Overview 1. Phishing Scams

Slides:



Advertisements
Similar presentations
Top 10 Checklist to Protect Your Personal Privacy Online Teens 1.
Advertisements

Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
8 Mistakes That Expose You to Online Fraud to Online Fraud.
October is National Cyber Security Month OIT and IT providers are launching an awareness campaign to provide tips and resources to help you stay safe online.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
Protecting Your Information Assets
IT security By Tilly Gerlack.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS). SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.1 I can describe.
Identity Theft What is Identity Theft?  Identity theft is a serious crime. Identity theft happens when someone uses information about you without your.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
TECHNOLOGY GUIDE THREE Protecting Your Information Assets.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Demi Leigh.
Internet and Social Media Security. Outline Statistics Facebook Hacking and Security Data Encryption Cell Phone Hacking.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
PLUG IT IN SIX Protecting Your Information Assets.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
Minding your business on the internet Kelly Trevino Regional Director October 6,2015.
Cyber Security and Staying Safe Online Mark D. Riley College of Health Sciences and Professions.
Cybersecurity Test Review Introduction to Digital Technology.
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
PHISHING A Melbourne Athenaeum Library Cybersafety Information Guide
Cyber Security and Computer Safety
Internet Safety.
Digital Security Identity theft Copyright Laws Plagiarism, and More.
A Lawyer’s Ethical Duties Regarding Electronically Stored Information
Hotspot Shield Protect Your Online Identity
Learn how to protect yourself against common attacks
3.6 Fundamentals of cyber security
Unit 4 IT Security.
How to use the internet safely and How to protect my personal data?
TECHNOLOGY GUIDE THREE
Ways to protect yourself against hackers
How to use the internet safely and How to protect my personal data?
Lesson 3 Safe Computing.
Information Security 101 Richard Davis, Rob Laltrello.
Phishing is a form of social engineering that attempts to steal sensitive information.
Unit 4 IT Security.
Protect Your Computer Against Harmful Attacks!
Staying Austin College
Lesson 2- Protecting Yourself Online
How to Protect your Identity Online PIYUSH HARSH
STOP. THINK. CONNECT. Online Safety Quiz.
Cybersecurity Awareness
Information Technology Services Education and Awareness Team
4 ways to stay safe online 1. Avoid viruses and phishing scams
Identity Theft This presentation will focus on identity theft. What do you already know about identity theft? Do you know anyone who has had their identity.
Shopping experience! Avoiding online fraud Ian Ramsey C of E School
Cyber Security and Computer Safety
Ian Ramsey C of E School GCSE ICT On the move How can we connect?
Protecting Yourself from Fraud including Identity Theft
What is BankMobile? A process to select how to receive student refunds and student payroll payments It is fast, secure, and convenient. Go to:
Security Hardening through Awareness August 2018
Protecting Your Credit Identity
Internet Safety – Social Media
Information Technology Services Education and Awareness Team
Lesson 2- Protecting Yourself Online
Security in mobile technologies
Wireless Spoofing Attacks on Mobile Devices
G061 - Network Security.
Identity Theft By Omer Ersen.
Cybersecurity Simplified: Phishing
Founded in 2002, Credit Abuse Resistance Education (CARE) educates high school and college students on the responsible use of credit and other fundamentals.
Presentation transcript:

Overview 1. Phishing Scams 2. Purchasing  (Credit Cards and Debit Cards) 3. VPN Access 4. Accessing Unencrypted Networks 5. Mobile Devices

Phishing Scams Always, always think twice before clicking Consider the source Know your backups Phishing scams work by tricking you into clicking on a link or attachment that either infects your machine with malware or takes you to a page that looks totally legit, but isn’t and is designed to steal your private information. Ex. Yahoo breach (spear fished) Three ways to help increase chances of avoiding phishing scams Always, always think twice before clicking They often do so by prying on your emotions Listen to your gut– if something feels off it probably is Consider the source Check to see message is from a legitimate source Some may not be as apparent Attacker might be from someone you know  reach out to them separately and ask Know your backups Prepare defensively in case you get phished Enabling multi-factor authentication on all accounts that offer it Using password manager or strong, random and unique password Backing up your data

Most Infected Today (Top 5 Countries) Vietnam Russia India Germany United States https://cybermap.kaspersky.com/stats/

Credit Cards, Debit Cards & Cash (while traveling) Highly recommended that you use credit cards Use debit cards only to withdraw funds at bank ATMs Carry a little bit of cash for emergencies Recommended using Credit Cards Anti-Fraud Protection– if someone steals your card or if you use a shady ATM in some tourist trap designed to harvest card data. Can put a stop to it without being liable for the charges (if the credit card company doesn’t detect it first) OTHER TIMES CREDIT IS THE BEST OPTION **Shopping online • watch for fraudulent charges. If detected you can reverse it– “zero liability” **Making large purchases or electronics purchases • warranty protection Never use Debit Cards Except to Withdraw Funds at Bank ATM Carry a small amount of cash in case of emergencies Such as the place you go to doesn’t accept your card http://www.bankrate.com/finance/credit-cards/avoid-credit-card-fraud-during-travel-1.aspx http://lifehacker.com/when-should-i-use-credit-and-when-should-i-use-debit-wh-862086499

Virtual Private Network (VPN) Hides your IP Address & Location Secures your data Blocks online trackers -raw data in your traffic is encrypted back to you home, office or school network forming a Virtual Private Network, and then decrypted and sent out onto the internet as though you were at home, work, or school, not on the road. -The most important thing you need to know about a VPN: It secures your computer’s internet connection to guarantee that all of the data you’re sending and receiving is encrypted and secured from prying eyes. -There are countless ways you are being tracked by advertisers, social media and other companies. A good VPN blocks this.

Accessing unencrypted networks can be dangerous: Snooping Compromised Devices Honey Pots -When you connected to an open Wi-Fi network like one at a coffee shop or airport your unencrypted network traffic is then clearly visible to everyone in range. People can see what unencrypted web pages you’re visiting, what you’re typing into unencrypted web forms, and even see which encrypted websites you’re connected to — so if you’re connected to your bank’s website, they’d know it, although they wouldn’t know what you were doing. -Any compromised laptops on the local network could try to infect you. -That free hotspot may in reality be a “honeypot,” a trap designed to fool unsuspecting travelers into exposing their computers and data to hackers. https:// ***green means that is verified signature (lock) ***red means its https and secure but the source is not verified (red triangle w/ “!”)

Mobile devices are just as vulnerable Don’t charge your phone in public ports Encrypt memory -Mobile phones share many of the vulnerabilities of PCs. However, the attributes that make mobile phones easy to carry, use, and modify open them to a range of attacks. -Phone is dead  plug into USB port or outlet  invisible attacker collects information while your phone is plugged in to a hacked outlet. ** if a port is compromised, there's no limit to what information a hacker could take.  charge ahead of time. use portable chargers -Requires an encryption key to access memory