Protect Yourself From Internet Pests

1,027 views

Published on

Here\'s how to protect yourself from Internet pests.

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
1,027
On SlideShare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
2
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide
  • Hello and welcome. I am (Insert Name) from (Insert Name of Organization). Today I am going to share with you some important information about computers, the Internet and how we can all work together to keep kids safe online. This presentation and the accompanying brochures have been provided by the Surfwatch Safety Partnership, a group that is committed to educating parents, families and communities about ways to safeguard children online.
  • But you have to be careful with email too. Dangerous strangers have been known to use email to create ‘a relationship’ with children. Often, they will assume a false identity, posing as a youngster themselves to build trust with children online. Another thing to watch for is spam. Like the ‘junk mail’ you get in your mail box at home, spam is unwanted email that is trying to sell you merchandise or services. Pornographic spam is very common and it often contains explicit photographs and links to pornographic Web sites. Another very real, and increasingly common, risk is having your computer damaged by a virus. Viruses are little ‘bits’ of computer code that, when let loose in your computer when an email is opened, can do anything from creating a harmless message on your screen to ‘crashing’ your hard drive, in effect making your computer breakdown completely and irreparably.
  • Image –Again this illustrates how the Internet puts the whole world in the hands of children – we are giving them access to this world through the Internet – awesome responsibility but wonderful opportunity. – I suppose the question is do you know what world they are accessing ? This photo was taken of a real parent’s hand and child (friends of Childnet).
  • A lot of adults use the net for e-mail, research and purchasing things, while most young people see simply “surfing” as passé and want to use the interactive features such as games, and chat building online communities and develop their own space. Do you as a parent know really know what your child is doing online ? Because of new Internet applications such as Chat, IM, peer-to-peer networks etc, it is increasingly important that children understand the online safety issues and know how to respond to the potential dangers whatever application they are using on the Internet. Very important for us to validate the skills which young people are using in accessing the Internet.
  • It’s good to start by looking at why this is important, and get a general picture of how our children approach technology.   There is no doubt that kids are very quick to gain the basic technical skills – if you like the knowledge – about how to find their way around computers and the net. They are much quicker than adults, as anyone who has taken their 10 year old on at a computer game will know.   BUT, and it is a big BUT that is not the same as wisdom. Knowing how to drive a car does not make you a safe driver. Looking old enough to get into a nightclub doesn’t mean you will handle the situation well. If the Internet is like letting a city into your home, then your children need to learn how to handle that city, how to behave online and get the best from the Net.   This gap between wisdom and knowledge needs to be bridged. Put at it’s simplest it is about good parenting. You may not be the greatest technical whiz but you are a parent, and you help your child through adolescence on many other issues. So we need to get alongside our kids, especially from their first ventures online.   That will help us all as technology is changing rapidly and we can all learn together. Don’t be afraid to learn technical tips from your kids – and then maybe they will pick up some life skills tips from you!
  • This point is very simple but helps to highlight the challenge. You could ask for a show of hands as to how many parents use a filtering product on their computer at home. A similar analogy for showing why schools are concerned about this subject is smoking. – Many years ago a school might have said we don’t have a problem with smoking because children are banned from smoking on the premises ! – clearly it is a huge health and safety issue which children need to understand – similarly with the Internet – even aspects of the Internet which we don’t use in school.
  • Link to this section by saying that part of the challenge is that when you hear scare stories and hear about how the Internet has been used to harm children it is vital to remind ourselves just why this medium is so valuable to schools and families as they support and teach young children. We hope that this next section will really inspire you and excite you as to how Children themselves are making the best out of the net.
