INTERNET SAFETY: VIRUS: a computer program that can copy itself and infect your computer. CAPTCHAS: type the letters to set up an online account



Similar documents
Computer Basics 4 Basics

Malware & Botnets. Botnets

Protect yourself online

How to stay safe online

Cyber Security. Maintaining Your Identity on the Net

Infocomm Sec rity is incomplete without U Be aware,

Computer Security Self-Test: Questions & Scenarios

PROTECT YOUR COMPUTER AND YOUR PRIVACY!

Quick Start. Installing the software. for Webroot Internet Security Complete, Version 7.0

Forefront Online Protection for Exchange (FOPE) User documentation

Avoiding Malware in Your Dental Practice. 10 Best Practices to Defend Your Data

Avoiding Malware in Your Dental Practice. 10 Best Practices to Defend Your Data

STOP. THINK. CONNECT. Online Safety Quiz

PORTLANDDIOCESE.ORG - How to Connect Table of Contents

PORTLANDDIOCESE.ORG - How to Connect Table of Contents

Setting up a Personal Account

ACCOUNT SERVICES HELP

BE SAFE ONLINE: Lesson Plan

Tips for Banking Online Safely

Advice about online security

Don t Fall Victim to Cybercrime:

Using the University s Spam and Virus Filtering Service

It is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes.

Microsoft and Windows are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries.

Why is a strong password important?

The panel. Idea Farm FAQs

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security

Internet basics 2.3 Protecting your computer

PREVENTING HIGH-TECH IDENTITY THEFT

Protection from Fraud and Identity Theft

NATIONAL CREDIT UNION ADMINISTRATION CREDIT UNION ONLINE: CREDIT UNION PROFILE AND 5300 CALL REPORT

DON T BE FOOLED BY SPAM FREE GUIDE. Provided by: Don t Be Fooled by Spam FREE GUIDE. December 2014 Oliver James Enterprise

Protecting your business from fraud

How to Use the Greymail Spam Filter

How to Identify Phishing s

Instructions For Opening UHA Encrypted

eprism Security Suite

ITS Spam Filtering Service Quick Guide 2: Using the Quarantine

Logging into LTC Instant Access the First Time

Scams and Schemes LESSON PLAN UNIT 1. Essential Question What is identity theft, and how can you protect yourself from it?

2009 Antispyware Coalition Public Workshop

FILTERING FAQ

Your Digital Dollars Online & Mobile Banking

Business Internet Banking / Cash Management Fraud Prevention Best Practices

Accessing and utilizing CCSF Spam Filter Program Barracuda

Quarantined Messages 5 What are quarantined messages? 5 What username and password do I use to access my quarantined messages? 5

Encrypted Users Guide. Revised 6/8/2015

Business ebanking Fraud Prevention Best Practices

INTERNET & COMPUTER SECURITY March 20, Scoville Library. ccayne@biblio.org

BrightVisions Spam Filter User Guide

Hint: Best actions: Find out more in videos and FAQ: Hint: Best actions: Find out more in videos and FAQ:

ONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS

Information Security Field Guide to Identifying Phishing and Scams

Protect Yourself. Who is asking? What information are they asking for? Why do they need it?

Recognizing Spam. IT Computer Technical Support Newsletter

Barracuda Spam Firewall

How do I use ProofPoint anti-spam software at the GC

The Institute of Education Spam filter service allows you to take control of your spam filtering.

Purchase College Barracuda Anti-Spam Firewall User s Guide

Security Fort Mac

Understanding Junk filtering & Anti-Spam controls

F-Secure Anti-Virus for Mac 2015

PC Security and Maintenance

National Cyber Security Month 2015: Daily Security Awareness Tips

EUROPEAN COMMISSION Directorate-General for Education and Culture

Managing Your Network Password Using MyPassword

Schools CPD Online General User Guide Contents

How to Use Red Condor Spam Filtering

Using Barracuda Spam Firewall

Paramount Unified School District Technology and Ed Services Departments Computer In-service

BankNet Instructions for Large File Transfer. May 20, 2013 Version 1.1

MySpam filtering service Protection against spam, viruses and phishing attacks

F-Secure Anti-Virus for Mac. User's Guide

Managing Junk Mail. About the Junk Mail Filter

Computer Security Maintenance Information and Self-Check Activities

ORU IT Oral Roberts University Information Technology Student Guide

Junk Filtering System. User Manual. Copyright Corvigo, Inc All Rights Reserved Rev. C

This document provides a brief, end-user overview of the Cisco Registered Envelop Service which has been implemented by Sterne Agee.

