SlideShare a Scribd company logo
1
JCCCRA TechTalk: The Ten Commandments of Online Security and Privacy (Thurs., Nov. 29, 2018)
Description: Unless you’re tech-savvy or a member of Generation Z, knowing what can endanger your
personal security and privacy online can be confusing. In this round table discussion, we’ll discuss the 10
commandments of online security and open the discussion up for attendees to share personal
experiences and lessons learned regarding online security and issues related to online privacy.
Examples of scams and Phishing:
“This is the IRS calling and if you don’t pay your back taxes immediately, you will be arrested and taken
to jail.”
“We’ve detected that your home computer has a malware virus. We can help you protect your data if
you give us access to your computer.”
The Ten Commandments of Online Security and Privacy
1. Thou shalt lock your devices (smartphones, tables, laptops, desktop computers) when not in
use.
2. Thou shalt protect your computing devices with an antivirus program.
a. And keep those programs up-to-date
3. Thou shalt choose strong, complex passwords or phrases.
a. Passwords should be 10-12 characters or more
b. Include numbers, upper and lowercase letters and special characters, if allowed
c. Never use the default password on a device (e.g., router) or account
d. Use different passwords for key personal and professional sites
2
i. Financial
ii. Health
iii. Social Security/Medicare
iv. Credit Card
e. You can generate passwords at http://passwordsgenerator.net/
f. Use a password vault (mSecure, Norton Password Manager, Browser password vault?)
g. Change your passwords regularly
4. Thou shalt regularly review privacy settings.
a. For Facebook: https://www.facebook.com/help/325807937506242 and
https://www.facebook.com/help/securitytips
b. For Google: https://myaccount.google.com/privacy
c. For Apple Store: https://www.apple.com/privacy/manage-your-privacy/
d. For your browser: Chrome https://support.google.com/chrome/answer/114836, Edge
https://privacy.microsoft.com/en-us/windows-10-microsoft-edge-and-privacy, Firefox
https://support.mozilla.org/en-US/products/firefox/privacy-and-security and Internet
Explorer https://support.microsoft.com/en-us/help/17441/windows-internet-explorer-
change-reset-settings#1TC=windows-7
e. Twitter: https://help.twitter.com/en/safety-and-security/account-security-tips
5. Thou shalt always ensure your internet connection is safe and secure.
a. Use a virtual private network (VPN) when on public WifI
i. https://www.f-secure.com/en_US/web/home_us/freedome $$4.17-$6.67
monthly or $49.99-$79.99 yearly charge (depending on number of devices: 3-7)
ii. https://us.norton.com/wifi-privacy $7.99 monthly, $39.99 yearly (jumps to
$79.99 after first year)
iii. 10+ Free VPN Software Programs https://www.lifewire.com/vpn-client-and-
server-software-downloads-818192
b. Install and use a firewall on all computing devices
i. A firewall is a barrier or shield that is intended to protect your PC, tablet, or
phone from the data-based malware dangers that exist on the Internet.
ii. Windows, Norton and most anti-virus programs include a firewall
iii. Be sure your firewall is enabled (Windows XP by default is not)
c. If a company (e.g., credit card) offers login or activity notifications, enroll!
6. Thou shalt practice safe browsing.
a. Be careful how much personal information you post online
b. Avoid click bait and dubious websites
c. Be wary of links in unsolicited email and posts (very risky)
d. Be wary of unanticipated file attachments from friends, financial institutions, credit card
companies and so on
i. Do not click links in email messages from companies or financial institutions
ii. Instead go to their known web address
e. Using a banking app is typically safer than using their website
7. Thou shalt make online purchases only from secure sites.
3
a. Look for https:// prefix to web addresses
b. Look for the locked padlock icon preceding the web address in your browser
c. An unlocked padlock means communications are not secure and protected by a secure
sockets layer (SSL).
d. SSL means communications between your web browser and the web server is encrypted
8. Thou shalt use great discretion when downloading files, apps and documents.
a. Download apps from Google Play or the Apple App Store only
b. Exceptions: apps from secure and known sites
9. Thou shalt use two-factor authentication when available.
a. Microsoft: https://support.microsoft.com/en-us/help/12408/microsoft-account-how-to-
use-two-step-verification
b. Google: https://support.google.com/a/answer/175197
c. Facebook: https://www.facebook.com/help/148233965247823
d. Apple: https://support.apple.com/en-us/HT204915
e. Most financial institutions offer it
f. Many online accounts offer it
10. Thou shalt actively keep abreast of online scams and keep your guard up.
Definitions
Phishing: A scam by which an Internet user is duped (as by a deceptive e-mail message) into
revealing personal or confidential information which the scammer can use illicitly. A common
phishing scam involves sending e-mails that appear to come from banks requesting recipients to
verify their accounts by typing personal details, such as credit card information, into a Web site that
has been disguised to look like the real thing.
Malware = Malicious Software: Software designed to interfere with a computer's normal
functioning.
Ransomware: Malware that requires the victim to pay a ransom to access encrypted files.
In September of 2013, security for small accounting offices changed forever with the appearance of
a new class of threats called ransomware. … you open a file attached to an innocent-looking e-mail,
and the program encrypts key files and drives so they cannot be accessed. The files are locked until
you pay a ransom. — Dave Mcclure
With ransomware, a hacker (electronically) slips into a system, then puts encryption controls in
place that locks users out. The hackers then demand money to "unlock" the data. — Elizabeth
Millard
Notes
Many phishing schemes start with something looking very innocent and official but lead unassuming
users to websites designed to collect the personal information from you. If you receive an email from
4
any websites asking for personal information, open a new tab and go direct to known web address for
the company instead of clicking links within the email.
Legitimate online services should never ask you for your login credentials (username and password),
social security number, Medicare number, or other personal data (address, maiden name, mother’s
maiden name, and so on).
Sources
https://usa.kaspersky.com/resource-center/preemptive-safety/top-10-internet-safety-rules-and-what-
not-to-do-online
https://securingtomorrow.mcafee.com/consumer/consumer-threat-notices/10-tips-stay-safe-online/
https://securingtomorrow.mcafee.com/
https://www.webroot.com/blog/2014/08/06/8-tips-stay-safe-online/
https://blog.f-secure.com/10-things-we-can-all-do-to-make-a-safer-internet/
https://www.fbi.gov/scams-and-safety common fraud schemes, on the Internet e-scams, about
protecting your kids
https://blog.f-secure.com/online-banking-tips-3-security-essentials-you-need-to-know/
https://blog.f-secure.com/at-least-5-things-you-shouldnt-share-on-the-internet/
Definitions from https://www.merriam-webster.com
https://staysafeonline.org/stay-safe-online/managing-your-privacy/privacy-tips-teens/
https://staysafeonline.org/stay-safe-online/managing-your-privacy/privacy-tips-older-adults/

