Beginners Security Basics Presentation. Presented by Tom Crittenden RASCALs 2015

Size: px
Start display at page:

Download "Beginners Security Basics Presentation. Presented by Tom Crittenden RASCALs 2015"

Transcription

1 Beginners Security Basics Presentation Presented by Tom Crittenden RASCALs 2015

2 What we ll Discuss This will be mostly about you your practices and things you can do (or not do). Safe (at least safer) Practices for and Internet use Web practices. PC Security Programs (brief) including antivirus, and firewalls Updates and monitoring A quick look at File Encryption Caveat: The opinions expressed are my own, and do not necessarily represent RASCALs or their Board of Directors. In other words don t take my say (or anyone else s). We ll do a general Q&A at the end of the presentation. Please hold questions to the end. We ll also breeze through most of the Web Browser suggestions I m being lazy and not deleting them from this general discussion of PC Security. 11/12/2015 2

3 Glossary CP Control Panel IE Internet Explorer (web browser) IMHO In my humble opinion PC Personal Computer (as in it's your PC, not mine do your homework). I ll use PC generically for laptops, desktops, tablets, etc. W10(or 8 or 7) Windows 10 or 8 or 8.1, or 7 11/12/2015 3

4 Safe(r) Be cautious about all s, but especially unsolicited. Don t open an if you re not sure of the sender or the topic. Don t open attachments unless you re sure about the sender and content. Even if it s from someone you know make sure it s something you would expect from the sender. If in doubt send an to the sender (or call) for confirmation they sent it. Don t click on links they may be spoofed. Copy the link from the , and paste in in the browser use Sandboxie if you re not sure about the sender. If you do want to open an attachment save it first this gives your antivirus another shot. Use and pay attention to SPAM filters if your provider has SPAM settings set them up. Use Throw away s for web purchases, surveys etc. Save your personal for things like friends, family, and select web sites (e.g. financial). You can create free accounts at Google, Yahoo and others. Delete the throw away account if it s getting too much SPAM. Be careful about putting personal information in s even with encrypted settings it s only secure to your provider, but not all the other Internet nodes it goes through including the receiver. Take the RASCALs Basics class. 11/12/2015 4

5 Phishing Cautions Phishing s are increasing, and increasingly clever. They want your personal information for theft or ID theft. First defense is to not open suspicious mail. Use plain text until you ve confirmed the . Don t click on links (again). For example if the is supposed to be from your bank, go directly to your bank site in your browser and not from the link. Using a Password Manager to log into a site avoids the phishing link. A Password Manager allows you to use Strong Passwords (10-12 in length, mix of upper and lower case, numbers, and special characters) and then only have to remember the Password Manager password. I also back up my passwords in a file that s kept in a safe location. Don t give out personal information including usernames and passwords either on a web site or in replying to (or sending) s see previous step, and also security. Don t respond to: You ve just won; Too good to be true. Use an anti-phishing filter many antivirus suites and some clients have them. Use browser add-ons and firewall filters to prevent the phishing site from displaying in case you did accidentally click on a phishing link. See safe(r) browsing. Use anti-phishing settings and add-ons in your web browser. 11/12/2015 5

6 Don t Get Hijacked You probably know someone who had their hijacked maybe you got a phishing or Spam from them. Below are some steps to reduce the chances of you re being hijacked Choose a strong password. A strong password uses letters, numbers and special characters and is longer than eight. Also change it periodically, and immediately change if you suspect usage. Use unique password(s) for your account(s). Avoid sharing your address on the Internet. Placing your address in public forum messages or otherwise spreading it around in full view online is an invitation for spammers to spoof your . Essentially, spammers collect addresses and send out spams that appear to come from those addresses. Don't make it easy for spammers to find and use your address. Use throw-away. Use anti-virus software and keep it up to date. Use an program with a spam filter. Most applications have spam filters built in that will filter out potentially dangerous s that could give hackers an in-road into your account or computer. Flag spam s that aren't caught automatically and don't open s from unknown senders. Don't give out your address or password. Any person or web site that asks for your password is most likely not legitimate. Your provider will never ask you to give out your password or type it into an online form on another web site. The same goes for phone calls from people who may be pretending to be from technical support. If you have any doubt, contact the company directly to verify the request or determine if a web page is legitimate. If using webmail (with a browser) be sure to use a secure (HTTPS) connection. Be careful with untrusted computers (such as libraries). If you must use one, consider a Password Manager like RoboForm To Go so key loggers can t grab your password. 11/12/2015 6

7 Safe(r) Web Browsing 1 According to a Google study about 10% of all web pages have malware. This number is old and may be higher. Whenever possible stay with web sites you know and trust. If you do a search pick the site(s) you know for information. I mentioned Sandboxie earlier it s a great program if you re going to sites you don t know. More later. Always question and be suspicious. If you re not sure about something use the web for research. For example before trusting xyz site put xyz site complaint into your favorite search engine (e.g. Google). Then search again using xyz site problem. This technique can also be used to research software, things to buy, etc. Use web site rating add-ons to get security information about sites. Examples are Web of Trust and MacAfee Site Advisor. Use secure web sites as much as possible. Your browser will show a padlock symbol, and the site name will start with (the s means secure). Use strong passwords again that s 8 or more characters that include upper case letters and numbers random is best. 11/12/2015 7

