PC/Tablet/Smartphone Security & Password Managers



Similar documents
What you need to know to keep your computer safe on the Internet

It s 2 o clock: Who Has Your Data? Josh Krueger Chief Technology Officer Integrity Technology Solutions

2016 Digital Safety Class UNDERSTAND YOUR RISKS AND STAY TOTALLY SECURE JESSE ROBERTSON, TECH 4 LIFE

Mobile Operating Systems & Security

Getting Started with VMware Horizon View (Remote Desktop Access)

Wireless Presentation Gateway. User Guide

Accessing Citrix on a MAC using OS X (Mountain Lion and Newer)

How to Use Windows Firewall With User Account Control (UAC)

Intro to Password Management. January 5, 2015

SecuritySecuritySecurity!

INTERNET & COMPUTER SECURITY March 20, Scoville Library. ccayne@biblio.org

mystanwell.com Installing Citrix Client Software Information and Business Systems

Booth Gmail Configuration

Welcome To The L.R.F.H.S. Computer Group Wednesday 27 th November 2013

4/20/2015. Fraud Watch Campaign. AARP is Fighting for You. AARP is Fighting for You. Campaign Tactics. AARP can help you Spot & Report Fraud

Clickfree frequently asked questions

McAfee Multi Access from ø. Step-by-step guide to protecting your devices. Always.

For example some Bookkeepers are using Dropbox to share the accounting files between them and their client.

This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit.

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com

PROTECTION SERVICE FOR BUSINESS WELCOME TO THE BUSINESS OF FREEDOM

Mac Client Installation Notes

Tips for Banking Online Safely

Download Google Drive to windows 7

USING TEAMVIEWER QUICKSUPPORT FOR REMOTE ASSISTANCE FEBRUARY 2013

10 Simple Computer Maintenance Tips For The Laptop

Exchange ActiveSync (EAS)

Discovering Computers

Google Holy Family University

1. Scope of Service. 1.1 About Boxcryptor Classic

How to Log in to LDRPS-Web v10 (L10)

A Guide For Reviewers. A Guide For Reviewers

Cloud Computing for Education Workshop

Two Factor Authentication (TFA; 2FA) is a security process in which two methods of authentication are used to verify who you are.

Cyber Security. Maintaining Your Identity on the Net

Citrix : Remediation - MAC

Verizon Internet Security Suite Multi-Device Powered by McAfee. Installation Guide for Multi Devices for Residential Users

Personal Cloud. Support Guide for Mobile Apple Devices

ios How to Back Up from icloud

The Increasing Threat of Malware for Android Devices. 6 Ways Hackers Are Stealing Your Private Data and How to Stop Them

Malware, Spyware, Adware, Viruses. Gracie White, Scott Black Information Technology Services

IT user guide. Campus WiFi eduroam. September Information Services

Managing Mobility. 10 top tips for Enterprise Mobility Management

LSGMI REMOTE DESKTOP SERVICES.

Charter Business Desktop Security Administrator's Guide

Digital Storage Options MAKING ROOM IN THE CLOUD

Rev Page 1 of 17

Carroll Hospital Center

C&G FLUX MARKET Internet Safety

ANDRA ZAHARIA MARCOM MANAGER

ReadyNAS OS 6.2. Reviewer s Guide

Installing your certificate on your Mac

Why you need. McAfee. Multi Acess PARTNER SERVICES

Management Website User Guide. SecureAnywhere AntiVirus SecureAnywhere Internet Security Plus SecureAnywhere Complete

Protection Service for Business

Protecting your Data, Devices, and Digital Life in a BYOD World: A Security Primer GLENDA ROTVOLD AND SANDY BRAATHEN NBEA APRIL 2, 2015

How to prevent computer viruses in 10 steps

APP DEV. We build your ideas into web and mobile applications. steicho. Technological Solutions

IT Security Survey 2015

Install and End User Reference Guide for Direct Access to Citrix Applications

Backing up your digital image collection provides it with essential protection.


