SlideShare a Scribd company logo
1 of 28
Security Basics: Keep your Computers Safe   October 28, 2010 Audio is only available by calling this number: Conference Call: 866-740-1260; Access Code: 6339392 Sponsored by
Using ReadyTalk ,[object Object],[object Object],[object Object],[object Object],[object Object]
You are being recorded… ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Security Basics: Keep your Computers Safe Presenter: Marian Merritt Sponsored by
We are working toward a time when every nonprofit and social benefit organization on the planet has the technology resources and knowledge they need to operate at their full potential.
Home page screen grab
Today’s Speakers Kami Griffiths   TechSoup Global Marian Merritt Symantec  Assisting with chat questions:  Kevin Lo & Gary Lamontagne, TechSoup Global
Agenda ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Poll #1:  Does your organization have an Acceptable Use Policy? ,[object Object],[object Object]
Poll #2:  Do you provide internet safety training for your employees and volunteers?  ,[object Object],[object Object]
Threat Landscape ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Types of Malware ,[object Object],[object Object],[object Object],[object Object],[object Object]
How Does This Happen? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Why The Rapid Growth in Malware? ,[object Object],[object Object],[object Object],[object Object],[object Object]
Zeus Trojan - $70 million stolen from small business, non-profits
Huge growth in malware and new physical threats
How Do We Protect Ourselves? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Acceptable Use Policy Tips ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
When To Suspect Malware Infection ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What To Do If Infected? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Social Network Risks ,[object Object],[object Object],[object Object],[object Object]
Resources ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Wrap Up ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Questions? Submit your questions using the chat box.
Continue the Discussion… ,[object Object],[object Object]
Upcoming Webinars ,[object Object],[object Object],[object Object],[object Object]
Thank you to our Webinar Sponsor! ReadyTalk offers dedicated product demos for  TechSoup organizations 4 times per week. For more information:   pages.readytalk.com/techsoup.html
Thank you!   Please complete the post event survey! Kami Griffiths, kami@techsoup.org, 415-633-9392

More Related Content

What's hot

Cyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena MishraCyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena MishraDevsena Mishra
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media SecurityHem Pokhrel
 
Promote Education Internet Security
Promote Education Internet SecurityPromote Education Internet Security
Promote Education Internet SecurityZoaib Mirza
 
Online safety and security
Online safety and securityOnline safety and security
Online safety and securityjovellconde1
 
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesOnline Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesMark Jhon Oxillo
 
Social Networking Security Issues
Social Networking Security IssuesSocial Networking Security Issues
Social Networking Security IssuesMangesh Gunjal
 
Presentation on cyber security
Presentation on cyber securityPresentation on cyber security
Presentation on cyber security9784
 
Securing Your Small Business Network
Securing Your Small Business NetworkSecuring Your Small Business Network
Securing Your Small Business NetworkAnindita Ghatak
 
Computer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & PrivacyComputer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & PrivacySamudin Kassan
 
Empowerment Technology Lesson 2
Empowerment Technology Lesson 2Empowerment Technology Lesson 2
Empowerment Technology Lesson 2alicelagajino
 
The need for effective information security awareness practices.
The need for effective information security awareness practices.The need for effective information security awareness practices.
The need for effective information security awareness practices.CAS
 
Social media and Security risks
Social media and Security risksSocial media and Security risks
Social media and Security risksParakum Pathirana
 
Giarritano concept paper 4
Giarritano concept paper 4Giarritano concept paper 4
Giarritano concept paper 4leahg118
 
Threats and Security Tips of Computer System
Threats and Security Tips of Computer SystemThreats and Security Tips of Computer System
Threats and Security Tips of Computer SystemFaruk_Hossen
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measuresDnyaneshwar Beedkar
 
Compusecuraphobia – The Fear of HOPING Your Computer is Secure - Course Techn...
Compusecuraphobia – The Fear of HOPING Your Computer is Secure - Course Techn...Compusecuraphobia – The Fear of HOPING Your Computer is Secure - Course Techn...
Compusecuraphobia – The Fear of HOPING Your Computer is Secure - Course Techn...Cengage Learning
 

What's hot (20)

Cyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena MishraCyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena Mishra
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media Security
 
Data breach
Data breachData breach
Data breach
 
SOCIAL NETWORK SECURITY
SOCIAL NETWORK SECURITYSOCIAL NETWORK SECURITY
SOCIAL NETWORK SECURITY
 
Promote Education Internet Security
Promote Education Internet SecurityPromote Education Internet Security
Promote Education Internet Security
 
