How can IT help you today?. Agenda Why Do You Care? What Are The Risks? What Can You Do? Questions? How can IT help you today? 2.

Slides:



Advertisements
Similar presentations
Surfing the net: Ways to protect yourself. Internet Safety Look into safeguarding programs or options your online service provider might offer. Look into.
Advertisements

Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
How to protect yourself, your computer, and others on the internet
Cyber Stalking Cyber Stalking Phishing Hacker 1. Never reveal your home address !!! This rule is especially important for women who are business professionals.
Presented by: Blue Green Systems. Inspiration Why people buy/sell online  Convenience  Better Prices  Variety  Fewer Expenses  Comparison of Prices.
Helping our customers keep their computers safe.  Using your pet’s, business, family, friend’s names  Using number or letter sequences (0123, abcd)
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 25 & 27 November 2013.
TAX-AIDE Computer Security Chris Hughes Chairman NTC 1 NLT Meeting Aug 2014.
TAX-AIDE Computer Security Chris Hughes (HMR mod) Chairman NTC 1 NLT Meeting Aug 2014.
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
Johnson Logistics Solutions Office of Systems and Information Technology.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 18, 20 & 25 March 2015.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
October is National Cyber Security Month OIT and IT providers are launching an awareness campaign to provide tips and resources to help you stay safe online.
Sarah Showalter Summer Utilizing the school computers, network, and storage space is a privilege! Each year all users are expected to review.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Protecting Our Personal Space Security in a Virtual World.
Threats to I.T Internet security By Cameron Mundy.
Protecting Our Personal Space Security in a Virtual World by David Hines - Information Security Officer
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
SACHIN DEDHIA Cyber Crime Investigator Cert. Ethical Hacker(USA)
Keeping Information Safe Task 4. Basic security measures Passwords Change password on regular basis Do not use names or words easily linked to yourself.
Identity Theft By: Victoria Tuttle. DeterDetect Defend.
Stay Safe & Secure Online. Outline Passwords Everyday Security Security Physical Security Protecting Personal Information.
Staying Safe Online Keep your Information Secure.
Computer Security By: MacKenzie Olson. To be safer and more secure online, make these seven practices part of your online routine.
IT security By Tilly Gerlack.
Identity Theft What is Identity Theft?  Identity theft is a serious crime. Identity theft happens when someone uses information about you without your.
Cyber Security Anchorage School District – 7 th grade Internet Safety.
Copyright ©: SAMSUNG & Samsung Hope for Youth. All rights reserved Tutorials The internet: Staying safe online Suitable for: Beginner.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Information/Internet Safety. MBA Candidates at UNM Anderson School of Management This is our homework.
Internet Safety Mr. Richard Orr Technology Teacher Murphy Jr. High School.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
HOW TO PREVENT IDENTITY THEFT ONLINE TIPS 1.WATCH OUT FOR PHISHING WEBSITES.
What is Spam? d min.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Cyber Safety Jamie Salazar.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Confidentiality, Integrity, Awareness What Does It Mean To You.
OCTOBER IS CYBER SECURITY AWARENESS MONTH. October is Cyber Security Awareness Month  Our Cyber Security Awareness Campaign focuses on topics such as.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Smart, Safe, and Secure Online Spam commercial messages that you didn’t ask for (a company trying to sell things by sending out thousands of messages at.
Copyright © 2008 AusCERT 1 Practical Computer Security See the notes section throughout the slide presentation for additional information.
1 Outline of this module By the end of this module you will be able to: Understand why computer security is important; Name the different threats to.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
ARE YOU A CYBER SECURITY RISK?. Pass the Hat Al QaedaFARCHezbollahIRAHAMAS.
Technological Awareness for Teens and Young Adults.
Avoiding Frauds and Scams Barbara Martin-Worley Director, Consumer Fraud Protection 18 th Judicial District Attorney’s Office Serving Arapahoe, Douglas,
Protecting Against Cyber Attacks PLEASE TAKE A MINUTE TO LOOK AT THIS IMPORTANT MESSAGE. THIS IS HAPPENING HERE AND NOW! LET US SAVE YOU AND YOUR INFORMATION.
Internet Safety.
Learn how to protect yourself against common attacks
Unit 4 IT Security.
Lesson 3 Safe Computing.
Data Compromises: A Tax Practitioners “Nightmare”
OWASP CONSUMER TOP TEN SAFE WEB HABITS
Home Computer Security
Information Security 101 Richard Davis, Rob Laltrello.
Cybersecurity Awareness
Risk of the Internet At Home
Protecting Your Identity:
Presentation transcript:

