Cybersecurity has never been more important

Similar documents
General Security Best Practices

Safety precautions for Internet banking or shopping How to avoid identity theft online

STOP. THINK. CONNECT. Online Safety Quiz

Malware & Botnets. Botnets

Best Practices Guide to Electronic Banking

Safe Practices for Online Banking

Know the Risks. Protect Yourself. Protect Your Business.

Protect Yourself. Who is asking? What information are they asking for? Why do they need it?

ONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS

1. Any requesting personal information, or asking you to verify an account, is usually a scam... even if it looks authentic.

Infocomm Sec rity is incomplete without U Be aware,

Learn to protect yourself from Identity Theft. First National Bank can help.

E Commerce and Internet Security

FAKE ANTIVIRUS MALWARE This information has come from - a very useful resource if you are having computer issues.

Desktop and Laptop Security Policy

National Cyber Security Month 2015: Daily Security Awareness Tips

Computer Security Maintenance Information and Self-Check Activities

NATIONAL CYBER SECURITY AWARENESS MONTH

Business ebanking Fraud Prevention Best Practices

Business Internet Banking / Cash Management Fraud Prevention Best Practices

Identity Theft Protection

F-Secure Mobile Security for Business. Getting Started Guide

Why you need. McAfee. Multi Acess PARTNER SERVICES

PREVENTING HIGH-TECH IDENTITY THEFT

Remote Deposit Quick Start Guide

Online Banking Fraud Prevention Recommendations and Best Practices

10 Quick Tips to Mobile Security

Marlon R Clarke, Ph. D., CISSP, CISM Director Network Operations and Services, NSU

PROTECT YOUR COMPUTER AND YOUR PRIVACY!

Internet threats: steps to security for your small business

Online Cash Manager Security Guide

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com

Reliance Bank Fraud Prevention Best Practices

Cyber Security Best Practices

guide to staying safe online How to shop, bank, socialise and protect your identity online.

Essentials of PC Security: Central Library Tech Center Evansville Vanderburgh Public Library

Deter, Detect, Defend

Internet basics 2.3 Protecting your computer

An Introduction on How to Better Protect Your Computer and Sensitive Data

The following information was provided by SANS and discusses IT Security Awareness. It was last updated in 2015.

High Speed Internet - User Guide. Welcome to. your world.

Your Digital Dollars Online & Mobile Banking

Retail/Consumer Client. Internet Banking Awareness and Education Program

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security

Protecting Your Online Identity

OCT Training & Technology Solutions Training@qc.cuny.edu (718)

Frequently Asked Questions

Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines

Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning

Tips for Banking Online Safely

PREP Course # 20: HIPAA Security Presented by: Joe Baskin, Manager, Information Security

Don t Fall Victim to Cybercrime:

BCS IT User Syllabus IT Security for Users Level 2. Version 1.0

Cyber Security. Maintaining Your Identity on the Net

Security Breaches. There are unscrupulous individuals, like identity thieves, who want your information to commit fraud.

October Is National Cyber Security Awareness Month!

Secure Your Information and Communication Technology Devices

Digital Safety and Privacy

Protection from Fraud and Identity Theft

ecommercial SAT ecommercial Security Awareness Training Version 3.0

Introduction to Cyber Security

Bad Ads Trend Alert: Shining a Light on Tech Support Advertising Scams. May TrustInAds.org. Keeping people safe from bad online ads

Cyber Security Awareness. Internet Safety Intro.

Advance Fee Loans. Computer Malware Scams. Credit Repair Scams

Cyber Security Awareness

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

Online Security Awareness - UAE Exchange - Foreign Exchange Send Money UAE Exchange

SHS Annual Information Security Training

The Importance of Security Awareness Training

Fraud Prevention Tips

Small businesses: What you need to know about cyber security

Contents Security Centre

WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY

Malware, Spyware, Adware, Viruses. Gracie White, Scott Black Information Technology Services

Scams and Schemes LESSON PLAN UNIT 1. Essential Question What is identity theft, and how can you protect yourself from it?