Cybersecurity Best Practices


Computer and Information Security End User Questionnaire

Fraud Prevention Guide

IRM NEWS CYBER SECURITY AWARENESS FIREWALLS THE GUARDIAN AT THE GATE FLORIDA ATLANTIC UNIVERSITY

Get Started Guide - PC Tools Internet Security

Using Outlook web access.

Transcription:

INTERNET SAFETY: VIRUS: a computer program that can copy itself and infect your computer Malware: Harmful software programs designed to damage your computer without you knowing. Spyware: Undetected programs that spy on you by collecting information you transmit online (such as your usernames and passwords or internet history) **these are usually downloaded to your computer from a website or a spam email Antivirus Software: software programs that prevent and detect computer viruses CAPTCHAS: type the letters to set up an online account - Discourage automated computer programs (called bots ) from setting up fake accounts - Only actual humans can read the slanted letters Sometimes called a security word PRACTICE: WRITE THE SECURITY WORD is provided where possible. Page 1 of 6

SECURE WEBPAGES A webpage with extra security features where users can safely enter personal information - Online shopping - Government websites - Social media (sometimes) FEATURES OF A SECURE WEBPAGE: Lock near the web address https:// in the web address SAFE to enter personal information NOT A SECURE WEBPAGE: 1. No lock near the web address 2. No s in http:// 3. NOT SAFE to enter personal information is provided where possible. Page 2 of 6

POP-UPS: Online advertisements that pop-up on the screen when you re searching the Internet. CLICK to close the pop-up ENABLING POP-UPS: Popups aren t always bad! Sometimes job applications will appear in a pop-up after you click Apply. If you don t see an application right away, you might need to enable pop-ups to access it. 1. CLICK Options for this site 2. CLICK Always allow - If you do NOT see the pop-up after you click Always allow, click the REFRESH button INCREASING ONLINE SAFETY FOR CHILDREN 1. CLICK on the Start button 2. CLICK on the Control Panel in the Start Menu 3. CLICK on User Accounts and Family Safety - Add or remove user accounts - Set up parental controls for any user (helpful for children) is provided where possible. Page 3 of 6

EMAIL SAFETY: SPAM junk emails sent by companies, hackers or other unfamiliar senders **NEVER download attachments in a spam email. This could infect your computer with a computer virus. PHISHING: emails that steal your personal or financial information by posing as a legitimate company WHICH EMAILS ARE SPAM/PHISHING? FREE! Things or Quick Cash Loans Sexual Explicit Content or Online Dating Politically-Charged Content Prizes or Special Offers School Admission Offers - For-profit colleges send out school entrance emails. Even if you are looking to go back to school, these should be considered spam. If it sounds too good to be true, it probably is! IS THIS EMAIL SAFE? SAFE Familiar sender (Family members, teachers, coworkers, etc.) Mentions your name (spelled correctly!) Correct spelling and punctuation No specials offers Will NOT ask you to send personal information (name, address, Social Security number) UNSAFE (SPAM) Unfamiliar sender Or email has unusual domain name (ex: joe@gmaal.com) Generic greeting ( Dear valued customer, Hi there, ) Words spelled incorrectly, names not capitalized, punctuation incorrect or missing FREE deals or other unrealistic offers Requests for personal information (name, address, Social Security number) is provided where possible. Page 4 of 6

REPORTING AN EMAIL AS SPAM 1. CLICK the checkbox to select the email 2. CLICK the Spam button 2 1 DELETING SPAM EMAILS: Following instructions for deleting emails on p. 8 PHISHING: emails that steal your personal or financial information by posing as a legitimate company PRACTICE: IDENTIFYING SPAM EMAILS Which of the following emails are spam? (Write an X in the checkbox) is provided where possible. Page 5 of 6

SECURITY QUESTIONS Questions you can answer to log in to your email account if you forget your password SECURE PASSWORDS Be sure to choose questions and answers you will remember! FEATURES OF A SECURE PASSWORD: 2 3 5Flower$ 1 4 1 2 UPPERCASE LETTERS lowercase letters If you write your password down for reference, remember to carefully and correctly write UPPER- and lower- case letters 3 Numbers 1234567890 Choose numbers you will remember (an anniversary, age, etc.) 4 Symbols!@#$%^&* Type by holding SHIFT and pressing any number key is provided where possible. Page 6 of 6