8 Safe(r) Web Browsing 2 Use extra caution if ordering online (secure site, known business). Ask friends and family for recommendations don t forget the RASCAL list server (currently suspended for new membership) to get opinions from your fellow RASCALs. Use a different password for every site especially financial sites, and set a schedule to change them. Did I mention using a Password Manager. Clear your browser history and cookies including flash cookies. Don t save passwords in browser. Consider private browsing. Choose your Browser I prefer ones like Firefox that are easy to set securely (e.g. Private Browsing). IMHO IE has had too many security holes for me to be comfortable. Take the RASCALs Internet Basics class. 11/12/2015 8

9 What is an antivirus program? Detection is the first line of defense. Antivirus (AV) programs use signature files (that are updated from the vendor site) to detect known malware, and heuristic algorithms to detect new in the wild problems. Detection includes looking at all files and s downloaded or copied to the PC. Files are also scanned when opened or saved. The second line of defense is removal once infected. No AV program does all of these 100% effectively. Windows had not come with antivirus, until Windows 8 (finally). Even so I prefer others to the one supplied. Remember that most failures of antivirus and firewalls start with your and web practices. 11/12/2015 9

10 Do I need a firewall From The very short, very easy answer is: *!#@ yes! With all that's happening on the internet these days it's simply too risky to sit "naked" on the internet unless you really know what you're doing. I firewall monitors the traffic between your PC and the outside. It prevents unwanted access (inbound-intrusion) from the Internet. It also controls what can access the Internet from our PC (outbound) to reduce the chance of malware (e.g. key loggers) from connecting to the Internet. Having a good firewall, antivirus, and anti-adware all help keep you secure. But, the most important security device is you. If you aren t careful about what you view and download (e.g. latest game, picture of Paris Hilton), no amount of protection will keep bad stuff off your PC. It s also important to keep your Windows, AV and other programs up to date. A security hole (e.g. Adobe Reader April, 2009) will leave you vulnerable even if you AV, Windows, and firewall are up to date. Programs like Secunia PSI can help keep applications up to date ( Windows 7 and 8 come with an OK firewall I prefer third party that include features like web filtering. 11/12/

11 Updates & Monitoring To make sure your security software is doing it s best you need to keep it up to date, and also monitor them. Many (most?) security programs have built in checks for data files (e.g. antivirus) and program updates. If possible I prefer the option to tell me a program update is available, rather than automatically update (except for Windows updates). What I DON T like are programs that run a background process every time Windows runs just to check for updates (like Adobe Reader). I prefer a program that checks when I run the program. One update program I like is Secunia PSI (Personal Software Inspector). You install the program, and PSI checks against an extensive database for needed security updates. Common offenders include Adobe products (including Flash), and browser updates. Two others I ve used to check for updates are FileHippo and Glary Utilities. 11/12/

12 What is Sandboxie Sandboxie is isolation software that puts a box around an application (like a Web Browser). Red arrows show changes from running program (browser, etc) into your computer. Without Sandboxie, the changes go directly to the disk. Sandboxie sets up an isolated storage it controls. 11/12/

13 Secunia PSI Secunia PSI is primarily to find programs that need updating for security reasons. Download, install, and run PSI make sure you have an Internet connection when starting PSI. It will run a scan (be patient it takes awhile), and you will probably see a report like this with one or more programs. Insecure programs have updates. End of Life usually means you need to remove, and then download a new version of the program. 11/12/

14 File Hippo and Glary File Hippo available from the FileHippo software download site evaluates your installed programs to see if updates are available. You can also set it to display beta versions if you wish. After scanning, a web browser opens with a list. You can download from the FileHippo site or (my preference) go to the various software site(s) and download. Glary Utilities has a similar function I use both as one will sometimes show an update not identified by the other. 11/12/

15 Do I Need File Encryption? Below is from a recent PC World Article It's all too easy to neglect data security, especially for a small business. While bigger organizations have IT departments, service contracts, and enterprise hardware, smaller companies frequently rely on consumer software, which lacks the same sort of always-on security functionality. But that doesn t mean that your data is unimportant, or that it has to be at risk. Encryption is a great way to keep valuable data safe whether you re transmitting it over the Internet, backing it up on a server, or just carrying it through airport security on your laptop. Encrypting your data makes it completely unreadable to anyone but you or its intended recipient. Best of all, much of the software used in offices and on personal computers already has encryption functionality built in. So, how important is your data? Do you have personal files on your PC (even things like contact lists)? Is the personal data on a laptop, tablet, external hard drive, or flash drive that is vulnerable to loss or theft? Are you willing to take the steps to protect your data? 11/12/

16 MS BitLocker BitLocker full disk encryption is available on the Pro versions of Windows 7, 8, & 10. Setup is done from CP. BitLocker works best if you have a Trusted Platform Module (TPM) chip, but can work without it, but requires some configuration in Group Policy settings. 11/12/

17 MS BitLocker You can use BitLocker on thumb drives and external hard drives as well. You ll need a password (did I mention Password Manager?). 11/12/

18 Other Encryption If you don t have (or want) Windows Pro there are other software packages that can be used to encrypt data. One I ve used is VeraCrypt, which is a successor to TrueCrypt. I can encrypt all or some data on a drive, and also be used on external devices. 11/12/

