Safe and Secure Computing
|
|
|
- Sabina Webb
- 10 years ago
- Views:
Transcription
1 Safe and Secure Computing KSC Seminar Presented By Steve Courtney Director KSC Computer Training Team With support from the KSC Computer Training Team Jan 20 th,2011
2 Seminar Topics Downloading and applying updates to programs PC Firewalls & Securing DSL/Cable Modem/Routers Malware, Anti-virus & anti-spyware programs Phishing - what it means and how to avoid Keyloggers - protecting your personal information Web Browser Cookies & safe web surfing Handling Spam s Password selection and management Top Security Tips Q & A 2
3 Introduction Computer Security protects your PC, and you It is never perfect but with care you can make your computer or on line account very hard to crack Wherever you use a computer, or access the internet, , social media you will need to protect your computer with strong passwords, firewalls and antivirus programs. If in doubt do not open an or go to a website you are not sure about. Follow Top Security Tips slide & be as safe as you can 3
4 Downloading and applying updates to programs Security updates keeps your PC safe Microsoft automatic updates should be ON You will need to be connected to internet to get updates Updates from Microsoft should now occur automatically. Sometimes will require reboot of your PC. You can always go to START Menu and look for Windows Update and download manually-follow instructions-easy. Win7 example Make sure Microsoft firewall is turned ON Other programs(e.g. Adobe, Firefox, Skype, Java, Flash etc) All will have an option to update automatically If not sure look under Help for check for updates & update manually windows 7 just type update in start menu file box 4
5 Updates -More If a program suddenly opens a window or gives a message like update available, update now OR User Access Control Box 1 st check program name requesting is same as being used. Windows will often check this anyway. Follow instructions, but if in doubt ask for help and cancel If program tries to access critical parts of your computer your antivirus/windows will likely popup telling you of this. If you have the choice select non-critical update or similar. If not decline and get advice. Using Anti-Virus security programs Many anti-virus programs have an option to check all programs on your computer to determine what needs security updating and then point you at the correct place to get the update. Upgrade older security risky Programs by free download From Outlook Express (XP) & Windows Mail (Vista) to Windows Live Mail or Thunderbird. From Internet Explorer 6 to Internet Explorer 8, Firefox or Chrome 5
6 PC Firewalls PC s connected to the Internet without a firewall can be hijacked quickly. Remote PC s can then control your hijacked computer without you knowing. Firewalls are designed to prevent unauthorized access/control to a PC or network. All data sent to and from a system with a firewall is monitored and compared with a set of userdefined security criteria(definitions). Any data that does not meet those criteria is blocked. There are two types of mutually complementary firewalls to consider. Host-based software firewalls software that protects the PC it is installed on.(e.g Windows Firewall, and/or anti-virus program firewall) Network-based hardware firewalls installed between your DSL or cable modem and your home network to protect all the computers on the network. Most High Speed Internet vendors(bell, Rogers etc.) supply a combined Modem and Router(wireless or wired) box. The modem/router box will contain a network hardware firewall. Windows comes with a software firewall which combined with the hardware modem/router firewall is a good start In addition to Firewalls every PC should have an anti-malware program(antivirus) for additional protection. These programs run in the background and attempt to catch virus s that may breach the firewall(s). 6
7 Securing DSL/Cable Modem/Routers For the technically inclined. However someone should do this for you following guidelines below. Securing a hardware ethernet firewall (router) change the password turn off remote management turn off UPnP (Universal Plugs and Play i.e. automatic port forwarding) Securing a wireless router All of the above PLUS implement WPA2 on the router and the clients (WEP isn't good enough any more) with a very strong password (20+ characters gibberish) change the default SSID don t bother with MAC address filtering don't turn off SSID broadcast (no extra security but performance loss) use a VPN when forced to use WEP or an unsecured access point 7
8 Malware page 1 of 3 Trojan - Software that appears to perform a desirable function for the user prior to run or install but instead facilitates unauthorized access of the user's computer system. "It is a harmful piece of software that looks legitimate. Users are tricked into loading and executing it on their systems Another example on Windows XP. Worm - is a self-replicating malware program. It uses a computer network to send copies of itself to other PC s (computers on the network), and it may do so without any user intervention Virus - A computer virus is a computer program that can copy itself and infect a computer. The term "virus" is also commonly but erroneously used to refer to other types of malware, including but not limited to adware and spyware programs that do not have the reproductive ability. Malware, short for malicious software, is software designed to secretly access a computer system without the owner's informed consent 8
