1. Threat Types Express familiarity with different threat types such as Virus, Malware, Trojan, Spyware, and Downloaders.

Size: px
Start display at page:

Download "1. Threat Types Express familiarity with different threat types such as Virus, Malware, Trojan, Spyware, and Downloaders."

Transcription

1 Threat Protection Tools and Best Practices Objectives 1. Threat Types Express familiarity with different threat types such as Virus, Malware, Trojan, Spyware, and Downloaders. 2. Threat Vectors Be familiar with common threat vectors (sources) like websites, Scare Tactics, social networking, , and media. 3. Virus Protection Show knowledge of the following: Real time protection, standalone protection, and the recommended frequency of scheduled scans 4. The Unknown Understand the concept of the Unknown malware. 5. Reporting Know what events should be reported/ recorded. 6. Windows Updates Express understanding of 2 forms and 2 flavors as well as proper timing of updates installation.

2 Threat Protection Tools and Best Practices The greatest threat to our security is assuming the following: Threat Types Virus Malware Someone is looking out for us. They have our best interests in mind. They do not have ulterior motives. No one would do that, it s unethical. A virus is a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data. Malware is software designed to infiltrate or damage a computer system without the owner's informed consent. It includes Trojans, viruses, worms, and downloaders. A Trojan horse, or Trojan Spyware A Trojan is a hacking program that is a non self replicating type of malware which gains privileged access to the operating system while appearing to perform a desirable function but instead drops a malicious payload, often including a backdoor allowing unauthorized access. This can allow the Trojan creator an opportunity to utilize your computer. Spyware enables a hacker to obtain information about another person s computer activities. It does this by by transmitting data covertly from their hard drive thru the internet. Downloaders and Droppers Downloaders continually downloads all of the above to keep the computer infected even after removal of the offending program. Once inside your computer they can be used to bypass antivirus programs by concealing malware payloads within a container/program or downloading them directly.

3 Threat Vectors Internet Bait We are Fish. Game and screen saver websites, and Internet Explorer add ons. Screensavers are programs. Any program can be poorly written. Avoid game and screensavers sites Many game sites will require you to install an add on to internet explorer. Some of these add ons can be harmful to your computer and others can take your internet over completely. Screensaver websites are a known source of viruses and malware. As well, poorly written screen savers can cause performance problems with your computer. They may not unload from memory fully or can cause memory faults because they are trying to use memory already being used by windows or other programs. Social Networking Scare Tactics Social networking applications like Facebook and others allow you to pass files (programs, pictures, and documents between users. Just because they are your friend on Facebook it does not mean they are safe with their files or computer/device. Don t fall for Scare Tactics. Analyze everything. Scare tactics come from many sources, warnings, website pop up ads, etc., warning you that your computer is infected. They are designed to convince you to take some action that will ultimately be harmful to your computer or your identity. The safest way to close a popup webpage or rogue program is to hit CTRL ALT DEL and click on Task Manager. Select the internet explorer instance or program that you think is the proper one and click on end task. Alternately you can log out of any software package that you are connected to shut down your computer normally without clicking on anything else. Don t give out your work address online unless it is for official business. The best way to reduce junk mail is by not giving out your address unless it is necessary in the performance of your job duties. Do not participate in joke/junk mail circles. Your address gets forwarded on to everyone else who ever reads it in the future. Preview pane in Outlook or other clients. Turn off the preview pane (reading pane) in your client With the preview pane on, you can t select an to delete it without opening it in the viewer. Turning off this preview will allow you to select and delete without ever opening the mail. Disable for inbox, junk, and deleted items.

4 Personal s Media Don t check your personal while at work. Doing so subjects your office computers to unnecessary risk. If you must check personal at work please get authorization from your supervisor. Utilizing your personal for work related activities can subject your account to investigation and possible search now and into the future due to unforeseeable litigation that may be put upon your office/department. Any tape, CD, DVD, floppy, flash, or other Input/Output device can carry malware and can infect your computer/device. Virus Protection Free Antivirus Free antivirus products rarely provides as much protection and support as a paid for antivirus. Review the EULA of any Free products that you use to be sure that Use on Government computers is allowed. Real Time Protection Real time protection resides between you and your computer and the internet. It monitors incoming/outgoing data and blocks its entry into the computer if the data matches a known malware pattern. Never install more than one antivirus program that provides Real Time protection on your computer. They will fight for ultimate control and your computer can suffer from poor performance as a result. Standalone Protection Get a second opinion Freestanding programs (not to be confused with free programs) are available that can provide you with a second opinion of your malware status. Online scanning for malicious software can also be done at several antivirus vendor sites. Scheduled Scans The most overlooked protection step is not scanning your hard drive. Just having an antivirus installed and updated is not enough. Weekly/monthly scheduled scanning of your drive should also be taking place. As your antivirus learns of new threats (updates), it may detect a malware that has been living in your computer without your knowledge.

