SlideShare a Scribd company logo
1 of 46
Online Reputation
        &
 Internet Safety

    Microsoft Egypt
The Users of the Internet

• There is over 1.7 billion world wide user of the internet

• 1.7 Billion User World Wide

• 57.4 Million Arab Users

• 67.3 Million African users

• 13 million Egyptian Users
The Power of Social Media




•Social Network enjoy highest number of users, Facebook users reached 400 Million
Online Security Versus Online Safety

Safety: We must act in ways
that help protect us against
the risks that come with
Internet use.
Security: We must secure our
computers with technology in
the same way that we secure
the doors to our homes.
Online Reputation

 An online reputation is the publicly held social
evaluation of a person based on their behavior;
what they say, and what others say about them.
The effect of Online Reputation
o Can Online Reputation affect your employment
  potential?
o Can it affect your social life?

          Your Online Reputation
      can either benefit or harm you,
              it is your choice!
Online Reputation and professional life


• HR managers research job applicants online
• First impression and Reputation AT work is that AT
  your social network pages.
• You represent the company you work in online AT
  ALL times!
Online Reputation and Social life

   What you post on the internet affect you, your
             family and your friends.

• Your pictures and actions on the internet is a
  memory you will keep forever.
• How you behave online is a reflection on your
  values and your family.
• You affect the lives of your friends whenever you
  post anything about them on the internet.
Self Expression
How you express yourself on line reflects on who
you are, your family, your beliefs and your
country…

          Make your statements wisely
Abusive Emails
Take Responsibility!
Do not forward what you are not sure of!
Pranks can destroy lives
Hacking, is it worth the Risk?
PROTECT your online reputation


• Read the privacy policy of any site before
  sharing personal information online
• Use privacy settings on social networking sites
  that determine who can access and respond to
  your content
• Use the alert feature provided by some websites
  that automatically notifies you of any new
  mention of your name or other personal
  information
• Respect others privacy!
Enjoy private browsing with IE 9 Privacy
                Features

• InPrivate Browsing
• InPrivate Filtering
• Enhanced delete
  browsing history
      • Tab isolation
      • Crash recovery
Guard Your Reputation


• Express yourself and defend your position but don’t use any abusive
  language.
• Do not post anything in anger.
• Do not share personal Data, Personal information can put you at RISK!
• Remember your boss, your parents, and your future kids will see everything
  you are posting.



     REMEMBER WHAT IS POSTED ON THE INTERNET,
             STAYS ON THE INTERNET
Primary Threats to our information



                 Phishing
                 E-mail sent by online
                 criminals to trick you                        Spam
                 into going to fake Web
                 sites and revealing                           Unwanted e-
                 personal information                          mail, instant
                                                               messages,
                                                               and other online
                                                               communication
Identity Theft
A crime where con                Hoaxes
artists get your                 E-mail sent by online
personal information             criminals to trick you into
and access your cash             giving them money
and/or credit
Phishing sites
Scam emails
Identity theft
Primary Threats to Computer Security




Viruses/Worms
Software programs
designed to invade   Trojans
your computer, and   Viruses that pretend to be
copy, damage, or     helpful programs while
delete your data.    destroying your data,
                                                  Spyware
                     damaging your computer,      Software that tracks
                     and stealing your            your online activities or
                     personal information.        displays endless ads.
#1: Defend your computer.


Turn on Windows Internet firewall

Use Microsoft Update to keep Windows
up-to-date automatically
Install and maintain antivirus software

Install and maintain antispyware software
Turn on Windows Internet Firewall

                   Windows 7 Firewall
                   help protect your PC
                   from hackers and
                   malicious software.
                   It creates a
                   protective barrier
                   between your
                   computer and
                   the Internet
Use Automatic Updates to Keep
            Software Up-to-date
• Install all updates
  as soon as they
  are available
• Automatic updates provide the
  best protection
• Windows 7 Action Center
    The new Windows 7 Action
    Center in the Control Panel
    helps you make sure that your
    firewall is on, your antivirus
    software is up to date, and
    your computer is set to install
    updates automatically
Install and Maintain Antivirus Software
                        •   Antivirus software
                            helps to detect and
                            remove computer
                            viruses before they
                            can cause damage.
                        •   For antivirus software
                            to be effective, you
                            must keep it up-to-
  Don’t let it expire       date.
Install and Maintain Antispyware
                    software
Use antispyware software, like Microsoft Windows Defender, so
unknown software cannot track your online activity and potentially
steal your information.

• Windows 7 Defender include:
  – Spyware detection and removal
  – Improved Internet browsing safety
  – Protection against the latest threats
Microsoft Security Essentials
   Defend your computer against viruses, spyware, and other malware


• Microsoft Security Essentials is a free download for
  Windows 7 that helps protect your computer from
  viruses, spyware, worms, Trojans, and other malware.
   http://www.microsoft.com/security_essentials/default.aspx
#2: Protect sensitive data.
•   Think before you enter sensitive data
•   Be suspicious of attachments and links
•   Look out for scams and fraud
•   Create strong passwords
Think before you type.
• Look for https (the “s” is for secure)
• A closed padlock means secure, too
• Are there signs the site is trustworthy?
Think before you click.
• Be suspicious and aware of:
  – E-mail and IM attachments and links
  – Messages within social sites
The tricks that make you click.
•   Alarming messages
•   Misspellings and grammatical errors
•   Great deals
•   Requests for sensitive info
How to avoid the bait.
• Confirm that the message is real
• Type the Web address yourself
• Use a browser with safety features
Stay safer online with IE8
• Browse with more confidence knowing Internet Explorer 8
  helps protect you from evolving online threats right out of the
  box.
• According to a recent test by NSS Labs, Internet Explorer 8
  catches more than twice as much malware and is tied in
  phishing protection when compared to its closest
  competition.
IE 8 Smart Screen
• The SmartScreen
  filter is a set of
  technologies
  designed to help
  protect users from
  evolving web and
  social engineering
  threats.
IE 8 Safety Technology
• Cross Site Scripting (XSS) Filter