  • Call out the words Discover, Connect and Create as they appear and then go through each one individually. Discover – give an example of a useful piece of information you can find online that would be very difficult to get offline eg the temperature today in London, headlines in an Australian Newspaper Connect – other media can provide information but the Internet also puts children in direct touch with each other. Much cheaper than phoning, much quicker than writing using the post. Create – now anyone with access to the net can publish. – very exciting for schools – have a look at Bonjour.org a wonderful French language teaching resource written by an individual French teacher working here in the UK ! – (a Childnet award winning projects)
  • The Staying SMART online module introduction at www.kidsmart.org.uk is very good at illustrating 8 key things which young people love about using the Internet. – you could ALT TAB to this website if you have internet connection or you can order it from Childnet on a CD rom. When Childnet staff run the session in the school we introduce this section as explaining what we did in the classroom earlier in the day. – (And what we learnt about the children about their parent’s use of the Internet !!! )
  • Say that it would be great if we could just stop the presentation at that point and all go home. But sadly there are dangers on the Internet for children and this next section helps us look carefully at some of these dangers.
  • Allow the three dangers to emerge and speak them out emphasizing the first letter C. This will help people remember them. Go through each danger individually reminding people of the city image. Content – the most searched for word on the internet is Sex. It is now estimated that at least 200,000 US citizens are addicted to pornography on the Internet. But there are other problems – the issue of inaccurate information could be very serious if your child took bad advice on a health problem. Contact – a parent’s worst fear is that another adult might try and contact their child and then meet them offline – this is very rare but sadly it has happened. Commerce – the increasing commercial nature of the Internet means your children may be tempted to fill in their personal details in all sorts of places on the web and end up getting marketing information you wouldn’t want them to see.
  • Pornography has been available for many years, but the Internet has made it much more available.Indeed the porn industry has led the way in internet technology – (credit card purchasing, streaming and webcams, pop ups and “toaster adverts” etc. Reality is that people can now access more pornography – without leaving their own homes; without paying for it; and they can keep pictures stored in a place others may not find it.   Say that the two examples are www.whitehouse.com - remind people how close this is to the www.whitehouse.gov site they looked at earlier. Just three letters difference. Shows how children can access it by mistake. The other example is of a bizarre site called www.nakednews.com on which news readers read serious news but take their clothes off as they are doing it.   Many parents can be shocked when they first go on the Internet because they think that some material such as pornography should be illegal. Because the Internet is an international medium, and in many countries pornography is openly allowed, most of the material is perfectly legal in the country where it originates. But that does mean that it doesn’t cause harm and that it is accessible by children. But why should we be concerned if our children see pornography: Porn is not about beauty or seeing women or men as a whole – just about the physical vital statistics. Therefore it encourages a false and unachievable fantasy about sex with women or men at any time, in any place, in the way you want it. Porn can be used by pedophiles to make young children think that they too should undress and engage in sex. And porn can be addictive.   The SMART tip here illustrates that a good filtering package can help block a great deal, but important to stress that lots of porn can come as attachments in hotmail accounts and that some children can get around filtering packages. Also be careful to use favorites files and type in correct website address !
  • Pornography is not the only kind of problem on the web. There also many sites which promote racism and hatred. We should not be surprised by this… the Internet is a fantastic tool for bringing together people with a very specialist interest, enabling them to find each other and then communicate. That can of course have a very positive value, but it is also true of extreme minority political groups. And on the web, it is easy to pose as something that appears acceptable – eg the graphic relates to the worldwide church of the Creator. Some of these groups sadly target children – point to web capture on screen.   Smart tip is that if you want to see a complete list and further information on sites of concern look at the Anti Defamation League site – www.adl.com
  • As well as racist sites some sites can also be misleading or include blatant inaccurate content. For example: Spoof sites are those that pretend to be the real thing but in fact are mere imitations, often taking positions that are the opposite of those that the real site supports. Then there are URL mimickers who register a URL that is slightly different to one that attracts a lot of traffic eg dinsey.com and most famous of all whitehouse.com rather than whitehouse.gov. A local example is class95.com – a porn site rather than the Singapore radio station. Web sites can offer inaccurate material that rewrites history – the illustrated site – www.martinlutherking.org provides a very inaccurate view of the great man’s life. Such inaccuracies can be very important if they concern topics that impact on personal safety and well being e.g. health information. Kids should be advised to be very careful about medical information online.   Smart tips suggests that ways of checking out sites are to look for who published them – the source; when they were last updated (in case the information is out of date); who is linked to the site – you can search for this in google with link: and then the URL. Links provide evidence of third party endorsement; and finally any references on the site – corroborating information and its source.