Online safety and security
Online safety and securityOnline safety and security
Online safety and security
 
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesOnline Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
 
Social Networking Security Issues
Social Networking Security IssuesSocial Networking Security Issues
Social Networking Security Issues
 
Safe Computing
Safe ComputingSafe Computing
Safe Computing
 
Presentation on cyber security
Presentation on cyber securityPresentation on cyber security
Presentation on cyber security
 
Securing Your Small Business Network
Securing Your Small Business NetworkSecuring Your Small Business Network
Securing Your Small Business Network
 
Computer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & PrivacyComputer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & Privacy
 
Empowerment Technology Lesson 2
Empowerment Technology Lesson 2Empowerment Technology Lesson 2
Empowerment Technology Lesson 2
 
The need for effective information security awareness practices.
The need for effective information security awareness practices.The need for effective information security awareness practices.
The need for effective information security awareness practices.
 
Social media and Security risks
Social media and Security risksSocial media and Security risks
Social media and Security risks
 
Giarritano concept paper 4
Giarritano concept paper 4Giarritano concept paper 4
Giarritano concept paper 4
 
Virus
VirusVirus
Virus
 
Threats and Security Tips of Computer System
Threats and Security Tips of Computer SystemThreats and Security Tips of Computer System
Threats and Security Tips of Computer System
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measures
 
Compusecuraphobia – The Fear of HOPING Your Computer is Secure - Course Techn...
Compusecuraphobia – The Fear of HOPING Your Computer is Secure - Course Techn...Compusecuraphobia – The Fear of HOPING Your Computer is Secure - Course Techn...
Compusecuraphobia – The Fear of HOPING Your Computer is Secure - Course Techn...
 

Viewers also liked

Open Source Library Webinar
Open Source Library WebinarOpen Source Library Webinar
Open Source Library WebinarTechSoup
 
How To Tell Your Digital Story: TechSoup Digital Storytelling event
How To Tell Your Digital Story: TechSoup Digital Storytelling eventHow To Tell Your Digital Story: TechSoup Digital Storytelling event
How To Tell Your Digital Story: TechSoup Digital Storytelling eventTechSoup
 
Putting the Web to Work
Putting the Web to WorkPutting the Web to Work
Putting the Web to WorkTechSoup
 
Donor Management Solutions Webinar
Donor Management Solutions WebinarDonor Management Solutions Webinar
Donor Management Solutions WebinarTechSoup
 
Microsoft Licensing and Benefits
Microsoft Licensing and BenefitsMicrosoft Licensing and Benefits
Microsoft Licensing and BenefitsTechSoup
 
Cloud Computing Webinar
Cloud Computing WebinarCloud Computing Webinar
Cloud Computing WebinarTechSoup
 
OCTribe Meetup presentation by Charles Baker of Meetup.com
OCTribe Meetup presentation by Charles Baker of Meetup.comOCTribe Meetup presentation by Charles Baker of Meetup.com
OCTribe Meetup presentation by Charles Baker of Meetup.comTechSoup
 
Civi CRM Webinar
Civi CRM WebinarCivi CRM Webinar
Civi CRM WebinarTechSoup
 
Presentation winning grants
Presentation winning grantsPresentation winning grants
Presentation winning grantsTechSoup
 
11NTC Virtual Teams
11NTC Virtual Teams11NTC Virtual Teams
11NTC Virtual TeamsTechSoup
 
TSDigs 2011 Metrics & Learning Report
TSDigs 2011 Metrics & Learning ReportTSDigs 2011 Metrics & Learning Report
TSDigs 2011 Metrics & Learning ReportTechSoup
 
Expanding Internationally Through Partnerships: Practical Lessons For 21st Ce...
Expanding Internationally Through Partnerships: Practical Lessons For 21st Ce...Expanding Internationally Through Partnerships: Practical Lessons For 21st Ce...
Expanding Internationally Through Partnerships: Practical Lessons For 21st Ce...TechSoup
 
File Maker Webinar
File Maker WebinarFile Maker Webinar
File Maker WebinarTechSoup
 
Social Media Decision Making
Social Media Decision MakingSocial Media Decision Making
Social Media Decision MakingTechSoup
 
Quick Books Webinar
Quick Books WebinarQuick Books Webinar
Quick Books WebinarTechSoup
 