• Click-jacking prevention
• Domain highlighting



• Data Execution Prevention (DEP)
Passwords lock data doors.
• Keep them secret
• Change them often
• Make them strong
Which passwords are strong?
1. 555.12.999
2. 06/04/79
3. Exp3d!ti0us
4. Ambl!anc3
5. 135781113
6. MsAw3yOiD
And the answers are…


1. 555.12.999
2. 06/04/79
3. Exp3d!ti0us
4. Ambl!anc3
5. 135781113
6. MsAw3yOiD
#3 Protect devices on the go.
•   Do they have the latest protection?
•   Guard devices like you do your wallet
•   Don’t hand-carry sensitive data
•   Use caution if using a thumb drive in
    another computer
Windows 7 BitLocker Drive Encryption

• Windows 7BitLocker Drive Encryption help you protect your
  data from loss, theft, or hackers
   – BitLocker helps keep everything from documents to passwords safer
     by encrypting the entire drive that Windows and your data reside on.
   – BitLocker To Go—a new feature of Windows 7—gives the lockdown
     treatment to easily-misplaced portable storage devices like USB flash
     drives and external hard drives.
On the go: wireless hotspots.
• Connect securely
• Know who you’re connecting to
• Save sensitive uses for more trusted
  connections
Sometimes things go wrong.
• How do you know a PC is infected?
  – Your computer might run slowly
  – Or crash often
  – Or show other unusual behavior
What to do?


 Contact an IT Professional

 Contact the responsible authorities:
   NTRA hotline : 155
   Police Cyber Crime hotline : 108
Online reputation

More Related Content

What's hot

Internet security
Internet securityInternet security
Internet securityat1211
 
Online safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteOnline safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteAngelito Quiambao
 
Internet Threats
Internet ThreatsInternet Threats
Internet ThreatsRonalyn_Cao
 
Microsoft (Projects)
Microsoft (Projects)Microsoft (Projects)
Microsoft (Projects)Vinayak Hegde
 
Cyber crime introduction awareness program at st. xavier
Cyber crime introduction   awareness program at st. xavierCyber crime introduction   awareness program at st. xavier
Cyber crime introduction awareness program at st. xavierMo Han
 
Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri Moumita Chatterjee
 
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATSJazzyNF
 
Internet Threats
Internet ThreatsInternet Threats
Internet ThreatsLeelet1121
 
Online safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and EtiquetteOnline safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and EtiquetteDOFJLCCDD
 
IT Security DOs and DON'Ts
IT Security DOs and DON'Ts IT Security DOs and DON'Ts
IT Security DOs and DON'Ts Sophos
 
User's Guide to Online Privacy
User's Guide to Online PrivacyUser's Guide to Online Privacy
User's Guide to Online Privacycdunk12
 
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesOnline Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesMark Jhon Oxillo
 
Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual Jay Nagar
 
Tutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the WebTutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the Webdpd
 

What's hot (20)

Internet security
Internet securityInternet security
Internet security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Online safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteOnline safety, security, ethics & etiquette
Online safety, security, ethics & etiquette
 
Internet Threats
Internet ThreatsInternet Threats
Internet Threats
 
Microsoft (Projects)
Microsoft (Projects)Microsoft (Projects)
Microsoft (Projects)
 
Cyber crime introduction awareness program at st. xavier
Cyber crime introduction   awareness program at st. xavierCyber crime introduction   awareness program at st. xavier
Cyber crime introduction awareness program at st. xavier
 
Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri
 
INTERNET SAFETY FOR KIDS
INTERNET SAFETY FOR KIDSINTERNET SAFETY FOR KIDS
INTERNET SAFETY FOR KIDS
 
ACESnWS cyber security tips
ACESnWS cyber security tipsACESnWS cyber security tips
ACESnWS cyber security tips
 
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
 
Internet Threats
Internet ThreatsInternet Threats
Internet Threats
 
Online safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and EtiquetteOnline safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and Etiquette
 
IT Security DOs and DON'Ts
IT Security DOs and DON'Ts IT Security DOs and DON'Ts
IT Security DOs and DON'Ts
 
Cyber security
Cyber securityCyber security
Cyber security
 
User's Guide to Online Privacy
User's Guide to Online PrivacyUser's Guide to Online Privacy
User's Guide to Online Privacy
 
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesOnline Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
 
Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual
 
Securitytips
SecuritytipsSecuritytips
Securitytips
 
NewIinternet security
NewIinternet securityNewIinternet security
NewIinternet security
 
Tutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the WebTutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the Web
 

Similar to Online reputation

Microsoft protect ppt_ms_final
Microsoft protect ppt_ms_finalMicrosoft protect ppt_ms_final
Microsoft protect ppt_ms_final21_zaheer
 
Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Abzetdin Adamov
 
empowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationempowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationSheryldeVilla2
 
Cybersecurity awareness session.pptx
Cybersecurity awareness session.pptxCybersecurity awareness session.pptx
Cybersecurity awareness session.pptxUmaraZahidLecturer
 
