophos Agenda Sophos EndUser Solutions Endpoint Usecases Sophos Mobile Solutions Mobile Usecases Endpoint Sophos EndUser Solutions EndUser Protection AV Firewall Application

More information

http://vpn.madeleyacademy.com

http://vpn.madeleyacademy.com Madeley Academy Remote Access http://vpn.madeleyacademy.com Members of Staff and Sixth form students are able to log into the shared and their user areas from home. System requirements Antivirus Trusted

More information

How To Sync Google Drive On A Mac Computer With A Gmail Account On A Gcd (For A Student) On A Pc Or Mac Or Mac (For An Older Person) On An Ipad Or Ipad (For Older People) On

How To Sync Google Drive On A Mac Computer With A Gmail Account On A Gcd (For A Student) On A Pc Or Mac Or Mac (For An Older Person) On An Ipad Or Ipad (For Older People) On Installation and Setup of Google Drive for Students on Mac OS X Purpose: This guide will lead you through the Google Drive Installation and Configuration. Pre-requisites: 1) ODU Student Gmail account 2)

More information

Neat Cloud Service + Mobile App

Neat Cloud Service + Mobile App Getting Started with Neat Cloud Service + Mobile App Neat transforms paper and electronic documents into organized digital files that are easy to find, use, and share. Neat Cloud Service and Mobile App

More information

Old National offers both Mobile Web and a Mobile App, so you can choose the best fit for your device type. Either solution enables you to:

Old National offers both Mobile Web and a Mobile App, so you can choose the best fit for your device type. Either solution enables you to: Your bank. For your mobile life. Getting started You live life on the move, and Old National Mobile Banking goes right along with you. Whether you re at work, play, running errands or on vacation, you

More information

Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.

Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information. Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information. Mobile Devices: Risks to to Health Mobile Information Devices: Risks to Health Information Risks vary based on the

More information

Email Update Instructions

Email Update Instructions 1 Email Update Instructions Contents Email Client Settings The Basics... 3 Outlook 2013... 4 Outlook 2007... 6 Outlook Express... 7 Windows Mail... 8 Thunderbird 3... 9 Apple Mail... 10 2 Email Client

More information

2.8.1 Creating an Acronis account... 17 2.8.2 Subscription to Acronis Cloud... 17. 2.9 Parallels Desktop support...17 2.10 Backup list icons...

2.8.1 Creating an Acronis account... 17 2.8.2 Subscription to Acronis Cloud... 17. 2.9 Parallels Desktop support...17 2.10 Backup list icons... USER'S GUIDE Table of contents 1 Introduction...4 1.1 What is Acronis True Image 2016?... 4 1.2 New in this version... 4 1.3 System requirements... 5 1.4 Install, update or remove Acronis True Image 2016...

More information

1. You will have knowledge of all the features of Yosemite and ios 8 that allow employees and business owners to collaborate on their work.

1. You will have knowledge of all the features of Yosemite and ios 8 that allow employees and business owners to collaborate on their work. Collaboration Collaboration simply means to work together and that is exactly what Yosemite and ios 8 do for individuals and organisations. Quite often organisations face challenges around how to get technology,

More information

Securely Yours LLC IT Hot Topics. Sajay Rai, CPA, CISSP, CISM sajayrai@securelyyoursllc.com

Securely Yours LLC IT Hot Topics. Sajay Rai, CPA, CISSP, CISM sajayrai@securelyyoursllc.com Securely Yours LLC IT Hot Topics Sajay Rai, CPA, CISSP, CISM sajayrai@securelyyoursllc.com Contents Background Top Security Topics What auditors must know? What auditors must do? Next Steps [Image Info]

More information

Using Remote Desktop with No-IP

Using Remote Desktop with No-IP Page 1 of 6 Lost Password? Sign-up Now!. com Support : Guides and Tips : Remote Access : Using Remote Desktop with No-IP Overview The use of Microsoft's Remote Desktop Connection to access another computer

More information

InsightCloud. www.insightcloud.com. Hosted Desktop Service. What is InsightCloud? What is SaaS? What are the benefits of SaaS?

InsightCloud. www.insightcloud.com. Hosted Desktop Service. What is InsightCloud? What is SaaS? What are the benefits of SaaS? What is InsightCloud? InsightCloud is a web portal enabling Insight customers to purchase and provision a wide range of Cloud services in a straightforward and convenient manner. What is SaaS? Software

More information

Introduction to Computing @ WSU

Introduction to Computing @ WSU Introduction to Computing @ WSU Table of Contents 1 - Information Technology (IT) Security... 2 Information to Remember... 2 2 - Malware... 2 Information to Remember... 3 3 - Firewalls... 3 Information

More information

How To Protect Yourself Online

How To Protect Yourself Online NetBank security guide Commonwealth Bank Personal 1 Contents Page 4 5 5 5 7 7 9 9 9 11 12 12 13 13 13 14 14 14 16 16 16 17 18 18 19 19 20 21 Section Peace of mind with NetBank What are the common online

