Download presentation
Presentation is loading. Please wait.
Published byPamela Peters Modified over 8 years ago
1
How to Keep Your Personal and Financial Information Safe Online Cheryl Helget Mark Griffin
2
How does identity theft occur? Oh please, let me count the ways! 1) Keystroke logging software or hardware 2) Phishing scams via email 3) Unsecure web sites 4) Social engineering 5) Dumpster diving 6) Random flash drives 7) Other
3
So, how can I protect myself?
4
Use good passwords and pins, and protect them! 1) Make password at least 7 characters long! 2) Use random letters, numbers and symbols (both upper & lower case) 3) DO NOT USE birthdays, addresses, anniversaries, or other personal information 4) DO NOT USE correct answers to challenge questions that can be answered through combing genealogy sites. For example, mother’s maiden name, father’s middle name, paternal grandfather’s first name can be easily learned through ancestry.com. 5) DO NOT SHARE passwords or pin numbers! 6) DO NOT WRITE DOWN passwords or pin numbers 7) Change your password at least every 6 months, and don’t reuse passwords 8) Develop a security mindset
5
Password Examples: 1234, 6666, sparky, password, 121162, fhsu: BAD PASSWORDS B3tt3r1!, pr3TTyg00d, &00d3n0u&h: BETTER PASSWORDS IKJ0n Hi12ESr98gbtmal, 987weDF6743$khF98!: BEST PASSWORDS Time Magazine’s worst passwords for 2012: http://techland.time.com/2012/10/25/these-are-the-25-worst-passwords- of-2012/ http://techland.time.com/2012/10/25/these-are-the-25-worst-passwords- of-2012/ 1. password 2. 123456 3. 12345678 4.abc123 5. qwerty 6. monkey 7. letmein 8. dragon 9. 111111 10. baseball 11. iloveyou 12. trustno1 13. 1234567 14. sunshine 15. master 16. 123123 17. welcome 18. shadow 19. ashley 20. football 21. jesus 22. michael 23. ninja 24. mustang 25. password1
6
What’s a Phishing scam? And, what do I do about them? Phishing is the act of attempting to acquire information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication. Attackers try to get you (the fish) to hand over your information or money. They hook you with an email message, IM, or some other form of communication (the bait) that looks as if it came from a legitimate source such as a bank or an online shopping site.passwords electronic communication The primary thing that you want to do with phishing emails, instant messages, or texts, is DELETE THEM! Do not respond to a phishing scam, or click on any links in the message. Do Not provide ANY personal information. If you do anything with the message, simply report it to your email administrator.
7
How will I know if it’s a scam, or if it might be a legitimate email? Phishing scams/emails tend to have one or more of these characteristics Website links sound legitimate, but are not the real organizations link (eg. http://www.commerce.bank.org, instead of http://www.commercebank.comhttp://www.commerce.bank.org http://www.commercebank.com Website link says one thing, but the actual click through goes somewhere else! Message will say it is from a local person, department, or entity, but reply email goes to a totally different email address Messages will often be poorly worded or have misspelled words Subject of message often makes it sound like it is an important notice If you want to investigate, consider googling what might be the major content of the message to see if it has been flagged as a phishing attempt on any of the anti-phishing/anti-malware sites. Bottom line, if you aren’t comfortable with the content or the subject, delete the message.
8
Phishing email examples To: “Mark Griffin" From: Juanita Limas Date: 01/05/2012 11:03AM Subject: From System Administrator Dear Webmail User, Your mailbox has exceeded the allocated storage limit as set by the administrator, you may not be able to send or receive new mail until you upgrade your allocated quota. To upgrade your quota, Please clickhere Thank you for your anticipated cooperation. System Administrator For Webmail Support Team.
9
Phishing email examples cont. To: mgriffin@fhsu.edu From: Fort Hays State University [mailto:junglaube@carthage.edu] Sent: Saturday, June 09, 2012 7:59 AM Subject: Emergency Verification Dear Fort Hays State University Email subscriber, We hereby announce to you that your email account has exceeded its storage limit. You will be unable to send and receive mails and your email account will be deleted from our server. To avoid this problem, you are advised to verify your email account by clicking on the link below. http://verveaverifychecking.tk/ccc/webmail-verify/ Thank you. The Fort Hays State University IT Management Team.
10
Social Media Security Tips Watch for fake emails that appear to come from Facebook If it seems unusual for a friend to write on your wall and post a link, that friend may have gotten phished Do Not enter your password through a link Do not use the same password for Facebook that you use elsewhere on the web Don’t share your password with anyone (Repeat!) Do not use your cellphone number to verify the results of a facebook game or survey without reading terms and conditions
11
What other stuff should I do, or be aware of online? Keep your computer operating system, anti-virus, and firewall software up to date. Free 3 rd party firewalls: ZoneAlarm or Comodo Firewall Free PC World’s top security picks of 2012: G Data InternetSecurity 2012 Norton Internet Security 2012 Bitdefender Internet Security 2012 Detected and removed the most baddies but slow Do Not access on-line accounts using public computers When shopping online, whenever possible use a secure online payment service (eg. Paypal or WorldPay) Use credit cards instead of debit cards! Credit cards are insured against fraudulent merchants, debit cards are not. Do not keep personal or financial information (including passwords) in a plain text file on your computer. Encrypt the documents (KeePass is a nice password storage utility and it is free) When submitting information online, make sure there is a “lock” icon on the browser’s status bar. Also make sure website begins https (the “s” means a secure, encrypted (SSL) connection.
12
The lock sign shows that there is an encrypted connection between your browser and the website you are visiting, allowing for private information to be transmitted without the problems of eavesdropping, data tampering, or message forgery. It is possible for every piece of data to be seen by others unless it is encrypted with the https communication rule that is signified by the lock sign.
13
What other stuff should I do, or be aware of online? Continued Do not give out personal or financial information to vendors over the phone, through the mail or email, or anywhere online, unless you are ABSOLUTELY CERTAIN that your contact is legitimate. If you have a home wireless network, be sure to password protect it. When you are setting up the wireless router, it will ask you whether you want to use WEP, WPA, or WPA-2 encryption. Select WPA-2 for the best security. Also change your wireless router’s adminstrator’s default password. Keep a record of your transactions, and check your accounts online periodically to watch for suspicious activity. When traveling, do not keep all of your credit cards in one place, such as a wallet in your pocket. Split up your resources. If traveling with someone else you trust, perhaps have them carry at least one of your cards, or some of your cash. Keep a list of all your credit card numbers in a safe place (encrypted, if stored electronically), along with expiration dates and customer service phone numbers. Review your credit report periodically. You can obtain a free credit report annually at http://annualcreditreport.com Shred any paper documents that contain personal or financial information, do not just throw this information in the trash
14
Twitter Dooz’n’Donts Don’t be too specific Say it, don’t spray it Call the police, don’t tweet about it Don’t tweet about changing passwords, or anything else that might compromise your security Never use your password on suspicious 3 rd party sites Do choose a strong password (Repeat!) Do use direct messages when appropriate, not everything is meant to said in the wild Consider having a private account separate from work
15
Removing your name from lists: Mail – www.dmachoice.orgwww.dmachoice.org Phone – www.donotcall.govwww.donotcall.gov Stop preapproved credit card offers: www.optoutprescreen.com or 1-888-5-OPTOUT www.optoutprescreen.com To hold your mail: www.usps.com
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.