SlideShare une entreprise Scribd logo
1  sur  46
Practical Tips You Can Use to Protect Your Identity, Your
Computer and Your Network from Attack

www.CTDayton.com
Home PC Security Part I






Your kids use your computer
You travel with your computer and use WiFi
Personal & financial information are on your
computer
Business files are on your computer
Family pictures and videos are on your
computer

What would happen if your computer
was gone tomorrow?
What is Cyber-Security?

What is Cyber-Crime?

Protecting your computer,
your network, and your
information from at-home
and online threats

Any crime conducted via
the Internet to cause
damage and/or steal
personal information


Why do hackers hack?
 Lot’s of money to be stolen
 To collect information!
 Information used to directly

steal money, and identity theft


Why attack the home computer?
 Home computer = information!
 Least secure in general
 Unwary users


Hardware
 Unsecured Wi-Fi (think Panera)
 No Router
 Router with default password



Software







No anti-virus/anti-spyware
No Firewall
Old virus definitions
Out of date Windows O.S.

Personal Behavior






Failure to use strong passwords
Clicking on unsafe links or emails
Downloading questionable files
Leaving computer logged on
Leaving your computer accessible
Virus Type

Impact

Solution

Cash Cost

Minor Virus

Lose some data
2- 4 hours

Use installed
anti-virus

$75-100

Major Virus

Loss of docs
5-10 hours

Use service to $100-$130
remove

Catastrophic Loss of ALL data
Virus
& photos
15+ hours

Use service to $150-175
wipe & reload
entire system

What is YOUR time worth? $25, $50 $75?
Home PC Security Part II
Conceal

Router

Deny

1
Anti-Malware

Filter

2
3

Detect
Decide

4
.

Web Filter

Firewall

5 6
.

SPAM Filter

Passwords

.

You!

Backup
YOUR INFO!
Closes and locks “open
doors”
• Keeps intruders and
unknowns out
• Allows the recognized
& trusted in
• Not perfect, Cybercriminals exploit trusted
doors
• May block desired sites
•


Access Router via your web
browser



Enter your Routers IP Address



Enter the default username &
password



Find administration settings



Select Change/Reset Password

Tip: Default Usernames/Passwords for most routers can be found at
this web site: http://portforward.com/default_username_password


Rule #1
 Always require a password to access your computer



Why?

 Prevents unauthorized access
 Provides a first line of defense
 Prevents easy access from a

network

TIP: Set up the automatic lockout for when you
leave your computer that requires a password. A
good timeout value is 5 to 10 minutes.




ALWAYS Password protect
your computer
Lock you cell phone
Use strong passwords –
 12 characters, letters, numbers and symbols
 Use a “coded” phrase you can remember





Do not store passwords electronically
Do not write them down
Use password vault plugin such as “Lastpass”


Encryption makes files and data unreadable to
anyone that does not have the encryption key



You can encrypt:
 Entire Computer
 A Disk Volume
 Files & Folders



Protects against theft and unauthorized access






SPAM Filters
Keeps out email from
unknown senders
Catches majority of
SPAM
Catches non-SPAM
Allows known email
SPAM Filters aren’t
perfect!







WEB Filters
Prohibits bad websites
Pre-examines website
content and warns you
Catches good websites
Allows known
websites
Web filters aren’t
perfect!
Anti-Virus & AntiMalware Programs
• Scans email,
attachments files, &
downloads
• Detects threats and
Removes them
• Not perfect, does not
detect everything,
cannot remove all
threats
•
Home PC Security Part III

You are the last line of defense
After all the layers of protection,
you are the decision maker
Educate yourself, Google it!
When in doubt DENY !!!
http://www.youtube.com/watch?v=xxDm_sKhIBM
Home PC Security Part III
Type

Source

Purpose

Protection

Virus

Email
Ads
Links
Warnings
Updates

Malicious attack
Disable your computer
Destroy your data

Anti-virus software
Firewall software
Firewall hardware
Data back-up

Phishing

Email
Website

Steal Identity or money

Surfing behavior

Adware

Ads

Virus delivery, steal
information

Good practices

Steal personal
information

Anti-spyware & firewall
software

Spyware

Tip: Have both Anti-Virus AND Anti-Spyware installed on your computer..
But DO NOT install two anti-virus programs.


These scams will come in the form of:
 Email







(phishing)
Website
(pharming)
Phone Call
(vishing)
Text Message
(smishing)
A Combination of These


Similar variations on a theme



Identity Theft is their goal

 May direct you to call a number to “unlock” or “reactivate” your
account by entering personal info
 May direct you to a website to enter personal info

Tip: If you don’t see a “padlock” symbol or “https” on your
browser address bar, the site is not secure for personal or private
information. Don’t enter any!


