Your SlideShare is downloading. ×
0
Security Basics Webinar
Security Basics Webinar
Security Basics Webinar
Security Basics Webinar
Security Basics Webinar
Security Basics Webinar
Security Basics Webinar
Security Basics Webinar
Security Basics Webinar
Security Basics Webinar
Security Basics Webinar
Security Basics Webinar
Security Basics Webinar
Security Basics Webinar
Security Basics Webinar
Security Basics Webinar
Security Basics Webinar
Security Basics Webinar
Security Basics Webinar
Security Basics Webinar
Security Basics Webinar
Security Basics Webinar
Security Basics Webinar
Security Basics Webinar
Security Basics Webinar
Security Basics Webinar
Security Basics Webinar
Security Basics Webinar
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Security Basics Webinar

719

Published on

When you have computers connected to the internet or to any external device, you need to take precautions. There are threats present that can not only cause harm to your computers, but could damage …

When you have computers connected to the internet or to any external device, you need to take precautions. There are threats present that can not only cause harm to your computers, but could damage files on your network or potentially put sensitive data at risk. This free webinar will help you understand what the threats are and how your computers can get infected.

Published in: Education, Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
719
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
9
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide
  • TechSoup.org offers nonprofits a one-stop resource for technology needs by providing free information, resources, and support. In addition to online information and resources, we offer a product philanthropy service through which nonprofits can access donated and discounted technology products, generously provided by corporate and nonprofit technology partners.
  • TechSoup Global currently operates its product donation programs with partners in 32 countries. With the number of supporting corporations currently at 37 (offering 392 different donated or discounted products) TechSoup Global has provided approximately 4.9 million donated technology products since program inception to NGOs around the world. The retail price of these donations is roughly equivalent to US$1.4 billion.
  • Emailed Trojan virus to targetted individuals in small business, non profits, small towns. Once clicked on, installed silently and stole account information and passwords. Logged into online banking and transferred thousands of dollars. Money mules owned the accounts and wired the money overseas to others. The documents used to create the US bank accounts were fake passwords nad other ids held by the people above, many of whom were in US on student visas from E. Europe.
  • Transcript

    • 1. Security Basics: Keep your Computers Safe October 28, 2010 Audio is only available by calling this number: Conference Call: 866-740-1260; Access Code: 6339392 Sponsored by
    • 2. Using ReadyTalk <ul><li>Chat & raise hand </li></ul><ul><li>All lines are muted </li></ul><ul><li>If you lose your internet connection, reconnect using the link emailed to you. </li></ul><ul><li>If you lose your phone connection, re-dial the phone number and re-join. </li></ul><ul><li>ReadyTalk support: 800-843-9166 </li></ul>
    • 3. You are being recorded… <ul><li>Streaming into Second Life </li></ul><ul><li>This seminar will be available on the TechSoup website along with past webinar presentations: </li></ul><ul><ul><li>www.techsoup.org/go/webinars </li></ul></ul><ul><li>You will receive a link to this presentation, material and links. </li></ul><ul><li>After the webinar, you can ask follow-up questions in our Community Forum: </li></ul><ul><ul><li>http://bit.ly/ts-sec </li></ul></ul><ul><li>Twitter hashtags: #techsoup </li></ul>
    • 4. Security Basics: Keep your Computers Safe Presenter: Marian Merritt Sponsored by
    • 5. We are working toward a time when every nonprofit and social benefit organization on the planet has the technology resources and knowledge they need to operate at their full potential.
    • 6. Home page screen grab
    • 7. Today’s Speakers Kami Griffiths TechSoup Global Marian Merritt Symantec Assisting with chat questions: Kevin Lo & Gary Lamontagne, TechSoup Global
    • 8. Agenda <ul><li>Threat landscape </li></ul><ul><li>How do computers get infected </li></ul><ul><li>What is driving growth in malware </li></ul><ul><li>Staying safe </li></ul><ul><li>What to do if infected </li></ul><ul><li>Resources </li></ul>
    • 9. Poll #1: Does your organization have an Acceptable Use Policy? <ul><li>Yes </li></ul><ul><li>No </li></ul>
    • 10. Poll #2: Do you provide internet safety training for your employees and volunteers? <ul><li>Yes </li></ul><ul><li>No </li></ul>
    • 11. Threat Landscape <ul><li>2/3 of adults globally have been victim of cybercrime: </li></ul><ul><li>Viruses/malware 51% </li></ul><ul><li>Online scams 10% </li></ul><ul><li>Phishing 9% </li></ul><ul><li>Social network hacking 7% </li></ul><ul><li>Online credit card fraud 7% </li></ul><ul><li>Sexual predation 7% </li></ul>
    • 12. Types of Malware <ul><li>Virus – program that can spread from computer to another </li></ul><ul><li>Worm – virus that can spread on its own </li></ul><ul><li>Trojan – hidden in an offer of something good </li></ul><ul><li>Bot – robot network, remotely controlled by criminal </li></ul><ul><li>Keystroke logger – silently records valuable info and sends to criminal over the web </li></ul>
    • 13. How Does This Happen? <ul><li>Dangerous links in email, IM, Twitter messages, Facebook and YouTube comments </li></ul><ul><li>Infected devices: USB sticks, disks, laptops, digital photo frames </li></ul><ul><li>Fake work at home schemes, online auctions, online dating </li></ul><ul><li>Phishing attacks, “spearphishing” </li></ul><ul><li>Fake antivirus pop-up alerts </li></ul><ul><li>Ex-employees using privileges to access systems </li></ul><ul><li>Skimming </li></ul>
    • 14. Why The Rapid Growth in Malware? <ul><li>Underground cybercrime economy </li></ul><ul><li>Bigger business than international drug trade </li></ul><ul><li>Hackers with computer skills and desire for money </li></ul><ul><li>Organized online buy/sell of breached and stolen data </li></ul><ul><li>Low risk, high reward </li></ul>
    • 15. Zeus Trojan - $70 million stolen from small business, non-profits
    • 16. Huge growth in malware and new physical threats
    • 17. How Do We Protect Ourselves? <ul><li>Internet Security (more than just AntiVirus) on all systems </li></ul><ul><li>Create culture of security in the organization (not us vs. them) </li></ul><ul><li>Explain the “why” to your employees so they can practice safe computing at home and with their families </li></ul><ul><li>Create security policy and enforce it </li></ul><ul><li>Separate systems where possible </li></ul><ul><li>Backup data in more than one form </li></ul><ul><li>Other suggestions: </li></ul><ul><ul><li>Web filtering </li></ul></ul><ul><ul><li>Enforce Safe Search settings </li></ul></ul>
    • 18. Acceptable Use Policy Tips <ul><li>Created by IT and HR, approved by Legal </li></ul><ul><li>Identify restricted activities: (examples) </li></ul><ul><ul><li>Taking devices home </li></ul></ul><ul><ul><li>Accessing inappropriate websites like porn or online shopping </li></ul></ul><ul><ul><li>Installing software other than IT approved and provided </li></ul></ul><ul><ul><li>Conducting financial transactions </li></ul></ul><ul><ul><li>Email activities are for work-related only </li></ul></ul><ul><ul><li>Social networking activity </li></ul></ul><ul><li>Remind employees that email, IM and other activities are company property and monitored </li></ul><ul><li>Identify what happens if policy isn’t followed </li></ul>
    • 19. When To Suspect Malware Infection <ul><li>Strange pop-ups ads </li></ul><ul><li>Hijacked browser </li></ul><ul><li>Slow computer </li></ul><ul><li>Antivirus isn’t working </li></ul><ul><li>Lots of activity when you aren’t doing anything </li></ul><ul><li>Strange icons in tool tray </li></ul><ul><li>Search isn’t working </li></ul><ul><li>Lots of bounced back email or sent email </li></ul>
    • 20. What To Do If Infected? <ul><li>Report to IT </li></ul><ul><li>Determine scope of infection (device only, account only, network wide) </li></ul><ul><li>Determine availability of backup, restore points and other forms of restoring to a clean system </li></ul><ul><li>Proceed to identify and remove malware </li></ul><ul><ul><li>Scan with security software, remove or quarantine malware </li></ul></ul><ul><ul><li>Use more powerful malware removal tools from Norton, Microsoft, etc </li></ul></ul><ul><li>Determine how the infection occurred and communicate to team </li></ul><ul><li>Contact financial institutions or other impacted organizations for further assistance </li></ul>
    • 21. Social Network Risks <ul><li>Dangerous links and hacked accounts </li></ul><ul><li>Sharing information incorrectly </li></ul><ul><li>Inappropriate photos and videos </li></ul><ul><li>Violating acceptable use policy by displaying offensive imagery, language, sharing jokes, etc </li></ul>
    • 22. Resources <ul><li>Symantec Security Response Blog </li></ul><ul><li>Norton Family Resource website </li></ul><ul><ul><li>Free booklets on online safety </li></ul></ul><ul><li>Every Click Matters website </li></ul><ul><li>Microsoft and Norton malware removal tools: </li></ul><ul><ul><li>Norton Power Eraser </li></ul></ul><ul><li>Federal Trade Commission </li></ul><ul><li>Nat’l Cyber Security Association </li></ul>
    • 23. Wrap Up <ul><li>Malware – what is it, where does it come from, how to stay safe </li></ul><ul><li>Cybercriminals – how do they work </li></ul><ul><li>What to do if you get infected </li></ul><ul><li>Acceptable Use Policies </li></ul><ul><li>Additional Resources </li></ul><ul><li>Questions? Send me an email: marian@norton.com </li></ul>
    • 24. Questions? Submit your questions using the chat box.
    • 25. Continue the Discussion… <ul><li>Additional questions can be answered by posting in in our Community Forum: </li></ul><ul><ul><li>http://bit.ly/ts-sec </li></ul></ul>
    • 26. Upcoming Webinars <ul><li>Is FileMaker Right for Your Organization? </li></ul><ul><ul><li>Thursday, November 18, 11 a.m. </li></ul></ul><ul><li>Manage your Data, Donations and More with CiviCRM </li></ul><ul><ul><li>Tuesday, November 23, 11 a.m. </li></ul></ul>
    • 27. Thank you to our Webinar Sponsor! ReadyTalk offers dedicated product demos for TechSoup organizations 4 times per week. For more information: pages.readytalk.com/techsoup.html
    • 28. Thank you! Please complete the post event survey! Kami Griffiths, kami@techsoup.org, 415-633-9392

    ×