SlideShare a Scribd company logo
1 of 31
Phillip Schneider
Information Services Librarian
Gail Borden Public Library District
Cybersecurity: Keeping Your
Computers & Devices Safe
• What is a Virus
• Antivirus Software
• Web Browsers
• Passwords
• Safe Internet Use
• Upgrading/Updating
• Backup
Agenda
Searching through ads
What is a Virus
A malicious set of code meant to harm you and
your computer
Types of Viruses
• Basic Virus
• E-mail viruses
• Spyware
• Trojan Horses
• Worms
What is a Virus?
Viruses can…
• Record your keyboard strokes
• Break/Damage your computer
• Hold your files hostage
• Use your processing power
• Steal/copy your files
• Steal other important information such as
passwords, credit card numbers, etc.
What Can a Virus Do?
Searching through ads
Antivirus Software
Free Antivirus
• Defender (built into windows 8 and up)
• Avast
• AVG
• Panda Security
Paid Antivirus
• Kaspersky
• BitDefender Plus
• Norton
• McAfee
Antivirus Software (Windows)
Free Antivirus
• Defender (built
into windows 8
and up)
• Avast
• AVG
• Panda Security
Paid Antivirus
• Kaspersky
• BitDefender Plus
• Norton
• McAfee
Antivirus Software (Windows)
Add best for mac
Add comparision
from free to paid
Secondary Defense
• Malwarebytes
• Spybot
• Microsoft Malicious Software Removal Tool
Fire Wall
• Window Firewall
• Kaspersky/Norton firewall
• ZoneAlarm Free Firewall
• Comodo Firewall(free)
• Tiny Wall (in addition to Windows firewall free)
Antivirus Software (Windows)
Secondary Defense
• Malwarebytes
• Spybot
• Microsoft Malicious
Software Removal Tool
Fire Wall
• Window Firewall
• Kaspersky/Norton firewall
• ZoneAlarm Free Firewall
• Comodo Firewall(free)
• Tiny Wall (in addition to
Windows firewall free)
Antivirus Software (Windows)
Add best for mac
Add comparision
from free to paid
Show how to configure Windows Firewall
Show how to configure Mac OSX firewall
Antivirus Software (Windows)
Searching through ads
Web Browsers
Safest Browsers
1. Google Chrome
2. Fire Fox
3. Windows Edge/Safari (Mac only)
4. Opera
Browser Extensions for Privacy
• Ghostery
• Adblocker Plus
• ScriptSafe/NoScript
• Disconnect
Web Browsers
Complete Privacy
• Purchase a VPN (Virtual Private Network)
 Encrypts your internet Data
 Private web browsing, downloading, and uploading
 Can not be tracked
VPNs
• NordVPN
• Hotspot Shield Elite
• Spotflux Premium VPN
• Express VPN
 Typical cost $5-$15 per month
Web Browsers
Searching through ads
Passwords
Create a Strong Password
• Use a minimum of 8 characters
• Use a long string of words
• Add numbers, symbols (IE: !@#$), upper and
lowercase letters
Examples
• Thi$wou!dbeGood
• Dogs&cAtsrocK!
• 2Fast2cAtch!?
Passwords
Best Password Practices
• Never use the same password for multiple
accounts
• Write down passwords do not save them on
your computer
• For highest security never let your browser save
your password
Passwords
Searching through ads
Safe Internet Use
Safe Internet Use
Question before proceeding
• Is this a well know site?
• Have I used this site safely before?
• Does this site make me feel uncomfortable?
• Is this site asking for things I don’t want to share?
• Do I have a reason to trust this site?
Safe Internet Use
Use Safe Practices
• Only download from the companies website
• Do not click on popups
• Do not give private information unless you are
making a purchase from a trusted site.
 Use Paypal for the most secure transactions
 Use http://www.scamadviser.com/ to check online
retailers
Safe Internet Use
Safe Internet Use
Email
• Only open mail from known email addresses
• If your friend’s email sounds strange they were likely
hacked
• Only download or click on links from trusted emails
• Use a complicated Password to protect your email
• If an email asks for personal information delete it
• If an email seems sketchy google the text to see if it
is a scam.
Safe Internet Use
Email
Get emails alerts
and check on
latest
Scams
• https://www.consumer.ftc.gov/scam-alerts
Safe Internet Use
Searching through ads
Upgrading/Updating
Upgrading a current computer
• Avoid using unsupported Operating system
(example: Windows XP)
• When possible upgrade to the newest operating
system available for your device
• Always update your operating system, apps, and
programs. This will keep your computer as secure as
possible.
• Set your computer to automatically update to keep
up to date easily.
Upgrading/Updating
Searching through ads
Backup
Cloud Storage
Backup
One Drive
iCloud Google Drive
Drop Box Amazon Cloud Drive
Physical Back up
• Backup up important files to an external Hard drive
or large Flash drive often (manually)
• Windows backup and restore
• Android/iOS backup
• Periodically create restore points (Windows)
Paid backup
• Nova Backup
• Acronis Backup
• Genie Backup
Backup
Physical Back up
• Backup up important files
to an external Hard drive
or large Flash drive often
(manually)
• Windows backup and
restore
• Android/iOS backup
• Periodically create restore
points (Windows)
Paid backup
• Nova Backup
• Acronis Backup
• Genie Backup
Backup
add in physical back up
brands
Add in comparison
Add in size estimates
Cloud vs physical
Programs vs manually
Company vs do it
yourself
THANKS FOR COMING!
Questions?

