Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Internet Security for Non-Techies


Published on

Presentation given at a variety of open community events put on by Automation Alley and partners.

Published in: Technology
  • Be the first to comment

  • Be the first to like this

Internet Security for Non-Techies

  1. 1. Internet and Email Security for Non-Techies
  2. 2. Our Agenda <ul><li>Little Background…why should you be worried about this? </li></ul><ul><li>Monitor Your Credit </li></ul><ul><ul><li>Equifax 800-685-1111 </li></ul></ul><ul><ul><li>Experian 888-397-3742 </li></ul></ul><ul><ul><li>TransUnion 877-922-8228 </li></ul></ul><ul><ul><li>LifeLock 800-LifeLock </li></ul></ul><ul><li>10 Ways to Stay Safe Online </li></ul><ul><li>Questions </li></ul>
  3. 3. Know What Others Know… <ul><li>About your credit </li></ul><ul><ul><li>Might be an indication something has happened to you credit worthiness </li></ul></ul><ul><ul><li>Check it regularly – you can get a free copy of the report once every 12 months </li></ul></ul><ul><ul><ul><li>Review them carefully; check the inquiries companies are making, look for new accounts, and anything that just looks odd. </li></ul></ul></ul><ul><ul><li>To stop identity thieves consider place a fraud alert on your account with all three of the bureaus </li></ul></ul><ul><ul><li>You have rights: </li></ul></ul><ul><ul><ul><li>FTC Website: </li></ul></ul></ul><ul><ul><ul><ul><li> </li></ul></ul></ul></ul><ul><ul><ul><li>Identity Theft Resource Center: </li></ul></ul></ul>
  4. 4. Secure Passwords <ul><li>Make it difficult to figure out </li></ul><ul><li>Don’t place it on a note on the back of your keyboard or in your desk drawer </li></ul><ul><li>A good password is: </li></ul><ul><ul><li>8 characters long </li></ul></ul><ul><ul><li>Has no personal information </li></ul></ul><ul><ul><li>Does not use real words </li></ul></ul><ul><ul><li>Mixes upper and lower case characters and numbers </li></ul></ul><ul><ul><li>Something you change regularly (every 30 to 60 days) </li></ul></ul><ul><li>Tools to Generate Safer Passwords: </li></ul><ul><ul><li>PC Tools Secure Password Generator: </li></ul></ul><ul><ul><li> </li></ul></ul><ul><ul><li>Random Password Generator: </li></ul></ul><ul><ul><li>Bytes Interactive Password Generator: </li></ul></ul><ul><ul><li> </li></ul></ul>
  5. 5. Don’t Open that Email <ul><li>Unless you know who it is from </li></ul><ul><li>Read the subject lines before opening, even if you think you know the person sending the message </li></ul><ul><li>Turn off your preview window </li></ul><ul><li>Make sure your antivirus and antispam software is updated regularly. </li></ul>
  6. 6. Buyer Beware – Shopping and Banking Online <ul><li>Make sure you know who you are doing business with, then ask a few questions: </li></ul><ul><ul><li>Are they reputable? </li></ul></ul><ul><ul><li>Is their site secure? </li></ul></ul><ul><ul><li>Is there a physical address and phone number on the site? </li></ul></ul><ul><ul><li>Does the URL start with https: and have a picture of a lock in the broswers status bar? </li></ul></ul><ul><ul><li>What is the companies return policy? </li></ul></ul><ul><li>Research a little…can you find online reviews of the company? </li></ul><ul><li>Pay with a credit card to limit your liability. </li></ul>
  7. 7. Keep Your Software and Hardware Current <ul><li>Firewalls </li></ul><ul><li>Virus Protection </li></ul><ul><li>Browser Updates </li></ul><ul><li>Operating System Updates </li></ul><ul><li>Application Software Updates </li></ul><ul><li>Run your anti-virus scan and other security software regularly (weekly or more) to catch the bad things before they make your computer “sick” or lose your identity. </li></ul>