9 Malware Page 2 of 3 Spyware - is a type of malware that can be installed on computers, and which collects small pieces of information about users without their knowledge. The presence of spyware is typically hidden from the user, and can be difficult to detect. Designed to steal personal info, identity theft and fraud Anti-spyware specific Programs you can obtain include: AdAware: AdAware Spybot search and destroy: spybot Spyware blaster: Microsoft Security Essentials : MSE TrendMicro - Trend scan click on "Free spyware scan 9
10 Malware Page 3-3 Adware, or advertising-supported software, is a software package which automatically plays, displays, or downloads adverts to a computer.. Botnet - is a collection of software agents, or robots, that run autonomously and automatically. The main drivers for botnets are for recognition and financial gain, often used for denial of service attacks on competitor websites and general spamming Rootkit - software that enables continued privileged access to a computer while actively hiding its presence from administrators by subverting windows operating system functionality. Keystroke logging (often called keylogging) is the action of tracking (or logging) the keys struck on a keyboard. Typically in a covert manner so that the person using the keyboard is unaware that their actions are being monitored. Used to collect financial information 10
11 Anti-virus & anti-spyware programs Which one to choose, Free or Pay $? Free: probably okay if no online banking Free : AVG Free or Microsoft Security Essentials(MSE) Pay: then decide what features you need Some do all, some just viruses or spyware Most provide internet/ spam protection Best deal you can get Often Banks will provide free if you use their online banking. Retail shops often have deals. Can often get 3 licences for price of one, so could share with a friend, or install on multiple computers. Licence is usually for a year, sometimes longer Install more than one?? Generally should avoid as conflicts occur Can run one real time, and others manually as required ALWAYS UNINSTALL old anti-virus before installing new one IMPORTANT Always do automatic definition updates 11
12 Phishing - what it means and how to avoid Phishing is the fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication. Another Phishing example via . Communications purporting to be from popular social web sites, auction sites, online payment processors or IT administrators are commonly used to lure the unsuspecting public. Phishing is typically carried out by or instant messaging, and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one. Use an anti-virus program that protects from Phishing PLUS common sense. Always get in the habit of looking at the URL Browsers like IE or Firefox will have add-ons for anti-phishing If you receive an or message you are not sure about DO NOT click on it but delete it and ask for advice. 12
13 Keyloggers - protecting your personal information Keylogger spyware, also known as a keystroke logger, is a software application that captures and records each and every keystroke that is typed on your keyboard. Protect Yourself by: Enable your firewalls. Install anti-spyware and anti-virus software. Obtain and use an automated form-filler, particularly if you often enter personal or financial information at any website. These form fillers encrypt and save this confidential information and automatically fill it in, so you won't have to type it in. Consider using an on screen keyboard. You would enter your information into this keyboard using your mouse rather than typing it in. Some Banks now employ this when you log in. Keep track of the programs that are running on your computer. Keyloggers tend to run in the background, out of sight. You can check the programs via the Task Manager by pressing (Ctrl + Alt + Delete). 13
14 Cookies are mostly harmless Web Browser Cookies & safe web surfing convenience of remembering "state" eg. username/password tracking cookies so sites always load your preference e.g English rather than French layout You can get rid of them in Firefox: Tools->Options->Privacy->Cookies->"for the originating web site only: set You get rid of them in Internet Explorer: Tools->Internet Options...->Privacy->Settings:Advanced->Block Get in the habit BEFORE and AFTER using on-line banking when using Browsers to clear history: Firefox Internet Explorer 14
15 Web Browsing - Pop up Windows Firefox( From Options) Internet Explorer(From Options) 15
16 Handling Spam s Never respond to Spam Make sure Spam filters are turned on and check spam folder on a regular basis Don't click on unsubscribe links. - If you didn t originally sign up to receive the mail, or if you don t recognize the sender or company sending the , then don t unsubscribe. Don t publish your main address on any web site or discussion forum. Use a separate address - to sign up for newsletters, online posting, and mailings. If the mailbox starts receiving an overabundance of spam, you can delete the mailbox or more aggressively filter it. Purchase anti-spam software - blocks 97-99% of spam to reduce the amount of spam you receive. Use a good program like gmail that has built in anti-spamming Do not reply to spam and Don t buy anything from spammers.. 16