More Related Content

Similar to Cybersecurity Essentials

Personal Internet Security Practice
Personal Internet Security PracticePersonal Internet Security Practice
Personal Internet Security PracticeBrian Pichman
 
11 Computer Privacy
11 Computer Privacy11 Computer Privacy
11 Computer PrivacySaqib Raza
 
Users awarness programme for Online Privacy
Users awarness programme for Online PrivacyUsers awarness programme for Online Privacy
Users awarness programme for Online PrivacyKazi Sarwar Hossain
 
Iron Bastion: How to Manage Your Clients' Data Responsibly
Iron Bastion: How to Manage Your Clients' Data ResponsiblyIron Bastion: How to Manage Your Clients' Data Responsibly
Iron Bastion: How to Manage Your Clients' Data ResponsiblyGabor Szathmari
 
It security in healthcare
It security in healthcareIt security in healthcare
It security in healthcareNicholas Davis
 
Viruses & security threats
Viruses & security threatsViruses & security threats
Viruses & security threatswardjo
 
Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety Sadaf Walliyani
 
Cyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-ProCyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-ProRonald Soh
 
How To Protect From Malware
How To Protect From MalwareHow To Protect From Malware
How To Protect From MalwareINFONAUTICS GmbH
 
Cyber security for small businesses
Cyber security for small businessesCyber security for small businesses
Cyber security for small businessesB2BPlanner Ltd.
 
Internet Security
Internet SecurityInternet Security
Internet Securitymjelson
 
Virus Precautions
Virus PrecautionsVirus Precautions
Virus PrecautionsBilal Arif
 
Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Abzetdin Adamov
 
Secure Yourself, Practice what we preach - BSides Austin 2015
Secure Yourself, Practice what we preach - BSides Austin 2015Secure Yourself, Practice what we preach - BSides Austin 2015
Secure Yourself, Practice what we preach - BSides Austin 2015Michael Gough
 
Enterprise security: ransomware in enterprise and corporate entities
Enterprise security: ransomware in enterprise and corporate entitiesEnterprise security: ransomware in enterprise and corporate entities
Enterprise security: ransomware in enterprise and corporate entitiesQuick Heal Technologies Ltd.
 
