Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Security Basics Webinar

955 views

Published on

When you have computers connected to the internet or to any external device, you need to take precautions. There are threats present that can not only cause harm to your computers, but could damage files on your network or potentially put sensitive data at risk. This free webinar will help you understand what the threats are and how your computers can get infected.

Published in: Education, Technology
  • Be the first to comment

  • Be the first to like this

Security Basics Webinar

  1. 1. Security Basics: Keep your Computers Safe October 28, 2010 Audio is only available by calling this number: Conference Call: 866-740-1260; Access Code: 6339392 Sponsored by
  2. 2. Using ReadyTalk <ul><li>Chat & raise hand </li></ul><ul><li>All lines are muted </li></ul><ul><li>If you lose your internet connection, reconnect using the link emailed to you. </li></ul><ul><li>If you lose your phone connection, re-dial the phone number and re-join. </li></ul><ul><li>ReadyTalk support: 800-843-9166 </li></ul>
  3. 3. You are being recorded… <ul><li>Streaming into Second Life </li></ul><ul><li>This seminar will be available on the TechSoup website along with past webinar presentations: </li></ul><ul><ul><li>www.techsoup.org/go/webinars </li></ul></ul><ul><li>You will receive a link to this presentation, material and links. </li></ul><ul><li>After the webinar, you can ask follow-up questions in our Community Forum: </li></ul><ul><ul><li>http://bit.ly/ts-sec </li></ul></ul><ul><li>Twitter hashtags: #techsoup </li></ul>
  4. 4. Security Basics: Keep your Computers Safe Presenter: Marian Merritt Sponsored by
  5. 5. We are working toward a time when every nonprofit and social benefit organization on the planet has the technology resources and knowledge they need to operate at their full potential.
  6. 6. Home page screen grab
  7. 7. Today’s Speakers Kami Griffiths TechSoup Global Marian Merritt Symantec Assisting with chat questions: Kevin Lo & Gary Lamontagne, TechSoup Global
  8. 8. Agenda <ul><li>Threat landscape </li></ul><ul><li>How do computers get infected </li></ul><ul><li>What is driving growth in malware </li></ul><ul><li>Staying safe </li></ul><ul><li>What to do if infected </li></ul><ul><li>Resources </li></ul>
  9. 9. Poll #1: Does your organization have an Acceptable Use Policy? <ul><li>Yes </li></ul><ul><li>No </li></ul>
  10. 10. Poll #2: Do you provide internet safety training for your employees and volunteers? <ul><li>Yes </li></ul><ul><li>No </li></ul>
  11. 11. Threat Landscape <ul><li>2/3 of adults globally have been victim of cybercrime: </li></ul><ul><li>Viruses/malware 51% </li></ul><ul><li>Online scams 10% </li></ul><ul><li>Phishing 9% </li></ul><ul><li>Social network hacking 7% </li></ul><ul><li>Online credit card fraud 7% </li></ul><ul><li>Sexual predation 7% </li></ul>
  12. 12. Types of Malware <ul><li>Virus – program that can spread from computer to another </li></ul><ul><li>Worm – virus that can spread on its own </li></ul><ul><li>Trojan – hidden in an offer of something good </li></ul><ul><li>Bot – robot network, remotely controlled by criminal </li></ul><ul><li>Keystroke logger – silently records valuable info and sends to criminal over the web </li></ul>
  13. 13. How Does This Happen? <ul><li>Dangerous links in email, IM, Twitter messages, Facebook and YouTube comments </li></ul><ul><li>Infected devices: USB sticks, disks, laptops, digital photo frames </li></ul><ul><li>Fake work at home schemes, online auctions, online dating </li></ul><ul><li>Phishing attacks, “spearphishing” </li></ul><ul><li>Fake antivirus pop-up alerts </li></ul><ul><li>Ex-employees using privileges to access systems </li></ul><ul><li>Skimming </li></ul>
  14. 14. Why The Rapid Growth in Malware? <ul><li>Underground cybercrime economy </li></ul><ul><li>Bigger business than international drug trade </li></ul><ul><li>Hackers with computer skills and desire for money </li></ul><ul><li>Organized online buy/sell of breached and stolen data </li></ul><ul><li>Low risk, high reward </li></ul>
  15. 15. Zeus Trojan - $70 million stolen from small business, non-profits
  16. 16. Huge growth in malware and new physical threats
