Saheel KHOYRATTY. Partner Technology Advisor

Similar documents
Protect Yourself. Who is asking? What information are they asking for? Why do they need it?

OCT Training & Technology Solutions Training@qc.cuny.edu (718)

Internet basics 2.3 Protecting your computer

Microsoft Phishing Filter: A New Approach to Building Trust in E-Commerce Content

STOP THINK CLICK Seven Practices for Safer Computing

Cyber Security Awareness. Internet Safety Intro.

What are the common online dangers?

10 Things You Need to Know About Internet Security

Guideline on Windows 7 Parental Controls

BCS IT User Syllabus IT Security for Users Level 2. Version 1.0

PROTECT YOUR COMPUTER AND YOUR PRIVACY!

STOP. THINK. CONNECT. Online Safety Quiz

7 PRACTICES FOR SAFER COMPUTING

PREVENTING HIGH-TECH IDENTITY THEFT

How to stay safe online

BE SAFE ONLINE: Lesson Plan

OIG Fraud Alert Phishing

Cyber Security. Securing Your Mobile and Online Banking Transactions

FTC Fact Sheet Identify Yourself

What's the difference between spyware and a virus? What is Scareware?

Network Security and the Small Business

Recognizing Spam. IT Computer Technical Support Newsletter

National Cyber Security Month 2015: Daily Security Awareness Tips

Protection from Fraud and Identity Theft

Cyber Safety - 10 Practices For Staying Safe on the Internet

Computer Security Maintenance Information and Self-Check Activities

Spyware. Michael Glenn Technology Management 2004 Qwest Communications International Inc.

Malware, Spyware, Adware, Viruses. Gracie White, Scott Black Information Technology Services

F-Secure Anti-Virus for Mac 2015

Contents. McAfee Internet Security 3

10 Quick Tips to Mobile Security

Contents. NetSafe 3. Facebook 4. YouTube 6. Google 7. Microsoft 8. Yahoo! 10. Trade Me 12. Twitter 14. Further Reading 17

FAKE ANTIVIRUS MALWARE This information has come from - a very useful resource if you are having computer issues.

Online Security Tips

Business Internet Banking / Cash Management Fraud Prevention Best Practices

Cybercrimes NATIONAL CRIME PREVENTION COUNCIL

Business ebanking Fraud Prevention Best Practices

Protecting your business from fraud

Netsafe/ AVG New Zealand. NetSafe/ AVG New Zealand. Cyber Security Research. Cyber Security Research. Supplementary Tables. March 2011.

High Speed Internet - User Guide. Welcome to. your world.

Online Fraud and Identity Theft Guide. A Guide to Protecting Your Identity and Accounts

HEADS up. stop think connect

Internet Safety/CIPA Lesson Plan

Computer Protection. Computer Protection. Computer Protection 5/1/2013. Classic Battle of Good vs Evil. David Watterson & Ross Cavazos

Identity Theft Protection

INTERNET & COMPUTER SECURITY March 20, Scoville Library. ccayne@biblio.org

TRAINING FOR AMERICAN MOMENTUM BANK CLIENTS. Corporate Account Takeover & Information Security Awareness

Quick Start. Installing the software. for Webroot Internet Security Complete, Version 7.0

Internet Safety: Pitfalls & Dangers

Promoting Network Security (A Service Provider Perspective)

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com

Internet tools and techniques at this level will be defined as advanced because:

Intercepting your mail. They can complete change of address forms and receive mail that s intended for you.

Why you need. McAfee. Multi Acess PARTNER SERVICES

& INTERNET FRAUD

Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:

Think Before You Click. UH Information Security Team

Marlon R Clarke, Ph. D., CISSP, CISM Director Network Operations and Services, NSU

The information contained in this session may contain privileged and confidential information. This presentation is for information purposes only.

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security

When registering on a jobsite, first ensure that the site is reputable and has a physical address and landline phone number.

Don t Fall Victim to Cybercrime:

Welcome. Thank you for choosing Cogeco High Speed Internet.

Spyware: Securing gateway and endpoint against data theft

Security Breaches. There are unscrupulous individuals, like identity thieves, who want your information to commit fraud.

Online Security Awareness - UAE Exchange - Foreign Exchange Send Money UAE Exchange

School Policy Regarding Computer Use, Technology and Internet Access

Everyone s online, but not everyone s secure. It s up to you to make sure that your family is.

