Practice Safe Computing

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
How to protect yourself, your computer, and others on the internet
Thank you to IT Training at Indiana University Computer Malware.
What is Bad ? Spam, Phishing, Scam, Hoax and Malware distributed via
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
Center Accreditation Online System
By Laura Trawin.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
Notes to Teachers At the time we embedded the links in these lessons, they all worked. If they don’t, you can google the website, find the link, open it.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Contents  Viruses Viruses  Computer Worms Computer Worms  Trojans Trojans  Spyware Spyware  Adware Adware  Spam Spam  Hoaxes and Scams Hoaxes and.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Internet Safety By Stephanie Jarrard. What is the Internet?  “Internet” is a shortened name for “Interconnected networks”  The internet is a global.
1 Kids on the Web. Child’s play? September, 2008.
Security Awareness ITS SECURITY TRAINING. Why am I here ? Isn’t security an IT problem ?  Technology can address only a small fraction of security risks.
Staying Safe Online Keep your Information Secure.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
IT security By Tilly Gerlack.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
People use the internet more and more these days so it is very important that we make sure everyone is safe and knows what can happen and how to prevent.
Cyber Security Anchorage School District – 7 th grade Internet Safety.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
How can IT help you today?. Agenda Why Do You Care? What Are The Risks? What Can You Do? Questions? How can IT help you today? 2.
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
Information Security Sharon Welna Information Security Officer.
Malware and Phishing By: Sydney Langley. MALWARE- includes viruses and spyware to steal your personal information PHISHING- is an internet scam sending.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
What is Spam? d min.
Internet Safety and Productivity Tips Presented by ITS Kerri Sorenson and Sean Hernandez December 11, 8:30-9:00 am.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Advanced Guide to ing. Introduction In this guide you and explain will learn how to use ing in an advanced way. I will go through on.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Cyber security. Malicious Code Social Engineering Detect and prevent.
Internet Safety.
Presented by: SBS CyberSecurity © SBS CyberSecurity, LLC
Hacking Computer crime and cyber security.
PHISHING Hi, The comms team asked if I could refresh everyone about Phishing after a fairly successful phishing circulated last week that led to.
Class Name: Online Safety & Privacy Basics
Learn how to protect yourself against common attacks
Unit 4 IT Security.
Lesson 3 Safe Computing.
Report Phishing Forward phishing s to
Information Security 101 Richard Davis, Rob Laltrello.
Phishing is a form of social engineering that attempts to steal sensitive information.
Protect Your Computer Against Harmful Attacks!
Staying Austin College
Lesson 2- Protecting Yourself Online
Cybersecurity Awareness
HOW TO MAKE YOUR GMAIL ACCOUNT SECURE…. At Google, we take account security very seriously. To protect your account, we strongly recommend following the.
Information is at the heart of any University, and Harvard is no exception. We create it, analyze it, share it, and apply it. As you would imagine, we.
Robert Leonard Information Security Manager Hamilton
Risk of the Internet At Home
Lesson 2: Epic Security Considerations
Report Phishing Forward phishing s to
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
9 ways to avoid viruses and spyware
Security Hardening through Awareness August 2018
Lesson 2: Epic Security Considerations
Lesson 2: Epic Security Considerations
Internet Safety – Social Media
Lesson 2- Protecting Yourself Online
Phishing 101.
Presentation transcript:

Practice Safe Computing Malware Prevention How To Stay Safe From Phishing Password Security and Multifactor Authentication  

Protect Yourself From Malware Mayhem Part 1: Protect Yourself From Malware Mayhem

After this section, you’ll be able to: Goals After this section, you’ll be able to: Define malware Understand what malware can do to your computer Understand how malware infects computers Identify signs of malware infection on a computer Better protect your computer from malware attacks

What is Malware? Malware is the abbreviated term for “malicious software” This malicious software is specifically designed to gain access or damage a computer without the knowledge of the owner. There are many different types of malware, including: Ransomware Worms Trojans Keylogger

How Does Malware Get Onto My Computer? Email attachments, even ones that seem to be from people you know “Hijacked” or malicious Web pages Flash drives or other removable media Software downloads from illegal, pirated software sites Browser pop-up windows that urge you to click on links Just like this one!

Ransomware: Types of Malware May 12, 2017: “WannaCry” ransomware infected 230,000 computers in 150 countries in a single day.

