Presentation is loading. Please wait.

Presentation is loading. Please wait.

Name Job Title Library Name

Similar presentations


Presentation on theme: "Name Job Title Library Name"— Presentation transcript:

1 Name Job Title Library Name
Cybersecurity Basics Name Job Title Library Name

2 Agenda What’s a Virus? Antivirus Software Web Browsers Passwords
Safe Internet Use Buying online Updating Backup

3 Searching through ads What’s a Virus?

4 A malicious set of code meant to harm you and/or your computer
What is a Virus? A malicious set of code meant to harm you and/or your computer How can my computer become infected? s from infected computers Downloads Bad websites Clicking dangerous popups source: for list of virus types USE DEFINITION OF VIRUS AND EXAMPLES – HD (Changed this part up a bit. Viruses are on the next two pages PS)

5 A Virus Can… Record your keyboard strokes (Spyware)
Steal private information such as passwords, credit card numbers, etc. (Spyware) Hold your files hostage (Ransomware)

6 A Virus Can… Use your processing power and internet for nefarious purposes (Worm) Masquerade as a normal program which then installs a virus (Trojan Horse) Cause your computer to malfunction, crash and become non-responsive (Malware)

7 Searching through ads Antivirus Software

8 Free Antivirus Software
Windows Defender Avira Consumer Reports pick 2016! AVG Windows Defender is built into Windows 8 and up Panda Security

9 Subscription Antivirus Software
Kaspersky: Top rated by most reviews! Bitdefender Plus Norton USE ON HANDOUT McAfee

10 Secondary Defense Software
Malwarebytes Spybot USE ON HANDOUT Microsoft Malicious Software Removal Tool

11 Firewalls What is a Firewall?
A program that monitors and blocks bad traffic attempting to hack your computer. Do I have already have a Firewall? Windows Firewall Built into antivirus software Use on Handout

12 Searching through ads Web Browsers

13 Safest Web Browsers Google Chrome Fire Fox
Windows Edge & Safari (mac only) Opera Based off of security tests and reviews USE ON HD – ICONS – SEE COMPUTER MAINTENANCE BASICS

14 Browser Extensions for Privacy
Adblock Plus Disconnect Ghostery *sells your anonymized data to ad companies

15 Searching through ads Passwords

16 Passwords Create a Strong Password Use a minimum of 8 characters
Use a long string of words Add numbers & symbols (IE: Use Upper and Lowercase letters 4Exampl3: Thi$wou!dbeGood Dogs&cAtsrocK! 2Fast2cAtch!? USE ON HD

17 Passwords Best Password Practices
Never use the same password for multiple accounts Save your passwords on paper rather than on the computer Avoid letting your browser save passwords

18 Searching through ads Safe Internet Use

19 Safe Internet Use Question to consider before proceeding
Is this a well know site? Have I used this site safely before? Does this site make me feel uncomfortable? Is this site asking for things I don’t want to share? Do I have a reason to trust this site?

20 Safe Internet Use Only download from official company websites
Do not click on popups Only give out private information to a trusted site Avoid clicking on strange links or advertisements If it sounds too good to be true it probably is

21 Browser Blocking Tools

22 Safe Internet Use

23 Safe Use Only click on links or download files from trusted s Beware of hacked messages from “friends” Delete s asking for personal information Google text of sketchy s to check for scams

24 Safe Email Use https://www.consumer.ftc.gov/scam-alerts
Get s alerts and check on the latest Scams

25 2-Step Verification Increases your security by texting you a code to access your account Greatly increases security of any account You know if your account was hacked right away

26 Safe Email Use Marking an Email as Spam Select the email
USE ON HD Select the Mark it as spam

27 Safe Use Spam Filters

28 Searching through ads Purchasing Online

29 Purchasing Online Use an electronic payment system for higher security. It is safer to keep your credit card information in one place. PayPal Apple Pay Google Wallet

30 Safe Internet Use

31 2-Step Authentication Use credit cards with two step authentication for highest security Credit cards with 2 step authentication Chase Discover Citibank Bank of America Charles Schwab

32 Searching through ads Updating

33 Updating Avoid using unsupported Operating system (example: Windows XP, Windows Vista, Mac OS X Leopard) Upgrade to the newest operating system available for your device when possible Update your apps or programs when notified Set up automatic updates

34 Searching through ads Privacy

35 For the best privacy use a VPN
Privacy VPNs For the best privacy use a VPN What is a VPN? Stands for Virtual Private Network Encrypts your internet Data Private web browsing, downloading, and uploading Almost impossible to be tracked

36 Advanced VPNs Opera developer browser has a free VPN built in
Total VPN (Free) Cyber Ghost VPN (Free) Tunnel Bear (Free) Total VPN paid version $4.99 per month Private Internet Access VPN $6.95 per month Nord VPN $8 per month

37 Private search engines
DuckDuckgo.com Ixquick.com These search engines do not… Track your browsing info Save your searches No ad targeting No bias search results

38 Private Web Browser Tor browser www.torproject.org Prevents tracking
Creates an anonymous browsing experience

39 Questions? THANKS FOR COMING!


Download ppt "Name Job Title Library Name"

Similar presentations


Ads by Google