SlideShare a Scribd company logo
WATCH YOUR BACK Let’s Talk Web Safety and Personal Identity Theft
Overview ,[object Object],[object Object],[object Object],[object Object],[object Object]
PASSWORD SECURITY
Best Practices  ,[object Object],[object Object]
Best Practices  ,[object Object]
Best Practices  ,[object Object]
Best Practices  ,[object Object]
Best Practices  ,[object Object]
Best Practices  ,[object Object]
Strong Passwords ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Common Password
Common Password Themes ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
EMAIL SECURITY
Email Spoofing ,[object Object],[object Object]
Top 10 Spam Subject Lines ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Do Not Download These Types of Files Source:  http://www.novatone.net/mag/mailsec.htm File Extension Description File Extension Description ADE Microsoft Access Project Extension MDB Microsoft Access Application ADP Microsoft Access Project MDE Microsoft Access MDE Database BAS Visual Basic® Class Module MSC Microsoft Common Console Document BAT Batch File MSI Windows Installer Package CHM Compiled HTML Help File MSP Windows Installer Patch CMD Windows NT® Command Scrip MST Visual Test Source File COM MS-DOS® Application PCD Photo CD Image CPL Control Panel Extension PIF Shortcut to MS-DOS Program CRT Security Certificate REG Registration Entries EXE Application SCR Screen Saver HLP Windows® Help File SCT Windows Script Component HTA HTML Applications SHS Shell Scrap Object INF Setup Information File URL Internet Shortcut (Uniform Resource Locator) INS Internet Communication Settings VB VBScript File ISP Internet Communication Settings VBE VBScript Encoded Script File JS JScript® File VBS VBScript Script File JSE JScript Encoded Script File WSC Windows Script Component LNK Shortcut WSF Windows Script File WSH Windows Scripting Host Settings File
Safe File Extensions for Email Downloads Source:  http://www.novatone.net/mag/mailsec.htm File Extension Description GIF Picture - Graphics Interchange Format (ConmuServe) JPG or JPEG Picture - Joint Photographic Expert Group TIF or TIFF Picture - Tagged Image File Format (Adobe) MPG or MPEG Movie - Motion Picture Expert Group MP3 Sound – MPEG compressed audio WAV Sound – Audio (Microsoft)
VIRUS SCANNERS
AVG Free Get a free virus scanner at:  http://free.avg.com/ Hint: Don’t install the tool bar!
Current Virus Threats ,[object Object],[object Object],[object Object]
What to do with a Virus ,[object Object],[object Object],[object Object]
SOCIAL ENGINEERING
Phone Calls ,[object Object],[object Object],[object Object]
Phishing ,[object Object],[object Object],Source:  http://en.wikipedia.org/wiki/Phishing
Top 10 Phishing Scams ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Top Brands Exploited by Phishing Scams http://www.mcafee.com/us/threat_center/anti_phishing/phishing_top10.html
Flash Drive Example ,[object Object]
HOME/WIRELESS SECURITY
Set-Up ,[object Object],[object Object],[object Object]
Password/Encryption ,[object Object],[object Object]
Definition: Firewall ,[object Object]
Definition: IP Address ,[object Object]
Photo Credits ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
RODNEY SABRSULA Schipul ,[object Object],[object Object],[object Object]
JENNIFER BROOKS Schipul ,[object Object],[object Object],[object Object],[object Object]

More Related Content

What's hot

Most Common Application Level Attacks
Most Common Application Level AttacksMost Common Application Level Attacks
Most Common Application Level Attacks
EC-Council
 
Network security
Network securityNetwork security
Network security
Akhilesh Jain
 
Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...
Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...
Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...
wajug
 
Types of Malware (CEH v11)
Types of Malware (CEH v11)Types of Malware (CEH v11)
Types of Malware (CEH v11)
EC-Council
 
Security threats
Security threatsSecurity threats
Security threats
Qamar Farooq
 
Network security
Network securityNetwork security
Network security
Akhilesh Jain
 
Types of Cyber Attacks
Types of Cyber AttacksTypes of Cyber Attacks
Types of Cyber Attacks
Rubal Sagwal
 
Code protection
Code protectionCode protection
Code protection
whitecryption
 
Internet threats and issues in korea 120325 eng_slideshare
Internet threats and issues in korea 120325 eng_slideshareInternet threats and issues in korea 120325 eng_slideshare
Internet threats and issues in korea 120325 eng_slideshare
Youngjun Chang
 
