This is a CSR (corporate social responsibility) presentation I did at the PTA general meeting at the CIS (Canadian International School) in Singapore on 19 Jan 2011. As i say on slide 1, the alternate titles for this presentation are these: PC common-sense… because we need to be reminded, Some tricks to trick the tricksters, De-Geeking geek stuff, Being consistent in your real-world and e-world. Enjoy. BTW, images are discovered and used without permission.
Presented a short talk on the Web 2.0 Lifestyle to members of the Association of Information Technology Students at SVCE, Sri Venkateswara College of Engineering, Chennai, India. Here are the presentation notes.
This talk describes the benefits of social media as well as its security challenges. It also outlines sample defenses that companies can adopt. It was given at CSO breakfast club in NYC.
Presented a short talk on the Web 2.0 Lifestyle to members of the Association of Information Technology Students at SVCE, Sri Venkateswara College of Engineering, Chennai, India. Here are the presentation notes.
This talk describes the benefits of social media as well as its security challenges. It also outlines sample defenses that companies can adopt. It was given at CSO breakfast club in NYC.
Lecture 3 of Emerging Technologies module
Music intro from
Monster Promenade Kevin MacLeod (incompetech.com) Licensed under Creative Commons "Attribution 3.0" http://creativecommons.org/licenses/by/3.0/
Lecture 3 of Emerging Technologies module
Music intro from
Monster Promenade Kevin MacLeod (incompetech.com) Licensed under Creative Commons "Attribution 3.0" http://creativecommons.org/licenses/by/3.0/
Presentation given by Marieke Guy at Online International Conference as part of the
Online Information Seminars/Information Masterclasses, December 1st 2009, London.
Protecting Your Privacy: Cyberspace Security, Real World SafetyAEGILITY
Carpe Diem Strategic Services (CDSS), a veteran owned service-disabled business that offers education and training which addresses threats to digital communications and online privacy.
Their mission is to assist individuals, families, and small businesses to understand, identify, and reduce threats and vulnerabilities that expose their business, financial, intellectual property, and sensitive personal data to potential exploitation and risk.
(Presentation, slides, and content created by AEGILITY)
Our Digital World - A look at E-safety issues for teenagersBrian Sharland
This is a presentation on esafety issues I give to parents at the school I work at. It covers common issues teenagers face as well as solutions and support for parents.
This presentation is in English; the announcement (beneath) & talk were in Dutch (NL)
OpenTechTalks | Ethisch hacken met Kali
Overheden, bedrijven en particulieren worden steeds kwetsbaarder voor aanvallen van black hat hackers, criminelen die de lekken in computers uitbuiten voor geldgewin of louter om schade te veroorzaken. Daartegenover staan de white hat hackers: zij testen computersystemen op fouten en dichten de lekken voordat malafide hackers inbreken. Tijl Deneut (UGent/Howest) geeft een overzicht van welke vormen van cybercriminalteit er bestaan en hoe je je ertegen kunt wapenen. De focus ligt op Kali Linux, een besturingssysteem dat honderden beveiligings- en testprogramma's bundelt. Volgende vragen komen aan bod: hoe installeer je Kali Linux? Hoe kun je in een veilige omgeving testen? Is ethisch hacken eigenlijk wel legaal? Algemene IT-kennis is aangewezen. Achteraf drinken we een glas in het café van Vooruit.
A Webinar on cyber Security Awareness and Digital Safety is hosted on the 7th of June, 2020. Sthir Yuwa in association with Information Security Response Team Nepal and Center For Cyber Security Research and Innovation conducted successfully. There were almost 70 participants on this webinar.
This 2 hour presentation provides an overview of Internet Security. The first part addresses current threats such as viruses, Trojans, backdoors, botnets and more. The second part talks about how to protect yourself from these threats by changing the way you surf the ‘Net and by understanding your software and hardware options.
Border crossing mobile social media life-saving security tipsErnest Staats
This practical talk focused on steps one can take which could save them or someone else while traveling internationally or even around town. The focus was on the information that is “leaked” by mobile devices and social media, along with some of the most-overlooked steps that could lower risk.
When you have computers connected to the internet or to any external device, you need to take precautions. There are threats present that can not only cause harm to your computers, but could damage files on your network or potentially put sensitive data at risk. This free webinar will help you understand what the threats are and how your computers can get infected.
Internet and PC safety - for CIS PTA - 19 Jan 2011
1. Internet & PC safety Alternative titles for this chat PC common-sense… because we need to be reminded Some tricks to trick the tricksters De-Geeking geek stuff Being consistent in your real-world and e-world By: Paul Southern
2. Presentation Notes Paul Southern Speaker: Paul Southern Content Manager: Presentation date/time: 19 Jan 2010 Title of presentation: Internet Safety Length of presentation 30 (including Q&A) Name of Event: PTA General Meeting Location of Event: CIS (Canadian International School, Singapore) , Toh Tuck campus Audience: Public, non NDA http://www.cis.edu.sg/cis/newsletter/week_newsletter_1011/TT%20WAG%20-%2017%20DECEMBER%202010.pdf Press Announcement:
3. NOTE This version of my presentation is for distribution on the CIS website. This is not necessarily authoritative nor instructional nor prescriptive as this is a deck that assisted a talk. You are free to use and distribute this. Any use is at your risk. I’m happy to help and can be contacted via the CIS PTA.
4. Paul Southern PTA, member at large Ex-Microsoft Communications and Media sector and TV solutions… not Windows or Internet Security Child Exploitation and Tracking System (CETS) A little bit, 2007 Reader's Digest, Canadian edition, Mar 2006 http://www.microsoft.com/industry/publicsector/government/programs/CETsabout.mspx
5. What’s happening today Online presence – 92% of US toddlers Social engineering, befriending, 419, cyber-bully Privacy pendulum Patriot Act (and others) Syndication of cyber-crime, corps to users Smartphones and apps Choice fatigue on online-safety !
6.
7. Today’s topics Physical protection Backups Virus protection Passwords Social Networks Privacy Your child’s PC
9. Physical security Always Screen saver with password-resume At home Laptop: external monitor, keyboard, closed, on shelf While out Good case, case in bag Keyboard protector Cable lock (deterrent) Privacy filter on screen Who’s behind you?
10. Aalok – PC + USB HDD Thesis on burnt PC Donny and keyboard Backups
11. Backups What to backup Product key for Windows, Office, etc… (photo) Recovery Disk – OS + drivers Data, eg: My Documents, etc... Where USB harddrive, offsite, safe YouTube, Flickr, SkyDrive, etc… Backup the backup Protecting the backup
13. Virus protection Use it or lose it ! Program & definitions Rogue versus real Mac/PC, Licensed/pirate, XP/Vista/Win7 Microsoft Security Essentials Not Microsoft Security Essentials 2011
26. Privacy - phone apps Two separate class-action lawsuits filed last week in federal court allege that Apple and as many as eight makers of popular applications for the iPhone facilitated the sharing of private information about their customers to advertisers. "their personal, private information was obtained without their knowledge or consent ... their personal property -- their computer -- was hijacked by Defendants and turned into a device capable of spying on their every online move."
28. Your children’s PC Where is it ? Can you see it ALL the time ? Can you see what they are doing ? Passwords Email, chat, etc.. Chat online only with real-world friends IE8, family settings
32. Top Takeaways Antivirus – use it or lose it Backups – do it or lose it Physical protection – have it or lose it Social Networks – FB privacy settings Passwords Your child’s PC – Family settings, location
33. Links Microsoft Security Essentials: http://www.microsoft.com/Security_Essentials/ 2 Interesting articles on privacy: WSJ – What They Know: http://blogs.wsj.com/wtk/ CNN – The End of Privacy: http://edition.cnn.com/SPECIALS/2010/end.of.privacy/ Online safety ITU Child Online Protection: http://www.itu.int/osg/csd/cybersecurity/gca/cop/children.html Microsoft: http://www.microsoft.com/protect/ Yahoo : http://safely.yahoo.com/ Kidsmart: http://www.kidsmart.org.uk/ GetNetWise: http://www.getnetwise.com/ Singapore NCPC: http://www.ncpc.gov.sg/ (go to publications) CEOP: http://www.thinkuknow.com/ Disney: http://www.disney.co.uk/DisneyOnline/Safesurfing/
34. Dec 2008 PTA meeting Mr. Julian Lim, from www.asknlearn.com, spoke at the December PTA general meeting. He told parentsthat they have a responsibility to become part of the cyber/virtual reality world so that they can speak intelligently with their children about using the Internet. Parents should be actively involved in their children’s computer time as early as possible. Computers in the home should be in a family zone so that it is easy to see who is doing what on line (not in child’s bedroom). Children should be given limits as to the time of day and length of time on the computer (only effective if parents enforce the rules). It is important that our children understand that they should never give personal information– full name, age, address, etc. on websites. They must CHAT online only with people they know OFF LINE. Cyber bullying is a real problem today. Monitor you children’s emails for rude or hurtful communication. Counsel your own children on what is appropriate language for emails. They should report abusive emails to parents, school or even authorities if necessary. Playing online games has become a social aspect of computer use for our children. Parents must be careful that children do not avoid real friend time for virtual friend time. Gaming addiction is a real danger.