SlideShare a Scribd company logo
1 of 57
January 9, 2014

LONG BEACH
COMPUTER CLUB
What is Data Privacy Day (DPD)
• Data Privacy Day is January 28, 2014.

• DPD encourages everyone to make protecting

privacy and data a greater priority.
• It is an International effort to empower and
educate people to protect their privacy and
control their digital footprint.
http://www.staysafeonline.org/data-privacy-day/

2
Data Privacy Day
• So much of our lives today is electronic data.

• From Social Security to credit card to our date

of birth; they are all numbers that need to be
kept private.
• These numbers exist on our computers and
mobile devices.

3
Data Privacy Day
• And because they are all connected to the

internet, those numbers are there as well. It's
not just numbers, we have contracts, wills,
financial agreements, family history, photos
and videos that should be kept private as well.
• This is your digital footprint.

4
Data Privacy Day
• Today's presentation is designed to give you the

knowledge about those power tools.
• Many of them are free or low cost and once you
set them up, they become second nature.

5
Data Privacy Day
• If you don‟t take advantage of them, you will be

exposed to the people who want to steal your
data.
• This could lead to identity theft and other
headaches.

6
Operating Systems & Programs / Apps
• The operating system (OS) is the behind-the-

scene genie that makes your device work it‟s
magic.
• OS X, Linux, iOS, Windows and Android are all
operating systems.
• From time to time, they do need patching and
updating to plug security holes.

7
Operating Systems & Programs / Apps
• Today‟s OS‟ are set by default to prompt you

when an update is available.
• You should do the update within a few days.
• If you have an OS older than 5 years, you need
to seriously think about some kind of upgrade.

8
Operating Systems & Programs / Apps
• Programs & Apps are your productivity tools
– Web browsers
– Games
– Audio / visuals tools
– Calendars
– Address books and more
• Many of them will prompt when updates are

available.
• Some will auto-update themselves or the OS
will update them for you.
9
Operating Systems & Programs / Apps
• There are programs that can help you keep your

programs up-to-date
– FileHippo
– Secunia
– Ninite

• Don‟t forget Microsoft‟s monthly Tuesday

updates
• They need to be installed

10
Be a Good Online Citizen
• Be empowered

• Control your digital footprint by
– Taking good care of your personal data
– Don‟t share it online
• Don‟t share other‟s personal data
– Bcc: is Confidential
– Use for all e-mail addresses
• Educate others by letting them know to use Bcc:

11
Don’t Forward Questionable E-mails
Check Them Out
• http://www.snopes.com/
– Definitive Internet reference source for urban
legends, folklore, myths, rumors, and
misinformation
• http://www.hoax-slayer.com/
– Debunking email hoaxes and exposing Internet
scams since 2003
• http://urbanlegends.about.com/

12
Don’t Forward Questionable E-mails
Check Them Out
• http://www.thatsnonsense.com/

• http://bobsullivan.net/

13
Make Passwords Long, Strong &
Unique
• Secure your devices

• Smartphone, Tablet, Laptop or PC
• Use passwords or passphrases
– Different for each account
– Include numbers, symbols and letters – capital &
lowercase
• Passphrases = multiple words that create a

phrase (longer / stronger than a password)

14
Make Passwords Long, Strong &
Unique
• A list of childhood pets – more=stronger
– NobleR!ngoBa!leyAlexT!gerPumpk!nJohnnyGage9
• An uncommon sentence
– !Can‟tBelieveIIntroducedGrantToAlice9
• Use Microsoft‟s Password Checker

15
Make Passwords Long, Strong &
Unique
• Is your personal memory getting full?

• A different password for each account can drive
•
•
•
•

you crazy
Use a Password program to remember all of
your passwords
https://www.dashlane.com/
https://www.passwordbox.com/
https://agilebits.com/onepassword

16
Make Passwords Long, Strong &
Unique
• https://lastpass.com/

• http://keepass.info/
• http://roboform.com

17
Safer Online Banking
• It‟s convenient

• But comes with certain risks
• Just like people being robbed at ATMs, or

having their cards cloned, online banking can
be vulnerable
• Follow these tips and you can minimize risks to
your finances and bank safely online

18
Safer Online Banking
• Create a strong password

• You know the drill
• Minimum of 8 characters – the longer the

better
• DON‟T use
– Your name, initials, date of birth or anything that

pertains to your relatives

19
Safer Online Banking
• If your bank asks you to provide answers to

security questions, the answers don‟t need to be
the real ones
• Thumper really doesn‟t have to be the name of
your first pet 