Tools for Digital Storytelling
Tools for Digital StorytellingTools for Digital Storytelling
Tools for Digital StorytellingTechSoup
 
Encouraging Community Collaboration
Encouraging Community CollaborationEncouraging Community Collaboration
Encouraging Community CollaborationTechSoup
 

Viewers also liked (17)

Open Source Library Webinar
Open Source Library WebinarOpen Source Library Webinar
Open Source Library Webinar
 
How To Tell Your Digital Story: TechSoup Digital Storytelling event
How To Tell Your Digital Story: TechSoup Digital Storytelling eventHow To Tell Your Digital Story: TechSoup Digital Storytelling event
How To Tell Your Digital Story: TechSoup Digital Storytelling event
 
Putting the Web to Work
Putting the Web to WorkPutting the Web to Work
Putting the Web to Work
 
Donor Management Solutions Webinar
Donor Management Solutions WebinarDonor Management Solutions Webinar
Donor Management Solutions Webinar
 
Microsoft Licensing and Benefits
Microsoft Licensing and BenefitsMicrosoft Licensing and Benefits
Microsoft Licensing and Benefits
 
Cloud Computing Webinar
Cloud Computing WebinarCloud Computing Webinar
Cloud Computing Webinar
 
OCTribe Meetup presentation by Charles Baker of Meetup.com
OCTribe Meetup presentation by Charles Baker of Meetup.comOCTribe Meetup presentation by Charles Baker of Meetup.com
OCTribe Meetup presentation by Charles Baker of Meetup.com
 
Civi CRM Webinar
Civi CRM WebinarCivi CRM Webinar
Civi CRM Webinar
 
Presentation winning grants
Presentation winning grantsPresentation winning grants
Presentation winning grants
 
11NTC Virtual Teams
11NTC Virtual Teams11NTC Virtual Teams
11NTC Virtual Teams
 
TSDigs 2011 Metrics & Learning Report
TSDigs 2011 Metrics & Learning ReportTSDigs 2011 Metrics & Learning Report
TSDigs 2011 Metrics & Learning Report
 
Expanding Internationally Through Partnerships: Practical Lessons For 21st Ce...
Expanding Internationally Through Partnerships: Practical Lessons For 21st Ce...Expanding Internationally Through Partnerships: Practical Lessons For 21st Ce...
Expanding Internationally Through Partnerships: Practical Lessons For 21st Ce...
 
File Maker Webinar
File Maker WebinarFile Maker Webinar
File Maker Webinar
 
Social Media Decision Making
Social Media Decision MakingSocial Media Decision Making
Social Media Decision Making
 
Quick Books Webinar
Quick Books WebinarQuick Books Webinar
Quick Books Webinar
 
Tools for Digital Storytelling
Tools for Digital StorytellingTools for Digital Storytelling
Tools for Digital Storytelling
 
Encouraging Community Collaboration
Encouraging Community CollaborationEncouraging Community Collaboration
Encouraging Community Collaboration
 

Similar to Keep Computers Safe with Basic Security Tips

091005 Internet Security
091005 Internet Security091005 Internet Security
091005 Internet Securitydkp205
 
security and ethical challenges
security and ethical challengessecurity and ethical challenges
security and ethical challengesVineet Dubey
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pestspeterhitch
 
Rothke Sia 2006
Rothke   Sia 2006Rothke   Sia 2006
Rothke Sia 2006Ben Rothke
 
100812 internet security2.0
100812 internet security2.0100812 internet security2.0
100812 internet security2.0dkp205
 
Bright talk intrusion prevention are we joking - henshaw july 2010 a
Bright talk   intrusion prevention are we joking - henshaw july 2010 aBright talk   intrusion prevention are we joking - henshaw july 2010 a
Bright talk intrusion prevention are we joking - henshaw july 2010 aMark Henshaw
 
Cyber security 101
Cyber security 101Cyber security 101
Cyber security 101Travis Good
 
Security Minded - Ransomware Awareness
Security Minded - Ransomware AwarenessSecurity Minded - Ransomware Awareness
Security Minded - Ransomware AwarenessGreg Wartes, MCP
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet SecurityAshley Zimmerman
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet SecurityJFashant
 
Social Engineering: Protecting Yourself on the Campus Network
Social Engineering: Protecting Yourself on the Campus NetworkSocial Engineering: Protecting Yourself on the Campus Network
Social Engineering: Protecting Yourself on the Campus Networkthowell
 