19 Review The first and most important security device is you! Follow safe practices. Use SPAM, Phishing, and malware checking software. Follow safe browsing practices. Use caution with unknown sites. Use Web Security Programs including browser settings, addons and firewall filtering to reduce the chance of going to a bad site or clicking on a bad link. Use strong passwords. Keep PC Security Programs including antivirus, and firewalls up to date. We did a brief look at file encryption. Take the RASCAL classes on Internet, , Security Basics, Antivirus and firewall, Isolation Software among others. 11/12/

20 Questions & Resources PC Security or any others? Windows Live Mail help didn t help much. Try a Google search on Live Mail 2011 plain text. One site I found helpful was Web of Trust (works with Firefox and others, and common search providers) Glary Utilties: FileHippo: ccleaner: (Note: Piriform has some other neat utilities including Speecy that gives detailed information about your PC hardware. Manage flash cookies see site or Google flash cookies (see also Better Privacy): Sandboxie: Darik s boot & nuke: (wipes disks prior to PC disposal) TOR project: (Note the irony of how many security websites are not themselves secure TOR is a rare exception.) VeraCrypt (replaces TrueCrypt): CyberGhost: RoboForm: Wi-Fi for dummies: Avast free: AVG free: Firewalls Zone Alarm and Comodo 11/12/

INTERNET & COMPUTER SECURITY March 20, 2010. Scoville Library. ccayne@biblio.org

INTERNET & COMPUTER SECURITY March 20, 2010. Scoville Library. ccayne@biblio.org INTERNET & COMPUTER SECURITY March 20, 2010 Scoville Library ccayne@biblio.org Internet: Computer Password strength Phishing Malware Email scams Identity Theft Viruses Windows updates Browser updates Backup

More information

Backup Basics Presentation. Presented by Tom Crittenden RASCALs 2015

Backup Basics Presentation. Presented by Tom Crittenden RASCALs 2015 Backup Basics Presentation Presented by Tom Crittenden RASCALs 2015 What we ll Cover Why Backup What to Backup Where to Backup How to Backup When to Backup The screens in this presentation are from Windows

More information

Protect Yourself. Who is asking? What information are they asking for? Why do they need it?

Protect Yourself. Who is asking? What information are they asking for? Why do they need it? Protect Yourself Your home computer serves many purposes: email, shopping, social networking and more. As you surf the Internet, you should be aware of the various ways to protect yourself. Of primary

More information

E-MAIL FILTERING FAQ

E-MAIL FILTERING FAQ V8.3 E-MAIL FILTERING FAQ COLTON.COM Why? Why are we switching from Postini? The Postini product and service was acquired by Google in 2007. In 2011 Google announced it would discontinue Postini. Replacement:

More information

How to stay safe online

How to stay safe online How to stay safe online Everyone knows about computer viruses...or at least they think they do. Nearly 30 years ago, the first computer virus was written and since then, millions of viruses and other malware

More information

PC Security and Maintenance

PC Security and Maintenance PC Security and Maintenance by IMRAN GHANI PC Maintenance and Security-Forecast. Major sources of danger. Important steps to protect your PC. PC Security Tools. PC Maintenance Tools. Tips. PC Security-

More information

Online Security Awareness - UAE Exchange - Foreign Exchange Send Money UAE Exchange

Online Security Awareness - UAE Exchange - Foreign Exchange Send Money UAE Exchange The responsibility of safeguarding your personal information starts with you. Your information is critical and it must be protected from unauthorised disclosure, modification or destruction. Here we are

More information

Avoiding Malware in Your Dental Practice. 10 Best Practices to Defend Your Data

Avoiding Malware in Your Dental Practice. 10 Best Practices to Defend Your Data Avoiding Malware in Your Dental Practice 10 Best Practices to Defend Your Data Avoiding Malware in Your Dental Practice Like most small business owners, you must protect your dental practice s computer

More information

It is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes.

It is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. Virus What is a virus? It is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It can also be defined as a set of codes written to cause

More information

Avoiding Malware in Your Dental Practice. 10 Best Practices to Defend Your Data

Avoiding Malware in Your Dental Practice. 10 Best Practices to Defend Your Data Avoiding Malware in Your Dental Practice 10 Best Practices to Defend Your Data Avoiding Malware in Your Dental Practice Like most small business owners, you must protect your dental practice s computer

More information

Malware & Botnets. Botnets

Malware & Botnets. Botnets - 2 - Malware & Botnets The Internet is a powerful and useful tool, but in the same way that you shouldn t drive without buckling your seat belt or ride a bike without a helmet, you shouldn t venture online

More information

Computer Security Self-Test: Questions & Scenarios

Computer Security Self-Test: Questions & Scenarios Computer Security Self-Test: Questions & Scenarios Rev. Sept 2015 Scenario #1: Your supervisor is very busy and asks you to log into the HR Server using her user-id and password to retrieve some reports.

More information

This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit.

This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit. The hidden risks of mobile applications This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit. To learn more about TraceSecurity visit www.tracesecurity.com

More information

Quarantined Messages 5 What are quarantined messages? 5 What username and password do I use to access my quarantined messages? 5

Quarantined Messages 5 What are quarantined messages? 5 What username and password do I use to access my quarantined messages? 5 Contents Paul Bunyan Net Email Filter 1 What is the Paul Bunyan Net Email Filter? 1 How do I get to the Email Filter? 1 How do I release a message from the Email Filter? 1 How do I delete messages listed

More information

What Spammers Don t Want You To Know About Permanently Blocking Their Vicious E-mails

What Spammers Don t Want You To Know About Permanently Blocking Their Vicious E-mails 2000 Linwood Ave Suite 19J Fort Lee, NJ 07024-3012 What Spammers Don t Want You To Know About Permanently Blocking Their Vicious E-mails Following Last Year s Hack Attack At Epsilon, You May Be Overwhelmed

More information

October Is National Cyber Security Awareness Month!