Online access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.GauthamOnline access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.GauthamJoelGautham
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02amiinaaa
 
019. SAFELY ACCESSING WEBSITE .pdf
019. SAFELY ACCESSING WEBSITE .pdf019. SAFELY ACCESSING WEBSITE .pdf
019. SAFELY ACCESSING WEBSITE .pdfJeevithaG22
 

Similar to Cybersecurity Essentials (20)

Personal Internet Security Practice
Personal Internet Security PracticePersonal Internet Security Practice
Personal Internet Security Practice
 
11 Computer Privacy
11 Computer Privacy11 Computer Privacy
11 Computer Privacy
 
Users awarness programme for Online Privacy
Users awarness programme for Online PrivacyUsers awarness programme for Online Privacy
Users awarness programme for Online Privacy
 
Iron Bastion: How to Manage Your Clients' Data Responsibly
Iron Bastion: How to Manage Your Clients' Data ResponsiblyIron Bastion: How to Manage Your Clients' Data Responsibly
Iron Bastion: How to Manage Your Clients' Data Responsibly
 
It security in healthcare
It security in healthcareIt security in healthcare
It security in healthcare
 
Viruses & security threats
Viruses & security threatsViruses & security threats
Viruses & security threats
 
Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety
 
Computer security
Computer securityComputer security
Computer security
 
Internet
InternetInternet
Internet
 
Cyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-ProCyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-Pro
 
How To Protect From Malware
How To Protect From MalwareHow To Protect From Malware
How To Protect From Malware
 
Cyber security for small businesses
Cyber security for small businessesCyber security for small businesses
Cyber security for small businesses
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Virus Precautions
Virus PrecautionsVirus Precautions
Virus Precautions
 
Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....
 
Secure Yourself, Practice what we preach - BSides Austin 2015
Secure Yourself, Practice what we preach - BSides Austin 2015Secure Yourself, Practice what we preach - BSides Austin 2015
Secure Yourself, Practice what we preach - BSides Austin 2015
 
Enterprise security: ransomware in enterprise and corporate entities
Enterprise security: ransomware in enterprise and corporate entitiesEnterprise security: ransomware in enterprise and corporate entities
Enterprise security: ransomware in enterprise and corporate entities
 
Online access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.GauthamOnline access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.Gautham
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
 
019. SAFELY ACCESSING WEBSITE .pdf
019. SAFELY ACCESSING WEBSITE .pdf019. SAFELY ACCESSING WEBSITE .pdf
019. SAFELY ACCESSING WEBSITE .pdf
 

Recently uploaded

Call US 📞 9892124323 ✅ Kurla Call Girls In Kurla ( Mumbai ) secure service
Call US 📞 9892124323 ✅ Kurla Call Girls In Kurla ( Mumbai ) secure serviceCall US 📞 9892124323 ✅ Kurla Call Girls In Kurla ( Mumbai ) secure service
Call US 📞 9892124323 ✅ Kurla Call Girls In Kurla ( Mumbai ) secure servicePooja Nehwal
 
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptxFinTech Belgium
 
The Economic History of the U.S. Lecture 19.pdf
The Economic History of the U.S. Lecture 19.pdfThe Economic History of the U.S. Lecture 19.pdf
The Economic History of the U.S. Lecture 19.pdfGale Pooley
 
Stock Market Brief Deck (Under Pressure).pdf
Stock Market Brief Deck (Under Pressure).pdfStock Market Brief Deck (Under Pressure).pdf
Stock Market Brief Deck (Under Pressure).pdfMichael Silva
 
The Economic History of the U.S. Lecture 17.pdf
The Economic History of the U.S. Lecture 17.pdfThe Economic History of the U.S. Lecture 17.pdf
The Economic History of the U.S. Lecture 17.pdfGale Pooley
 
The Economic History of the U.S. Lecture 26.pdf
The Economic History of the U.S. Lecture 26.pdfThe Economic History of the U.S. Lecture 26.pdf
The Economic History of the U.S. Lecture 26.pdfGale Pooley
 
05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx
05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx
05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptxFinTech Belgium
 
High Class Call Girls Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
High Class Call Girls Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsHigh Class Call Girls Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
High Class Call Girls Nagpur Grishma Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
The Economic History of the U.S. Lecture 20.pdf
The Economic History of the U.S. Lecture 20.pdfThe Economic History of the U.S. Lecture 20.pdf
The Economic History of the U.S. Lecture 20.pdfGale Pooley
 