5 The Unknown New or unknown viruses and malware All malware spends some time as an unknown. There is always some time lag between when a virus or malware gets created and when you are protected from it. Someone has to get it. It has to be identified as a virus. Antivirus vendors have to update their detection schemes to detect it and you have to download the update. This can take weeks during which time you are vulnerable to the new attack. The only 100% protection for a computer is not to have it connected to any network or internet at all. Even then, CD s or flash drives that are infected can be inserted infecting even the invulnerable. Reporting Need for Reporting, virus, odd behavior, and compromise. Report any suspicious activity or unexpected computer events to your supervisor If your antivirus reports a virus or your homepage suddenly changes you should report this to your supervisor. Odd behavior can be your warning that something is about to go wrong. It may be that your computer and or data have been compromised and this should be investigated further. Windows Updates Windows updates provide security patches and performance fixes as well as bug fixes and Service Packs. Service packs (come from windows update) are MAJOR operating system upgrades and should only be done after backing up your data and when you have plenty of time for it to finish. A cautionary note about timing and workload Do not perform windows updates just prior to any major work project like payroll, year end processes, or budget. Windows Updates Windows updates comes in 2 forms, Automatic and Manual and 2 flavors, Windows updates and Microsoft Updates. Most users will install automatic updates routinely because they get reminded by the balloon popup every time they log on or shutdown. Users should periodically perform a manual update by clicking on the windows update link. The first time there you should sign up for Microsoft Updates This will allow updates for other Microsoft products (Word, Excel, etc) to be installed as well. After signing up for Microsoft updates, you should repeatedly come back to this link until it shows 0 (zero) critical updates available. Manual updating should be done every 6 months. LGC recommendations/offerings Your office may purchase AVG antivirus from LGC. After the initial sale, we can include the AVG product renewal in with your annual hardware support costs on contracted computers. For non contracted computers we can provide renewals on demand at a cost.

6 LGC also offers Malwarebytes Antimalware. It comes quoted automatically with any new PC and we can sell a copy to any existing user. MWB is a onetime purchase per computer and is not transferrable. Discussion Testing Closing

7 Tools and Best Practices INTRODUCTION The greatest threat to our digital security is assuming the following: Someone else is looking out for me. They have my best interests in mind. No one would do that, it s unethical. It won t happen to me, I have nothing of value on my computer. It won t matter if I get a virus because all I do is surf the internet. OBJECTIVES To gain a basic understanding of the following topics: Threat Types Threat Vectors (sources) Virus Protection The Unknown Malware Reporting Windows Updates 1

8 THREAT TYPES Malware Malware is software designed to infiltrate or damage a computer system without the owner's informed consent. It includes Trojans, viruses, worms, and downloaders. Virus A virus is a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data. Trojan A Trojan is a hacking program that is a non-self-replicating type of malware which gains privileged access to the operating system while appearing to perform a desirable function but instead drops a malicious payload, often including a backdoor allowing unauthorized access. This can allow the Trojan creator an opportunity to utilize your computer. Spyware Spyware enables a hacker to obtain information about another person s computer activities. It does this by transmitting data covertly from their hard drive thru the internet. Downloaders and Droppers Downloaders continually downloads all of the above to keep the computer infected even after removal of the offending program. Once inside your computer they can be used to bypass antivirus programs by concealing malware payloads within a container/program or downloading them directly. MALWARE TROJANS, VIRUSES, WORMS, AND DOWNLOADERS. Malware Trojans allow the enemy inside your computer by opening a backdoor. Viruses are self replicating and spread throughout your files. Worms propagate themselves thru your local area network Downloaders Invite all their buddies into your computer THREAT VECTORS Internet - Avoid game and screensavers sites Many game sites will require you to install an add-on to internet explorer. Some of these add-ons can be harmful to your computer and others can take your internet over completely. Screensaver websites are a known source of viruses and malware. As well, poorly written screen savers can cause performance problems with your computer. Social Networking Social networking applications like Facebook and others allow you to pass files (programs, pictures, and documents) between users. Just because they are your friend on Facebook it does not mean they are safe with their files or computer/device. Scare Tactics Don t fall for Scare Tactics. Analyze everything. Scare tactics come from many sources, warnings, website pop-up ads, etc., warning you that your computer is infected. They are designed to convince you to take some action that will ultimately be harmful to your computer or your identity. The safest way to close a popup webpage or rogue program is to hit CTRL-ALT-DEL and click on Task Manager. Select the internet explorer instance or program that you think is the proper one and click on end task. Alternately you can log out of any software package that you are connected to shut down your computer normally without clicking on anything else. 2

9 WE ARE ALL FISH Screen Savers, Desktop images, and Games are the bait. THREAT VECTORS - CONTINUED Don t give out your work address online unless it is for official business. The best way to reduce junk mail is by not giving out your address unless it is necessary in the performance of your job duties. Do not participate in joke/junk mail circles. Your address gets forwarded on to everyone else who ever reads it in the future. Turn off the preview pane (reading pane) in your client With the preview pane on, you can t select an to delete it without opening it in the viewer. Turning off this preview will allow you to select and delete without ever opening the mail. Disable for inbox, junk, and deleted items. Personal s Don t check your personal while at work. Doing so subjects your office computers to un-necessary risk. If you must check personal at work please get authorization from your supervisor. Utilizing your personal for work related activities can subject your account to investigation and possible search now and into the future due to unforeseeable litigation that may be put upon your office/department. Media Any tape, CD, DVD, floppy, flash, or other Input/Output device can carry malware and can infect your computer/device. - KEEP SOME THINGS VERY PRIVATE Don t give out your address. Use a bogus account or fictitious information first. Create a 2 nd Junk account for your junk correspondence that must have a valid address. Don t check your personal at work. Don t check your work at home. 3

10 TURN OFF THE PREVIEW PANE Turn off the reading pane for Inbox, Deleted items, and Junk Mail VIRUS PROTECTION Free antivirus products rarely provides as much protection and support as a paid for antivirus. Review the EULA of any Free products that you use to be sure that Use on Government computers is allowed. Real-time protection resides between you, your computer, and the internet. It monitors incoming/outgoing data and blocks its entry into the computer if the data matches a known malware pattern. Never install more than one antivirus program that provides Real Time protection on your computer. They will fight for ultimate control and your computer can suffer from poor performance as a result. Standalone Protection Get a second opinion - Freestanding programs (not to be confused with free programs) are available that can provide you with a second opinion of your malware status. Online scanning for malicious software can also be done at several antivirus vendor sites. Scheduled Scans The most overlooked protection step is not scanning your hard drive. Just having an antivirus installed and updated is not enough. Weekly/monthly scheduled scanning of your drive should also be taking place. As your antivirus learns of new threats (updates), it may detect a malware that has been living in your computer without your knowledge. FREE IS NOT REALLY FREE What does Free mean? Cost is not measured in pure dollars anymore. What is your privacy worth? What is access to your PC worth? Free versions are obviously something less than Paid For versions! Read the EULA 4

