Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.

Slides:



Advertisements
Similar presentations
Top 10 Checklist to Protect Your Personal Privacy Online Teens 1.
Advertisements

Internet Safety Gleneagles Computer Club February 16, 2015 by Deborah Benson.
Victoria ISD Common Sense Media Grade 6: Scams and schemes
SECURITY CHECK Protecting Your System and Yourself Source:
What is identity theft, and how can you protect yourself from it?
Social media threats. Warning! May contain mild peril.
IDENTITY THEFT ARE YOU SAFE?. HOW DOES THIS HAPPEN TO ME? Internet “Security “ When using a public computer, never access any vital accounts like banking.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 18, 20 & 25 March 2015.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
Company LOGO Internet Safety A Community Approach.
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Threats to I.T Internet security By Cameron Mundy.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Protecting Yourself Online (Information Assurance)
Safe Computing Outreach Joseph Howard Undergraduate Research Assistant 05/01/2015 Disclaimer: This research was supported by the National Science Foundation.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
JMU GenCyber Boot Camp Summer, Cyberspace Risks and Defenses Facebook Snapchat P2P filesharing Apps Craigslist Scams JMU GenCyber Boot Camp© 2015.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Security Awareness ITS SECURITY TRAINING. Why am I here ? Isn’t security an IT problem ?  Technology can address only a small fraction of security risks.
Information Security and YOU!. Information Assurance Outreach Information Security Online Security Remote Access with Demonstration The Cloud Social.
ESCCO Data Security Training David Dixon September 2014.
Stay Safe & Secure Online. Outline Passwords Everyday Security Security Physical Security Protecting Personal Information.
Staying Safe Online Keep your Information Secure.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Personal Privacy and Security Zenia C. Bahorski Ph.D. Department of Computer Science Eastern Michigan University Personal Privacy & Security - Z. Bahorski,
DIGITAL SECURITY PART 2 TOOLS. phising  Internet criminals can steal your personal and banking information without you ever noticing – they can do it.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
 Why is this important to you?  How do digital footprints connect with digital citizenship?  Does everyone have a digital footprint?
Internet and Social Media Security. Outline Statistics Facebook Hacking and Security Data Encryption Cell Phone Hacking.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Specialist communication channel. Sarah-Jane king.
Chapter 7 Phishing, Pharming, and Spam. Phishing Phishing is a criminal activity using computer security techniques. Phishers try to acquire information.
Personal Online Safety Information Security Systems Community Outreach Program McKinley Middle School April 23, 2013.
Information Security Sharon Welna Information Security Officer.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
INTERNET: The Good, The Bad and The Ugly
Minding your business on the internet Kelly Trevino Regional Director October 6,2015.
Grants Management Training 200 Cyber Security There are two kinds of people in America today: Those who have experienced a cyber-attack and know it, and.
Cyber Security and Staying Safe Online Mark D. Riley College of Health Sciences and Professions.
Internet Safety and Productivity Tips Presented by ITS Kerri Sorenson and Sean Hernandez December 11, 8:30-9:00 am.
Cyber Safety Jamie Salazar.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
Virus Assignment JESS D. How viruses affect people and businesses  What is a virus? A computer virus is a code or a program that is loaded onto your.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
OCTOBER IS CYBER SECURITY AWARENESS MONTH. October is Cyber Security Awareness Month  Our Cyber Security Awareness Campaign focuses on topics such as.
Mobile Money 1/37 Fiserv Mobile Money Staff Education © 2010 Beavercreek Marketing, a division of Beavercreek Inc. All rights reserved. All trademarks.
Presented By: Jennifer Thayer, SPHR, SHRM-SCP.  Identify CyberCrime and Types  Identify Steps to Take to Prevent Identity Theft  Learn Tips and Tricks.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Computer Security Keeping you and your computer safe in the digital world.
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
Avoiding Frauds and Scams Barbara Martin-Worley Director, Consumer Fraud Protection 18 th Judicial District Attorney’s Office Serving Arapahoe, Douglas,
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
KASPERSKY INTERNET SECURITY FOR ANDROID. YOUR MOBILE DEVICES NEED PROTECTION More online communications and transaction are happening on tablets and phones.
Activate your McAfee on Support for McAfee
PCS Technology for Staff: Acceptable Use, Privacy, and Safety
Digital Citizenship Middle School
Information Security.
Information Security 101 Richard Davis, Rob Laltrello.
What you can do to support people to be safe online
Understanding Browsers
Bethesda Cybersecurity Club
Internet Safety – Social Media
Security in mobile technologies
Presentation transcript:

Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost anything online, apply for a job, make a financial transaction and have access to many effective tools to simplify life. Just like most things in life, there are pros and cons as our technology advances. As more and more information is shared online, identity theft also is growing. College students are becoming the new target for easy identity theft. Sharing overload has given power to a world of criminals. The following instructions will help you to ensure you have the tools and information necessary to protect your identity. Taking even these basic steps could save you from the financial nightmare of identity theft. Materials Needed: Materials Needed: Laptop, Tablet, PC, Mac, Cell Phone and a secure data or Wi-Fi connection

Social Media: Social Media: 1. Limit the personal information available in your profile. Never list full date of birth, phone number, or physical address. You can make these changes by clicking “edit profile” to minimize information shared. Make sure passwords don't include personal items such as birthdate, pet’s name, or any other information that could unintentionally provide password information. 2. Proactively manage your social networking account. Most social networking sites are configured to make it very easy for others to find you. Use your "privacy settings" by giving "only my friends" access. 3. Limit the amount of "time and place" data that you expose. Turn off your location data on a Facebook posting by clicking the “x” next to your provided location. This will help protect against providing identity thieves with your address. Free Wi-Fi Dangers: Free Wi-Fi Dangers: 1. NEVER use public Wi-Fi to log in to your financial sites. Public or free Wi-Fi makes you extremely vulnerable to hackers or a nosy neighbor. 2. When using public Wi-Fi ensure the site is using a secure encrypted connection. To determine if a website is encrypted, look for https at the start of the web address (the “s” is for secure). 3. Change default Wi-Fi connection settings on PC, Mac or phone. If you are a windows user, in the advanced settings of “Wireless Network Connection properties” (“Advanced“ button on “Wireless Networks” tab), choose “Access Point networks only”. The default is “Any available network” and this is not safe. If you are a Mac user: In Network Preferences, choose “By Default”, join “Preferred Networks” and edit your preferred Network to include only trusted sources.

Tools to Protect Against Identity Theft: Tools to Protect Against Identity Theft: 1. Have Anti-Virus software installed on your PC and Mac. There are many anti-virus software programs that will assist you in detecting any potential security risks and will provide any possible solutions to any problems that may be found. 2. Use Mobile Phone and Tablet Security. Cell phones need security because they are used to perform transmissions of personal information. Lookout Mobile Security is a tool you can use to scan your mobile device and computer for viruses and malware. It will also locate a missing device, lock personal files remotely and remote wipe all personal data from device. You can download the app at lookout.com 3. Ensure a password is installed on mobile phone, laptop or tablet. Passwords are a first line defense to identity theft. Not only do you need to password protect devices online, you also need to password protect you devices from any potential identity thefts sitting around you in a public area. Phishing Scams: Phishing Scams: 1. Do not provide personal information in response to a request via . If a request has been made to provide personal information, initiate contact with the institution directly. Do not respond to the Do not divulge personal information over the phone unless you initiate the call. Identity thieves will use convincing calls in attempts to gain personal information or financial payment. 3. Guard against spam. Be cautious of s that come from unrecognized senders, ask for personal or financial information, make urgent requests for information, aren’t personalized, try to upset you into acting quickly by threatening you with frightening information. 4. Delete spam messages from .

4. Check your credit report annually. You are allowed, by law, to receive one free credit report a year. Checking your credit report annually will provide you with any possibilities of identity theft. You will be able to view all active and or delinquent accounts open underneath your identity. For additional resources on identity theft protection, please view the websites listed below: identity-theft/tips-to-prevent-identity- theft For additional resources on software and tools to assist with managing the security of your identity, please view the websites listed below :