The Economic History of the U.S. Lecture 23.pdf
The Economic History of the U.S. Lecture 23.pdfThe Economic History of the U.S. Lecture 23.pdf
The Economic History of the U.S. Lecture 23.pdfGale Pooley
 
Dividend Policy and Dividend Decision Theories.pptx
Dividend Policy and Dividend Decision Theories.pptxDividend Policy and Dividend Decision Theories.pptx
Dividend Policy and Dividend Decision Theories.pptxanshikagoel52
 
03_Emmanuel Ndiaye_Degroof Petercam.pptx
03_Emmanuel Ndiaye_Degroof Petercam.pptx03_Emmanuel Ndiaye_Degroof Petercam.pptx
03_Emmanuel Ndiaye_Degroof Petercam.pptxFinTech Belgium
 
The Economic History of the U.S. Lecture 21.pdf
The Economic History of the U.S. Lecture 21.pdfThe Economic History of the U.S. Lecture 21.pdf
The Economic History of the U.S. Lecture 21.pdfGale Pooley
 
High Class Call Girls Nashik Maya 7001305949 Independent Escort Service Nashik
High Class Call Girls Nashik Maya 7001305949 Independent Escort Service NashikHigh Class Call Girls Nashik Maya 7001305949 Independent Escort Service Nashik
High Class Call Girls Nashik Maya 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Instant Issue Debit Cards - School Designs
Instant Issue Debit Cards - School DesignsInstant Issue Debit Cards - School Designs
Instant Issue Debit Cards - School Designsegoetzinger
 
06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf
06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf
06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdfFinTech Belgium
 
Booking open Available Pune Call Girls Wadgaon Sheri 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Wadgaon Sheri  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Wadgaon Sheri  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Wadgaon Sheri 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130
VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130
VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130Suhani Kapoor
 

Recently uploaded (20)

Call US 📞 9892124323 ✅ Kurla Call Girls In Kurla ( Mumbai ) secure service
Call US 📞 9892124323 ✅ Kurla Call Girls In Kurla ( Mumbai ) secure serviceCall US 📞 9892124323 ✅ Kurla Call Girls In Kurla ( Mumbai ) secure service
Call US 📞 9892124323 ✅ Kurla Call Girls In Kurla ( Mumbai ) secure service
 
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx
 
The Economic History of the U.S. Lecture 19.pdf
The Economic History of the U.S. Lecture 19.pdfThe Economic History of the U.S. Lecture 19.pdf
The Economic History of the U.S. Lecture 19.pdf
 
Stock Market Brief Deck (Under Pressure).pdf
Stock Market Brief Deck (Under Pressure).pdfStock Market Brief Deck (Under Pressure).pdf
Stock Market Brief Deck (Under Pressure).pdf
 
The Economic History of the U.S. Lecture 17.pdf
The Economic History of the U.S. Lecture 17.pdfThe Economic History of the U.S. Lecture 17.pdf
The Economic History of the U.S. Lecture 17.pdf
 
The Economic History of the U.S. Lecture 26.pdf
The Economic History of the U.S. Lecture 26.pdfThe Economic History of the U.S. Lecture 26.pdf
The Economic History of the U.S. Lecture 26.pdf
 
05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx
05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx
05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx
 
High Class Call Girls Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
High Class Call Girls Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsHigh Class Call Girls Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
High Class Call Girls Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
 
The Economic History of the U.S. Lecture 20.pdf
The Economic History of the U.S. Lecture 20.pdfThe Economic History of the U.S. Lecture 20.pdf
The Economic History of the U.S. Lecture 20.pdf
 
The Economic History of the U.S. Lecture 23.pdf
The Economic History of the U.S. Lecture 23.pdfThe Economic History of the U.S. Lecture 23.pdf
The Economic History of the U.S. Lecture 23.pdf
 
Dividend Policy and Dividend Decision Theories.pptx
Dividend Policy and Dividend Decision Theories.pptxDividend Policy and Dividend Decision Theories.pptx
Dividend Policy and Dividend Decision Theories.pptx
 