11 THE UNKNOWN MALWARE All malware spends some time as an unknown. There is always some time lag between when a virus or malware gets created and when you are protected from it. Someone has to get it. It has to be identified as a virus. Antivirus vendors have to update their detection schemes to detect it and you have to download the update. This can take weeks during which time you are vulnerable to the new attack. The only 100% protection for a computer is not to have it connected to any network or internet at all. Even then, CD s or flash drives that are infected can be inserted infecting even the invulnerable. REPORTING RESPONSIBILITIES Individual office personnel must report suspicious activity or they put the whole office at risk. It s everyone s responsibility to insure the security and integrity of office data. Government and Corporate offices are incorporating network monitoring systems to track data transfers and internet usage. WINDOWS UPDATES Windows updates provide security patches and performance fixes as well as bug fixes and Service Packs. Service packs (come from windows update) are MAJOR operating system upgrades and should only be done after backing up your data and when you have plenty of time for it to finish. Do not perform windows updates just prior to any major work project like payroll, year-end processes, or budget. Windows Updates Windows updates comes in 2 forms, Automatic and Manual and 2 flavors, Windows updates and Microsoft Updates. Most users will install automatic updates routinely because they get reminded by the balloon popup every time they log on or shutdown. Users should periodically perform a manual update by clicking on the windows update link. The first time there you should sign up for Microsoft Updates This will allow updates for other Microsoft products (Word, Excel, etc.) to be installed as well. After signing up for Microsoft updates, you should repeatedly come back to this link until it shows 0 (zero) critical updates available. Manual updating should be done every 6 months. 5

12 WINDOWS UPDATES VS. MICROSOFT UPDATES LGC RECOMMENDATIONS AND OFFERINGS Your office may purchase AVG antivirus from LGC. After the initial sale, we can include the AVG product renewal in with your annual hardware support costs on contracted computers. For non-contracted computers we can provide renewals on demand at a cost. LGC also offers Malwarebytes Antimalware. It comes quoted automatically with any new PC and we can sell a copy to any existing user. MWB is a onetime purchase per computer and is not transferrable. REVIEW QUESTIONS 1. True / False Installing more than 1 antivirus at a time is recommended. 2. Pick the correct statement a: Weekly/Monthly antivirus scan is recommended. b: You never need to scan your hard drive. c: Scanning annually is the only requirement. 3. The common threat types include: a: bogus, hoax, malware, Trojans, and spyware b. rogue, malware, virus, spyware and downloaders c: malware, viruses, Trojans, spyware, and downloaders 6

13 REVIEW QUESTIONS CONTINUED 4. Common places to acquire a malware include: a. subways, coffee shops, , and internet cafes. b. internet, social networking, scare tactics, , and media c. jail, prison, detention, my neighbors house, and the hospital 5. True / False. Unknown malware can t hurt your computer because your antivirus does not recognize it. 6. Who should report unusual computer behavior? 7. Operating system updates comes in 2 forms and 2 flavors. What are they? a. Reverse, forward, Chocolate, and Vanilla. b. Automatic, manual, windows updates, and Microsoft updates. c. Update, uninstall, windows updates, Microsoft updates. LOCAL GOVERNMENT CORPORATION Thank You for Attending Threat Protection at Resource

Malware, Spyware, Adware, Viruses. Gracie White, Scott Black Information Technology Services

Malware, Spyware, Adware, Viruses. Gracie White, Scott Black Information Technology Services Malware, Spyware, Adware, Viruses Gracie White, Scott Black Information Technology Services The average computer user should be aware of potential threats to their computer every time they connect to the

More information

PC Security and Maintenance

PC Security and Maintenance PC Security and Maintenance by IMRAN GHANI PC Maintenance and Security-Forecast. Major sources of danger. Important steps to protect your PC. PC Security Tools. PC Maintenance Tools. Tips. PC Security-

More information

Keeping you and your computer safe in the digital world.

Keeping you and your computer safe in the digital world. Keeping you and your computer safe in the digital world. After completing this class, you should be able to: Explain the terms security and privacy as applied to the digital world Identify digital threats

More information

What you need to know to keep your computer safe on the Internet

What you need to know to keep your computer safe on the Internet What you need to know to keep your computer safe on the Internet Tip 1: Always install Operating System updates The most important steps for any computer user is to always install updates, especially security

More information

Don t Fall Victim to Cybercrime:

Don t Fall Victim to Cybercrime: Don t Fall Victim to Cybercrime: Best Practices to Safeguard Your Business Agenda Cybercrime Overview Corporate Account Takeover Computer Hacking, Phishing, Malware Breach Statistics Internet Security

More information

Online Security Awareness - UAE Exchange - Foreign Exchange Send Money UAE Exchange

Online Security Awareness - UAE Exchange - Foreign Exchange Send Money UAE Exchange The responsibility of safeguarding your personal information starts with you. Your information is critical and it must be protected from unauthorised disclosure, modification or destruction. Here we are

More information

PROTECT YOUR COMPUTER AND YOUR PRIVACY!

PROTECT YOUR COMPUTER AND YOUR PRIVACY! PROTECT YOUR COMPUTER AND YOUR PRIVACY! Fraud comes in many shapes simple: the loss of both money protecting your computer and Take action and get peace of and sizes, but the outcome is and time. That

More information

Virus Definition and Adware

Virus Definition and Adware DANEnet Round Table: Viruses and Spyware Definition of a computer virus: -A computer program that is designed to replicate itself by copying itself into the other programs stored in a computer. It may

More information

Open an attachment and bring down your network?

