How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.

Slides:



Advertisements
Similar presentations
Online Privacy A Module of the CYC Course – Personal Security
Advertisements

Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Part I: Making Good Online Choices
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Internet Safety James Fuller Internet Rules To Remember When asked by friends or strangers, online or offline, never share Account IDs and Passwords.
SECURITY CHECK Protecting Your System and Yourself Source:
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
Two-Factor Authentication & Tools for Password Management August 29, 2014 Pang Chamreth, IT Development Innovations 1.
Aim: What strategies can we use to keep our financial information safe online? Do Now: What do you do to protect your information online?
Free Wi-Fi Zone. Detail Process of Free Wi-Fi Access Switch on Wi-Fi setup on your Wi-Fi enabled Device like Cell Phone, Tablet PC, Laptop & search for.
Basics: Getting Started Uploading and Sharing Videos on YouTube. Basics: Getting Started Uploading and Sharing Videos on YouTube. 1.
Google Account Basics: Getting Started with free Google applications.
Scams Stevie's Scam School videos
How To Protect Your Privacy and Avoid Identity Theft Online.
Notes to Teachers At the time we embedded the links in these lessons, they all worked. If they don’t, you can google the website, find the link, open it.
Threats to I.T Internet security By Cameron Mundy.
The World-Wide Web. Why we care? How much of your personal info was released to the Internet each time you view a Web page? How much of your personal.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
ESCCO Data Security Training David Dixon September 2014.
Stay Safe & Secure Online. Outline Passwords Everyday Security Security Physical Security Protecting Personal Information.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Malicious Attack Corporate Awareness and Walk through Date 29 September 2011.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS). SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.1 I can describe.
Identity Theft What is Identity Theft?  Identity theft is a serious crime. Identity theft happens when someone uses information about you without your.
Personal Privacy and Security Zenia C. Bahorski Ph.D. Department of Computer Science Eastern Michigan University Personal Privacy & Security - Z. Bahorski,
Safeguarding Your Privacy Section 1.3. Safeguarding Your Privacy 1. What is Identity Theft? 2. Research a story on identity theft and be prepared to report.
Agenda Last class: Internet Literacy Lab Today: Internet Safety.
Copyright ©: SAMSUNG & Samsung Hope for Youth. All rights reserved Tutorials The internet: Staying safe online Suitable for: Beginner.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Demi Leigh.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Internet and Social Media Security. Outline Statistics Facebook Hacking and Security Data Encryption Cell Phone Hacking.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Identity Theft Since 2005, there has been a dramatic increase in the occurrence of identity theft among students online.
By: Elizabeth Scruggs Digital Citizenship Project.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
Optimizing Your Computer To Run Faster Using Msconfig Technical Demonstration by: Chris Kilkenny.
Joel Rosenblatt Director, Computer and Network Security September 10, 2013.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
Cyber Security and Staying Safe Online Mark D. Riley College of Health Sciences and Professions.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
@ BCHS. The School Policy is your guide to ensuring you and your students are safe. It is your responsibility to make yourself aware and familiar with.
Outlook Web Access (OWA) is a web mail service of Microsoft Exchange; allow users to connect remotely via a Web browser OWA is used to access ,
Julie Latham Digital Citizenship: An Informational Guide.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
 There are many android hack tool given on the internet that promises to give you best performance. But unfortunately most of the android hack tool are.
Staying Safe On Social Media. Website Security  How do you know if a website is secure?  Celebrities  http vs https  http: Hypertext Transfer Protocol.
1. Guard your privacy. What people know about you is up to you. 2. Protect your reputation. Self-reflect before you self-reveal. What’s funny or edgy.
Presented By: Jennifer Thayer, SPHR, SHRM-SCP.  Identify CyberCrime and Types  Identify Steps to Take to Prevent Identity Theft  Learn Tips and Tricks.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
STOP. THINK. CONNECT. Online Safety Quiz. Round 1: Safety and Security.
Maryknoll Wireless Network Access Steps for Windows 7 As of Aug 20, 2012.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Traveling Securely. Unsecured Networks and browsing  Using Unsecured Networks –Hotels, airports, coffee shops, libraries, etc Anywhere you do not know.
Have a Safe Shopping Online Experience. Did You Shop Online Today?  Anything you need today is available online. Whether it’s groceries, jewellery, clothes,
Welcome to Week 2 in the computer lab. Last week you learned step 1 of the morning routine. Today we will learn how to complete the entire routine!
PUBLIC COMPUTER SAFETY
How to use the internet safely and How to protect my personal data?
How to use the internet safely and How to protect my personal data?
Information Security 101 Richard Davis, Rob Laltrello.
BP5 – encryption - Fun gym
BP5 – encryption - Fun gym
Bethesda Cybersecurity Club
Presentation transcript:

How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.

We all know when you have homework to do and you don’t want to sit at home, you would rather go to a coffee shop or the library to do it. Maybe you have your own laptop, tablet or phone and want to check Facebook, Twitter, Tumblr, or your using free public Wi-Fi. These scenarios can be innocent but they can also be your worst nightmare!

Protection when using a public computer!

Logout! You should NEVER EVER save any of your log-in information! This means that you should avoid clicking the box that says Save My Password or Remember Me. If it was saved then this would allow the next user to log on to the website you were just on. We do not want that! Find and click the “log out” button before you leave the page.

Avoid Personal Information! Never type your personal information on the computer. Avoid banking passwords, credit card account numbers, and things that can be used for identity theft. Always save this type of information for home use or from your phone with a respected carrier network. Even encryption will not work if the machine has a keylogger on it.

Delete Browsing History! Erase your browsing history and restart the computer when you are done. This will prevent someone from seeing what you have done on the computer if they sit down after you are done.

Pay Attention! Watch out and make sure no one is looking over your shoulder or spying on what you are doing. This might be common sense but it should be first on the list!

Protection when using a Public Wi-Fi Hotspot!

Firewall is important! Always use a firewall. You have one built in to your operating system just make sure it is up and running. If it is not turned on, go to Control Panel>Windows Firewall and turn it on.

Private File Sharing! Change your file sharing to Private not Public. Changing the file sharing to private can ensure that someone with malicious intent cannot access the files without your permission.

Encryption is a Must! Encrypt your sensitive files before you send them over the internet. There are free tools that you can use to make this easy, for example in Microsoft Word.

Turn off Wi-Fi! Turn off the Wi-Fi when you are not using it. This makes a huge difference in whether a hacker can get into your device or not. You never want to log into a network you don’t know and leave your device’s Wi-Fi on. If you are not using it turn it off. Doing this is like locking up your device when you walk away from it. This will make you less of a target for the hacker. Some computers have a switch on the side to turn off the Wi-Fi, if not you can go onto your task bar and choose disable.

Forget the Network! Make sure when you are done with your web browsing that you log off any services you are signed into. Don’t forget to tell your device to forget the network. This way if you are in range of the network your device will not try to connect to it without your permission.

S Secure is Best! If you do have to enter passwords or credit card credentials on a public Wi-Fi connection make sure that the website is secure. You can do this by making sure that the address bar displays HTTPS and not HTTP, the S in HTTPS stands for SECURE!

Don’t Share! Make sure you do not type what you would not want other people to see. If someone has connected to your computer, you do not want them to see what you are doing. Make wise choices and leave the sensitive stuff for home use.

If you take these precautions, then it is safe to use a public computer and free Wi-Fi!