October Is National Cyber Security Awareness Month! (0 West Virginia Executive Branch Privacy Tip October Is National Cyber Security Awareness Month! In recognition of National Cyber Security Month, we are supplying tips to keep you safe in your work life

More information

Email Security. 01-15-09 Fort Mac

Email Security. 01-15-09 Fort Mac Email Security 01-15-09 Fort Mac Most Common Mistakes in Email Security Email Security 1. Using just one email account. 2. Holding onto spammed-out accounts too long. 3. Not closing the browser after logging

More information

This guide will go through the common ways that a user can make their computer more secure.

This guide will go through the common ways that a user can make their computer more secure. A beginners guide in how to make a Laptop/PC more secure. This guide will go through the common ways that a user can make their computer more secure. Here are the key points covered: 1) Device Password

More information

Microsoft and Windows are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries.

Microsoft and Windows are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. 2001 2014 EdgeWave. All rights reserved. The EdgeWave logo is a trademark of EdgeWave Inc. All other trademarks and registered trademarks are hereby acknowledged. Microsoft and Windows are either registered

More information

How to Use Windows Firewall With User Account Control (UAC)

How to Use Windows Firewall With User Account Control (UAC) Keeping Windows 8.1 safe and secure 14 IN THIS CHAPTER, YOU WILL LEARN HOW TO Work with the User Account Control. Use Windows Firewall. Use Windows Defender. Enhance the security of your passwords. Security

More information

Free and Legal Software You Can Download By Tom Krauser

Free and Legal Software You Can Download By Tom Krauser Free and Legal Software You Can Download By Tom Krauser Here is a list of free programs that you can download for your personal use. They are legal and free for you to install. Some may have restrictions

More information

eprism Email Security Suite

eprism Email Security Suite FAQ V8.3 eprism Email Security Suite 800-782-3762 www.edgewave.com 2001 2012 EdgeWave. All rights reserved. The EdgeWave logo is a trademark of EdgeWave Inc. All other trademarks and registered trademarks

More information

High Speed Internet - User Guide. Welcome to. your world.

High Speed Internet - User Guide. Welcome to. your world. High Speed Internet - User Guide Welcome to your world. 1 Welcome to your world :) Thank you for choosing Cogeco High Speed Internet. Welcome to your new High Speed Internet service. When it comes to a

More information

National Cyber Security Month 2015: Daily Security Awareness Tips

National Cyber Security Month 2015: Daily Security Awareness Tips National Cyber Security Month 2015: Daily Security Awareness Tips October 1 New Threats Are Constantly Being Developed. Protect Your Home Computer and Personal Devices by Automatically Installing OS Updates.

More information

Learn to protect yourself from Identity Theft. First National Bank can help.

Learn to protect yourself from Identity Theft. First National Bank can help. Learn to protect yourself from Identity Theft. First National Bank can help. Your identity is one of the most valuable things you own. It s important to keep your identity from being stolen by someone

More information

Contents. McAfee Internet Security 3

Contents. McAfee Internet Security 3 User Guide i Contents McAfee Internet Security 3 McAfee SecurityCenter... 5 SecurityCenter features... 6 Using SecurityCenter... 7 Fixing or ignoring protection problems... 16 Working with alerts... 21

More information

Why The Security You Bought Yesterday, Won t Save You Today

Why The Security You Bought Yesterday, Won t Save You Today 9th Annual Courts and Local Government Technology Conference Why The Security You Bought Yesterday, Won t Save You Today Ian Robertson Director of Information Security Michael Gough Sr. Risk Analyst About

More information

Why is a strong password important?

Why is a strong password important? Internet Security Why is a strong password important? Identity theft motives: To gain access to resources For the challenge/fun Personal reasons Theft methods Brute forcing and other script hacking methods

More information

INTRODUCTION TO EMAIL: & BASICS

INTRODUCTION TO EMAIL: & BASICS University of North Carolina at Chapel Hill Libraries Chapel Hill Public Library Carrboro Branch Library Carrboro Cybrary Durham Public Library INTRODUCTION TO EMAIL: & BASICS Getting Started Page 02 Prerequisites

More information

eprism Email Security Suite

eprism Email Security Suite FAQ V8.3 eprism Email Security Suite 800-782-3762 www.edgewave.com 2001 2012 EdgeWave. All rights reserved. The EdgeWave logo is a trademark of EdgeWave Inc. All other trademarks and registered trademarks

More information

http://connectwise.reflexion.net/login?domain=connectwise.net

http://connectwise.reflexion.net/login?domain=connectwise.net ConnectWise Total Control: Managed Email Threat Protection Version: 1.5 Creation Date: 11-September-2009 Last Updated: 24-August-2012 LOGGING IN An e-mail will be or has sent with your username and password.