Basic Computer Security Part 2

How to Use OneNote. Heather de Anda, MS-2 August 10, 2012 UTHSCSA

Connecting Your Device to a Wireless Network

FAQ. F-Secure Online Backup 2.1

TMCEC CYBER SECURITY TRAINING

Free and Legal Software You Can Download By Tom Krauser

Soonr Workplace Enterprise Plan Overview

Norton 360. Benefits. Our ultimate protection, now even more so. Introducing the new Norton 360.

ATTENTION: End users should take note that Main Line Health has not verified within a Citrix

Customer Education to Combat Scams and Fraud

BlackBerry Link for Windows. Version: User Guide

MelbourneOnline Hosted Exchange Setup

[Year] Cloud Cover Sheet.docx. [Pick the date] [Type the document subtitle]

Comodo Mobile Security for Android Software Version 2.5

avast! Free Antivirus for Mac Quick Start Guide avast! Free Antivirus for Mac Quick Start Guide

Mobile Iron User Guide

Version 5 - July 2015 IT Services Page 2

Perception and knowledge of IT threats: the consumer s point of view

How do I start a meeting?

Access Tropical Cloud Desktop from Any Device

How do I Install and Configure MS Remote Desktop for the Haas Terminal Server on my Mac?

QuickBooks Mac 2014 Getting Started Guide

VPS Hosting. The Guide to Bet Angel VPS. Getting started with Bet Angel VPS. Revised August Page 1

[BRING YOUR OWN DEVICE POLICY]

Installing the Android SDK

FAQ. F-Secure Online Backup

What's the difference between spyware and a virus? What is Scareware?

OUTLOOK WEB ACCESS. User Guide

GadgetTrak Mobile Security Android & BlackBerry Installation & Operation Manual

1. For each of the 25 questions, multiply each question response risk value (1-5) by the number of times it was chosen by the survey takers.

Quick Start Guide to Logging in to Online Banking

How to Avoid Disaster: What Every Lawyer Should Know About Backups, Security, Viruses, Spyware and Disaster Planning

Cybersecurity Best Practices

ORU IT Oral Roberts University Information Technology Student Guide

Downloading an Acted ebook Accessing an ActEd ebook on more than 1 computer/device Printing an ActEd ebook

Installation Instructions

Outlook Data File navigate to the PST file that you want to open, select it and choose OK. The file will now appear as a folder in Outlook.

Transcription:

PC/Tablet/Smartphone Security & Password Managers What you should do to keep your PC secure. Does the type of PC you use matter? What to do to keep your smartphone secure does the brand matter, why? Tablet security do we need to do anything to keep our tablets secure? What are password managers, are they secure and what are their advantages?

PC Security Recent nasty examples Cryptolocker and Cryptowall ransomware, very difficult to defeat, expensive if you are infected. Tips to avoid or remove ransomware can be found here - http://www.makeuseof.com/tag/fbi-ransomware-hits-android-avoid-getting-rem ove/ Shellshock potentially infects Apple and many variations of Linux including Android. This means mobile devices as well as PCs. If you have a Mac the fix is in the these updates - Lion v10.7.5, Mountain Lion v10.8.5, and Mavericks v10.9.5. Safe computing practices will keep you safe from the majority of these. Don't CLICK until you are confident you are going to a safe website or opening something safe. Your friends and other people in your contact list might have been corrupted and the malware might try to corrupt you as well. Even experienced users can be fooled.

PC Security There are many sources to help you know what to do including your ASA computer club. The Internet is one of your best sources. Your bank website is another. Here is one example - http://www.scotiabank.com/ca/en/0,,352,00.html Your PC manufacturer is another good source of information. There may have been a trial version of security software installed on your PC when you bought it. PC technical publications, magazines. Independent anti-virus/malware testing organizations. PBS NOVA http://www.pbs.org/wgbh/nova/tech/rise-of-the-hackers.html

PC Security - Toolbars Browser toolbars are another topic. Not as dangerous but can slow things down and are generally not necessary.