Online access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.GauthamOnline access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.GauthamJoelGautham
 
Cyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-ProCyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-ProRonald Soh
 
Cybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptxCybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptxMustafa Amiri
 
Ethics and safety measures in Computing
Ethics and safety measures in ComputingEthics and safety measures in Computing
Ethics and safety measures in ComputingAnkit Malviya
 
Basic practices for information & computer security
Basic practices for information & computer securityBasic practices for information & computer security
Basic practices for information & computer securityPrajktaGN
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptxCharithraaAR
 
Viruses & security threats
Viruses & security threatsViruses & security threats
Viruses & security threatswardjo
 
csa2014 IBC
csa2014 IBCcsa2014 IBC
csa2014 IBCapyn
 
Cyber crime and security threads
Cyber crime and security threadsCyber crime and security threads
Cyber crime and security threadsVdidv
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber securityKaushal Solanki
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayane Hazimeh
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayane Hazimeh
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital AgeMarian Merritt
 

Similar to Online reputation (20)

Online reputation
Online reputationOnline reputation
Online reputation
 
Computer security
Computer securityComputer security
Computer security
 
Microsoft protect ppt_ms_final
Microsoft protect ppt_ms_finalMicrosoft protect ppt_ms_final
Microsoft protect ppt_ms_final
 
Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....
 
empowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationempowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentation
 
Cybersecurity awareness session.pptx
Cybersecurity awareness session.pptxCybersecurity awareness session.pptx
Cybersecurity awareness session.pptx
 
Online access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.GauthamOnline access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.Gautham
 
Cyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-ProCyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-Pro
 
Cybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptxCybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptx
 
Ethics and safety measures in Computing
Ethics and safety measures in ComputingEthics and safety measures in Computing
Ethics and safety measures in Computing
 
Basic Security Training for End Users
Basic Security Training for End UsersBasic Security Training for End Users
Basic Security Training for End Users
 
Basic practices for information & computer security
Basic practices for information & computer securityBasic practices for information & computer security
Basic practices for information & computer security
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptx
 
Viruses & security threats
Viruses & security threatsViruses & security threats
Viruses & security threats
 
csa2014 IBC
csa2014 IBCcsa2014 IBC
csa2014 IBC
 
Cyber crime and security threads
Cyber crime and security threadsCyber crime and security threads
Cyber crime and security threads
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital Age
 

Recently uploaded

Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Islamabad Escorts | Call 03274100048 | Escort Service in Islamabad
Islamabad Escorts | Call 03274100048 | Escort Service in IslamabadIslamabad Escorts | Call 03274100048 | Escort Service in Islamabad
Islamabad Escorts | Call 03274100048 | Escort Service in IslamabadAyesha Khan
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsApsara Of India
 
Catalogue ONG NUOC PPR DE NHAT .pdf
Catalogue ONG NUOC PPR DE NHAT      .pdfCatalogue ONG NUOC PPR DE NHAT      .pdf
Catalogue ONG NUOC PPR DE NHAT .pdfOrient Homes
 
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… AbridgedLean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… AbridgedKaiNexus
 
rishikeshgirls.in- Rishikesh call girl.pdf
rishikeshgirls.in- Rishikesh call girl.pdfrishikeshgirls.in- Rishikesh call girl.pdf
rishikeshgirls.in- Rishikesh call girl.pdfmuskan1121w
 
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...lizamodels9
 
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCRsoniya singh
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...lizamodels9
 
Banana Powder Manufacturing Plant Project Report 2024 Edition.pptx
Banana Powder Manufacturing Plant Project Report 2024 Edition.pptxBanana Powder Manufacturing Plant Project Report 2024 Edition.pptx
Banana Powder Manufacturing Plant Project Report 2024 Edition.pptxgeorgebrinton95
 
The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024christinemoorman
 
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts ServiceVip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Serviceankitnayak356677
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis UsageNeil Kimberley
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessAggregage
 
BEST Call Girls In BELLMONT HOTEL ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In BELLMONT HOTEL ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In BELLMONT HOTEL ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In BELLMONT HOTEL ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...lizamodels9
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation SlidesKeppelCorporation
 
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdfCatalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdfOrient Homes
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth MarketingShawn Pang
 

Recently uploaded (20)

Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
 
Islamabad Escorts | Call 03274100048 | Escort Service in Islamabad
Islamabad Escorts | Call 03274100048 | Escort Service in IslamabadIslamabad Escorts | Call 03274100048 | Escort Service in Islamabad
Islamabad Escorts | Call 03274100048 | Escort Service in Islamabad
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
 
Catalogue ONG NUOC PPR DE NHAT .pdf
Catalogue ONG NUOC PPR DE NHAT      .pdfCatalogue ONG NUOC PPR DE NHAT      .pdf
Catalogue ONG NUOC PPR DE NHAT .pdf
 
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… AbridgedLean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
 
rishikeshgirls.in- Rishikesh call girl.pdf
rishikeshgirls.in- Rishikesh call girl.pdfrishikeshgirls.in- Rishikesh call girl.pdf
rishikeshgirls.in- Rishikesh call girl.pdf
 
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
 
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
 
Banana Powder Manufacturing Plant Project Report 2024 Edition.pptx
Banana Powder Manufacturing Plant Project Report 2024 Edition.pptxBanana Powder Manufacturing Plant Project Report 2024 Edition.pptx
Banana Powder Manufacturing Plant Project Report 2024 Edition.pptx
 