More information

Secure Email Recipient Guide

Secure Email Recipient Guide Secure Email Recipient Guide Contents How to open your first Encrypted Message.... 3 Step-by-Step Guide to Opening Your First Envelope... 3 Step One:... 3 Step Two:... 4 Step Three:... 4 Step Four:...

More information

Secure Email Frequently Asked Questions

Secure Email Frequently Asked Questions Secure Email Frequently Asked Questions Frequently Asked Questions Contents General Secure Email Questions and Answers Forced TLS Questions and Answers SecureMail Questions and Answers Glossary Support

More information

Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines

Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines 1. Implement anti-virus software An anti-virus program is necessary to protect your computer from malicious programs,

More information

ANDRA ZAHARIA MARCOM MANAGER

ANDRA ZAHARIA MARCOM MANAGER 10 Warning Signs that Your Computer is Malware Infected [Updated] ANDRA ZAHARIA MARCOM MANAGER MAY 16TH, 2016 6:05 Malware affects us all The increasing number of Internet users worldwide creates an equal

More information

Basic computer security

Basic computer security Mag. iur. Dr. techn. Michael Sonntag Basic computer security E-Mail: sonntag@fim.uni-linz.ac.at http://www.fim.uni-linz.ac.at/staff/sonntag.htm Institute for Information Processing and Microprocessor Technology

More information

Tips for Banking Online Safely

Tips for Banking Online Safely If proper attention is given to safety and security, banking and monetary activities can be completed online in a convenient and effective fashion. This guide helps to establish procedures for remaining

More information

Infocomm Sec rity is incomplete without U Be aware,

Infocomm Sec rity is incomplete without U Be aware, Infocomm Sec rity is incomplete without U Be aware, responsible secure! HACKER Smack that What you can do with these five online security measures... ANTI-VIRUS SCAMS UPDATE FIREWALL PASSWORD [ 2 ] FASTEN

More information

Quick Start. Installing the software. for Webroot Internet Security Complete, Version 7.0

Quick Start. Installing the software. for Webroot Internet Security Complete, Version 7.0 Quick Start for Webroot Internet Security Complete, Version 7.0 This Quick Start describes how to install and begin using the Webroot Internet Security Complete 2011 software. This integrated suite delivers

More information

Protect yourself online

Protect yourself online Protect yourself online Advice from Nottinghamshire Police s Pre Crime Unit Get daily updates: www.nottinghamshire.police.uk www.twitter.com/nottspolice www.facebook.com/nottspolice www.youtube.com/nottinghampolice

More information

STOP. THINK. CONNECT. Online Safety Quiz

STOP. THINK. CONNECT. Online Safety Quiz STOP. THINK. CONNECT. Online Safety Quiz Round 1: Safety and Security Kristina is on Facebook and receives a friend request from a boy she doesn t know. What should she do? A. Accept the friend request.

More information

Security Awareness. ITS Security Training. Fall 2015

Security Awareness. ITS Security Training. Fall 2015 Security Awareness ITS Security Training Fall 2015 Why am I here? Isn t security an IT problem? Technology can address only a fraction of security risks. You are a primary target, or rather, your data

More information

Cyber Security: Beginners Guide to Firewalls

Cyber Security: Beginners Guide to Firewalls Cyber Security: Beginners Guide to Firewalls A Non-Technical Guide Essential for Business Managers Office Managers Operations Managers This appendix is a supplement to the Cyber Security: Getting Started

More information

Get Started Guide - PC Tools Internet Security

Get Started Guide - PC Tools Internet Security Get Started Guide - PC Tools Internet Security Table of Contents PC Tools Internet Security... 1 Getting Started with PC Tools Internet Security... 1 Installing... 1 Getting Started... 2 iii PC Tools

More information

10 Quick Tips to Mobile Security

10 Quick Tips to Mobile Security 10 Quick Tips to Mobile Security 10 Quick Tips to Mobile Security contents 03 Introduction 05 Mobile Threats and Consequences 06 Important Mobile Statistics 07 Top 10 Mobile Safety Tips 19 Resources 22

More information

PROTECT YOUR COMPUTER AND YOUR PRIVACY!

PROTECT YOUR COMPUTER AND YOUR PRIVACY! PROTECT YOUR COMPUTER AND YOUR PRIVACY! Fraud comes in many shapes simple: the loss of both money protecting your computer and Take action and get peace of and sizes, but the outcome is and time. That

More information

Setting up a Personal Email Account

Setting up a Personal Email Account Setting up a Personal Email Account Having a personal email account is vital to accessing many services on the internet. Many sites, both useful and not so useful require you to make an account with them

More information

Top 10 Tips to Keep Your Small Business Safe

Top 10 Tips to Keep Your Small Business Safe Securing Your Web World Top 10 Tips to Keep Your Small Business Safe Protecting your business against the latest Web threats has become an incredibly complicated task. The consequences of external attacks,

More information

4/20/2015. Fraud Watch Campaign. AARP is Fighting for You. AARP is Fighting for You. Campaign Tactics. AARP can help you Spot & Report Fraud

4/20/2015. Fraud Watch Campaign. AARP is Fighting for You. AARP is Fighting for You. Campaign Tactics. AARP can help you Spot & Report Fraud AARP can help you Spot & Report Fraud Fraud Fighter Call Center: Talk to a volunteer trained in how to spot and report fraud. Call the Fraud Fighter Call Center at (877) 908-3360 Fraud Watch Campaign What

