How To Protect Yourself and Your Computer Online

Charles Anderson
Charles AndersonVP Engineering at EveryoneSocial
How to Protect Yourself and Your Computer Online ,[object Object],[object Object]
Outline ,[object Object],[object Object],[object Object]
Computer Risks ,[object Object],[object Object],[object Object]
Malware Prevention ,[object Object],[object Object],[object Object],[object Object],[object Object]
Prevention - OS Updates ,[object Object],[object Object],[object Object]
Prevention ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Prevention - Firewall ,[object Object],[object Object],[object Object]
Prevention ,[object Object],[object Object],[object Object],[object Object],[object Object]
Alternative Software ,[object Object],[object Object],[object Object],[object Object],[object Object]
Online Fraud ,[object Object],[object Object],[object Object]
Online Fraud: Phishing ,[object Object],[object Object],[object Object],[object Object]
Phishing Example
Phishing Example
Phishing Shut Down
Phishing Example
Number of New Phishing Sites Anti-Phishing Working Group October 2006
Why Does Phishing Work? ,[object Object],[object Object],[object Object]
How to Avoid Phishing ,[object Object],[object Object],[object Object],[object Object],[object Object]
Conclusion ,[object Object],[object Object],[object Object],[object Object],[object Object]
1 of 19

Recommended

Understanding security and safe computing by
Understanding security and safe computingUnderstanding security and safe computing
Understanding security and safe computingMukul Kumar
1.2K views14 slides
Computing and ethics by
Computing and ethicsComputing and ethics
Computing and ethicsNikki Shree
701 views22 slides
List of Malwares by
List of MalwaresList of Malwares
List of MalwaresVishalya Dulam
1.5K views42 slides
Computer Malware by
Computer MalwareComputer Malware
Computer Malwareaztechtchr
26.4K views28 slides
Web design premium by
Web design premiumWeb design premium
Web design premiumjeannined_1
200 views7 slides

More Related Content

What's hot

Promote Education Internet Security by
Promote Education Internet SecurityPromote Education Internet Security
Promote Education Internet SecurityZoaib Mirza
312 views18 slides
Introduction to Malware by
Introduction to MalwareIntroduction to Malware
Introduction to Malwareamiable_indian
7.7K views35 slides
Slideshow Alisha Schnapper by
Slideshow Alisha SchnapperSlideshow Alisha Schnapper
Slideshow Alisha Schnapperaschnapper
538 views11 slides
Internet Phishing by
Internet PhishingInternet Phishing
Internet PhishingDigeratiGroup
616 views29 slides
A Brief Overview of Adware by
A Brief Overview of Adware A Brief Overview of Adware
A Brief Overview of Adware SpeedMaxPC
238 views4 slides
Computer Security Guide to Pc Security by
Computer Security Guide to Pc SecurityComputer Security Guide to Pc Security
Computer Security Guide to Pc SecurityMallTake
17 views23 slides

What's hot(19)

Promote Education Internet Security by Zoaib Mirza
Promote Education Internet SecurityPromote Education Internet Security
Promote Education Internet Security
Zoaib Mirza312 views
Slideshow Alisha Schnapper by aschnapper
Slideshow Alisha SchnapperSlideshow Alisha Schnapper
Slideshow Alisha Schnapper
aschnapper538 views
A Brief Overview of Adware by SpeedMaxPC
A Brief Overview of Adware A Brief Overview of Adware
A Brief Overview of Adware
SpeedMaxPC 238 views
Computer Security Guide to Pc Security by MallTake
Computer Security Guide to Pc SecurityComputer Security Guide to Pc Security
Computer Security Guide to Pc Security
MallTake17 views
Spyware Adware1 by rubal_9
Spyware Adware1Spyware Adware1
Spyware Adware1
rubal_95.4K views
Computer based crime by Taylor_Marie
Computer based crimeComputer based crime
Computer based crime
Taylor_Marie314 views
How to Protect Your PC from Malware, Ransomware, Virus by HabFg
How to Protect Your PC from Malware, Ransomware, VirusHow to Protect Your PC from Malware, Ransomware, Virus
How to Protect Your PC from Malware, Ransomware, Virus
HabFg15 views
Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma) by Akhil Sharma
Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma)Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma)
Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma)
Akhil Sharma2.1K views
How to Uninstall Malwares-assistance.net from PC by Ashok Albert
How to Uninstall Malwares-assistance.net from PCHow to Uninstall Malwares-assistance.net from PC
How to Uninstall Malwares-assistance.net from PC
Ashok Albert181 views
Cyber Security Presentation - IT Will Never Happen To Me by Simon Salter
Cyber Security Presentation - IT Will Never Happen To MeCyber Security Presentation - IT Will Never Happen To Me
Cyber Security Presentation - IT Will Never Happen To Me
Simon Salter75 views
Phishing: Training Your Help Desk by Beth Sallay
Phishing: Training Your Help DeskPhishing: Training Your Help Desk
Phishing: Training Your Help Desk
Beth Sallay352 views
Mobile Device Security by Torian Group
Mobile Device SecurityMobile Device Security
Mobile Device Security
Torian Group295 views