  • Many adults think of the Internet primarily as either a tool for e-mail or for finding information on the web. Children are huge users of a third Internet application – interactive services. The difference with these forms of service is that they are in real time i.e. you are in touch with people who are online at the same time as you are. Under this heading I want to talk about CHAT – for having a conversation with a large number of people - very widely used sometimes from well known web sites (eg singnet) and sometimes using software you can download called IRC – Internet Relay Chat. Instant Messaging – this is for talking one to one usually to people you know. Like Chat there are commercial programmes from companies like Yahoo!, AOL, and Microsoft and also more general software called ICQ – which stands for I Seek You . Games – with wonderful acronyms like MOO, MUD and MUSH, use chat as a means of allowing interaction between players Mobile phones – SMS text messages are very popular with teenagers and now you can chat using your handphone as well Cybersex – this is a particular use of interactive services, especially messaging, to fantasize about sex
  • But you have to be careful with email too. Dangerous strangers have been known to use email to create ‘a relationship’ with children. Often, they will assume a false identity, posing as a youngster themselves to build trust with children online. Another thing to watch for is spam. Like the ‘junk mail’ you get in your mail box at home, spam is unwanted email that is trying to sell you merchandise or services. Pornographic spam is very common and it often contains explicit photographs and links to pornographic Web sites. Another very real, and increasingly common, risk is having your computer damaged by a virus. Viruses are little ‘bits’ of computer code that, when let loose in your computer when an email is opened, can do anything from creating a harmless message on your screen to ‘crashing’ your hard drive, in effect making your computer breakdown completely and irreparably.
  • Computer security settings are basically those setting that deal with security concerns. Why?: You may configure your computer to do something and it gets automatically changed mention the “trade off”: more opportunities/features more risks… How?: Verify browser settings, email configuration, etc. what is the difference between “high” and “low”
  • Why?: - “Can’t get infected if you’re not connected” - When the PC is connected there is a path to the whole world Mention Pro/Cons: Pro: No risk when not connected. Cons: May loose services and contacts when offline (e.g. VoIP, IM) How?: -Turn off your PC at night!
  • What?: Your OS may allow other computers on a network to access the hard-drive of your computer in order to “share files”. Why?: This ability can be used to infect your computer or simply view documents in your computer Ex: Windows file sharing, Peer-to-peer applications
  • Why?: -You may loose data - How much data are you willing to loose? How?: -Back up regularly -Make sure you’re able to restore from the backup -Have a start-up disk handy
  • Most major software companies today release updates and patches to close newly discovered vulnerabilities in their software. Sometimes bugs are discovered in a program that may allow a criminal hacker to attack your computer Why?: - Bugs exist in software, and solutions are found for those bugs. These solutions need to be installed on top of the application How?: - Check Vendor Websites - Ensure you are getting the patches from a trustworthy site - You may install a utility that does the job for you.
