Survival Guide to Help avoid being Conned!

Slides:



Advertisements
Similar presentations
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Advertisements

Operational Risks Task 13. What is CNP? CNP stands for Card Not Present and is when you order or pay for something online as you are not in front of the.
UNIT 20 The ex-hacker.
Chapter 1  Introduction 1 Chapter 1: Introduction.
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Prepared by: Nahed Al-Salah
Felicia Cervantes. Using someone's personal identifying data for unlawful purpose. (This is a SERIOUS crime.) More than 8 million American Adults fell.
Threats to I.T Internet security By Cameron Mundy.
Internet safety By Lydia Snowden.
Manjit kaur Manjit Kaur1. Why do we need to protect our computer from a virus? A reason why we need to protect our computer from a virus is because it.
The World-Wide Web. Why we care? How much of your personal info was released to the Internet each time you view a Web page? How much of your personal.
Crimes of Negligence or Incompetence Presented By: Lisa R. Williams.
HDSB Security Awareness Training. Introduction Good security standards follow the 90/10 rule: 10% of security safeguards are technical. 90% of security.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Manjit kaur Manjit Kaur1. Why do we need to protect our computer from a virus? A reason why we need to protect our computer from a virus is because it.
SOCIAL ENGINEERING PART IA: HOW SCAMMERS MANIPULATE EMPLOYEES TO GAIN INFORMATION.
ICT & Crime Viruses & malware. What is a virus? A computer virus is a piece of software that can 'infect' a computer (install itself) and copy itself.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
How to Maintain your computer. For many individuals a computer is a fairly significant purchase, and something they wish to find last. The easiest method.
1 Day 2 Logging in, Passwords, Man, talk, write. 2 Logging in Unix is a multi user system –Many people can be using it at the same time. –Connections.
Computer Security By Duncan Hall.
Review Internet Safety. Definition Phishing is fishing for personal and financial information disguised at legitimate business .
Onguardonline.gov By Austin Kellogg. Main ideas  Protect your personal information  Know who your dealing with  Use security software that updates.
Unit Five Your Money – Keeping It Safe and Secure Identity Theft Part II Resource: NEFE High School Financial Planning Program.
5.6- Demonstrate how to be a responsible consumer in the 21 st century Roll Call Question: Something that you learned in this unit.
Fraud, scams and commercial exploitation. The dangers Children are still generally quite trusting and uncritical about what they read online They are.
Warm Up: Identity Theft: Quick Write 1. What is Identity Theft? 2. What is Fraud?
Cyber security. Malicious Code Social Engineering Detect and prevent.
Safer Internet Day.
As modern children, we have a huge number of electronic devices available to us. We might use computers, tablets, mobile phones or games consoles; for.
Tips for Taking the Paper-Based FSA ELA Reading Assessments
Hacking Computer crime and cyber security.
3.6 Fundamentals of cyber security
Malware and Computer Maintenance
Unit 13 IT Systems Troubleshooting and Repair Anne Sewell
Learn how to protect yourself against common attacks
 Xfinity is a telecommunication company  Xfinity is a brand of Comcast Cable Communications, LLC.  Xfinity company is used to provide television.
Personal spaces.
How to use the internet safely and How to protect my personal data?
Online Safety! By: Michelle Deng.
How to use the internet safely and How to protect my personal data?
Job Keeping Skills- Your Key to Job Security
Should College Students Use Facebook?
Centralized Scheduling
Tips for Success: MathematicsFSA Computer-Based Test.
How to build a good reputation online
Remember the rules of online safety.
Tips for Taking the Paper-Based FSA ELA Reading Assessments
Information is at the heart of any University, and Harvard is no exception. We create it, analyze it, share it, and apply it. As you would imagine, we.
Tips for Taking the Paper-Based FSA ELA Reading Assessments
Protecting Your Identity:
The Art of Deception.
Cyber Security Experts
Identity Theft This presentation will focus on identity theft. What do you already know about identity theft? Do you know anyone who has had their identity.
Shopping experience! Avoiding online fraud Ian Ramsey C of E School
Synthesise and Evaluate
Tips for Taking the Paper-Based FSA ELA Reading Assessments
Wise Money Management By: Tyler Leighton.
HOW DO I KEEP MY COMPUTER SAFE?
9 ways to avoid viruses and spyware
Unit 4 IT Security Kerris Davies.
Internet Safety – Social Media
Norton Internet Security is supposed to protect your computer while you are using the internet. That is the main purpose of Norton Internet security, but.
What is Phishing? Pronounced “Fishing”
Vulnerabilities in Mobile Applications and Input Systems
Vulnerabilities in Mobile Applications and Input Systems
I can reflect on my own communication skills.
Getting along and dealing with conflict
Founded in 2002, Credit Abuse Resistance Education (CARE) educates high school and college students on the responsible use of credit and other fundamentals.
Presentation transcript:

Survival Guide to Help avoid being Conned! Thomas & Son Garage Survival Guide to Help avoid being Conned! By Carrie Thomas

What is an social engineering? Is a term that describes a non-technical kind of intrusion that relies heavily on human interaction and often involves tricking other people to break normal security procedures to give them personal or company information.

Social engineering facts Millions of people get conned every year Cons can cost companies millions of dollars A social engineer can really be anybody Not a lot of social engineers get caught

Social Engineer Characteristics to Look out for! Smooth Are usually really smooth talking since they do their homework and usually know a lot about your company. Sometime they will flirt to get the information they need. Patient They usually out a lot of time into their con because they like to know what to expect. Dress for success Tend to dress like what they want you to think they are. Like a business man for example

Phone call tips to avoid handing out company information Just because the caller ID says it a call from our other shop does not mean the call is actual from the other shop. Do not hand out Customer or Company Information over the phone without talking to your boss If the call does not seem right tell your boss To day there are ways for social engineers to make a caller Id say that you are calling from one place but really you are calling from another place.

Computer tips Change you password once a month at least Make sure that you have the latest security on your computer Should have the newer software installed on your computer Do not open emails that are from people you do not know Watch out for heading in email tittles with words like “congratulations” or “Free” in them If you have to pay for something online do not use your debit card. Try to use a regular credit card. Do not leave your web cam up when you are not using it because hacker can hack into it and turn it on whenever they want and you may not realize it.

What Thomas & Son are doing to prevent being conned. We will be requiring our employees to change their password every month. They will not be a loud to use the same password twice. The computer will have a log in password to get into all of our financial reports. That password will also be changed every month All employees will be going to a training session on how to stop a social engineer. Only the boss will be able to give our the customers and company information Update our computer spyware and put the latest windows on our computer.

What to do if you feel like you are getting conned! If you feel like you are getting conned do not give any information out! Ask for their information and tell them you have to call them back because you have to do something real quick or put them on hold Always verify with your boss that you are supposed to hand out that information. If they are personally in the store just tell them you are not aloud to give out that information and only your boss can do it. If they continue to push call the police

Our Business Policy To keep the trust of our employees and customers we will not release any information with out the consent of our boss. Any employee that is caught giving out unauthorized information will be terminated!

References http://en.wikipedia.org/wiki/Social_enginee ring_%28security%29 http://fr.thehackademy.net/madchat/esprit /textes/The_Art_of_Deception.pdf http://money.howstuffworks.com/con- artist.htm

Any Questions