Requests personal information?



Contains grammatical errors or
misspellings?



How do they address you?



Is it too good to be true?



Have you checked the link?
Tip:

You can “Mouse Over” a link and check a website
Does the website URL look legitimate?

Tip: Legitimate companies will NEVER ask you for personal or confidential
information via email, a website, telephone, or text message.
 Beware of search engine results
 Do not download unknown or
free software
 “Unclick”/DECLINE any
OPTIONAL Downloads or
Toolbars
 Use Sucuri Site Check
http://sitecheck.sucuri.net/

Tip: When installing programs pay attention to
installation options. They make you think you’re
declining, but you’re approving!
Tip: Don’t use your browser to store passwords, not secure.




Do NOT friend, link, or message people you don’t know
Do not allow untrusted applications to access your account
Do not click on posted videos
NEVER POST

• You or your family’s full birthdates or
places of birth
• Your mother’s maiden name
• The names of young family members
• Your relationship status
NEVER POST
 Your vacation plans
 Your home address
 Your current location
 That your home alone
 Pictures of kids/grandkids
tagged with their names
 A description of your home
Home PC Security Part IV
http://www.youtube.com/watch?v=LGtq_el4p_8






Boots very slowly or hangs up
Responds slowly, crashes
Programs won’t run or crash
Popups, website redirection
Broken antivirus or security

Tip: You can “right click” on the task bar and select the “Task
Manager” to see the memory and CPU usage that is currently
taking place on your computer. Should not be constantly 100%.
Tip:
A foolproof way to keep a
virus from stealing your
personal info - disconnect
the network cable or turn
off the Wi-Fi. THEN take
action.


Anti-virus can’t remove it



Computer is not unusable



Your files are missing



You must manually edit Windows



Your not absolutely sure your actions
won’t make matters worse!
Home PC Security Part V


External Hard Drive Backup
 Windows Backup
 Time Machine (Mac)



Cloud Backup
 Carbonite
 CrashPlan



File Sync Service
(not really a backup)
 Dropbox
 Google Drive

REGULAR BACKUP
JUST DO IT.
Overwrites Current File

Keeps Current File

Keeps Current File &
Adds File from Backup



Backup saves/restores just YOUR data files
Backup also creates a separate system image
for restoring programs & Windows
 Overwrites EVERYTHING when restored
 Can only be used if the system repair disk was

created


Prevention begins and ends with you



Never use pirate websites for apps, music,
movies or games (e.g. www.piratebay.com)
 Loaded with adware/spyware/viruses
 Opening these will infect your computer
 Much of these sites content is illegal
R eceived Before?
I nside Links?
S ensible Message?
K now sender?
This email link
delivers a Trojan
Virus right to your
computer
S ource of file?
T ype & size of file?
O thers recommend?
P repared to scan?

This is a fake anti-virus program. Once loaded it
claims your computer is infected and directs you to a
website to buy the program via credit card.


Only login or send personal information to
websites you know are encrypted



A website is encrypted when you see a “lock”
symbol or https://



Beware of websites using encryption only on the
login page


Don't stay signed in to accounts
 When you are done, log out

Don’t do sensitive business on public WiFi
 Don’t use the same password, vary it
e.g. H1T0w3r! / P@$$w0rd!! / !P@inT3r!
 Keep your browser(s) and plug-ins up-to-date
 Keep Windows up to date

1.
2.
3.
4.
5.

Regularly Backup of your files and data
Use a Router, it hides your computer/network
Make sure the Windows Firewall is enabled
Use strong passwords on your Router and Computer
Use anti-virus/anti-spyware to detect/remove
malware

And, practice safe surfing: if you aren’t sure, don’t click!
Tip: By protecting your computer, hackers and Internet
criminals “move on” to easier targets. Stay vigilant!
Hardware or
Software

Cost of
Required

Suggested Source

Router

$50

Various – Netgear, Linksys, Belcan, et. Al.

