Internet Safety and Security Curtis Shaw nwtel.ca November 2012

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Cyber Stalking Cyber Stalking Phishing Hacker 1. Never reveal your home address !!! This rule is especially important for women who are business professionals.
Basics. 2 Class Outline Part 1 - Introduction –Explaining –Parts of an address –Types of services –Acquiring an account.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Software. stands for electronic mail. software enables you to send an electronic message to another person anywhere in the world. The message.
Starter for 10 Unit 10: Flickr & YouTube Transform IT SFT10_Flickr_YouTube.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
IT security By Tilly Gerlack.
Adam Soph, Alexandra Smith, Landon Peterson. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details.
Malicious Attack Corporate Awareness and Walk through Date 29 September 2011.
DIGITAL SECURITY PART 2 TOOLS. phising  Internet criminals can steal your personal and banking information without you ever noticing – they can do it.
Basics. 2 Professional Development Centre Class Outline Part 1 - Introduction –Explaining –Parts of an address –Types of services.
Digital Citizenship Project By Lacy Brown. Netiquette Netiquette is etiquette for the internet. Netiquette is etiquette for the internet. You should be.
Digital Citizenship. Scenario #1 – A student sends an annoying to another student. The receiving student gets even with a “flaming .” Is.
Communication Systems The Internet The largest wide area network in the world. It is made up of thousands of linked networks. What.
For Wi-Fi The is internationally describing characteristics of a wireless local network. It was named after a group of people who invented.
Are you a Digital Native?
ACN Product Overview nbn™ Australia Information correct as at October 1, 2015.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
ACN Product Overview – nbn™ 1 April What is the nbn™? The national broadband network (nbn™) is an Australian Government initiative designed to upgrade.
Managing Money Workshop The National Autistic Society AGM
SAP – our anti-hacking software. Banking customers can do most transactions, payments and transfer online, through very secure encrypted connections.
Information Technology Acceptable Use An Overview CSTMC All Staff Meeting February 10, 2014.
FLASH MOBILE | 1 Successful Customer SIM Activation Training.
ACN Product Overview Broadband Australia
Information Technology Acceptable Use An Overview
Digital Security Identity theft Copyright Laws Plagiarism, and More.
Trend Micro Consumer 2010 Easy. Fast. Smart.
Helpful Tips for your Corporate Mobile Device
Welcome to KTH and KTH IT-Support
Class Name: Online Safety & Privacy Basics
Types of Cyber Crimes Phishing - is a scam to steal your online username and password. Phishing attacks work by tricking you into entering your username.
I S P S loss Prevention.
Introduction to Wireless Technology
Information Security 101 Richard Davis, Rob Laltrello.
GCSE ICT Revision Topic 2: Connectivity.
Phishing is a form of social engineering that attempts to steal sensitive information.
IT Services for Students Community College of Rhode Island
IT Services for Students Community College of Rhode Island
Protect Your Computer Against Harmful Attacks!
Lesson 2- Protecting Yourself Online
STOP. THINK. CONNECT. Online Safety Quiz.
Kaspersky Total Security for Mac Kaspersky Total Security for Mac,
How To Use Amazon Prime Efficiently?. Amazon Prime, a paid service of Amazon, offers a number of advantages for the users. They can enjoy with two way.
Information Security Awareness 101
Scams, Identity Theft, and Viruses Kelly & Caitlin
Malware, Phishing and Network Policies
GSBS IT Resources and Security
Canada.
Ian Ramsey C of E School GCSE ICT On the move How can we connect?
Lesson 2: Epic Security Considerations
Topics we will cover followed by Q&A session at end
HOW DO I KEEP MY COMPUTER SAFE?
Connecting Remotely Winter 2014.
9 ways to avoid viruses and spyware
ACN Premium Technical Support
Using your Verizon iPad
Lesson 2: Epic Security Considerations
What is Information Security?
Lesson 2: Epic Security Considerations
Setting up a Gmail Account & Safety Kamlesh Singh Bisht IT Specialist.
Internet Safety – Social Media
What is Phishing? Pronounced “Fishing”
Lesson 2- Protecting Yourself Online
Phishing 101.
Introduction-Cyber Safety
Presentation transcript:

Internet Safety and Security Curtis Shaw cshaw@ nwtel.ca November 2012

Key Topics Internet Usage What is a Gigabyte Safeguards to Prevent Additional Usage Charges Cellular Services Phishing and E-mail Scams Questions and Answers 1/1/2019 Confidential

What is Internet Usage? Internet usage is the amount of data your computer sends and receives from the Internet. You send, or upload data to the Internet when you email and share files or photos. You receive, or download data when you receive email, visit websites, or purchase music or videos on the Internet Usage is measured in Gigabytes (GB) . 1/1/2019 Confidential

What is a Gigabyte? 1 gigabyte is 1,000,000,000 bytes One gigabyte is equivalent to: Viewing 3,500 Web pages Receiving or sending 500 digital photos Purchasing more than 200 songs What about 20 GB? Viewing 70 hours of streaming television on the Internet Watching 18 hours of high definition streaming video on your computer Downloading 8-10 high definition movies 1/1/2019 Confidential

How do I know what I’m using? Video is the primary application that drives Internet usage Regular web surfing, e-mail, photos, and even music downloads are unlikely to generate a usage bill You can log on to Northwestel’s website (www.nwtel.ca) Sign-up for automatic e-mail usage notification service System e-mails you when you have reached 50%, 75%, 95% and 100% of your monthly usage Call Northwestel at 1-888-423-2333 if you are ensure on how to set-up notification If you do reach your limit, there are packages with higher monthly caps and you can upgrade your package if required 1/1/2019 Confidential

Check your Usage 1/1/2019 Confidential

Check your Usage 1/1/2019 Confidential

How to Avoid Excessive Usage Charges Turn it off Turn off your computer when not in use. Enable Wireless security Ensure your wireless Wi-Fi router, if you have one, is locked with a password and can’t be accessed by neighbors Install Anti-virus software Having an up-to-date anti-virus program on your PC ensures malicious programs aren’t using bandwidth without your knowledge Uninstall Peer-to-Peer Software Some peer-to-peer programs constantly upload music and video files from your computer to people around the world, anytime your computer is turned on Use caution with high quality streaming video Use caution when watching video on the Internet, especially high quality video for long periods of time. Renting or purchasing a HD movie may require 2-3 GB 1/1/2019 Confidential

Cellular Usage Similar to Internet connections, cellular usage can generate additional billing Key areas to watch: Roaming to a foreign country, including the United States Ensuring you have a data plan that matches your requirement Some tips: Use your home Wi-Fi connection On your mobile phone, turn off “data roaming” to get an unexpected bill when in the United States Check your bill each month and call to inquire about charges you are ensure of 1/1/2019 Confidential

Last Comments Northwestel never requests customer information over the Internet or via e-mail. Be cautious of emails pretending to represent Northwestel that ask you to provide personal and/or account information. Emails of this nature are scam attempts known as "phishing", designed to obtain personal and/or account information (name, username, password, etc.). Some of these requests look extremely professional and can come from a major bank, university, or local business If you would like to report the attempted scam, please forward the original message to: phishing@northwestel.net 1/1/2019 Confidential

Thank-you! Curtis Shaw cshaw@nwtel.ca 1/1/2019 Confidential