More information

References NYS Office of Cyber Security and Critical Infrastructure Coordination Best Practices and Assessment Tools for the Household

References NYS Office of Cyber Security and Critical Infrastructure Coordination Best Practices and Assessment Tools for the Household This appendix is a supplement to the Cyber Security: Getting Started Guide, a non-technical reference essential for business managers, office managers, and operations managers. This appendix is one of

More information

STUDENT S INFORMATION SECURITY GUIDE

STUDENT S INFORMATION SECURITY GUIDE STUDENT S INFORMATION SECURITY GUIDE April 2013 Table of contents Information security is important - also for you...1 Use strong passwords and keep them safe...2 E-mail use...3 Beware of phishing and

More information

Cyber Security Beginners Guide to Firewalls A Non-Technical Guide

Cyber Security Beginners Guide to Firewalls A Non-Technical Guide Cyber Security Beginners Guide to Firewalls A Non-Technical Guide Essential for Business Managers Office Managers Operations Managers Multi-State Information Sharing and Analysis Center (MS-ISAC) U.S.

More information

Basic Computer Security Part 2

Basic Computer Security Part 2 Basic Computer Security Part 2 Presenter David Schaefer, MBA OCC Manager of Desktop Support Adjunct Security Instructor: Walsh College, Oakland Community College, Lawrence Technology University Welcome

More information

platforms Android BlackBerry OS ios Windows Phone NOTE: apps But not all apps are safe! malware essential

platforms Android BlackBerry OS ios Windows Phone NOTE: apps But not all apps are safe! malware essential Best Practices for Smartphone Apps A smartphone is basically a computer that you can carry in the palm of your hand. Like computers, smartphones have operating systems that are often called platforms.

More information

What you need to know to keep your computer safe on the Internet

What you need to know to keep your computer safe on the Internet What you need to know to keep your computer safe on the Internet Tip 1: Always install Operating System updates The most important steps for any computer user is to always install updates, especially security

More information

How Do People Use Security in the Home

How Do People Use Security in the Home How Do People Use Security in the Home Kaarlo Lahtela Helsinki University of Technology Kaarlo.Lahtela@hut.fi Abstract This paper investigates home security. How much people know about security and how

More information

More Details About Your Spam Digest & Dashboard

More Details About Your Spam Digest & Dashboard TABLE OF CONTENTS The Spam Digest What is the Spam Digest? What do I do with the Spam Digest? How do I view a message listed in the Spam Digest list? How do I release a message from the Spam Digest? How

More information

Online Security Information. Tips for staying safe online

Online Security Information. Tips for staying safe online Online Security Information ProCredit Bank is committed to protecting the integrity of your transactions and bank account details. ProCredit Bank therefore uses the latest security software and procedures

More information

For assistance with your computer, software or router we have supplied the following information: Tech Support 1-855-546-5000, press 1

For assistance with your computer, software or router we have supplied the following information: Tech Support 1-855-546-5000, press 1 For assistance with your computer, software or router we have supplied the following information: Tech Support 1-855-546-5000, press 1 Talk America Services Customer Service 1-855-546-5000, press 3 TALK

More information

OUTLOOK WEB ACCESS. User Guide

OUTLOOK WEB ACCESS. User Guide OUTLOOK WEB ACCESS User Guide V3 2 August 2013 Not protectively marked GETTING STARTED Outlook Web Access (OWA) provides a useful means to remotely access Council email from outside of the council access.

More information

Spam Filter Message Center. User Guide

Spam Filter Message Center. User Guide Spam Filter Message Center User Guide Powered by MX Resources, LLC 10573 W. Pico Blvd., #343 Los Angeles, CA 90064 (888) 556-7788 support@mxresources.com Introduction Introduction to the Postini Message

More information

Introduction... 2. Configuration & Spam Detection... 2. WinWare Webmail... 3. Email Accounts... 3. Email Account Notes... 4. Definitions...

Introduction... 2. Configuration & Spam Detection... 2. WinWare Webmail... 3. Email Accounts... 3. Email Account Notes... 4. Definitions... Page 1 Table of Contents Introduction... 2 Configuration & Spam Detection... 2 WinWare Webmail... 3 Email Accounts... 3 Email Account Notes... 4 Definitions... 5 Sender Policy Framework (SPF)... 5 Email

More information

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security ITSC Training Courses Student IT Competence Programme SI1 2012 2013 Prof. Chan Yuen Yan, Rosanna Department of Engineering The Chinese University of Hong Kong SI1-1 Course Outline What you should know

More information

Fighting spam in Australia. A consumer guide

Fighting spam in Australia. A consumer guide Fighting spam in Australia A consumer guide Fighting spam Use filtering software Install anti-virus software Use a personal firewall Download security patches Choose long and random passwords Protect your

More information

DSHS CA Security For Providers

DSHS CA Security For Providers DSHS CA Security For Providers Pablo F Matute DSHS Children's Information Security Officer 7/21/2015 1 Data Categories: An Overview All DSHS-owned data falls into one of four categories: Category 1 - Public

More information

How to Use Red Condor Spam Filtering

How to Use Red Condor Spam Filtering What is Spam Filtering? Spam filtering is used to detect unsolicited and unwanted email. By looking for certain words in an email's subject line, or through suspicious word patterns or word frequencies