The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024
 
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts ServiceVip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Service
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for Success
 
BEST Call Girls In BELLMONT HOTEL ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In BELLMONT HOTEL ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In BELLMONT HOTEL ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In BELLMONT HOTEL ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
 
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdfCatalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
 

Online reputation

  • 1. Online Reputation & Internet Safety Microsoft Egypt
  • 2. The Users of the Internet • There is over 1.7 billion world wide user of the internet • 1.7 Billion User World Wide • 57.4 Million Arab Users • 67.3 Million African users • 13 million Egyptian Users
  • 3. The Power of Social Media •Social Network enjoy highest number of users, Facebook users reached 400 Million
  • 4.
  • 5. Online Security Versus Online Safety Safety: We must act in ways that help protect us against the risks that come with Internet use. Security: We must secure our computers with technology in the same way that we secure the doors to our homes.
  • 6. Online Reputation An online reputation is the publicly held social evaluation of a person based on their behavior; what they say, and what others say about them.
  • 7. The effect of Online Reputation o Can Online Reputation affect your employment potential? o Can it affect your social life? Your Online Reputation can either benefit or harm you, it is your choice!
  • 8. Online Reputation and professional life • HR managers research job applicants online • First impression and Reputation AT work is that AT your social network pages. • You represent the company you work in online AT ALL times!
  • 9. Online Reputation and Social life What you post on the internet affect you, your family and your friends. • Your pictures and actions on the internet is a memory you will keep forever. • How you behave online is a reflection on your values and your family. • You affect the lives of your friends whenever you post anything about them on the internet.
  • 10. Self Expression How you express yourself on line reflects on who you are, your family, your beliefs and your country… Make your statements wisely
  • 12. Take Responsibility! Do not forward what you are not sure of!
  • 14. Hacking, is it worth the Risk?
  • 15. PROTECT your online reputation • Read the privacy policy of any site before sharing personal information online • Use privacy settings on social networking sites that determine who can access and respond to your content • Use the alert feature provided by some websites that automatically notifies you of any new mention of your name or other personal information • Respect others privacy!
  • 16. Enjoy private browsing with IE 9 Privacy Features • InPrivate Browsing • InPrivate Filtering • Enhanced delete browsing history • Tab isolation • Crash recovery
  • 17. Guard Your Reputation • Express yourself and defend your position but don’t use any abusive language. • Do not post anything in anger. • Do not share personal Data, Personal information can put you at RISK! • Remember your boss, your parents, and your future kids will see everything you are posting. REMEMBER WHAT IS POSTED ON THE INTERNET, STAYS ON THE INTERNET
  • 18. Primary Threats to our information Phishing E-mail sent by online criminals to trick you Spam into going to fake Web sites and revealing Unwanted e- personal information mail, instant messages, and other online communication Identity Theft A crime where con Hoaxes artists get your E-mail sent by online personal information criminals to trick you into and access your cash giving them money and/or credit
  • 22. Primary Threats to Computer Security Viruses/Worms Software programs designed to invade Trojans your computer, and Viruses that pretend to be copy, damage, or helpful programs while delete your data. destroying your data, Spyware damaging your computer, Software that tracks and stealing your your online activities or personal information. displays endless ads.
  • 23. #1: Defend your computer. Turn on Windows Internet firewall Use Microsoft Update to keep Windows up-to-date automatically Install and maintain antivirus software Install and maintain antispyware software
  • 24. Turn on Windows Internet Firewall Windows 7 Firewall help protect your PC from hackers and malicious software. It creates a protective barrier between your computer and the Internet
  • 25. Use Automatic Updates to Keep Software Up-to-date • Install all updates as soon as they are available • Automatic updates provide the best protection • Windows 7 Action Center The new Windows 7 Action Center in the Control Panel helps you make sure that your firewall is on, your antivirus software is up to date, and your computer is set to install updates automatically
  • 26. Install and Maintain Antivirus Software • Antivirus software helps to detect and remove computer viruses before they can cause damage. • For antivirus software to be effective, you must keep it up-to- Don’t let it expire date.
  • 27. Install and Maintain Antispyware software Use antispyware software, like Microsoft Windows Defender, so unknown software cannot track your online activity and potentially steal your information. • Windows 7 Defender include: – Spyware detection and removal – Improved Internet browsing safety – Protection against the latest threats
  • 28. Microsoft Security Essentials Defend your computer against viruses, spyware, and other malware • Microsoft Security Essentials is a free download for Windows 7 that helps protect your computer from viruses, spyware, worms, Trojans, and other malware. http://www.microsoft.com/security_essentials/default.aspx
  • 29. #2: Protect sensitive data. • Think before you enter sensitive data • Be suspicious of attachments and links • Look out for scams and fraud • Create strong passwords
  • 30. Think before you type. • Look for https (the “s” is for secure) • A closed padlock means secure, too • Are there signs the site is trustworthy?
  • 31. Think before you click. • Be suspicious and aware of: – E-mail and IM attachments and links – Messages within social sites
  • 32. The tricks that make you click. • Alarming messages • Misspellings and grammatical errors • Great deals • Requests for sensitive info
  • 33.
  • 34. How to avoid the bait. • Confirm that the message is real • Type the Web address yourself • Use a browser with safety features
  • 35. Stay safer online with IE8 • Browse with more confidence knowing Internet Explorer 8 helps protect you from evolving online threats right out of the box. • According to a recent test by NSS Labs, Internet Explorer 8 catches more than twice as much malware and is tied in phishing protection when compared to its closest competition.
  • 36. IE 8 Smart Screen • The SmartScreen filter is a set of technologies designed to help protect users from evolving web and social engineering threats.
  • 37. IE 8 Safety Technology • Cross Site Scripting (XSS) Filter • Click-jacking prevention • Domain highlighting • Data Execution Prevention (DEP)
  • 38. Passwords lock data doors. • Keep them secret • Change them often • Make them strong
  • 39. Which passwords are strong? 1. 555.12.999 2. 06/04/79 3. Exp3d!ti0us 4. Ambl!anc3 5. 135781113 6. MsAw3yOiD
  • 40. And the answers are… 1. 555.12.999 2. 06/04/79 3. Exp3d!ti0us 4. Ambl!anc3 5. 135781113 6. MsAw3yOiD
  • 41. #3 Protect devices on the go. • Do they have the latest protection? • Guard devices like you do your wallet • Don’t hand-carry sensitive data • Use caution if using a thumb drive in another computer
  • 42. Windows 7 BitLocker Drive Encryption • Windows 7BitLocker Drive Encryption help you protect your data from loss, theft, or hackers – BitLocker helps keep everything from documents to passwords safer by encrypting the entire drive that Windows and your data reside on. – BitLocker To Go—a new feature of Windows 7—gives the lockdown treatment to easily-misplaced portable storage devices like USB flash drives and external hard drives.
  • 43. On the go: wireless hotspots. • Connect securely • Know who you’re connecting to • Save sensitive uses for more trusted connections
  • 44. Sometimes things go wrong. • How do you know a PC is infected? – Your computer might run slowly – Or crash often – Or show other unusual behavior
  • 45. What to do?  Contact an IT Professional  Contact the responsible authorities:  NTRA hotline : 155  Police Cyber Crime hotline : 108