Open an attachment and bring down your network? Open an attachment and bring down your network? Many people think this will never happen to them, but virus attacks can come from unlikely sources and can strike when you least expect it. They can wreak

More information

OCT Training & Technology Solutions Training@qc.cuny.edu (718) 997-4875

OCT Training & Technology Solutions Training@qc.cuny.edu (718) 997-4875 OCT Training & Technology Solutions Training@qc.cuny.edu (718) 997-4875 Understanding Information Security Information Security Information security refers to safeguarding information from misuse and theft,

More information

INTERNET & COMPUTER SECURITY March 20, 2010. Scoville Library. ccayne@biblio.org

INTERNET & COMPUTER SECURITY March 20, 2010. Scoville Library. ccayne@biblio.org INTERNET & COMPUTER SECURITY March 20, 2010 Scoville Library ccayne@biblio.org Internet: Computer Password strength Phishing Malware Email scams Identity Theft Viruses Windows updates Browser updates Backup

More information

Computer Security Maintenance Information and Self-Check Activities

Computer Security Maintenance Information and Self-Check Activities Computer Security Maintenance Information and Self-Check Activities Overview Unlike what many people think, computers are not designed to be maintenance free. Just like cars they need routine maintenance.

More information

Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning

Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning Lee Zelyck Network Administrator Regina Public Library Malware, Spyware, Trojans

More information

Computer Viruses: How to Avoid Infection

Computer Viruses: How to Avoid Infection Viruses From viruses to worms to Trojan Horses, the catchall term virus describes a threat that's been around almost as long as computers. These rogue programs exist for the simple reason to cause you

More information

Statistical Analysis of Internet Security Threats. Daniel G. James

Statistical Analysis of Internet Security Threats. Daniel G. James Statistical Analysis of Internet Security Threats Daniel G. James ABSTRACT The purpose of this paper is to analyze the statistics surrounding the most common security threats faced by Internet users. There

More information

Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:

Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details: Malicious software About ENISA The European Network and Information Security Agency (ENISA) is an EU agency created to advance the functioning of the internal market. ENISA is a centre of excellence for

More information

Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines

Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines 1. Implement anti-virus software An anti-virus program is necessary to protect your computer from malicious programs,

More information

ANTI-VIRUS POLICY OCIO-6006-09 TABLE OF CONTENTS

ANTI-VIRUS POLICY OCIO-6006-09 TABLE OF CONTENTS OCIO-6006-09 Date of Issuance: May 22, 2009 Effective Date: May 22, 2009 Review Date: Section I. Purpose II. Authority III. Scope IV. Definitions V. Policy VI. Roles and Responsibilities VII. Exceptions

More information

How To Understand What A Virus Is And How To Protect Yourself From A Virus

How To Understand What A Virus Is And How To Protect Yourself From A Virus Viruses, Trojans and Worms Oh My! 2006 Technology Leadership Presentation Series Why is my computer running so slow? What are all of these little windows popping up on my system? Why did my home page change?

More information

When you listen to the news, you hear about many different forms of computer infection(s). The most common are:

When you listen to the news, you hear about many different forms of computer infection(s). The most common are: Access to information and entertainment, credit and financial services, products from every corner of the world even to your work is greater than ever. Thanks to the Internet, you can conduct your banking,

More information

What are Viruses, Trojans, Worms & Spyware:

What are Viruses, Trojans, Worms & Spyware: What are Viruses, Trojans, Worms & Spyware: There are many different types of computer viruses circulating in the cyber world, including regular Computer Viruses, Worms, Trojans, and Spyware. Each is different

More information

How to stay safe online

How to stay safe online How to stay safe online Everyone knows about computer viruses...or at least they think they do. Nearly 30 years ago, the first computer virus was written and since then, millions of viruses and other malware

More information

4/20/2015. Fraud Watch Campaign. AARP is Fighting for You. AARP is Fighting for You. Campaign Tactics. AARP can help you Spot & Report Fraud

4/20/2015. Fraud Watch Campaign. AARP is Fighting for You. AARP is Fighting for You. Campaign Tactics. AARP can help you Spot & Report Fraud AARP can help you Spot & Report Fraud Fraud Fighter Call Center: Talk to a volunteer trained in how to spot and report fraud. Call the Fraud Fighter Call Center at (877) 908-3360 Fraud Watch Campaign What

More information

CBI s Corporate Internet Banking Inquiry Services gives you the ability to view account details and transactions anytime, anywhere.

CBI s Corporate Internet Banking Inquiry Services gives you the ability to view account details and transactions anytime, anywhere. Benefits & Features CBI s Corporate Internet Banking Inquiry Services gives you the ability to view account details and transactions anytime, anywhere. What can I do with Internet Banking? You can inquire

More information

White Paper - Crypto Virus. A guide to protecting your IT

White Paper - Crypto Virus. A guide to protecting your IT White Paper - Crypto Virus A guide to protecting your IT Contents What is Crypto Virus?... 3 How to protect yourself from Crypto Virus?... 3 Antivirus or Managed Agents... 3 Enhanced Email Services & Extra

More information

Countermeasures against Spyware

Countermeasures against Spyware (2) Countermeasures against Spyware Are you sure your computer is not infected with Spyware? Information-technology Promotion Agency IT Security Center http://www.ipa.go.jp/security/ 1. What is a Spyware?