17 Password selection and management Your passwords are the keys you use to access personal information that you've stored on your computer and in your online accounts ( , banking, online retailers, Skype, facebook etc.) How to make a strong password : Make it lengthy. 8 characters or more, mix upper lower case and use symbols like $,%,&. More different characters the stronger the password. E.g. ``My$Boat$Is$Blue! `` is stronger than ``joan1234`` You can create a phrase made of many words (a "pass phrase ), separated by a symbol (_, #, ~, etc.) or a number. A pass phrase is often easier to remember than a simple password. See Create a strong password Use words and phrases that are easy for you to remember, but difficult for others to guess. Change Password often typically every 90 days Password strategies to avoid Avoid sequences or repeated characters. " ," "222222," "abcdefg Avoid using only look-alike substitutions of numbers or symbols. E.g. i for 1. Avoid your login name. Any part of your name, birthday, social security number, or similar information for your loved ones constitutes a bad password choice. - ie anything that may be in public domain. Avoid simple dictionary words and different passwords for different systems Use a Password Manager to store multiple different passwords see notes allows very strong passwords, unique password per site, E.g onepass or Lastpass Keep your Passwords secret - no excuses Please see Password slides at end for full details 17
18 Top Security Tips Security Scan your computer every week Anti-virus Program and spybot (if not in anti-virus program) or Microsoft Security Essentials Make sure to download latest virus definitions and latest anti-virus programs when available Always download and install security updates for Windows and browsers(ie,firefox etc.) Enable Microsoft Firewall and automatic updates Do Not open attachment unless you know who its from. see notes Be wary of chain s, as the originator may be infected Keep your user IDs and passwords confidential Create strong, effective passwords of 8 mixed characters or more Change every 90 days, use different passwords for different accounts (e.g. vs banking) Use a secure web browsing program such as Firefox, and enable strong security and privacy settings including the use of a pop-up blocker. Set up your filters to delete or file spam messages. Back up your data to CDs or another storage medium on a regular basis. If PC gets infected then may need to wipe complete PC Hard Disk &reinstall from CD s back 18
19 Where to go to get more informatiom - How to deal with suspicious RCMP cyber-crime division excellent tips RECOL: Report Economic Crime OnLine: - examples of types of fraud check your credit history annually to make sure you have not been compromized. It s free! Equifax: TransUnion: an expert in the field 19
20 Q & A Please contact Steve Courtney at [email protected] if you have any specific questions concerning computer security or computer problems. I may be able to help or direct you to someone who can. This presentation can be found at 20
21 Supporting Slides Only 21
22 Trojan example back 22
23 More Fake examples Examples of fake and real Windows XP Security Center back 23
24 Worm Example back Don t know who [email protected] is so DONOT click on the link 24
25 Virus example back 25
26 Adware example back 26
27 Spyware example Detected by Spybot back 27
28 Phishing Examples 28 back
29 Phising example 2 back 29
30 How to make a strong password Passwords 1 of 2 Make it lengthy. Each character that you add to your password increases the protection that it provides many times over. Your passwords should be 8 or more characters in length; 14 characters or longer is ideal. You can create a phrase made of many words (a "pass phrase ), separated by a symbol (_, #, ~, etc.) or a number. A pass phrase is often easier to remember than a simple password, as well as longer and harder to guess. Combine letters, numbers, and symbols. The greater variety of characters that you have in your password, the harder it is to guess. The fewer types of characters in your password, the longer it must be. 15-character password composed only of random letters and numbers is about 33,000 times stronger than an 8-character password composed of characters from the entire keyboard. If you cannot create a password that contains symbols, you need to make it considerably longer to get the same degree of protection. An ideal password combines both length and different types of symbols. Use the entire keyboard, not just the most common characters. Symbols typed by holding down the "Shift" key and typing a number are very common in passwords. Your password will be much stronger if you choose from all the symbols on the keyboard, including punctuation marks not on the upper row of the keyboard, and any symbols unique to your language. Other important specifics include: Use words and phrases that are easy for you to remember, but difficult for others to guess. The easiest way to remember your passwords and pass phrases is to write them down. Contrary to popular belief, there is nothing wrong with writing passwords down, but they need to be adequately protected in order to remain secure and effective. In general, passwords written on a piece of paper kept away from system access devices are more difficult to compromise across the Internet than a password manager, Web site, or other software-based storage tool. How to access and change your passwords The Help files for your computer operating system will usually provide information about how to create, modify, and access password-protected user accounts, as well as how to require password protection upon startup of your computer. You can also try to find this information online at the software manufacturer's Web site. For example, if you use Microsoft Windows XP, online help can show you how to manage passwords, change passwords, and more. Keep your passwords secret Treat your passwords and pass phrases with as much care as the information that they protect. if you have to write them down, consider a password "safe" with a master password that's not written down e.g. keyring for the palm or KeePass for windows See ( - use to generate crypto secure passwords - use lastpass back 30
