Presentation is loading. Please wait.

Presentation is loading. Please wait.

Practice Safe Computing

Similar presentations


Presentation on theme: "Practice Safe Computing"— Presentation transcript:

1 Practice Safe Computing
Malware Prevention How To Stay Safe From Phishing Password Security and Multifactor Authentication

2 Protect Yourself From Malware Mayhem
Part 1: Protect Yourself From Malware Mayhem

3 After this section, you’ll be able to:
Goals After this section, you’ll be able to: Define malware Understand what malware can do to your computer Understand how malware infects computers Identify signs of malware infection on a computer Better protect your computer from malware attacks

4 What is Malware? Malware is the abbreviated term for “malicious software” This malicious software is specifically designed to gain access or damage a computer without the knowledge of the owner. There are many different types of malware, including: Ransomware Worms Trojans Keylogger

5 How Does Malware Get Onto My Computer?
attachments, even ones that seem to be from people you know “Hijacked” or malicious Web pages Flash drives or other removable media Software downloads from illegal, pirated software sites Browser pop-up windows that urge you to click on links Just like this one!

6 Ransomware: Types of Malware
May 12, 2017: “WannaCry” ransomware infected 230,000 computers in 150 countries in a single day.

7 Keylogger in The News Source: Security Week (1/16/2017)

8 How Do I Know If My Computer Has Been Infected?
Your computer suddenly starts to behave strangely, requires frequent restarts, or begins showing pop-up ads that aren't related to the website you're visiting Your web browser takes you to unfamiliar sites that you didn't choose to navigate to yourself Applications appear on your machine that you did not install yourself Your computer seems unusually sluggish and unresponsive

9 How Do I Remove Malware From My Computer?
If your computer is owned by Teachers College: Stop by the Service Desk (Grace Dodge 70, near the cafe) or for assistance Crowdstrike antivirus -- which helps protect your computer from potentially dangerous programs, downloads and websites-- is automatically installed by CIS on any TC-owned computer.

10 How Do I Protect My Computer From Malware?
Keep all of your programs up to date! Backup your files! The best way to do this is use a cloud service such as Google Drive or Dropbox Make sure that you have antivirus/anti-malware software installed on your computer!

11 How To Stay Safe From Phishing
Part 2: Don’t Take The Bait: How To Stay Safe From Phishing

12 After this section, you’ll be able to:
Goals After this section, you’ll be able to: Define phishing Identify signs of a potential phishing Know where to report phishing s to and how to report them Understand the importance of password security

13 What is Phishing? Phishing is a form of fraud in which the attacker tries to learn personal or financial information using social engineering Two types: (1) Credential theft, (2) Download of malware Messages claim to be from legitimate sources Criminals are getting really good at creating legit-looking messages to trick people into performing actions or divulging confidential information

14 What Are The Risks? Identity Theft Malware infections
Loss of personal data Compromised institutional information Putting friends and family at risk Financial loss

15 What’s Your Email Worth?

16 Signs of A Phishing Email
Threats/Ultimatum Incorrect Web addresses No signature or contact information Too-good-to-be-true offer Spelling, punctuation, or grammatical errors Attention-grabbing titles

17 What Does A Phishing Email Look Like?

18 Let’s Dissect This Phishing Email

19 Real Phishing Email Targeting TC

20 Double-Check That Login Screen
Not a legit Web address Web address for Google login SHOULD be: accounts.google.com

21 What Can You Do? Avoid opening suspicious attachments and following links sent in s. Be mindful of s that just don’t sound right. When in doubt about the authenticity of an , contact the sender via PHONE (Do not the sender!) Forward any suspicious to the Service Desk at You can also call the Service Desk at ext. 3300

22 What CIS Is Doing To Fight Phishing
On report of phishing attempts: We use our security tools to quickly determine how many people received the (Agari) We notify all recipients of the to alert them to not open the message or click on any links We block the phisher’s return addresses We block access from the TC network to phishing websites (OpenDNS) We work to tune our rules that flag phishing as spam

23 What If I Clicked On The Link/Attachment?
If taken to a login page, close the page! Disconnect your device from the Internet Backup your files Call the Service Desk (if this is your home computer, run your antivirus software) Send the “headers” of the suspicious to

24 How to Download Email Headers
Log in to your TC Gmail account. Open the message you'd like to view headers for. Click the down arrow next to Reply, at the top of the message pane. Select Show Original. 5. A summary of the headers will appear in a new window. To get the full headers, click Download Original. 6. the Service Desk at and attach this file.

25 Password Safety & Multifactor Authentication
Part 3: Password Safety & Multifactor Authentication

26 Password Protection NEVER give out your account passwords! Teachers College will NEVER ask for your password! Do not share passwords via or leave reminders on your desk Use different passwords for your accounts Use LastPass password vault to keep your passwords secure Keep your password vault locked down with Duo multifactor authentication

27 Password Vaults & Multi-Factor Authentication
Password Vaults (LastPass): Lets you centralize your passwords and credentials into one secure repository Cut down on the need to remember multiple passwords Allow you to create stronger, more unique passwords/passphrases Multi-Factor Authentication (Duo): Stronger than a password alone Combines something you know (password) with something you have (cell phone)

28 Here’s How to Get LastPass & Duo
Provide us with your TC CIS will provision your account After you receive an enrollment from LastPass, follow the directions provided on the CIS website to set up LastPass and Duo: tc.columbia.edu/computing We’ll also you a reminder of these instructions at the same time the enrollment goes out.

29 Let’s Put It All Together
Treat attachments and links in messages with caution When in doubt, contact the sender via phone to confirm that they sent the message Forward suspicious s to the Service Desk If you’re concerned about something you’ve clicked in an , reach out to the Service Desk for help Use LastPass and Duo to protect your passwords and accounts


Download ppt "Practice Safe Computing"

Similar presentations


Ads by Google