Staying Safe Online Technology Services Organization.

Slides:



Advertisements
Similar presentations
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Advertisements

Developed by Technology Services 1:1 Laptop Initiative
Internet Safety Learning Disability Partnership Board 15 th October 2010 Veronica Hughes Bromley Adult Education College.
Cyber security refers to the technologies and processes designed to protect computers, networks and data from unauthorized access and attacks delivered.
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
Social media threats. Warning! May contain mild peril.
James Sees Senior Network Administrator Management Analyst Cyber Protection Strategies White Hall Business Association - Cyber Security & Awareness Conference.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
IT security Are you protected against hackers?. Why are we in danger?  The Internet is worldwide, publicly accessible  More and more companies and institutes.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
Malicious Attacks Angela Ku Adeline Li Jiyoung You Selena Yuen.
Computer viruses By: Shannon Simonian. What is a computer virus?  -Shares traits of a biological virus in people.  -Computer viruses pass from computer.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Computer Security 1 Keeping your computer safe. Computer Security 1 Computer Security 1 includes two lessons:  Lesson 1: An overview of computer security.
MOBILE MALWARE TOPIC #5 – INFORMATION ASSURANCE AND SECURITY Michael Fine 1.
Information about the computer By Sophia and Christina C.
Information Security Information Technology and Computing Services Information Technology and Computing Services
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Understanding security and safe computing. Be Web Wise. Bob Penn presents:
Protect Your Computer from Viruses and Other Threats! 1. Use antivirus software. 2. Run Windows updates. 3. Use a strong password. 4. Only install reputable.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Internet Safety Portage Department of Public Safety.
Protecting Yourself Online (Information Assurance)
Keeping Information Safe Task 4. Basic security measures Passwords Change password on regular basis Do not use names or words easily linked to yourself.
IT security Sherana Kousar 11a/ib1  A virus is a file written with the intention of doing harm, or for criminal activity  Example of viruses are: 
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Learning In A Techno World How Safe is Your Cyberspace?
Stay Safe & Secure Online. Outline Passwords Everyday Security Security Physical Security Protecting Personal Information.
1.1 System Performance Security Module 1 Version 5.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
© Hodder Gibson 2012 Staying safe online. © Hodder Gibson 2012 Dangers on the Internet There are a number of dangers on the Internet such as: viruses.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
Ms. Park.  Q&A: What are some Internet safety tips you already know?
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Computer Security! By Bailey Hoover. Opening: “Computer viruses are an urban legend.” -Peter Norton Actually: Virus: software reproduces itself; causes.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Malware & Phishing By: mackenzie olson. Internet fraudsters send out spam, pop-ups, appealing websites, and desirable downloads.
INTERNET: The Good, The Bad and The Ugly
Network Security for DEC staff. Anti-virus/spyware for home use At work, devices are built and maintained by ITSU staff Symantec is no longer licensed.
Consumer Protection Shop Safely and Guard Your Financial Information.
Internet Security and Your Computer Welcome to Boot Camp.
Tiffanie Donovan CSC /27/12. Societal Topics-Weeks 7 & 8 Internet Regulation Internet regulation has the operation of keeping people from viewing.
What is Spam? d min.
Cyber Security and Staying Safe Online Mark D. Riley College of Health Sciences and Professions.
Final Essex Training TY What’s New In TaxWise Gary Blauth Module NJ 2.3.
Internet Security. 2 Computers on the Internet are almost constantly bombarded with viruses, other malware and other threats.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Virus Assignment JESS D. How viruses affect people and businesses  What is a virus? A computer virus is a code or a program that is loaded onto your.
Onguardonline.gov By Austin Kellogg. Main ideas  Protect your personal information  Know who your dealing with  Use security software that updates.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Presented By: Jennifer Thayer, SPHR, SHRM-SCP.  Identify CyberCrime and Types  Identify Steps to Take to Prevent Identity Theft  Learn Tips and Tricks.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
The internet is a place of both useful and bad information. It has both good and bad side- and it’s all too easy for kids to stray into it. And no parents/guardian.
Virus Removal Support Services. H OW TO K EEP Y OUR C OMPUTER F REE F ROM V IRUS T HREAT ? Virus can attack your PC any time without any.
H OW TO TURN A M AC B OOK INTO A W IRELESS R OUTER ? n today’s technology driven world, we constantly need to be connected to the internet. We also want.
What it is and how to stop it.  What spam is.  Why it can be dangerous.  How to handle it.
Cybersecurity is our shared responsibility valpo.edu/it Facebook.com/ITatValpo Join the #CyberAware conversation:
Internet Safety.
How to stay safe using the internet and app’s?
Viruses, worms and trojans.
Cyber Security By: Pratik Gandhi.
Protect Your Computer Against Harmful Attacks!
Avast - Antivirus | Internet Security. Introduction Avast Antivirus is afamily of internet security application developed by Avast for windows,mac OS,
Information Technology Services Education and Awareness Team
Information Technology Services Education and Awareness Team
Introduction-Cyber Safety
Presentation transcript:

Staying Safe Online Technology Services Organization

General Security Run Anti-Virus/Anti-Malware Software Run Firewall Software Be Suspicious – Treat the Internet as if everyone’s out to get you – attachments (.exe,.pdf) Avoid using the same password everywhere

Social Networking

Twitter exploits – January 5: exploiting Direct Message feature – Last week: XSS exploit Facebook exploits – “Koobface” virus – Password stealing virus through Be suspicious! – The more popular a service, the more attractive it is to attackers

Wireless Networks (WIFI) Don’t join Unknown Open WIFI Network – Nothing comes for free When joining a Public Network (Starbucks, etc.), tell Windows it’s a Public Network, NOT Home or Work – Provides more security from others on the same network More info: blic/publicwireless.aspx

Bluetooth Use Non-discoverable Mode – Protects against “Cabir” worm Only Pair with Known Devices Change Default PIN More info: – Security/Pages/SecurityQA.aspx – orks/security/pages/protecting.aspx

Security Be Suspicious! Ask Questions!