31 Passwords 2 of 2 Create a strong, memorable password in 3 or 4 steps Use these steps to develop a strong password: Think of a sentence that you can remember. Use a memorable sentence, such as "My grandson Aiden is three years old this year" Convert the phrase to a password. Take the first letter of each word of the sentence that you've created to create a new, nonsensical word. Using the example above, you'd get: "mgaityoty". Add complexity by mixing uppercase and lowercase letters and numbers. This might yield a password like if you always say change the 1 st letter to upper case " Mgai3yoty ". This is now a strong password. Finally, you could substitute some special characters to make the password even stronger. You can use symbols that look like letters, combine words (remove spaces) and employ other ways to make the password more complex. E.g substitute $ for y and you get mgait$ot$ Password strategies to avoid Some common methods used to create passwords are easy to guess by criminals. To avoid weak, easy-to-guess passwords: Avoid sequences or repeated characters. " ," "222222," "abcdefg," or adjacent letters on your keyboard do not help make secure passwords. Avoid using only look-alike substitutions of numbers or symbols. Criminals and other malicious users who know enough to try and crack your password will not be fooled by common look-alike replacements, such as to replace an 'i' with a '1' or an 'a' with '@' as in "M1cr0$0ft" or "P@ssw0rd". But these substitutions can be effective when combined with other measures, such as length, misspellings, or variations in case, to improve the strength of your password. Avoid your login name. Any part of your name, birthday, social security number, or similar information for your loved ones constitutes a bad password choice. This is one of the first things criminals will try. Avoid dictionary words in any language. Criminals use sophisticated tools that can rapidly guess passwords that are based on words in multiple dictionaries, including words spelled backwards, common misspellings, and substitutions. This includes all sorts of profanity and any word you would not say in front of your children. Use different passwords for different systems. If any one of the computers or online systems using this password is compromised, all of your other information protected by that password should be considered compromised as well. It is critical to use different passwords for different systems. back 31
32 back Win 7 Firewall
33 back UAC
34 back Win7 Updates ON
Malware & Botnets. Botnets
- 2 - Malware & Botnets The Internet is a powerful and useful tool, but in the same way that you shouldn t drive without buckling your seat belt or ride a bike without a helmet, you shouldn t venture online
10 Things You Need to Know About Internet Security
INFORMATION SECURITY 10 Things You Need to Know About Internet Security Presented by: Steven Blanc IT Security Officer, Bowdoin College Internet Security Versus Internet Safety Security: We must secure
Business Internet Banking / Cash Management Fraud Prevention Best Practices
Business Internet Banking / Cash Management Fraud Prevention Best Practices This document provides fraud prevention best practices that can be used as a training tool to educate new Users within your organization
Business ebanking Fraud Prevention Best Practices
Business ebanking Fraud Prevention Best Practices User ID and Password Guidelines Create a strong password with at least 8 characters that includes a combination of mixed case letters, numbers, and special
INTERNET & COMPUTER SECURITY March 20, 2010. Scoville Library. [email protected]
INTERNET & COMPUTER SECURITY March 20, 2010 Scoville Library [email protected] Internet: Computer Password strength Phishing Malware Email scams Identity Theft Viruses Windows updates Browser updates Backup
Fraud Detection and Prevention. Timothy P. Minahan Vice President Government Banking TD Bank
Fraud Detection and Prevention Timothy P. Minahan Vice President Government Banking TD Bank Prevention vs. Detection Prevention controls are designed to keep fraud from occurring Detection controls are
Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning
Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning Lee Zelyck Network Administrator Regina Public Library Malware, Spyware, Trojans
How to stay safe online
How to stay safe online Everyone knows about computer viruses...or at least they think they do. Nearly 30 years ago, the first computer virus was written and since then, millions of viruses and other malware
Best Practices Guide to Electronic Banking
Best Practices Guide to Electronic Banking City Bank & Trust Company offers a variety of services to our customers. As these services have evolved over time, a much higher percentage of customers have
Infocomm Sec rity is incomplete without U Be aware,
Infocomm Sec rity is incomplete without U Be aware, responsible secure! HACKER Smack that What you can do with these five online security measures... ANTI-VIRUS SCAMS UPDATE FIREWALL PASSWORD [ 2 ] FASTEN
When you listen to the news, you hear about many different forms of computer infection(s). The most common are:
Access to information and entertainment, credit and financial services, products from every corner of the world even to your work is greater than ever. Thanks to the Internet, you can conduct your banking,
Learn to protect yourself from Identity Theft. First National Bank can help.