Cloud drive backup
or
External Hard Drive

$60/year
or
$75 once

Carbonite - www.carbonite.com
or
Windows Backup Software

Anti-Virus

$40/year

AVG Antivirus – www.avg.com

Firewall

$0

Windows Firewall

Anti-Spyware

$0

Malwarebytes – www.malwarebytes.org

Anti-spam

$0

Built in to Apple Mail & Outlook, need setup

Password vault

$0

Great, but dangerous - Lastpass

Total cost

$150 -$165

Do it yourself cost
(Complete packages, installation, and training
www.CTDayton.com

(937) 458-2000
www.CTDayton.com

cbrust@comptroub.com

Contenu connexe

Tendances

Notes to The Ten Commandments of Online Security and Privacy
Notes to The Ten Commandments of Online Security and PrivacyNotes to The Ten Commandments of Online Security and Privacy
Notes to The Ten Commandments of Online Security and PrivacyJonathan Bacon
 
How to Protect Your PC from Malware, Ransomware, Virus
How to Protect Your PC from Malware, Ransomware, VirusHow to Protect Your PC from Malware, Ransomware, Virus
How to Protect Your PC from Malware, Ransomware, VirusHabFg
 
Computer Security Guide to Pc Security
Computer Security Guide to Pc SecurityComputer Security Guide to Pc Security
Computer Security Guide to Pc SecurityMallTake
 
Online safety and security
Online safety and securityOnline safety and security
Online safety and securityjovellconde1
 
How to Delete plus network.com
How to Delete plus network.comHow to Delete plus network.com
How to Delete plus network.commariagoel7
 
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATSJazzyNF
 
Internet Threats
Internet ThreatsInternet Threats
Internet ThreatsLeelet1121
 
The most dangerous places on the web
The most dangerous places on the webThe most dangerous places on the web
The most dangerous places on the webJoel May
 
7 Things People Do To Endanger Their Networks
7 Things People Do To Endanger Their Networks7 Things People Do To Endanger Their Networks
7 Things People Do To Endanger Their Networksjaymemcree
 
Trojan and Virus,Trojan horse,virus,how to make and defend the virus
Trojan and Virus,Trojan horse,virus,how to make and defend the virusTrojan and Virus,Trojan horse,virus,how to make and defend the virus
Trojan and Virus,Trojan horse,virus,how to make and defend the virusABHAY PATHAK
 
Securing your WordPress website - New Port Richey WP Meetup
Securing your WordPress website - New Port Richey WP MeetupSecuring your WordPress website - New Port Richey WP Meetup
Securing your WordPress website - New Port Richey WP MeetupOyster Bay Marauders LLC
 
Our Digital World - A look at E-safety issues for teenagers
Our Digital World - A look at E-safety issues for teenagersOur Digital World - A look at E-safety issues for teenagers
Our Digital World - A look at E-safety issues for teenagersBrian Sharland
 
Red teaming the CCDC
Red teaming the CCDCRed teaming the CCDC
Red teaming the CCDCscriptjunkie
 
The Infosec Revival
The Infosec RevivalThe Infosec Revival
The Infosec Revivalscriptjunkie
 
Password hacking
Password hackingPassword hacking
Password hackingAbhay pal
 
10 ways to_increase_your_computer_security
10 ways to_increase_your_computer_security10 ways to_increase_your_computer_security
10 ways to_increase_your_computer_securityHybrid IT Solutions
 

Tendances (19)

Notes to The Ten Commandments of Online Security and Privacy
Notes to The Ten Commandments of Online Security and PrivacyNotes to The Ten Commandments of Online Security and Privacy
Notes to The Ten Commandments of Online Security and Privacy
 
Guide to pc_security
Guide to pc_securityGuide to pc_security
Guide to pc_security
 
How to Protect Your PC from Malware, Ransomware, Virus
How to Protect Your PC from Malware, Ransomware, VirusHow to Protect Your PC from Malware, Ransomware, Virus
How to Protect Your PC from Malware, Ransomware, Virus
 
Computer Security Guide to Pc Security
Computer Security Guide to Pc SecurityComputer Security Guide to Pc Security
Computer Security Guide to Pc Security
 
Cybersecurity Awareness
Cybersecurity AwarenessCybersecurity Awareness
Cybersecurity Awareness
 
Online safety and security
Online safety and securityOnline safety and security
Online safety and security
 
How to Delete plus network.com
How to Delete plus network.comHow to Delete plus network.com
How to Delete plus network.com
 
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
 
Internet Threats
Internet ThreatsInternet Threats
Internet Threats
 
The most dangerous places on the web
The most dangerous places on the webThe most dangerous places on the web
The most dangerous places on the web
 
7 Things People Do To Endanger Their Networks
7 Things People Do To Endanger Their Networks7 Things People Do To Endanger Their Networks
7 Things People Do To Endanger Their Networks
 
