Computer Protection. Computer Protection. Computer Protection 5/1/2013. Classic Battle of Good vs Evil. David Watterson & Ross Cavazos



Similar documents
Protect Yourself. Who is asking? What information are they asking for? Why do they need it?

TRAINING FOR AMERICAN MOMENTUM BANK CLIENTS. Corporate Account Takeover & Information Security Awareness

National Cyber Security Month 2015: Daily Security Awareness Tips

Recognizing Spam. IT Computer Technical Support Newsletter

Don t Fall Victim to Cybercrime:

Retail/Consumer Client. Internet Banking Awareness and Education Program

Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning

Learn to protect yourself from Identity Theft. First National Bank can help.

Malware, Spyware, Adware, Viruses. Gracie White, Scott Black Information Technology Services

The information contained in this session may contain privileged and confidential information. This presentation is for information purposes only.

Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:

How to stay safe online

1. Any requesting personal information, or asking you to verify an account, is usually a scam... even if it looks authentic.

Identity Theft Protection

Malware & Botnets. Botnets

Internet basics 2.3 Protecting your computer

Corporate Account Takeover & Information Security Awareness. Customer Training

Advice about online security

Think Before You Click. UH Information Security Team

Cyber Security. Securing Your Mobile and Online Banking Transactions

WEBTHREATS. Constantly Evolving Web Threats Require Revolutionary Security. Securing Your Web World

Common Cyber Threats. Common cyber threats include:

FAKE ANTIVIRUS MALWARE This information has come from - a very useful resource if you are having computer issues.

Information Security Awareness

Spyware. Michael Glenn Technology Management 2004 Qwest Communications International Inc.

What are the common online dangers?

PROTECT YOUR COMPUTER AND YOUR PRIVACY!

BE SAFE ONLINE: Lesson Plan

OCT Training & Technology Solutions Training@qc.cuny.edu (718)

October Is National Cyber Security Awareness Month!

Protection from Fraud and Identity Theft

CLEO Remote Access Services CLEO Remote Desktop Access User Guide v1.3

PREVENTING HIGH-TECH IDENTITY THEFT

PC Security and Maintenance

Protecting your business from fraud

Fraud Detection and Prevention. Timothy P. Minahan Vice President Government Banking TD Bank

INTERNET & COMPUTER SECURITY March 20, Scoville Library. ccayne@biblio.org

Introduction to Computer Security Table of Contents

NATIONAL CYBER SECURITY AWARENESS MONTH

High Speed Internet - User Guide. Welcome to. your world.

Network Security. Demo: Web browser

Remote Deposit Quick Start Guide

Cybersecurity Best Practices

Network Security and the Small Business

It is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes.

Why is a strong password important?

F-Secure Anti-Virus for Mac 2015

Cyber Security: Beginners Guide to Firewalls

Welcome to Part 2 of the online course, Spyware and Adware What s in Your Computer?

Saheel KHOYRATTY. Partner Technology Advisor

CBI s Corporate Internet Banking Inquiry Services gives you the ability to view account details and transactions anytime, anywhere.

Avoiding Malware in Your Dental Practice. 10 Best Practices to Defend Your Data

What's the difference between spyware and a virus? What is Scareware?

Avoiding Malware in Your Dental Practice. 10 Best Practices to Defend Your Data

Do you constantly get hammered by pop up ads that come from nowhere and interfere with using your computer?

Software Engineering 4C03 Class Project. Computer Networks and Computer Security COMBATING HACKERS

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security

ONLINE IDENTITY THEFT KEEP YOURSELF SAFE FROM BESTPRACTICES WHAT DO YOU NEED TO DO IF YOU SUSPECT YOUR WHAT DO YOU NEED TO DO IF YOU SUSPECT YOUR

Why you need. McAfee. Multi Acess PARTNER SERVICES

Electronic Fraud Awareness Advisory

STOP THINK CLICK Seven Practices for Safer Computing

How to Identify Phishing s

Information Security. Louis Morgan, CISSP Information Security Officer

BCS IT User Syllabus IT Security for Users Level 2. Version 1.0

Information Security

Get Started Guide - PC Tools Internet Security

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

Protect yourself online

Computer Security Maintenance Information and Self-Check Activities

References NYS Office of Cyber Security and Critical Infrastructure Coordination Best Practices and Assessment Tools for the Household

A new fake Citibank phishing scam using advanced techniques to manipulate users into surrendering online banking access has emerged.