20
Safer Online Banking
• Secure your computer and keep it up-to-date

• You‟ve also heard this over and over again but

are you doing it
• Have a good, reliable security program
• Use Malwarebytes to double check your
program – www.malwarebytes.com
• Keep your operating system and other software
up-to-date

21
Safer Online Banking
• Don‟t click through on a link in an e-mail from
•
•

•
•
•

your „bank‟
Banks won‟t get in touch
Are you really expecting a shipment from UPS
or FedEx
Phishing is the name of the game – they want
your info and if you give it your money is gone!
Starbucks, McDonalds, etc. Wi-Fi
Banks won‟t call you on the phone and ask for
info, either
22
Safer Online Banking
• Don‟t access your bank account(s) via hotel, S

• Always log out of your online banking session
• Always look for the "lock" icon and https:// to

be sure you have a safe connection.
• Do you have private browsing set up on your

browser or smart phone?
• Set your browser to clear its cache when you
shut down your computer
23
Safer Online Banking
Internet Explorer

24

Chrome
Safer Online Banking
Internet Explorer

Chrome

25
Safer Online Banking
• Set up account notifications (if available)
– Does a withdrawal match or exceed a specified
–
–
–
–

amount
Is your account balance below a certain point
Alerts could give quick notice of suspicious
activity on your account
Monitor your accounts regularly
Don‟t wait a whole month to discover a
discrepancy

26
Safer Online Banking
• NEVER use your debit card online

• Have a credit card with a low limit OR
• Have bank set up a virtual card for you to use

for online purchases
• Set up two-factor authentication
• It‟s one of the best things you can do to make
sure your accounts don't get hacked

27
Safer Online Banking
Do you want to receive your access code via:

28
Cover Your Tracks
• Searching with Google?
– Click on a link and your search term is usually sent
–
–

–
–
–
–
–

to that site, along with computer & browser info
Can uniquely identify you
3rd party ads – they can build a profile on you
That‟s why those ads can follow you
Your profile can be sold
Google keeps your searches
Can be legally requested
Google can be hacked
29
Cover Your Tracks
• Browse with DuckDuckGo

• Doesn‟t send your searches to other sites
• Or store any personal information at all

30
Cover Your Tracks
• Browse with Ixquick

• It Protects Your Privacy!
• Does NOT collect or share ANY personal

information!
– Nada. Zilch. Nothing.

• World's most powerful search engine employing

the most advanced metasearch technology
• Comprehensive …. Accurate

31
Cover Your Tracks
• Browse with blekko

• Delivers high quality, curated results and

organizing content into categories

– Curated = cherry picks the best content that is

important and relevant to share

• Sophisticated search technology powers suite of

products

– Web search engine
– Mobile app

– Social news platform

32
Cover Your Tracks
• Use DoNotTrackMe by Abine

• Blocks companies from tracking

your browsing and helps
protect your personal info online
• PC – Tablet – Smart Phone
– Access DoNotTrackMe or any

browser or device to manage your
privacy anywhere
www.abine.com
33
Cover Your Tracks
• Also by Abine

• MaskMe
– Keeps you private as you browse and shop the web
– Creates and manages secure passwords
• DeleteMe
– Removes your public profile, contact and personal
info, and photos of you from leading data sites

34
Block Those Pesky Ads
• AdBlock Plus

• Surf the web without annoying ads!
• Blocks banners, pop-ups and video ads - even

on Facebook and YouTube
• Protects your online privacy

www.adblockplus.org
35
Block Those Pesky Ads

36
Block Those Pesky Ads with Abine

37
Mobile Devices
• What information does your smartphone have

about you?
• Smartphones store and transmit a wide range of
personal data which third parties can access–
including contact lists, pictures, browsing
history, certain identifying information and
stored location data.
• Secure your phone with a long, strong and
unique password, security software and other
privacy features.

38
Do You Keep a Clean Device?
• Smartphones can be vulnerable to viruses and

malware that can compromise personal
information.
• Protect your phone with security software and
by updating operating systems and apps.
• Avast.com
• Norton.com

39
Think Before You Text
• We‟ve heard this before about e-mail

• Keep in mind how the message might be read

before you send it.
• Be aware that texts can be forwarded.

40
Are You Respecting Others’ Privacy?
• Make sure you have someone‟s permission

before taking pictures or videos of them with
your phone.
• What you do online has the potential to affect
everyone – at home, at work and around the
world.
• Practicing good online habits benefits the global
digital community.