Security Tips You are here: Home» Security Tips

Computer Security Literacy

STUDENT S INFORMATION SECURITY GUIDE

Online Security Tips

PREP Course #25: Hot Topics in Cyber Security and Database Security. Presented by: Joe Baskin Manager, Information Security, OCIO

F-Secure Anti-Virus for Mac 2015

Cyber Security. Securing Your Mobile and Online Banking Transactions

Avoiding Malware in Your Dental Practice. 10 Best Practices to Defend Your Data

Boston University Security Awareness. What you need to know to keep information safe and secure

& INTERNET FRAUD

ONE Mail Direct for Mobile Devices

Avoiding Malware in Your Dental Practice. 10 Best Practices to Defend Your Data

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

ONLINE IDENTITY THEFT KEEP YOURSELF SAFE FROM BESTPRACTICES WHAT DO YOU NEED TO DO IF YOU SUSPECT YOUR WHAT DO YOU NEED TO DO IF YOU SUSPECT YOUR

BE SAFE ONLINE: Lesson Plan

Mifflinburg Bank & Trust. Corporate Account Takeover & Information Security Awareness

Internet Safety & Awareness. Dan Tomlinson 02/23/2013

Presented by: Islanders Bank

Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.

Contents. McAfee Internet Security 3

Security Guide. for electronic transactions. UniBank is a division of Teachers Mutual Bank Limited

Franciscan University of Steubenville Information Security Policy

SBA Cybersecurity for Small Businesses. 1.1 Introduction. 1.2 Course Objectives. 1.3 Course Topics

Why is a strong password important?

Computer Protection. Computer Protection. Computer Protection 5/1/2013. Classic Battle of Good vs Evil. David Watterson & Ross Cavazos

Transcription:

Cybersecurity has never been more important Ohioans increasingly use multiple devices to connect to the Internet. From desktop and laptop computers, to smartphones and tablets, we are online more often and in more places than ever before. That s why cybersecurity, which helps protect computers and mobile devices from attacks and harm caused by malicious software, or malware, is so important. Ohio Attorney General Mike DeWine s Cybersecurity Help, Information, and Protection Program (CHIPP) informs consumers about staying safe and protecting personal information while browsing the Internet, connecting through social media, and shopping online. Through CHIPP, you can learn how to protect your devices from malware and hackers, keep your personal information private, and avoid common cyber scams. This guide provides a range of cybersecurity tips. For additional information, call 800-282-0515 or visit www.ohioattorneygeneral.gov/consumers.

Learn to recognize malware Malware comes in many forms, but its aim is generally the same: to steal your personal information or harm your devices. With it, cybercriminals can infect your computer when you download files, access unfamiliar links, or click on pop-up windows disguised as messages or advertisements. Common types of malware include: Viruses, designed to infect your computer and spread to other devices. Spyware, which tracks or spies on your devices to steal personal information, such as passwords and credit card numbers. Adware, programs that may display unwanted advertisements based on your Internet browsing habits. Ransomware, malware that holds devices hostage and demands you pay a fee to remove it. Beware of malware scams Some scammers try to gain access to your devices by pretending to represent a technology or computer repair company. They falsely claim you have downloaded viruses that must be removed, then offer to fix the supposed problem by remotely accessing your computer. Instead of solving any problems, the scammers load malware onto your device or threaten to lock it until you pay. Secure your home network A home wireless network can include computers, gaming systems, printers, tablets, and other devices. To ensure yours is safe: Make sure your home Internet connection is behind a firewall, which is hardware and/or software that controls what comes and goes from your network. A firewall helps keep would-be intruders off home networks. Set and use a password on your wireless routers and network connections. Enable encryption, which scrambles data into an unreadable format when available.

Use mobile devices wisely The number of people who connect to the Internet through mobile devices is constantly rising. More than half of American adults have smartphones, and nearly that many own tablets. Mobile devices pose specific security concerns. Personal information can easily be taken if the device is lost or stolen. Also, the devices typically have geolocation features, allowing them to pinpoint your exact physical location in real time. To boost privacy and security when using mobile devices: Set and use the locking feature, which requires users to have a password or passcode for entry. Remember that mobile phones are susceptible to malware and other viruses, just like computers. Disable geolocation and geotagging features. Geotagging occurs when an application or program displays and sometimes broadcasts the device s location to others. Turn off Bluetooth and Wi-Fi features when not in use. When you download apps, do so from reputable sources such as well-known Web-based stores. Keep apps and mobile operating systems updated to ensure any newly released security patches are loaded. Delete apps you no longer use. Beware of SMiSHing, when scammers phish for information through text messages. Such text messages may include a link to a phony, but legitimate-looking website that asks consumers to update, validate, or confirm account information. Download a locator app, if available, from your mobile device s manufacturer. This app can trace the device if it is lost or stolen. It may also include features to remotely lock the device and/or wipe out the information it contains.