Week3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdfWeek3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdfMArshad35
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness TrainingWilliam Mann
 
Ethical and security issues on MIS inte 322 assignment.docx
Ethical and security issues on MIS inte 322 assignment.docxEthical and security issues on MIS inte 322 assignment.docx
Ethical and security issues on MIS inte 322 assignment.docxGogoOmolloFrancis
 

Similar to Keep Computers Safe with Basic Security Tips (20)

091005 Internet Security
091005 Internet Security091005 Internet Security
091005 Internet Security
 
security and ethical challenges
security and ethical challengessecurity and ethical challenges
security and ethical challenges
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pests
 
information security awareness course
information security awareness courseinformation security awareness course
information security awareness course
 
Rothke Sia 2006
Rothke   Sia 2006Rothke   Sia 2006
Rothke Sia 2006
 
100812 internet security2.0
100812 internet security2.0100812 internet security2.0
100812 internet security2.0
 
Bright talk intrusion prevention are we joking - henshaw july 2010 a
Bright talk   intrusion prevention are we joking - henshaw july 2010 aBright talk   intrusion prevention are we joking - henshaw july 2010 a
Bright talk intrusion prevention are we joking - henshaw july 2010 a
 
User security awareness
User security awarenessUser security awareness
User security awareness
 
Cyber security 101
Cyber security 101Cyber security 101
Cyber security 101
 
Security Minded - Ransomware Awareness
Security Minded - Ransomware AwarenessSecurity Minded - Ransomware Awareness
Security Minded - Ransomware Awareness
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet Security
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet Security
 
Social Engineering: Protecting Yourself on the Campus Network
Social Engineering: Protecting Yourself on the Campus NetworkSocial Engineering: Protecting Yourself on the Campus Network
Social Engineering: Protecting Yourself on the Campus Network
 
Shailendra Pandey.ppt
Shailendra Pandey.pptShailendra Pandey.ppt
Shailendra Pandey.ppt
 
Week3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdfWeek3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdf
 
Shailendra Pandey.ppt
Shailendra Pandey.pptShailendra Pandey.ppt
Shailendra Pandey.ppt
 
Information Security Seminar
Information Security SeminarInformation Security Seminar
Information Security Seminar
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Ethical and security issues on MIS inte 322 assignment.docx
Ethical and security issues on MIS inte 322 assignment.docxEthical and security issues on MIS inte 322 assignment.docx
Ethical and security issues on MIS inte 322 assignment.docx
 
C3
C3C3
C3
 

More from TechSoup

Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Executive Directors Chat Embracing Diversity and Cultural Differences
Executive Directors Chat  Embracing Diversity and Cultural DifferencesExecutive Directors Chat  Embracing Diversity and Cultural Differences
Executive Directors Chat Embracing Diversity and Cultural DifferencesTechSoup
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Building the Commons: Community Archiving & Decentralized Storage
Building the Commons: Community Archiving & Decentralized StorageBuilding the Commons: Community Archiving & Decentralized Storage
Building the Commons: Community Archiving & Decentralized StorageTechSoup
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
Welcome to TechSoup - New Member Orientation and Q & A (April 2024)
Welcome to TechSoup - New Member Orientation and Q & A (April 2024)Welcome to TechSoup - New Member Orientation and Q & A (April 2024)
Welcome to TechSoup - New Member Orientation and Q & A (April 2024)TechSoup
 
Executive Directors Chat Initiating Equity for Impact.pdf
Executive Directors Chat  Initiating Equity for Impact.pdfExecutive Directors Chat  Initiating Equity for Impact.pdf
Executive Directors Chat Initiating Equity for Impact.pdfTechSoup
 
Set the Path Forward with Smart Technology Decisions.pdf
Set the Path Forward with Smart Technology Decisions.pdfSet the Path Forward with Smart Technology Decisions.pdf
Set the Path Forward with Smart Technology Decisions.pdfTechSoup
 
What is the Future of QuickBooks DeskTop?
What is the Future of QuickBooks DeskTop?What is the Future of QuickBooks DeskTop?
What is the Future of QuickBooks DeskTop?TechSoup
 
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdf
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdfMaximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdf
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdfTechSoup
 
Hitting the Inbox: Email Authentication Changes and What You Need to Know
Hitting the Inbox: Email Authentication Changes and What You Need to KnowHitting the Inbox: Email Authentication Changes and What You Need to Know
Hitting the Inbox: Email Authentication Changes and What You Need to KnowTechSoup
 
