Presentation is loading. Please wait.

Presentation is loading. Please wait.

Hikmat Leeds Kashmir Muslim Professionals Association.

Similar presentations


Presentation on theme: "Hikmat Leeds Kashmir Muslim Professionals Association."— Presentation transcript:

1 Hikmat Leeds Kashmir Muslim Professionals Association

2 Internet and Email Common Risks and Remedies by Abdul Karim 29 th February 2004 © Biztech Solutions, 2004 For Hikmat

3 Contents Some Risks Some Remedies “Best Practice” Any Questions?

4 Some Risks…  Quality of Information Is it genuine? Is it genuine? Hoax websites and emails aboundHoax websites and emails abound The “sender” of an email is not always the person it is coming from!The “sender” of an email is not always the person it is coming from! Beware of the “chain-letter” emailsBeware of the “chain-letter” emails Is the person you are chatting to really who they say they are?Is the person you are chatting to really who they say they are? Unsuitable Material Unsuitable Material Pornography, Racism, Other ExtremismsPornography, Racism, Other Extremisms Transient Content Transient Content Here today, gone tomorrowHere today, gone tomorrow

5 …Some Risks…  Annoyances Unsolicited junk email Unsolicited junk email Pop-up Adverts on Internet Pop-up Adverts on Internet Spyware (aka pestware and malware) Spyware (aka pestware and malware) Records your internet browsing habitsRecords your internet browsing habits Solicits pop-up advertsSolicits pop-up adverts Opens up your computer for hackingOpens up your computer for hacking Uses up your Internet bandwidthUses up your Internet bandwidth

6 …Some Risks…  Viruses Permanent damage to computer (BIOS corruption) Permanent damage to computer (BIOS corruption) Damage to computer operating system Damage to computer operating system Damage to your data, e.g. randomly changing figures in a spreadsheet Damage to your data, e.g. randomly changing figures in a spreadsheet Sending your personal files to others in the address book Sending your personal files to others in the address book Open up your PC for remote control by hackers Open up your PC for remote control by hackers Sending viruses to other people Sending viruses to other people

7 …Some Risks…  Financial Risks Auto diallers can dial premium rate numbers Auto diallers can dial premium rate numbers Theft of credit card/bank details (most banks will cover loss to promote online trade) Theft of credit card/bank details (most banks will cover loss to promote online trade) Ordering something on-line that never turns up Ordering something on-line that never turns up Repair cost of virus damaged PC Repair cost of virus damaged PC Becoming victim of a scam Becoming victim of a scam

8 …Some Risks  Legal and Other Risks Breach of employer’s/ISP acceptable use policy Breach of employer’s/ISP acceptable use policy Risk to privacy by email/internet monitoring Risk to privacy by email/internet monitoring Identity theft Identity theft Libellous emails Libellous emails Prosecution for viewing/distributing illegal content Prosecution for viewing/distributing illegal content

9 Some Remedies…  Spyware Detectors Designed to search and destroy spyware or adware, e.g. Ad-Aware Designed to search and destroy spyware or adware, e.g. Ad-Aware Will only work with known spyware programs Will only work with known spyware programs Will need to use the latest program to detect the latest products Will need to use the latest program to detect the latest products

10 …Some Remedies…  Anti-virus software Used to detect and remove viruses Used to detect and remove viruses Needs to be updated regularly to be effective Needs to be updated regularly to be effective Can delete infected system files which will interfere with the operation of the computer Can delete infected system files which will interfere with the operation of the computer Slows down the system Slows down the system

11 …Some Remedies…  Internet Content/Email Filtering Commercial software is available to provide different levels of web/email filtering, e.g. NetNanny, CyberPatrol, etc Commercial software is available to provide different levels of web/email filtering, e.g. NetNanny, CyberPatrol, etc Can use IE’s built-in Content Control with password to create a list of approved sites (almost foolproof, except for hijacked websites) Can use IE’s built-in Content Control with password to create a list of approved sites (almost foolproof, except for hijacked websites) Nothing is 100% foolproof Nothing is 100% foolproof

12 …Some Remedies…  Firewall Stops your PC being hacked from the Internet by blocking unsolicited incoming traffic Stops your PC being hacked from the Internet by blocking unsolicited incoming traffic Slows down PC performance Slows down PC performance Can interfere with some communications programs Can interfere with some communications programs

13 …Some Remedies  Pop-up Blockers/Stoppers/Killers This type of software will stop most pop-up advertising windows appearing during internet browsing This type of software will stop most pop-up advertising windows appearing during internet browsing Can interfere with some websites using this feature but easy to over-ride Can interfere with some websites using this feature but easy to over-ride

14 Best Practice…  Abide by your employer’s/ISP’s Acceptable Use Policy for Internet and Email  Always make regular backups of your work on the PC  Remember, unless your email is encrypted then it will be readable at every stop from start to finish  Beware of hoax virus warning emails that ask you to take actions such as delete files from your PC or forward the email to everyone in your address book.  Regularly scan your PC for Adware/Pestware etc using latest version of software such as AdAware

15 …Best Practice…  Keep your anti-virus program up to date – it’s only as effective as the last update  Ensure your Windows operating system is up to date by downloading directly from Microsoft.  Use Firewall software to keep out uninvited guests (hackers can break into your PC and use it if it is not properly secured)  Use internet content control or other suitable filtering software to protect children from accessing inappropriate content  Create a secondary email address (e.g. with Yahoo) for registering on websites and subscribing to mailing lists

16 …Best Practice…  Use complex passwords, e.g. combination of lowercase and uppercase letters plus numbers  Always log out or lock your PC if leaving it unattended in an open area  If you do any on-line shopping then consider getting a separate credit card with a small credit limit  Regularly purge out temporary internet and history files from your browser  Never open any unsolicited/unexpected email attachments – even if they appear to be from a trusted source. Turn off Preview Pane in Outlook/Outlook Express to prevent activating viruses inadvertently

17 …Best Practice  Never provide your personal or financial details on a web page that is not secure (look for the small padlock security symbol)  Never respond to junk email even if it gives the option to de-register from the mailing list  Never apply Windows patches or updates sent through email  Never send confidential/sensitive information via email, e.g. credit card details  Never say you haven’t been warned!

18 Remember Internet’s 4 Us  Unreliable  Unpredictable  Unregulated  Unaccountable

19 Special Offer  All Hikmat members entitled to one free on-site Annual Service to clean up their PC, courtesy of Biztech Solutions  Alternatively, you can request a free CDROM with free versions of Pop-up Stopper, AVG Anti-virus, ZoneAlarm Firewall, and Adaware

20 Any Questions?


Download ppt "Hikmat Leeds Kashmir Muslim Professionals Association."

Similar presentations


Ads by Google