  • Antrax: during the 2001
  • Why?. New virus emerging daily, so anti-virus programs need regular updates to recognize these new viruses. Antrax: during the 2001
  • Why?: Learn how to avoid infections and you need to know what to do in case your computer gets infected. How?:- Learn cyber security practices and apply them - Educate the people around you Ex: - Attend conferences like this, learn about cybersecurity
  • Protect Yourself From Internet Pests

    1. 1. Keeping out of harm’s way on the Internet Some advice and guidance from Data Doctors <ul><li>Sources: </li></ul><ul><li>ChildNet International </li></ul><ul><li>Carnegie Mellon Cylab </li></ul><ul><li>Oklahoma State University </li></ul><ul><li>Data Doctors </li></ul><ul><li>Etc. </li></ul>
    2. 2. <ul><li>Internet Trends </li></ul><ul><ul><li>Benefits </li></ul></ul><ul><ul><li>Risks </li></ul></ul><ul><li>Safety Techniques for Everyone </li></ul><ul><ul><li>Adware, Spyware, Malware </li></ul></ul><ul><ul><li>Phishing, Pharming </li></ul></ul><ul><li>Hands-on assistance </li></ul>
    3. 3. WHY IS THIS Overview IMPORTANT
    4. 4. PARENTS Mostly e-mail and web for research DO YOU KNOW HOW YOUR CHILD USES THE NET? WE NEED TO BE INVOLVED IN OUR CHILDREN’S ONLINE ACTIVITY, VALIDATE THEIR SKILLS & LEARN FROM THEM YOUNG PEOPLE Interactive chat, IM, Music, Games, 2) ADULTS + CHILDREN USE THE NET IN DIFFERENT WAYS Overview
    5. 5. KNOWLEDGE Many children pick up technology quicker ! HELP YOUR CHILDREN TO UNDERSTAND THE CONTEXT TECHNOLOGY IS THROWING UP NEW IMPORTANT SAFETY ISSUES WHICH CHILDREN MAY NOT SEE WISDOM Understanding how to behave in a virtual world 3) THE DIFFERENCE BETWEEN KNOWLEDGE + WISDOM Overview
    6. 6. IN SCHOOL Generally supervised, protected and monitored WE NEED TO DO MORE THAN SUPERVISE- WE NEED TO HELP EDUCATE CHALLENGE = to ensure that children are safe wherever they use the internet OUT OF SCHOOL Often no filtering, supervision or monitoring 4) SUPERVISED/UNSUPERVISED ACCESS POINTS Overview
    7. 7. Benefits WHAT’S SO POSITIVE
    8. 8. WHAT CAN YOU DO WITH THE NET? <ul><li>Search </li></ul><ul><li>Homework </li></ul><ul><li>Projects </li></ul><ul><li>The biggest library in the world </li></ul><ul><li>E-mail </li></ul><ul><li>Newsgroups communities and clubs </li></ul><ul><li>Chat </li></ul><ul><li>Brings kids together at local call rates </li></ul><ul><li>Web sites </li></ul><ul><li>Text, art, music, photos, video... </li></ul><ul><li>Anyone can become a publisher </li></ul>Discover Connect Create
    9. 9. WHAT WE DID WITH THE PUPILS THIS AFTERNOON
    10. 10. Three examples which shows the power of the Net for children to … Discover Connect Create
    11. 11. Risks WHAT ARE THE DANGERS
    12. 12. THE DANGERS TO CHILDREN <ul><li>Pornography </li></ul><ul><li>Racism </li></ul><ul><li>Inaccurate information </li></ul><ul><li>Threatening e-mail </li></ul><ul><li>Pedophiles in chat rooms </li></ul><ul><li>Invasion of privacy </li></ul><ul><li>Blur between advertising & content </li></ul>Content Contact Commerce
    13. 13. PORNOGRAPHY <ul><li>Promotes a demeaning view of women (& men) </li></ul><ul><li>Encourages false fantasies </li></ul><ul><li>Can be used to sexualise young children </li></ul><ul><li>Addictive </li></ul><ul><li>Easily available on the Net </li></ul>SMART TIP Consider using filtering Be careful to type in the correct web site address!
