9 ways to avoid viruses and spyware

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Cyber Stalking Cyber Stalking Phishing Hacker 1. Never reveal your home address !!! This rule is especially important for women who are business professionals.
You are responsible for security of your internet banking transactions ONLINE.
Wichita Public Library Rex Cornelius Electronic Resources Webliography online at:
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
1 I ntegrated S ite S ecurity for G rids © Members of the ISSeG Collaboration, 2008 See: ISS e G Computer Security: Advice for computer.
IDENTITY THEFT ARE YOU SAFE?. HOW DOES THIS HAPPEN TO ME? Internet “Security “ When using a public computer, never access any vital accounts like banking.
Scams Stevie's Scam School videos
Quiz Review.
Notes to Teachers At the time we embedded the links in these lessons, they all worked. If they don’t, you can google the website, find the link, open it.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Social Engineering Training. Why Social Engineering Training? The Department of Energy (DOE) authorized the Red Team to perform vulnerability assessments.
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
Security Awareness ITS SECURITY TRAINING. Why am I here ? Isn’t security an IT problem ?  Technology can address only a small fraction of security risks.
IT security By Tilly Gerlack.
Manjit kaur Manjit Kaur1. Why do we need to protect our computer from a virus? A reason why we need to protect our computer from a virus is because it.
A Matter of Your Personal Security Phishing. Beware of Phishing s Several employees received an that looked legitimate, as if it was being.
A Matter of Your Personal Security Phishing Revised 11/30/15.
Any criminal action perpetrated primarily through the use of a computer.
Ethical, Safety and other issues when using the Internet Displays a knowledge of networking in terms of user- access Demonstrates responsible.
Managing Money Workshop The National Autistic Society AGM
What it is and how to stop it.  What spam is.  Why it can be dangerous.  How to handle it.
Important Information Provided by Information Technology Center
Internet Safety.
Presented by: SBS CyberSecurity © SBS CyberSecurity, LLC
Chapter 40 Internet Security.
Digital Security Identity theft Copyright Laws Plagiarism, and More.
Phishing, identity theft, and more
& Google Gmail.
Done by… Hanoof Al-Khaldi Information Assurance
Class Name: Online Safety & Privacy Basics
Learn how to protect yourself against common attacks
links and attachments: Help stop malware from spreading
Internet Identity, Safety, & Security
Unit 4 IT Security.
Information Security.
ISYM 540 Current Topics in Information System Management
Lesson 3 Safe Computing.
Working with Google Applications Gmail, a popular
I S P S loss Prevention.
How to build a good reputation online
Phishing, what you should know
Information Security 101 Richard Davis, Rob Laltrello.
Technical Guidelines to Turn off Norton 360 Auto Update.
Protect Your Computer Against Harmful Attacks!
Staying Austin College
ISB Computer Security Training
Cybersecurity Awareness
HOW TO MAKE YOUR GMAIL ACCOUNT SECURE…. At Google, we take account security very seriously. To protect your account, we strongly recommend following the.
Call AVG Antivirus Support | Fix Your PC
Robert Leonard Information Security Manager Hamilton
Risk of the Internet At Home
Protecting Your Identity:
Personal IT Security Cyber Security – Basic Steps
Shopping experience! Avoiding online fraud Ian Ramsey C of E School
Viruses and Virus Protection
Stay Safe While Using The Internet
HOW DO I KEEP MY COMPUTER SAFE?
Internet Safety for Everyone
Cybersecurity Am I concerned?
How to keep the bad guys out and your data safe
Premier Employee Program Version 4.0
Internet Safety for Everyone
What is Phishing? Pronounced “Fishing”
MyLion Registration Website | Mobile device
What devices use the internet?
Multi-Factor Authentication
Presentation transcript:

9 ways to avoid viruses and spyware

Emails Never click on links in emails. If you do think the email is legitimate, whether from a third party retailer or primary retailer, go to the site and log on directly. Whatever notification or service offering was referenced in the email, if valid, will be available via regular log on.

Attachments Never open the attachments. Typically, retailers will not send emails with attachments. If there is any doubt, contact the retailer directly and ask whether the email with the attachment was sent from them.

Personal Information Do not give out personal information over the phone or in an email unless completely sure. Social engineering is a process of deceiving individuals into providing personal information to seemingly trusted agents who turn out to be malicious actors. If contacted over the phone by someone claiming to be a retailer or collection agency, do not give out your personal information. Ask them to provide you their name and a call-back number. Just because they may have some of your information does not mean they are legitimate!

Passwords Set secure passwords and don't share them with anyone. Avoid using common words, phrases, or personal information and update regularly.

Antivirus and Operating Systems Keep your operating system, browser, anti-virus and other critical software up to date. Security updates and patches are available for free from major companies.

Request from others Verify the authenticity of requests from companies or individuals by contacting them directly. If you are asked to provide personal information via email, you can independently contact the company directly to verify this request.

Websites and URLS Pay close attention to website URLs. Pay attention to the URLs of websites you visit. Malicious websites sometimes use a variation in common spelling or a different domain (for example, .com instead of .net) to deceive unsuspecting computer users.

Email Attachments For e-Mail, turn off the option to automatically download attachments.

Links Be suspicious of unknown links or requests sent through email or text message. Do not click on unknown links or answer strange questions sent to your mobile device, regardless of who the sender appears to be.