Managing Money Workshop The National Autistic Society AGM - 13.11.10.

Slides:



Advertisements
Similar presentations
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Advertisements

Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Internet Safety Gleneagles Computer Club February 16, 2015 by Deborah Benson.
Phishing Scams use spoofed s and websites as lures to prompt people to voluntarily hand over sensitive information Phishing s may contain.
SECURITY CHECK Protecting Your System and Yourself Source:
Fraud, Scams and ID Theft …oh my! Deb Ramsay ESD 101 Chief Information Officer Technology Division.
What is identity theft, and how can you protect yourself from it?
A guide to protecting your money and your identity KEEPING MONEY SAFE Keeping money safe Money Works: Level 1 Topic 3.
8 Mistakes That Expose You to Online Fraud to Online Fraud.
A few simple steps, hints and tips to figure out if it is indeed fake. - By Emily Breuss.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
ONLINE SAFETY Online safety Money Works: Level 1 Topic 3.
Phishing on the Internet? Presented by Naveed Farooq Naveed Farooq Admin Nidokidos Network Make Money Online | Join Nidokidos Forum |
Teach a man (person) to Phish Recognizing scams, spams and other personal security attacks July 17 th, 2013 High Tea at IT, Summer, 2013.
Scams Stevie's Scam School videos
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
evidence. Safety To stay safe on the internet there are many points you need to follow. The first point is to change your password regularly, you.
Alisha horsfield.  Computer virus is something that copies itself to computer software.  Virus can delete the hosts important documents which includes.
Internet safety By Lydia Snowden.
Contents  Viruses Viruses  Computer Worms Computer Worms  Trojans Trojans  Spyware Spyware  Adware Adware  Spam Spam  Hoaxes and Scams Hoaxes and.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Internet Safety By Stephanie Jarrard. What is the Internet?  “Internet” is a shortened name for “Interconnected networks”  The internet is a global.
IT security Sherana Kousar 11a/ib1  A virus is a file written with the intention of doing harm, or for criminal activity  Example of viruses are: 
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Reliability & Desirability of Data
IT security By Tilly Gerlack.
© Hodder Gibson 2012 Staying safe online. © Hodder Gibson 2012 Dangers on the Internet There are a number of dangers on the Internet such as: viruses.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
1. Self Awareness You should only access your accounts and private informations from a safe location (only at home as necessary if at all possible) where.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS). SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.1 I can describe.
Phishing, Spoofing, Spamming and Security How To Protect Yourself Additional Credits: Educause/SonicWall, Hendra Harianto Tuty, Microsoft Corporation,
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
Copyright ©: SAMSUNG & Samsung Hope for Youth. All rights reserved Tutorials The internet: Staying safe online Suitable for: Beginner.
Presented by : Phishing Identity Theft Supervised by : Mr M. ABDELLAOUI Afaf DAHMANI Amal ATMANI Imane ALLAL.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Identity Theft Since 2005, there has been a dramatic increase in the occurrence of identity theft among students online.
Malware and Phishing By: Sydney Langley. MALWARE- includes viruses and spyware to steal your personal information PHISHING- is an internet scam sending.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
safety Bailey mullan. dangers ing has become on of the main sources for communicating. When using it is more likely for someone.
What is Spam? d min.
By Liam Wright Manga comic group Japan SAFETY on your computer.
Activity 4 Catching Phish. Fishing If I went fishing what would I be doing? On the Internet fishing (phishing) is similar!
Jan 11 Encryption and Hacking Encryption turns normal text into nonsense, and changes it back with a key. To someone who is not authorised to view it,
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Internet safety. Dangers of a poor password How people guess your password Your partner, child, or pet's name, possibly followed by a 0 or 1 The last.
Unit Five Your Money – Keeping It Safe and Secure Identity Theft Part II Resource: NEFE High School Financial Planning Program.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
Advanced Guide to ing. Introduction In this guide you and explain will learn how to use ing in an advanced way. I will go through on.
1 Outline of this module By the end of this module, you will be able to: – Understand what is meant by “identity crime”; – Name the different types of.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Smart, Safe, and Secure Online Spam commercial messages that you didn’t ask for (a company trying to sell things by sending out thousands of messages at.
Phishing, Spoofing, Spamming and Security How To Protect Yourself Additional Credits: Dr. Harold Cothern, Educause/SonicWall, Hendra Harianto Tuty, Microsoft.
1 Outline of this module By the end of this module you will be able to: Understand why computer security is important; Name the different threats to.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Catching Phish. If I went fishing what would I be doing? On the Internet fishing (phishing) is similar! On the internet people might want to get your.
Outline of this module By the end of this module, you will be able to: Understand the benefits that internet banking provides; Name the different dangers.
Misuses of ICT Malpractice and crime © Folens 2008.
Class Name: Online Safety & Privacy Basics
How do we buy and sell on the Internet safely?
Protect Your Computer Against Harmful Attacks!
Setting up an online account
HOW DO I KEEP MY COMPUTER SAFE?
9 ways to avoid viruses and spyware
What is Phishing? Pronounced “Fishing”
Founded in 2002, Credit Abuse Resistance Education (CARE) educates high school and college students on the responsible use of credit and other fundamentals.
Presentation transcript:

Managing Money Workshop The National Autistic Society AGM

Structure of the workshop Introductions – Dave and the other people in the group will introduce themselves. Demonstration of the National Autistic Society’s Managing Money website. An activity and discussion about scams and scam s Question and answer session. Take your personal copy of the Managing Money workbook and any moneymadeclear guides you want. Session end.

Introductions 1.Dave will introduce himself and the session 2. You will introduce yourselves. Please tell the group: ~ Your name ~ Describe one problem that you have experienced in managing money

Demonstration of the Managing Money website

An activity and discussion about scam s Scams are a way of either tricking you into giving away money or a way of someone stealing money from you. If you have money stolen from you or give money away as part of a scam, it can be very difficult to get the money back. Scam s are very common and there are many different types of scam s.

Some examples of scam s Examples: s that invite you to click on an attachment can secretly install malicious software and record your passwords (known as trojans) s that look like they are from your bank asking you to click on a link and update your passwords (known as phishing) s that say you have money stuck in an account abroad, asking for your bank details s asking you to help someone abroad who has money that they cannot access, asking for you to give your bank and identity details

Scam activity Sometimes your bank may genuinely you, so how can you identify a fake from a real one? In your groups, look at each laminated . Decide if each is fake or genuine and decide what was it about the that made you think it was genuine or fake?

How to spot a scam Look at the source of the at the top of the page. Check the address is actually from your bank or the company you are expecting an from, not a personal address. Web/ addresses in scam s can appear genuine but may not be. To find out, hover over the web/ address (but do not click on it) and you should see exactly where the has come from. The string of numbers below looks nothing like the company’s web address.

How to spot a scam Check that the source address or link within the does not just resemble the name of a well-known company and has been slightly altered. For example, the address " could appear instead as: ‘’ Phrases such as "Verify your account’’, "You have won the lottery“ or "If you don't respond within 48 hours, your account will be closed" are all commonly used in scam s. The might contain official looking logos but the images might look slightly blurry or pixilated.

Tips for avoiding scams and keeping your money safe Never respond to s that ask for personal information or bank details. If you think that your bank are trying to contact you ignore any s that you receive, call the bank or log onto your online banking yourself. If possible use an up-to-date browser, they are more secure than older versions. Make sure your computer has anti-virus and anti-spyware software and a firewall. Block spam .

Tips for avoiding scams and keeping your money safe Keep your computer up to date – you can download updates to the operating system from the manufacturer (e.g. Microsoft). Never tell anyone your PIN numbers, passwords or online ID. Never write your PIN numbers or passwords down. If you are asked to give your mothers maiden name for a security password, give a fake one which can help to prevent someone for stealing your identity. Change your passwords regularly and try not to use a mixture of numbers and letters.

Tips for avoiding scams and keeping your money safe If you are using a shared computer make sure you log off properly from your online banking service. If you have wireless broadband, use the password feature to block other people from using your service. If you think you have received a phishing report it by forwarding it to If you think you have been tricked into revealing your security details to fraudsters, tell your bank straight away.

Question and answers At the beginning of the session we asked you to describe one problem that you had experienced with managing money. Now is your opportunity to ask any questions about have about that problem or other questions you have about managing money. We will try and answer your questions but you may also find the answer on the Managing Money website ( or in the Managing Money workbook. If not please and we will try and answer your question via

Managing Money workbook Please take a copy of the Managing Money workbook

Moneymadeclear guides