Internet Safety Gleneagles Computer Club February 16, 2015 by Deborah Benson.

Slides:



Advertisements
Similar presentations
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Advertisements

How to protect yourself, your computer, and others on the internet
Primary Threats to Computer Security
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
The Internet.
Facebook Security and Privacy Issues Brian Allen Network Security Analyst Washington University December 2, 2010 Alumni House.
Jason Rich CIS  The purpose of this project is to inform the audience about the act of phishing. Phishing is when fake websites are created.
Starter for 10 Unit 3: Stay safe online Transform IT SFT03_stay_safe_online.
The Internet = A World of Opportunities
Basics: Getting Started Uploading and Sharing Videos on YouTube. Basics: Getting Started Uploading and Sharing Videos on YouTube. 1.
Teach a man (person) to Phish Recognizing scams, spams and other personal security attacks July 17 th, 2013 High Tea at IT, Summer, 2013.
How To Protect Your Privacy and Avoid Identity Theft Online.
evidence. Safety To stay safe on the internet there are many points you need to follow. The first point is to change your password regularly, you.
Notes to Teachers At the time we embedded the links in these lessons, they all worked. If they don’t, you can google the website, find the link, open it.
Threats to I.T Internet security By Cameron Mundy.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet safety By Lydia Snowden.
How To Protect Your Privacy and Avoid Identity Theft Online.
Manjit kaur Manjit Kaur1. Why do we need to protect our computer from a virus? A reason why we need to protect our computer from a virus is because it.
Copyright ©: SAMSUNG & Samsung Hope for Youth. All rights reserved Tutorials The internet: Social networks and communities Suitable for: Improver.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Your Trusted Partner In All Things IT. 20 Years of IT Experience University Automotive Food Service Banking Insurance Legal Medical Dental Software Development.
Information guide.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Staying Safe Online Keep your Information Secure.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
© Hodder Gibson 2012 Staying safe online. © Hodder Gibson 2012 Dangers on the Internet There are a number of dangers on the Internet such as: viruses.
Adam Soph, Alexandra Smith, Landon Peterson. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
SURFING THE WEB PRIVACY, SAFETY, AND RELIABLE SOURCES.
Internet and Social Media Security. Outline Statistics Facebook Hacking and Security Data Encryption Cell Phone Hacking.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Manjit kaur Manjit Kaur1. Why do we need to protect our computer from a virus? A reason why we need to protect our computer from a virus is because it.
Stay Safe Online. Use strong passwords Using the same password for all your accounts makes it easy to remember. However, it also means a hacker needs.
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
Chapter 7 Phishing, Pharming, and Spam. Phishing Phishing is a criminal activity using computer security techniques. Phishers try to acquire information.
A Matter of Your Personal Security Phishing. Beware of Phishing s Several employees received an that looked legitimate, as if it was being.
safety Bailey mullan. dangers ing has become on of the main sources for communicating. When using it is more likely for someone.
What is Spam? d min.
A Matter of Your Personal Security Phishing Revised 11/30/15.
Activity 4 Protecting Ourselves. Keeping Safe There are lots of different ways we can be at risk on the Internet. How can we protect ourselves and keep.
This Guide is going to be about how to  attach files  create a signature  send to multiple recipients with using ‘Cc’ and ‘Bcc’  change the priority.
Internet safety By Suman Nazir
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Basics What is ? is short for electronic mail. is a method for sending messages electronically from one computer.
Electronic Mail. Gmail Accounts USERNAME Skyward PASSWORD Same password as you use to log in to your computer.
Internet safety. Dangers of a poor password How people guess your password Your partner, child, or pet's name, possibly followed by a 0 or 1 The last.
Cybersecurity Test Review Introduction to Digital Technology.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Managing Money Workshop The National Autistic Society AGM
SAP – our anti-hacking software. Banking customers can do most transactions, payments and transfer online, through very secure encrypted connections.
Zeus Virus By: Chris Foley. Overview  What is Zeus  What Zeus Did  The FBI investigation  The virus for phones  Removal and detection  Conclusion.
GUIDE TO INTERNET SAFETY A VISUAL WALKTHROUGH TO SAFE INTERNET BROWSING.
Avoiding Frauds and Scams Barbara Martin-Worley Director, Consumer Fraud Protection 18 th Judicial District Attorney’s Office Serving Arapahoe, Douglas,
An Introduction to Phishing and Viruses
Unit 4 IT Security.
Lesson 3 Safe Computing.
Name Job Title Library Name
Electronic Mail Opening Activity: 411 of
Electronic Mail.
Computer Security.
Electronic Mail.
Internet Safety – Social Media
What this activity will show you
Presentation transcript:

Internet Safety Gleneagles Computer Club February 16, 2015 by Deborah Benson

Once seniors are online, it becomes a regular part of their lives: 71% go online every day 82% go online at least weekly

Defend your Computer If you have a PC (a Windows based system), make sure you have anti-virus, spyware, and firewall software installed – Turn on automatic updates to make sure you keep your software up-to-date – Keep your browser up-to-date Internet Explorer, Chrome, Firefox are some examples of browsers you may be using

There is malware so you must be careful Malware: software that is intended to damage or disable computers and computer systems The worst offenders: MacKeeper and other so-called “cleaner” programs These show up as a pop-up. Do not allow this program to be downloaded! If you have downloaded it, it must be removed

Quiz Clicking on pop-up ads: A. Is a safe way to explore the internet B. Can lead you to a potentially unsafe website and possibly ask for personal or payment information you do not need to give

Clicking on pop-up ads : A. Is a safe way to explore the internet B. Can lead you to a potentially unsafe website and possibly ask for personal or payment information you do not need to give

Guard and other accounts with strong passwords  Use at least 8 characters  Include upper case and lower case letters  Use numbers and/or symbols  Do not use the same password for various accounts

Keep passwords secret and secure! The best way to keep track of your passwords is with a password app Check out Dashlane and 1Password A password app will keep track of all your passwords You only need to remember ONE password, and that is the password for your password app

Treat your password like a toothbrush. Don’t let anybody else use it and get a new one every six months. -Clifford Stoll

Use More Safely Watch out for messages that say: You’ve won a lottery You need to send money to your grandchild You need to help a relative “transfer funds” These are all SCAMS

Examples of these sorts of scam s follow. These were found in my personal (spam folder) in the last few days.

Sometimes SPAM comes from people we know. Do not click on links just because you know or recognize the sender. If the content does not make sense, does not look right, or consists of just a link to click or a document to open, DO NOT CLICK, DO NOT OPEN. Contact the Sender and ask if he or she sent the link to you.

BEWARE OF PHISHING Phishing is the attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication.

Authentic or Phishing?

Logo looks authentic Threat Link – DO NOT CLICK ON IT

 Look at the web address in your browser, make sure the web address starts with  Look for a closed padlock in your web browser. When you click on the padlock you should see a message that states the name of the company and that “The connection to the server is encrypted”.

 The padlock may be in a different location than shown.  It could be on the bottom of the browser or in some other location

 Do not log into a site if it is not secure as described.  Do not log into a site if you feel it is a fake, call the company directly.  Log out of the site when you are finished.

 Facebook  Twitter  Instagram  Pinterest  YouTube  Online Dating Sites i.e. JDate

Be sure you have looked at each setting and set it to your comfort level.

Examples of Settings Icons

In settings or options, you should set: who sees your profile who sees your photos and friends how people can search for you who can make comments how to block unwanted access by others

Do not post details that could identify you or locate you in person: your address your phone number your birth date other identifying information

Meet in a busy public place. Either bring a friend or let one know where you’re going. If it doesn’t feel right or if the person wasn’t truthful, walk away.