More information

(Self-Study) Identify How to Protect Your Network Against Viruses

(Self-Study) Identify How to Protect Your Network Against Viruses SECTION 24 (Self-Study) Identify How to Protect Your Network Against Viruses The following objective will be tested: Describe What You Can Do to Prevent a Virus Attack In this section you learn about viruses

More information

Version: 2.0. Effective From: 28/11/2014

Version: 2.0. Effective From: 28/11/2014 Policy No: OP58 Version: 2.0 Name of Policy: Anti Virus Policy Effective From: 28/11/2014 Date Ratified 17/09/2014 Ratified Health Informatics Assurance Committee Review Date 01/09/2016 Sponsor Director

More information

It is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes.

It is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. Virus What is a virus? It is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It can also be defined as a set of codes written to cause

More information

Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them

Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Lab Exercises Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Review Questions 1) In class, we made the distinction between a front-door attack and

More information

Airtel PC Secure Trouble Shooting Guide

Airtel PC Secure Trouble Shooting Guide Airtel PC Secure Trouble Shooting Guide Table of Contents Questions before installing the software Q: What is required from my PC to be able to use the Airtel PC Secure? Q: Which operating systems does

More information

Information Security Training on Malware

Information Security Training on Malware Information Security Training on Malware Outline Introduction Goal Malware defined Motivation for Malware Types of Malware Recognizing Malware How to prevent Malware Introduction Welcome to LSUHSC-NO s

More information

Corporate Account Takeover & Information Security Awareness. Customer Training

Corporate Account Takeover & Information Security Awareness. Customer Training Corporate Account Takeover & Information Security Awareness Customer Training No computer system can provide absolute security under all conditions. NO SECURITY MEASURE OR LIST OF SECURITY MEASURES CAN

More information

Common Cyber Threats. Common cyber threats include:

Common Cyber Threats. Common cyber threats include: Common Cyber Threats: and Common Cyber Threats... 2 Phishing and Spear Phishing... 3... 3... 4 Malicious Code... 5... 5... 5 Weak and Default Passwords... 6... 6... 6 Unpatched or Outdated Software Vulnerabilities...

More information

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security ITSC Training Courses Student IT Competence Programme SI1 2012 2013 Prof. Chan Yuen Yan, Rosanna Department of Engineering The Chinese University of Hong Kong SI1-1 Course Outline What you should know

More information

ONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS

ONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS $ ONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS Boston Private Bank & Trust Company takes great care to safeguard the security of your Online Banking transactions. In addition to our robust security

More information

Emerging Trends in Malware - Antivirus and Beyond

Emerging Trends in Malware - Antivirus and Beyond Malware White Paper April 2011 Emerging Trends in Malware - Antivirus and Beyond One need only listen to the news or read the latest Twitter and media updates to hear about cyber crime and be reminded

More information

Guideline for Prevention of Spyware and other Potentially Unwanted Software

Guideline for Prevention of Spyware and other Potentially Unwanted Software Guideline for Prevention of Spyware and other Potentially Unwanted Software Introduction Most users are aware of the impact of virus/worm and therefore they have taken measures to protect their computers,

More information

How to easily clean an infected computer (Malware Removal Guide)

How to easily clean an infected computer (Malware Removal Guide) How to easily clean an infected computer (Malware Removal Guide) Malware, short for malicious (or malevolent) software, is software used or programmed by attackers to disrupt computer operation, gather

More information

COMPUTER-INTERNET SECURITY. How am I vulnerable?

COMPUTER-INTERNET SECURITY. How am I vulnerable? COMPUTER-INTERNET SECURITY How am I vulnerable? 1 COMPUTER-INTERNET SECURITY Virus Worm Trojan Spyware Adware Messenger Service 2 VIRUS A computer virus is a small program written to alter the way a computer

More information

October Is National Cyber Security Awareness Month!

October Is National Cyber Security Awareness Month! (0 West Virginia Executive Branch Privacy Tip October Is National Cyber Security Awareness Month! In recognition of National Cyber Security Month, we are supplying tips to keep you safe in your work life

More information

Spyware. Michael Glenn Technology Management Michael.Glenn@Qwest.com. 2004 Qwest Communications International Inc.

Spyware. Michael Glenn Technology Management Michael.Glenn@Qwest.com. 2004 Qwest Communications International Inc. Spyware Michael Glenn Technology Management Michael.Glenn@Qwest.com Agenda Security Fundamentals Current Issues Spyware Definitions Overlaps of Threats Best Practices What Service Providers are Doing References

More information

Ohio University Computer Services Center October, 2004 Spyware, Adware, and Virus Guide

Ohio University Computer Services Center October, 2004 Spyware, Adware, and Virus Guide Ohio University Computer Services Center October, 2004 Spyware, Adware, and Virus Guide Definitions Malware is term meaning malicious software. Malware is software designed to disrupt a computer system.

More information

Corporate Account Takeover & Information Security Awareness

Corporate Account Takeover & Information Security Awareness Corporate Account Takeover & Information Security Awareness The information contained in this session may contain privileged and confidential information. This presentation is for information purposes

More information

THE HOME LOAN SAVINGS BANK. Corporate Account Takeover & Information Security Awareness

THE HOME LOAN SAVINGS BANK. Corporate Account Takeover & Information Security Awareness THE HOME LOAN SAVINGS BANK Corporate Account Takeover & Information Security Awareness The information contained in this session may contain privileged and confidential information. This presentation is

More information

Spyware Linkages to Malware and its Affects A Multi-Layered Approach to Stopping Information Theft

Spyware Linkages to Malware and its Affects A Multi-Layered Approach to Stopping Information Theft Spyware Linkages to Malware and its Affects A Multi-Layered Approach to Stopping Information Theft Kim Duffy Internet Security Systems Agenda What are the trends? Why should I be concerned? How does Spyware