Editor's Notes

  1. In Egypt we have 2 million users on the face book, our national newspapers combined do not have this number of circulation.
  2. Egypt is the highest user of the internet in Africa according to international statistics.70% of Egyptian do not practice safe and secure usage of the interent.
  3. Do you know what is your Reputation Online?Have you searched yourself on the Internet?Do you know what others are saying about you?
  4. HR managers confirms that during their first screening processes they search applicants on the internet Job applicants could be rejected or placed at a disadvantage based on their online reputation.Managers and Co-workers check out new recruit on the internet and their perception is greatly affected with what information they gather from the internet.Companies necessitates that all the employees representing them maintain a certain level of good reputation in real and virtual world.There are incidents in Egypt where workers were harmed to the point of losing their jobs for their perceived reputation on the internet…
  5. Ask yourselfAm I expressing myself or abusing others?Am I championing or Abusing my cause?How will this be perceived by others
  6. Abusive emails are illegal under The Telecommunications Regulatory Act No. 10 of 2003Example from a local case apprehended by Egyptian police
  7. You have a moral responsibility not to circulate any information you don’t know is accurate. Circulation of inaccurate informtion that can lead to public panic (similar to this one about the kidnapping of kids at large malls) or in facilitating a crime put you at legal risk.
  8. A malicious prank of a guy whose pictures has been modified and posted online as a gay person – Egyptian Police local case
  9. A malicious prank played by a student against his teacher. The student stole personal pictures and posted it on social networks which severely damaged the reputation of the teacher and hurt his career. The student on the other hand faces charges of invasion of privacy, stealing and defamation of character which warrants a jail sentenceEgyptian police local case.
  10. When checking e-mail at an Internet café or shopping for a gift on a family PC, you don't want to leave any trace of specific web browsing activity. InPrivate Browsing in Internet Explorer 8 helps prevent your browsing history, temporary Internet files, form data, cookies, and usernames and passwords from being retained by the browser, leaving no evidence of your browsing or search history.You can start InPrivate Browsing by opening a new tab and selecting Browse with InPrivate or selecting it from the Safety button on the top right corner of the browser window. Once you complete this action, Internet Explorer 8 will launch a new browser session that won't record any information, including searches or webpage visits. To end your InPrivate Browsing session, simply close the browser window.Peace of mind for parents: If parental controls are activated, InPrivate Browsing is disabled.  InPrivate FilteringToday websites increasingly pull content in from multiple sources, providing tremendous value to consumer and sites alike. Users are often not aware that some content, images, ads and analytics are being provided from third party websites or that these websites have the ability to potentially track their behavior across multiple websites. InPrivate Filtering provides users an added level of control and choice about the information that third party websites can potentially use to track browsing activity.InPrivate Filtering is off by default and must be enabled on a per-session basis. To use this feature, select InPrivate Filtering from the Safety menu. To access and manage different filtering options for Internet Explorer 8, select InPrivate Filtering Settings from the Safety menu. To end your InPrivate Browsing session, simply close the browser window.Note: Because InPrivate Filtering is designed to watch for and block only third-party content that appears with a high frequency across sites you visit, no content is blocked until such levels are detected, nor is any such content blocked which is served directly by the site you are visiting.Depending on your web browsing activity and sites visited, the amount of time it can take before such content is automatically blocked can vary widely. However, at any time, you can customize which third-party content is blocked or allowed in the InPrivate Filtering Settings option from the Safety menu.Enhanced delete browsing historyNow when deleting browsing history, you can choose to preserve cookies and temporary Internet files for sites in your Favorites folder. This helps to protect your information and privacy while preserving your data on your trusted favorite sites. Your preferences and cookies are preserved, helping you to get to your trusted sites faster with greater confidence.Tab isolationIf a website or add-on causes a tab to crash in Internet Explorer 8, only that tab is affected. The browser itself remains stable and other tabs remain unaffected, thereby minimizing any disruption to your browsing experience.Crash recoveryIf one or more of your tabs unexpectedly closes or crashes, your tabs are automatically reloaded and you are returned to the site you were on before the crash.
  11. Usage of abusive language is against the law and all religions…it demeans the speaker, his family and whatever entity he represents.
  12. Scam email requesting help with bank transfers in exchange for 30% of the amount.Lottery scams
  13. Copy from an e-mail of young female that was stolen and exploited by a criminal – Egyptian police local case.