    14. 14. RACIST & HATE SITES <ul><li>Web an ideal medium for small extreme groups </li></ul><ul><li>Some pose as churches, or other “acceptable” groups </li></ul><ul><li>Some target children </li></ul>See www.adl.org for details of sites to avoid SMART TIP
    15. 15. INACCURATE CONTENT <ul><li>Spoof sites </li></ul><ul><li>URL mimickers eg www.microdoft.com </li></ul><ul><li>Historical revisionist material </li></ul><ul><li>Inaccurate health information </li></ul>Look for source, date, links & references See www.quick.org.uk for helpful checklist SMART TIP
    16. 16. Interactive services online <ul><li>Social – MySpace, etc. </li></ul><ul><li>Chat –web based </li></ul><ul><li>Instant Messaging </li></ul><ul><li>Games – MOO, MUD, MUSH etc. </li></ul><ul><li>Cyber sex </li></ul>Get your kids to explain how chat and IM work! SMART TIP Contact
    17. 17. <ul><li>Internet Security Trends </li></ul><ul><ul><li>Benefits </li></ul></ul><ul><ul><li>Risks </li></ul></ul><ul><li>Safety Techniques for Everyone </li></ul><ul><ul><li>Adware, Spyware, Malware </li></ul></ul><ul><ul><li>Phishing, Pharming </li></ul></ul><ul><li>Internet Safety for Parents </li></ul><ul><ul><ul><li>Social Networking </li></ul></ul></ul><ul><ul><ul><li>Filters, etc. </li></ul></ul></ul><ul><ul><ul><li>Non-technical </li></ul></ul></ul><ul><li>Q&A </li></ul><ul><li>Hands-on assistance </li></ul>
    18. 18. Different Types of Spyware <ul><li>Spyware </li></ul><ul><li>Adware </li></ul><ul><li>Embedded Programs </li></ul><ul><li>Trojan Horse </li></ul><ul><li>Browser Hijackers </li></ul><ul><li>Dialers </li></ul><ul><li>Malware </li></ul>
    19. 19. Why do people make Spyware? <ul><li>Profit </li></ul><ul><li>A challenge </li></ul><ul><li>Malice </li></ul><ul><li>Boredom </li></ul><ul><li>Business </li></ul>
    20. 20. How do I know if I’ve got Spyware? <ul><li>Computer is running slower than normal </li></ul><ul><li>Popups (on or off the internet) </li></ul><ul><li>New toolbars </li></ul><ul><li>Home page changes </li></ul><ul><li>Search results look different </li></ul><ul><li>Error messages when accessing the web </li></ul>
    21. 21. What does Spyware look like?
    22. 22. What does Spyware look like?
    23. 23. What does Spyware look like?
    24. 24. What does Spyware look like?
    25. 25. What does Spyware look like?
    26. 26. What does Spyware look like?
    27. 27. What does Spyware look like?
    28. 28. What does Spyware look like?
    29. 29. What does Spyware look like?
    30. 30. What does Spyware look like?
    31. 31. What does Spyware look like?
    32. 32. How do I prevent Spyware? <ul><li>Be conscious of what you are clicking on/downloading </li></ul><ul><li>Some pop-ups have what appears to be a close button, but will actually try to install spyware when you click on it. Always look for the topmost right red X. </li></ul><ul><li>Remember that things on the internet are rarely free. “Free” Screensavers etc. generally contain ads or worse that pay the programmer for their time. </li></ul>
    33. 33. The Least Wanted List <ul><li>Weatherbug (GAIN or Claria) </li></ul><ul><li>Hotbar </li></ul><ul><li>180 Search Assistant </li></ul><ul><li>MyWebSearch </li></ul><ul><li>Popular Screensavers </li></ul><ul><li>Comet Cursors </li></ul><ul><li>A Better Internet (Aurora) </li></ul><ul><li>Kazaa / Morpheus </li></ul><ul><li>GameSpy Arcade </li></ul><ul><li>WhenUSave </li></ul><ul><li>New.Net </li></ul><ul><li>Starware Toolbar </li></ul><ul><li>MySearch </li></ul><ul><li>Begin2Search </li></ul><ul><li>180Solutions </li></ul><ul><li>Zango </li></ul><ul><li>CoolWebSearch </li></ul><ul><li>DyFuCA </li></ul><ul><li>BonzaiBuddy </li></ul><ul><li>BargainBuddy </li></ul><ul><li>Dashbar </li></ul><ul><li>Gator </li></ul><ul><li>WeatherScope </li></ul><ul><li>Best Offers Network </li></ul><ul><li>Precision Time </li></ul><ul><li>FunWeb </li></ul>