Safeguard your computer Maintaining a clean computer is the key to combating malware. Following these suggestions will help: Install and maintain an anti-virus and anti-spyware program. Set the program to update automatically or check regularly for updates since new viruses are launched all the time. Scan the hard drive for viruses on a regular basis. Visit www.staysafeonline.org for a list of free security products to detect malware. Do not buy protection software or services based on telephone calls, pop-up advertisements, or email messages that allege your device has malware. They are probably scams. Install and use a pop-up blocker. They are often available free, including within some Internet browsers. Install and update personal firewalls, which filter incoming and outgoing data. Delete suspicious emails and text messages, even if they appear to be from a friend or trusted source. Do not click on links, open attachments, or download anything from a suspicious message.

Take precautions on public Wi-Fi Using unfamiliar, unsecured wireless or Wi-Fi networks can put you at risk of downloading malware to your computing devices. To protect yourself: Verify the specific network name with the network owner before connecting to Wi-Fi in a public area. Never disclose personal information, such as logins, passwords, or credit card numbers when using an unsecure connection. Assume everyone can see what you are doing when you use a public network. Set strong passwords Protect your accounts To prevent access to your personal information: Use strong passwords for each of your online accounts and change them regularly. Use unique passwords for each program, website, and application. Disable any automatic login functions on websites. Log off from each website and account when finished. All passwords should be at least eight characters long and include capital and lowercase letters, numbers, and symbols. Create passwords based on a phrase that uses a combination of letters and numbers. For example, My dog s name is Brutus plus a random number creates the password MdniB239.

Use the Internet wisely The Internet has made a world of information and networking options available at our fingertips. But it has also given scam artists and other criminals a powerful tool to carry out their crimes. Keep up your guard and follow these tips for safe Internet usage: Each computer, Internet browser, and mobile phone has different ways to adjust security and privacy features. An Internet search can help determine how to best protect a specific device or browser. Operating systems and Internet browsers typically allow you to adjust security and/or privacy settings to your comfort level. Adjust Internet browser settings to at least medium security. These settings may, for example, filter out potentially harmful data and control the types of cookies that can be loaded by websites you visit. Cookies are sometimes used to track a user s activity for marketing purposes. Whenever you disclose personal or financial information over the Internet, look for the lock symbol and the s in https: at the beginning of the website address. The s means the site is secure. If making online purchases, use a credit card instead of a debit card to best limit your financial risk in case personal information is misused. Know that some scammers phish for personal information using e-mails or phone calls that appear to be from your bank or a government agency and seek personal information, such as bank account numbers, pass words, or Social Security numbers. Never respond to unexpected requests for your personal information. Instead, contact the source at a phone number you trust. For example, call the phone number on your billing statement or the back of your credit card.

Exercise caution on social media Follow these suggestions to protect yourself when using social media sites: Social media websites and apps each have their own default, or automatic privacy settings that control what you share. Familiarize yourself with the settings, understand what they mean, and know how to change them to meet your privacy needs. Privacy settings on one type of device may not carry over to your other devices. Be sure you re comfortable with the settings for all devices you use to connect to social media. Know whom you re sharing with on each site and device you use. Don t give out more personal information than necessary. Think about how others could use the information you share. Understand how your information will be used, saved, and shared, even after you re done visiting the site or using the app. If you re a parent, look at the age restrictions of the social media your children use and monitor their usage of such sites.

Dispose of devices responsibly Make cybersecurity a priority whenever you dispose of, sell, or recycle a computer, mobile device, or USB jump drive. Take the device to a trusted source, such as a local electronics store, and have them wipe the hard drive and any other memory hardware clean. If you have any question about whether personal information has been completely removed from a device, talk to a trusted computer professional before disposing of the device.

For more information, to report a scam, or to schedule a speaker on consumer protection issues, contact Ohio Attorney General Mike DeWine s office at www.ohioattorneygeneral.gov or 800-282-0515. For TTY, please call Relay Ohio at 800-750-0750.