More Related Content

What's hot

Understanding security and safe computing
Understanding security and safe computingUnderstanding security and safe computing
Understanding security and safe computing
Mukul Kumar
 
Cyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena MishraCyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena Mishra
Devsena Mishra
 
Cyber Security
Cyber SecurityCyber Security
Cybersecurity Awareness
Cybersecurity AwarenessCybersecurity Awareness
Cybersecurity Awareness
JoshuaWisniewski3
 
Cybersecurity Awareness Infographics
Cybersecurity Awareness InfographicsCybersecurity Awareness Infographics
Cybersecurity Awareness Infographics
NetLockSmith
 
Empowerment Technology Lesson 2
Empowerment Technology Lesson 2Empowerment Technology Lesson 2
Empowerment Technology Lesson 2
alicelagajino
 
Year 7 - Week 5 esafety
Year 7 - Week 5   esafetyYear 7 - Week 5   esafety
Year 7 - Week 5 esafety
teachesict
 
Computing and ethics
Computing and ethicsComputing and ethics
Computing and ethics
Nikki Shree
 
Ten Important Rules
Ten Important RulesTen Important Rules
Ten Important Rules
ritz482
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02amiinaaa
 
Building a culture of security
Building a culture of securityBuilding a culture of security
Building a culture of security
Courion Corporation
 
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesOnline Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Mark Jhon Oxillo
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pests
peterhitch
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
DigitalLifeAdvisor.com
 
Parag presentation on ethical hacking
Parag presentation on ethical hackingParag presentation on ethical hacking
Parag presentation on ethical hacking
parag101
 
Learn awesome hacking tricks
Learn awesome hacking tricksLearn awesome hacking tricks
Learn awesome hacking tricks
Sudhanshu Mishra
 
Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual
Jay Nagar
 
Online safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and EtiquetteOnline safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and Etiquette
DOFJLCCDD
 

What's hot (20)

Understanding security and safe computing
Understanding security and safe computingUnderstanding security and safe computing
Understanding security and safe computing
 
Cyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena MishraCyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena Mishra
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cybersecurity Awareness
Cybersecurity AwarenessCybersecurity Awareness
Cybersecurity Awareness
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Cybersecurity Awareness Infographics
Cybersecurity Awareness InfographicsCybersecurity Awareness Infographics
Cybersecurity Awareness Infographics
 
Empowerment Technology Lesson 2
Empowerment Technology Lesson 2Empowerment Technology Lesson 2
Empowerment Technology Lesson 2
 
Year 7 - Week 5 esafety
Year 7 - Week 5   esafetyYear 7 - Week 5   esafety
Year 7 - Week 5 esafety
 
Computing and ethics
Computing and ethicsComputing and ethics
Computing and ethics
 
Ten Important Rules
Ten Important RulesTen Important Rules
Ten Important Rules
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
 
Building a culture of security
Building a culture of securityBuilding a culture of security
Building a culture of security
 
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesOnline Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pests
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Parag presentation on ethical hacking
Parag presentation on ethical hackingParag presentation on ethical hacking
Parag presentation on ethical hacking
 
Learn awesome hacking tricks
Learn awesome hacking tricksLearn awesome hacking tricks
Learn awesome hacking tricks
 
C 7
C 7C 7
C 7
 
Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual
 
Online safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and EtiquetteOnline safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and Etiquette
 

Similar to Notes to The Ten Commandments of Online Security and Privacy

ORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptx
ORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptxORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptx
ORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptx
PiedadCES
 
ORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptx
ORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptxORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptx
ORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptx
JohnSimLabayan2
 
Giarritano concept paper 4
Giarritano concept paper 4Giarritano concept paper 4
Giarritano concept paper 4leahg118
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet SecurityAshley Zimmerman
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet SecurityJFashant
 
Cyber security awareness presentation nepal
Cyber security awareness presentation nepalCyber security awareness presentation nepal
Cyber security awareness presentation nepal
ICT Frame Magazine Pvt. Ltd.
 
A Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the InternetA Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the Internet
- Mark - Fullbright
 
Five habits that might be a cyber security risk
Five habits that might be a cyber security riskFive habits that might be a cyber security risk
Five habits that might be a cyber security risk
K. A. M Lutfullah
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Adeel Younas
 
techalpha07
techalpha07techalpha07
Cybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppCybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureApp
WeSecureApp
 
Users guide
Users guideUsers guide
Users guide
Darren Thomas
 
Cyber Security for REALTORS®
Cyber Security for REALTORS®Cyber Security for REALTORS®
Cyber Security for REALTORS®
Danny Fredericks
 
Password and Account Management Strategies - April 2019
Password and Account Management Strategies - April 2019Password and Account Management Strategies - April 2019
Password and Account Management Strategies - April 2019
Kimberley Dray
 
Document safer online for nonprofits guide
Document safer online for nonprofits guideDocument safer online for nonprofits guide
Document safer online for nonprofits guide
Nguyen Xuan Quang
 
User security awareness
User security awarenessUser security awareness
User security awareness
K. A. M Lutfullah
 
Home and Business Computer Security 2014
Home and Business Computer Security 2014Home and Business Computer Security 2014
Home and Business Computer Security 2014
B2BPlanner Ltd.
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101
mateenzero
 
Ict lec#9
Ict lec#9Ict lec#9
Ict lec#9
amberkhan59
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptx
CharithraaAR
 

Similar to Notes to The Ten Commandments of Online Security and Privacy (20)

ORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptx
ORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptxORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptx
ORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptx
 
ORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptx
ORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptxORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptx
ORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptx
 
Giarritano concept paper 4
Giarritano concept paper 4Giarritano concept paper 4
Giarritano concept paper 4
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet Security
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet Security
 
Cyber security awareness presentation nepal
Cyber security awareness presentation nepalCyber security awareness presentation nepal
Cyber security awareness presentation nepal
 
A Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the InternetA Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the Internet
 