    34. 34. How do I get rid of Spyware? <ul><li>Use a legitimate spyware removal program </li></ul><ul><ul><li>We suggest E-Trust Anti-Virus and Pest Patrol by Computer Associates </li></ul></ul><ul><li>Free programs are available for download, however </li></ul><ul><ul><li>Not generally as proactive </li></ul></ul><ul><ul><li>Potentially reduced protection </li></ul></ul><ul><ul><li>MUCH better than no protection </li></ul></ul>
    35. 35. Phishing <ul><li>Most commonly an Email stating your account Information needs updating </li></ul><ul><li>Watch for URL’s that are numeric or different from the link you clicked on </li></ul><ul><li>Best thing to do is to type in the URL and check your account directly without following any links in the Email </li></ul><ul><li>Many legitimate emails no longer contain a link (Paypal) </li></ul>
    36. 36. Phishing Examples
    37. 37. Phishing Examples
    38. 38. Phishing Examples
    39. 39. Phishing Examples
    40. 40. Phishing Examples
    41. 41. Phishing Examples
    42. 42. How secure do you need to be? <ul><li>Be Prudent not Paranoid </li></ul><ul><li>Look for secure sites (https://...) </li></ul><ul><li>Did you initiate the action? </li></ul><ul><li>Why is this free? </li></ul><ul><li>Is the source trustworthy? </li></ul><ul><li>When in doubt Google it (to find the real site) </li></ul>
    43. 43. Safer Alternatives <ul><li>Download.com – All programs are adware/spyware free </li></ul><ul><li>Freesaver.com – Screensavers from this site are safe DO NOT click on ads </li></ul><ul><li>Cleansoftware.org </li></ul><ul><li>DataDoctors.com </li></ul><ul><li>Etc. </li></ul>
    44. 44. Microsoft Issues Patches, but Users Don’t Apply Them Forrester Research Report April 3, 2003
    45. 45. What Can YOU Do? <ul><li>Countdown: Top Ten Tips to secure your cyberspace </li></ul><ul><li>Reference: National Cybersecurity Alliance http://www.staysafeonline.info/home-tips.html </li></ul>
    46. 46. Top Ten Count Down 10 9 8 7 6 5 4 3 2 1
    47. 47. 10. Check your computer security regularly <ul><li>Computers have different security configurations </li></ul><ul><ul><li>web browser security settings </li></ul></ul><ul><ul><li>file sharing </li></ul></ul><ul><li>Some settings get changed with time </li></ul><ul><li>Ex: cookies, pop-up windows </li></ul>
    48. 48. 9. Disconnect from the Internet when not in use <ul><li>Limit the time your computer is exposed to getting hacked </li></ul><ul><ul><li>hackers are always looking for target machines </li></ul></ul><ul><li>Pro: no risks when you are disconnected </li></ul><ul><li>Con: may loose some functionalities when offline </li></ul><ul><ul><li>Voice over IP </li></ul></ul><ul><ul><li>Instant Messenger </li></ul></ul><ul><ul><li>other services </li></ul></ul>
    49. 49. 8. Don’t share access to your computer with strangers <ul><li>Your OS may allow others to access your files </li></ul><ul><li>The ability to share files can be used to infect your computer </li></ul><ul><li>File sharing risks: </li></ul><ul><ul><li>get viruses </li></ul></ul><ul><ul><li>have personal data stolen </li></ul></ul>
    50. 50. 7. Back up regularly <ul><li>Backup your system as “often” as how “much” data you are willing to lose </li></ul><ul><ul><li>work done last month? last week? today? </li></ul></ul><ul><li>Use external devices </li></ul><ul><li>Make sure you are able to restore data from your backup </li></ul><ul><li>Have a start-up disk handy in case your computer system files get damaged </li></ul>