How can IT help you today?

Agenda Why Do You Care? What Are The Risks? What Can You Do? Questions? How can IT help you today? 2

Why Do You Care? Do you have a computer? have a cell phone? have children? use social media? bank online? shop online? How can IT help you today? 3

What Are The Risks? At home: Cyber criminals Identify theft At work: Hacktivists Terrorists Nation States How can IT help you today? 4

How are you attacked? Malware Keystroke loggers Root kits Botnets Banking malware Phishing Vishing Social engineering Wardriving How can IT help you today? 4

What Can You Do? Krebs’s 3 Basic Rules for Online Safety 1. If you didn’t go looking for it, don’t install it! 2. If you installed it, update it. 3. If you no longer need it, remove it. Read the full article at: How can IT help you today? 5

What Can You Do? Preventing Intrusions 80-85% of cyber intrusions that the US-CERT responds to could have been prevented by implementing the following: Application White Listing Patching applications Patching OS Restrict Administrative Privileges Network segmentation and segregation into security zones How can IT help you today? 7

What Can You Do? Don’t run as local administrator Don’t open s you didn’t solicit NEVER click links in or open attachments unless you KNOW the sender and even then use caution and discretion How can IT help you today? 5

Patching and AV Keep your operating system patched Keep your software patched Run anti-virus software and keep you signatures up to date How can IT help you today? 5

Backup Your Data Ransomware Hardware failures Corruption Accidental deletion How can IT help you today? 5

Passwords Never give your password to anyone. Your bank won’t ask, your online store won’t ask and we won’t ask Make you passwords complex Long – 14+ characters Letters, numbers and special characters Avoid using words in the dictionary Don’t use the same password on multiple sites How can IT help you today? 5

Network Security Make sure you have secured your wireless access point Make sure you have a firewall Be careful what you do on public networks McDonalds Starbucks Hotels Consider a VPN service How can IT help you today? 5

Keeping Your Children Safe Consider a web filter Restrict access Know where you children are going online and who they are taking to Put their computer where you can see it Living room Kitchen Remember there are predators out there How can IT help you today? 5

Social Media Considerations Identify theft Real theft Vacations Photo metadata Personal information for security questions How can IT help you today? 5

Banking Online Make sure you are going to the correct site Don’t click links in s from you bank, go directly to the bank’s website Run credit reports on a regular basis Consider a separate computer for banking and other financial uses How can IT help you today? 5

Shopping Online Always use a credit card not a debit card Consider using gift cards or refillable credit cards Use reputable sites If it sounds too good to be true it probably is How can IT help you today? 5

Phishing Example From: Hansen, Ingrid Sent: Tuesday, August 04, :37 PM Subject: IT Routine Maintenance System Today 4th Aug, We are currently upgrading our system we need to migrate your mailbox to a different server location so it will be compatible with the newer versions of software. This service is to create more space and easy access to . All institutional mail account user's are advice to update their account now. This has been made mandatory for all user. User are to CLICK HERE: for activation. NOTE: Failure for any user to do this will have his/her account inactive. Thank you, IT Routine System How can IT help you today? 5

Protecting Your Sensitive Data When your device is repaired? When you sell an old device? Cameras? USB? Removable disks? How can IT help you today? 5

24