Five habits that might be a cyber security risk
Five habits that might be a cyber security riskFive habits that might be a cyber security risk
Five habits that might be a cyber security risk
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
techalpha07
techalpha07techalpha07
techalpha07
 
Cybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppCybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureApp
 
Users guide
Users guideUsers guide
Users guide
 
Cyber Security for REALTORS®
Cyber Security for REALTORS®Cyber Security for REALTORS®
Cyber Security for REALTORS®
 
Password and Account Management Strategies - April 2019
Password and Account Management Strategies - April 2019Password and Account Management Strategies - April 2019
Password and Account Management Strategies - April 2019
 
Document safer online for nonprofits guide
Document safer online for nonprofits guideDocument safer online for nonprofits guide
Document safer online for nonprofits guide
 
User security awareness
User security awarenessUser security awareness
User security awareness
 
Home and Business Computer Security 2014
Home and Business Computer Security 2014Home and Business Computer Security 2014
Home and Business Computer Security 2014
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101
 
Ict lec#9
Ict lec#9Ict lec#9
Ict lec#9
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptx
 

More from Jonathan Bacon

Chapter 5 Jeremiah: Plucking Up and Planting
Chapter 5 Jeremiah: Plucking Up and PlantingChapter 5 Jeremiah: Plucking Up and Planting
Chapter 5 Jeremiah: Plucking Up and Planting
Jonathan Bacon
 
The Naked Truth About Retirement 2021 Edition
The Naked Truth About Retirement 2021 EditionThe Naked Truth About Retirement 2021 Edition
The Naked Truth About Retirement 2021 Edition
Jonathan Bacon
 
Johnson County Community College Fall 2020 General Meeting
Johnson County Community College Fall 2020 General MeetingJohnson County Community College Fall 2020 General Meeting
Johnson County Community College Fall 2020 General Meeting
Jonathan Bacon
 
Walking, Hiking, Cycling Trails of Johnson County
Walking, Hiking, Cycling Trails of Johnson CountyWalking, Hiking, Cycling Trails of Johnson County
Walking, Hiking, Cycling Trails of Johnson County
Jonathan Bacon
 
Online Discussion: Ways to Address Online Privacy and Security
Online Discussion: Ways to Address Online Privacy and SecurityOnline Discussion: Ways to Address Online Privacy and Security
Online Discussion: Ways to Address Online Privacy and Security
Jonathan Bacon
 
The Naked Truth About Retirement - 2020 Edition
The Naked Truth About  Retirement - 2020 EditionThe Naked Truth About  Retirement - 2020 Edition
The Naked Truth About Retirement - 2020 Edition
Jonathan Bacon
 
Mobile Photo Editing with Snapseed
Mobile Photo Editing with SnapseedMobile Photo Editing with Snapseed
Mobile Photo Editing with Snapseed
Jonathan Bacon
 
Fake News and Mainstream Media Bias
Fake News and Mainstream Media BiasFake News and Mainstream Media Bias
Fake News and Mainstream Media Bias
Jonathan Bacon
 
400+ Channels & Nothing to Watch
400+ Channels & Nothing to Watch400+ Channels & Nothing to Watch
400+ Channels & Nothing to Watch
Jonathan Bacon
 
Social Media Risks
Social Media RisksSocial Media Risks
Social Media Risks
Jonathan Bacon
 
iPhone Tips for Everyday Users
iPhone Tips for Everyday Users iPhone Tips for Everyday Users
iPhone Tips for Everyday Users
Jonathan Bacon
 
Notes Included: Naked Truth About Retirement 2019
Notes Included: Naked Truth About Retirement 2019Notes Included: Naked Truth About Retirement 2019
Notes Included: Naked Truth About Retirement 2019
Jonathan Bacon
 
Naked Truth About Retirement 2019
Naked Truth About Retirement 2019Naked Truth About Retirement 2019
Naked Truth About Retirement 2019
Jonathan Bacon
 
The Ten Commandments of Online Security and Privacy
The Ten Commandments of Online Security and PrivacyThe Ten Commandments of Online Security and Privacy
The Ten Commandments of Online Security and Privacy
Jonathan Bacon
 
Exploring Travel Apps and Tools
Exploring Travel Apps and Tools Exploring Travel Apps and Tools
Exploring Travel Apps and Tools
Jonathan Bacon
 