More information

Initial Setup. How To Run A Mac Server:

Initial Setup. How To Run A Mac Server: How To Run A Mac Server: Initial Setup By Brian Stucki Macminicolo.net - Your Mac mini in a data center. The perfect low-cost server. FarAwayMac.com - Tips on running a Mac server. System Preferences can

More information

Bring Your Own Device Policy

Bring Your Own Device Policy Bring Your Own Device Policy Purpose of this Document This document describes acceptable use pertaining to using your own device whilst accessing University systems and services. This document will be

More information

Hosted Microsoft Exchange Client Setup & Guide Book

Hosted Microsoft Exchange Client Setup & Guide Book Hosted Microsoft Exchange Client Setup & Guide Book Section 1 Microsoft Outlook Web Access (OWA) access directions Section 2 Windows 10 Mail App setup & configuration Section 3 Windows Mobile Phone ActiveSync

More information

PORTLANDDIOCESE.ORG Email - How to Connect Table of Contents

PORTLANDDIOCESE.ORG Email - How to Connect Table of Contents 1 PORTLANDDIOCESE.ORG Email - How to Connect Table of Contents Email Access via a Web Browser... 2 Email Client Setup... 3 Outlook 2013 for Windows... 3 Outlook for Mac 2011... 4 Mac OS X 10.6+... 4 iphone

More information

How to prevent computer viruses in 10 steps

How to prevent computer viruses in 10 steps How to prevent computer viruses in 10 steps Following on from our advice on how to keep your online data secure, we ve created a follow-up outlining how you can keep your computer itself safe. Not only

More information

QUANTIFY INSTALLATION GUIDE

QUANTIFY INSTALLATION GUIDE QUANTIFY INSTALLATION GUIDE Thank you for putting your trust in Avontus! This guide reviews the process of installing Quantify software. For Quantify system requirement information, please refer to the

More information

Mac OS X. Staff members using NEIU issued laptops and computers on Active Directory can access NEIU resources that are available on the wired network.

Mac OS X. Staff members using NEIU issued laptops and computers on Active Directory can access NEIU resources that are available on the wired network. Mac OS X The University Technology Services is privileged to offer a secure wifi network to the university community. Connecting to this network will provide you with benefits in security and improved

More information

APPENDIX B1 - FUNCTIONALITY AND INTEGRATION REQUIREMENTS RESPONSE FORM FOR A COUNTY HOSTED SOLUTION

APPENDIX B1 - FUNCTIONALITY AND INTEGRATION REQUIREMENTS RESPONSE FORM FOR A COUNTY HOSTED SOLUTION APPENDIX B1 - FUNCTIONALITY AND INTEGRATION REQUIREMENTS RESPONSE FORM FOR A COUNTY HOSTED SOLUTION Response Code: Offeror should place the appropriate letter designation in the Availability column according

More information

Version 5 - July 2015 IT Services Page 2

Version 5 - July 2015 IT Services Page 2 Version 5 - July 2015 IT Services Page 2 Contents 1. Introduction 4 2. Initial connection 5 3. Network Registration 6 4. Network registration: Scanning your computer (network remediation) 8 5. System check

More information

ONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS

ONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS $ ONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS Boston Private Bank & Trust Company takes great care to safeguard the security of your Online Banking transactions. In addition to our robust security

More information

CNJG Annual Meeting Pre-Meeting Workshop. Presentors: David Binder, Dir., IT Don Debias, Help Desk Mgr. John Bednar, Sr. Help Desk Specialist

CNJG Annual Meeting Pre-Meeting Workshop. Presentors: David Binder, Dir., IT Don Debias, Help Desk Mgr. John Bednar, Sr. Help Desk Specialist CNJG Annual Meeting Pre-Meeting Workshop Presentors: David Binder, Dir., IT Don Debias, Help Desk Mgr. John Bednar, Sr. Help Desk Specialist Agenda Overview of current state of technology Hardware Software

More information

Email Update Instructions

Email Update Instructions Email Update Instructions Table of Contents Email Client Settings The Basics... 2 Outlook 2013... 2 Outlook 2007... 4 Outlook Express... 6 Windows Mail... 7 Thunderbird 3... 9 Apple Mail... 11 1 Email

More information

FAQ. How does the new Big Bend Backup (powered by Keepit) work?

FAQ. How does the new Big Bend Backup (powered by Keepit) work? FAQ How does the new Big Bend Backup (powered by Keepit) work? Once you establish which of the folders on your hard drive you ll be backing up, you ll log into myaccount.bigbend.net and from your control

More information

Installation Instructions

Installation Instructions Avira Secure Backup Installation Instructions Trademarks and Copyright Trademarks Windows is a registered trademark of the Microsoft Corporation in the United States and other countries. All other brand

More information