Safety & Security Online

Slides:



Advertisements
Similar presentations
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Advertisements

Primary Threats to Computer Security
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
Use computer and internet safely Dave Dai Computer security Malware Virus: a program that copies itself and infect a computer without permission.
CompClass for A Canadian Writer’s Reference 5 th Ed. Diana Hacker Nancy Sommers.
How to use Clickview for your school digital video needsClickview.
HistoryClass for The American Promise 5 th Ed. James L. Roark.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Protecting Yourself Antivirus Programs By: Stephanie Shaughnessy.
HOW TO DOWNLOAD A VIDEO FROM YOUTUBE JANUARY 9, 2012.
10 Tips for keeping MCL safe 1. Set up your defenses. Do you have adequate firewalls and antivirus software to protect you from hackers who could steal.
PAGE 1 Company Proprietary and Confidential Internet Safety and Security Presented January 13, 2014.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
5 Things You Need to Know To Get Started Gayle Underwood Technology Integration Consultant Allegan AESA.
Module 6 Using the Internet for Working & Learning.
Digital Citizenship Project Elle Wagner ED 505. Netiquette on Social Media Sites DoDon’t Be professionalPost illegal activity Share accurate informationBully.
Donette Mullinix ED 505 UWA Clipart:
Student Computing Support Fall 2015 Orientation. Who We Are Student Workers –Basic support, extended hours Technicians –In-depth support, daytime hours.
Internet Safety By Adam T Introduction  This PowerPoint will show give you advice on how to stay safe on the internet.  You will be told how to stay.
SkillsClass Solo. Online resources: REQUIRED COURSE MATERIALS REQUIRED TO COMPLETE YOUR ASSIGNMENTS.
ARE YOU BEING SAFE? What you need to know about technology safety Shenea Haynes Digital Citizenship Project ED 505.
Agenda Last class: Internet Literacy Lab Today: Internet Safety.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Max Secure Software founded in Jan 2003 develops innovative privacy, security, protection and performance solutions for Internet users. The company is.
MAGNA COMICS. Computer security. System security Problems to the system: Complete shut down. Slow response to actions. Possibility of loosing files Identity.
INGOTs Computer Security Name: Elliot Haran. Introduction  Staying safe on the internet  Learning to deal with Cyber Bullying, Stalking and grooming.
Chapter 7 Phishing, Pharming, and Spam. Phishing Phishing is a criminal activity using computer security techniques. Phishers try to acquire information.
HOW TO PREVENT IDENTITY THEFT ONLINE TIPS 1.WATCH OUT FOR PHISHING WEBSITES.
The Concerns  Acceptable Use Policies  Cyberbullying  Cyberpredators  Identity Safety  Piracy and Plagiarism.
Presenter: Le Quoc Thanh SPYWARE ANALYSIS AND DETECTION.
Virus Assignment JESS D. How viruses affect people and businesses  What is a virus? A computer virus is a code or a program that is loaded onto your.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Call Us : (Toll Free) Computer tech support | online computer support | free computer help 99% First Call Resolution
PPC Tutorial For Beginners. Content  PPC  Paid & Organic Advertisement  What is Search Engine?  How to set up account in Google Adwords? Target Your.
Find a Driver For HP 7150 Series Printer in Windows 7, 8 and XP.
Viruses & Destructive Programs
How to Install Norton Antivirus in your Computer
Reduce Your Risk of Identity Theft
Done by… Hanoof Al-Khaldi Information Assurance
EDpuzzle T. Meredith, UWE Ed Tech Specialist October 2017
PHISHING Hi, The comms team asked if I could refresh everyone about Phishing after a fairly successful phishing circulated last week that led to.
Copyright Basics – Media
Simple Photo Editing with Pixlr
Personal spaces.
How to use the internet safely and How to protect my personal data?
Management, Analytics, & Marketing
Bring Your Own Device Trialed BYOD laptop classes for 3 years in Year 10 (extension class), but tipping point needed to change pedagogy school wide…. so.
T. Meredith, UWE Ed Tech Specialist
Network security threats
Computer Virus and Antivirus
YouTube Basics T. Meredith, UWE Ed Tech Specialist February 28, 2017
Google Page Creator Advantages: Free (no PO needed!)
Protect Your Computer Against Harmful Attacks!
Steps to Install & Uninstall Webroot Antivirus
Things To Avoid: 1-Never your password to anyone.
How to allow USB Flash Drive Scan in Avast Antivirus.
Starter What is identity theft?
Jeff loses his identity!
Curating an Effective Security Culture
Protecting Senior Citizens from Phishing s
Reduce Your Risk of Identity Theft
Setting up a Gmail Account & Safety Kamlesh Singh Bisht IT Specialist.
MassCommClass for Media & Culture 2013 Update 8th Ed. Richard Campbell.
Safe Website Design.
Best way to install and Activate Norton Setup In Computer at norton.com/setup
Google Forms T. Meredith, UWE Ed Tech Specialist August 22, 2017
Google Certification Module 3
Sexual Harassment Employee Training
Online Software Certification Courses. SV Tech Hub is the Best Software Training Institute for Online Training, We help professionals learn trending technologies.
Presentation transcript:

Safety & Security Online T. Meredith, UWE Ed Tech Specialist September 26, 2017

What UW provides... Email filters for spam/phishing attempts Webroot or Windows Defender anti-virus software (free for UW-owned computers) Recommendations for anti-virus software (personal computers) Software for erasing computer hard drives Online training course on phishing & identity theft

Finding good resources For work: UW IT – Knowledge Base (use search tool) Online Training (45-60 minutes, certificate of completion) For personal use: Consumer.FTC.gov (identity theft, protecting kids, etc.) Stopthinkconnect.org (multiple languages available)

Contacting IT with questions... Use the “Technology in UWE” page to determine who/how to contact Go to “Employee Resources” Click on “Technology in UWE”

Get credit toward your “Tech-spert” badge! Activity Get credit toward your “Tech-spert” badge! Watch/re-watch the training video “Identifying Phishing Emails” at https://www.youtube.com/watch?v=PAtOHSfKZoo OR Complete the online course (45-60 minutes) at: https://uwittraining.catalog.instructure.com/courses/identy-avoid-phishing When you have finished, go to this Google form and fill it out to receive credit: http://tinyurl.com/10thingsSeptember

Questions? Tamara Meredith, tamara.meredith@uwyo.edu