Welcome To The L.R.F.H.S. Computer Group Wednesday 27 th November 2013

Similar documents
INTERNET & COMPUTER SECURITY March 20, Scoville Library. ccayne@biblio.org

Computer Security Maintenance Information and Self-Check Activities

Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:

This guide will go through the common ways that a user can make their computer more secure.

When you listen to the news, you hear about many different forms of computer infection(s). The most common are:

Preparing Your Personal Computer to Connect to the VPN

How to easily clean an infected computer (Malware Removal Guide)

Willem Wiechers 3 rd March 2015

Bookmarks for Desktop Self-Defense

In the Cloud. Scoville Memorial Library February, 2013

What you need to know to keep your computer safe on the Internet

Securing small business. Firewalls Anti-virus Anti-spyware

Online Payments Threats

2016 Digital Safety Class UNDERSTAND YOUR RISKS AND STAY TOTALLY SECURE JESSE ROBERTSON, TECH 4 LIFE

PC Security & Housekeeping March 2015

avast! Free Antivirus for Mac Quick Start Guide avast! Free Antivirus for Mac Quick Start Guide

Countermeasures against Spyware

Cyber Security Education & Awareness. Guide for User s

Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning

Keeping you and your computer safe in the digital world.

What Do You Mean My Cloud Data Isn t Secure?

PC Security and Maintenance

TMCEC CYBER SECURITY TRAINING

The Care and Feeding of Your Computer Troubleshooting and Maintenance

Spyware. Michael Glenn Technology Management 2004 Qwest Communications International Inc.

thriller INTERNET SECURITY

Airtel PC Secure Trouble Shooting Guide

PROTECT YOUR COMPUTER AND YOUR PRIVACY!

Certified Secure Computer User

Payment Fraud and Risk Management

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security

Bitdefender Internet Security 2015 User's Guide

Reliance Bank Fraud Prevention Best Practices

Learn to protect yourself from Identity Theft. First National Bank can help.

Computer Security, Maintenance and Backup

Laura Royer, Extension Faculty, University of Florida/IFAS Osceola County Extension Services

C&G FLUX MARKET Internet Safety

SBA Cybersecurity for Small Businesses. 1.1 Introduction. 1.2 Course Objectives. 1.3 Course Topics

Paul Nguyen CSG Interna0onal

Keystroke Encryption Technology Explained

User Guide for the Identity Shield

Get Started Guide - PC Tools Internet Security

LAW OFFICE SECURITY for Small Firms and Sole Practitioners. Prepared by Andrew Mason, Scott Phelps & Mason, Saskatoon Saskatchewan

Introduction to Computer Security Table of Contents

Computer Network and Internet Security Awareness and Responsible Use. Indian River County School District

ONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS

Tahoe Tech Group serves as your technology partner with a focus on providing cost effective and long term solutions.

Office of Information Technology Desktop Security and Best Practices

Online Banking Fraud Prevention Recommendations and Best Practices

Netsafe/ AVG New Zealand. NetSafe/ AVG New Zealand. Cyber Security Research. Cyber Security Research. Supplementary Tables. March 2011.

Malware, Spyware, Adware, Viruses. Gracie White, Scott Black Information Technology Services

Malware Detection and Removal: An examination of personal anti-virus software

Secondly, if your device is running a Microsoft Windows or Macintosh OS X operating system you will also need to:

Trust the Innovator to Simplify Cloud Security

Bitdefender Total Security 2015 User's Guide

Safe Practices for Online Banking

Cyber Security Solutions:

Management Website User Guide. SecureAnywhere AntiVirus SecureAnywhere Internet Security Plus SecureAnywhere Complete

Certified Secure Computer User

Cyber Security Solutions for Small Businesses Comparison Report: A Sampling of Cyber Security Solutions Designed for the Small Business Community

CLEO Remote Access Services CLEO Remote Desktop Access User Guide v1.3

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

Small Business Security

Welcome to Office 365!

BE SAFE ONLINE: Lesson Plan

Information Security. Louis Morgan, CISSP Information Security Officer

Digital Citizenship Lesson

SecuritySecuritySecurity!

FAKE ANTIVIRUS MALWARE This information has come from - a very useful resource if you are having computer issues.

How not to lose your computer or your research. M.R. Muralidharan SERC IISc

High-Speed Internet Quick Start Guide

Malware & Botnets. Botnets

Internet threats: steps to security for your small business

Introduction to Cyber Security

Protect your personal data while engaging in IT related activities

Why you need. McAfee. Multi Acess PARTNER SERVICES

Avoiding Malware in Your Dental Practice. 10 Best Practices to Defend Your Data

KASPERSKY SMALL OFFICE SECURITY (Version 3) Features List

MRG Effitas 360 Assessment & Certification Programme Q4 2014

How to fight CryptoLocker and evade its Ransomware demands

Protecting Yourself from Identity Theft

Norton 360. Benefits. Our ultimate protection, now even more so. Introducing the new Norton 360.