More information

Cyber Security Awareness

Cyber Security Awareness Cyber Security Awareness User IDs and Passwords Home Computer Protection Protecting your Information Firewalls Malicious Code Protection Mobile Computing Security Wireless Security Patching Possible Symptoms

More information

TRAINING FOR AMERICAN MOMENTUM BANK CLIENTS. Corporate Account Takeover & Information Security Awareness

TRAINING FOR AMERICAN MOMENTUM BANK CLIENTS. Corporate Account Takeover & Information Security Awareness TRAINING FOR AMERICAN MOMENTUM BANK CLIENTS Corporate Account Takeover & Information Security Awareness The information contained in this session may contain privileged and confidential information. This

More information

Willem Wiechers 3 rd March 2015

Willem Wiechers 3 rd March 2015 Willem Wiechers 3 rd March 2015 1 Why do we want Malware & Virus Protection? To make our computers save Wish to keep our data private Wish to have a safe environment to do our online banking, shopping,

More information

Desktop and Laptop Security Policy

Desktop and Laptop Security Policy Desktop and Laptop Security Policy Appendix A Examples of Desktop and Laptop standards and guidelines 1. Implement anti-virus software An anti-virus program is necessary to protect your computer from malicious

More information

Mifflinburg Bank & Trust. Corporate Account Takeover & Information Security Awareness

Mifflinburg Bank & Trust. Corporate Account Takeover & Information Security Awareness Mifflinburg Bank & Trust Corporate Account Takeover & Information Security Awareness The information contained in this session may contain privileged and confidential information. This presentation is

More information

License for Use Information

License for Use Information LESSON 6 MALWARE License for Use Information The following lessons and workbooks are open and publicly available under the following terms and conditions of ISECOM: All works in the Hacker Highschool project

More information

Data Management Policies. Sage ERP Online

Data Management Policies. Sage ERP Online Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...

More information

Computer Security. Uses Zip disks that hold up to 750 MB of data. Must buy and hook up the drive.

Computer Security. Uses Zip disks that hold up to 750 MB of data. Must buy and hook up the drive. Basic Computer Security Practices Make backups of important files. Apply patches to the operating system. Use anti-virus software, update definitions very frequently, and run a full virus scan at least

More information

Infocomm Sec rity is incomplete without U Be aware,

Infocomm Sec rity is incomplete without U Be aware, Infocomm Sec rity is incomplete without U Be aware, responsible secure! HACKER Smack that What you can do with these five online security measures... ANTI-VIRUS SCAMS UPDATE FIREWALL PASSWORD [ 2 ] FASTEN

More information

Malicious Software. Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ Ola.Flygt@vxu.se +46 470 70 86 49. Viruses and Related Threats

Malicious Software. Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ Ola.Flygt@vxu.se +46 470 70 86 49. Viruses and Related Threats Malicious Software Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ Ola.Flygt@vxu.se +46 470 70 86 49 1 Outline Viruses and Related Threats Malicious Programs The Nature of Viruses Antivirus

More information

Cyber Security Awareness

Cyber Security Awareness Cyber Security Awareness William F. Pelgrin Chair Page 1 Introduction Information is a critical asset. Therefore, it must be protected from unauthorized modification, destruction and disclosure. This brochure

More information

Symptoms of a Data Breach in Your Business

Symptoms of a Data Breach in Your Business Cyber Security: What you need to know to protect your business February 2014 Presented by: Jon Zayicek Vice President Sera-Brynn Topics: The landscape is changing What are the threats? How to protect your

More information

BUSINESS ADVISORY GUIDE TO SPYWARE AND VIRUSES

BUSINESS ADVISORY GUIDE TO SPYWARE AND VIRUSES BUSINESS ADVISORY GUIDE TO SPYWARE AND VIRUSES Cyber criminals lurk everywhere and are constantly finding new ways to harm you. Even legitimate websites have sophisticated methods of snooping into your

More information

N-CAP Users Guide. Everything You Need to Know About Using the Internet! How Worms Spread via Email (and How to Avoid That)

N-CAP Users Guide. Everything You Need to Know About Using the Internet! How Worms Spread via Email (and How to Avoid That) N-CAP Users Guide Everything You Need to Know About Using the Internet! How Worms Spread via Email (and How to Avoid That) How Worms Spread via Email (and How to Avoid That) Definitions of: A Virus: is

More information

Protecting Your Computer from Viruses and Spyware

Protecting Your Computer from Viruses and Spyware Protecting Your Computer from Viruses and Spyware PROTECTING YOUR COMPUTER FROM VIRUSES AND SPYWARE A virus is a program that runs on your computer without asking permission and makes copies of itself.

More information

Network Incident Report

Network Incident Report To submit copies of this form via facsimile, please FAX to 202-406-9233. Network Incident Report United States Secret Service Financial Crimes Division Electronic Crimes Branch Telephone: 202-406-5850

More information

Do you constantly get hammered by pop up ads that come from nowhere and interfere with using your computer?

Do you constantly get hammered by pop up ads that come from nowhere and interfere with using your computer? GSG Computers 698 W. Main Street Hendersonville, TN 37075 (615) 826-0017 (615) 826-0346 FAX The Computer People FREE Consumer Awareness Guide: How To Keep Your Computer Safe From Crippling Pop Ups, Viruses,

More information

Outlook Safe Sender s Filtering

Outlook Safe Sender s Filtering Outlook Safe Sender s Filtering User s Guide Also Guide to Making Internet Explorer More Secure By: Gregg Sterner Trellix Engineering Corp. Table of Contents Introduction... 1 This Manual... 3 Junk E-mail

More information

The information contained in this session may contain privileged and confidential information. This presentation is for information purposes only.