Athanasius of Alexandria
Athanasius of AlexandriaAthanasius of Alexandria
Athanasius of Alexandria
Jonathan Bacon
 
Exploring Do-It-Yourself and Installed Home Security Systems
Exploring Do-It-Yourself and Installed Home Security SystemsExploring Do-It-Yourself and Installed Home Security Systems
Exploring Do-It-Yourself and Installed Home Security Systems
Jonathan Bacon
 
Rapid-fire Ed Tech Forums #1 & #2: 7 Presenters Offer 7 Slides in 7 Minutes
Rapid-fire Ed Tech Forums #1 & #2: 7 Presenters Offer 7 Slides in 7 Minutes Rapid-fire Ed Tech Forums #1 & #2: 7 Presenters Offer 7 Slides in 7 Minutes
Rapid-fire Ed Tech Forums #1 & #2: 7 Presenters Offer 7 Slides in 7 Minutes
Jonathan Bacon
 
Quick Guide to Google Photos
Quick Guide to Google PhotosQuick Guide to Google Photos
Quick Guide to Google Photos
Jonathan Bacon
 
Cutting the Cable and Reducing Your Media Costs
Cutting the Cable and Reducing Your Media CostsCutting the Cable and Reducing Your Media Costs
Cutting the Cable and Reducing Your Media Costs
Jonathan Bacon
 

More from Jonathan Bacon (20)

Chapter 5 Jeremiah: Plucking Up and Planting
Chapter 5 Jeremiah: Plucking Up and PlantingChapter 5 Jeremiah: Plucking Up and Planting
Chapter 5 Jeremiah: Plucking Up and Planting
 
The Naked Truth About Retirement 2021 Edition
The Naked Truth About Retirement 2021 EditionThe Naked Truth About Retirement 2021 Edition
The Naked Truth About Retirement 2021 Edition
 
Johnson County Community College Fall 2020 General Meeting
Johnson County Community College Fall 2020 General MeetingJohnson County Community College Fall 2020 General Meeting
Johnson County Community College Fall 2020 General Meeting
 
Walking, Hiking, Cycling Trails of Johnson County
Walking, Hiking, Cycling Trails of Johnson CountyWalking, Hiking, Cycling Trails of Johnson County
Walking, Hiking, Cycling Trails of Johnson County
 
Online Discussion: Ways to Address Online Privacy and Security
Online Discussion: Ways to Address Online Privacy and SecurityOnline Discussion: Ways to Address Online Privacy and Security
Online Discussion: Ways to Address Online Privacy and Security
 
The Naked Truth About Retirement - 2020 Edition
The Naked Truth About  Retirement - 2020 EditionThe Naked Truth About  Retirement - 2020 Edition
The Naked Truth About Retirement - 2020 Edition
 
Mobile Photo Editing with Snapseed
Mobile Photo Editing with SnapseedMobile Photo Editing with Snapseed
Mobile Photo Editing with Snapseed
 
Fake News and Mainstream Media Bias
Fake News and Mainstream Media BiasFake News and Mainstream Media Bias
Fake News and Mainstream Media Bias
 
400+ Channels & Nothing to Watch
400+ Channels & Nothing to Watch400+ Channels & Nothing to Watch
400+ Channels & Nothing to Watch
 
Social Media Risks
Social Media RisksSocial Media Risks
Social Media Risks
 
iPhone Tips for Everyday Users
iPhone Tips for Everyday Users iPhone Tips for Everyday Users
iPhone Tips for Everyday Users
 
Notes Included: Naked Truth About Retirement 2019
Notes Included: Naked Truth About Retirement 2019Notes Included: Naked Truth About Retirement 2019
Notes Included: Naked Truth About Retirement 2019
 
Naked Truth About Retirement 2019
Naked Truth About Retirement 2019Naked Truth About Retirement 2019
Naked Truth About Retirement 2019
 
The Ten Commandments of Online Security and Privacy
The Ten Commandments of Online Security and PrivacyThe Ten Commandments of Online Security and Privacy
The Ten Commandments of Online Security and Privacy
 
Exploring Travel Apps and Tools
Exploring Travel Apps and Tools Exploring Travel Apps and Tools
Exploring Travel Apps and Tools
 