Viewers also liked

卓越销售 by
卓越销售卓越销售
卓越销售20004
302 views25 slides
20040430162931 by
2004043016293120040430162931
2004043016293120004
185 views108 slides
1 by
11
120004
372 views37 slides
公司介绍 by
公司介绍公司介绍
公司介绍20004
395 views6 slides
0010 by
00100010
001020004
335 views3 slides
积极的心态 by
积极的心态积极的心态
积极的心态20004
397 views17 slides

Viewers also liked(20)

卓越销售 by 20004
卓越销售卓越销售
卓越销售
20004302 views
20040430162931 by 20004
2004043016293120040430162931
20040430162931
20004185 views
1 by 20004
11
1
20004372 views
公司介绍 by 20004
公司介绍公司介绍
公司介绍
20004395 views
0010 by 20004
00100010
0010
20004335 views
积极的心态 by 20004
积极的心态积极的心态
积极的心态
20004397 views
读懂人生的激励格言 by 20004
读懂人生的激励格言读懂人生的激励格言
读懂人生的激励格言
20004721 views
研发中心08年度计划书打印版 by 20004
研发中心08年度计划书打印版研发中心08年度计划书打印版
研发中心08年度计划书打印版
20004777 views
积极的心态6 by 20004
积极的心态6积极的心态6
积极的心态6
20004228 views
Garden villages and towns in the south west by Ben Lowndes
Garden villages and towns in the south west Garden villages and towns in the south west
Garden villages and towns in the south west
Ben Lowndes377 views
8020法则. by 20004
8020法则.8020法则.
8020法则.
20004271 views
科特勒营销案例 by 20004
科特勒营销案例科特勒营销案例
科特勒营销案例
20004562 views
高级销售技巧 by 20004
高级销售技巧高级销售技巧
高级销售技巧
20004447 views
《市场营销管理》 by 20004
《市场营销管理》《市场营销管理》
《市场营销管理》
20004745 views
September 16 General Meeting by MSU PRSSA
September 16 General MeetingSeptember 16 General Meeting
September 16 General Meeting
MSU PRSSA 542 views
启迪培训公司 by 20004
启迪培训公司启迪培训公司
启迪培训公司
20004382 views
How to get a Software Job w/o Experience by Charles Anderson
How to get a Software Job w/o ExperienceHow to get a Software Job w/o Experience
How to get a Software Job w/o Experience
Charles Anderson611 views
7 by 20004
77
7
20004376 views
Ibm R50产品 by 20004
Ibm R50产品Ibm R50产品
Ibm R50产品
20004894 views

Similar to How To Protect Yourself and Your Computer Online

CYBERSPACE SAFETY TIPS FOR SMEs.ppt by
CYBERSPACE SAFETY TIPS FOR SMEs.pptCYBERSPACE SAFETY TIPS FOR SMEs.ppt
CYBERSPACE SAFETY TIPS FOR SMEs.pptJOHN BABATUNDE LEE
5 views59 slides
Cyber security 101 by
Cyber security 101Cyber security 101
Cyber security 101Travis Good
241 views51 slides
Security Awareness Training by
Security Awareness TrainingSecurity Awareness Training
Security Awareness TrainingWilliam Mann
1.1K views47 slides
Protect Yourself and Your Devices.pdf by
Protect Yourself and Your Devices.pdfProtect Yourself and Your Devices.pdf
Protect Yourself and Your Devices.pdftechit ltd
30 views6 slides
Protect Yourself From Internet Pests by
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pestspeterhitch
639 views57 slides
Cyber Security-Foundation.ppt by
Cyber Security-Foundation.pptCyber Security-Foundation.ppt
Cyber Security-Foundation.pptErAdityaSingh1
149 views46 slides