  14. Microsoft Security Essentials provides real-time protection for your home PC that guards against viruses, spyware, and other malicious software.Microsoft Security Essentials is a free* download from Microsoft that is simple to install, easy to use, and always kept up to date so you can be assured your PC is protected by the latest technology. It’s easy to tell if your PC is secure — when you’re green, you’re good. It’s that simple.Microsoft Security Essentials runs quietly and efficiently in the background so that you are free to use your Windows-based PC the way you want—without interruptions or long computer wait times.It’s easy to tell if your PC is secure — when you’re green, you’re good. It’s that simple.When y are red … y have a problem!Windows Defender detects and removes spywareWindows Defender is software that helps protect your computer against pop-ups, slow performance, and security threats caused by spyware and other unwanted software by detecting and removing known spyware from your computer. Windows Defender features Real-Time Protection, a monitoring system that recommends actions against spyware when it's detected, minimizes interruptions, and helps you stay productive.The benefits of installing Windows Defender include:Spyware detection and removalWindows Defender quickly and easily finds spyware and other unwanted programs that can slow down your computer, display annoying pop-up ads, change Internet settings, or use your private information without your consent.Windows Defender eliminates detected spyware easily at your direction, and if you inadvertently remove programs that you actually want, it's easy to get them back.Windows Defender allows you to schedule your scanning and removal times when it's convenient for you, whether it's on-demand or on a schedule that you set.Improved Internet browsing safetyWindows Defender helps stop spyware before it infiltrates your computer. Windows Defender also offers a continuous safeguard designed to target all the ways that spyware can infiltrate your computer.Windows Defender works without distracting you. It runs in the background and automatically handles spyware based on preferences that you set. You can use your computer with minimal interruption.Protection against the latest threatsA dedicated team of Microsoft researchers continuously searches the Internet to discover new spyware and develop methods to counteract it.A voluntary, worldwide network of Windows Defender users helps Microsoft determine which suspicious programs to classify as spyware. Participants help discover new threats quickly and notify Microsoft analysts, so that everyone is better protected. Anyone who uses Windows Defender can join this network and help report potential spyware to Microsoft.To help protect your computer from the latest threats, you can choose to have updates that counteract new spyware automatically downloaded to your computer.
  15. 2. Defending sensitive data is the most important area we’ll talk about today. There are four basic strategies:Think before entering sensitive data on Web sites.Be suspicious of attachments and links. Know what phishing and scams look like.Create strong passwords.
  16. For starters, before you enter sensitive data on a Web form or page, look for two things:1. Signs that the site uses data encryption: https (“s” is for secure).A closed padlock. It must be here, beside the Web address, or in the lower right corner of the window. 2. Signs of a trusted site, such as the green address bar in Windows® Internet Explorer®. The graphic in the slide shows what each of those things looks like in your browser.That’s the first strategy for protecting sensitive information. Another precaution you can take is to think before you click.
  17. BE SUSPICIOUS OF ATTACHMENTS AND LINKS. There are several reasons to use caution: Senders can be phony. A virus (the colds and flu of computing, designed to spread to other computers) may have sent the mail you just received.Spyware can hide in e-mail attachments. Open one and you may download spyware which can track what you do on your computer. It may enable criminals to collect company or personal information, record account numbers and passwords as you type, or bombard you with pop-up ads.Click links or download videos and photos and you could be downloading a virus along with them. Links can go to phony Web sites.Toll-free numbers can go to fraudulent call centers.Keep in mind: If you click, you catch. MESSAGES ON SOCIAL SITES:Just because the e-mail message says it’s a LinkedIn update, doesn’t mean it is.Messages you get when you’re using a social site such as Facebook, LinkedIn, and Twitter can have viruses or be trying to entice you to divulge sensitive information, too. TO REPEAT: “THINK BEFORE YOU CLICK” IS A BEST PRACTICE FOR PROTECTING SENSITIVE DATA, but you also need to be on the lookout for scams and fraud in e-mail and instant messages.
  18. Phishing scams, for example, are a sneaky form of spam designed by criminals to fool us.It can look like a message from a company you trust—supplier or company’s bank, even from within your own company. It may ask you to reveal sensitive data.It can be very convincing.To protect yourself, LEARN THE SIGNS OF PHISHING: Alarmist messages: When we’re alarmed, we sometimes put our suspicions aside.“Your account will be closed if we don’t hear from you.”“A virus has corrupted our database. Please re-confirm your information NOW.”Misspellings and grammatical errors.If a deal sounds too good to be true, it probably is. Requests for sensitive info (for example, account numbers or help in “transferring funds.”)It’s important to note that reputable companies DON’T send e-mail that asks for sensitive info.DON’T THINK THAT YOU CAN BE FOOLED? WOULD YOU FALL FOR THIS?A newly-hired COO received e-mail from what looked like his company’s travel agency. He was asked to click the link and make sure his details were accurate.He did and went to an official-looking site where he found his personal data.He was asked to download software that would link his Outlook e-mail account to the travel agency’s booking system. In so doing, he downloaded Trojan horse malware which spread quickly through his new company.THOSE ARE SOME OF THE PHISHING TRICKS. Staying alert to the warning signs is your first defense. But what else can you do if you get a suspicious message?
