CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. Emails. Safe browsing for shopping and online banks. Social media.

Slides:



Advertisements
Similar presentations
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Advertisements

Developed by Technology Services 1:1 Laptop Initiative
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Internet Safety Gleneagles Computer Club February 16, 2015 by Deborah Benson.
Online Holiday Shopping Brings Great Deals – and Fraud This lesson is part of the iKeepCurrent TM Program, provided by iKeepSafe TM.
Part 2 of Evil Lurking in Websites Data Security at the University of Wisconsin Oshkosh.
Facebook Security and Privacy Issues Brian Allen Network Security Analyst Washington University December 2, 2010 Alumni House.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Scams Stevie's Scam School videos
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
10 Essential Security Measures PA Turnpike Commission.
How To Protect Your Privacy and Avoid Identity Theft Online.
Security Liaisons Information Presentation. Introduction  What’s the big deal with computer security? Don’t we have an IT security department to take.
Threats to I.T Internet security By Cameron Mundy.
Contents  Viruses Viruses  Computer Worms Computer Worms  Trojans Trojans  Spyware Spyware  Adware Adware  Spam Spam  Hoaxes and Scams Hoaxes and.
Copyright ©: SAMSUNG & Samsung Hope for Youth. All rights reserved Tutorials The internet: Social networks and communities Suitable for: Improver.
Protecting Yourself Online (Information Assurance)
JMU GenCyber Boot Camp Summer, Cyberspace Risks and Defenses Facebook Snapchat P2P filesharing Apps Craigslist Scams JMU GenCyber Boot Camp© 2015.
Keeping Information Safe Task 4. Basic security measures Passwords Change password on regular basis Do not use names or words easily linked to yourself.
Information Security and YOU!. Information Assurance Outreach Information Security Online Security Remote Access with Demonstration The Cloud Social.
ESCCO Data Security Training David Dixon September 2014.
Stay Safe & Secure Online. Outline Passwords Everyday Security Security Physical Security Protecting Personal Information.
1.1 System Performance Security Module 1 Version 5.
Staying Safe Online Keep your Information Secure.
Reliability & Desirability of Data
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
IT security By Tilly Gerlack.
© Hodder Gibson 2012 Staying safe online. © Hodder Gibson 2012 Dangers on the Internet There are a number of dangers on the Internet such as: viruses.
People use the internet more and more these days so it is very important that we make sure everyone is safe and knows what can happen and how to prevent.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
Personal Privacy and Security Zenia C. Bahorski Ph.D. Department of Computer Science Eastern Michigan University Personal Privacy & Security - Z. Bahorski,
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
Copyright ©: SAMSUNG & Samsung Hope for Youth. All rights reserved Tutorials The internet: Staying safe online Suitable for: Beginner.
Internet and Social Media Security. Outline Statistics Facebook Hacking and Security Data Encryption Cell Phone Hacking.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
How can IT help you today?. Agenda Why Do You Care? What Are The Risks? What Can You Do? Questions? How can IT help you today? 2.
Minding your business on the internet Kelly Trevino Regional Director October 6,2015.
What is Spam? d min.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Cybersecurity Test Review Introduction to Digital Technology.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
OCTOBER IS CYBER SECURITY AWARENESS MONTH. October is Cyber Security Awareness Month  Our Cyber Security Awareness Campaign focuses on topics such as.
STOP.THINK.CONNECT™ A NATIONAL CYBERSECURITY AWARENESS CAMPAIGN Protecting Yourself and Your Family Online.
Presented By: Jennifer Thayer, SPHR, SHRM-SCP.  Identify CyberCrime and Types  Identify Steps to Take to Prevent Identity Theft  Learn Tips and Tricks.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Smart, Safe, and Secure Online Spam commercial messages that you didn’t ask for (a company trying to sell things by sending out thousands of messages at.
Copyright © 2008 AusCERT 1 Practical Computer Security See the notes section throughout the slide presentation for additional information.
Ethical, Safety and other issues when using the Internet Displays a knowledge of networking in terms of user- access Demonstrates responsible.
Managing Money Workshop The National Autistic Society AGM
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Computer Security Keeping you and your computer safe in the digital world.
Avoiding Frauds and Scams Barbara Martin-Worley Director, Consumer Fraud Protection 18 th Judicial District Attorney’s Office Serving Arapahoe, Douglas,
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
Internet Safety.
Personal spaces.
How to use the internet safely and How to protect my personal data?
How to use the internet safely and How to protect my personal data?
Importance of Privacy Internet Safety
Staying Austin College
Cybersecurity Awareness
HOW DO I KEEP MY COMPUTER SAFE?
9 ways to avoid viruses and spyware
Internet Safety – Social Media
Founded in 2002, Credit Abuse Resistance Education (CARE) educates high school and college students on the responsible use of credit and other fundamentals.
Presentation transcript:

CHC DI Group

What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.