Learn to protect yourself from Identity Theft. First National Bank can help. Your identity is one of the most valuable things you own. It s important to keep your identity from being stolen by someone
PROTECT YOUR COMPUTER AND YOUR PRIVACY!
PROTECT YOUR COMPUTER AND YOUR PRIVACY! Fraud comes in many shapes simple: the loss of both money protecting your computer and Take action and get peace of and sizes, but the outcome is and time. That
Safe Practices for Online Banking
November 2012 Follow these guidelines to help protect your information while banking online. At First Entertainment Credit Union, our goal is to provide you with the best all around banking experience.
Spyware. Michael Glenn Technology Management [email protected]. 2004 Qwest Communications International Inc.
Spyware Michael Glenn Technology Management [email protected] Agenda Security Fundamentals Current Issues Spyware Definitions Overlaps of Threats Best Practices What Service Providers are Doing References
How to Encrypt Files Containing Sensitive Data (using 7zip software or Microsoft password protection) How to Create Strong Passwords
How to Encrypt Files Containing Sensitive Data (using 7zip software or Microsoft password protection) How to Create Strong Passwords School IT Systems Support Herts for Learning Ltd SROB220, Robertson
Payment Fraud and Risk Management
Payment Fraud and Risk Management Act Today! 1. Help protect your computer against viruses and spyware by using anti-virus and anti-spyware software and automatic updates. Scan your computer regularly
Get Started Guide - PC Tools Internet Security
Get Started Guide - PC Tools Internet Security Table of Contents PC Tools Internet Security... 1 Getting Started with PC Tools Internet Security... 1 Installing... 1 Getting Started... 2 iii PC Tools
AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com
AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS ftrsecure.com Can You Separate Myths From Facts? Many Internet myths still persist that could leave you vulnerable to internet crimes. Check out
1. Any email requesting personal information, or asking you to verify an account, is usually a scam... even if it looks authentic.
Your identity is one of the most valuable things you own. It s important to keep your identity from being stolen by someone who can potentially harm your good name and financial well-being. Identity theft
Free and Legal Software You Can Download By Tom Krauser
Free and Legal Software You Can Download By Tom Krauser Here is a list of free programs that you can download for your personal use. They are legal and free for you to install. Some may have restrictions
Countermeasures against Spyware
(2) Countermeasures against Spyware Are you sure your computer is not infected with Spyware? Information-technology Promotion Agency IT Security Center http://www.ipa.go.jp/security/ 1. What is a Spyware?
Protection from Fraud and Identity Theft
Table of Contents Protection from Fraud & Identity Theft... 1 Simple Steps to Secure Your Devices... 1 Setting Up Your Computer and/or Mobile Device... 2 Adding Security Software... 2 Internet Safety Tips...
National Cyber Security Month 2015: Daily Security Awareness Tips
National Cyber Security Month 2015: Daily Security Awareness Tips October 1 New Threats Are Constantly Being Developed. Protect Your Home Computer and Personal Devices by Automatically Installing OS Updates.
Protect Yourself. Who is asking? What information are they asking for? Why do they need it?
Protect Yourself Your home computer serves many purposes: email, shopping, social networking and more. As you surf the Internet, you should be aware of the various ways to protect yourself. Of primary
ONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS
$ ONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS Boston Private Bank & Trust Company takes great care to safeguard the security of your Online Banking transactions. In addition to our robust security
Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:
Malicious software About ENISA The European Network and Information Security Agency (ENISA) is an EU agency created to advance the functioning of the internal market. ENISA is a centre of excellence for
Retail/Consumer Client. Internet Banking Awareness and Education Program
Retail/Consumer Client Internet Banking Awareness and Education Program Table of Contents Securing Your Environment... 3 Unsolicited Client Contact... 3 Protecting Your Identity... 3 E-mail Risk... 3 Internet
Computer Security: Best Practices for Home Computing. Presented by Student Help Desk Merced Community College
Computer Security: Best Practices for Home Computing Presented by Student Help Desk Merced Community College Defining the Problem Symantec documented 2,636 new vulnerabilities in 2003, an average of seven
Malware, Spyware, Adware, Viruses. Gracie White, Scott Black Information Technology Services
Malware, Spyware, Adware, Viruses Gracie White, Scott Black Information Technology Services The average computer user should be aware of potential threats to their computer every time they connect to the
How to Use Windows Firewall With User Account Control (UAC)
Keeping Windows 8.1 safe and secure 14 IN THIS CHAPTER, YOU WILL LEARN HOW TO Work with the User Account Control. Use Windows Firewall. Use Windows Defender. Enhance the security of your passwords. Security
OCT Training & Technology Solutions [email protected] (718) 997-4875
OCT Training & Technology Solutions [email protected] (718) 997-4875 Understanding Information Security Information Security Information security refers to safeguarding information from misuse and theft,
Spyware. Summary. Overview of Spyware. Who Is Spying?
Spyware US-CERT Summary This paper gives an overview of spyware and outlines some practices to defend against it. Spyware is becoming more widespread as online attackers and traditional criminals use it
Don t Fall Victim to Cybercrime:
Don t Fall Victim to Cybercrime: Best Practices to Safeguard Your Business Agenda Cybercrime Overview Corporate Account Takeover Computer Hacking, Phishing, Malware Breach Statistics Internet Security
Tips for Banking Online Safely
If proper attention is given to safety and security, banking and monetary activities can be completed online in a convenient and effective fashion. This guide helps to establish procedures for remaining
CLEO Remote Access Services CLEO Remote Desktop Access User Guide v1.3
CLEO ~Remote Access Services Remote Desktop Access User guide CLEO Remote Access Services CLEO Remote Desktop Access User Guide v1.3 August 2007 page 1 of 16 CLEO 2007 CLEO Remote Access Services 3SGD
Computer Security Maintenance Information and Self-Check Activities
Computer Security Maintenance Information and Self-Check Activities Overview Unlike what many people think, computers are not designed to be maintenance free. Just like cars they need routine maintenance.
General Security Best Practices
General Security Best Practices 1. One of the strongest physical security measures for a computer or server is a locked door. 2. Whenever you step away from your workstation, get into the habit of locking
Introduction to Computer Security Table of Contents
Introduction to Computer Security Table of Contents Introduction... 2 1 - Viruses... 3 Virus Scanners... 3 2 - Spyware... 7 Spyware Scanners... 8 3 - Firewalls... 10 Windows Firewall... 10 4 - References...
October Is National Cyber Security Awareness Month!
(0 West Virginia Executive Branch Privacy Tip October Is National Cyber Security Awareness Month! In recognition of National Cyber Security Month, we are supplying tips to keep you safe in your work life
Online Banking Customer Awareness and Education Program
Online Banking Customer Awareness and Education Program Electronic Fund Transfers: Your Rights and Responsibilities (Regulation E Disclosure) Indicated below are types of Electronic Fund Transfers we are
Network Security. Demo: Web browser
Network Security Demo: Web browser Email Messages An email message can be instantly forwarded around the globe, even if accidentally. Do not write anything in a message that you will later regret! Read
BE SAFE ONLINE: Lesson Plan
BE SAFE ONLINE: Lesson Plan Overview Danger lurks online. Web access, social media, computers, tablets and smart phones expose users to the possibility of fraud and identity theft. Learn the steps to take
Corporate Account Takeover & Information Security Awareness. Customer Training
Corporate Account Takeover & Information Security Awareness Customer Training No computer system can provide absolute security under all conditions. NO SECURITY MEASURE OR LIST OF SECURITY MEASURES CAN
Email Security. 01-15-09 Fort Mac
Email Security 01-15-09 Fort Mac Most Common Mistakes in Email Security Email Security 1. Using just one email account. 2. Holding onto spammed-out accounts too long. 3. Not closing the browser after logging
Remote Deposit Quick Start Guide
Treasury Management Fraud Prevention How to Protect Your Business Remote Deposit Quick Start Guide What s Inside We re committed to the safety of your company s financial information. We want to make you
User Guide for the Identity Shield
User Guide for the Identity Shield Copyright Webroot SecureAnywhere User Guide for the Identity Shield January, 2013 2013 Webroot Software, Inc. All rights reserved. Webroot is a registered trademark and
What's the difference between spyware and a virus? What is Scareware?
