Network & Computer Security Training.  Prevents unauthorized access to our network and your computer  Helps keep unwanted viruses and malware from entering.

Slides:



Advertisements
Similar presentations
What Are Scams? Scams are designed to trick you into giving away your money or your personal details. Scams come to you in many forms – by mail, ,
Advertisements

How to Lock and Unlock Your Computer
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Data Security at Albemarle County: Keeping You and Your Computer Safe.
POSSIBLE THREATS TO DATA
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
SECURITY CHECK Protecting Your System and Yourself Source:
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
8 Mistakes That Expose You to Online Fraud to Online Fraud.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
IDENTITY THEFT ARE YOU SAFE?. HOW DOES THIS HAPPEN TO ME? Internet “Security “ When using a public computer, never access any vital accounts like banking.
August 15 click! 1 Basics Kitsap Regional Library.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
evidence. Safety To stay safe on the internet there are many points you need to follow. The first point is to change your password regularly, you.
Threats to I.T Internet security By Cameron Mundy.
E safety. Ads It’s always best to not click on ads when you see them, and it’s always a good idea to ignore them, but if there are too many you can always.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Security 101 Harper P. Johnson Information Technology Services Director of Information Security.
Information guide.
A Student’s Guide to Proper and Safe Web Behavior
LRHSD GOOGLE ACCOUNTS STEP 1 – go to docs.google.com and log in with your school (if you don’t know if you have an account, click on “CANNOT ACCESS.
Keeping Information Safe Task 4. Basic security measures Passwords Change password on regular basis Do not use names or words easily linked to yourself.
etiquette Etiquette s always go to any of the following: Staff
IT security By Tilly Gerlack.
IT Security Essentials Lesley A. Bidwell, IT Security Administrator.
© Hodder Gibson 2012 Staying safe online. © Hodder Gibson 2012 Dangers on the Internet There are a number of dangers on the Internet such as: viruses.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
1 Safely Using Shared Computers Amanda Grady December 2013.
Digital Citizen Project Katie Goodall Educational Technology 505.
Copyright ©: SAMSUNG & Samsung Hope for Youth. All rights reserved Tutorials The internet: Staying safe online Suitable for: Beginner.
INFORMATION SECURITY WHAT IS IT? Information Security The protection of Information Systems against unauthorized access to or modification of information,
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
How to use ? By Martyna Haliniak. How to log on? In order to log on, you have to type in your username & password in the text boxes, and then click.
Computer Security Hacking, Phishing, Passwords Kausalya S. And Sushil Mujumdar (CCCF) 04 - Aug - 15.
What are the rules? Information technology is available to every student, faculty and staff member in support of the essential mission of the University.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Identity Theft Since 2005, there has been a dramatic increase in the occurrence of identity theft among students online.
 You always need to have the latest anti- virus software so that you can prevent picking up unwanted virus’.  To prevent receiving junk mail, being.
Online Safety and You!. Introduction The good and the bad about the internet Protecting your Personal Information –Password protection Safety.
Company Guidelines and Basic Rules for …. No text words or slang, all s sent have to be polite and formal Use suitable, relevant subject lines.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
Changing Your Password General Lesson 3. Objectives Following completion of this lesson you will be able to:. Define how often a password must be changed.
By John Williams. Why Secure Passwords Matter Passwords protect everything about you online. Once those passwords are discovered and used by someone else.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Information Security Everyday Best Practices Lock your workstation when you walk away – Hit Ctrl + Alt + Delete Store your passwords securely and don’t.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
OCTOBER IS CYBER SECURITY AWARENESS MONTH. October is Cyber Security Awareness Month  Our Cyber Security Awareness Campaign focuses on topics such as.
Internet Safety for Elementary Students Revised from the iSafe program at
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Outline of this module By the end of this module, you will be able to: Identify the benefits of using social networking to communicate with family and.
Account & Google Message Center Guide August 2015 Prepared by: Angela Mars IT Education and Training.
Smart, Safe, and Secure Online Spam commercial messages that you didn’t ask for (a company trying to sell things by sending out thousands of messages at.
1 Outline of this module By the end of this module you will be able to: Understand why computer security is important; Name the different threats to.
Common sense solutions to data privacy observed by each employee is the crucial first step toward data security Data Privacy/Data Security Contact IRT.
Managing Money Workshop The National Autistic Society AGM
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Online Job Applications Workshop Coordinators Sharon Feeney – Andrea Reynolds –
Outline of this module By the end of this module, you will be able to: Understand the benefits that internet banking provides; Name the different dangers.
JANELL LAYSER Training Manual. AWARENESS! Social Engineers are out there, and everyone should be prepared to deal with them! They can contact you by phone,
Internet Safety.
Key words: Secure | Password | Character
How to use the internet safely and How to protect my personal data?
How to use the internet safely and How to protect my personal data?
Lesson 3 Safe Computing.
How to build a good reputation online
Staying Austin College
Cybersecurity Awareness
Computer Security.
Keeping Our Data Secure
Indeed.com Creating an account.
Presentation transcript:

Network & Computer Security Training

 Prevents unauthorized access to our network and your computer  Helps keep unwanted viruses and malware from entering our system  Protects confidential and critical data  Protects limited network resources

 Never share your username/password  Never let anyone use your computer with you signed on  Never write your password on anything and leave near your computer (sticky note  )  Never leave your computer unattended without locking it

 Change your password on a regular basis  Lock your computer when you step away

 Whenever you leave your computer, if only for a moment, lock it by pressing Alt, Ctrl, & Delete. Then press the Enter key.  When you return, enter your password to unlock it.  This is more secure and easier than logging off and takes only seconds.  When you lock your computer all your running programs continue to run. When you unlock it, you can pick up right where you left off.

Press Alt Ctrl Delete – Then press Enter

Type in your password – Then press Enter

 Must be at least 8 characters in length  Must have a combination of upper and lower case letters  Must have numbers or symbols  Must be changed every 180 days  Cannot reuse old passwords  3 incorrect attempts to logon will lock your account for 15 minutes

Press Atl Ctrl Del – Select change password…

 Many viruses/malware enter network systems through . Infected attachments, links to bad sites, and other methods are used. A good rule of thumb is, if you don’t know for sure what it is, don’t open it.  Banks and other institutions will never ask you to provide them with account information through .

 Never respond to an with critical confidential information such as your bank account numbers, social security number, account passwords, or any information you normally wouldn’t share with anyone. This is a method used to steal someone’s identity.  Some of these s are very professional looking with proper logos and other information that would make you believe it is a legitimate .

 It is very easy to copy and paste logos and other information into an to make it look legitimate. Don’t be fooled.  If you’re not sure, call your bank and ask.  Better to be safe than sorry.  Do a Google search using the subject line. Many scams are already documented and well written about. Is it real, is it fake? Google usually knows!