Put a Lock on It: Protecting your online privacy A project of Consumer Action | www.consumer-action.org.

Slides:



Advertisements
Similar presentations
Smartphone and Mobile Device Security IT Communication Liaisons Meeting October 11, 2012 Theresa Semmens, CITSO.
Advertisements

Your Digital Dollars Online and mobile banking and payments Financial education from Consumer Action and Visa Inc. © Consumer Action 2011.
Springfield Technical Community College Security Awareness Training.
Protecting Personal Information Guidance for Business.
What to Know, What to Do Presentation Powered By: The Federal Trade Commission Consumer Protection Toolkit.
Protecting Your Identity: What to Know, What to Do.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Fraud, Scams and ID Theft …oh my! Deb Ramsay ESD 101 Chief Information Officer Technology Division.
Identity Theft Someone steals your personal information for his/her own gain It’s a crime!
Security for Today’s Threat Landscape Kat Pelak 1.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Data Security Concerns at Work and at Home STEVE MITZEL IT DIRECTOR ASHLAND SCHOOL DISTRICT #5 – ASHLAND OREGON
Introducing K12Planet.com What is K12Planet.com? Who can access it? Is it secure? What do I need to use it? Can I control the information I see?
By Ashlee Parton, Kimmy McCoy, & Labdhi Shah
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 18, 20 & 25 March 2015.
Privacy Safety on the Internet. Tips on Prevention  Check to see if website is secure  A padlock icon in the corner indicates a security certificate.
Keeping Data Safe Revision Summer How many ways can data be lost? Start a list… Physical Loss or Corruption of data Accidental or Deliberate Unauthorised.
Online Shopping Take Charge of Your Finances
© Family Economics & Financial Education –October 2007 – Consumer Protection Unit – Online Shopping Funded by a grant from Take Charge America, Inc. to.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
PAGE 1 Company Proprietary and Confidential Internet Safety and Security Presented January 13, 2014.
Unit 19 INTERNET SECURITY
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Banking Online Safely. What can you use online banking to do? Immediate access to real-time account balances Pay bills and make transfers anytime.
PRIVACY BOOTCAMP YpJU.
Mobile Technology and Cyber Threats Deon Woods Bell Office of International Affairs The Fifth Annual African Consumer Protection Dialogue Conference Livingstone,
© Family Economics & Financial Education –October 2007 – Consumer Protection Unit – Online Shopping Funded by a grant from Take Charge America, Inc. to.
© Hodder Gibson 2012 Staying safe online. © Hodder Gibson 2012 Dangers on the Internet There are a number of dangers on the Internet such as: viruses.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS). SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.1 I can describe.
KEEPING YOUR FAMILY SAFE IN THE DIGITAL WORLD. THE BLESSINGS OF TECHNOLOGY “We live at a time when technology can be used to replicate reality, to augment.
Internet and Social Media Security. Outline Statistics Facebook Hacking and Security Data Encryption Cell Phone Hacking.
Computer viruses The effects of a virus are…  Slow loadings  Crashing  Not having control over the computer  Deleting documents.
Consumer Protection Shop Safely and Guard Your Financial Information.
Minding your business on the internet Kelly Trevino Regional Director October 6,2015.
A Consumer’s Guide to Choosing a Prepaid Card A project of Consumer Action | Funding provided by Visa Inc.
U.S. Small Business Administration Answers | Resources | Support For Your Small Business Cybersecurity Awareness Cybersecurity Awareness Signs You’ve Been.
4 TH YEAR PARENTS EVENING MOBILE DEVICES Mrs Helen Alexander Head of ICT/Computing.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Onguardonline.gov By Austin Kellogg. Main ideas  Protect your personal information  Know who your dealing with  Use security software that updates.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Miller County Board of Education Updated 2/7/2016 Microsoft Office Clip Art.
70 Suffolk Court Hauppauge, NY Customonline.com Resources to educate us Cybersafety in the Digital Age.
Digital Security Jesline James! 9cc. Contents  The CREATORS!!!! =] The CREATORS!!!! =]  What is Digital Security? What is Digital Security?  How does.
Safe Computing Practices. Outline Objective Safe Computing Defined Safe Computing Methods Summary List of References.
IDENTITY THEFT Nicholas Michalak. Agenda What is Identity Theft? Background of Identity Theft Legislation Against it Different types and Examples What.
Presented By: Jennifer Thayer, SPHR, SHRM-SCP.  Identify CyberCrime and Types  Identify Steps to Take to Prevent Identity Theft  Learn Tips and Tricks.
KASPERSKY INTERNET SECURITY multi-device  Average number of devices in households: 4.5  Consumer device diversity will continue to expand.
Avira Home Office Products: In the year of its 30th anniversary, Avira is going from strength to strength! No experiments when it comes to security.
Privacy Issues in E-Commerce Seydou Ouattara CIST 2100 OAT Talk.
Protection of Data 31 Protection of Data 31. Protection of Data 31 Having looked at threats, we’ll now look at ways to protect data: Physical Barriers.
KASPERSKY INTERNET SECURITY FOR ANDROID. YOUR MOBILE DEVICES NEED PROTECTION More online communications and transaction are happening on tablets and phones.
Protecting Young Children Online Speaker Name Speaker Organization.
Identity Theft It’s a crime!
Attention Identity theft Definition
ARE YOU A TARGET? YOU MAY NOT REALIZE IT, BUT YOU ARE A TARGET FOR CYBER CRIMINALS. IDENTITY THEFT IS ON THE RISE. BE AWARE AND TAKE PREVENTIVE ACTIONS.
Mobile Banking What can it do for you?.
Cybersecurity Awareness
Content Management lifecycle
Digital $$ Quiz Test your knowledge.
Staying safe on the internet
Mr Douglass Subject Leader ICT & Computing
“Credit score vocabulary”
Security in mobile technologies
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Online Computer Security Tips For Parents
Online Safety; Privacy and Sharing
Online Safety; Privacy and Sharing
Presentation transcript:

Put a Lock on It: Protecting your online privacy A project of Consumer Action |

What you will learn Why it’s important to play an active role in protecting your privacy online What tech tools are available to you How to avoid oversharing on social media Ways to keep kids safe on the Web and mobile devices

Password protection

Strong or weak? LEO Abc123 FT2rY&s1L password amazon1 6&rT&4Hd n3k6c2s

Two-factor authentication

Secure transactions Mobile banking Online shopping

Encryption

Firewalls Is your computer’s firewall turned on?

Mobile device safety Treat your phone like your wallet Set your device to lock Use a remote locate/lock/erase app “Wipe” data before getting rid of your device

App safety

Avoidable threats Phishing Spam Malware/spyware Malicious websites

What’s a data breach? How can you avoid one? What can you do if you’re a victim? Data breaches

Social media privacy

Protecting your online reputation

Family-friendly Internet

Marketing/Data collection Transparency Control COPPA

Resources Federal Trade Commission (FTC) ( OnGuardOnline.gov ( Family Online Safety Institute ( Privacy Rights Clearinghouse ( Google ( Consumer Action (

Congratulations! You’ve completed the training. Consumer Action © Consumer Action 2015