41
Think Before You App
• Own your online presence - It‟s ok to limit how

and with whom you share information.
• Before downloading a mobile app, understand
what information (your location, access to
social networks, etc.) the app accesses to
function
• Many applications do not need geo-location
enabled in order to provide the service.
• Opt-out of the location service feature on your
phone.
42
Are You Savvy About Wi-Fi Hotspots?
• Limit the type of business you conduct on your

smartphone or tablet via Wi-Fi hotspots and
adjust the security settings on your device to
limit who can access your machine.
• Wi-Fi hotspots are convenient but can leave you
vulnerable to intrusion.

43
Back-it Up
• Store digital copies of your valuable work,

music, photos and other information on an
external hard drive or online cloud.

44
Voice Over Internet Protocol (VoIP)
• BEWARE!

• Skype, Vonage, ooma, magicJack….
• SPIT (Spam over Internet Telephony)
– Fast, cheap and invasive way for telemarketing
messages to reach you
• Spoofing
– Attacker pretends to be a trusted
VoIP caller, such as your bank

45
Voice Over Internet Protocol (VoIP)
• ID Theft
– Cyber criminals gather bits of information collected
from your conversations
• Eavesdropping
– Hackers steal VoIP features like voicemail to get
information about the user
• Vishing attacks (voice phishing)
– Gain access to your personal and financial
information in identity theft schemes

46
Voice Over Internet Protocol (VoIP)
• Data sniffing
– Hackers identify, modify, store and play back your
conversations
• Compromising your confidentiality
– Is your phone call private and secure

• VoIP risks and safety issues continue to grow as

more and more people rely on this service to
make phone calls.
• Always be aware of the information you're
sharing and that others may be listening in.

47
Social Networking
• Only post what you would be comfortable

hanging on your front door….Abby Stokes
• DON‟T share:
– Phone numbers
– Home address

– Full date of birth
– Date of graduation
– Travel plans
– Email address

– Compromising photos

48
Social Networking
• Personal information you share online could

give cyber criminals enough to piece together
your email address and password, mother‟s
maiden name --- all that personal info we‟re not
supposed to share
• Don‟t rely on “recommended” settings or
default settings.
• Learn about the controls available and make
your own decisions.

49
Social Networking
• Set the privacy and security settings to your

personal comfort level for information sharing
• It's okay to limit with whom you share your
information
• When you update your status with your
whereabouts on a regular basis, you could tip
someone off to your routine
– Possible real-life threats like robberies, break-ins or

stalking

50
Social Networking
• Geotags can expose where you live, when you're

traveling and even what car you drive
– Could make you a target for robbery

• Most smartphones and digital cameras have a

function that automatically geotags all your
photos unless you turn it off
• Do you really want everyone to know the
location of your newest grandchild?

51
Social Networking
• If you are in someone‟s home or at their event,

get their OK before sharing their private space
with your social media friends
• It‟s a MUST to ask them first if you plan to
geotag anything

52
Social Networking
• Don‟t forget that long, strong and unique

password

53
Ransomware
• Two common types….

• Lockscreen ransomware: displays an image that

prevents you from accessing your computer
– FBI Ransomeware

• Encryption ransomware: encrypts files on your

system's hard drive, preventing you from
opening them
– Cryptolocker

54
Ransomeware
• The terms ransomware and scareware are often

used interchangeably.
• Both are schemes that attempt to make you
provide a payment for something you don't
want and is probably useless.
• Having a recent backup of your data, and taking
your computer to a technician if it becomes
affected, can mitigate the damage of such
schemes.

55
Ransomeware
• Two common types….

• Lockscreen ransomware: displays an image that

prevents you from accessing your computer
– FBI Ransomeware

• Encryption ransomware: encrypts files

on your system's hard drive,
preventing you from
opening them
– Cryptolocker

56
Questions?

More Related Content

What's hot

Cyber Security & Hygine
Cyber Security & HygineCyber Security & Hygine
Cyber Security & HygineAmit Arya
 
Intro to information security
Intro to information securityIntro to information security
Intro to information securityViraj Ekanayake
 
Protecting Yourself From Data and Identity Theft
Protecting Yourself From Data and Identity TheftProtecting Yourself From Data and Identity Theft
Protecting Yourself From Data and Identity TheftMary Lou Roberts
 
How you can protect your online identity, online privacy and VPNs
How you can protect your online identity, online privacy and VPNsHow you can protect your online identity, online privacy and VPNs
How you can protect your online identity, online privacy and VPNsIulia Porneala
 
