PUBLIC COMPUTER SAFETY

Slides:



Advertisements
Similar presentations
Online Privacy A Module of the CYC Course – Personal Security
Advertisements

How to protect yourself, your computer, and others on the internet
Internet Safety Gleneagles Computer Club February 16, 2015 by Deborah Benson.
Online Holiday Shopping Brings Great Deals – and Fraud This lesson is part of the iKeepCurrent TM Program, provided by iKeepSafe TM.
Clearing your Cookies Mozilla Firefox A short guide to help you navigate our website faster Brought to you by:
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
1 Enterprise Security Your Information Security and Privacy Responsibilities © 2008 Providence Health & Services This information may be replicated for.
October is National Cyber Security Month OIT and IT providers are launching an awareness campaign to provide tips and resources to help you stay safe online.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
IT security By Tilly Gerlack.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Malicious Attack Corporate Awareness and Walk through Date 29 September 2011.
1. Self Awareness You should only access your accounts and private informations from a safe location (only at home as necessary if at all possible) where.
Legal Division CSAA Insurance Group, a AAA Insurer Protecting Your Identity: What to Know, What to Do 2015 Risky Business Week.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
Copyright ©: SAMSUNG & Samsung Hope for Youth. All rights reserved Tutorials The internet: Staying safe online Suitable for: Beginner.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Demi Leigh.
FINANCIAL MANAGEMENT 29 AUG 05 OC CARUSO. OVERVIEW BUDGETS CREDIT CARDS IDENTITY THEFT IMPORTANT FINANCIAL TOPICS FOR NEW COLLEGE STUDENTS.
Computer Safety Sid Holder 8k Viruses Hacking Backing Up.
safety Bailey mullan. dangers ing has become on of the main sources for communicating. When using it is more likely for someone.
NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholder to insert your own image. Cyber.
@ BCHS. The School Policy is your guide to ensuring you and your students are safe. It is your responsibility to make yourself aware and familiar with.
Internet Safety and Productivity Tips Presented by ITS Kerri Sorenson and Sean Hernandez December 11, 8:30-9:00 am.
Julie Latham Digital Citizenship: An Informational Guide.
Cyber Safety Jamie Salazar.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Outline of this module By the end of this module, you will be able to: Identify the benefits of using social networking to communicate with family and.
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
Bring Your Own Device The Elementary Edition Bring Your Own Device Information for Teachers and Staff.
PHISHING A Melbourne Athenaeum Library Cybersafety Information Guide
What is Staff Connect? When will Staff Connect launch?
INTERNET SAFETY FOR EVERYONE
PASSWORD SECURITY A Melbourne Athenaeum Library
Digital Security Identity theft Copyright Laws Plagiarism, and More.
Staying Organized Lesson style & delivery is at the teacher discretion, yet we ask that the content remain unchanged. Feel free to add in additional slides.
Managing Windows Security
CYBERBULLYING A Melbourne Athenaeum Library
& Google Gmail.
Unit 4 IT Security.
Protecting What’s Yours: Your Identity
Creating an Account on Wikieducator
Welcome to iSolutions – your IT support service
Safe and Ethical Use of Technology
Information Security 101 Richard Davis, Rob Laltrello.
Protect Your Computer Against Harmful Attacks!
Importance of Privacy Internet Safety
How to Install and Setup Quick Heal Antivirus Call
Information Security Awareness 101
Risk of the Internet At Home
Internet Safety for Everyone
COPYRIGHT A Melbourne Athenaeum Library Cybersafety Information Guide
Issaquah Online Learning Apex
Stay Safe While Using The Internet
Internet Safety for Everyone
Don’t Get Scammed on Your Way to College and Avoiding Identity Theft
Bethesda Cybersecurity Club
Dell Latitude Laptop Student setup.
INTERNET SAFETY RULES! INTERNET SAFETY WEEK!!!.
Internet Safety – Social Media
Internet Safety for Everyone
Internet Safety for Everyone
What is Phishing? Pronounced “Fishing”
Internet Safety for Everyone
Internet Safety for Everyone
Business Zone - Clearing your Cache
Identity Theft Samuel H. Slater.
Discovering Technology
Precision Spine Inc. Webmail User Guide.
Presentation transcript:

PUBLIC COMPUTER SAFETY Image source: https://pixabay.com/en/keyboard-sure-privacy-policy-castle-628703 A Melbourne Athenaeum Library Cybersafety Information Guide Image source: https://pixabay.com/en/keyboard-sure-privacy-policy-castle-628703

Risks using public computers Public computers are found in libraries, internet cafes and other public environments. There are various risks when using public computers: Other people may gain access to your personal information. Strangers may use your identity online through login details. Private or confidential documents may be copied. You have no way to tell who was using the computer before you and who will use it after you. All of these risks can be minimised by following a few simple precautions.

Staying safe Never save any of your personal documents on to a public computer. If you do need to save a personal document using a public computer, bring your own USB stick and save directly on to it. Be aware of your surroundings. Is anyone watching you over your shoulder? Don’t leave information displayed on the computer screen if you’re leaving it unattended. Don’t move away from the computer while you are logged into any online accounts.

Mobile devices If you’re using a public wireless network (WiFi) there may be security risks involved. Your activity could be tracked so don’t display personal/financial information when using public WiFi. Make sure you are running up to date antivirus and antispyware software and firewall to help protect your computer and personal information. Don’t rely on security measures any WiFi network you don’t manage yourself claims to have. Image source: https://pixabay.com/en/wifi-access-internet-logo-network-158401 Image source: https://pixabay.com/en/wifi-access-internet-logo-network-158401

Financial transactions Avoid entering credit card and personal banking information when using a public computer. Financial transactions are best carried out on a private computer. Image source: https://www.flickr.com/photos/booksnake/171233840 Image source: https://www.flickr.com/photos/booksnake/171233840

Staying safe Don’t save usernames or passwords when logging into an account on a public computer and always remember to log out of any accounts you access.

Staying safe – Firefox After you’ve finished browsing the internet, clear the browser information so that the next person cannot see your online activity. FIREFOX Click this icon in the top right corner of the screen to access the ‘History’ settings which allow you to ‘Clear Recent History’

Staying safe – Internet Explorer Click this icon in the top right corner of the screen to access ‘Internet options’ which allow you to delete ‘Browsing history’

Staying safe – Chrome CHROME Click this icon in the top right corner of the screen to access the ‘History’ settings which allow you to ‘Clear all browsing data’

Thank you Thank you for taking the time to read this guide. If you have any further queries please don’t hesitate to ask library staff. Licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.