Protecting yourself and your computer Presented by: Jamie Leben IT-Works Computer Services 970-405-4399 www.i-t-w.com www.i-t-w.com Copyright 2005.

Slides:



Advertisements
Similar presentations
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Advertisements

How to protect yourself, your computer, and others on the internet
Account HIGHJACKING & IDENTITY THEFT GPCE Credit Union has prepared a slide show presentation to examine the most prevalent financial crimes at work today.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Mary Burger Owner ComputerDiva, LLC Vancouver, WA
Victoria ISD Common Sense Media Grade 6: Scams and schemes
SECURITY CHECK Protecting Your System and Yourself Source:
Fraud, Scams and ID Theft …oh my! Deb Ramsay ESD 101 Chief Information Officer Technology Division.
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
James Sees Senior Network Administrator Management Analyst Cyber Protection Strategies White Hall Business Association - Cyber Security & Awareness Conference.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
Security Warnings TROPE: Teachers’ Resources for Online Privacy Education 1.
Security Issues: Phishing, Pharming, and Spam
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet safety By Lydia Snowden.
Protecting Yourself Antivirus Programs By: Stephanie Shaughnessy.
Over 3,000 computers are affected monthly by Malware and Phishing.
Keeping Information Safe Task 4. Basic security measures Passwords Change password on regular basis Do not use names or words easily linked to yourself.
By: Daniel Krueger ITC 525: Computers for Educators Summer II 2010 Click Here to Begin.
IT security Sherana Kousar 11a/ib1  A virus is a file written with the intention of doing harm, or for criminal activity  Example of viruses are: 
Scams & Schemes Common Sense Media.
Dangers of the Internet CEL : C O M P U T E R S I N E V E R Y D A Y L I F E CEL 1 Dangers of the Internet Name: ____________________ Class: ________________.
Personal Privacy and Security Zenia C. Bahorski Ph.D. Department of Computer Science Eastern Michigan University Personal Privacy & Security - Z. Bahorski,
Computer viruses are small software programs that are made to spread from one computer to another and to interfere with computer operations. There are.
Network problems Last week, we talked about 3 disadvantages of networks. What are they?
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Malware and Phishing By: Sydney Langley. MALWARE- includes viruses and spyware to steal your personal information PHISHING- is an internet scam sending.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Business Technology Applications What is Malware.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Internet Safety for Elementary Students Revised from the iSafe program at
GUIDE TO INTERNET SAFETY A VISUAL WALKTHROUGH TO SAFE INTERNET BROWSING.
Computer Security Keeping you and your computer safe in the digital world.
PCS Technology for Students: Acceptable Use, Privacy, and Safety.
Internet Safety.
Digital Security Identity theft Copyright Laws Plagiarism, and More.
Hacking Computer crime and cyber security.
Internet Identity, Safety, & Security
Unit 4 IT Security.
Types of Cyber Crimes Phishing - is a scam to steal your online username and password. Phishing attacks work by tricking you into entering your username.
Protect Your Computer Against Harmful Attacks!
HOW TO MAKE YOUR GMAIL ACCOUNT SECURE…. At Google, we take account security very seriously. To protect your account, we strongly recommend following the.
Support For Webroot Antivirus:
Mcafee.com/activate - To get more information about download, install and activate the McAfee antivirus software, visit on using.
Mcafee.com/activate - To get more information about download, install and activate the McAfee antivirus software, visit on using.
MCAFEE.COM/ACTIVATE - TO GET MORE INFORMATION ABOUT DOWNLOAD, INSTALL AND ACTIVATE THE MCAFEE ANTIVIRUS SOFTWARE, VISIT ON USING.
Mcafee.com/activate - To get more information about download, install and activate the McAfee antivirus software, visit on using.
Mcafee.com/activate - To get more information about download, install and activate the McAfee antivirus software, visit on using.
MCAFEE.COM/ACTIVATE - TO GET MORE INFORMATION ABOUT DOWNLOAD, INSTALL AND ACTIVATE THE MCAFEE ANTIVIRUS SOFTWARE, VISIT ON USING.
Mcafee.com/activate - To get more information about download, install and activate the McAfee antivirus software, visit on using.
Mcafee.com/activate - To get more information about download, install and activate the McAfee antivirus software, visit on using.
Mcafee.com/activate - To get more information about download, install and activate the McAfee antivirus software, visit on using.
Mcafee.com/activate - To get more information about download, install and activate the McAfee antivirus software, visit on using.
MCAFEE.COM/ACTIVATE - TO GET MORE INFORMATION ABOUT DOWNLOAD, INSTALL AND ACTIVATE THE MCAFEE ANTIVIRUS SOFTWARE, VISIT ON USING.
Mcafee.com/activate - To get more information about download, install and activate the McAfee antivirus software, visit on using.
Mcafee.com/activate - To get more information about download, install and activate the McAfee antivirus software, visit on using.
Mcafee.com/activate - To get more information about download, install and activate the McAfee antivirus software, visit on using.
Mcafee.com/activate - To get more information about download, install and activate the McAfee antivirus software, visit on using.
Mcafee.com/activate - To get more information about download, install and activate the McAfee antivirus software, visit on using.
MCAFEE.COM/ACTIVATE - TO GET MORE INFORMATION ABOUT DOWNLOAD, INSTALL AND ACTIVATE THE MCAFEE ANTIVIRUS SOFTWARE, VISIT ON USING.
Mcafee.com/activate - To get more information about download, install and activate the McAfee antivirus software, visit on using.
Mcafee.com/activate - To get more information about download, install and activate the McAfee antivirus software, visit on using.
Mcafee.com/activate - To get more information about download, install and activate the McAfee antivirus software, visit on using.
MCAFEE.COM/ACTIVATE - TO GET MORE INFORMATION ABOUT DOWNLOAD, INSTALL AND ACTIVATE THE MCAFEE ANTIVIRUS SOFTWARE, VISIT ON USING.
Scams, Identity Theft, and Viruses Kelly & Caitlin
Setting up a Gmail Account & Safety Kamlesh Singh Bisht IT Specialist.
Presentation transcript:

Protecting yourself and your computer Presented by: Jamie Leben IT-Works Computer Services Copyright 2005

Has my computer been hijacked? How can I tell? Errors Errors Pop-ups Pop-ups Computer running slow Computer running slow Erratic actions Erratic actions Browser changes Browser changes Unfamiliar programs in add/remove programs Unfamiliar programs in add/remove programs Get a 2nd opinion from other virus/spyware software Get a 2nd opinion from other virus/spyware software

How to avoid scams and frauds! Avoidingscams and frauds, online and offline Verify requestor’s identity Verify requestor’s identity Verify requestor’s right to have the information Verify requestor’s right to have the information Never click on pop ups Never click on pop ups Never click a link in an asking for information Never click a link in an asking for information Never continue onto a secure site that displays security certificate errors Never continue onto a secure site that displays security certificate errors

How to avoid scams and frauds! Avoidingscams and frauds, online and offline Strongly distrust any attachment Strongly distrust any attachment Scan attachments with a webmail system like yahoo Scan attachments with a webmail system like yahoo Strongly distrust anything advertised as "free" Strongly distrust anything advertised as "free" "If it sounds too good to be true, it probably is" "If it sounds too good to be true, it probably is"

Quiz Time! What are the two steps to avoid having information stolen? What are the two steps to avoid having information stolen? Verify requestor’s identity Verify requestor’s identity Verify requestor’s right to have the information Verify requestor’s right to have the information What is a good rule of thumb to avoid scams? What is a good rule of thumb to avoid scams? "If it sounds too good to be true, it probably is" "If it sounds too good to be true, it probably is"

Questions?