Internet Security for Non-Techies


Published on

Presentation given at a variety of open community events put on by Automation Alley and partners.

Published in: Technology
  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide
  • Internet Security for Non-Techies

    1. 1. Internet and Email Security for Non-Techies
    2. 2. Our Agenda <ul><li>Little Background…why should you be worried about this? </li></ul><ul><li>Monitor Your Credit </li></ul><ul><ul><li>Equifax 800-685-1111 </li></ul></ul><ul><ul><li>Experian 888-397-3742 </li></ul></ul><ul><ul><li>TransUnion 877-922-8228 </li></ul></ul><ul><ul><li>LifeLock 800-LifeLock </li></ul></ul><ul><li>10 Ways to Stay Safe Online </li></ul><ul><li>Questions </li></ul>
    3. 3. Know What Others Know… <ul><li>About your credit </li></ul><ul><ul><li>Might be an indication something has happened to you credit worthiness </li></ul></ul><ul><ul><li>Check it regularly – you can get a free copy of the report once every 12 months </li></ul></ul><ul><ul><ul><li>Review them carefully; check the inquiries companies are making, look for new accounts, and anything that just looks odd. </li></ul></ul></ul><ul><ul><li>To stop identity thieves consider place a fraud alert on your account with all three of the bureaus </li></ul></ul><ul><ul><li>You have rights: </li></ul></ul><ul><ul><ul><li>FTC Website: </li></ul></ul></ul><ul><ul><ul><ul><li> </li></ul></ul></ul></ul><ul><ul><ul><li>Identity Theft Resource Center: </li></ul></ul></ul>
    4. 4. Secure Passwords <ul><li>Make it difficult to figure out </li></ul><ul><li>Don’t place it on a note on the back of your keyboard or in your desk drawer </li></ul><ul><li>A good password is: </li></ul><ul><ul><li>8 characters long </li></ul></ul><ul><ul><li>Has no personal information </li></ul></ul><ul><ul><li>Does not use real words </li></ul></ul><ul><ul><li>Mixes upper and lower case characters and numbers </li></ul></ul><ul><ul><li>Something you change regularly (every 30 to 60 days) </li></ul></ul><ul><li>Tools to Generate Safer Passwords: </li></ul><ul><ul><li>PC Tools Secure Password Generator: </li></ul></ul><ul><ul><li> </li></ul></ul><ul><ul><li>Random Password Generator: </li></ul></ul><ul><ul><li>Bytes Interactive Password Generator: </li></ul></ul><ul><ul><li> </li></ul></ul>
    5. 5. Don’t Open that Email <ul><li>Unless you know who it is from </li></ul><ul><li>Read the subject lines before opening, even if you think you know the person sending the message </li></ul><ul><li>Turn off your preview window </li></ul><ul><li>Make sure your antivirus and antispam software is updated regularly. </li></ul>
    6. 6. Buyer Beware – Shopping and Banking Online <ul><li>Make sure you know who you are doing business with, then ask a few questions: </li></ul><ul><ul><li>Are they reputable? </li></ul></ul><ul><ul><li>Is their site secure? </li></ul></ul><ul><ul><li>Is there a physical address and phone number on the site? </li></ul></ul><ul><ul><li>Does the URL start with https: and have a picture of a lock in the broswers status bar? </li></ul></ul><ul><ul><li>What is the companies return policy? </li></ul></ul><ul><li>Research a little…can you find online reviews of the company? </li></ul><ul><li>Pay with a credit card to limit your liability. </li></ul>
    7. 7. Keep Your Software and Hardware Current <ul><li>Firewalls </li></ul><ul><li>Virus Protection </li></ul><ul><li>Browser Updates </li></ul><ul><li>Operating System Updates </li></ul><ul><li>Application Software Updates </li></ul><ul><li>Run your anti-virus scan and other security software regularly (weekly or more) to catch the bad things before they make your computer “sick” or lose your identity. </li></ul>
