4 ways to stay safe online 1. Avoid viruses and phishing scams

Slides:



Advertisements
Similar presentations
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Advertisements

Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
POSSIBLE THREATS TO DATA
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
What is Bad ? Spam, Phishing, Scam, Hoax and Malware distributed via
Security for Today’s Threat Landscape Kat Pelak 1.
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
Possible Threats To Data. Objectives To understand: Types of threats Importance of security Preventative and remedial actions Personal safety This will.
Securing Your Home Computer Presenter: Donnie Green Date: February 11, 2009 National Aeronautics and Space Administration
Threats to I.T Internet security By Cameron Mundy.
Internet safety By Lydia Snowden.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
IT security By Tilly Gerlack.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Types of Electronic Infection
The way to avoid being trap into cyber crime. What is cyber crime? The Department of Justice categorizes computer crime in three ways: 1. The computer.
Malware and Phishing By: Sydney Langley. MALWARE- includes viruses and spyware to steal your personal information PHISHING- is an internet scam sending.
Topic 5: Basic Security.
Be Safe Online. Agree, Disagree, Maybe if…  Worksheet Activity  Discussion.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Malicious Attacks By: Jamie Woznicki Rahul-Anaadi Kurl Alexander Kaufmann Curtis Songer Daniel Cardenas Rivero.
Threats To Data 30 Threats To Data 30. Threats To Data 30 We’re now going to look at a range of different threats to people’s data: Opportunity Threats.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Computer Security Keeping you and your computer safe in the digital world.
Ransomware BISD Technology Department. Ransomware Ransomware is a type of malicious software (malware) that infects a computer and/or mobile device and.
Protecting Against Cyber Attacks PLEASE TAKE A MINUTE TO LOOK AT THIS IMPORTANT MESSAGE. THIS IS HAPPENING HERE AND NOW! LET US SAVE YOU AND YOUR INFORMATION.
Internet Safety.
Presented by: SBS CyberSecurity © SBS CyberSecurity, LLC
Chapter 40 Internet Security.
Digital Security Identity theft Copyright Laws Plagiarism, and More.
Louisiana State University
Hotspot Shield Protect Your Online Identity
Learn how to protect yourself against common attacks
Unit 4 IT Security.
Types of Cyber Crimes Phishing - is a scam to steal your online username and password. Phishing attacks work by tricking you into entering your username.
Lesson 3 Safe Computing.
Homeland Security: Computer Protection
Unit 4 IT Security.
Network security threats
Report Phishing Forward phishing s to
Information Security 101 Richard Davis, Rob Laltrello.
Phishing is a form of social engineering that attempts to steal sensitive information.
Protect Your Computer Against Harmful Attacks!
Year 10 ICT ECDL/ICDL IT Security.
A Trojan is a computer program that contains the malicious code and it misleads users and user's computer. It aims to designed to perform something is.
Lesson 2- Protecting Yourself Online
Cybersecurity Awareness
How to allow USB Flash Drive Scan in Avast Antivirus.
5 ways to keep your work safe and secure
IT Security awareness Training.
Mary Kummer Jim McNall PRIMA Spring Training 2018
Risk of the Internet At Home
Report Phishing Forward phishing s to
Stay Safe While Using The Internet
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
Security Hardening through Awareness August 2018
What is Phishing? Pronounced “Fishing”
Lesson 2- Protecting Yourself Online
Business-class solution
Phishing 101.
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Why Cyber Security is important to SME? Useful Tips on how you protect and secure your business. By Ronald Soh from Win-Pro Consultancy Pte Ltd
Cybersecurity Simplified: Phishing
Cybersecurity Simplified: Ransomware
Defencebyte THE PERFECT SECURITY FOR YOUR COMPUTER.
Presentation transcript:

4 ways to stay safe online 1. Avoid viruses and phishing scams With the growing presence and sophistication of online threats like viruses, ransomware, and phishing scams, it’s important to have the right protection. Office 365 Home and Office 365 Personal give you advanced security tools to help keep your information secure and private. 1. Avoid viruses and phishing scams 35% Malware and viruses attack your computer when you visit malicious websites or download infected files. Thirty-five percent of all computers globally are infected by malware. 23% Hackers use phishing scams to try to steal your identity or money by sending official-looking email asking for sensitive personal information. 23% of people open phishing email. To stay safe, use Outlook.com to send and receive email. Outlook.com uses advanced detection techniques to check attachments for viruses, and it warns you if you click on a suspicious link.

2. Protect your information with passwords Sending confidential or personal information online can be worrisome. Using OneDrive, you can require a password to access a shared link. This prevents others from accessing your files if the recipient forwards or shares the link. Go to OneDrive, select the file you want to share, then select Share. Select Set password and enter a password. Select Copy, then paste the link in an email message.

3. Encrypt email to minimize threats Use email encryption in Outlook.com to share your confidential and personal information and minimize the threat of your email being intercepted or leaked to cybercriminals. To send an encrypted email, select Encrypt > Encrypt to encode your message, or Encrypt > Encrypt and prevent forwarding to encode your message and prevent it from being copied or forwarded.

4. Recover files from malicious attacks More than 4,000 ransomware attacks happen every day. If Office 365 detects a ransomware attack, you’ll get an email or notification. To recover from ransomware, file corruption, malicious attacks, or accidental deletions, you can restore your OneDrive to a previous time. Go to the OneDrive website. Select Settings > Options. Select Restore your OneDrive. Select the earliest activity that you want to undo. Select a date from the drop-down list, or choose Custom date and time. Select Restore to undo all the activities you selected. For more information, visit aka.ms/staysafeonline Sources: U.S. Department of Justice, How to Protect your Networks from Ransomware; Anti-Phishing Working Group, Phising Activity Trends Report, Q4 2015; Verizon, Data Breach Investigations Report, 2015