Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
Upcoming SlideShare
What to Upload to SlideShare
Next
Download to read offline and view in fullscreen.

0

Share

NEFLIN: Internet Safety: How Not to be Hacked...Keeping Safe in the Digital World

Download to read offline

Malware, Phishing, Hacking, Ransomware - oh my! Learn about the threats to you, your users and your library. During this session, we will explore the threats to online security and discuss practical solutions that can be implemented at any level. Most importantly, we will look at how we can educate our users on current threats and safety tips.

Related Books

Free with a 30 day trial from Scribd

See all

Related Audiobooks

Free with a 30 day trial from Scribd

See all
  • Be the first to like this

NEFLIN: Internet Safety: How Not to be Hacked...Keeping Safe in the Digital World

  1. 1. Internet Safety: How Not to be Hacked... Keeping Safe in the Digital World
  2. 2. Agenda • Malware & Ransomware • General Tips • Phishing • Mobile Devices • Wi-Fi • Scareware & Fraudulent Calls • Hacking • Protecting Your Library’s Network 2
  3. 3. “ http://www.pewinternet.org/quiz/cybersecurity- knowledge/ Let’s Take a Quiz!
  4. 4. 4 Image Pew Research
  5. 5. Terms to Define
  6. 6. “ Hacking 6
  7. 7. “ Malware 7
  8. 8. “ Ransomware 8
  9. 9. Image: https://www.pcmag.com 9
  10. 10. General Tips 10
  11. 11. 1. Updating
  12. 12. What should you update? • Operating System • Browsers • Software • Router • Printers 12
  13. 13. 1. Passwords
  14. 14. HAVE YOU ALREADY HAD YOUR PASSWORD STOLEN? HTTPS://HAVEIBEENPWNED.COM/ 14
  15. 15. What’s a good Password? A. H311o B. Today2morrowandn3xt C. Password D. Mydog E. 2j4QL0T8jwEb 15
  16. 16. What Makes a good password? • Think phrases • Use with Capitalization • Use numbers • Use punctuation • DON’T REPEAT PASSWORDS 16
  17. 17. Password Managers • Browsers • LastPass • Norton • Dashlane 17
  18. 18. 2 Step Authentication 18
  19. 19. BIOMETRICS? ARE THEY THE FUTURE? 19
  20. 20. Security questions and backup contact information 20
  21. 21. Phishing 21
  22. 22. “ 22 What is phishing?
  23. 23. More examples: https://www.edts.com/edts-blog/15-examples-of-phishing-emails-from-2016-2017
  24. 24. Sketchy Websites • Offering Free Downloads • Offering Something that Should Not Be Available
  25. 25. Recognize the Signs of a Phishing Scam • Sense Of Urgency!! • Click to Learn More • Unexpected Refunds/Communication • Evaluate the Email Address • Evaluate the Links • Unexpectedly need to login? • IRS will NEVER send emails Simulated Phishing http://info.Phishme.Com/phishme-free
  26. 26. Weary of an email • Go directly to the website, don’t click • Call the company • Report the email (mark as SPAM) Example from Komando.com
  27. 27. What do they want? • Malware • Hacked Information • Ransomware 29
  28. 28. Mobile Devices 30
  29. 29. Use A Passcode Or A Pattern 31 Images with tips: Gadget Hacks Google Keypad Lock Screen App
  30. 30. Be Smart About Apps • Trustworthy • Evaluate Permissions • Delete Unwanted Apps • Download a good security app (Android /iOS 32More at ZDNET
  31. 31. “ 33 “Google removed over 700,000 malicious apps from the Play Store in 2017” Quote and more: https://securityaffairs.co https://www.androidcentral.com
  32. 32. KEEP YOUR OS UP TO DATE Apple: iOS 11.4.1 Android: Oreo 8.1
  33. 33. Wi-Fi 35
  34. 34. PUBLIC WI-FI • Public Wi-Fi Threats • Fake Networks • People “Sniffing” The Traffic • Create Your Own VPN
  35. 35. Your Library’s Wi-fi • Update Firmware On Your Router • Change Default Names And Passwords (Don’t Use An Actual Staff Members Email) • Encrypt Your Network • Use the Latest Encryption • Secure Your Peripherals
  36. 36. Scareware & Fraudulent Calls 38
  37. 37. Scareware Image Source and how to remove Malware Help
  38. 38. Evaluate the threat Some known Fake Anti-virus software names • AntiVir • AntiSpywarePro • Antivirus Plus • Antivirus Soft • Antivirus XP • Internet Security 2010 • Malware Defense • Security Central • Security Tool • Winweb Security • XP Antivirus List of Alias from: https://www.cgsinc.com/blog/how-to-identify-a-malicious-email-6-tips