More information

Statistical Analysis of Internet Security Threats. Daniel G. James

Statistical Analysis of Internet Security Threats. Daniel G. James Statistical Analysis of Internet Security Threats Daniel G. James ABSTRACT The purpose of this paper is to analyze the statistics surrounding the most common security threats faced by Internet users. There

More information

Certified Secure Computer User

Certified Secure Computer User Certified Secure Computer User Course Outline Module 01: Foundations of Security Essential Terminologies Computer Security Why Security? Potential Losses Due to Security Attacks Elements of Security The

More information

Professional Ethics for Computer Science

Professional Ethics for Computer Science Professional Ethics for Computer Science Chapter 4: Privacy Jie Gao Computer Science Department Stony Brook University Privacy Issues Internet privacy consists of privacy over the media of the Internet:

More information

Your Digital Dollars Online & Mobile Banking

Your Digital Dollars Online & Mobile Banking Your Digital Dollars Online & Mobile Banking There are a lot of benefits to being able to bank or make payments from just about anywhere, but it s important to know how to do these things safely. Understanding

More information

Outlook Safe Sender s Filtering

Outlook Safe Sender s Filtering Outlook Safe Sender s Filtering User s Guide Also Guide to Making Internet Explorer More Secure By: Gregg Sterner Trellix Engineering Corp. Table of Contents Introduction... 1 This Manual... 3 Junk E-mail

More information

Cyber Security Education & Awareness. Guide for User s

Cyber Security Education & Awareness. Guide for User s Cyber Security Education & Awareness Guide for User s Release Q1 2010 Version 1.1 CONTENTS 1. Introduction 2. Protection against Nasty Code 3. System Security Maintenance 4. Personal Firewalls 5. Wireless

More information

Outlook XP Email Only

Outlook XP Email Only Outlook XP Email Only Table of Contents OUTLOOK XP EMAIL 5 HOW EMAIL WORKS: 5 POP AND SMTP: 5 TO SET UP THE POP AND SMTP ADDRESSES: 6 TO SET THE DELIVERY PROPERTY: 8 STARTING OUTLOOK: 10 THE OUTLOOK BAR:

More information

Computer Security Maintenance Information and Self-Check Activities

Computer Security Maintenance Information and Self-Check Activities Computer Security Maintenance Information and Self-Check Activities Overview Unlike what many people think, computers are not designed to be maintenance free. Just like cars they need routine maintenance.

More information

ACCESSING YOUR CHAFFEY COLLEGE E-MAIL VIA THE WEB

ACCESSING YOUR CHAFFEY COLLEGE E-MAIL VIA THE WEB ACCESSING YOUR CHAFFEY COLLEGE E-MAIL VIA THE WEB If a District PC has not been permanently assigned to you for work purposes, access your Chaffey College e-mail account via the Web (Internet). You can

More information

Safe Practices for Online Banking

Safe Practices for Online Banking November 2012 Follow these guidelines to help protect your information while banking online. At First Entertainment Credit Union, our goal is to provide you with the best all around banking experience.

More information

Advice about online security

Advice about online security Advice about online security May 2013 Contents Report a suspicious email or website... 3 Security advice... 5 Genuine DWP contacts... 8 Recognising and reporting phishing and bogus emails... 9 How DWP

More information

Unipass Identity User Guide & FAQ Document v1.1

Unipass Identity User Guide & FAQ Document v1.1 Unipass Identity User Guide & FAQ Document v1.1 Some background information regarding Unipass Identity and a summary of some of the most commonly asked questions relating to your Unipass Identity. UIdP

More information

Internet Security. For Home Users

Internet Security. For Home Users Internet Security For Home Users Basic Attacks Malware Social Engineering Password Guessing Physical Theft Improper Disposal Malware Malicious software Computer programs designed to break into and create

More information

Hint: Best actions: Find out more in videos and FAQ: Hint: Best actions: Find out more in videos and FAQ:

Hint: Best actions: Find out more in videos and FAQ: Hint: Best actions: Find out more in videos and FAQ: Game Cheatsheet This is a spam email, an unsolicited and unwanted email from an unknown sender. Hint: Does this offer seem too good to be true? Perhaps you need to know more? Best actions: Delete, Check

More information

STRONGER ONLINE SECURITY

STRONGER ONLINE SECURITY STRONGER ONLINE SECURITY Enhanced online banking without compromise Manage your business banking efficiently and securely Internet banking has given business leaders and treasurers greater control of financial

More information

A Guide to Information Technology Security in Trinity College Dublin

A Guide to Information Technology Security in Trinity College Dublin A Guide to Information Technology Security in Trinity College Dublin Produced by The IT Security Officer & Training and Publications 2003 Web Address: www.tcd.ie/itsecurity Email: ITSecurity@tcd.ie 1 2

More information

Internet Quick Start Guide. Get the most out of your Midco internet service with these handy instructions.