Similar to How To Protect Yourself and Your Computer Online(20)

Cyber security 101 by Travis Good
Cyber security 101Cyber security 101
Cyber security 101
Travis Good241 views
Security Awareness Training by William Mann
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
William Mann1.1K views
Protect Yourself and Your Devices.pdf by techit ltd
Protect Yourself and Your Devices.pdfProtect Yourself and Your Devices.pdf
Protect Yourself and Your Devices.pdf
techit ltd30 views
Protect Yourself From Internet Pests by peterhitch
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pests
peterhitch639 views
Cyber Security-Foundation.ppt by ErAdityaSingh1
Cyber Security-Foundation.pptCyber Security-Foundation.ppt
Cyber Security-Foundation.ppt
ErAdityaSingh1149 views
Champaign EDC Cybersecurity Seminar by John Bambenek - March 25, 2014 by John Bambenek
Champaign EDC Cybersecurity Seminar by John Bambenek - March 25, 2014Champaign EDC Cybersecurity Seminar by John Bambenek - March 25, 2014
Champaign EDC Cybersecurity Seminar by John Bambenek - March 25, 2014
John Bambenek700 views
Security Awareness 9 10 09 V4 Virus Trojan by Megan Bell
Security Awareness 9 10 09 V4 Virus TrojanSecurity Awareness 9 10 09 V4 Virus Trojan
Security Awareness 9 10 09 V4 Virus Trojan
Megan Bell493 views
W A2 Group P P by tawnygsu
W A2  Group  P PW A2  Group  P P
W A2 Group P P
tawnygsu453 views
091005 Internet Security by dkp205
091005 Internet Security091005 Internet Security
091005 Internet Security
dkp2051.9K views
computer_security.ppt by Asif Raza
computer_security.pptcomputer_security.ppt
computer_security.ppt
Asif Raza5 views
Cyber security threats and its solutions by maryrowling
Cyber security threats and its solutionsCyber security threats and its solutions
Cyber security threats and its solutions
maryrowling294 views
Phishing, Pharming, and the latest potholes on the Information Highway by Kevin Lim
Phishing, Pharming, and the latest potholes on the Information HighwayPhishing, Pharming, and the latest potholes on the Information Highway
Phishing, Pharming, and the latest potholes on the Information Highway
Kevin Lim2K views

More from Charles Anderson

Modern php by
Modern phpModern php
Modern phpCharles Anderson
77 views26 slides
Literate Programming by
Literate ProgrammingLiterate Programming
Literate ProgrammingCharles Anderson
422 views19 slides
Inrastructure as Code by
Inrastructure as CodeInrastructure as Code
Inrastructure as CodeCharles Anderson
234 views23 slides
Docker - Hack Salem! - November 2014 by
Docker - Hack Salem! - November 2014Docker - Hack Salem! - November 2014
Docker - Hack Salem! - November 2014Charles Anderson
490 views14 slides
A Brief Introduction to Redis by
A Brief Introduction to RedisA Brief Introduction to Redis
A Brief Introduction to RedisCharles Anderson
1.6K views20 slides
A Shallow Survey of Alternative Languages on the JVM by
A Shallow Survey of Alternative Languages on the JVMA Shallow Survey of Alternative Languages on the JVM
A Shallow Survey of Alternative Languages on the JVMCharles Anderson
890 views17 slides

More from Charles Anderson(9)

Recently uploaded

What’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlue by
What’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlueWhat’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlue
What’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlueShapeBlue
222 views23 slides
NTGapps NTG LowCode Platform by
NTGapps NTG LowCode Platform NTGapps NTG LowCode Platform
NTGapps NTG LowCode Platform Mustafa Kuğu
365 views30 slides
Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ... by
Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ...Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ...
Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ...ShapeBlue
79 views17 slides
DRBD Deep Dive - Philipp Reisner - LINBIT by
DRBD Deep Dive - Philipp Reisner - LINBITDRBD Deep Dive - Philipp Reisner - LINBIT
DRBD Deep Dive - Philipp Reisner - LINBITShapeBlue
140 views21 slides
Cencora Executive Symposium by
Cencora Executive SymposiumCencora Executive Symposium
Cencora Executive Symposiummarketingcommunicati21
139 views14 slides
Extending KVM Host HA for Non-NFS Storage - Alex Ivanov - StorPool by
Extending KVM Host HA for Non-NFS Storage -  Alex Ivanov - StorPoolExtending KVM Host HA for Non-NFS Storage -  Alex Ivanov - StorPool
Extending KVM Host HA for Non-NFS Storage - Alex Ivanov - StorPoolShapeBlue
84 views10 slides