The information contained in this session may contain privileged and confidential information. This presentation is for information purposes only. The information contained in this session may contain privileged and confidential information. This presentation is for information purposes only. Before acting on any ideas presented in this session;

More information

Computer Security. Table of Contents

Computer Security. Table of Contents Computer Security This document was prepared by Barry The Computer Guy and is the sole property of My Computer Professional. Copyright 2004-2005 My Computer Professional British Columbia, Canada. Please

More information

Introduction to Computer Security Table of Contents

Introduction to Computer Security Table of Contents Introduction to Computer Security Table of Contents Introduction... 2 1 - Viruses... 3 Virus Scanners... 3 2 - Spyware... 7 Spyware Scanners... 8 3 - Firewalls... 10 Windows Firewall... 10 4 - References...

More information

C&G FLUX MARKET Internet Safety

C&G FLUX MARKET Internet Safety Internet Safety Introduction Viruses, Trojan horses, worms, and spyware are all threats that can damage our computer systems. We know we need to protect our computers, but with so many antivirus programs

More information

TROJAN HORSES: THEY DECEIVE, THEY INVADE, THEY DESTROY

TROJAN HORSES: THEY DECEIVE, THEY INVADE, THEY DESTROY TROJAN HORSES: THEY DECEIVE, THEY INVADE, THEY DESTROY Hector J. Garcia, Jr., Texas A&M University-Kingsville Dr. Ralph Reilly, University of Hartford Dr. Jack D. Shorter, Texas A&M University-Kingsville,

More information

HoneyBOT User Guide A Windows based honeypot solution

HoneyBOT User Guide A Windows based honeypot solution HoneyBOT User Guide A Windows based honeypot solution Visit our website at http://www.atomicsoftwaresolutions.com/ Table of Contents What is a Honeypot?...2 How HoneyBOT Works...2 Secure the HoneyBOT Computer...3

More information

Information Security Awareness

Information Security Awareness Corporate Account Takeover & Corporate Account Takeover & Information Security Awareness The information contained in this session may contain privileged and confidential information. This presentation

More information

www.pandasecurity.com 100% Malware-Free E-mail: A Guaranteed Approach

www.pandasecurity.com 100% Malware-Free E-mail: A Guaranteed Approach 100% Malware-Free E-mail: A Guaranteed Approach 2 100% Malware-Free E-mail: A Guaranteed Approach Panda Security's Mail Filtering Managed Service Guarantees Clean E-mail Table of Contents Table of Contents...

More information

Housekeeping Your PC

Housekeeping Your PC for WINDOW 7 Course documentation Material at:sussex.ac.uk/its/training/material/housekeeping University of Sussex Updated: June 2011 IT Services Created: December 2002 University of Sussex IT Services

More information

Computer Network and Internet Security Awareness and Responsible Use. Indian River County School District 2014-2015

Computer Network and Internet Security Awareness and Responsible Use. Indian River County School District 2014-2015 Computer Network and Internet Security Awareness and Responsible Use Indian River County School District 2014-2015 1 Through the availability of electronic resources provided by the School District of

More information

Security Consultant Scenario INFO 517-900 Term Project. Brad S. Brady. Drexel University

Security Consultant Scenario INFO 517-900 Term Project. Brad S. Brady. Drexel University Security Consultant Scenario INFO 517-900 Term Project Drexel University Author Note This paper was prepared for INFO-517-900 taught by Dr. Scott White. Table of Contents ABSTRACT.1 THE INTERVIEW...2 THE

More information

Risks REGIONAL IT COORDINATOR UNIVERSITY OF MARYLAND EXTENSION FEBRUARY 2012

Risks REGIONAL IT COORDINATOR UNIVERSITY OF MARYLAND EXTENSION FEBRUARY 2012 Minimizing Technology-Related Risks NAN STENZEL NAN STENZEL REGIONAL IT COORDINATOR UNIVERSITY OF MARYLAND EXTENSION FEBRUARY 2012 Current Computer Topics Buying a New Computer In-home Wireless Security

More information

Why is a strong password important?

Why is a strong password important? Internet Security Why is a strong password important? Identity theft motives: To gain access to resources For the challenge/fun Personal reasons Theft methods Brute forcing and other script hacking methods

More information

E-BUSINESS THREATS AND SOLUTIONS

E-BUSINESS THREATS AND SOLUTIONS E-BUSINESS THREATS AND SOLUTIONS E-BUSINESS THREATS AND SOLUTIONS E-business has forever revolutionized the way business is done. Retail has now a long way from the days of physical transactions that were

More information

It s 2 o clock: Who Has Your Data? Josh Krueger Chief Technology Officer Integrity Technology Solutions

It s 2 o clock: Who Has Your Data? Josh Krueger Chief Technology Officer Integrity Technology Solutions It s 2 o clock: Who Has Your Data? Josh Krueger Chief Technology Officer Integrity Technology Solutions Your home is your business and your farm is your network. But who has access to it? Can you protect

More information

FAKE ANTIVIRUS MALWARE This information has come from http://www.bleepingcomputer.com/ - a very useful resource if you are having computer issues.