Trojan and Virus,Trojan horse,virus,how to make and defend the virus
Trojan and Virus,Trojan horse,virus,how to make and defend the virusTrojan and Virus,Trojan horse,virus,how to make and defend the virus
Trojan and Virus,Trojan horse,virus,how to make and defend the virus
 
Cyber security
Cyber securityCyber security
Cyber security
 
Securing your WordPress website - New Port Richey WP Meetup
Securing your WordPress website - New Port Richey WP MeetupSecuring your WordPress website - New Port Richey WP Meetup
Securing your WordPress website - New Port Richey WP Meetup
 
Our Digital World - A look at E-safety issues for teenagers
Our Digital World - A look at E-safety issues for teenagersOur Digital World - A look at E-safety issues for teenagers
Our Digital World - A look at E-safety issues for teenagers
 
Red teaming the CCDC
Red teaming the CCDCRed teaming the CCDC
Red teaming the CCDC
 
The Infosec Revival
The Infosec RevivalThe Infosec Revival
The Infosec Revival
 
Password hacking
Password hackingPassword hacking
Password hacking
 
10 ways to_increase_your_computer_security
10 ways to_increase_your_computer_security10 ways to_increase_your_computer_security
10 ways to_increase_your_computer_security
 

En vedette

Feasibility study of setting up a computer store chapter 1-5
Feasibility study of setting up a computer store chapter 1-5Feasibility study of setting up a computer store chapter 1-5
Feasibility study of setting up a computer store chapter 1-5Christofer De Los Reyes
 
20944696 ac-computer-shop-feasibility-studies
20944696 ac-computer-shop-feasibility-studies20944696 ac-computer-shop-feasibility-studies
20944696 ac-computer-shop-feasibility-studiesEvanette Grace Babista
 
Sample thesis
Sample thesisSample thesis
Sample thesiskmmanuel
 
Computer on Business
Computer on BusinessComputer on Business
Computer on BusinessMac Mustera
 
Introduction To The Internet Cafe Business Philippines
Introduction To The Internet Cafe Business PhilippinesIntroduction To The Internet Cafe Business Philippines
Introduction To The Internet Cafe Business PhilippinesGener Luis Morada
 
Computer Generation Presentation
Computer Generation PresentationComputer Generation Presentation
Computer Generation PresentationJayesh Modi
 
Sample Business Plan Presentation
Sample Business Plan PresentationSample Business Plan Presentation
Sample Business Plan PresentationEnigma
 
Sample Business Proposal Presentation
Sample Business Proposal PresentationSample Business Proposal Presentation
Sample Business Proposal PresentationDaryll Cabagay
 
Business Plan Powerpoint 1
Business Plan Powerpoint 1Business Plan Powerpoint 1
Business Plan Powerpoint 1haleydawn
 

En vedette (12)

Feasibility study of setting up a computer store chapter 1-5
Feasibility study of setting up a computer store chapter 1-5Feasibility study of setting up a computer store chapter 1-5
Feasibility study of setting up a computer store chapter 1-5
 
20944696 ac-computer-shop-feasibility-studies
20944696 ac-computer-shop-feasibility-studies20944696 ac-computer-shop-feasibility-studies
20944696 ac-computer-shop-feasibility-studies
 
Computer Business Solutions Corporate Presentation 2013 - Lesotho
Computer Business Solutions Corporate Presentation 2013 - LesothoComputer Business Solutions Corporate Presentation 2013 - Lesotho
Computer Business Solutions Corporate Presentation 2013 - Lesotho
 
Internet cafe feasibility study
Internet cafe feasibility studyInternet cafe feasibility study
Internet cafe feasibility study
 
Sample thesis
Sample thesisSample thesis
Sample thesis
 
Computer on Business
Computer on BusinessComputer on Business
Computer on Business
 
Introduction To The Internet Cafe Business Philippines
Introduction To The Internet Cafe Business PhilippinesIntroduction To The Internet Cafe Business Philippines
Introduction To The Internet Cafe Business Philippines
 
Computer Generation Presentation
Computer Generation PresentationComputer Generation Presentation
Computer Generation Presentation
 
Computer presentation
Computer presentationComputer presentation
Computer presentation
 
Sample Business Plan Presentation
Sample Business Plan PresentationSample Business Plan Presentation
Sample Business Plan Presentation
 
Sample Business Proposal Presentation
Sample Business Proposal PresentationSample Business Proposal Presentation
Sample Business Proposal Presentation
 
Business Plan Powerpoint 1
Business Plan Powerpoint 1Business Plan Powerpoint 1
Business Plan Powerpoint 1
 