Welcome to TechSoup New Member Orientation March 2024
Welcome to TechSoup New Member Orientation March 2024Welcome to TechSoup New Member Orientation March 2024
Welcome to TechSoup New Member Orientation March 2024TechSoup
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
 
Celebrate National Library Lovers Month with TechSoup! We love libraries!.pdf
Celebrate National Library Lovers Month with TechSoup! We love libraries!.pdfCelebrate National Library Lovers Month with TechSoup! We love libraries!.pdf
Celebrate National Library Lovers Month with TechSoup! We love libraries!.pdfTechSoup
 
Google Ad Grants Services at TechSoup.pdf
Google Ad Grants Services at TechSoup.pdfGoogle Ad Grants Services at TechSoup.pdf
Google Ad Grants Services at TechSoup.pdfTechSoup
 
Techsoup_ Prompt Strategy _ Template.docx.pdf
Techsoup_ Prompt Strategy _ Template.docx.pdfTechsoup_ Prompt Strategy _ Template.docx.pdf
Techsoup_ Prompt Strategy _ Template.docx.pdfTechSoup
 
Ask the Exerts - Focus on AI Prompt Engineering.pdf
Ask the Exerts - Focus on AI Prompt Engineering.pdfAsk the Exerts - Focus on AI Prompt Engineering.pdf
Ask the Exerts - Focus on AI Prompt Engineering.pdfTechSoup
 
Introduction to TechSoup’s Digital Marketing Services and Use Cases
Introduction to TechSoup’s Digital Marketing  Services and Use CasesIntroduction to TechSoup’s Digital Marketing  Services and Use Cases
Introduction to TechSoup’s Digital Marketing Services and Use CasesTechSoup
 
Grantseeking Solo- Securing Awards with Limited Staff PDF.pdf
Grantseeking Solo- Securing Awards with Limited Staff  PDF.pdfGrantseeking Solo- Securing Awards with Limited Staff  PDF.pdf
Grantseeking Solo- Securing Awards with Limited Staff PDF.pdfTechSoup
 
Welcome to TechSoup New Member Orientation and Q & A (February 2024)
Welcome to TechSoup New Member Orientation and Q & A (February 2024)Welcome to TechSoup New Member Orientation and Q & A (February 2024)
Welcome to TechSoup New Member Orientation and Q & A (February 2024)TechSoup
 

More from TechSoup (20)

Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Executive Directors Chat Embracing Diversity and Cultural Differences
Executive Directors Chat  Embracing Diversity and Cultural DifferencesExecutive Directors Chat  Embracing Diversity and Cultural Differences
Executive Directors Chat Embracing Diversity and Cultural Differences
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Building the Commons: Community Archiving & Decentralized Storage
Building the Commons: Community Archiving & Decentralized StorageBuilding the Commons: Community Archiving & Decentralized Storage
Building the Commons: Community Archiving & Decentralized Storage
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
Welcome to TechSoup - New Member Orientation and Q & A (April 2024)
Welcome to TechSoup - New Member Orientation and Q & A (April 2024)Welcome to TechSoup - New Member Orientation and Q & A (April 2024)
Welcome to TechSoup - New Member Orientation and Q & A (April 2024)
 
Executive Directors Chat Initiating Equity for Impact.pdf
Executive Directors Chat  Initiating Equity for Impact.pdfExecutive Directors Chat  Initiating Equity for Impact.pdf
Executive Directors Chat Initiating Equity for Impact.pdf
 
Set the Path Forward with Smart Technology Decisions.pdf
Set the Path Forward with Smart Technology Decisions.pdfSet the Path Forward with Smart Technology Decisions.pdf
Set the Path Forward with Smart Technology Decisions.pdf
 
What is the Future of QuickBooks DeskTop?
What is the Future of QuickBooks DeskTop?What is the Future of QuickBooks DeskTop?
What is the Future of QuickBooks DeskTop?
 