What's the difference between spyware and a virus? What is Scareware? Spyware and viruses are both forms of unwanted or malicious software, sometimes called "malware." You can use Microsoft Security Essentials
E-MAIL FILTERING FAQ
V8.3 E-MAIL FILTERING FAQ COLTON.COM Why? Why are we switching from Postini? The Postini product and service was acquired by Google in 2007. In 2011 Google announced it would discontinue Postini. Replacement:
Computer Protection. Computer Protection. Computer Protection 5/1/2013. Classic Battle of Good vs Evil. David Watterson & Ross Cavazos
David Watterson & Ross Cavazos Chief Information Officer IT Director City of Billings Yellowstone County Local Government IT Group Vice-Chairmen Classic Battle of Good vs Evil GOOD EVIL Firewall E-Mail
Thank you for choosing Zoom Internet!
Thank you for choosing Zoom Internet! We know you are going to love the speed, convenience and reliability of Zoom s super fast, always on connectivity to the Web! This guide provides helpful information
Common Cyber Threats. Common cyber threats include:
Common Cyber Threats: and Common Cyber Threats... 2 Phishing and Spear Phishing... 3... 3... 4 Malicious Code... 5... 5... 5 Weak and Default Passwords... 6... 6... 6 Unpatched or Outdated Software Vulnerabilities...
Online Security Awareness - UAE Exchange - Foreign Exchange Send Money UAE Exchange
The responsibility of safeguarding your personal information starts with you. Your information is critical and it must be protected from unauthorised disclosure, modification or destruction. Here we are
Basic Computer Security Part 2
Basic Computer Security Part 2 Presenter David Schaefer, MBA OCC Manager of Desktop Support Adjunct Security Instructor: Walsh College, Oakland Community College, Lawrence Technology University Welcome
Microsoft and Windows are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries.
2001 2014 EdgeWave. All rights reserved. The EdgeWave logo is a trademark of EdgeWave Inc. All other trademarks and registered trademarks are hereby acknowledged. Microsoft and Windows are either registered
It is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes.
Virus What is a virus? It is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It can also be defined as a set of codes written to cause
The Care and Feeding of Your Computer Troubleshooting and Maintenance
Keeping It Clean The Care and Feeding of Your Computer Troubleshooting and Maintenance The computer itself: Regularly dust the exterior. You can use a cloth dampened slightly with water, but do not use
Don t Click That Link and other security tips. Laura Perry Jennifer Speegle Mike Trice
Don t Click That Link and other security tips Laura Perry Jennifer Speegle Mike Trice About Us Laura Perry Information Security Jennifer Speegle Firewall Administrator Mike Trice Network Engineer Mail
Internet basics 2.3 Protecting your computer
Basics Use this document with the glossary Beginner s guide to Internet basics 2.3 Protecting your computer How can I protect my computer? This activity will show you how to protect your computer from
Customer Awareness for Security and Fraud Prevention
Customer Awareness for Security and Fraud Prevention Identity theft continues to be a growing problem in our society today. All consumers must manage their personal information wisely and cautiously to
Frequent Smart Updates: Used to detect and guard against new infections as well as adding enhancements to Spyware Doctor.