    8. 8. Phishing and Pharming…not a sport or hobby <ul><li>Scams: </li></ul><ul><ul><li>Phishing is where the perpetrator sends out legitimate-looking emails appearing to come from a your bank, government, paypal, BestBuy, IRS, etc. in an effort to get you to give them your personal and financial information. </li></ul></ul><ul><ul><li>Pharming is another scam where they get you to go to a website that looks like the real deal but isn’t, they then trick you into entering your information with the goal of stealing your identity and financial information. </li></ul></ul><ul><li>Social engineering…the bad stuff. </li></ul>
    9. 9. Backup Your Data <ul><li>A good backup helps when: </li></ul><ul><ul><li>A virus kills your hard drive </li></ul></ul><ul><ul><li>When your computer crashes </li></ul></ul><ul><ul><li>If your computer is stolen </li></ul></ul><ul><li>Backups safeguard what is important to you </li></ul><ul><ul><li>Pictures, Papers, Financial data, and Medical data </li></ul></ul><ul><li>The best backup method is to an external hard drive or large thumb drive </li></ul><ul><li>Take your backups and place them someplace safe </li></ul>
    10. 10. Disable Hidden File Extensions <ul><li>Know what you are about to open…file extensions tell you what the file is: </li></ul><ul><ul><li>.exe = Program files (might be a virus or a good program) </li></ul></ul><ul><ul><li>.jpg = Your pictures </li></ul></ul><ul><ul><li>.doc = Your term paper </li></ul></ul><ul><li>Some of the malicious and virus files masquerade as other files. </li></ul><ul><li>Know before you click! </li></ul>
    11. 11. Administrative Accounts…good in moderation <ul><li>Keep this account separate from your working account(s) </li></ul><ul><ul><li>Use this account for installing software or new hardware </li></ul></ul><ul><ul><li>Use an account specific to you for day-to-day work </li></ul></ul><ul><li>If you are logged in as an administrator and catch a bad computer bug…it now has administrator rights to your computer. </li></ul>
    12. 12. Think Safe and Green <ul><li>When you leave your computer on and your Internet access open, you're giving potential hackers more opportunities to break into your computer. </li></ul><ul><li>Always remember to turn off your Internet connection when you're not using it, and turn your computer off in between uses. </li></ul>
    13. 13. Clean Up…Before You Recycle <ul><li>If you donate, sell, through away your old computer wipe the hard disc clean with: </li></ul><ul><ul><li>Darik’s Boot and Nuke: </li></ul></ul><ul><ul><li>ShreditX: </li></ul></ul><ul><ul><li>DisposeSecure: </li></ul></ul><ul><ul><li>Wipe Drive: </li></ul></ul><ul><li>Deleting and formatting your hard disc is not enough. </li></ul>
    14. 14. Questions.
    15. 15. Links and Suggestions <ul><li>Anti-Virus </li></ul><ul><ul><li>AVG Anti-Virus (Free): </li></ul></ul><ul><ul><li>Avast (Free): </li></ul></ul><ul><ul><li>Norton 360: ( ) </li></ul></ul><ul><ul><li>McAfee: ( ) </li></ul></ul><ul><ul><li>2008 Anti-Virus Review ( ) </li></ul></ul>
    16. 16. Links and Suggestions <ul><li>Spyware </li></ul><ul><ul><li>Spybot S&D (Free): ( ) </li></ul></ul><ul><ul><li>PCTools: ( ) </li></ul></ul><ul><ul><li>Windows Defender (Free): ( ) </li></ul></ul><ul><ul><li>Anti-Spyware Review 2008 </li></ul></ul><ul><ul><li>( ) </li></ul></ul>
    17. 17. Contact Information <ul><li>Richard G. Bush, Ph. D. </li></ul><ul><li>Director, Undergraduate Management Programs </li></ul><ul><li>Lawrence Technological University </li></ul><ul><li>[email_address] </li></ul><ul><li>248-204-3078 </li></ul>