Stopping zombies, botnets and other - and web-borne threats

Corporate Account Takeover & Information Security Awareness. Customer Training

Top tips for improved network security

Transcription:

Saheel KHOYRATTY Partner Technology Advisor

The Internet = A World of Opportunities Look what s at your fingertips A way to communicate with friends, family, colleagues Access to information and entertainment A means to learn, meet people, and explore

Primary Online Risks and Threats To Computers Viruses Worms Trojans Spyware To Families Cyberbullies File-sharing abuses Invasion of privacy Disturbing content Predators To Personal Information Online fraud and phishing Hoaxes Identity theft Spam

Primary Threats to Computer Security Viruses/Worms Software programs designed to invade your computer, and copy, damage, or delete your data. Trojans Viruses that pretend to be helpful programs while destroying your data, damaging your computer, and stealing your personal information. Spyware Software that tracks your online activities or displays endless ads.

Primary Online Risks for your Family Cyberbullies Both children and adults may use the Internet to harass or intimidate other people. File-share Abuse Unauthorized sharing of music, video, and other files may be illegal, and download malicious software. Disturbing Content If kids explore unsupervised, they could stumble upon images or information you may not want them exposed to. Predators These people use the Internet to trick children into meeting with them in person. Invasion of Privacy If kids fill out online forms, they may share information you don t want strangers to have about them or your family.

Primary Threats to your Personal Information Phishing E-mail sent by online criminals to trick you into going to fake Web sites and revealing personal information Spam Unwanted e-mail, instant messages, and other online communication Identity Theft A crime where con artists get your personal information and access your cash and/or credit Hoaxes E-mail sent by online criminals to trick you into giving them money

Steps You Can Take Your computer 1. Install a firewall. 2. Use Microsoft Automatic Update 3. Install and maintain antivirus software, e.g MS Security Essentials 4. Install and maintain Anti Spyware, e.g MS Windows Defender Your family 1. Talk with your kids about what they do online. 2. Set clear rules for Internet use. 3. Keep personal information private. 4. Use family safety settings in Microsoft software, e.g Live Family Safety Yourself 1. Practice Internet behavior that lowers your risk. 2. Manage your personal information carefully. 3. Use anti-phishing and anti-spam technology

Four Steps to Help Protect Your Computer Install a firewall e.g Windows Firewall Use Microsoft Update to keep Windows up-to-date automatically Install and maintain antivirus software e.g MS Security Essentials Install and maintain antispyware software e.g Windows Defender

Other Ways to Help Protect Your Computer Back up your files regularly Think before you click Close pop-ups using red X

Use the Red X to Close Pop-ups Always use the red X in the corner of a popup screen. Never click yes, accept, or even cancel, because it could be a trick that installs software on your computer.

Take Steps to Help Protect Your Family Talk with your kids about what they do online Set clear rules for Internet use Keep personal information private Use family safety software e.g Windows Live Family Safety

Take Steps to Help Protect Your Personal Information Practice Internet behavior that lowers your risk Manage your personal information carefully Use technology to reduce nuisances, and raise the alarm when appropriate

Practice Internet behavior that lowers your risk Use Strong Passwords. Do not share it even with your best friend Delete Spam.. Do not even open it. STEPS TO HELP PROTECT YOUR or PERSONAL IM INFORMATION Think before you click or open attachment in email Protect your Personal Information

Practice Internet behavior that lowers your risk..cont d Safer Socializing Set your boundaries o o How public you want your profile to be Do not overshare Be selective about friends Avoid provocative pictures, comments.. o o o Be respectful no offensive remarks, no humiliation Treat others like you would like to be treated Be ready to remove pictures or posts on your friends if they ask you to. Protect your Personal Information

Practice Internet behavior that lowers your risk..cont d Safer Socializing Be careful about installing add-on applications Be vigilant when meeting an internet friend in person Use your Privacy Settings Manage your online reputation Protect your Personal Information

Practice Internet behavior that lowers your risk..cont d Safer Online Gaming Stick to well-known games or reputable sites Play fair You have a REAL life Protect your Personal Information

Take Steps to Help Protect Your Personal Information Practice Internet behavior that lowers your risk Use technology to reduce nuisances, and raise the alarm when appropriate

Manage Personal Information Carefully Do not share personal information in e-mail or instant messages Use only secure and trusted Web sites Make sure you are where you think you are: Web sites can be faked Avoid financial transactions over unsecured wireless networks When in public, stay private

Take Steps to Help Protect Your Personal Information Practice Internet behavior that lowers your risk Manage your personal information carefully

Use Anti-Phishing and Anti-Spam Technology Most e-mail providers and programs, like Windows Live Hotmail and Microsoft Outlook, filter most spam Smartscreen Filter in IE8 helps to block and warn about suspicious sites

In case of Problems Report incidents to: CERT-MU 800-2378 incident@cert-mu.gov.mu http://cert-mu.gov.mu

To conclude

For More Information www.staysafe.org www.getnetwise.org

2007 Microsoft Corporation. All rights reserved. Microsoft, Hotmail, OneCare, Outlook, Windows, Windows Vista, Xbox, Xbox 360, Xbox LIVE, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.