Presentation is loading. Please wait.

Presentation is loading. Please wait.

GET CONTROL! Avoid The Headache… Five Simple Steps to a Safer Computer – NUIT Tech Talk.

Similar presentations


Presentation on theme: "GET CONTROL! Avoid The Headache… Five Simple Steps to a Safer Computer – NUIT Tech Talk."— Presentation transcript:

1 GET CONTROL! Avoid The Headache… Five Simple Steps to a Safer Computer – NUIT Tech Talk

2 Agenda Get Control Web site 5 steps to secure your computer: –Virus protection –Software updates –Password security –Spyware detection –Firewall protection Other Security concerns & resources

3 Get Control on the Web http://www.it.northwestern.edu/getcontrol OR http://www.it.northwestern.edu/ and click on Computer & Network Security

4 Viruses: Disguised programming code that causes unexpected or undesirable events. Often self-replicate, spread to other users Can be destructive, alter & destroy files Can execute immediately/on specific date Many exploit user’s address books Step 1: Virus protection

5 How do you get infected? File sharing software Weak password “Worm” via Unpatched OS File sent via e-mail or instant messenger

6 Step 1: Virus protection FREE Symantec AntiVirus software Mac & PC-compatible To download, visit: www.it.northwestern.edu  Computer & Network Security  “Download Symantec/Norton AntiVirus software”

7 Step 1: Virus protection Keep virus definitions updated Run a scan once a week Don't open unexpected attachments Always scan files you receive from others Turn your Macro security to High in MS Office applications

8 Step 1: Virus protection A word on junk e-mail & viruses Subject lines & social engineering E-mail viruses more common now Both may appear to come from known and trusted e-mail addresses Poor grammar, strange attachments

9 Viruses: Think you have one? Check the Get Control Web site Consult your UNITS rep/local tech www.myths.com Check virus hoax Web sites www.myths.com Call 847-491-HELP (4357)

10 Windows windowsupdate.microsoft.comWindows Update windowsupdate.microsoft.com office.microsoft.com/productupdates/Keep Microsoft Office updated office.microsoft.com/productupdates/ Baseline Security Analyzer (ask your local tech support) www.microsoft.com/technet/security/ tools/mbsahome.mspx Step 2: Software updates

11 Mac OS X: www.apple.com/software/Security Updates are available www.apple.com/software/ Software updates: System Preferences  Software Update (set to run automatically) www.microsoft.com/mac/downloads.aspxMS Office security updates: www.microsoft.com/mac/downloads.aspx

12 Step 2: Software updates Don’t forget to update other apps, especially those that connect to the Internet: Eudora & other e-mail software Firefox & other Web browsers Spybot – Search & Destroy & other anti-spyware software Security alerts and patches and version updates can be found on the software company’s Web site

13 Step 3: Password security Strong system password/phrase –As long as possible (8+ characters) –Use symbols: %^*.,! –E.g., “w.ld!*c,at5” (NOT “wildcat”) It only takes a few seconds to crack a short, alphanumeric password Don’t leave Administrator account passwords blank Change passwords routinely

14 Step 4: Spyware detection What is spyware? –Any type of technology that collects and transmits information about a person or their browsing, often for advertising purposes

15 Malware maliciously attacks your computer or is used for illegal purposes. Includes so-called key loggers that record everything from passwords to credit card numbers. Adware collects information about your browsing habits, geographic location, and possibly the contents of your computer. Adware is usually legal. The two major “flavors” of spyware Step 4: Spyware detection

16 Installed without your knowledge Bundled with software you install Shareware/freeware programs File sharing programs May not work if spyware removed Spyware-esque tracking cookies are picked up from Web sites; often unsavory ones! Spyware can be very difficult to remove

17 Step 4: Spyware detection Suspicious behavior: Machine running very slowly Lots of unfamiliar programs in Windows Task Manager (Ctrl + Alt + Del) Unusual Web browser activity Contact local tech support if you see anything strange Don’t try to manually remove any components yourself

18 Step 4: Spyware detection Spyware removal Spybot - Search & Destroy:spybot.safer-networking.de Free for University & home use Has updates just like antivirus program Scans computer for known spyware Backs up files it removes

19 Spybot – Search & Destroy

20 Step 5: Firewall protection Protects your PC from unauthorized access by an individual (hacker) or a program Enables you to specify which network ports (“doors”) are open Mac OS X & Windows XP* have built-in (native) firewalls –* Built-in to Windows XP Professional and XP Home SP2

21 Step 5: Firewall protection Once it’s up, keep it up! XP firewall prompts you if a new program wants access www.microsoft.com/security/protect/ports.asp You can also configure manually: www.microsoft.com/security/protect/ports.asp

22 Step 5: Firewall protection Manual configuration of Mac OS X firewall

23 Other Security Concerns “Phishing” scams Identity theft Junk e-mail Illegal file sharing and copyright violation Online harassment See the Get Control Web sitewww.it.northwestern.edu/getcontrol/

24 Virus resources www.symantec.com/avcenter/ www.symantec.com/avcenter/ (Symantec Security Response) www.it.northwestern.edu/security/ www.it.northwestern.edu/security/ (Computer Virus Protection at Northwestern) www.f-secure.com www.f-secure.com (F-Secure Corporation) www.virusbtn.com www.virusbtn.com (Virus Bulletin) www.cert.org/ www.cert.org/ (Computer Emergency Response Team at Carnegie Mellon University)

25 Privacy & Security  NUIT Computer Usage Policies & Guidelines  www.it.northwestern.edu/policies/  Edit Your Directory Information  https://snap.it.northwestern.edu/  Security and Privacy for Home users  www.microsoft.com/athome/security/default.mspx

26 Questions? Don’t forget to visit the Get Control Web Site!www.it.northwestern.edu/getcontrol

27 Next Tech Talk Safe Keeping An introduction to backing up your information Backup, archiving, and more! Date: TBA (see our Web site for details) Same locations, Noon – 1 p.m. www.it.northwestern.edu Please register online: www.it.northwestern.edu


Download ppt "GET CONTROL! Avoid The Headache… Five Simple Steps to a Safer Computer – NUIT Tech Talk."

Similar presentations


Ads by Google