  39. 39. What is scareware & Fraudulent calls? • Pop-ups Scaring User The They Have A Virus • Calls From A “Support Center”
  40. 40. How to Remove • Do not click on the pop-up at all. Use Alt- Control-Delete to close window • Clear Browser History • Change Default Home Page • Remove Programs and Files • Remove Add-ons from Browser • Download a legitimate program and run
  41. 41. Some protection options • Malwarebytes • AVG • Windows Defender More at TechRadar
  42. 42. Social Media 44
  43. 43. What Happens When Social Media Is Hacked? • Post content • Login to other sites • Make Purchases • Post as You on Pages, Sites you Manage and your friends’ pages • Post malware & phishing links on your page • Send scams to your friends in your name 45
  44. 44. What does it mean? What can they do? Read the following: karakamienskiphotography.com/when-life-gives-you-lemons 46
  45. 45. Ways A Social Media Hacks Happen • Unexpected Friend Requests • Unsecure Passwords • Open Devices • Phishing 47
  46. 46. What Now? • Change Your Password • Review Your Activity And Delete As Needed • Review & Remove Suspicious Apps (Settings > Apps >Show All) • Enable Login Notification (Settings > Security > Login Notification) 48
  47. 47. Prevention • 2-step Authentication • Secure Passwords • Watch Where You Login • Evaluate Apps/Sites you give permissions too 49
  48. 48. Trusted Contacts & More • Who Are Your Trusted Contacts? • What Is A Trusted Contact? • Who Should They Be? 50https://www.facebook.com/settings?tab=security&view
  49. 49. Who Is The Admin Of Your Library Site? • Multiple Admins/Editors • Using Fake Accounts As The Main Admin 51
  50. 50. Internet of Things • Unique Passwords • Update Firmware 52
  51. 51. “ 53 There are no security standards of the Internet of Things. Often, devices focus on convenience over security.
  52. 52. Protecting Your Library’s Network 54
  53. 53. Creating a Checklist: Discuss & Document  Creating Policies To Enforce Best Practices  Who Has Admin Rights?  USB Blockers For Public Computers 55
  54. 54. Checklist Continued  Passwords:  refuse compromised passwords  Force Strength  Force Changing  Software And Firmware Updates  What is the main account’s Email? 56
  55. 55. ✓ What is the Policy for Leaving Employees 57
  56. 56. HTTP v. HTTPS 58
  57. 57. Helping Users be Secure 59
  58. 58. Great Marketing Materials • Homeland Security: dhs.Gov/stopthinkconnect • Pew Internet: pewinternet.Org/quiz/cybersecurity- knowledge • Cyberwise: cyberwise.Org/ • Netsmartz: netsmartz.Org/educators • Collection of Flyers: pinterest.com/dee987/internet- safety 60
  59. 59. LightBeam ▪ https://addons.mozilla.org/en-GB/firefox/addon/lightbeam
  60. 60. Have Them Take The Quiz http://www.pewinternet.org/quiz/cybersecurity-knowledge/ 62
  61. 61. What Tips Do You Have? ▪ If you want to buy an app, use a gift card!! ▪ Don't click the articles in the Facebook feed. that usually takes u 20 clicks to get the end.. it is click bait and can cause Issues ▪ get amazon credit card instead of using regular credit card
  62. 62. Resource list • Android Users to Avoid Malware, Try the F-Droid App Store, Wired • Best VPN Services PC Magazine • 5 Ways to Check Who is Tracking You Online • 7 Types of Ransomware • Don't Feed the Phish • How to Identify a Malicious Email 6 Tips • Five Phishing Trends to look for in 2018 • Security News This Week: Google Pulls 60 Malicious Apps …
  63. 63. Your Challenge • Back up data on all devices • Update to the latest software • Clear your browser cache • Update Passwords/Run a Security Challenge • Check Social Media Permissions
  64. 64. DIANA SILVEIRA NOVARE LIBRARY SERVICES FACEBOOK.COM/NOVARELIBRARY SLIDESHARE.NET/DEE987 DIANA@NOVARELIBRARY.COM
  65. 65. Credits ▪ Presentation template by SlidesCarnival 68

Malware, Phishing, Hacking, Ransomware - oh my! Learn about the threats to you, your users and your library. During this session, we will explore the threats to online security and discuss practical solutions that can be implemented at any level. Most importantly, we will look at how we can educate our users on current threats and safety tips.

Views

Total views

320

On Slideshare

0

From embeds

0

Number of embeds

51

Actions

Downloads

4

Shares

0

Comments

0

Likes

0

×