Presentation is loading. Please wait.

Presentation is loading. Please wait.

Internet Safety Gleneagles Computer Club February 16, 2015 by Deborah Benson.

Similar presentations


Presentation on theme: "Internet Safety Gleneagles Computer Club February 16, 2015 by Deborah Benson."— Presentation transcript:

1 Internet Safety Gleneagles Computer Club February 16, 2015 by Deborah Benson

2

3 Once seniors are online, it becomes a regular part of their lives: 71% go online every day 82% go online at least weekly

4

5

6 Defend your Computer If you have a PC (a Windows based system), make sure you have anti-virus, spyware, and firewall software installed – Turn on automatic updates to make sure you keep your software up-to-date – Keep your browser up-to-date Internet Explorer, Chrome, Firefox are some examples of browsers you may be using

7

8 There is malware so you must be careful Malware: software that is intended to damage or disable computers and computer systems The worst offenders: MacKeeper and other so-called “cleaner” programs These show up as a pop-up. Do not allow this program to be downloaded! If you have downloaded it, it must be removed

9 Quiz Clicking on pop-up ads: A. Is a safe way to explore the internet B. Can lead you to a potentially unsafe website and possibly ask for personal or payment information you do not need to give

10 Clicking on pop-up ads : A. Is a safe way to explore the internet B. Can lead you to a potentially unsafe website and possibly ask for personal or payment information you do not need to give

11 Guard and other accounts with strong passwords  Use at least 8 characters  Include upper case and lower case letters  Use numbers and/or symbols  Do not use the same password for various accounts

12 Keep passwords secret and secure! The best way to keep track of your passwords is with a password app Check out Dashlane and 1Password A password app will keep track of all your passwords You only need to remember ONE password, and that is the password for your password app

13 Treat your password like a toothbrush. Don’t let anybody else use it and get a new one every six months. -Clifford Stoll

14 Use More Safely Watch out for messages that say: You’ve won a lottery You need to send money to your grandchild You need to help a relative “transfer funds” These are all SCAMS

15

16 Examples of these sorts of scam s follow. These were found in my personal (spam folder) in the last few days.

17

18

19

20 Sometimes SPAM comes from people we know. Do not click on links just because you know or recognize the sender. If the content does not make sense, does not look right, or consists of just a link to click or a document to open, DO NOT CLICK, DO NOT OPEN. Contact the Sender and ask if he or she sent the link to you.

21

22

23

24 BEWARE OF PHISHING Phishing is the attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication.

25 Authentic or Phishing?

26 Logo looks authentic Threat Link – DO NOT CLICK ON IT

27

28

29

30

31  Look at the web address in your browser, make sure the web address starts with https://  Look for a closed padlock in your web browser. When you click on the padlock you should see a message that states the name of the company and that “The connection to the server is encrypted”.

32  The padlock may be in a different location than shown.  It could be on the bottom of the browser or in some other location

33

34  Do not log into a site if it is not secure as described.  Do not log into a site if you feel it is a fake, call the company directly.  Log out of the site when you are finished.

35  Facebook  Twitter  Instagram  Pinterest  YouTube  Online Dating Sites i.e. JDate

36

37 Be sure you have looked at each setting and set it to your comfort level.

38 Examples of Settings Icons

39

40 In settings or options, you should set: who sees your profile who sees your photos and friends how people can search for you who can make comments how to block unwanted access by others

41

42

43 Do not post details that could identify you or locate you in person: your address your phone number your birth date other identifying information

44

45 Meet in a busy public place. Either bring a friend or let one know where you’re going. If it doesn’t feel right or if the person wasn’t truthful, walk away.

46

47

48

49

50


Download ppt "Internet Safety Gleneagles Computer Club February 16, 2015 by Deborah Benson."

Similar presentations


Ads by Google