Cyber attacks
Cyber attacks Cyber attacks
Cyber attacks
Anuradha Moti T
 
Internet security
Internet securityInternet security
Internet security
Tapan Khilar
 
Chapter 3 Ensuring Internet Security
Chapter 3 Ensuring Internet SecurityChapter 3 Ensuring Internet Security
Chapter 3 Ensuring Internet SecurityPatty Ramsey
 
PACE-IT, Security+3.1: Types of Malware
PACE-IT, Security+3.1: Types of MalwarePACE-IT, Security+3.1: Types of Malware
PACE-IT, Security+3.1: Types of Malware
Pace IT at Edmonds Community College
 
Types of Cyber-Attacks
Types of Cyber-AttacksTypes of Cyber-Attacks
Types of Cyber-Attacks
techexpert2345
 
Network Security
Network SecurityNetwork Security
Network Security
Raymond Jose
 
8 threats that even antivirus cannot catch
8 threats that even antivirus cannot catch8 threats that even antivirus cannot catch
8 threats that even antivirus cannot catch
iYogi
 
Network security ppt
Network security pptNetwork security ppt
Tutorial 9 - Security on the Internet
Tutorial 9 - Security on the InternetTutorial 9 - Security on the Internet
Tutorial 9 - Security on the Internetdpd
 
this is test for today
this is test for todaythis is test for today
this is test for today
DreamMalar
 
Client server security threats
Client server security threatsClient server security threats
Client server security threatsrahul kundu
 

What's hot (20)

Most Common Application Level Attacks
Most Common Application Level AttacksMost Common Application Level Attacks
Most Common Application Level Attacks
 
Network security
Network securityNetwork security
Network security
 
Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...
Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...
Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...
 
Types of Malware (CEH v11)
Types of Malware (CEH v11)Types of Malware (CEH v11)
Types of Malware (CEH v11)
 
Security threats
Security threatsSecurity threats
Security threats
 
Network security
Network securityNetwork security
Network security
 
Types of Cyber Attacks
Types of Cyber AttacksTypes of Cyber Attacks
Types of Cyber Attacks
 
Code protection
Code protectionCode protection
Code protection
 
Internet threats and issues in korea 120325 eng_slideshare
Internet threats and issues in korea 120325 eng_slideshareInternet threats and issues in korea 120325 eng_slideshare
Internet threats and issues in korea 120325 eng_slideshare
 
Cyber attacks
Cyber attacks Cyber attacks
Cyber attacks
 
Internet security
Internet securityInternet security
Internet security
 
Chapter 3 Ensuring Internet Security
Chapter 3 Ensuring Internet SecurityChapter 3 Ensuring Internet Security
Chapter 3 Ensuring Internet Security
 
PACE-IT, Security+3.1: Types of Malware
PACE-IT, Security+3.1: Types of MalwarePACE-IT, Security+3.1: Types of Malware
PACE-IT, Security+3.1: Types of Malware
 
Types of Cyber-Attacks
Types of Cyber-AttacksTypes of Cyber-Attacks
Types of Cyber-Attacks
 
Network Security
Network SecurityNetwork Security
Network Security
 
8 threats that even antivirus cannot catch
8 threats that even antivirus cannot catch8 threats that even antivirus cannot catch
8 threats that even antivirus cannot catch
 
Network security ppt
Network security pptNetwork security ppt
Network security ppt
 
Tutorial 9 - Security on the Internet
Tutorial 9 - Security on the InternetTutorial 9 - Security on the Internet
Tutorial 9 - Security on the Internet
 
this is test for today
this is test for todaythis is test for today
this is test for today
 
Client server security threats
Client server security threatsClient server security threats
Client server security threats
 

Viewers also liked

Facebook Fanpage Optimization Webinar Training
Facebook Fanpage Optimization Webinar TrainingFacebook Fanpage Optimization Webinar Training
Facebook Fanpage Optimization Webinar Training
Schipul - The Web Marketing Company
 
Understanding Memberships in Tendenci
Understanding Memberships in TendenciUnderstanding Memberships in Tendenci
Understanding Memberships in Tendenci
Schipul - The Web Marketing Company
 
Hands On Drupal: Funny Name, Serious CMS
Hands On Drupal: Funny Name, Serious CMSHands On Drupal: Funny Name, Serious CMS
Hands On Drupal: Funny Name, Serious CMS
Schipul - The Web Marketing Company
 