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdf
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdfMaximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdf
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdf
 
Hitting the Inbox: Email Authentication Changes and What You Need to Know
Hitting the Inbox: Email Authentication Changes and What You Need to KnowHitting the Inbox: Email Authentication Changes and What You Need to Know
Hitting the Inbox: Email Authentication Changes and What You Need to Know
 
Welcome to TechSoup New Member Orientation March 2024
Welcome to TechSoup New Member Orientation March 2024Welcome to TechSoup New Member Orientation March 2024
Welcome to TechSoup New Member Orientation March 2024
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Celebrate National Library Lovers Month with TechSoup! We love libraries!.pdf
Celebrate National Library Lovers Month with TechSoup! We love libraries!.pdfCelebrate National Library Lovers Month with TechSoup! We love libraries!.pdf
Celebrate National Library Lovers Month with TechSoup! We love libraries!.pdf
 
Google Ad Grants Services at TechSoup.pdf
Google Ad Grants Services at TechSoup.pdfGoogle Ad Grants Services at TechSoup.pdf
Google Ad Grants Services at TechSoup.pdf
 
Techsoup_ Prompt Strategy _ Template.docx.pdf
Techsoup_ Prompt Strategy _ Template.docx.pdfTechsoup_ Prompt Strategy _ Template.docx.pdf
Techsoup_ Prompt Strategy _ Template.docx.pdf
 
Ask the Exerts - Focus on AI Prompt Engineering.pdf
Ask the Exerts - Focus on AI Prompt Engineering.pdfAsk the Exerts - Focus on AI Prompt Engineering.pdf
Ask the Exerts - Focus on AI Prompt Engineering.pdf
 
Introduction to TechSoup’s Digital Marketing Services and Use Cases
Introduction to TechSoup’s Digital Marketing  Services and Use CasesIntroduction to TechSoup’s Digital Marketing  Services and Use Cases
Introduction to TechSoup’s Digital Marketing Services and Use Cases
 
Grantseeking Solo- Securing Awards with Limited Staff PDF.pdf
Grantseeking Solo- Securing Awards with Limited Staff  PDF.pdfGrantseeking Solo- Securing Awards with Limited Staff  PDF.pdf
Grantseeking Solo- Securing Awards with Limited Staff PDF.pdf
 
Welcome to TechSoup New Member Orientation and Q & A (February 2024)
Welcome to TechSoup New Member Orientation and Q & A (February 2024)Welcome to TechSoup New Member Orientation and Q & A (February 2024)
Welcome to TechSoup New Member Orientation and Q & A (February 2024)
 

Recently uploaded

Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 

Recently uploaded (20)

Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 

Keep Computers Safe with Basic Security Tips

  • 1. Security Basics: Keep your Computers Safe October 28, 2010 Audio is only available by calling this number: Conference Call: 866-740-1260; Access Code: 6339392 Sponsored by
  • 2.
  • 3.
  • 4. Security Basics: Keep your Computers Safe Presenter: Marian Merritt Sponsored by
  • 5. We are working toward a time when every nonprofit and social benefit organization on the planet has the technology resources and knowledge they need to operate at their full potential.
  • 7. Today’s Speakers Kami Griffiths TechSoup Global Marian Merritt Symantec Assisting with chat questions: Kevin Lo & Gary Lamontagne, TechSoup Global
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15. Zeus Trojan - $70 million stolen from small business, non-profits
  • 16. Huge growth in malware and new physical threats
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24. Questions? Submit your questions using the chat box.
  • 25.
  • 26.
  • 27. Thank you to our Webinar Sponsor! ReadyTalk offers dedicated product demos for TechSoup organizations 4 times per week. For more information: pages.readytalk.com/techsoup.html
  • 28. Thank you! Please complete the post event survey! Kami Griffiths, kami@techsoup.org, 415-633-9392

Editor's Notes

  1. TechSoup.org offers nonprofits a one-stop resource for technology needs by providing free information, resources, and support. In addition to online information and resources, we offer a product philanthropy service through which nonprofits can access donated and discounted technology products, generously provided by corporate and nonprofit technology partners.
  2. TechSoup Global currently operates its product donation programs with partners in 32 countries. With the number of supporting corporations currently at 37 (offering 392 different donated or discounted products) TechSoup Global has provided approximately 4.9 million donated technology products since program inception to NGOs around the world. The retail price of these donations is roughly equivalent to US$1.4 billion.
  3. Emailed Trojan virus to targetted individuals in small business, non profits, small towns. Once clicked on, installed silently and stole account information and passwords. Logged into online banking and transferred thousands of dollars. Money mules owned the accounts and wired the money overseas to others. The documents used to create the US bank accounts were fake passwords nad other ids held by the people above, many of whom were in US on student visas from E. Europe.