Similaire à Home and Business Computer Security 2014

Cyber security for small businesses
Cyber security for small businessesCyber security for small businesses
Cyber security for small businessesB2BPlanner Ltd.
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02amiinaaa
 
7 Small Business Security Tips
7 Small Business Security Tips7 Small Business Security Tips
7 Small Business Security TipsInfusionsoft
 
Protecting Yourself Online
Protecting Yourself OnlineProtecting Yourself Online
Protecting Yourself OnlineGary Wagnon
 
A Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the InternetA Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the Internet- Mark - Fullbright
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pestspeterhitch
 
Keeping Your Children, your information and your equiptment safe
Keeping Your Children, your information and your equiptment safeKeeping Your Children, your information and your equiptment safe
Keeping Your Children, your information and your equiptment safeComputer Explorers
 
CYBERSPACE SAFETY TIPS FOR SMEs.ppt
CYBERSPACE SAFETY TIPS FOR SMEs.pptCYBERSPACE SAFETY TIPS FOR SMEs.ppt
CYBERSPACE SAFETY TIPS FOR SMEs.pptJOHN BABATUNDE LEE
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101mateenzero
 
UserSecurityAwarenessUniversityTemplate.ppt
UserSecurityAwarenessUniversityTemplate.pptUserSecurityAwarenessUniversityTemplate.ppt
UserSecurityAwarenessUniversityTemplate.pptDiveshK4
 
End User Security Awareness - Information Security
End User Security Awareness - Information SecurityEnd User Security Awareness - Information Security
End User Security Awareness - Information SecurityWorldTrade3
 
WISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurityWISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurityWISE KIDS
 
Security Awareness 101
Security Awareness 101Security Awareness 101
Security Awareness 101HaroldCo
 
CYBER SECURITY AWARENESS.pptx
CYBER SECURITY AWARENESS.pptxCYBER SECURITY AWARENESS.pptx
CYBER SECURITY AWARENESS.pptxTapan Khilar
 
General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber SecurityDominic Rajesh
 

Similaire à Home and Business Computer Security 2014 (20)

Cyber security for small businesses
Cyber security for small businessesCyber security for small businesses
Cyber security for small businesses
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
 
7 Small Business Security Tips
7 Small Business Security Tips7 Small Business Security Tips
7 Small Business Security Tips
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Protecting Yourself Online
Protecting Yourself OnlineProtecting Yourself Online
Protecting Yourself Online
 
A Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the InternetA Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the Internet
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pests
 
Keeping Your Children, your information and your equiptment safe
Keeping Your Children, your information and your equiptment safeKeeping Your Children, your information and your equiptment safe
Keeping Your Children, your information and your equiptment safe
 
CYBERSPACE SAFETY TIPS FOR SMEs.ppt
CYBERSPACE SAFETY TIPS FOR SMEs.pptCYBERSPACE SAFETY TIPS FOR SMEs.ppt
CYBERSPACE SAFETY TIPS FOR SMEs.ppt
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
User security awareness
User security awarenessUser security awareness
User security awareness
 
UserSecurityAwarenessUniversityTemplate.ppt
UserSecurityAwarenessUniversityTemplate.pptUserSecurityAwarenessUniversityTemplate.ppt
UserSecurityAwarenessUniversityTemplate.ppt
 
End User Security Awareness - Information Security
End User Security Awareness - Information SecurityEnd User Security Awareness - Information Security
End User Security Awareness - Information Security
 
WISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurityWISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurity
 
Security Awareness 101
Security Awareness 101Security Awareness 101
Security Awareness 101
 
CYBER SECURITY AWARENESS.pptx
CYBER SECURITY AWARENESS.pptxCYBER SECURITY AWARENESS.pptx
CYBER SECURITY AWARENESS.pptx
 
Presentation for class
Presentation for classPresentation for class
Presentation for class
 
General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber Security
 

Plus de B2BPlanner Ltd.

Major Gifts Fundraising Training 2020
Major Gifts Fundraising Training 2020 Major Gifts Fundraising Training 2020
Major Gifts Fundraising Training 2020 B2BPlanner Ltd.
 
Google Marketing Tools 2018
Google Marketing Tools 2018Google Marketing Tools 2018
Google Marketing Tools 2018B2BPlanner Ltd.
 
Non-profit Marketing campaign template
Non-profit Marketing campaign templateNon-profit Marketing campaign template
Non-profit Marketing campaign templateB2BPlanner Ltd.
 
Basic Marketing for Nonprofit Organizations
Basic Marketing for Nonprofit OrganizationsBasic Marketing for Nonprofit Organizations
Basic Marketing for Nonprofit OrganizationsB2BPlanner Ltd.
 
