© 2006 Consumer Jungle Minimizing Online Risks. © 2006 Consumer Jungle 15 Steps to Minimizing Online Risks 1.Update your operating system 2.Use a firewall.

Slides:



Advertisements
Similar presentations
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Advertisements

The Internet = A World of Opportunities Look whats at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
How to Keep Your PC Running Like New Bryan Nowak.
The Internet.
SECURITY CHECK Protecting Your System and Yourself Source:
Fraud, Scams and ID Theft …oh my! Deb Ramsay ESD 101 Chief Information Officer Technology Division.
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
Safe IT – Protect your computer and Family from unwanted programs viruses and websites.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
How to avoid Viruses and Malware on your Computer Use a firewall Using a firewall is like locking the front door to your house—it helps keep intruders.
The Internet = A World of Opportunities
IDENTITY THEFT ARE YOU SAFE?. HOW DOES THIS HAPPEN TO ME? Internet “Security “ When using a public computer, never access any vital accounts like banking.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Protecting Yourself Online. VIRUSES, TROJANS, & WORMS Computer viruses are the "common cold" of modern technology. One in every 200 containing.
Spring Definitions  Virus  A virus is a piece of computer code that attaches itself to a program or file so it can spread.
INTERNET SAFETY FOR EVERYONE
1 Computer Security: Protect your PC and Protect Yourself.
Choosing an Internet Service Providers (ISP) A SeniorNet Workshop SeniorNet is a service program of the Lutheran Service Society of Western Pennsylvania.
Securing Your Home Computer Presenter: Donnie Green Date: February 11, 2009 National Aeronautics and Space Administration
Ten Things You Should Do to Your Computer Today Don Yarman & Jim Mann OLC IT Division Small Libraries Conference May 2006.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet safety By Lydia Snowden.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Contents  Viruses Viruses  Computer Worms Computer Worms  Trojans Trojans  Spyware Spyware  Adware Adware  Spam Spam  Hoaxes and Scams Hoaxes and.
Security Squad Keeping your Equipment and Information Safe Security Squad Keeping your Equipment and Information Safe Security Squad Video Series, Part.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Alisha Horsfield INTERNET SAFETY. firewall Firewall- a system made to stop unauthorised access to or from a private network Firewalls also protects your.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
The Internet Netiquette and Dangers. Outline Netiquette Dangers of the Internet.
Stay Safe & Secure Online. Outline Passwords Everyday Security Security Physical Security Protecting Personal Information.
Computer Security By: MacKenzie Olson. To be safer and more secure online, make these seven practices part of your online routine.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
IT security By Tilly Gerlack.
Securing Your Home Computer Securing Your Home Computer Jay Ferron ADMT, CISM, CISSP, MCDBA, MCSE, MCT, NSA-IAM.
Viruses By amrisa hussain Internet safety. viruses Viruses- a virus is a file or a piece of code which is capable of copying itself and typically has.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, + colleagues.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
Online Security By:. The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
Spyware By: Sydney Langley. Spyware Is software installed on your computer without your consent Spyware monitors or controls your computer use.
Computer Security By Rachel Gaines. Computers are used for work, play, and everything in between. So here’s how to keep it fun and protected.
C OMPUTER V IRUSES Julia White. W HAT ARE COMPUTER VIRUSES ? Computer viruses are small software programs that are designed to spread from one computer.
Safer Online Shopping and Practices Presenter: Brian Moats Students Active In Leadership.
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
Computer Security By: Alex Metzler. Table of Contents Protecting Your Personal Info Know Who You’re Dealing With Use Updated Security Software Update.
Internet Security and Your Computer Welcome to Boot Camp.
Minding your business on the internet Kelly Trevino Regional Director October 6,2015.
What is Spam? d min.
Protecting Your Computer By: Victoria Tuttle. There’s never enough you can do to protect your computer.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Home Computer Security Sponsored by NASA HQ ITCD Special Projects Training Presented by your Computer Training Center.
Onguardonline.gov By Austin Kellogg. Main ideas  Protect your personal information  Know who your dealing with  Use security software that updates.
Any criminal action perpetrated primarily through the use of a computer.
How to be E-safe Objective To know how to use Technology responsibly in today’s world. Outcome To create a Responsible use of Technology poster suitable.
A Quick and Easy Crash Course Internet Safety for Everyone.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Phillip Schneider Information Services Librarian Gail Borden Public Library District Cybersecurity: Keeping Your Computers & Devices Safe.
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
Unit 4 IT Security.
Name Job Title Library Name
Minimizing Online Risks
Presentation transcript:

© 2006 Consumer Jungle Minimizing Online Risks

© 2006 Consumer Jungle 15 Steps to Minimizing Online Risks 1.Update your operating system 2.Use a firewall 3.Adjust browser security settings 4.Consider an ISP or provider that offers security 5.Use antivirus software 6.Use antispam software 7.Use at least one antispyware program Good online practices 8.Regularly back up personal files 9.Be on the alert while browsing 10.Create strong passwords 11.Don’t post your address 12.Use cautiously 13.Use multiple addresses 14.Don’t buy from spammers 15.Look for secure Web sites

© 2006 Consumer Jungle Update your operating system Windows XP users –Enable Automatic Windows Update feature –Download & install Service Pack Keep your computer updated with the latest security measures.

© 2006 Consumer Jungle Use a firewall Enable built-in firewall on Windows XP and Mac OS With older systems, install firewall –Software (protection for incoming and outgoing) –Hardware (most routers have firewalls)

© 2006 Consumer Jungle Adjust browser security settings On Internet Explorer 6 –Set security level to medium or high. This will prevent many security issues.

© 2006 Consumer Jungle Consider an ISP or Provider that Offers Security providers that offer spam filtering, virus scanning at no extra charge: –AOL –Earthlink –MSN –Yahoo –Gmail (offered by Google) Use as first layer of defense.

© 2006 Consumer Jungle Use Antivirus Software Will detect viruses or worms that have been in circulation for at least a couple of days. –May fail to detect brand- new viruses. Enable –Auto-protect –Automatic update features Keep your subscription current Keep your guard up!

© 2006 Consumer Jungle Use Antispam Software Enable spam blocking from your ISP. Buy antispam software On web-based services like Hotmail or Yahoo: –enable built-in blockers.

© 2006 Consumer Jungle Use at Least One Antispyware Program No product will catch every spyware variant Good combo: –Free spyware –Purchased spyware Use real-time protection on one product. Use the automatic update feature Keep your subscription current Download at official sites Mac users at less risk

© 2006 Consumer Jungle Regularly Back Up Personal Files Safegaurds data Use a plug-in external hard drive as: –Backup storage or –Main storage If the computer crashes, your files are already off the machine

© 2006 Consumer Jungle Be on The Alert While Browsing Be wary of ad-sponsored or “free”: –screen savers –Games –Videos –Toolbars –Music –Movie file-sharing programs –Other giveaways They probably have spyware

© 2006 Consumer Jungle Create strong passwords A good password is at least 8 characters, includes a number and a symbol, and is not a common word

© 2006 Consumer Jungle Don’t post your Don’t post your in its normal form on a public website –No: org org –Yes: info at consumerjungle DOT org.

© 2006 Consumer Jungle Use Cautiously Never: – Open an attachment that you weren’t expecting –Respond to asking for personal information –Reply to spam or click on its “unsubscribe” link Report phishing to companies that are being misrepresented

© 2006 Consumer Jungle Use Multiple Addresses Primary for family and friends Secondary for: –Online purchases –Sending e-cards –Everything else Create s with embedded digits le.org

© 2006 Consumer Jungle Don’t Buy From Spammers Don’t buy anything promoted in a spam message –Even if it isn’t a scam –If you do, you are financing & encouraging spam

© 2006 Consumer Jungle Look for Secure Websites Look for an icon in the bottom right of your browser of: –An unbroken key or –A lock that’s: Closed Golden Glowing Make sure the site’s address begins with “