  8. 8. Phishing and Pharming…not a sport or hobby <ul><li>Scams: </li></ul><ul><ul><li>Phishing is where the perpetrator sends out legitimate-looking emails appearing to come from a your bank, government, paypal, BestBuy, IRS, etc. in an effort to get you to give them your personal and financial information. </li></ul></ul><ul><ul><li>Pharming is another scam where they get you to go to a website that looks like the real deal but isn’t, they then trick you into entering your information with the goal of stealing your identity and financial information. </li></ul></ul><ul><li>Social engineering…the bad stuff. </li></ul>
  9. 9. Backup Your Data <ul><li>A good backup helps when: </li></ul><ul><ul><li>A virus kills your hard drive </li></ul></ul><ul><ul><li>When your computer crashes </li></ul></ul><ul><ul><li>If your computer is stolen </li></ul></ul><ul><li>Backups safeguard what is important to you </li></ul><ul><ul><li>Pictures, Papers, Financial data, and Medical data </li></ul></ul><ul><li>The best backup method is to an external hard drive or large thumb drive </li></ul><ul><li>Take your backups and place them someplace safe </li></ul>
  10. 10. Disable Hidden File Extensions <ul><li>Know what you are about to open…file extensions tell you what the file is: </li></ul><ul><ul><li>.exe = Program files (might be a virus or a good program) </li></ul></ul><ul><ul><li>.jpg = Your pictures </li></ul></ul><ul><ul><li>.doc = Your term paper </li></ul></ul><ul><li>Some of the malicious and virus files masquerade as other files. </li></ul><ul><li>Know before you click! </li></ul>
  11. 11. Administrative Accounts…good in moderation <ul><li>Keep this account separate from your working account(s) </li></ul><ul><ul><li>Use this account for installing software or new hardware </li></ul></ul><ul><ul><li>Use an account specific to you for day-to-day work </li></ul></ul><ul><li>If you are logged in as an administrator and catch a bad computer bug…it now has administrator rights to your computer. </li></ul>
  12. 12. Think Safe and Green <ul><li>When you leave your computer on and your Internet access open, you're giving potential hackers more opportunities to break into your computer. </li></ul><ul><li>Always remember to turn off your Internet connection when you're not using it, and turn your computer off in between uses. </li></ul>
  13. 13. Clean Up…Before You Recycle <ul><li>If you donate, sell, through away your old computer wipe the hard disc clean with: </li></ul><ul><ul><li>Darik’s Boot and Nuke: </li></ul></ul><ul><ul><li>ShreditX: </li></ul></ul><ul><ul><li>DisposeSecure: </li></ul></ul><ul><ul><li>Wipe Drive: </li></ul></ul><ul><li>Deleting and formatting your hard disc is not enough. </li></ul>
  14. 14. Questions.
  15. 15. Links and Suggestions <ul><li>Anti-Virus </li></ul><ul><ul><li>AVG Anti-Virus (Free): </li></ul></ul><ul><ul><li>Avast (Free): </li></ul></ul><ul><ul><li>Norton 360: ( ) </li></ul></ul><ul><ul><li>McAfee: ( ) </li></ul></ul><ul><ul><li>2008 Anti-Virus Review ( ) </li></ul></ul>
  16. 16. Links and Suggestions <ul><li>Spyware </li></ul><ul><ul><li>Spybot S&D (Free): ( ) </li></ul></ul><ul><ul><li>PCTools: ( ) </li></ul></ul><ul><ul><li>Windows Defender (Free): ( ) </li></ul></ul><ul><ul><li>Anti-Spyware Review 2008 </li></ul></ul><ul><ul><li>( ) </li></ul></ul>
  17. 17. Contact Information <ul><li>Richard G. Bush, Ph. D. </li></ul><ul><li>Director, Undergraduate Management Programs </li></ul><ul><li>Lawrence Technological University </li></ul><ul><li>[email_address] </li></ul><ul><li>248-204-3078 </li></ul>