Web Analytics: Insights into Numbers is Exciting!
Web Analytics: Insights into Numbers is Exciting!Web Analytics: Insights into Numbers is Exciting!
Web Analytics: Insights into Numbers is Exciting!
Schipul - The Web Marketing Company
 
Don't Forget the Milk
Don't Forget the MilkDon't Forget the Milk
The Future & Non-Profit Organizations
The Future & Non-Profit OrganizationsThe Future & Non-Profit Organizations
The Future & Non-Profit Organizations
Schipul - The Web Marketing Company
 
Driving Traffic to your Website with Paid Advertising - AMA UHD Conference
Driving Traffic to your Website with Paid Advertising - AMA UHD ConferenceDriving Traffic to your Website with Paid Advertising - AMA UHD Conference
Driving Traffic to your Website with Paid Advertising - AMA UHD ConferenceSchipul - The Web Marketing Company
 
Storytelling through Social Media
Storytelling through Social MediaStorytelling through Social Media
Storytelling through Social Media
Schipul - The Web Marketing Company
 
TACCM 2013 DIY Email Marketing
TACCM 2013 DIY Email MarketingTACCM 2013 DIY Email Marketing
TACCM 2013 DIY Email Marketing
Schipul - The Web Marketing Company
 
Social Media for Health Care Organizations - Hubmed Health Care Communication...
Social Media for Health Care Organizations - Hubmed Health Care Communication...Social Media for Health Care Organizations - Hubmed Health Care Communication...
Social Media for Health Care Organizations - Hubmed Health Care Communication...
Schipul - The Web Marketing Company
 
The Personal Brand Era Cometh
The Personal Brand Era ComethThe Personal Brand Era Cometh
The Personal Brand Era Cometh
Schipul - The Web Marketing Company
 
Best Business Email Ever Written - Katrina Esco - Ignite Houston 2012 Present...
Best Business Email Ever Written - Katrina Esco - Ignite Houston 2012 Present...Best Business Email Ever Written - Katrina Esco - Ignite Houston 2012 Present...
Best Business Email Ever Written - Katrina Esco - Ignite Houston 2012 Present...
Schipul - The Web Marketing Company
 
What do I do with this blog?? Blogging With Sharks
What do I do with this blog?? Blogging With SharksWhat do I do with this blog?? Blogging With Sharks
What do I do with this blog?? Blogging With Sharks
Schipul - The Web Marketing Company
 

Viewers also liked (15)

Facebook Fanpage Optimization Webinar Training
Facebook Fanpage Optimization Webinar TrainingFacebook Fanpage Optimization Webinar Training
Facebook Fanpage Optimization Webinar Training
 
Understanding Memberships in Tendenci
Understanding Memberships in TendenciUnderstanding Memberships in Tendenci
Understanding Memberships in Tendenci
 
Hands On Drupal: Funny Name, Serious CMS
Hands On Drupal: Funny Name, Serious CMSHands On Drupal: Funny Name, Serious CMS
Hands On Drupal: Funny Name, Serious CMS
 
Web Analytics: Insights into Numbers is Exciting!
Web Analytics: Insights into Numbers is Exciting!Web Analytics: Insights into Numbers is Exciting!
Web Analytics: Insights into Numbers is Exciting!
 
Don't Forget the Milk
Don't Forget the MilkDon't Forget the Milk
Don't Forget the Milk
 
The Future & Non-Profit Organizations
The Future & Non-Profit OrganizationsThe Future & Non-Profit Organizations
The Future & Non-Profit Organizations
 
Driving Traffic to your Website with Paid Advertising - AMA UHD Conference
Driving Traffic to your Website with Paid Advertising - AMA UHD ConferenceDriving Traffic to your Website with Paid Advertising - AMA UHD Conference
Driving Traffic to your Website with Paid Advertising - AMA UHD Conference
 
Storytelling through Social Media
Storytelling through Social MediaStorytelling through Social Media
Storytelling through Social Media
 
TACCM 2013 DIY Email Marketing
TACCM 2013 DIY Email MarketingTACCM 2013 DIY Email Marketing
TACCM 2013 DIY Email Marketing
 
Social Media for Health Care Organizations - Hubmed Health Care Communication...
Social Media for Health Care Organizations - Hubmed Health Care Communication...Social Media for Health Care Organizations - Hubmed Health Care Communication...
Social Media for Health Care Organizations - Hubmed Health Care Communication...
 
