Ways to protect yourself against hackers

Slides:



Advertisements
Similar presentations
Internet Safety Gleneagles Computer Club February 16, 2015 by Deborah Benson.
Advertisements

Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
Scams Stevie's Scam School videos
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Notes to Teachers At the time we embedded the links in these lessons, they all worked. If they don’t, you can google the website, find the link, open it.
Threats to I.T Internet security By Cameron Mundy.
Password Management Programs By SIR Phil Goff, Branch 116 Area 2 Computers and Technology April 18,
E safety. Ads It’s always best to not click on ads when you see them, and it’s always a good idea to ignore them, but if there are too many you can always.
Copyright ©: SAMSUNG & Samsung Hope for Youth. All rights reserved Tutorials The internet: Social networks and communities Suitable for: Improver.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Protecting Yourself Online (Information Assurance)
ESCCO Data Security Training David Dixon September 2014.
Staying Safe Online Keep your Information Secure.
Web Browser Security Prepared By Mohammed EL-Batta Mohammed Soubih Supervised By Eng. Eman alajrami Explain Date 10. may University of Palestine.
IT security By Tilly Gerlack.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS). SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.1 I can describe.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
Copyright ©: SAMSUNG & Samsung Hope for Youth. All rights reserved Tutorials The internet: Staying safe online Suitable for: Beginner.
Internet and Social Media Security. Outline Statistics Facebook Hacking and Security Data Encryption Cell Phone Hacking.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
1. Go to 2. Complete the requested information.
For brownies this PowerPoint will help you understand computer viruses and help stop them!!!!
INTERNET SAFETY FOR KIDS
MY ONLINE CODE In the last 2 years of digital literacy I have learned the proper ways to act and why to act that way online, I have also learned other.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
The internet is a place of both useful and bad information. It has both good and bad side- and it’s all too easy for kids to stray into it. And no parents/guardian.
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
Cyber Security and Computer Safety
Internet Safety.
Debra Mann Reference Librarian Innisfil Public Library
As modern children, we have a huge number of electronic devices available to us. We might use computers, tablets, mobile phones or games consoles; for.
Creating your online identity
What they are and how to protect against them
Tonga Institute of Higher Education IT 141: Information Systems
Common Methods Used to Commit Computer Crimes
Unit 4 IT Security.
How to use the internet safely and How to protect my personal data?
Information Security.
How to use the internet safely and How to protect my personal data?
Safe Internet Mechatronika Budapest.
How to build a good reputation online
Protect Your Computer Against Harmful Attacks!
Lesson 2- Protecting Yourself Online
Collaboration with Google Docs
STOP. THINK. CONNECT. Online Safety Quiz.
HOW TO MAKE YOUR GMAIL ACCOUNT SECURE…. At Google, we take account security very seriously. To protect your account, we strongly recommend following the.
Information is at the heart of any University, and Harvard is no exception. We create it, analyze it, share it, and apply it. As you would imagine, we.
Information Technology Services Education and Awareness Team
Risk of the Internet At Home
Protecting Your Identity:
Internet Basics.
Internet Safety for Everyone
Tonga Institute of Higher Education IT 141: Information Systems
Cyber Security and Computer Safety
Ian Ramsey C of E School GCSE ICT On the move How can we connect?
Introduction to Computers
Tonga Institute of Higher Education IT 141: Information Systems
Bethesda Cybersecurity Club
CYBERSAFETY & Personal information
Internet Safety – Social Media
Information Technology Services Education and Awareness Team
Lesson 2- Protecting Yourself Online
Internet Safety for Everyone
Communicating in the IT Industry
Data Recovery: Why Secure Deletion is so Important.
Wireless Spoofing Attacks on Mobile Devices
Keeping your passwords safe
Founded in 2002, Credit Abuse Resistance Education (CARE) educates high school and college students on the responsible use of credit and other fundamentals.
Presentation transcript:

Ways to protect yourself against hackers

Use anti-virus protection There are many anti-virus services available for users. They can offer many different types of computer protection. Some anti-virus services are even free. They are a great way to have a professional help keep users one step ahead of hackers.

Update Update your OS and other software frequently, if not automatically. This keeps hackers from accessing your computer through vulnerabilities in outdated programs

Destroy Destroy all traces of your personal info on hardware you plan on selling. Consider using d-ban to erase your hard drive. For those looking to pillage your recycled devices, this makes information much more difficult to recover.

Don’t link accounts. If you want to comment on an article and you’re prompted to sign in with Twitter or Facebook, do not go behind the door. “Convenience always lessens your security posture,”. “Linking accounts allows services to acquire a staggering amount of personal information.”

Keep sensitive data off the cloud. “No matter which way you cut it, data stored on the cloud doesn’t belong to you,” says Taggart. “There are very few cloud storage solutions that offer encryption for ‘data at rest.’ Use the cloud accordingly. If it’s important, don’t.”

Make your password harder to hack Hard passwords include upper and lower case letters, numbers and special characters. They should be at least eight characters in length. They should also notspell out words easy for hackers to find, like your pet’s name or the name of a family member.

Change your password regularly A very common mistake made by users is to create one hard password, but then never change it. Remembering a long list of complicated passwords can be difficult. But no password is unbreakable. Hackers are better able hack multiple accounts if those accounts all have the same password. A password management service, like Dashlane or PasswordBox, can help you keep track of hard passwords. These services permit users to easily store and secure their passwords.

Sensing a pattern here? Create difficult passwords and change them frequently. In addition, never use the same passwords across multiple services. If that’s as painful as a stake to a vampire’s heart, use a password manager like LastPass. For extra hacker protectant, ask about two-step authentication. Several services have only recently started to offer two-factor authentication, and they require the user to initiate the process. Trust us, the extra friction is worth it. Two- factor authentication makes taking over an account that much more difficult, and on the flip side, much easier to reclaim should the worst happen.

Come up with creative answers for your security questions. People can now figure out your mother’s maiden name or where you graduated from high school with a simple Google search.

Clear your browser history This goes for all the devices you use in a day – your home computer, your work computer, or your friend’s iPad. Internet browsers like Firefox or Chrome keep track of where you’ve been and what you’ve done online. They keep records of every site you visited. Information about what you sent from or saved on your computer can be kept for days or weeks. It is very easy for anyone who sees that information to steal a detailed record of your online activities.

Do not use free Wi-Fi An increasing number of public places now offer free wireless access to the Internet. Often, a user does not need a password to connect to these wireless networks. These services might be useful, but they’re also an easy way for hackers to access everything on your device. Unless you really need it, it is best not to use it.

Use HTTPS HTTPS is officially known as “hyper-text transfer protocol secure.” It is similar to HTTP, which is used to enter Internet addresses. HTTPS adds an extra layer of and encryption while online. Communications security between users and sites that support HTTPS are encrypted. The information is also authenticated. That means that HTTPS can determine whether or not a website is real.

Watch what you click One of the most popular and successful ways hackers infect your computer is through a technique called phishing. Phishing occurs when someone opens an email attachment that looks real. But the attachment is actually a virus that immediately infects the user’s computer. If someone sends you a file or a website you did not ask for, it is best to not click on it.

Try not to use public computers For many people, not using a public computer can be difficult. Those without a computer or Internet access at home often use Internet cafes to get online. However, the more different people use a computer, the more likely a virus has infected it.

Be careful while using thumb drive Thumb drives, also known as flash drives, are small and easy storage devices to use across different computers. They are a popular device that people use to exchange files and documents. They can also spread viruses easily across computers and networks.

Thanks…