Athanasius of Alexandria
Athanasius of AlexandriaAthanasius of Alexandria
Athanasius of Alexandria
 
Exploring Do-It-Yourself and Installed Home Security Systems
Exploring Do-It-Yourself and Installed Home Security SystemsExploring Do-It-Yourself and Installed Home Security Systems
Exploring Do-It-Yourself and Installed Home Security Systems
 
Rapid-fire Ed Tech Forums #1 & #2: 7 Presenters Offer 7 Slides in 7 Minutes
Rapid-fire Ed Tech Forums #1 & #2: 7 Presenters Offer 7 Slides in 7 Minutes Rapid-fire Ed Tech Forums #1 & #2: 7 Presenters Offer 7 Slides in 7 Minutes
Rapid-fire Ed Tech Forums #1 & #2: 7 Presenters Offer 7 Slides in 7 Minutes
 
Quick Guide to Google Photos
Quick Guide to Google PhotosQuick Guide to Google Photos
Quick Guide to Google Photos
 
Cutting the Cable and Reducing Your Media Costs
Cutting the Cable and Reducing Your Media CostsCutting the Cable and Reducing Your Media Costs
Cutting the Cable and Reducing Your Media Costs
 

Recently uploaded

1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
3ipehhoa
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
JungkooksNonexistent
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
JeyaPerumal1
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
3ipehhoa
 
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptxLiving-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
TristanJasperRamos
 
ER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAEER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAE
Himani415946
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
Rogerio Filho
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Sanjeev Rampal
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
laozhuseo02
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
Gal Baras
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
natyesu
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
3ipehhoa
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
nirahealhty
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
laozhuseo02
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
Arif0071
 
Output determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CCOutput determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CC
ShahulHameed54211
 

Recently uploaded (16)

1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
 
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptxLiving-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
 
ER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAEER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAE
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
 
Output determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CCOutput determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CC
 