03_Emmanuel Ndiaye_Degroof Petercam.pptx
03_Emmanuel Ndiaye_Degroof Petercam.pptx03_Emmanuel Ndiaye_Degroof Petercam.pptx
03_Emmanuel Ndiaye_Degroof Petercam.pptx
 
The Economic History of the U.S. Lecture 21.pdf
The Economic History of the U.S. Lecture 21.pdfThe Economic History of the U.S. Lecture 21.pdf
The Economic History of the U.S. Lecture 21.pdf
 
High Class Call Girls Nashik Maya 7001305949 Independent Escort Service Nashik
High Class Call Girls Nashik Maya 7001305949 Independent Escort Service NashikHigh Class Call Girls Nashik Maya 7001305949 Independent Escort Service Nashik
High Class Call Girls Nashik Maya 7001305949 Independent Escort Service Nashik
 
Instant Issue Debit Cards - School Designs
Instant Issue Debit Cards - School DesignsInstant Issue Debit Cards - School Designs
Instant Issue Debit Cards - School Designs
 
06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf
06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf
06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf
 
(Vedika) Low Rate Call Girls in Pune Call Now 8250077686 Pune Escorts 24x7
(Vedika) Low Rate Call Girls in Pune Call Now 8250077686 Pune Escorts 24x7(Vedika) Low Rate Call Girls in Pune Call Now 8250077686 Pune Escorts 24x7
(Vedika) Low Rate Call Girls in Pune Call Now 8250077686 Pune Escorts 24x7
 
Booking open Available Pune Call Girls Wadgaon Sheri 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Wadgaon Sheri  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Wadgaon Sheri  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Wadgaon Sheri 6297143586 Call Hot Ind...
 
VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130
VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130
VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130
 
Commercial Bank Economic Capsule - April 2024
Commercial Bank Economic Capsule - April 2024Commercial Bank Economic Capsule - April 2024
Commercial Bank Economic Capsule - April 2024
 