CST 20363 Session 6 Cyberspace
CST 20363 Session 6 CyberspaceCST 20363 Session 6 Cyberspace
CST 20363 Session 6 Cyberspaceoudesign
 
Internet Privacy
Internet PrivacyInternet Privacy
Internet Privacyrealpeterz
 
Internet privacy presentation
Internet privacy presentationInternet privacy presentation
Internet privacy presentationMatthew Momney
 
Baking Security into the Company Culture (2017)
Baking Security into the Company Culture (2017) Baking Security into the Company Culture (2017)
Baking Security into the Company Culture (2017) Mike Kleviansky
 
OSINT - Open Soure Intelligence - Webinar on CyberSecurity
OSINT - Open Soure Intelligence - Webinar on CyberSecurityOSINT - Open Soure Intelligence - Webinar on CyberSecurity
OSINT - Open Soure Intelligence - Webinar on CyberSecurityMohammed Adam
 
October 2012 is_national_cyber_security_awareness_month
October 2012 is_national_cyber_security_awareness_monthOctober 2012 is_national_cyber_security_awareness_month
October 2012 is_national_cyber_security_awareness_monthEvelyn Berrier
 
Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things The Center for Identity
 
Digital parenting seminars
Digital parenting seminarsDigital parenting seminars
Digital parenting seminarsEmmanuel Arthur
 
An Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and LibrariesAn Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and LibrariesBlake Carver
 
A Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOsA Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOsgppcpa
 
Infocom Security
Infocom SecurityInfocom Security
Infocom Securitymmavis
 
Cyber crime awareness
Cyber crime awarenessCyber crime awareness
Cyber crime awarenessArjun Chetry
 
The Ten Commandments of Online Security and Privacy
The Ten Commandments of Online Security and PrivacyThe Ten Commandments of Online Security and Privacy
The Ten Commandments of Online Security and PrivacyJonathan Bacon
 
Safe and Responsible Use of ICT
Safe and Responsible Use of ICTSafe and Responsible Use of ICT
Safe and Responsible Use of ICTRolly Franco
 
Internet safety
Internet safetyInternet safety
Internet safetymyasinpak
 
Introduction to null villupuram community
Introduction to null villupuram communityIntroduction to null villupuram community
Introduction to null villupuram communityMohammed Adam
 

What's hot (20)

Cyber Security & Hygine
Cyber Security & HygineCyber Security & Hygine
Cyber Security & Hygine
 
Intro to information security
Intro to information securityIntro to information security
Intro to information security
 
Protecting Yourself From Data and Identity Theft
Protecting Yourself From Data and Identity TheftProtecting Yourself From Data and Identity Theft
Protecting Yourself From Data and Identity Theft
 
How you can protect your online identity, online privacy and VPNs
How you can protect your online identity, online privacy and VPNsHow you can protect your online identity, online privacy and VPNs
How you can protect your online identity, online privacy and VPNs
 
CST 20363 Session 6 Cyberspace
CST 20363 Session 6 CyberspaceCST 20363 Session 6 Cyberspace
CST 20363 Session 6 Cyberspace
 
Internet Privacy
Internet PrivacyInternet Privacy
Internet Privacy
 
Internet privacy presentation
Internet privacy presentationInternet privacy presentation
Internet privacy presentation
 
Baking Security into the Company Culture (2017)
Baking Security into the Company Culture (2017) Baking Security into the Company Culture (2017)
Baking Security into the Company Culture (2017)
 
OSINT - Open Soure Intelligence - Webinar on CyberSecurity
OSINT - Open Soure Intelligence - Webinar on CyberSecurityOSINT - Open Soure Intelligence - Webinar on CyberSecurity
OSINT - Open Soure Intelligence - Webinar on CyberSecurity
 
October 2012 is_national_cyber_security_awareness_month
October 2012 is_national_cyber_security_awareness_monthOctober 2012 is_national_cyber_security_awareness_month
October 2012 is_national_cyber_security_awareness_month
 
Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things
 
Digital parenting seminars
Digital parenting seminarsDigital parenting seminars
Digital parenting seminars
 
An Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and LibrariesAn Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and Libraries
 
A Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOsA Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOs
 
Infocom Security
Infocom SecurityInfocom Security
Infocom Security
 
Cyber crime awareness
Cyber crime awarenessCyber crime awareness
Cyber crime awareness
 