  19. CONFIRM WITH THE SENDER THAT THE E-MAIL OR INSTANT MESSAGE IS REALCall the company using a number you already have for it.Or check it against what you find on Bing, Google, or an online phone directory.To visit the site, TYPE THE WEB ADDRESS YOURSELF instead of clicking the link in the message.Or, use your own bookmark or favorite.USE A BROWSER WITH SAFETY FEATURESSuch as the anti-phishing feature (SmartScreen® Filter) and the pop-up blocker that’s on by default in Internet Explorer 8.If you’re ever in doubt about a site, consult a Web site that identifies known scams:Such as www.snopes.com.Another way to protect sensitive data is to use strong passwords.
  20. The new SmartScreen filter and other built-in security features help you stay safe by protecting against deceptive and malicious websites which can compromise your data, privacy, and identity.Since we launched IE8 in March 2009, SmartScreen has blocked over 560 million attempts to download malware, recently averaging over 3 million blocks per day! Hosted in datacenters around the world, SmartScreen’s URL Reputation Service (URS) has evaluated over 250 billion URLs to help keep IE8 users safe from malware. Even more impressively, since IE7’s Phishing Filter was introduced in 2005, the URS has processed over 5.7 trillion requests to block malicious web sites. Every day, Microsoft receives around 300 million telemetry reports from IE8 users and processes 4.1 billion URLs looking for malicious websites and files. On the back end, our systems and analysts evaluate over 1 terabyte of binaries every day to help identify sites delivering malware.The Q1 2010 NSS Lab’s test shows that Microsoft’s continued investment in SmartScreen is paying off. Since launch, IE8’s SmartScreen Filter has continued to improve its protection against Socially Engineered Malware threats.
  21. SmartScreenCybercriminals continue to rely on deceptive social engineering attacks to prey on unsuspecting web users. Whether it's via an email that appears to be from your bank, a search result for popular content such as games and movies, an advertisement or a link in an instant message promising free stuff, or a fake notification from a social networking site, there is virtually no trick they haven't tried. We developed the SmartScreen filter for Internet Explorer 8 so you can browse with more confidence – knowing you have a greater chance of being protected when you are targeted by one of these attacks.The SmartScreen filter is a set of technologies designed to help protect users from evolving web and social engineering threats. If the SmartScreen filter detects a malicious website, Internet Explorer 8 will block the entire site. It can also provide a "surgical block" of malware or phishing hosted on legitimate websites – blocking just the malicious content without affecting the rest of the site.Another new feature we have added is protection from malicious downloads – if you attempt a download that has been reported as unsafe, Internet Explorer 8 will block and warn you about that as well. Of course, you'll still have the option to continue with the download if you're certain that it is safe.This download has been blocked by the SmartScreen filterWhile we recommend all users keep the SmartScreen turned on, you can enable or disable it at any time. You can also help improve the web for everyone by reporting suspected malicious sites.Since we launched IE8 in March 2009, SmartScreen has blocked over 560 million attempts to download malware, recently averaging over 3 million blocks per day! Hosted in datacenters around the world, SmartScreen’s URL Reputation Service (URS) has evaluated over 250 billion URLs to help keep IE8 users safe from malware. Even more impressively, since IE7’s Phishing Filter was introduced in 2005, the URS has processed over 5.7 trillion requests to block malicious web sites. Every day, Microsoft receives around 300 million telemetry reports from IE8 users and processes 4.1 billion URLs looking for malicious websites and files. On the back end, our systems and analysts evaluate over 1 terabyte of binaries every day to help identify sites delivering malware.The Q1 2010 NSS Lab’s test shows that Microsoft’s continued investment in SmartScreen is paying off. Since launch, IE8’s SmartScreen Filter has continued to improve its protection against Socially Engineered Malware threats.
  22. Cross Site Scripting (XSS) FilterCross-site scripting attacks try to exploit vulnerabilities in the websites you use. In this attack, you might receive an email that contains a tampered website address. Once you click on the link, you are directed to a legitimate website that has been compromised to contain malicious content that can capture keystrokes and record your login and password. These attacks have emerged as a leading online threat so Internet Explorer 8 includes a cross-site scripting filter that can detect these types of attacks and disable the harmful scripts. Unlike other web browsers, Internet Explorer 8 offers this protection right out of the box, and turned on by default.Click-jacking is an emerging online threat where an attacker's webpage deceives you into clicking on content from another website without you realizing it. For example, it might hide a legitimate webpage as a "frame" inside a malicious page. When you click in the malicious page, you're actually clicking on something else: buying something from the site, changing some settings on your browser or computer, or viewing advertisements that cybercriminals get paid for. It's a complicated attack, but Internet Explorer 8 allows website developers to protect their sites from these kinds of attacks by preventing their legitimate pages from being "framed."Domain HighlightingInternet Explorer 8 is the first browser to provide domain highlighting, so you always know which website you're visiting. Domain Highlighting lets you more easily interpret web addresses (URLs) to help you avoid deceptive and phishing sites that attempt to trick you with misleading addresses. It does this by highlighting the domain name in the address bar in black, with the remainder of the URL string in gray, making for easier identification of the sites true identity.Data Execution Prevention (DEP)Data Execution Prevention (DEP), on by default in Internet Explorer 8 in Windows Vista Service Pack 1, is a security feature that can help prevent damage to your computer from viruses and other security threats by preventing certain types of code from writing to executable memory space