Cybersecurity Essentials

  • 1. Phillip Schneider Information Services Librarian Gail Borden Public Library District Cybersecurity: Keeping Your Computers & Devices Safe
  • 2. • What is a Virus • Antivirus Software • Web Browsers • Passwords • Safe Internet Use • Upgrading/Updating • Backup Agenda
  • 4. A malicious set of code meant to harm you and your computer Types of Viruses • Basic Virus • E-mail viruses • Spyware • Trojan Horses • Worms What is a Virus?
  • 5. Viruses can… • Record your keyboard strokes • Break/Damage your computer • Hold your files hostage • Use your processing power • Steal/copy your files • Steal other important information such as passwords, credit card numbers, etc. What Can a Virus Do?
  • 7. Free Antivirus • Defender (built into windows 8 and up) • Avast • AVG • Panda Security Paid Antivirus • Kaspersky • BitDefender Plus • Norton • McAfee Antivirus Software (Windows)
  • 8. Free Antivirus • Defender (built into windows 8 and up) • Avast • AVG • Panda Security Paid Antivirus • Kaspersky • BitDefender Plus • Norton • McAfee Antivirus Software (Windows) Add best for mac Add comparision from free to paid
  • 9. Secondary Defense • Malwarebytes • Spybot • Microsoft Malicious Software Removal Tool Fire Wall • Window Firewall • Kaspersky/Norton firewall • ZoneAlarm Free Firewall • Comodo Firewall(free) • Tiny Wall (in addition to Windows firewall free) Antivirus Software (Windows)
  • 10. Secondary Defense • Malwarebytes • Spybot • Microsoft Malicious Software Removal Tool Fire Wall • Window Firewall • Kaspersky/Norton firewall • ZoneAlarm Free Firewall • Comodo Firewall(free) • Tiny Wall (in addition to Windows firewall free) Antivirus Software (Windows) Add best for mac Add comparision from free to paid
  • 11. Show how to configure Windows Firewall Show how to configure Mac OSX firewall Antivirus Software (Windows)
  • 13. Safest Browsers 1. Google Chrome 2. Fire Fox 3. Windows Edge/Safari (Mac only) 4. Opera Browser Extensions for Privacy • Ghostery • Adblocker Plus • ScriptSafe/NoScript • Disconnect Web Browsers
  • 14. Complete Privacy • Purchase a VPN (Virtual Private Network)  Encrypts your internet Data  Private web browsing, downloading, and uploading  Can not be tracked VPNs • NordVPN • Hotspot Shield Elite • Spotflux Premium VPN • Express VPN  Typical cost $5-$15 per month Web Browsers
  • 16. Create a Strong Password • Use a minimum of 8 characters • Use a long string of words • Add numbers, symbols (IE: !@#$), upper and lowercase letters Examples • Thi$wou!dbeGood • Dogs&cAtsrocK! • 2Fast2cAtch!? Passwords
  • 17. Best Password Practices • Never use the same password for multiple accounts • Write down passwords do not save them on your computer • For highest security never let your browser save your password Passwords
  • 19. Safe Internet Use Question before proceeding • Is this a well know site? • Have I used this site safely before? • Does this site make me feel uncomfortable? • Is this site asking for things I don’t want to share? • Do I have a reason to trust this site?
  • 20. Safe Internet Use Use Safe Practices • Only download from the companies website • Do not click on popups • Do not give private information unless you are making a purchase from a trusted site.  Use Paypal for the most secure transactions  Use http://www.scamadviser.com/ to check online retailers
  • 22. Safe Internet Use Email • Only open mail from known email addresses • If your friend’s email sounds strange they were likely hacked • Only download or click on links from trusted emails • Use a complicated Password to protect your email • If an email asks for personal information delete it • If an email seems sketchy google the text to see if it is a scam.
  • 23. Safe Internet Use Email Get emails alerts and check on latest Scams • https://www.consumer.ftc.gov/scam-alerts
  • 26. Upgrading a current computer • Avoid using unsupported Operating system (example: Windows XP) • When possible upgrade to the newest operating system available for your device • Always update your operating system, apps, and programs. This will keep your computer as secure as possible. • Set your computer to automatically update to keep up to date easily. Upgrading/Updating
  • 28. Cloud Storage Backup One Drive iCloud Google Drive Drop Box Amazon Cloud Drive
  • 29. Physical Back up • Backup up important files to an external Hard drive or large Flash drive often (manually) • Windows backup and restore • Android/iOS backup • Periodically create restore points (Windows) Paid backup • Nova Backup • Acronis Backup • Genie Backup Backup
  • 30. Physical Back up • Backup up important files to an external Hard drive or large Flash drive often (manually) • Windows backup and restore • Android/iOS backup • Periodically create restore points (Windows) Paid backup • Nova Backup • Acronis Backup • Genie Backup Backup add in physical back up brands Add in comparison Add in size estimates Cloud vs physical Programs vs manually Company vs do it yourself

Editor's Notes

  1. source: for list of virus types http://computer.howstuffworks.com/virus.htm
  2. Based off of security tests and reviews http://www.browserscope.org/ http://tiptopsecurity.com/safest-web-browser-chrome-firefox-ie-opera-safari-comparison-chart/
  3. Example There are several options for those who want a physical backup of their files. Option one is to purchase a devices—such as an external hard drive or flash drive—and save the files to the device. Pros are that users include only a one-time cost; cons are that if your home computer gets fried, there’s a good likelihood your device may get fried as well. Option two is to pay for a backup service—such as Nova, Acronis, or Genie—to save your files for you. Pros are that you don’t have to worry about equipment; cons are that it may involve a monthly subscription cost.
  4. Example There are several options for those who want a physical backup of their files. Option one is to purchase a devices—such as an external hard drive or flash drive—and save the files to the device. Pros are that users include only a one-time cost; cons are that if your home computer gets fried, there’s a good likelihood your device may get fried as well. Option two is to pay for a backup service—such as Nova, Acronis, or Genie—to save your files for you. Pros are that you don’t have to worry about equipment; cons are that it may involve a monthly subscription cost.