Your Data Would you leave your wallet lying visible in an unlocked car? Portable and mobile devices often contain more personal data than a wallet. Identity theft can happen in an instant but can take weeks if not months to be rectified.

First Step Make sure that you have anti-virus, spyware detector and firewalls active. There are free versions and Windows 8 has a built in anti-virus and firewall. Set all to Automatic Update. Do not switch off.

Securing Your Devices/Computers Lock down your devices especially phones and tablets. This is usually with a pin number or password. Install anti-virus on all devices and install any updates, including system ones, whenever they are issued. Set tracking – this can also be on your computer or laptop.

Securing Home Network WiFi Change the default Administrator password and user names. Turn on encryption e.g. WPA2-PSK [AES] is probably the best for home use as it does not restrict WiFi speeds. Change the default SSID on your WiFi.

Tablets Some tablets have a function that sets two passwords – One to access the tablet and Two for access to the security settings. In-app purchases can lead to massive bills if not controlled. Be careful in allowing apps to access your contact list.

Passwords Passwords should be easy to remember and difficult to understand. Passwords are cracked by software and not individuals. The most common passwords are: , password, , qwerty… ad nauseam. Not hard to crack. Names of children, pets, your house, etc. should be avoided as they can be picked up from social media sites.

Selecting a Password Do not use the same password for your online bank as for your social media account. Passwords can contain capital and lower letters, numbers, symbols and spaces. The minimum of characters is 8. For example, an online bank password can be based on “Where my money is” and can look like “£ wH5r5 m1 m0n55&LS”.

Password Security & Remembering Do not write down your password and stick to your computer screen (common). Do not store on your tablet, phone or computer in plain text. Write down the base phrase/password and remember your default character substitutions.

LOG OUT You can set the log out after idle time or just to be sure, manually log out.

s s are an essential business and personal tool. So you cannot really do without them. They were the main way to spread malware but that has now changed. This does NOT mean that they still are not used for spreading malware.

Basics Do not click on a link, open an attachment or respond to any s claiming to come from your bank. Go to the bank’s website by typing in the address in a browser or phone them to check. Sometimes opening an can lead to malware being downloaded.

Basics Do not respond to any requesting personal details, especially log in details of a site you visit. If you are sending s to many people hide their addresses by using BCC and not CC. Do not use an to defame or denigrate someone.

Social Media Security Do not share personal details. Photos of your home. All public information shared on Social Media profiles can be found using search engines.

Facebook Lock down your account so only immediate friends can see your posts. Do not accept requests from unknown profiles. Do you want to be found? Set yourself as hidden, only you can initiate a friendship.

Twitter Lock down your account so only approved followers can see your Tweets. Remember that Tweets can be Retweeted unless the settings are altered. Following a person or organisation makes you visible to them.

Useful Links Secure your Facebook account: Secure your Twitter account: Private

Phishing Scams – What Are They? Scammers claiming to be banks, ISPs and ICT companies etc. in order to access your login details. They will usually have some personal information in order to convince you of their ‘legitimacy’. They are usually operated via , phone or website.

Phishing Scams – s And Websites Fake websites or s designed to look like legitimate organisations. Their aim is to trick you into sharing personal information such as passwords and bank details. Legitimate sites and s that you are a member of will never ask for your personal details.

Phishing Scams – Phone Calls A person claiming to be from an ICT company or Internet Service Provider etc. They will show you standard errors and try to take over your computer remotely in order to gather personal information. Never let anyone connect to your computer remotely.

Useful Links Identify Phishing s: on-how-to-identify-a-phishing-or-spoofing- Identify Phishing phone calls: frauds

Online Shopping Always read the Terms & Conditions. Where is the item shipping from? Make sure the URL is secure.

Online Banking Type your bank’s URL, do not follow links. Never use public wireless networks. Never share your password with anyone.

Rapport Compatible with all banks. Identifies if the website is legitimate. Protects your personal information.

Download Rapport Free to use. More information: centre/rapport.html?DCMP=OTC-rapportFURL Download Link: banking/g1/banking-safely- online/rapport/download.ashx

Automatic Updates Keep your computer and its internet security software up to date. Automatic updates should check daily. Windows automatic updates. automatic-updating-on-off#turn-automatic-updating-on- off=windows-7

Adam Telford Williams Tel: Web: