Internet Security for Non-Techies

1,001 views
972 views

Published on

Presentation given at a variety of open community events put on by Automation Alley and partners.

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
1,001
On SlideShare
0
From Embeds
0
Number of Embeds
5
Actions
Shares
0
Downloads
22
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide
  • Internet Security for Non-Techies

    1. 1. Internet and Email Security for Non-Techies
    2. 2. Our Agenda <ul><li>Little Background…why should you be worried about this? </li></ul><ul><li>Monitor Your Credit </li></ul><ul><ul><li>Equifax 800-685-1111 </li></ul></ul><ul><ul><li>Experian 888-397-3742 </li></ul></ul><ul><ul><li>TransUnion 877-922-8228 </li></ul></ul><ul><ul><li>LifeLock 800-LifeLock </li></ul></ul><ul><li>10 Ways to Stay Safe Online </li></ul><ul><li>Questions </li></ul>
    3. 3. Know What Others Know… <ul><li>About your credit </li></ul><ul><ul><li>Might be an indication something has happened to you credit worthiness </li></ul></ul><ul><ul><li>Check it regularly – you can get a free copy of the report once every 12 months </li></ul></ul><ul><ul><ul><li>Review them carefully; check the inquiries companies are making, look for new accounts, and anything that just looks odd. </li></ul></ul></ul><ul><ul><li>To stop identity thieves consider place a fraud alert on your account with all three of the bureaus </li></ul></ul><ul><ul><li>You have rights: </li></ul></ul><ul><ul><ul><li>FTC Website: </li></ul></ul></ul><ul><ul><ul><ul><li>http://www.ftc.gov/bcp/edu/microsites/idtheft/consumers/deter-detect-defend.html </li></ul></ul></ul></ul><ul><ul><ul><li>Identity Theft Resource Center: http://www.idtheftcenter.org/ </li></ul></ul></ul>
    4. 4. Secure Passwords <ul><li>Make it difficult to figure out </li></ul><ul><li>Don’t place it on a note on the back of your keyboard or in your desk drawer </li></ul><ul><li>A good password is: </li></ul><ul><ul><li>8 characters long </li></ul></ul><ul><ul><li>Has no personal information </li></ul></ul><ul><ul><li>Does not use real words </li></ul></ul><ul><ul><li>Mixes upper and lower case characters and numbers </li></ul></ul><ul><ul><li>Something you change regularly (every 30 to 60 days) </li></ul></ul><ul><li>Tools to Generate Safer Passwords: </li></ul><ul><ul><li>PC Tools Secure Password Generator: </li></ul></ul><ul><ul><li>http://www.pctools.com/guides/password/ </li></ul></ul><ul><ul><li>Random Password Generator: http://www.randpass.com/ </li></ul></ul><ul><ul><li>Bytes Interactive Password Generator: </li></ul></ul><ul><ul><li>http://www.goodpassword.com/ </li></ul></ul>
    5. 5. Don’t Open that Email <ul><li>Unless you know who it is from </li></ul><ul><li>Read the subject lines before opening, even if you think you know the person sending the message </li></ul><ul><li>Turn off your preview window </li></ul><ul><li>Make sure your antivirus and antispam software is updated regularly. </li></ul>
    6. 6. Buyer Beware – Shopping and Banking Online <ul><li>Make sure you know who you are doing business with, then ask a few questions: </li></ul><ul><ul><li>Are they reputable? </li></ul></ul><ul><ul><li>Is their site secure? </li></ul></ul><ul><ul><li>Is there a physical address and phone number on the site? </li></ul></ul><ul><ul><li>Does the URL start with https: and have a picture of a lock in the broswers status bar? </li></ul></ul><ul><ul><li>What is the companies return policy? </li></ul></ul><ul><li>Research a little…can you find online reviews of the company? </li></ul><ul><li>Pay with a credit card to limit your liability. </li></ul>
    7. 7. Keep Your Software and Hardware Current <ul><li>Firewalls </li></ul><ul><li>Virus Protection </li></ul><ul><li>Browser Updates </li></ul><ul><li>Operating System Updates </li></ul><ul><li>Application Software Updates </li></ul><ul><li>Run your anti-virus scan and other security software regularly (weekly or more) to catch the bad things before they make your computer “sick” or lose your identity. </li></ul>