Faqs > Spyware Doctor Q1. What is Spyware Doctor? Ans.: Spyware Doctor is an easy-to-use, award winning, comprehensive software suite designed to protect your computer against stealthy spyware, aggressive
PC Security and Maintenance
PC Security and Maintenance by IMRAN GHANI PC Maintenance and Security-Forecast. Major sources of danger. Important steps to protect your PC. PC Security Tools. PC Maintenance Tools. Tips. PC Security-
10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)
1- A (firewall) is a computer program that permits a user on the internal network to access the internet but severely restricts transmissions from the outside 2- A (system failure) is the prolonged malfunction
Quarantined Messages 5 What are quarantined messages? 5 What username and password do I use to access my quarantined messages? 5
Contents Paul Bunyan Net Email Filter 1 What is the Paul Bunyan Net Email Filter? 1 How do I get to the Email Filter? 1 How do I release a message from the Email Filter? 1 How do I delete messages listed
FAKE ANTIVIRUS MALWARE This information has come from http://www.bleepingcomputer.com/ - a very useful resource if you are having computer issues.
FAKE ANTIVIRUS MALWARE This information has come from http://www.bleepingcomputer.com/ - a very useful resource if you are having computer issues. The latest tactic currently being used by malware creators
Deter, Detect, Defend
Deter, Detect, Defend Deter Never provide personal information, including social security number, account numbers or passwords over the phone or Internet if you did not initiate the contact Never click
Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 2 Systems Threats and Risks
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 2 Systems Threats and Risks Objectives Describe the different types of software-based attacks List types of hardware attacks Define
How Spyware and Anti-Spyware Work
22 PART 1 INTERNET SECURITY CHAPTER 3 How Spyware and Anti-Spyware Work 23 THESE days, the biggest danger you face when you go onto the Internet might be spyware a type of malicious software that can invade
Contents. McAfee Internet Security 3
User Guide i Contents McAfee Internet Security 3 McAfee SecurityCenter... 5 SecurityCenter features... 6 Using SecurityCenter... 7 Fixing or ignoring protection problems... 16 Working with alerts... 21
Why is a strong password important?
Internet Security Why is a strong password important? Identity theft motives: To gain access to resources For the challenge/fun Personal reasons Theft methods Brute forcing and other script hacking methods
Identity Theft Protection
Identity Theft Protection Email Home EDUCATION on DANGER ZONES Internet Payments Telephone ID theft occurs when someone uses your personal information with out your knowledge to commit fraud. Some terms
CYBER-SAFETY BASICS. A computer security tutorial for UC Davis students, faculty and staff
CYBER-SAFETY BASICS A computer security tutorial for UC Davis students, faculty and staff INTRODUCTION This tutorial provides some basic information and practical suggestions for protecting your personal
Information Security Awareness
Corporate Account Takeover & Corporate Account Takeover & Information Security Awareness The information contained in this session may contain privileged and confidential information. This presentation
TRAINING FOR AMERICAN MOMENTUM BANK CLIENTS. Corporate Account Takeover & Information Security Awareness
TRAINING FOR AMERICAN MOMENTUM BANK CLIENTS Corporate Account Takeover & Information Security Awareness The information contained in this session may contain privileged and confidential information. This
Five Tips to Reduce Risk From Modern Web Threats
Five Tips to Reduce Risk From Modern Web Threats By Chris McCormack, Senior Product Marketing Manager and Chester Wisniewski, Senior Security Advisor Modern web threats can infect your network, subvert
How to Identify Phishing E-Mails
How to Identify Phishing E-Mails How to recognize fraudulent emails and avoid being phished. Presented by : Miguel Fra, Falcon IT Services ([email protected]) http://www.falconitservices.com
The information contained in this session may contain privileged and confidential information. This presentation is for information purposes only.
The information contained in this session may contain privileged and confidential information. This presentation is for information purposes only. Before acting on any ideas presented in this session;
Lectures 9 Advanced Operating Systems Fundamental Security. Computer Systems Administration TE2003
Lectures 9 Advanced Operating Systems Fundamental Security Computer Systems Administration TE2003 Lecture overview At the end of lecture 9 students can identify, describe and discuss: Main factors while
eprism Email Security Suite
FAQ V8.3 eprism Email Security Suite 800-782-3762 www.edgewave.com 2001 2012 EdgeWave. All rights reserved. The EdgeWave logo is a trademark of EdgeWave Inc. All other trademarks and registered trademarks
DON T BE FOOLED BY EMAIL SPAM FREE GUIDE. Provided by: Don t Be Fooled by Spam E-Mail FREE GUIDE. December 2014 Oliver James Enterprise
Provided by: December 2014 Oliver James Enterprise DON T BE FOOLED BY EMAIL SPAM FREE GUIDE 1 This guide will teach you: How to spot fraudulent and spam e-mails How spammers obtain your email address How