The Ten Commandments of Online Security and Privacy
The Ten Commandments of Online Security and PrivacyThe Ten Commandments of Online Security and Privacy
The Ten Commandments of Online Security and Privacy
 
Safe and Responsible Use of ICT
Safe and Responsible Use of ICTSafe and Responsible Use of ICT
Safe and Responsible Use of ICT
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Introduction to null villupuram community
Introduction to null villupuram communityIntroduction to null villupuram community
Introduction to null villupuram community
 

Similar to Judy Taylour's Digital Privacy Day 2014 Presentation

Webinar - Keep Your Connected Nonprofit or Library Secure - 2015-10-01
Webinar - Keep Your Connected Nonprofit or Library Secure - 2015-10-01Webinar - Keep Your Connected Nonprofit or Library Secure - 2015-10-01
Webinar - Keep Your Connected Nonprofit or Library Secure - 2015-10-01TechSoup
 
Users awarness programme for Online Privacy
Users awarness programme for Online PrivacyUsers awarness programme for Online Privacy
Users awarness programme for Online PrivacyKazi Sarwar Hossain
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber securityKaushal Solanki
 
Presentation internet safety & security by idaho web marketing meetup
Presentation   internet safety & security by idaho web marketing meetupPresentation   internet safety & security by idaho web marketing meetup
Presentation internet safety & security by idaho web marketing meetupJason Weaver
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness TrainingRandy Bowman
 
Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Abzetdin Adamov
 
Internet Security
Internet SecurityInternet Security
Internet Securitymjelson
 
Webinar: How to avoid the 12 Scams of Christmas
Webinar: How to avoid the 12 Scams of ChristmasWebinar: How to avoid the 12 Scams of Christmas
Webinar: How to avoid the 12 Scams of ChristmasAbilityNet
 
Securing your cyberspace_Watson
Securing your cyberspace_WatsonSecuring your cyberspace_Watson
Securing your cyberspace_WatsonPatricia M Watson
 
empowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationempowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationSheryldeVilla2
 
Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety Sadaf Walliyani
 
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdfitsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdfMansoorAhmed57263
 
IT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptOoXair
 
ch07-Security.pptx
ch07-Security.pptxch07-Security.pptx
ch07-Security.pptxLuckySaigon1
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayanehaz
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptxCharithraaAR
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital AgeMarian Merritt
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayane Hazimeh
 

Similar to Judy Taylour's Digital Privacy Day 2014 Presentation (20)

Webinar - Keep Your Connected Nonprofit or Library Secure - 2015-10-01
Webinar - Keep Your Connected Nonprofit or Library Secure - 2015-10-01Webinar - Keep Your Connected Nonprofit or Library Secure - 2015-10-01
Webinar - Keep Your Connected Nonprofit or Library Secure - 2015-10-01
 
Users awarness programme for Online Privacy
Users awarness programme for Online PrivacyUsers awarness programme for Online Privacy
Users awarness programme for Online Privacy
 
Digital Security and Hygiene.pptx
Digital Security and Hygiene.pptxDigital Security and Hygiene.pptx
Digital Security and Hygiene.pptx
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
Presentation internet safety & security by idaho web marketing meetup
Presentation   internet safety & security by idaho web marketing meetupPresentation   internet safety & security by idaho web marketing meetup
Presentation internet safety & security by idaho web marketing meetup
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness Training
 
Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Webinar: How to avoid the 12 Scams of Christmas
Webinar: How to avoid the 12 Scams of ChristmasWebinar: How to avoid the 12 Scams of Christmas
Webinar: How to avoid the 12 Scams of Christmas
 
Securing your cyberspace_Watson
Securing your cyberspace_WatsonSecuring your cyberspace_Watson
Securing your cyberspace_Watson
 
empowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationempowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentation
 
Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety
 
Cyber security awareness presentation nepal
Cyber security awareness presentation nepalCyber security awareness presentation nepal
Cyber security awareness presentation nepal
 
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdfitsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
 
IT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.ppt
 
ch07-Security.pptx
ch07-Security.pptxch07-Security.pptx
ch07-Security.pptx
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptx
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital Age
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 

More from Greater Cleveland PC Users Group (8)

Ira Wilsker's January 2014 Identity Theft Presentation
Ira Wilsker's January 2014 Identity Theft PresentationIra Wilsker's January 2014 Identity Theft Presentation
Ira Wilsker's January 2014 Identity Theft Presentation
 
Understand Online Privacy
Understand Online PrivacyUnderstand Online Privacy
Understand Online Privacy
 
Don't know SATA . . .
Don't know SATA . . .Don't know SATA . . .
Don't know SATA . . .
 