PC Security - Toolbars Many toolbars are installed when you are downloading or updating software. Some are installed when you link to other websites. Java updates prompt you to install the Ask toolbar you don't need it. Some free anti-malware programs will remove these kinds of toolbars. Malwarebytes is a good one that has helped several ASA members. Get it here - https://www.malwarebytes.org

PC Security Independent malware testing organizations http://www.av-test.org/en/ http://www.pcantivirusreviews.com/ http://www.av-comparatives.org/ There are more search the Internet. If you favourite is not tested by one organization try another. If your product is consistently in the top tier from multiple testing organizations it is likely a good choice. Be aware that if you want the best free product you need to look specifically for those. Many are not tested by the independent groups.

PC Security AV-Comparitives.org Tests mobile, Windows, Mac, business, including parental controls, firewalls. Extensive testing of all types including false alarm, performance and malware removal. If the vendor did not submit their product for testing it is not in the results but that doesn't mean it is necessarily an inferior product. Let's look at their latest results and understand the testing methodology and how to interpret http://chart.av-comparatives.org/chart1.php?chart=chart2&ye ar=2014&month=8&sort=0&zoom=2

PC Security Interpreting the AV-Comparitives most recent Real-World protection testing chart. The dotted line represents the level of protection provided by the standard Microsoft security products Microsoft Security Essentials for Windows 7, Windows Defender for Windows 8. The yellow line at the bottom of the chart represent false positives problems that were not problems but falsely identified as such. Red is bad problems that were not detected. Yellow in the bars are user dependent issues a warning was shown to the user but they had the choice to proceed or not vs automatically blocked by the anti-virus software. Maximum green with minimal false positives is best.

If I have a Mac I am I OK without anti-virus software? You are much safer than if you use Windows. Not because Windows is less secure but because the bad guys get more bang for their buck if they target Windows users. It is a much larger user base. In 2012 over 700,000 Mac users were infected with one virus. If you want some protection look at the products analyzed here - http://www.av-test.org/en/news/news-single-view/mac-os-x-in-th e-crosshairs-18-malware-scanners-put-to-the-test/ Only four products detected 100% of the tested issues. Many caused performance problems. If you are going to install a product to protect your Mac take the time to chose a good one.

Tablet and smartphone protection Many different kinds of security software for mobile devices. There are many good practices for these devices as there are for PCs. Learn them. Software to erase all date from your device if it is stolen. Software to locate it if you lose it. Software to monitor all activity for parents or business. Software to secure your photos and anything else you want to be protected from hacking or loss of phone/tablet. Software to protect the device from malware.

Tablet and smartphone protection Is ios safer then Android? What can I do to be safe? Both Apple and Android can be exploited. The Apple store claims they do better testing of apps submitted to the Apple store. Do not install apps from third parties. Only install from the Apple store or Google Play if you can. Ensure there is a password on your device. Consider a product that will find and/or erase your device if you lose or misplace it. Use the same testing organizations as noted for PCs. AV-Test and Av-Comparatives both provide extensive information. Beware of removal media devices thumb drives.

Passwords Every new site you go to often wants you to register and pick a password. How to more easily keep track of them. Sometimes you avoid getting information from a website because you don't want any more accounts or passwords. A password manager can make password management easy and it can work on all your devices. Yes that means mobile and PC including Windows, Mac or Linux. Cost effective and we believe they increase security because you can chose much more complex passwords because you don't need to remember them (except for one).

Passwords Simple passwords can be hacked either with public information or through brute force attacks. Good password management tools: Roboform Everywhere LastPass Dashlane Passback Pro Sticky Password Passwork Genie Keeper Backup Unlimited 1Password Intuitive Password

Password Manager - RoboForm RoboForm works on Android, Windows, Mac, Linux. Syncs between all your devices. Allows you to save form information often needed. You remember one master password the tool remembers the rest. Automates signing on to password protected sites including financial. There are many other password tools, search the Internet for best password managers and read the various reviews.

Summary Your best protection against malware is you! Do not open email from somebody you don't know unless you are confident it is OK. If there is not a subject line be very cautious. Never open an attachment from anybody you don't know. Even if an email comes to you from somebody you know and trust be cautious if the subject line is blank or doesn't make sense. Make sure you look at all windows that open when you are downloading anything. Questions?