Keylogger in The News Source: Security Week (1/16/2017)

How Do I Know If My Computer Has Been Infected? Your computer suddenly starts to behave strangely, requires frequent restarts, or begins showing pop-up ads that aren't related to the website you're visiting Your web browser takes you to unfamiliar sites that you didn't choose to navigate to yourself Applications appear on your machine that you did not install yourself Your computer seems unusually sluggish and unresponsive

How Do I Remove Malware From My Computer? If your computer is owned by Teachers College: Stop by the Service Desk (Grace Dodge 70, near the cafe) or email servicedesk@tc.columbia.edu for assistance Crowdstrike antivirus -- which helps protect your computer from potentially dangerous programs, downloads and websites-- is automatically installed by CIS on any TC-owned computer.

How Do I Protect My Computer From Malware? Keep all of your programs up to date! Backup your files! The best way to do this is use a cloud service such as Google Drive or Dropbox Make sure that you have antivirus/anti-malware software installed on your computer!

How To Stay Safe From Phishing Part 2: Don’t Take The Bait: How To Stay Safe From Phishing  

After this section, you’ll be able to: Goals After this section, you’ll be able to: Define phishing Identify signs of a potential phishing email Know where to report phishing emails to and how to report them Understand the importance of password security

What is Phishing? Phishing is a form of fraud in which the attacker tries to learn personal or financial information using social engineering Two types: (1) Credential theft, (2) Download of malware Messages claim to be from legitimate sources Criminals are getting really good at creating legit-looking messages to trick people into performing actions or divulging confidential information

What Are The Risks? Identity Theft Malware infections Loss of personal data Compromised institutional information Putting friends and family at risk Financial loss

What’s Your Email Worth?

Signs of A Phishing Email Threats/Ultimatum Incorrect Web addresses No signature or contact information Too-good-to-be-true offer Spelling, punctuation, or grammatical errors Attention-grabbing titles

What Does A Phishing Email Look Like?

Let’s Dissect This Phishing Email

Real Phishing Email Targeting TC

Double-Check That Login Screen Not a legit Web address Web address for Google login SHOULD be: accounts.google.com

What Can You Do? Avoid opening suspicious email attachments and following links sent in emails. Be mindful of emails that just don’t sound right. When in doubt about the authenticity of an email, contact the sender via PHONE (Do not email the sender!) Forward any suspicious email to the Service Desk at servicedesk@tc.columbia.edu. You can also call the Service Desk at ext. 3300

What CIS Is Doing To Fight Phishing On report of phishing attempts: We use our security tools to quickly determine how many people received the email (Agari) We notify all recipients of the email to alert them to not open the message or click on any links We block the phisher’s return email addresses We block access from the TC network to phishing websites (OpenDNS) We work to tune our rules that flag phishing email as spam

What If I Clicked On The Link/Attachment? If taken to a login page, close the page! Disconnect your device from the Internet Backup your files Call the Service Desk (if this is your home computer, run your antivirus software) Send the “headers” of the suspicious email to servicedesk@tc.columbia.edu

How to Download Email Headers Log in to your TC Gmail account. Open the message you'd like to view headers for. Click the down arrow next to Reply, at the top of the message pane. Select Show Original. 5. A summary of the headers will appear in a new window. To get the full headers, click Download Original. 6. Email the Service Desk at servicedesk@tc.columbia.edu and attach this file.

Password Safety & Multifactor Authentication Part 3: Password Safety & Multifactor Authentication  

Password Protection NEVER give out your account passwords! Teachers College will NEVER ask for your password! Do not share passwords via email or leave reminders on your desk Use different passwords for your accounts Use LastPass password vault to keep your passwords secure Keep your password vault locked down with Duo multifactor authentication

Password Vaults & Multi-Factor Authentication Password Vaults (LastPass): Lets you centralize your passwords and credentials into one secure repository Cut down on the need to remember multiple passwords Allow you to create stronger, more unique passwords/passphrases Multi-Factor Authentication (Duo): Stronger than a password alone Combines something you know (password) with something you have (cell phone)

Here’s How to Get LastPass & Duo Provide us with your TC email CIS will provision your account After you receive an enrollment email from LastPass, follow the directions provided on the CIS website to set up LastPass and Duo: tc.columbia.edu/computing We’ll also email you a reminder of these instructions at the same time the enrollment email goes out.

Let’s Put It All Together Treat email attachments and links in email messages with caution When in doubt, contact the sender via phone to confirm that they sent the message Forward suspicious emails to the Service Desk (servicedesk@tc.columbia.edu) If you’re concerned about something you’ve clicked in an email, reach out to the Service Desk for help Use LastPass and Duo to protect your passwords and accounts