Notes to The Ten Commandments of Online Security and Privacy

  • 1. 1 JCCCRA TechTalk: The Ten Commandments of Online Security and Privacy (Thurs., Nov. 29, 2018) Description: Unless you’re tech-savvy or a member of Generation Z, knowing what can endanger your personal security and privacy online can be confusing. In this round table discussion, we’ll discuss the 10 commandments of online security and open the discussion up for attendees to share personal experiences and lessons learned regarding online security and issues related to online privacy. Examples of scams and Phishing: “This is the IRS calling and if you don’t pay your back taxes immediately, you will be arrested and taken to jail.” “We’ve detected that your home computer has a malware virus. We can help you protect your data if you give us access to your computer.” The Ten Commandments of Online Security and Privacy 1. Thou shalt lock your devices (smartphones, tables, laptops, desktop computers) when not in use. 2. Thou shalt protect your computing devices with an antivirus program. a. And keep those programs up-to-date 3. Thou shalt choose strong, complex passwords or phrases. a. Passwords should be 10-12 characters or more b. Include numbers, upper and lowercase letters and special characters, if allowed c. Never use the default password on a device (e.g., router) or account d. Use different passwords for key personal and professional sites
  • 2. 2 i. Financial ii. Health iii. Social Security/Medicare iv. Credit Card e. You can generate passwords at http://passwordsgenerator.net/ f. Use a password vault (mSecure, Norton Password Manager, Browser password vault?) g. Change your passwords regularly 4. Thou shalt regularly review privacy settings. a. For Facebook: https://www.facebook.com/help/325807937506242 and https://www.facebook.com/help/securitytips b. For Google: https://myaccount.google.com/privacy c. For Apple Store: https://www.apple.com/privacy/manage-your-privacy/ d. For your browser: Chrome https://support.google.com/chrome/answer/114836, Edge https://privacy.microsoft.com/en-us/windows-10-microsoft-edge-and-privacy, Firefox https://support.mozilla.org/en-US/products/firefox/privacy-and-security and Internet Explorer https://support.microsoft.com/en-us/help/17441/windows-internet-explorer- change-reset-settings#1TC=windows-7 e. Twitter: https://help.twitter.com/en/safety-and-security/account-security-tips 5. Thou shalt always ensure your internet connection is safe and secure. a. Use a virtual private network (VPN) when on public WifI i. https://www.f-secure.com/en_US/web/home_us/freedome $$4.17-$6.67 monthly or $49.99-$79.99 yearly charge (depending on number of devices: 3-7) ii. https://us.norton.com/wifi-privacy $7.99 monthly, $39.99 yearly (jumps to $79.99 after first year) iii. 10+ Free VPN Software Programs https://www.lifewire.com/vpn-client-and- server-software-downloads-818192 b. Install and use a firewall on all computing devices i. A firewall is a barrier or shield that is intended to protect your PC, tablet, or phone from the data-based malware dangers that exist on the Internet. ii. Windows, Norton and most anti-virus programs include a firewall iii. Be sure your firewall is enabled (Windows XP by default is not) c. If a company (e.g., credit card) offers login or activity notifications, enroll! 6. Thou shalt practice safe browsing. a. Be careful how much personal information you post online b. Avoid click bait and dubious websites c. Be wary of links in unsolicited email and posts (very risky) d. Be wary of unanticipated file attachments from friends, financial institutions, credit card companies and so on i. Do not click links in email messages from companies or financial institutions ii. Instead go to their known web address e. Using a banking app is typically safer than using their website 7. Thou shalt make online purchases only from secure sites.
  • 3. 3 a. Look for https:// prefix to web addresses b. Look for the locked padlock icon preceding the web address in your browser c. An unlocked padlock means communications are not secure and protected by a secure sockets layer (SSL). d. SSL means communications between your web browser and the web server is encrypted 8. Thou shalt use great discretion when downloading files, apps and documents. a. Download apps from Google Play or the Apple App Store only b. Exceptions: apps from secure and known sites 9. Thou shalt use two-factor authentication when available. a. Microsoft: https://support.microsoft.com/en-us/help/12408/microsoft-account-how-to- use-two-step-verification b. Google: https://support.google.com/a/answer/175197 c. Facebook: https://www.facebook.com/help/148233965247823 d. Apple: https://support.apple.com/en-us/HT204915 e. Most financial institutions offer it f. Many online accounts offer it 10. Thou shalt actively keep abreast of online scams and keep your guard up. Definitions Phishing: A scam by which an Internet user is duped (as by a deceptive e-mail message) into revealing personal or confidential information which the scammer can use illicitly. A common phishing scam involves sending e-mails that appear to come from banks requesting recipients to verify their accounts by typing personal details, such as credit card information, into a Web site that has been disguised to look like the real thing. Malware = Malicious Software: Software designed to interfere with a computer's normal functioning. Ransomware: Malware that requires the victim to pay a ransom to access encrypted files. In September of 2013, security for small accounting offices changed forever with the appearance of a new class of threats called ransomware. … you open a file attached to an innocent-looking e-mail, and the program encrypts key files and drives so they cannot be accessed. The files are locked until you pay a ransom. — Dave Mcclure With ransomware, a hacker (electronically) slips into a system, then puts encryption controls in place that locks users out. The hackers then demand money to "unlock" the data. — Elizabeth Millard Notes Many phishing schemes start with something looking very innocent and official but lead unassuming users to websites designed to collect the personal information from you. If you receive an email from
  • 4. 4 any websites asking for personal information, open a new tab and go direct to known web address for the company instead of clicking links within the email. Legitimate online services should never ask you for your login credentials (username and password), social security number, Medicare number, or other personal data (address, maiden name, mother’s maiden name, and so on). Sources https://usa.kaspersky.com/resource-center/preemptive-safety/top-10-internet-safety-rules-and-what- not-to-do-online https://securingtomorrow.mcafee.com/consumer/consumer-threat-notices/10-tips-stay-safe-online/ https://securingtomorrow.mcafee.com/ https://www.webroot.com/blog/2014/08/06/8-tips-stay-safe-online/ https://blog.f-secure.com/10-things-we-can-all-do-to-make-a-safer-internet/ https://www.fbi.gov/scams-and-safety common fraud schemes, on the Internet e-scams, about protecting your kids https://blog.f-secure.com/online-banking-tips-3-security-essentials-you-need-to-know/ https://blog.f-secure.com/at-least-5-things-you-shouldnt-share-on-the-internet/ Definitions from https://www.merriam-webster.com https://staysafeonline.org/stay-safe-online/managing-your-privacy/privacy-tips-teens/ https://staysafeonline.org/stay-safe-online/managing-your-privacy/privacy-tips-older-adults/