When Social Consumers Go Viral
When Social Consumers Go ViralWhen Social Consumers Go Viral
When Social Consumers Go Viral
 
A Day on the Internet
A Day on the InternetA Day on the Internet
A Day on the Internet
 
Facebook Privacy Settings
Facebook Privacy SettingsFacebook Privacy Settings
Facebook Privacy Settings
 
It's Time for Facebook Timeline - January 2012
It's Time for Facebook Timeline - January 2012It's Time for Facebook Timeline - January 2012
It's Time for Facebook Timeline - January 2012
 
Data Mining - GCPCUG May 2011
Data Mining - GCPCUG May 2011Data Mining - GCPCUG May 2011
Data Mining - GCPCUG May 2011
 

Recently uploaded

SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 

Recently uploaded (20)

SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 

Judy Taylour's Digital Privacy Day 2014 Presentation

  • 1. January 9, 2014 LONG BEACH COMPUTER CLUB
  • 2. What is Data Privacy Day (DPD) • Data Privacy Day is January 28, 2014. • DPD encourages everyone to make protecting privacy and data a greater priority. • It is an International effort to empower and educate people to protect their privacy and control their digital footprint. http://www.staysafeonline.org/data-privacy-day/ 2
  • 3. Data Privacy Day • So much of our lives today is electronic data. • From Social Security to credit card to our date of birth; they are all numbers that need to be kept private. • These numbers exist on our computers and mobile devices. 3
  • 4. Data Privacy Day • And because they are all connected to the internet, those numbers are there as well. It's not just numbers, we have contracts, wills, financial agreements, family history, photos and videos that should be kept private as well. • This is your digital footprint. 4
  • 5. Data Privacy Day • Today's presentation is designed to give you the knowledge about those power tools. • Many of them are free or low cost and once you set them up, they become second nature. 5
  • 6. Data Privacy Day • If you don‟t take advantage of them, you will be exposed to the people who want to steal your data. • This could lead to identity theft and other headaches. 6
  • 7. Operating Systems & Programs / Apps • The operating system (OS) is the behind-the- scene genie that makes your device work it‟s magic. • OS X, Linux, iOS, Windows and Android are all operating systems. • From time to time, they do need patching and updating to plug security holes. 7
  • 8. Operating Systems & Programs / Apps • Today‟s OS‟ are set by default to prompt you when an update is available. • You should do the update within a few days. • If you have an OS older than 5 years, you need to seriously think about some kind of upgrade. 8
  • 9. Operating Systems & Programs / Apps • Programs & Apps are your productivity tools – Web browsers – Games – Audio / visuals tools – Calendars – Address books and more • Many of them will prompt when updates are available. • Some will auto-update themselves or the OS will update them for you. 9
  • 10. Operating Systems & Programs / Apps • There are programs that can help you keep your programs up-to-date – FileHippo – Secunia – Ninite • Don‟t forget Microsoft‟s monthly Tuesday updates • They need to be installed 10
  • 11. Be a Good Online Citizen • Be empowered • Control your digital footprint by – Taking good care of your personal data – Don‟t share it online • Don‟t share other‟s personal data – Bcc: is Confidential – Use for all e-mail addresses • Educate others by letting them know to use Bcc: 11
  • 12. Don’t Forward Questionable E-mails Check Them Out • http://www.snopes.com/ – Definitive Internet reference source for urban legends, folklore, myths, rumors, and misinformation • http://www.hoax-slayer.com/ – Debunking email hoaxes and exposing Internet scams since 2003 • http://urbanlegends.about.com/ 12
  • 13. Don’t Forward Questionable E-mails Check Them Out • http://www.thatsnonsense.com/ • http://bobsullivan.net/ 13
  • 14. Make Passwords Long, Strong & Unique • Secure your devices • Smartphone, Tablet, Laptop or PC • Use passwords or passphrases – Different for each account – Include numbers, symbols and letters – capital & lowercase • Passphrases = multiple words that create a phrase (longer / stronger than a password) 14
  • 15. Make Passwords Long, Strong & Unique • A list of childhood pets – more=stronger – NobleR!ngoBa!leyAlexT!gerPumpk!nJohnnyGage9 • An uncommon sentence – !Can‟tBelieveIIntroducedGrantToAlice9 • Use Microsoft‟s Password Checker 15
  • 16. Make Passwords Long, Strong & Unique • Is your personal memory getting full? • A different password for each account can drive • • • • you crazy Use a Password program to remember all of your passwords https://www.dashlane.com/ https://www.passwordbox.com/ https://agilebits.com/onepassword 16
  • 17. Make Passwords Long, Strong & Unique • https://lastpass.com/ • http://keepass.info/ • http://roboform.com 17