Recently uploaded(20)

What’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlue by ShapeBlue
What’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlueWhat’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlue
What’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlue
ShapeBlue222 views
NTGapps NTG LowCode Platform by Mustafa Kuğu
NTGapps NTG LowCode Platform NTGapps NTG LowCode Platform
NTGapps NTG LowCode Platform
Mustafa Kuğu365 views
Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ... by ShapeBlue
Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ...Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ...
Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ...
ShapeBlue79 views
DRBD Deep Dive - Philipp Reisner - LINBIT by ShapeBlue
DRBD Deep Dive - Philipp Reisner - LINBITDRBD Deep Dive - Philipp Reisner - LINBIT
DRBD Deep Dive - Philipp Reisner - LINBIT
ShapeBlue140 views
Extending KVM Host HA for Non-NFS Storage - Alex Ivanov - StorPool by ShapeBlue
Extending KVM Host HA for Non-NFS Storage -  Alex Ivanov - StorPoolExtending KVM Host HA for Non-NFS Storage -  Alex Ivanov - StorPool
Extending KVM Host HA for Non-NFS Storage - Alex Ivanov - StorPool
ShapeBlue84 views
Digital Personal Data Protection (DPDP) Practical Approach For CISOs by Priyanka Aash
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Priyanka Aash153 views
Confidence in CloudStack - Aron Wagner, Nathan Gleason - Americ by ShapeBlue
Confidence in CloudStack - Aron Wagner, Nathan Gleason - AmericConfidence in CloudStack - Aron Wagner, Nathan Gleason - Americ
Confidence in CloudStack - Aron Wagner, Nathan Gleason - Americ
ShapeBlue88 views
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N... by James Anderson
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...
James Anderson156 views
The Power of Heat Decarbonisation Plans in the Built Environment by IES VE
The Power of Heat Decarbonisation Plans in the Built EnvironmentThe Power of Heat Decarbonisation Plans in the Built Environment
The Power of Heat Decarbonisation Plans in the Built Environment
IES VE69 views
Webinar : Desperately Seeking Transformation - Part 2: Insights from leading... by The Digital Insurer
Webinar : Desperately Seeking Transformation - Part 2:  Insights from leading...Webinar : Desperately Seeking Transformation - Part 2:  Insights from leading...
Webinar : Desperately Seeking Transformation - Part 2: Insights from leading...
2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue by ShapeBlue
2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue
2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue
ShapeBlue103 views
Declarative Kubernetes Cluster Deployment with Cloudstack and Cluster API - O... by ShapeBlue
Declarative Kubernetes Cluster Deployment with Cloudstack and Cluster API - O...Declarative Kubernetes Cluster Deployment with Cloudstack and Cluster API - O...
Declarative Kubernetes Cluster Deployment with Cloudstack and Cluster API - O...
ShapeBlue88 views
Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ... by ShapeBlue
Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ...Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ...
Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ...
ShapeBlue144 views
The Role of Patterns in the Era of Large Language Models by Yunyao Li
The Role of Patterns in the Era of Large Language ModelsThe Role of Patterns in the Era of Large Language Models
The Role of Patterns in the Era of Large Language Models
Yunyao Li80 views
Future of AR - Facebook Presentation by Rob McCarty
Future of AR - Facebook PresentationFuture of AR - Facebook Presentation
Future of AR - Facebook Presentation
Rob McCarty62 views
Backroll, News and Demo - Pierre Charton, Matthias Dhellin, Ousmane Diarra - ... by ShapeBlue
Backroll, News and Demo - Pierre Charton, Matthias Dhellin, Ousmane Diarra - ...Backroll, News and Demo - Pierre Charton, Matthias Dhellin, Ousmane Diarra - ...
Backroll, News and Demo - Pierre Charton, Matthias Dhellin, Ousmane Diarra - ...
ShapeBlue146 views
Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda... by ShapeBlue
Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda...Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda...
Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda...
ShapeBlue120 views

How To Protect Yourself and Your Computer Online