  23. You lock your house, your car, your bike. You also need to lock up corporate assets, client info, accounts, computers, mobile phones, etc. To do this on your computer:KEEP PASSWORDS SECRETIf stolen, everything they protect is at risk. Don’t share them with friends, colleagues, or businesses.Don’t use the same password (or simple variations) for different accounts or services.Don’t store passwords on your phone or in a file on your computer or on a post-it on your computer. It’s okay to store them on a well-hidden sheet of paper.Don’t let someone trick you into revealing them.CHANGE THEM OFTEN: Change the important ones regularly—like the one for your computer or mobile phone.MAKE THEM STRONGAt least eight characters. Upper and lower case letters, numbers, and symbols.Easy for you to remember and hard for others to guess.Avoid number sequences, your pet’s name, birth date, Social Security numbers, and the like. Don’t use words that you can find in the dictionary.Avoid using only look-alike substitutions of numbers or symbols.Choose a sentence that’s easy to remember and difficult for others to guess and use it as the basis of a password. (See below for an idea about how to present this.)CUSTOMIZING THE PRESENTATION: Ask the group to create a phrase that’s eight words or longer—like the first line of a favorite song. Take the first letter of each word to make the password. Substitute numbers or symbols for some of the letters—like “3” for “E” or “!” for “L.”
  24. CUSTOMIZING THIS PRESENTATIONThis is an opportunity for the audience to test their password knowledge. There are several ways you can handle this:If you have a white board or flip chart, you can do this as a group activity: One password at a time, ask the group to decide whether it’s strong or not and discuss why.If people have paper and pen, ask everyone to do this as a task either by themselves or in pairs.Or simply give everyone a minute or two to think about which of these are strong, and which weak. When you’re ready to see the results, go to the next slide.
  25. EXPLAINING THE ANSWERS:WEAK. Only numbers, possibly a Social Security number, which criminals can easily find online.WEAK. A date—birth or anniversary date, for example—can be known and easily found by a criminal.WEAK. Don’t use words you can find in any dictionary in any language (expeditious). Criminals will not be fooled by common look-alike replacements such as “3” for “e”.STRONG. Letters, symbols, numbers, not a word found in the dictionary.WEAK. Only numbers. Avoid sequences (or repeated numbers, like 22222222).STRONG. A sentence that’s easy to remember, but difficult for others to guess. Eight characters or longer.Take the first letters of this sentence: My son Aiden was 3 years Old in December. Add complexity by mixing upper and lower case letters, symbols, and numbers.Having reviewed many ways you can protect sensitive information, let’s look at the third way to avoid a bad day…
  26. …protecting devices when you’re away from workThese include laptops, thumb drives (USB or flash drives), mobile phones.DO YOUR DEVICES HAVE THE LATEST PROTECTION?Make it part of your travel routine. Update before you leave.GUARD YOUR DEVICES LIKE YOU DO YOUR WALLET.For example, lock your mobile phone when you’re not using it. DON’T HAND-CARRY SENSITIVE DATA.On your laptop or thumb drive.It’s not worth the risk. If you lose it, anyone can access it.If you must take sensitive data, encrypt it. However, encryption only slows access to data; it doesn’t prevent access from a determined hacker after really valuable data.IF YOU USE YOUR THUMB DRIVE IN ANOTHER COMPUTER:That computer may be infected and could corrupt the thumb drive and ultimately your computer.When you re-insert the drive into your computer, click the Close button in any message that pops up so you don’t give any malware a chance to run.But you need to do more than protect the physical devices when you’re on the road…
  27. BitLocker helps keep everything from documents to passwords safer by encrypting the entire drive that Windows and your data reside on. Once BitLocker is turned on, any file you save on that drive is encrypted automatically.BitLocker To Go—a new feature of Windows 7—gives the lockdown treatment to easily-misplaced portable storage devices like USB flash drives and external hard drives.
  28. …Wireless hotspots can be risky, so here are ways to connect to the Web more safely: CONNECT SECURELY. Choose:The most secure connection, even if it means paying for it. Ask about it before you connect.WEP (at least) that encrypts (or scrambles) data as it travels between your laptop and the wireless access point. (WEP stands for Wired Equivalent Privacy. It is a system of data encryption that prevents access to a wireless network.) A password-protected connection, ideally one that is unique for your use.KNOW WHO YOU’RE CONNECTING TOConfirm the exact spelling of the network you’re connecting to. Beware of clever (slightly misspelled) fakes. For example: HLTONHOTELSNET vs. HILTONHOTELSNET. (There’s no “I” in the first Hilton.)Check the privacy statement on the network's Web site. No privacy statement? Wait until you return to the office to conduct sensitive business.SAVE SENSITIVE USES FOR MORE TRUSTED CONNECTIONSDon’t bank or make other financial transactions at a wireless hotspot.Don’t download, install, or update software.Use e-mail with the understanding that it can open the door to illegal access to corporate networks and data.Turn off the wireless connection when you’re not using it.
  29. INFECTED PCDespite all our best efforts, sometimes a virus or spyware can slip through. How would you know?Your computer exhibits unusual behavior: slows to a crawl, crashes often. Programs don’t save files properly. And so on.