Don t Click That Link and other security tips. Laura Perry Jennifer Speegle Mike Trice



Similar documents
Online Banking Fraud Prevention Recommendations and Best Practices

ONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS

Frequently Asked Questions

Business Internet Banking / Cash Management Fraud Prevention Best Practices

Business ebanking Fraud Prevention Best Practices

Reliance Bank Fraud Prevention Best Practices

Malware & Botnets. Botnets

Infocomm Sec rity is incomplete without U Be aware,

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com

Paul Nguyen CSG Interna0onal

Deter, Detect, Defend

Tips for Banking Online Safely

Senaca Shield Presents 10 Top Tip For Small Business Cyber Security

INFORMATION SECURITY BASICS. A computer security tutorial for Holyoke Community College

Why is a strong password important?

Protecting your business from fraud

Online Banking Customer Awareness and Education Program

CYBER-SAFETY BASICS. A computer security tutorial for UC Davis students, faculty and staff

Computer Security Basics For UW-Madison Emeritus Faculty and Staff Oakwood Village University Woods September 17, 2014

Protect Yourself. Who is asking? What information are they asking for? Why do they need it?

HomeNet. Gateway User Guide

National Cyber Security Month 2015: Daily Security Awareness Tips

Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning

Protection from Fraud and Identity Theft

Basic Computer Security Part 2

How to Identify Phishing s

Cyber Security. Maintaining Your Identity on the Net

10 Quick Tips to Mobile Security

Essentials of PC Security: Central Library Tech Center Evansville Vanderburgh Public Library

Brazosport College VPN Connection Installation and Setup Instructions. Draft 2 March 24, 2005

TMCEC CYBER SECURITY TRAINING

Cyber Security Awareness

Learn to protect yourself from Identity Theft. First National Bank can help.

Security Awareness. ITS Security Training. Fall 2015

Recognizing Spam. IT Computer Technical Support Newsletter

CYBER-SAFETY. A computer security tutorial for UC Davis students, faculty and staff

OKPAY guides. Security Guide

Cyber Security Awareness

OCT Training & Technology Solutions Training@qc.cuny.edu (718)

Seven Practices for Computer Security

Identity Theft Protection

Cyber Security: Beginners Guide to Firewalls

AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION PROGRAM UNIT FOUR. Principles of Cybersecurity.

Internet basics 2.3 Protecting your computer

Stable and Secure Network Infrastructure Benchmarks

General Security Best Practices

How to stay safe online

Wireless Network Best Practices for General User

Your security is our priority

Computer Network and Internet Security Awareness and Responsible Use. Indian River County School District

PREVENTING HIGH-TECH IDENTITY THEFT

References NYS Office of Cyber Security and Critical Infrastructure Coordination Best Practices and Assessment Tools for the Household

Tips For Job Seekers

Advice about online security

Bookmarks for Desktop Self-Defense

For assistance with your computer, software or router we have supplied the following information: Tech Support , press 1

INTERNET & COMPUTER SECURITY March 20, Scoville Library. ccayne@biblio.org

Online Security Information. Tips for staying safe online

Safe Practices for Online Banking

Business Identity Fraud Prevention Checklist

Retail/Consumer Client. Internet Banking Awareness and Education Program

Cyber Security Beginners Guide to Firewalls A Non-Technical Guide

Catapult PCI Compliance

How to make a VPN connection to our servers from Windows 8

NQ Mobile Security Frequently Asked Questions (FAQs) for Android

Payment Fraud and Risk Management

Quick Start. Installing the software. for Webroot Internet Security Complete, Version 7.0

Online Security Awareness - UAE Exchange - Foreign Exchange Send Money UAE Exchange

Best Practices Guide to Electronic Banking

Corporate Account Take Over (CATO) Guide

Risks REGIONAL IT COORDINATOR UNIVERSITY OF MARYLAND EXTENSION FEBRUARY 2012

Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines

Guideline for Prevention of Spyware and other Potentially Unwanted Software

Internet Basics. Meg Wempe, Adult Services Librarian ABOUT THIS CLASS. P a g e 1

Know the Risks. Protect Yourself. Protect Your Business.

Basic Security Considerations for and Web Browsing

Laura Royer, Extension Faculty, University of Florida/IFAS Osceola County Extension Services

Server Management: System Administration

Security Fort Mac

Personal Safety Tips For Public Information Technology

Internet threats: steps to security for your small business

BE SAFE ONLINE: Lesson Plan

Computer Security Self-Test: Questions & Scenarios

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security

An Introduction on How to Better Protect Your Computer and Sensitive Data

How To Use Secureanything On A Mac Or Ipad (For A Mac)

Mobile Broadband Manager Guide Huawei E8278

This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit.