FAKE ANTIVIRUS MALWARE This information has come from http://www.bleepingcomputer.com/ - a very useful resource if you are having computer issues. FAKE ANTIVIRUS MALWARE This information has come from http://www.bleepingcomputer.com/ - a very useful resource if you are having computer issues. The latest tactic currently being used by malware creators

More information

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft) 1- A (firewall) is a computer program that permits a user on the internal network to access the internet but severely restricts transmissions from the outside 2- A (system failure) is the prolonged malfunction

More information

ANDRA ZAHARIA MARCOM MANAGER

ANDRA ZAHARIA MARCOM MANAGER 10 Warning Signs that Your Computer is Malware Infected [Updated] ANDRA ZAHARIA MARCOM MANAGER MAY 16TH, 2016 6:05 Malware affects us all The increasing number of Internet users worldwide creates an equal

More information

Corporate Account Takeover & Information Security Awareness

Corporate Account Takeover & Information Security Awareness Corporate Account Takeover & Information Security Awareness 1 The information contained in this presentation may contain privileged and confidential information. This presentation is for information purposes

More information

BCS IT User Syllabus IT Security for Users Level 2. Version 1.0

BCS IT User Syllabus IT Security for Users Level 2. Version 1.0 BCS IT User Syllabus IT for Users Level 2 Version 1.0 June 2009 ITS2.1 System Performance ITS2.1.1 Unwanted messages ITS2.1.2 Malicious ITS2.1.1.1 ITS2.1.1.2 ITS2.1.2.1 ITS2.1.2.2 ITS2.1.2.3 ITS2.1.2.4

More information

Basic Virus Removal Steps

Basic Virus Removal Steps Basic Virus Removal Steps The following are basic instructions on how to remove most virus and spyware that infect Windows XP/Vista computers. By providing these, we hope that users will be able to remove

More information

Kaseya White Paper. Endpoint Security. Fighting Cyber Crime with Automated, Centralized Management. www.kaseya.com

Kaseya White Paper. Endpoint Security. Fighting Cyber Crime with Automated, Centralized Management. www.kaseya.com Kaseya White Paper Endpoint Security Fighting Cyber Crime with Automated, Centralized Management www.kaseya.com To win the ongoing war against hackers and cyber criminals, IT professionals must do two

More information

1. For each of the 25 questions, multiply each question response risk value (1-5) by the number of times it was chosen by the survey takers.

1. For each of the 25 questions, multiply each question response risk value (1-5) by the number of times it was chosen by the survey takers. Employee Security Awareness Survey Trenton Bond trent.bond@gmail.com Admin - Version 1.3 Security Awareness One of the most significant security risks that organizations and corporations face today is

More information

PC & Internet Security

PC & Internet Security PC & Internet Security Hello, my name is Charles Prince and I am a spokesperson for Avast Software whose home office is in Prague, the Czech Republic. I am not a salesman and I am not here to try to sell

More information

Internet Security. For Home Users

Internet Security. For Home Users Internet Security For Home Users Basic Attacks Malware Social Engineering Password Guessing Physical Theft Improper Disposal Malware Malicious software Computer programs designed to break into and create

More information

Is your data secure?

Is your data secure? You re not as safe as you think Think for a moment: Where do you keep information about your congregants or donors? In an Excel file on someone s desktop computer? An Access database housed on your laptop?

More information

This document has been produced following a request from the Hft National Speak Out Group for help with staying safe when using the internet.

This document has been produced following a request from the Hft National Speak Out Group for help with staying safe when using the internet. This document has been produced following a request from the Hft National Speak Out Group for help with staying safe when using the internet. Hft Safeguarding Group commissioned a member of Hft National

More information

Get Started Guide - PC Tools Internet Security

Get Started Guide - PC Tools Internet Security Get Started Guide - PC Tools Internet Security Table of Contents PC Tools Internet Security... 1 Getting Started with PC Tools Internet Security... 1 Installing... 1 Getting Started... 2 iii PC Tools

More information

S3 Control and System Call Indirection

S3 Control and System Call Indirection S3 Control Confirma Technology Brief November 2008 Confirma Product Support 11040 Main St., Suite 100, Bellevue, WA 98004-6368, USA Toll free: 877.274.3045 Local: 425.691.1595 Email: support@confirma.com

More information

Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime

Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime How to Protect Your Business from Malware, Phishing, and Cybercrime The SMB Security Series Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime sponsored by Introduction

More information

Software. Webroot. Spy Sweeper. User Guide. for. Webroot Software, Inc. PO Box 19816 Boulder, CO 80308 www.webroot.com. Version 6.

Software. Webroot. Spy Sweeper. User Guide. for. Webroot Software, Inc. PO Box 19816 Boulder, CO 80308 www.webroot.com. Version 6. Webroot Software User Guide for Spy Sweeper Webroot Software, Inc. PO Box 19816 Boulder, CO 80308 www.webroot.com Version 6.1 Webroot Software User Guide Version 6.1 2003 2009 Webroot Software, Inc. All

More information

User Manual. HitmanPro.Kickstart User Manual Page 1

User Manual. HitmanPro.Kickstart User Manual Page 1 User Manual HitmanPro.Kickstart User Manual Page 1 Table of Contents 1 Introduction to HitmanPro.Kickstart... 3 2 What is ransomware?... 4 3 Why do I need HitmanPro.Kickstart?... 6 4 Creating a HitmanPro.Kickstart

More information

ANTIVIRUS BEST PRACTICES

ANTIVIRUS BEST PRACTICES ANTIVIRUS BEST PRACTICES Antivirus Best Practices 1. Introduction This guideline covers the basics on Antivirus Software and its best practices. It will help to have an overall understanding of the subject

More information

What's the difference between spyware and a virus? What is Scareware?

What's the difference between spyware and a virus? What is Scareware? What's the difference between spyware and a virus? What is Scareware? Spyware and viruses are both forms of unwanted or malicious software, sometimes called "malware." You can use Microsoft Security Essentials

More information

Activities for Protecting Your Identity and Computer for Middle and High School Students

Activities for Protecting Your Identity and Computer for Middle and High School Students Activities for Protecting Your Identity and Computer for Middle and High School Students Overview There are three posters about protecting your computer for this grade span. We recommend that these be

More information

Contents. McAfee Internet Security 3

Contents. McAfee Internet Security 3 User Guide i Contents McAfee Internet Security 3 McAfee SecurityCenter... 5 SecurityCenter features... 6 Using SecurityCenter... 7 Fixing or ignoring protection problems... 16 Working with alerts... 21

More information