Protecting Yourself Online


Published on

Guide to protecting yourself online

  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Protecting Yourself Online

  1. 1. Protecting Yourself Online Gary Wagnon Paul Davidson – Davidson Business Technologies
  2. 2. Protecting Yourself Online <ul><li>Computer Basics </li></ul><ul><li>Printer Security </li></ul><ul><li>Email Do’s and Don’ts </li></ul><ul><li>Phishing Schemes </li></ul><ul><li>Social Network Security (Facebook, etc) </li></ul><ul><li>Viruses & Scams </li></ul><ul><li>Skype </li></ul><ul><li>Resources </li></ul>
  3. 3. Small Business Security <ul><li>85% of small business owners believe their company is less of a target for cybercrime and 50% believe the cost of time and money is not justified by the threat. </li></ul><ul><li>65% store customer data, 43% store financial records and 33% store credit card information. </li></ul>
  4. 4. Computer Basics <ul><li>Make sure you have a working firewall & anti-virus program (AVG is a free antivirus) </li></ul><ul><li>For Windows users – make sure you run automatic updates (Control Panel > Windows Updates or Automatic Updates) </li></ul><ul><li>Use Firefox as your browser instead of Internet Explorer (Less security problems, blocks pop-ups) </li></ul><ul><li>Install Spyware & Malware Programs - </li></ul>
  5. 5. Passwords <ul><li>Online passwords should not be: </li></ul><ul><ul><li>A common word </li></ul></ul><ul><ul><li>A birthdate or address </li></ul></ul><ul><li>It should be: </li></ul><ul><ul><li>A combination of letters and numbers </li></ul></ul><ul><ul><li>Include symbols if possible </li></ul></ul><ul><ul><li>Include capitalization </li></ul></ul><ul><ul><li>Changed frequently </li></ul></ul>
  6. 6. What is Spyware & Adware <ul><li>Spyware and Adware are software made by publishers that allow them to snoop on your browsing activity, invade your privacy, and flood you with those horrible popups and more. If you are like most users on the Internet, chances are you are probably infected with these applications. That is why you must have at least one program. </li></ul><ul><li>Why does Spyware and Adware affect every Internet user? All information you enter via the web can be intercepted. Unauthorized sites can add themselves to your desktop (icons). Unauthorized sites can add themselves to your Internet favorites. Your browsing activity can be tracked and monitored. Your personal information can be sold to other parties without your knowledge or consent. Your default homepage and settings can be hijacked so you can't change them. These malicious components not only invade your PC so they cannot be removed, but takes up your hard drive space and slow down your PC! </li></ul><ul><li>This junk, that invades your computer from email and websurfing, causes the greatest low-level security annoyances and results in poor overall performances, slow operation of programs, freezes or lockups. </li></ul>
  7. 7. Printer Security <ul><li>Some multi-function printer store data </li></ul><ul><li>Install tools to protect data such as Image overwriting, data encryption, network authentication, Fax/Network separation and secure print jobs </li></ul><ul><li>Update printer software just like you do your anti-virus and operating software. </li></ul>
  8. 8. Email Spoofing & Phishing <ul><li>The goal is to capture your login information or plant a virus, trojan or rootkit that will allow access to your computer from someone outside. </li></ul><ul><li>They can achieve this in 2 ways – by getting you to click on an attachment or by having you click a link that looks legitimate. </li></ul><ul><li>NEVER OPEN AN ATTACHMENT OR FOLLOW A LINK IN AN EMAIL UNLESS YOU ARE 100% SURE IT’S LEGITIMATE </li></ul>
  9. 9. Email Phishing <ul><li>The next slide shows an example of an email that looks very official. It shows it comes from the IRS Payment Program and has a file that needs to be completed. But further investigation shows it’s not from the IRS at all. </li></ul>
  10. 10. Email Phishing <ul><li>By clicking on View > Options you can see the actual header of the email. </li></ul><ul><li>Return-path: <> </li></ul><ul><li>Envelope-to: </li></ul><ul><li>Delivery-date: Fri, 08 Oct 2010 15:49:29 -0400 </li></ul><ul><li>Received: from [] ( </li></ul><ul><li>by with esmtp (Exim 4.63) </li></ul><ul><li>(envelope-from <>) </li></ul><ul><li>id 1P4IwZ-0000Uk-Rd </li></ul><ul><li>for; Fri, 08 Oct 2010 15:49:29 -0400 </li></ul><ul><li>Received: from [] (account HELO </li></ul><ul><li>by (CommuniGate Pro SMTP 5.2.3) </li></ul><ul><li>with ESMTPA id 441289348 for <>; Fri, 8 Oct 2010 22:49:27 +0300 </li></ul><ul><li>From: &quot;EFTPS Tax Payment&quot; <> </li></ul><ul><li>To: <> </li></ul><ul><li>Subject: SECOND NOTICE: Your Federal Tax Payment ID: 01036376 has been rejected. </li></ul><ul><li>Date: Fri, 8 Oct 2010 22:49:27 +0300 </li></ul>
  11. 11. Email Attachments <ul><li>Viruses, trojans and other malware can infect a computer when an email attachment is opened. Some of the most common types of attachments are: </li></ul><ul><li>PDF Files </li></ul><ul><li>Zip Files </li></ul>
  12. 12. Stranded in London Email <ul><li>I receive an email from a friend saying she was stranded in London (or any other city) and someone stole her wallet. </li></ul><ul><li>What actually happened was someone either stole or guessed her password and emailed everyone in her address book, hoping they would send money to the address they listed. </li></ul>
  13. 13. Email from Bank or PayPal <ul><li>While your bank may email you, you should NEVER click on any link within the email. Instead, open a browser window and go to your online banking like you normally do. </li></ul><ul><li>Any request to change your password is an attempt to gain your login information. </li></ul>
  14. 14. E-Card Scam
  15. 15. PayPal Scam
  16. 16. Charles Schwab Scam
  17. 17. Email Phishing Appears to come from the US Postal Service – But the attached ZIP file is most likely a virus.
  18. 18. Scams <ul><li>Scammers try to play on the sympathies of people and get them to send money. Some of the top scams are: </li></ul><ul><li>Nigerian Scam </li></ul><ul><li>Foreign Lottery </li></ul><ul><li>Secret Shopper Scam </li></ul><ul><li>Work at Home Scam </li></ul><ul><li>Family Member in Distress </li></ul>
  19. 19. Scams <ul><li>Some of the more popular: </li></ul><ul><li>Post card Virus – e-card from a friend </li></ul><ul><li>Jury Duty Scam – failed to report </li></ul><ul><li>Delivery Failure – Parcel service delivery </li></ul><ul><li>Microsoft Giveaway – Free cash for forwarding email </li></ul><ul><li>Cell Phone Numbers to telemarketers </li></ul>
  20. 20. Scams <ul><li>Before forwarding anything or taking any action suggested in an email, first check . This site has a comprehensive list of hundreds of scams that are circulating. </li></ul>
  21. 21. Public WiFi <ul><li>A public WiFi connection like a coffee shop, restaurant or bookstore is an open network, meaning hackers can potentially see what’s happening on your computer. </li></ul><ul><li>Make sure you don’t enter any sensitive data, like your bank account or credit card info on an public WiFi connection. Wait until you’re back home on your secured computer. </li></ul>
  22. 22. 6 Steps to Safer WiFi Use <ul><li>Connect to a legitmate WiFi network </li></ul><ul><li>Even Legitimate networks may be compromised </li></ul><ul><li>Update your Anti-virus and anti-malware </li></ul><ul><li>Control your access points </li></ul><ul><li>Remember you’re in public </li></ul><ul><li>Learn about their privacy policy </li></ul>
  23. 24. Facebook Security
  24. 25. Facebook Security Settings
  25. 26. Facebook <ul><li>Posts that are made by friends can now be suspect. Unless you can recognize the link they are posting, don’t go to it. </li></ul><ul><li>Consult Facebook’s Security page for the latest attacks </li></ul>
  26. 27. Facebook Scam
  27. 28. Mobile Devices <ul><li>From McAfee Threat Report - Mobile: Usage is rising in the workplace, and so will attacks </li></ul><ul><li>“ Threats on mobile devices have so far been few and far between, as “jailbreaking” on the iPhone and the arrival of Zeus were the primary mobile threats in 2010. With the widespread adoption of mobile devices in business environments, combined with historically fragile cellular infrastructure and slow strides toward encryption, McAfee Labs predicts that 2011 will bring a rapid escalation of attacks and threats to mobile devices, putting user and corporate data at very high risk. “ </li></ul>
  28. 29. Mobile Devices <ul><li>Photos taken with a mobile device that is GPS enabled will stamp the photo with the exact longitude and latitude. When uploaded to sites like Flickr and Facebook, anyone can find the location and with very little work, build a pattern of family members and even children. </li></ul><ul><li>Disable the GPS or location setting for photos. </li></ul>
  29. 30. Shortened URLs <ul><li>TinyURL,, are used to shorten a URL for Twitter and other social media sites. </li></ul><ul><li>If you use a shortener program, consider a customized option or preview option so recipient is more comfortable the link is legitimate </li></ul><ul><li>Use a shortened link decoder if you’re not sure. </li></ul><ul><ul><li>UnShortenEmAll, TinyURL Decoder, Expand, </li></ul></ul>
  30. 31. Skype <ul><li>Instant messaging on Skype can present potential problems. </li></ul><ul><li>Messages can have links included but the same rule applies as to email – don’t click any link you aren’t 100% sure of </li></ul><ul><li>Another option is to turn off the Skype messaging feature </li></ul>
  31. 32. <ul><li>While most of your “private” information is available online, has aggregated it in one spot. Much of the data is based on the demographics of the neighborhood. Some of the info listed includes: </li></ul><ul><li>Address </li></ul><ul><li>Street view of your neighborhood </li></ul><ul><li>Wealth Rating </li></ul><ul><li>Credit Rating </li></ul><ul><li>Phone </li></ul>
  32. 33. To remove yourself – click Privacy and follow the instructions.
  33. 34. Resources <ul><li>AVG – Free Anti-virus </li></ul><ul><li>Malware Bytes – Spyware and Malware </li></ul><ul><li>Spybot S & D – Spyware Removal </li></ul><ul><li>Firefox – Browser </li></ul><ul><li> – Scams </li></ul>