    8. 8. Phishing and Pharming…not a sport or hobby <ul><li>Scams: </li></ul><ul><ul><li>Phishing is where the perpetrator sends out legitimate-looking emails appearing to come from a your bank, government, paypal, BestBuy, IRS, etc. in an effort to get you to give them your personal and financial information. </li></ul></ul><ul><ul><li>Pharming is another scam where they get you to go to a website that looks like the real deal but isn’t, they then trick you into entering your information with the goal of stealing your identity and financial information. </li></ul></ul><ul><li>Social engineering…the bad stuff. </li></ul>
    9. 9. Backup Your Data <ul><li>A good backup helps when: </li></ul><ul><ul><li>A virus kills your hard drive </li></ul></ul><ul><ul><li>When your computer crashes </li></ul></ul><ul><ul><li>If your computer is stolen </li></ul></ul><ul><li>Backups safeguard what is important to you </li></ul><ul><ul><li>Pictures, Papers, Financial data, and Medical data </li></ul></ul><ul><li>The best backup method is to an external hard drive or large thumb drive </li></ul><ul><li>Take your backups and place them someplace safe </li></ul>
    10. 10. Disable Hidden File Extensions <ul><li>Know what you are about to open…file extensions tell you what the file is: </li></ul><ul><ul><li>.exe = Program files (might be a virus or a good program) </li></ul></ul><ul><ul><li>.jpg = Your pictures </li></ul></ul><ul><ul><li>.doc = Your term paper </li></ul></ul><ul><li>Some of the malicious and virus files masquerade as other files. </li></ul><ul><li>Know before you click! </li></ul>
    11. 11. Administrative Accounts…good in moderation <ul><li>Keep this account separate from your working account(s) </li></ul><ul><ul><li>Use this account for installing software or new hardware </li></ul></ul><ul><ul><li>Use an account specific to you for day-to-day work </li></ul></ul><ul><li>If you are logged in as an administrator and catch a bad computer bug…it now has administrator rights to your computer. </li></ul>
    12. 12. Think Safe and Green <ul><li>When you leave your computer on and your Internet access open, you're giving potential hackers more opportunities to break into your computer. </li></ul><ul><li>Always remember to turn off your Internet connection when you're not using it, and turn your computer off in between uses. </li></ul>
    13. 13. Clean Up…Before You Recycle <ul><li>If you donate, sell, through away your old computer wipe the hard disc clean with: </li></ul><ul><ul><li>Darik’s Boot and Nuke: http://dban.sourceforge.net/ </li></ul></ul><ul><ul><li>ShreditX: http://www.mireth.com/pub/sxme.html </li></ul></ul><ul><ul><li>DisposeSecure: http://www.east-tec.com/products/index.htm </li></ul></ul><ul><ul><li>Wipe Drive: http://www.wipemydrive.com/ </li></ul></ul><ul><li>Deleting and formatting your hard disc is not enough. </li></ul>
    14. 14. Questions.
    15. 15. Links and Suggestions <ul><li>Anti-Virus </li></ul><ul><ul><li>AVG Anti-Virus (Free): http://free.avg.com/ </li></ul></ul><ul><ul><li>Avast (Free): http://www.avast.com/eng/avast_4_home.html </li></ul></ul><ul><ul><li>Norton 360: ( http://shop.symantecstore.com/store/symnahho/en_US/DisplayProductDetailsPage/ThemeID.106300/productID.107120500?ClickID=blev1zugffvve11zqg6qknn6d6gfssfyng ) </li></ul></ul><ul><ul><li>McAfee: ( http://us.mcafee.com/root/landingpages/affLandPage.asp?affid=101&lpname=13072vsp&cid=37094 ) </li></ul></ul><ul><ul><li>2008 Anti-Virus Review ( http://www.2009softwarereviews.com/default.aspx?Refer=1GAS&Keyword=EantivirusSsoftware ) </li></ul></ul>
    16. 16. Links and Suggestions <ul><li>Spyware </li></ul><ul><ul><li>Spybot S&D (Free): ( http://www.safer-networking.org/en/index.html ) </li></ul></ul><ul><ul><li>PCTools: ( http://www.pctools.com/ ) </li></ul></ul><ul><ul><li>Windows Defender (Free): ( http://www.microsoft.com/downloads/details.aspx?familyid=435bfce7-da2b-4a6a-afa4-f7f14e605a0d&displaylang=en ) </li></ul></ul><ul><ul><li>Anti-Spyware Review 2008 </li></ul></ul><ul><ul><li>(http://anti-spyware-review.toptenreviews.com/ ) </li></ul></ul>
    17. 17. Contact Information <ul><li>Richard G. Bush, Ph. D. </li></ul><ul><li>Director, Undergraduate Management Programs </li></ul><ul><li>Lawrence Technological University </li></ul><ul><li>[email_address] </li></ul><ul><li>248-204-3078 </li></ul>

    ×