  • 18. Safer Online Banking • It‟s convenient • But comes with certain risks • Just like people being robbed at ATMs, or having their cards cloned, online banking can be vulnerable • Follow these tips and you can minimize risks to your finances and bank safely online 18
  • 19. Safer Online Banking • Create a strong password • You know the drill • Minimum of 8 characters – the longer the better • DON‟T use – Your name, initials, date of birth or anything that pertains to your relatives 19
  • 20. Safer Online Banking • If your bank asks you to provide answers to security questions, the answers don‟t need to be the real ones • Thumper really doesn‟t have to be the name of your first pet  20
  • 21. Safer Online Banking • Secure your computer and keep it up-to-date • You‟ve also heard this over and over again but are you doing it • Have a good, reliable security program • Use Malwarebytes to double check your program – www.malwarebytes.com • Keep your operating system and other software up-to-date 21
  • 22. Safer Online Banking • Don‟t click through on a link in an e-mail from • • • • • your „bank‟ Banks won‟t get in touch Are you really expecting a shipment from UPS or FedEx Phishing is the name of the game – they want your info and if you give it your money is gone! Starbucks, McDonalds, etc. Wi-Fi Banks won‟t call you on the phone and ask for info, either 22
  • 23. Safer Online Banking • Don‟t access your bank account(s) via hotel, S • Always log out of your online banking session • Always look for the "lock" icon and https:// to be sure you have a safe connection. • Do you have private browsing set up on your browser or smart phone? • Set your browser to clear its cache when you shut down your computer 23
  • 24. Safer Online Banking Internet Explorer 24 Chrome
  • 25. Safer Online Banking Internet Explorer Chrome 25
  • 26. Safer Online Banking • Set up account notifications (if available) – Does a withdrawal match or exceed a specified – – – – amount Is your account balance below a certain point Alerts could give quick notice of suspicious activity on your account Monitor your accounts regularly Don‟t wait a whole month to discover a discrepancy 26
  • 27. Safer Online Banking • NEVER use your debit card online • Have a credit card with a low limit OR • Have bank set up a virtual card for you to use for online purchases • Set up two-factor authentication • It‟s one of the best things you can do to make sure your accounts don't get hacked 27
  • 28. Safer Online Banking Do you want to receive your access code via: 28
  • 29. Cover Your Tracks • Searching with Google? – Click on a link and your search term is usually sent – – – – – – – to that site, along with computer & browser info Can uniquely identify you 3rd party ads – they can build a profile on you That‟s why those ads can follow you Your profile can be sold Google keeps your searches Can be legally requested Google can be hacked 29
  • 30. Cover Your Tracks • Browse with DuckDuckGo • Doesn‟t send your searches to other sites • Or store any personal information at all 30
  • 31. Cover Your Tracks • Browse with Ixquick • It Protects Your Privacy! • Does NOT collect or share ANY personal information! – Nada. Zilch. Nothing. • World's most powerful search engine employing the most advanced metasearch technology • Comprehensive …. Accurate 31
  • 32. Cover Your Tracks • Browse with blekko • Delivers high quality, curated results and organizing content into categories – Curated = cherry picks the best content that is important and relevant to share • Sophisticated search technology powers suite of products – Web search engine – Mobile app – Social news platform 32
  • 33. Cover Your Tracks • Use DoNotTrackMe by Abine • Blocks companies from tracking your browsing and helps protect your personal info online • PC – Tablet – Smart Phone – Access DoNotTrackMe or any browser or device to manage your privacy anywhere www.abine.com 33
  • 34. Cover Your Tracks • Also by Abine • MaskMe – Keeps you private as you browse and shop the web – Creates and manages secure passwords • DeleteMe – Removes your public profile, contact and personal info, and photos of you from leading data sites 34
  • 35. Block Those Pesky Ads • AdBlock Plus • Surf the web without annoying ads! • Blocks banners, pop-ups and video ads - even on Facebook and YouTube • Protects your online privacy www.adblockplus.org 35
  • 37. Block Those Pesky Ads with Abine 37
  • 38. Mobile Devices • What information does your smartphone have about you? • Smartphones store and transmit a wide range of personal data which third parties can access– including contact lists, pictures, browsing history, certain identifying information and stored location data. • Secure your phone with a long, strong and unique password, security software and other privacy features. 38
  • 39. Do You Keep a Clean Device? • Smartphones can be vulnerable to viruses and malware that can compromise personal information. • Protect your phone with security software and by updating operating systems and apps. • Avast.com • Norton.com 39