Internet Quick Start Guide. Get the most out of your Midco internet service with these handy instructions. Internet Quick Start Guide Get the most out of your Midco internet service with these handy instructions. 1 Contents Internet Security................................................................ 4

More information

Frequently Asked Questions

Frequently Asked Questions Frequently Asked Questions 1) What does SkyBest Internet Guardian do? Prevents e-mail and image spam from reaching your inbox Halts access to dangerous Web pages Stops Web sites from installing dangerous

More information

GUIDE TO KEEPING YOUR SOCIAL MEDIA ACCOUNTS SECURE

GUIDE TO KEEPING YOUR SOCIAL MEDIA ACCOUNTS SECURE GUIDE TO KEEPING YOUR SOCIAL MEDIA ACCOUNTS SECURE Defense Media Activity TABLE OF CONTENTS PROTECTIVE MEASURES... 2 PREPARATION CHECKLIST... 2 IF YOU SUSPECT YOUR ACCOUNT IS COMPROMISED, THE FOLLOWING

More information

Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning

Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning Lee Zelyck Network Administrator Regina Public Library Malware, Spyware, Trojans

More information

Certified Secure Computer User

Certified Secure Computer User Certified Secure Computer User Exam Info Exam Name CSCU (112-12) Exam Credit Towards Certification Certified Secure Computer User (CSCU). Students need to pass the online EC-Council exam to receive the

More information

Is your data secure?

Is your data secure? You re not as safe as you think Think for a moment: Where do you keep information about your congregants or donors? In an Excel file on someone s desktop computer? An Access database housed on your laptop?

More information

Management Website User Guide. SecureAnywhere AntiVirus SecureAnywhere Internet Security Plus SecureAnywhere Complete

Management Website User Guide. SecureAnywhere AntiVirus SecureAnywhere Internet Security Plus SecureAnywhere Complete Management Website User Guide SecureAnywhere AntiVirus SecureAnywhere Internet Security Plus SecureAnywhere Complete Copyright Management Website User Guide July, 2013 2012-2013 Webroot Software, Inc.

More information

CITY OF BURLINGTON PUBLIC SCHOOLS MICROSOFT EXCHANGE 2010 OUTLOOK WEB APP USERS GUIDE

CITY OF BURLINGTON PUBLIC SCHOOLS MICROSOFT EXCHANGE 2010 OUTLOOK WEB APP USERS GUIDE CITY OF BURLINGTON PUBLIC SCHOOLS MICROSOFT EXCHANGE 2010 OUTLOOK WEB APP USERS GUIDE INTRODUCTION You can access your email account from any workstation at your school using Outlook Web Access (OWA),

More information

Welcome To The L.R.F.H.S. Computer Group Wednesday 27 th November 2013

Welcome To The L.R.F.H.S. Computer Group Wednesday 27 th November 2013 Welcome To The L.R.F.H.S. Computer Group Wednesday 27 th November 2013 BACKUP SECURITY AND THE CLOUD BACK UP ALWAYS BACK UP TO AN EXTERNAL DEVICE OR REMOVAL MEDIA- NEVER DIRECTLY ON TO YOUR COMPUTER IF

More information

Guidelines for E-mail Account Management and Effective E-mail Usage

Guidelines for E-mail Account Management and Effective E-mail Usage Guidelines for E-mail Account Management and Effective E-mail Usage October 2014 Version 1.0 Department of Electronics and Information Technology Ministry of Communications and Information Technology Government

More information

TIPS IN PREVENTING INFORMATION LEAKAGE

TIPS IN PREVENTING INFORMATION LEAKAGE TIPS IN PREVENTING INFORMATION LEAKAGE 1 Presented by Christina Keing and Frankie Fu Information Security Section (ISS), ITSC 5 Sept 2008 AIMS 2 AGENDA Recent incidents What information to protect? How

More information

PREVENTING HIGH-TECH IDENTITY THEFT

PREVENTING HIGH-TECH IDENTITY THEFT 1 PREVENTING HIGH-TECH IDENTITY THEFT Presented by The Monument Group Companies Featured speaker: David Floyd November 19, 2014 2 Introduction Preventing Identity Theft (this session) Monitoring for Theft

More information

10 Simple Computer Maintenance Tips For The Laptop

10 Simple Computer Maintenance Tips For The Laptop Greenspring Computer Club April 2015 No matter how savvy you are, there are certain things every one of us has to deal with when using a computer and we don t always deal with them in the most efficient

More information

BE SAFE ONLINE: Lesson Plan

BE SAFE ONLINE: Lesson Plan BE SAFE ONLINE: Lesson Plan Overview Danger lurks online. Web access, social media, computers, tablets and smart phones expose users to the possibility of fraud and identity theft. Learn the steps to take

More information

The PA-4000 Series can add visibility and control into your network for webmail applications to stop incoming threats and limit uploaded data.

The PA-4000 Series can add visibility and control into your network for webmail applications to stop incoming threats and limit uploaded data. Controlling Webmail Tech Note Overview Webmail interfaces are widespread and available from search providers (Yahoo, Google), software vendors (Microsoft s Hotmail), social networking sites (Myspace, Facebook),

More information

Adjust Webmail Spam Settings

Adjust Webmail Spam Settings Adjust Webmail Spam Settings An unsolicited bulk email message is known as "spam." Spam, which usually contains some sort of commercial advertising or proposition, is sent to a large number of recipients

More information

WEBMAIL User s Manual

WEBMAIL User s Manual WEBMAIL User s Manual Overview What it is: What it is not: A convenient method of retrieving and sending mails while you re away from your home computer. A sophisticated mail client meant to be your primary

More information

SecuritySecuritySecurity!

SecuritySecuritySecurity! SecuritySecuritySecurity! It was the best of times and the worst of times... I suspect Dickens would be quite surprised to learn how prophetic his words would be over 150 years after he penned them. THE

More information