Practical guide for secure Christmas shopping. Navid

IT Security DO s and DON Ts

Corporate Account Takeover & Information Security Awareness. Customer Training

Don t Fall Victim to Cybercrime:

Welcome to Part 2 of the online course, Spyware and Adware What s in Your Computer?

Internet Security Protecting Your Business. Hayden Johnston & Rik Perry WYSCOM

Cyber Security. Securing Your Mobile and Online Banking Transactions

U.S. Cellular Mobile Data Security. User Guide Version 00.01

1. For each of the 25 questions, multiply each question response risk value (1-5) by the number of times it was chosen by the survey takers.

2009 Antispyware Coalition Public Workshop

Small Business IT Basic Security Guide:

Is your data secure?

Transcription:

Don t Click That Link and other security tips Laura Perry Jennifer Speegle Mike Trice

About Us Laura Perry Information Security Jennifer Speegle Firewall Administrator Mike Trice Network Engineer

Mail vs. Email vs. URL Mail address: Laura Perry Alabama Supercomputer Center 686 Discovery Drive Huntsville, AL 35806 Email address: lperry@asc.edu URL (Uniform Resource Locator): http://www.asc.edu/

What does it mean? lperry who? @ - at asc which organization?.edu which domain? Common Domains.com,.edu,.org,.gov,.mil

International Domains.ca,.uk,.au (Canada, United Kingdom, Australia).ru Russia.br Brazil.kg Kyrgyzstan.cn China.ua Ukraine.fi Finland.lv Latvia.nl - Netherlands Unless you are specifically expecting email from someone you know who lives in one of these countries, be very suspicious of anything from any of these domains.

Where.ru? Why does this matter??? Do you check return addresses on regular mail? Do you check return addresses on email? What s the real URL?

Go Phish Bad guys camouflage their phishing as the sort of messages we expect to receive Look for slight irregularities in wording, spelling or the appearance of images Don t click on the links! If you think the warning is genuine, either call the service provider or type the provider URL yourself

Stinky Phish A warning that your email account will be disabled if you don t respond. An email or text from a loved one saying they need money urgently. Someone you never met wants you to deposit their money in your account. You just won a prize for something you didn t enter. Here is a receipt for something you didn t buy. The receipt may not be a document but a program that will install a virus on your computer.

Note When the you From hover address: over the timk@vazda.com hyperlink, the actual is URL probably doesn t match NOT your the text system that you administrator see.

When you hover over the Accept Who button, is Chasity the actual Jeffers URL is and volunteeryouthministry.com why is she sending and invitation NOT LinkedIn! for Gregory Rice?

Celine.Karich@duluth.k12.mn.us is NOT your system administrator! http://lojadopolicial.com.br is not your email administration system! Remember what I said about the.br domain? Beware!

Uh oh! This one actually came from a valid email address in your school system. Now what? This could be bad Most spam blockers will trust Google docs. If you click on this and enter the requested info, your account will immediately start sending spam emails.

Your Friend Got Hacked It has your friend s name, but that s not the right email address. See the.nl? Beware!

Your Bank Transfer Failed This looks legitimate at first glance, but the wording is just a little off Wait this link doesn t add up. Why is there a dropbox.com link inside a google.com link?

Please See My Resume I got the email below asking about internships, but when I tried to view the resume got errors about macros in the document. I told it to open with macros disabled, but it wouldn t display anything.

What s the Big Deal? Identity theft you just gave someone your login id and password! Hacker sends phishing email from your account to your contacts Hacker can look for other account credentials in your email Bank account compromise Malware installed on your computer: APT Advanced Persistent Threat software installed on your computer without your knowledge Key logging see everything you type Web site redirection send you to malicious site even if you type a good URL

Is My PC Infected? Common signs of malware on your computer: Undelivered email notifications in your inbox to unknown email addresses. Bots will frequently use email accounts to send out spam. Spam to unknown email addresses will result in a failure to deliver notification in your inbox. You see pop-up windows even when not using a web browser. You are unable to download or install antivirus software or updates.

More Signs of Infection Multiple toolbars on your web browser. Bots will frequently install various toolbars to help collect search information from your web browser. Malware search toolbar can direct you to malicious sites. Unusual error messages. Error messages that say applications cannot run or drives cannot be accessed can be indications of a bot infection. Your computer is busy even when not in use.