Marketing For Nonprofit Organizations
Marketing For Nonprofit OrganizationsMarketing For Nonprofit Organizations
Marketing For Nonprofit OrganizationsB2BPlanner Ltd.
 
Web basedmarketing Dayton SCORE 12 4 2013
Web basedmarketing Dayton SCORE 12 4 2013Web basedmarketing Dayton SCORE 12 4 2013
Web basedmarketing Dayton SCORE 12 4 2013B2BPlanner Ltd.
 
Web Based Marketing 2014
Web Based Marketing 2014Web Based Marketing 2014
Web Based Marketing 2014B2BPlanner Ltd.
 
Low Temperature Plasma Coating of Silica Powder and Polymer Membranes
Low Temperature Plasma Coating of Silica Powder and Polymer MembranesLow Temperature Plasma Coating of Silica Powder and Polymer Membranes
Low Temperature Plasma Coating of Silica Powder and Polymer MembranesB2BPlanner Ltd.
 
Helmstetter art 01 03 2012
Helmstetter art 01 03 2012Helmstetter art 01 03 2012
Helmstetter art 01 03 2012B2BPlanner Ltd.
 
Helmstetter art resume gm 2 23 2012
Helmstetter art resume  gm 2 23 2012Helmstetter art resume  gm 2 23 2012
Helmstetter art resume gm 2 23 2012B2BPlanner Ltd.
 
Simple Small Business Strategic Planning Tool
Simple Small Business Strategic Planning ToolSimple Small Business Strategic Planning Tool
Simple Small Business Strategic Planning ToolB2BPlanner Ltd.
 

Plus de B2BPlanner Ltd. (12)

Major Gifts Fundraising Training 2020
Major Gifts Fundraising Training 2020 Major Gifts Fundraising Training 2020
Major Gifts Fundraising Training 2020
 
Google Marketing Tools 2018
Google Marketing Tools 2018Google Marketing Tools 2018
Google Marketing Tools 2018
 
Non-profit Marketing campaign template
Non-profit Marketing campaign templateNon-profit Marketing campaign template
Non-profit Marketing campaign template
 
Basic Marketing for Nonprofit Organizations
Basic Marketing for Nonprofit OrganizationsBasic Marketing for Nonprofit Organizations
Basic Marketing for Nonprofit Organizations
 
Marketing For Nonprofit Organizations
Marketing For Nonprofit OrganizationsMarketing For Nonprofit Organizations
Marketing For Nonprofit Organizations
 
Web basedmarketing Dayton SCORE 12 4 2013
Web basedmarketing Dayton SCORE 12 4 2013Web basedmarketing Dayton SCORE 12 4 2013
Web basedmarketing Dayton SCORE 12 4 2013
 
Web Based Marketing 2014
Web Based Marketing 2014Web Based Marketing 2014
Web Based Marketing 2014
 
Low Temperature Plasma Coating of Silica Powder and Polymer Membranes
Low Temperature Plasma Coating of Silica Powder and Polymer MembranesLow Temperature Plasma Coating of Silica Powder and Polymer Membranes
Low Temperature Plasma Coating of Silica Powder and Polymer Membranes
 
Web Based Marketing
Web Based MarketingWeb Based Marketing
Web Based Marketing
 
Helmstetter art 01 03 2012
Helmstetter art 01 03 2012Helmstetter art 01 03 2012
Helmstetter art 01 03 2012
 
Helmstetter art resume gm 2 23 2012
Helmstetter art resume  gm 2 23 2012Helmstetter art resume  gm 2 23 2012
Helmstetter art resume gm 2 23 2012
 
Simple Small Business Strategic Planning Tool
Simple Small Business Strategic Planning ToolSimple Small Business Strategic Planning Tool
Simple Small Business Strategic Planning Tool
 

Dernier

MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusZilliz
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...apidays
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 

Dernier (20)

MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 

Home and Business Computer Security 2014

  • 1. Practical Tips You Can Use to Protect Your Identity, Your Computer and Your Network from Attack www.CTDayton.com
  • 3.      Your kids use your computer You travel with your computer and use WiFi Personal & financial information are on your computer Business files are on your computer Family pictures and videos are on your computer What would happen if your computer was gone tomorrow?
  • 4. What is Cyber-Security? What is Cyber-Crime? Protecting your computer, your network, and your information from at-home and online threats Any crime conducted via the Internet to cause damage and/or steal personal information
  • 5.  Why do hackers hack?  Lot’s of money to be stolen  To collect information!  Information used to directly steal money, and identity theft  Why attack the home computer?  Home computer = information!  Least secure in general  Unwary users
  • 6.  Hardware  Unsecured Wi-Fi (think Panera)  No Router  Router with default password  Software      No anti-virus/anti-spyware No Firewall Old virus definitions Out of date Windows O.S. Personal Behavior      Failure to use strong passwords Clicking on unsafe links or emails Downloading questionable files Leaving computer logged on Leaving your computer accessible
  • 7. Virus Type Impact Solution Cash Cost Minor Virus Lose some data 2- 4 hours Use installed anti-virus $75-100 Major Virus Loss of docs 5-10 hours Use service to $100-$130 remove Catastrophic Loss of ALL data Virus & photos 15+ hours Use service to $150-175 wipe & reload entire system What is YOUR time worth? $25, $50 $75?
  • 10.
  • 11. Closes and locks “open doors” • Keeps intruders and unknowns out • Allows the recognized & trusted in • Not perfect, Cybercriminals exploit trusted doors • May block desired sites •
  • 12.  Access Router via your web browser  Enter your Routers IP Address  Enter the default username & password  Find administration settings  Select Change/Reset Password Tip: Default Usernames/Passwords for most routers can be found at this web site: http://portforward.com/default_username_password
  • 13.  Rule #1  Always require a password to access your computer  Why?  Prevents unauthorized access  Provides a first line of defense  Prevents easy access from a network TIP: Set up the automatic lockout for when you leave your computer that requires a password. A good timeout value is 5 to 10 minutes.
  • 14.    ALWAYS Password protect your computer Lock you cell phone Use strong passwords –  12 characters, letters, numbers and symbols  Use a “coded” phrase you can remember    Do not store passwords electronically Do not write them down Use password vault plugin such as “Lastpass”
  • 15.  Encryption makes files and data unreadable to anyone that does not have the encryption key  You can encrypt:  Entire Computer  A Disk Volume  Files & Folders  Protects against theft and unauthorized access
  • 16.      SPAM Filters Keeps out email from unknown senders Catches majority of SPAM Catches non-SPAM Allows known email SPAM Filters aren’t perfect!      WEB Filters Prohibits bad websites Pre-examines website content and warns you Catches good websites Allows known websites Web filters aren’t perfect!
  • 17. Anti-Virus & AntiMalware Programs • Scans email, attachments files, & downloads • Detects threats and Removes them • Not perfect, does not detect everything, cannot remove all threats •
  • 18. Home PC Security Part III You are the last line of defense After all the layers of protection, you are the decision maker Educate yourself, Google it! When in doubt DENY !!!
  • 20. Home PC Security Part III
  • 21. Type Source Purpose Protection Virus Email Ads Links Warnings Updates Malicious attack Disable your computer Destroy your data Anti-virus software Firewall software Firewall hardware Data back-up Phishing Email Website Steal Identity or money Surfing behavior Adware Ads Virus delivery, steal information Good practices Steal personal information Anti-spyware & firewall software Spyware Tip: Have both Anti-Virus AND Anti-Spyware installed on your computer.. But DO NOT install two anti-virus programs.
  • 22.  These scams will come in the form of:  Email     (phishing) Website (pharming) Phone Call (vishing) Text Message (smishing) A Combination of These
  • 23.  Similar variations on a theme  Identity Theft is their goal  May direct you to call a number to “unlock” or “reactivate” your account by entering personal info  May direct you to a website to enter personal info Tip: If you don’t see a “padlock” symbol or “https” on your browser address bar, the site is not secure for personal or private information. Don’t enter any!
  • 24.  Requests personal information?  Contains grammatical errors or misspellings?  How do they address you?  Is it too good to be true?  Have you checked the link? Tip: You can “Mouse Over” a link and check a website Does the website URL look legitimate? Tip: Legitimate companies will NEVER ask you for personal or confidential information via email, a website, telephone, or text message.
  • 25.  Beware of search engine results  Do not download unknown or free software  “Unclick”/DECLINE any OPTIONAL Downloads or Toolbars  Use Sucuri Site Check http://sitecheck.sucuri.net/ Tip: When installing programs pay attention to installation options. They make you think you’re declining, but you’re approving!