Top tips for improved network security

Countermeasures against Spyware

ONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS

Cyber Security Beginners Guide to Firewalls A Non-Technical Guide

ESET CYBER SECURITY PRO for Mac Quick Start Guide. Click here to download the most recent version of this document

Module 5: Analytical Writing

Certified Secure Computer User

Marlon R Clarke, Ph. D., CISSP, CISM Director Network Operations and Services, NSU

KASPERSKY SMALL OFFICE SECURITY (Version 3) Features List

Transcription:

David Watterson & Ross Cavazos Chief Information Officer IT Director City of Billings Yellowstone County Local Government IT Group Vice-Chairmen Classic Battle of Good vs Evil GOOD EVIL Firewall E-Mail Spam Filter Web Filter Anti-Virus Software Anti-Spyware Software Employee Awareness Virus Spyware Crimeware (evolved from Malware) Phishing Spam Virus / Computer Infections: Viruses are usually brought upon by files opened from e-mail attachments or transferred from other computers via CDROM or flash drive. Viruses usually do more damage by deleting important files and spreading throughout your system or network and sometimes e-mailing themselves to people you know. Generally spread by coping the virus to any unprotected computer on the network. 1

Spyware is a software that aids in gathering information about a person or organization without their knowledge and that may send such information to another entity without the consumer's consent, or that asserts control over a computer without the consumer's knowledge. Common Types: System Monitors, Trojans, Adware, & Tracking Cookies. Spyware: Spyware is usually brought upon by YOU going to shady websites and clicking ok to download programs that aren t safe. You can get spyware just by visiting a page and browsing around. Another way to get spyware is by downloading "free" software which installs unwanted spyware along with it. Crimeware: Crimeware is malicious software that is covertly installed on computers. Trojans, keyloggers, and spyware represent a challenge to those fighting crime in the 21 st Century. Crimeware programs generally steal your confidential information such as passwords and PINs and send it back to the criminal. Armed with this information, the cybercriminal is then able to steal your money. 2

Phishing: A phishing attack is a specific form of cyber crime. The criminal creates an almost 100 percent perfect replica of a chosen financial institution s website, then attempts to trick the user in to disclosing their personal details username, password, PIN etc via a form on the fake website, allowing the criminal to use the details to obtain money. Software or hardware-based network security system. Controls the incoming and outgoing network traffic by analyzing the data packets 1 st line of defense on incoming traffic Last line of defense on outgoing traffic Analyzes incoming E-mail and sorts into categories such as spam, virus, questionable, & deliver. Most filters use national databases, watch lists, and end-user definitions to identify unwanted messages. End-User filter tuning is necessary to avoid False Positives 3

Enforce content/application policies. Protect the network against viruses, spyware, phishing and other Internet threats. Optimize network performance. Intended to increase user productivity and prevent exposing users to inappropriate material. Load Anti-Virus (AV)/Spyware (AS) software on your PC/Server. Update AV/AS software daily. AV/AS software will actively scan all activity such as internet traffic, CD-ROM, flash drives, E-mail, etc. Schedule a scan of your hard drive(s) daily during off-peak times. Only install ONE AV/AS protection product. O/S: Windows, OSX, Linux.. Browser updates Adobe updates: Flash & Acrobat Updates to E-Mail Spam Filter, Web Filter, & Firewall Office Suite updates: Microsoft Office, Open Office, Word Perfect, etc 4

Be cautious of E-mails from foreign countries, people you don t know, or anyone offering you money, trips, treasures,.. Don t reply to E-mails from strangers. A quick response to their seemingly harmless Unsubscribe lets the spammer know they have a valid E-mail address. Don t click on any link or open any attachment unless you are 100% sure of the source. This is the #1 way to infect your computer. Be wary of E-mails with poor grammar & spelling 5

Be wary of any E-mail that asks for information, stirs emotion, threatens, and/or demands quick response: Your bank account is overdrawn, The IRS wants to Audit you, Verify your ebay account info, etc o Look at the E-mail to see if it actually lists information that is specific to you: home address, account #, contact info, phone #, etc o Use another source to find a telephone # for the business and call them directly about the issue. o Don t send personal or sensitive information unless the site is secure and you are 100% comfortable with the source. Desktop protection suite installed and updated. Downloading custom toolbars, screen savers, backgrounds, greeting cards, music, etc are very common ways to infect your computer. For secure transactions, look for a lock icon in the URL. Be cautious of URL s with unique or foreign domains. Such as.ru Russia,.cn China,.pl Poland,.ir Iran Be cautious of downloading Free or pirated software, movies, music, etc. Avoid Peer-to-Peer, Torrent, File Sharing sites/software. Local Government Information Technology (LGIT) Website: www.lgit.mt.gov Chair: Chris Sinrud sinrud@lccountymt.gov Vice-Chair: David Watterson wattersond@ci.billings.mt.us Vice Chair: Ross Cavazos rcavazos@co.yellowstone.mt.gov 6