Know Your System Do you know what Antivirus (AV) product is loaded on your system? We have all seen the pop-ups saying our system is infected and to click here to load/protect our system. By knowing the AV product loaded on your system you will be able to tell if this is a false pop-up attempting to get you to install malware. Most of these products are loaded with spyware, adware, viruses, or trojans.

Know the Policy Check with your Tech Coordinator to find out your school system s policy on cleaning compromised systems. Depending on the policy or level of infection you may or may not be able to recover items from an infected system. Based on this and your system s backup strategies you may need to implement a personal backup strategy to safeguard your files.

More Policy Issues Should you use your personal laptop on the school network? What are the implications if you introduce malware onto the school network? Should you use your work laptop at home? Do you copy files between home and work computers using a USB drive? What if the USB drive contains malware?

Beware of Imposters Avoid tech support phone scams: Microsoft will NEVER call you! NEVER give your user name or password to anyone who calls you. If you suspect something is wrong with your computer, call your System Administrator or Help Desk. Avoid credit card warning scams Your credit card provider MAY call you to report suspicious activity. NEVER give your credit card number, expiration, CVV or pin number to anyone who calls you! To be safe, hang up and call your bank or call the customer support number printed on your card.

Is Your Password Safe Do you use a strong P@$$w0rd? Many places recommend a password that is 8 characters long containing 2 uppers, 2 lowers, 2 numbers, and 2 special characters. Think of your password like the lock on your front door. You want to make it difficult for the bad guys to get through that door.

Worst Passwords 123456 password 12345678 qwerty abc123 123456789 111111 1234567 iloveyou adobe123 123123 admin 1234567890 Bama#1 Saban Roll Tide! Aubie War Eagle! letmein photoshop 1234 monkey shadow sunshine 12345 password1 princess azerty trustno1 000000 Information from: http://splashdata.com/press/worstpasswords2013.htm

Password Tips Depending on your school system s password policy you can use one of these examples to easily come up with a complex password you can remember: Turn a sentence into a password: This little piggy went to market might become "tlpwent2m" Use a password you can change regularly (but still remember easily) such as #Jun$Cmh2015 Use a random password generator

More Password Tips If you do write down your password, place it in a secure locked location. A post-it note under your keyboard is not secure! Use an online password management tool. Use different passwords for different sites. If one password is compromised your other accounts won t be affected. A longer password is a stronger password. Each additional character may add an exponential amount of time for cracking especially if you avoid common words or patterns.

Password Manager

Wi-Fi Concerns Where are you? At the local coffee shop on their wireless network On travel on the hotel wireless At home on your wireless network On the school public wireless network Are you sure the network you are connecting to is trusted? Ask a worker for the name of the provided Wi-Fi network What sites are you going to, and what data is available if your account gets hacked?

When to Use Encryption Virtual Private Networks (VPNs) Upside: Secure access to remote resources Downside: You are now on the remote network Sometimes not all traffic is encrypted when using a VPN. Ask your technology coordinator or network administrator

Is Your VPN Client Connected? When using a VPN client look for the VPN icon and hover over it to get a status.

Is Your Connection Secure? When surfing the web, look for the address bar. in the

Why Can t I Get to xyz.com?!? Did you get a block page? This is a content filter message, not a firewall issue. Talk to your network administrator and tell them that you got a block page Getting the block page is not the same as not getting a response from the server.

How Did Little Johnny Get to that Site? Little Johnny is using: Web proxy to access sites that are normally blocked Remote access to his home computer Cell phone hotspot Images from: http://www.wikihow.com/bypass-a-firewall-or-internet-filter#

Web Proxies Very difficult to block web proxies because they are constantly changing Alert your network administrator Very easy for kids to setup at home or find on the internet Just search for "free online proxies"

Why Can t I Access My Home Computer From School? This is most likely a firewall issue. Check your IT policy Ask your local system/network administrator Firewalls either block or deny traffic. Connections that work sporadically are not likely a firewall issue, but more likely a server issue.

Home Wi-Fi Change your administrator password and login name if possible Enable encryption WEP is old and easily hacked WPA2 is newer and better Change/disable broadcast of your SSID (Wi-Fi network name) Use MAC address filtering to allow only known devices to connect to your network

What have we learned? Know your system Know your school s policies Know your school s IT staff Use good passwords Never use default passwords Don t send secret information over Wi-Fi networks without using VPN and the most important lesson