  • 26. Tip: Don’t use your browser to store passwords, not secure.
  • 27.    Do NOT friend, link, or message people you don’t know Do not allow untrusted applications to access your account Do not click on posted videos NEVER POST • You or your family’s full birthdates or places of birth • Your mother’s maiden name • The names of young family members • Your relationship status
  • 28. NEVER POST  Your vacation plans  Your home address  Your current location  That your home alone  Pictures of kids/grandkids tagged with their names  A description of your home
  • 29. Home PC Security Part IV
  • 31.      Boots very slowly or hangs up Responds slowly, crashes Programs won’t run or crash Popups, website redirection Broken antivirus or security Tip: You can “right click” on the task bar and select the “Task Manager” to see the memory and CPU usage that is currently taking place on your computer. Should not be constantly 100%.
  • 32. Tip: A foolproof way to keep a virus from stealing your personal info - disconnect the network cable or turn off the Wi-Fi. THEN take action.
  • 33.  Anti-virus can’t remove it  Computer is not unusable  Your files are missing  You must manually edit Windows  Your not absolutely sure your actions won’t make matters worse!
  • 35.  External Hard Drive Backup  Windows Backup  Time Machine (Mac)  Cloud Backup  Carbonite  CrashPlan  File Sync Service (not really a backup)  Dropbox  Google Drive REGULAR BACKUP JUST DO IT.
  • 36.
  • 37. Overwrites Current File Keeps Current File Keeps Current File & Adds File from Backup
  • 38.   Backup saves/restores just YOUR data files Backup also creates a separate system image for restoring programs & Windows  Overwrites EVERYTHING when restored  Can only be used if the system repair disk was created
  • 39.  Prevention begins and ends with you  Never use pirate websites for apps, music, movies or games (e.g. www.piratebay.com)  Loaded with adware/spyware/viruses  Opening these will infect your computer  Much of these sites content is illegal
  • 40. R eceived Before? I nside Links? S ensible Message? K now sender? This email link delivers a Trojan Virus right to your computer
  • 41. S ource of file? T ype & size of file? O thers recommend? P repared to scan? This is a fake anti-virus program. Once loaded it claims your computer is infected and directs you to a website to buy the program via credit card.
  • 42.  Only login or send personal information to websites you know are encrypted  A website is encrypted when you see a “lock” symbol or https://  Beware of websites using encryption only on the login page
  • 43.  Don't stay signed in to accounts  When you are done, log out Don’t do sensitive business on public WiFi  Don’t use the same password, vary it e.g. H1T0w3r! / P@$$w0rd!! / !P@inT3r!  Keep your browser(s) and plug-ins up-to-date  Keep Windows up to date 
  • 44. 1. 2. 3. 4. 5. Regularly Backup of your files and data Use a Router, it hides your computer/network Make sure the Windows Firewall is enabled Use strong passwords on your Router and Computer Use anti-virus/anti-spyware to detect/remove malware And, practice safe surfing: if you aren’t sure, don’t click! Tip: By protecting your computer, hackers and Internet criminals “move on” to easier targets. Stay vigilant!
  • 45. Hardware or Software Cost of Required Suggested Source Router $50 Various – Netgear, Linksys, Belcan, et. Al. Cloud drive backup or External Hard Drive $60/year or $75 once Carbonite - www.carbonite.com or Windows Backup Software Anti-Virus $40/year AVG Antivirus – www.avg.com Firewall $0 Windows Firewall Anti-Spyware $0 Malwarebytes – www.malwarebytes.org Anti-spam $0 Built in to Apple Mail & Outlook, need setup Password vault $0 Great, but dangerous - Lastpass Total cost $150 -$165 Do it yourself cost (Complete packages, installation, and training

Notes de l'éditeur

  1. In-Home Threats (internal - Physical)Computer TheftUnauthorized accessTamperingOnline Threats (external – Internet)HackersMalwareScams
  2. Types of information stolen:Credit card infoOnline bank account informationBank statementsConfidential information like SSN, addresses, phone #sStock trading data, brokerage statementsTax return informationEmail addresses for SPAM and SCAMs
  3. Router is the First Line of Defense“Hides” your network and computers from being directly accessible on the InternetRouters Can Provide Firewall Protection
  4. Prevents unauthorized access when your not aroundProvides a first line of defense in case of computer theftPrevent hackers from gaining easy access if they get inside your network
  5. What AV do you use?The big boys concentrate on advertising (Norton, McAfee)Not as efficient as others
  6. This helps detect/protect you from more kinds of malware than just Anti-Virus
  7. Sometimes a scam artist will first contact you “benignly” as bait to lure you into a conversation. They then follow that up with the scam after gaining your trust.Other times, the scam artist will contact you directly asking for information for a seemingly valid reason.
  8. Cons to get your personal information
  9. High or zero network activityHigh CPU and/or memory usage