Download presentation
Presentation is loading. Please wait.
Published byCecil Shields Modified over 9 years ago
1
Protecting Your Information Valuables in “Cyberspace” Charlie Russell Rappahannock Rotary Club May 30, 2012
2
Today’s Headlines Cellphone Spamming can be curtailed... Stolen Laptop Exposes Boston Hospital Patient Data
3
What’s the Most Important Information you hold? Banking Data? (account numbers) Mortgage information? (balance) Healthcare and medical data? (prescriptions) Other Financial information? (401k, loans, insurance) How to Determine Value What information do you use each day? What data could you least do without? Could it be replicated from another source? What’s an Information Asset
4
People make money from other’s people’s data (Credit, healthcare, financial) The Web is worldwide and wild – it was not designed to be secure Some terms you should understand: “Phishing” – form of social engineering Emails with attachments -.exe files “Cookies” – ‘welcome back, Mr. Jones’ “Spam” – uneeded emails “Virus” – malware or spurious code Criminal emails (e.g. Nigerian newsletters) Who can you trust? (Hint: it’s you) Social Media Use Linked In Facebook Instant Messaging (Google Talk, etc.) The “CyberSpace” Problem
5
Use Personal firewalls: Inside your provider’s environment (e.g. Verizon, Comcast, etc.) Within your home network Use Antivirus, antispam, anti ‘adware’ tools Wireless protection at home and ‘on the go’ Password Protection Use natural, easy to recall and use, but unique Use versions (e.g. 1.3.5) Employ some reasoning behind your selection Some Protection Methods
6
Computer runs slow, seems to take hours to load simple software or email messages Increase in numbers of unknown messages from unfamiliar accounts Your ‘junk’ mail file seems to fill up rapidly Friends say they’ve received mail from your email account that you didn’t originate A password that worked last week no longer works Requests for account updates arrive from previously unnamed sources Problem Symptoms
7
Don’ts: - Host critical data on computers used by students or ‘gamers’ in the family - Visit unknown or unsecure websites (gambling, pornography) Do: - Make backup copies each month of your complete data files (memory is cheap) - Store a copy of Operating System startup files (MS Windows, Vista, MS Version 7 or XP) on another media (USB or ‘flash’ drives) then lock it up - Protect your wireless: use only WPA2 encryption or better - Employ encryption for key critical files that you transfer to others (e.g. PGP or MS) Some “Cyber” Do’s & Don’ts
8
Otherwise You’ll Be Fine!
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.