  17. 17. How Do We Protect Ourselves? <ul><li>Internet Security (more than just AntiVirus) on all systems </li></ul><ul><li>Create culture of security in the organization (not us vs. them) </li></ul><ul><li>Explain the “why” to your employees so they can practice safe computing at home and with their families </li></ul><ul><li>Create security policy and enforce it </li></ul><ul><li>Separate systems where possible </li></ul><ul><li>Backup data in more than one form </li></ul><ul><li>Other suggestions: </li></ul><ul><ul><li>Web filtering </li></ul></ul><ul><ul><li>Enforce Safe Search settings </li></ul></ul>
  18. 18. Acceptable Use Policy Tips <ul><li>Created by IT and HR, approved by Legal </li></ul><ul><li>Identify restricted activities: (examples) </li></ul><ul><ul><li>Taking devices home </li></ul></ul><ul><ul><li>Accessing inappropriate websites like porn or online shopping </li></ul></ul><ul><ul><li>Installing software other than IT approved and provided </li></ul></ul><ul><ul><li>Conducting financial transactions </li></ul></ul><ul><ul><li>Email activities are for work-related only </li></ul></ul><ul><ul><li>Social networking activity </li></ul></ul><ul><li>Remind employees that email, IM and other activities are company property and monitored </li></ul><ul><li>Identify what happens if policy isn’t followed </li></ul>
  19. 19. When To Suspect Malware Infection <ul><li>Strange pop-ups ads </li></ul><ul><li>Hijacked browser </li></ul><ul><li>Slow computer </li></ul><ul><li>Antivirus isn’t working </li></ul><ul><li>Lots of activity when you aren’t doing anything </li></ul><ul><li>Strange icons in tool tray </li></ul><ul><li>Search isn’t working </li></ul><ul><li>Lots of bounced back email or sent email </li></ul>
  20. 20. What To Do If Infected? <ul><li>Report to IT </li></ul><ul><li>Determine scope of infection (device only, account only, network wide) </li></ul><ul><li>Determine availability of backup, restore points and other forms of restoring to a clean system </li></ul><ul><li>Proceed to identify and remove malware </li></ul><ul><ul><li>Scan with security software, remove or quarantine malware </li></ul></ul><ul><ul><li>Use more powerful malware removal tools from Norton, Microsoft, etc </li></ul></ul><ul><li>Determine how the infection occurred and communicate to team </li></ul><ul><li>Contact financial institutions or other impacted organizations for further assistance </li></ul>
  21. 21. Social Network Risks <ul><li>Dangerous links and hacked accounts </li></ul><ul><li>Sharing information incorrectly </li></ul><ul><li>Inappropriate photos and videos </li></ul><ul><li>Violating acceptable use policy by displaying offensive imagery, language, sharing jokes, etc </li></ul>
  22. 22. Resources <ul><li>Symantec Security Response Blog </li></ul><ul><li>Norton Family Resource website </li></ul><ul><ul><li>Free booklets on online safety </li></ul></ul><ul><li>Every Click Matters website </li></ul><ul><li>Microsoft and Norton malware removal tools: </li></ul><ul><ul><li>Norton Power Eraser </li></ul></ul><ul><li>Federal Trade Commission </li></ul><ul><li>Nat’l Cyber Security Association </li></ul>
  23. 23. Wrap Up <ul><li>Malware – what is it, where does it come from, how to stay safe </li></ul><ul><li>Cybercriminals – how do they work </li></ul><ul><li>What to do if you get infected </li></ul><ul><li>Acceptable Use Policies </li></ul><ul><li>Additional Resources </li></ul><ul><li>Questions? Send me an email: marian@norton.com </li></ul>
  24. 24. Questions? Submit your questions using the chat box.
  25. 25. Continue the Discussion… <ul><li>Additional questions can be answered by posting in in our Community Forum: </li></ul><ul><ul><li>http://bit.ly/ts-sec </li></ul></ul>
  26. 26. Upcoming Webinars <ul><li>Is FileMaker Right for Your Organization? </li></ul><ul><ul><li>Thursday, November 18, 11 a.m. </li></ul></ul><ul><li>Manage your Data, Donations and More with CiviCRM </li></ul><ul><ul><li>Tuesday, November 23, 11 a.m. </li></ul></ul>
  27. 27. Thank you to our Webinar Sponsor! ReadyTalk offers dedicated product demos for TechSoup organizations 4 times per week. For more information: pages.readytalk.com/techsoup.html
  28. 28. Thank you! Please complete the post event survey! Kami Griffiths, kami@techsoup.org, 415-633-9392

×