The Personal Brand Era Cometh
The Personal Brand Era ComethThe Personal Brand Era Cometh
The Personal Brand Era Cometh
 
Best Business Email Ever Written - Katrina Esco - Ignite Houston 2012 Present...
Best Business Email Ever Written - Katrina Esco - Ignite Houston 2012 Present...Best Business Email Ever Written - Katrina Esco - Ignite Houston 2012 Present...
Best Business Email Ever Written - Katrina Esco - Ignite Houston 2012 Present...
 
The Next Generation Website
The Next Generation WebsiteThe Next Generation Website
The Next Generation Website
 
What do I do with this blog?? Blogging With Sharks
What do I do with this blog?? Blogging With SharksWhat do I do with this blog?? Blogging With Sharks
What do I do with this blog?? Blogging With Sharks
 
Trends in Communication Technology for Associations | ACCE 2013
Trends in Communication Technology for Associations | ACCE 2013Trends in Communication Technology for Associations | ACCE 2013
Trends in Communication Technology for Associations | ACCE 2013
 

Similar to Watch Your Back: Let’s Talk Web Safety and Personal Identity Theft

Dark Alleys/Internet Security
Dark Alleys/Internet SecurityDark Alleys/Internet Security
Dark Alleys/Internet Security
John Dorner
 
The Safest Way To Interact Online
The Safest Way To Interact OnlineThe Safest Way To Interact Online
The Safest Way To Interact Online
pcsafe
 
Protecting Your Key Asset – Data Protection Best Practices V2.0 Final
Protecting Your Key Asset – Data Protection Best Practices V2.0   FinalProtecting Your Key Asset – Data Protection Best Practices V2.0   Final
Protecting Your Key Asset – Data Protection Best Practices V2.0 Final
Vinod Kumar
 
Dark Alleys Part1
Dark Alleys Part1Dark Alleys Part1
Dark Alleys Part1
Anne Adrian
 
Dark Alleys Part1740
Dark Alleys Part1740Dark Alleys Part1740
Dark Alleys Part1740
guest2bd2b2
 
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundary"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
Dean Iacovelli
 
Internet Security
Internet SecurityInternet Security
Internet Security
Anne Adrian
 
Word press security 101
Word press security 101  Word press security 101
Word press security 101
Kojac801
 
Passwords & security
Passwords & securityPasswords & security
Passwords & security
Per Thorsheim
 
Addressing the Top 3 Real-world Security Challenges for Your IBM i Systems
Addressing the Top 3 Real-world Security Challenges for Your IBM i SystemsAddressing the Top 3 Real-world Security Challenges for Your IBM i Systems
Addressing the Top 3 Real-world Security Challenges for Your IBM i Systems
Precisely
 
Cyber security
Cyber securityCyber security
Cyber security
Arjun Chetry
 
Network security
Network security Network security
Network security
MD. IFTEKARUL ALAM
 
Cyber Security 101 – A Practical Guide for Small Businesses
Cyber Security 101 – A Practical Guide for Small BusinessesCyber Security 101 – A Practical Guide for Small Businesses
Cyber Security 101 – A Practical Guide for Small Businesses
PECB
 
Cyber security for small businesses
Cyber security for small businessesCyber security for small businesses
Cyber security for small businesses
B2BPlanner Ltd.
 
Cyber-savvy Cyber-safety
Cyber-savvy Cyber-safety Cyber-savvy Cyber-safety
Cyber-savvy Cyber-safety
Tawose Olamide Timothy
 
information security and backup system
information security and backup systeminformation security and backup system
information security and backup system
Engr. Md. Jamal Uddin Rayhan
 
302 Content Server Security Challenges And Best Practices
302   Content Server Security   Challenges And Best Practices302   Content Server Security   Challenges And Best Practices
302 Content Server Security Challenges And Best Practicesphanleson
 

Similar to Watch Your Back: Let’s Talk Web Safety and Personal Identity Theft (20)

Dark Alleys/Internet Security
Dark Alleys/Internet SecurityDark Alleys/Internet Security
Dark Alleys/Internet Security
 
The Safest Way To Interact Online
The Safest Way To Interact OnlineThe Safest Way To Interact Online
The Safest Way To Interact Online
 