    51. 51. 6. Use smart passwords <ul><li>Passwords give access to your machine and information </li></ul><ul><ul><li>people may guess the password </li></ul></ul><ul><ul><li>lots of automatic systems discover passwords in few seconds </li></ul></ul><ul><li>“ Golden rule” for how to create a good password </li></ul><ul><ul><li>8 characters minimum </li></ul></ul><ul><ul><li>be as meaningless as possible </li></ul></ul><ul><ul><li>use uppercase & lowercase letters, symbols and numbers. e.g., xk2&LP97 </li></ul></ul><ul><ul><li>use a “phrase” to remember: “MyWife1sAg00dCook” </li></ul></ul><ul><li>Use multiple passwords </li></ul><ul><li>Do not share passwords with others </li></ul><ul><li>Change passwords regularly </li></ul>
    52. 52. 5. Download and install security patches for your computer <ul><li>Sometimes bugs are discovered in a program that may allow a hacker to attack </li></ul><ul><li>Patches are solutions to those breaches </li></ul><ul><li>Check your vendors’ websites for updates </li></ul><ul><li>Ensure you are getting the patch from a trustworthy source </li></ul>
    53. 53. <ul><li>Firewalls create a protective “wall” between your computer system and the outside world </li></ul><ul><li>they determine which ports the machine is allowed to receive your data through </li></ul><ul><li>Available at most computer stores and in some operating systems </li></ul>4. Protect your computer: use firewalls
    54. 54. 3. Use care when reading email and downloading files <ul><li>Emails are the principal sources of computer virus infections </li></ul><ul><li>Be sure you know the source and the reason for receiving an attachment before opening it </li></ul><ul><ul><li>Many viruses spread because they originate from a familiar email address </li></ul></ul><ul><li>Be wary of URLs in email </li></ul><ul><li>Use care when downloading files: </li></ul><ul><ul><li>Do not run/install program with unknown origin </li></ul></ul><ul><ul><li>Do not download software unless you know it was written by a person or a company you trust </li></ul></ul><ul><ul><li>Do not give permission to third parties to download software on your machine </li></ul></ul>
    55. 55. 2. Use antivirus/Spyware software, and keep it up to date <ul><li>Protects your computer against known viruses/spyware </li></ul><ul><ul><li>new threats emerge daily </li></ul></ul><ul><li>Update your software tools regularly </li></ul><ul><ul><li>check the web site of your anti-virus software company to see some sample descriptions of viruses and to get regular updates for your software </li></ul></ul><ul><ul><li>Use Windows automatic updates </li></ul></ul>
    56. 56. <ul><li>Be aware and a promoter of proper cybersecurity practices </li></ul><ul><li>Learn cyber security practices: </li></ul><ul><ul><li>how to update antivirus/spyware tools </li></ul></ul><ul><ul><li>how to download security patches </li></ul></ul><ul><ul><li>how to backup your system </li></ul></ul><ul><ul><li>how to create a proper password </li></ul></ul><ul><ul><li>Try a site-advisor tool (e.g McAfee) </li></ul></ul><ul><li>Educate your family members, colleagues, friends </li></ul>
    57. 57. Top Ten Tips Summary <ul><li>Check your security settings on a regular basis </li></ul><ul><li>Disconnect from the Internet when not in use </li></ul><ul><li>Don’t share access to your computer </li></ul><ul><li>Backup your data regularly </li></ul><ul><li>Use smart passwords </li></ul><ul><li>Download and install security patches for your computer </li></ul><ul><li>Use a firewall </li></ul><ul><li>Open email attachments only from known people and when expected, and download files only from trusted sites </li></ul><ul><li>Use antivirus software and keep it up to date </li></ul><ul><li>Become aware and share awareness </li></ul>

    ×