  • 40. Think Before You Text • We‟ve heard this before about e-mail • Keep in mind how the message might be read before you send it. • Be aware that texts can be forwarded. 40
  • 41. Are You Respecting Others’ Privacy? • Make sure you have someone‟s permission before taking pictures or videos of them with your phone. • What you do online has the potential to affect everyone – at home, at work and around the world. • Practicing good online habits benefits the global digital community. 41
  • 42. Think Before You App • Own your online presence - It‟s ok to limit how and with whom you share information. • Before downloading a mobile app, understand what information (your location, access to social networks, etc.) the app accesses to function • Many applications do not need geo-location enabled in order to provide the service. • Opt-out of the location service feature on your phone. 42
  • 43. Are You Savvy About Wi-Fi Hotspots? • Limit the type of business you conduct on your smartphone or tablet via Wi-Fi hotspots and adjust the security settings on your device to limit who can access your machine. • Wi-Fi hotspots are convenient but can leave you vulnerable to intrusion. 43
  • 44. Back-it Up • Store digital copies of your valuable work, music, photos and other information on an external hard drive or online cloud. 44
  • 45. Voice Over Internet Protocol (VoIP) • BEWARE! • Skype, Vonage, ooma, magicJack…. • SPIT (Spam over Internet Telephony) – Fast, cheap and invasive way for telemarketing messages to reach you • Spoofing – Attacker pretends to be a trusted VoIP caller, such as your bank 45
  • 46. Voice Over Internet Protocol (VoIP) • ID Theft – Cyber criminals gather bits of information collected from your conversations • Eavesdropping – Hackers steal VoIP features like voicemail to get information about the user • Vishing attacks (voice phishing) – Gain access to your personal and financial information in identity theft schemes 46
  • 47. Voice Over Internet Protocol (VoIP) • Data sniffing – Hackers identify, modify, store and play back your conversations • Compromising your confidentiality – Is your phone call private and secure • VoIP risks and safety issues continue to grow as more and more people rely on this service to make phone calls. • Always be aware of the information you're sharing and that others may be listening in. 47
  • 48. Social Networking • Only post what you would be comfortable hanging on your front door….Abby Stokes • DON‟T share: – Phone numbers – Home address – Full date of birth – Date of graduation – Travel plans – Email address – Compromising photos 48
  • 49. Social Networking • Personal information you share online could give cyber criminals enough to piece together your email address and password, mother‟s maiden name --- all that personal info we‟re not supposed to share • Don‟t rely on “recommended” settings or default settings. • Learn about the controls available and make your own decisions. 49
  • 50. Social Networking • Set the privacy and security settings to your personal comfort level for information sharing • It's okay to limit with whom you share your information • When you update your status with your whereabouts on a regular basis, you could tip someone off to your routine – Possible real-life threats like robberies, break-ins or stalking 50
  • 51. Social Networking • Geotags can expose where you live, when you're traveling and even what car you drive – Could make you a target for robbery • Most smartphones and digital cameras have a function that automatically geotags all your photos unless you turn it off • Do you really want everyone to know the location of your newest grandchild? 51
  • 52. Social Networking • If you are in someone‟s home or at their event, get their OK before sharing their private space with your social media friends • It‟s a MUST to ask them first if you plan to geotag anything 52
  • 53. Social Networking • Don‟t forget that long, strong and unique password 53
  • 54. Ransomware • Two common types…. • Lockscreen ransomware: displays an image that prevents you from accessing your computer – FBI Ransomeware • Encryption ransomware: encrypts files on your system's hard drive, preventing you from opening them – Cryptolocker 54
  • 55. Ransomeware • The terms ransomware and scareware are often used interchangeably. • Both are schemes that attempt to make you provide a payment for something you don't want and is probably useless. • Having a recent backup of your data, and taking your computer to a technician if it becomes affected, can mitigate the damage of such schemes. 55
  • 56. Ransomeware • Two common types…. • Lockscreen ransomware: displays an image that prevents you from accessing your computer – FBI Ransomeware • Encryption ransomware: encrypts files on your system's hard drive, preventing you from opening them – Cryptolocker 56