Protecting Your Key Asset – Data Protection Best Practices V2.0 Final
Protecting Your Key Asset – Data Protection Best Practices V2.0   FinalProtecting Your Key Asset – Data Protection Best Practices V2.0   Final
Protecting Your Key Asset – Data Protection Best Practices V2.0 Final
 
Dark Alleys Part1
Dark Alleys Part1Dark Alleys Part1
Dark Alleys Part1
 
Dark Alleys Part1740
Dark Alleys Part1740Dark Alleys Part1740
Dark Alleys Part1740
 
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundary"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Word press security 101
Word press security 101  Word press security 101
Word press security 101
 
Passwords & security
Passwords & securityPasswords & security
Passwords & security
 
Addressing the Top 3 Real-world Security Challenges for Your IBM i Systems
Addressing the Top 3 Real-world Security Challenges for Your IBM i SystemsAddressing the Top 3 Real-world Security Challenges for Your IBM i Systems
Addressing the Top 3 Real-world Security Challenges for Your IBM i Systems
 
Cyber security
Cyber securityCyber security
Cyber security
 
Network security
Network security Network security
Network security
 
Cyber Security 101 – A Practical Guide for Small Businesses
Cyber Security 101 – A Practical Guide for Small BusinessesCyber Security 101 – A Practical Guide for Small Businesses
Cyber Security 101 – A Practical Guide for Small Businesses
 
Cyber security for small businesses
Cyber security for small businessesCyber security for small businesses
Cyber security for small businesses
 
Cyber-savvy Cyber-safety
Cyber-savvy Cyber-safety Cyber-savvy Cyber-safety
Cyber-savvy Cyber-safety
 
information security and backup system
information security and backup systeminformation security and backup system
information security and backup system
 
Network security
Network securityNetwork security
Network security
 
NetworkSecurity
NetworkSecurityNetworkSecurity
NetworkSecurity
 
302 Content Server Security Challenges And Best Practices
302   Content Server Security   Challenges And Best Practices302   Content Server Security   Challenges And Best Practices
302 Content Server Security Challenges And Best Practices
 
Desktop Security 8 9 07
Desktop Security 8 9 07Desktop Security 8 9 07
Desktop Security 8 9 07
 

More from Schipul - The Web Marketing Company

TACCM 2013 Web Marketing Tool Kit - Texas Association of Community College Ma...
TACCM 2013 Web Marketing Tool Kit - Texas Association of Community College Ma...TACCM 2013 Web Marketing Tool Kit - Texas Association of Community College Ma...
TACCM 2013 Web Marketing Tool Kit - Texas Association of Community College Ma...
Schipul - The Web Marketing Company
 
Social Media Strategy - Presented to the Louisiana Food Processor's Conference
Social Media Strategy - Presented to the Louisiana Food Processor's ConferenceSocial Media Strategy - Presented to the Louisiana Food Processor's Conference
Social Media Strategy - Presented to the Louisiana Food Processor's Conference
Schipul - The Web Marketing Company
 
Facebook Fanpage Optimization
Facebook Fanpage OptimizationFacebook Fanpage Optimization
Facebook Fanpage Optimization
Schipul - The Web Marketing Company
 
Hands On Filmmaking
Hands On FilmmakingHands On Filmmaking
Your Brand is Out of Control
Your Brand is Out of ControlYour Brand is Out of Control
Your Brand is Out of Control
Schipul - The Web Marketing Company
 
Unleash The SEO Beast
Unleash The SEO BeastUnleash The SEO Beast
Do’s and Don’ts of Online Newsletter Marketing
Do’s and Don’ts of Online Newsletter MarketingDo’s and Don’ts of Online Newsletter Marketing
Do’s and Don’ts of Online Newsletter Marketing
Schipul - The Web Marketing Company
 
Tendenci 101 & Beyond
Tendenci 101 & BeyondTendenci 101 & Beyond
Evernote - Taking Notes
Evernote - Taking NotesEvernote - Taking Notes
Evernote - Taking Notes
Schipul - The Web Marketing Company
 

More from Schipul - The Web Marketing Company (9)

TACCM 2013 Web Marketing Tool Kit - Texas Association of Community College Ma...
TACCM 2013 Web Marketing Tool Kit - Texas Association of Community College Ma...TACCM 2013 Web Marketing Tool Kit - Texas Association of Community College Ma...
TACCM 2013 Web Marketing Tool Kit - Texas Association of Community College Ma...
 