Student Halls Network. Connection Guide

Basic PC Maintenance. Instructors. Action Center

Beware! CryptoLocker Ransomware

Avoiding Malware in Your Dental Practice. 10 Best Practices to Defend Your Data

Small businesses: What you need to know about cyber security

Housekeeping Your PC

VRD for Windows User guide

National Cyber Security Month 2015: Daily Security Awareness Tips

How to prevent computer viruses in 10 steps

Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines

Global Antivirus Software Package Market

Security Consultant Scenario INFO Term Project. Brad S. Brady. Drexel University

CBI s Corporate Internet Banking Inquiry Services gives you the ability to view account details and transactions anytime, anywhere.

Protecting your business from fraud

User Manual. HitmanPro.Kickstart User Manual Page 1

Online Security Awareness - UAE Exchange - Foreign Exchange Send Money UAE Exchange

SAFEGUARDING YOUR WINDOWS COMPUTER

User's Guide. Copyright 2013 Bitdefender

Transcription:

Welcome To The L.R.F.H.S. Computer Group Wednesday 27 th November 2013

BACKUP SECURITY AND THE CLOUD

BACK UP ALWAYS BACK UP TO AN EXTERNAL DEVICE OR REMOVAL MEDIA- NEVER DIRECTLY ON TO YOUR COMPUTER IF YOU BACK UP TO YOUR COMPUTER AND YOU HAVE A HARD DRIVE FAILURE YOU WILL LOSE YOUR BOTH YOUR DATA AND YOUR BACKUP!! THE MAJORITY OF EXTERNAL HARD DRIVES COME WITH THEIR OWN BACKUP SOFTWARE

WINDOWS BACK UP

DRAG & DROP

Click Start Point to All Programs Point to Accessories Point to System Tools And then click Backup. Click Advanced Mode. BACK UP IN XP http://www.ntbackup.us/articles/installntbackup-xp-home.htm

FREE BACKUP SOFTWARE FREE FILE SYNC. http://freefilesync.sourceforge.net/ TOP 10 BACKUP SOFTWARE http://www.thetop10bestonlinebackup.com/

SECURITY ANTIVIRUS, ANTISPYWARE & FIREWALL

VIRUS Transmitted Via Websites, E-Mail Attachments, From The Internet Or On Removable Media Trojans Hidden In Files Or Pictures Or Programs Worms These Viruses Can Get In Via Open Internet Connections SPYWARE Spyware Is Software That Can Gather Information About A Person Or Organization Without Their Knowledge MALWARE Short for malicious software, Malware is software designed specifically to damage or disrupt a system, such as a virus or a Trojan horse RANSOMWARE 'Ransomware' is a type of malware that attempts to extort money from a computer user by infecting and taking control of the victim's machine ROOTKITS Rootkit is an application (or set of applications), that hides its presence or presence of another application (virus, spyware, etc.) on the computer, using some of the lower layers of the operating system

Keystroke Logging Often referred to as keylogging or Keyboard Capturing, is the action of recording (or logging) the keys struck on a keyboard, typically in a covert manner so that the person using the keyboard is unaware that their actions are being monitored.

5 RULES FOR SAFETY

1. KEEP YOUR SOFTWARE UP TO DATE Even if your computer comes off the shelf with a level of protection, threats change daily. So it's imperative you keep it up-to-date or else it's useless. For Windows 7, just click on "Start", go to Control Panel, select ALL PROGRAMS and click the "Windows Update" icon, where it will show you if there are any updates for your PC. The same goes for users with Windows 8 or XP. The same goes for dedicated antivirus software Keep it up-to-date, and do a full system scan once a week even if your software regularly scans your system

2. PROTECT YOUR ONLINE IDENTITY With more and more of us using the web to bank online and do other sensitive tasks, coming up with solid passwords is more vital than ever. It may seem obvious, but don't use the same login for lots of sites. If one falls into the wrong hands, your whole online life is up for grabs. Remembering lots of different ones is tricky, so try picking one and just add a few letters to it related specifically to each site you're logging into. Ensure you change your passwords frequently. BUT DO REMEMBER THEM!!!

3. NEVER OPEN UNKNOWN E-MAIL ATTACHMENTS Most web crime still happens via email, so be on guard when checking yours. Don't open any attachments you're not expecting, or click any random links you find in the text If you're unsure if a site's legitimate, put the name into Google and see what comes up. It may be listed as a scam.

POLICE SCAM

CryptoLocker CryptoLocker is Trojan horse malware which surfaced in late 2013. A form of ransomware targeting computers running Windows, a CryptoLocker attack may come from various sources; one such is disguised as a legitimate email attachment. When activated, the malware encrypts certain types of files stored on local and mounted network drives using RSA public-key cryptography, with the private key stored only on the malware's control servers. The malware then displays a message which offers to decrypt the data if a payment is made by a stated deadline, and says that the private key will be deleted and unavailable for recovery if the deadline passes. PAYMENTS NORMALLY $300-185 If the deadline is not met, the malware offers to decrypt data via an online service provided by the malware's operators, for a significantly higher price in Bitcoin. http://www.afterdawn.com/software/security/antivirus/cryptoprevent.cfm

BEWARE OF PAYPAL E-MAIL SCAMS Dear PayPal Customer, You have an incoming payment from a member of Craiglist slated for your account regarding your item. This transaction cannot be completed due to errors present in your account information. You are required to download the form attached to this email to fix this problem immediately. Please do not reply to this message. For questions, please call Customer Service. We are available 24 hours a day, 7 days a week.

4. ONLY DOWNLOAD SOFTWARE FROM TRUSTED SITES Looking for a piece of software? Find out which company makes it first and then go to its site to get it, rather than a third party site found via Google. For smaller free or shareware programs, try using big sites such as Download.com, rather than just getting them from anywhere that shows up. When using torrents, avoid.exe files wherever possible. If you must tempt fate, make sure they're thoroughly scanned first.

BE CAREFUL EVEN FROM OFFICIAL SITES LOOK FOR THE TICKS!!

WIRELESS ROUTER SECURITY MAKE SURE YOUR ROUTER CAN ONLY BE ACCESSED WITH THE PROVISION OF A WIRELESS SECURITY KEY IF YOU ARE NOT SURE GET SOME ADVICE!!

5. SWITCH IT OFF!! Switching your computer off when you aren't using it doesn't just save energy, it stops others accessing it while you're away. At the very least, disconnect your broadband when you don't need the web. While your PC's on, and after you've been browsing, is a prime time for malware (malicious software) attacks. So switching it off is a good preventative measure.

COMMERCIAL SOFTWARE NORTON 360 INTERNET SECURITY MCAFEE INTERNET SECURITY BITDEFENDER KASPERSKY BULLGUARD F-SECURE AVG ANTIVIRUS OR INTERNET SECURITY RAPPORT - SUPPLIED BY BANKS OR BUILDING SOCIETIES SOPHOS

FREE SECURITY SOFTWARE FREE AVG ANTIVIRUS 2014 SUPERANTISPYWARE AVAST 2014 AVIRA BITDEFENDER FREE PANDA Download Links On LRFHS Computer Group Page www.lrfhs.org.uk/compgroup.html

3 KEY ELEMENTS FOR TOTAL COVER ANTIVIRUS ANTISPYWARE FIREWALL

STAND ALONE ANTIVIRUS SOFTWARE DOES NOT INCLUDE A FIREWALL INTERNET SECURITY PACKAGES NORMALLY DO INCLUDE A FIREWALL CHECK YOUR FIREWALL IS ON

MORE THAN ONE SECURITY PROGRAM ON YOUR COMPUTER? Most commercial software will not like other free software on at the same time. NORTON & AVG Bad Combination Most Seem To Accept Super Anti SPyware

USING IN-THE-CLOUD SCANNING, BITDEFENDER SAFEGO PROTECTS YOUR SOCIAL NETWORK ACCOUNT FROM ALL SORTS OF E-TROUBLE: SCAMS, SPAM, MALWARE AND PRIVATE DATA EXPOSURE. BUT, MOST IMPORTANTLY, SAFEGO KEEPS YOUR ONLINE FRIENDS SAFE

DO YOU TRAVEL ABROAD? EVER CHARGED YOUR IPHONE OR TABLET PUBLICLY - E.G. IN AN AIRPORT?

The USB Condom protects personal and private data stored on your mobile device by blocking data connections in the USB cable, only allowing power to your device. USB CONDOMS!!

INTERNET BROWSER SECURITY

KEEP YOUR BROWSER UP TO DATE Each new version is more secure than the previous one Internet Explorer 11 XP Internet Explorer 8 Firefox 26 Google Chrome

INTERNET BROWSER SECURITY

SPAM E-MAILS MOST INTERNET/EMAIL PROVIDES WILL HAVE SOME SPAM PROTECTION BUILT-IN Virus scanned by DO NOT ASSUME THEY ARE SAFE MOST SPAM NOW COMES FROM WEB HOSTING COMPANIES WHO HAVE BEEN COMPROMISED BY SPAMMERS

SCAM PHONE CALLS

THE CLOUD Cloud computing is an expression used to describe a variety of computing concepts that involve a large number of computers connected through a real-time communication network such as the Internet

Amazon Cloud Storage 5 gb Amazon Cloud Player Apple icloud 5gb SkyDrive Microsoft 7gb Free With Office 365 DropBox 2GB 200 Million Users

http://www.which.co.uk/technology/software/guides/how-to-choose-the-best-cloud-storageservice/the-best-free-cloud-storage-services/ http://www.which.co.uk/technology/software/guide s/how-to-choose-the-best-cloud-storage-service/thebest-free-cloud-storage-services/

KEEP UP TO DATE AND BE CAREFUL