Social Media Strategy - Presented to the Louisiana Food Processor's Conference
Social Media Strategy - Presented to the Louisiana Food Processor's ConferenceSocial Media Strategy - Presented to the Louisiana Food Processor's Conference
Social Media Strategy - Presented to the Louisiana Food Processor's Conference
 
Facebook Fanpage Optimization
Facebook Fanpage OptimizationFacebook Fanpage Optimization
Facebook Fanpage Optimization
 
Hands On Filmmaking
Hands On FilmmakingHands On Filmmaking
Hands On Filmmaking
 
Your Brand is Out of Control
Your Brand is Out of ControlYour Brand is Out of Control
Your Brand is Out of Control
 
Unleash The SEO Beast
Unleash The SEO BeastUnleash The SEO Beast
Unleash The SEO Beast
 
Do’s and Don’ts of Online Newsletter Marketing
Do’s and Don’ts of Online Newsletter MarketingDo’s and Don’ts of Online Newsletter Marketing
Do’s and Don’ts of Online Newsletter Marketing
 
Tendenci 101 & Beyond
Tendenci 101 & BeyondTendenci 101 & Beyond
Tendenci 101 & Beyond
 
Evernote - Taking Notes
Evernote - Taking NotesEvernote - Taking Notes
Evernote - Taking Notes
 

Recently uploaded

AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 

Recently uploaded (20)

AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 

Watch Your Back: Let’s Talk Web Safety and Personal Identity Theft

  • 1. WATCH YOUR BACK Let’s Talk Web Safety and Personal Identity Theft
  • 2.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 12.
  • 14.
  • 15.
  • 16. Do Not Download These Types of Files Source: http://www.novatone.net/mag/mailsec.htm File Extension Description File Extension Description ADE Microsoft Access Project Extension MDB Microsoft Access Application ADP Microsoft Access Project MDE Microsoft Access MDE Database BAS Visual Basic® Class Module MSC Microsoft Common Console Document BAT Batch File MSI Windows Installer Package CHM Compiled HTML Help File MSP Windows Installer Patch CMD Windows NT® Command Scrip MST Visual Test Source File COM MS-DOS® Application PCD Photo CD Image CPL Control Panel Extension PIF Shortcut to MS-DOS Program CRT Security Certificate REG Registration Entries EXE Application SCR Screen Saver HLP Windows® Help File SCT Windows Script Component HTA HTML Applications SHS Shell Scrap Object INF Setup Information File URL Internet Shortcut (Uniform Resource Locator) INS Internet Communication Settings VB VBScript File ISP Internet Communication Settings VBE VBScript Encoded Script File JS JScript® File VBS VBScript Script File JSE JScript Encoded Script File WSC Windows Script Component LNK Shortcut WSF Windows Script File WSH Windows Scripting Host Settings File
  • 17. Safe File Extensions for Email Downloads Source: http://www.novatone.net/mag/mailsec.htm File Extension Description GIF Picture - Graphics Interchange Format (ConmuServe) JPG or JPEG Picture - Joint Photographic Expert Group TIF or TIFF Picture - Tagged Image File Format (Adobe) MPG or MPEG Movie - Motion Picture Expert Group MP3 Sound – MPEG compressed audio WAV Sound – Audio (Microsoft)
  • 19. AVG Free Get a free virus scanner at: http://free.avg.com/ Hint: Don’t install the tool bar!
  • 20.
  • 21.
  • 23.
  • 24.
  • 25.
  • 26. Top Brands Exploited by Phishing Scams http://www.mcafee.com/us/threat_center/anti_phishing/phishing_top10.html
  • 27.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.

Editor's Notes

  1. Pic source: http://www.flickr.com/photos/35034348736@N01/6091103/
  2. http://www.flickr.com/photos/30055137@N05/2874818735/
  3. Pic Source Ducks http://www.flickr.com/photos/71038389@N00/2335148856/
  4. Pic source: Glass http://www.flickr.com/photos/80682954@N00/3168425434/ Head http://www.flickr.com/photos/26811362@N05/3169491395/
  5. Pic Source: http://www.braswellcomputers.com/images/hackers.jpg
  6. Pic source: http://www.flickr.com/photos/9483141@N02/1043482672/
  7. Pic Source: Christmas http://www.flickr.com/photos/26260213@N05/3093056683/ Preg mom http://www.flickr.com/photos/34957438@N05/3416525003/