Computer Security By: MacKenzie Olson. To be safer and more secure online, make these seven practices part of your online routine.

Slides:



Advertisements
Similar presentations
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Advertisements

Cyber Stalking Cyber Stalking Phishing Hacker 1. Never reveal your home address !!! This rule is especially important for women who are business professionals.
Primary Threats to Computer Security
Stay Safe Online in Six Steps Presented by: Scott Rhinehart 540 Lake Center Parkway, Suite 102 Cumming, GA Office: ext Fax:
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Fraud, Scams and ID Theft …oh my! Deb Ramsay ESD 101 Chief Information Officer Technology Division.
INTERNET SAFETY FOR EVERYONE A QUICK AND EASY CRASH COURSE.
How to avoid Viruses and Malware on your Computer Use a firewall Using a firewall is like locking the front door to your house—it helps keep intruders.
IDENTITY THEFT ARE YOU SAFE?. HOW DOES THIS HAPPEN TO ME? Internet “Security “ When using a public computer, never access any vital accounts like banking.
INTERNET SAFETY FOR EVERYONE
GET CONTROL! Avoid The Headache… Five Simple Steps to a Safer Computer – NUIT Tech Talk.
Internet safety By Lydia Snowden.
Over 3,000 computers are affected monthly by Malware and Phishing.
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
© 2006 Consumer Jungle Minimizing Online Risks. © 2006 Consumer Jungle 15 Steps to Minimizing Online Risks 1.Update your operating system 2.Use a firewall.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
IT security By Tilly Gerlack.
Computer Security By Joey Pawoll. Introduction to computer security Have you been wondering how to be safe online? Well look no further! This powerpoint.
Computer Security By Rachel Gaines. Computers are used for work, play, and everything in between. So here’s how to keep it fun and protected.
Computer Security! By Bailey Hoover. Opening: “Computer viruses are an urban legend.” -Peter Norton Actually: Virus: software reproduces itself; causes.
FINANCIAL MANAGEMENT 29 AUG 05 OC CARUSO. OVERVIEW BUDGETS CREDIT CARDS IDENTITY THEFT IMPORTANT FINANCIAL TOPICS FOR NEW COLLEGE STUDENTS.
Malware and Phishing By: Sydney Langley. MALWARE- includes viruses and spyware to steal your personal information PHISHING- is an internet scam sending.
Malware & Phishing By: mackenzie olson. Internet fraudsters send out spam, pop-ups, appealing websites, and desirable downloads.
Computer Security By Sierra Monif. “Access to information and entertainment, credit and financial services, products from every corner of the world —
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
Computer Safety Sid Holder 8k Viruses Hacking Backing Up.
INTERNET SAFETY FOR KIDS
Computer Security By: Alex Metzler. Table of Contents Protecting Your Personal Info Know Who You’re Dealing With Use Updated Security Software Update.
Minding your business on the internet Kelly Trevino Regional Director October 6,2015.
Protecting Your Computer By: Victoria Tuttle. There’s never enough you can do to protect your computer.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Computer Skills and Applications Computer Security.
Cyber Safety Jamie Salazar.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Virus Assignment JESS D. How viruses affect people and businesses  What is a virus? A computer virus is a code or a program that is loaded onto your.
Onguardonline.gov By Austin Kellogg. Main ideas  Protect your personal information  Know who your dealing with  Use security software that updates.
Any criminal action perpetrated primarily through the use of a computer.
Return to the PC Security web page Lesson 4: Increasing Web Browser Security.
Safe Computing Practices. Outline Objective Safe Computing Defined Safe Computing Methods Summary List of References.
A Quick and Easy Crash Course Internet Safety for Everyone.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Computer Security Keeping you and your computer safe in the digital world.
Unit 4 IT Security.
Things To Avoid: 1-Never your password to anyone.
Mcafee.com/activate - To get more information about download, install and activate the McAfee antivirus software, visit on using.
Mcafee.com/activate - To get more information about download, install and activate the McAfee antivirus software, visit on using.
MCAFEE.COM/ACTIVATE - TO GET MORE INFORMATION ABOUT DOWNLOAD, INSTALL AND ACTIVATE THE MCAFEE ANTIVIRUS SOFTWARE, VISIT ON USING.
Mcafee.com/activate - To get more information about download, install and activate the McAfee antivirus software, visit on using.
Mcafee.com/activate - To get more information about download, install and activate the McAfee antivirus software, visit on using.
MCAFEE.COM/ACTIVATE - TO GET MORE INFORMATION ABOUT DOWNLOAD, INSTALL AND ACTIVATE THE MCAFEE ANTIVIRUS SOFTWARE, VISIT ON USING.
Mcafee.com/activate - To get more information about download, install and activate the McAfee antivirus software, visit on using.
Mcafee.com/activate - To get more information about download, install and activate the McAfee antivirus software, visit on using.
Mcafee.com/activate - To get more information about download, install and activate the McAfee antivirus software, visit on using.
Mcafee.com/activate - To get more information about download, install and activate the McAfee antivirus software, visit on using.
MCAFEE.COM/ACTIVATE - TO GET MORE INFORMATION ABOUT DOWNLOAD, INSTALL AND ACTIVATE THE MCAFEE ANTIVIRUS SOFTWARE, VISIT ON USING.
Mcafee.com/activate - To get more information about download, install and activate the McAfee antivirus software, visit on using.
Mcafee.com/activate - To get more information about download, install and activate the McAfee antivirus software, visit on using.
Mcafee.com/activate - To get more information about download, install and activate the McAfee antivirus software, visit on using.
Mcafee.com/activate - To get more information about download, install and activate the McAfee antivirus software, visit on using.
Mcafee.com/activate - To get more information about download, install and activate the McAfee antivirus software, visit on using.
MCAFEE.COM/ACTIVATE - TO GET MORE INFORMATION ABOUT DOWNLOAD, INSTALL AND ACTIVATE THE MCAFEE ANTIVIRUS SOFTWARE, VISIT ON USING.
Mcafee.com/activate - To get more information about download, install and activate the McAfee antivirus software, visit on using.
Mcafee.com/activate - To get more information about download, install and activate the McAfee antivirus software, visit on using.
Mcafee.com/activate - To get more information about download, install and activate the McAfee antivirus software, visit on using.
MCAFEE.COM/ACTIVATE - TO GET MORE INFORMATION ABOUT DOWNLOAD, INSTALL AND ACTIVATE THE MCAFEE ANTIVIRUS SOFTWARE, VISIT ON USING.
Online software and backups

Presentation transcript:

Computer Security By: MacKenzie Olson

To be safer and more secure online, make these seven practices part of your online routine.

Practices for computer security Protect your personal information. It’s valuable. Protect your personal information. It’s valuable. Protect your personal information. It’s valuable. Protect your personal information. It’s valuable. Know who your dealing with Know who your dealing with Know who your dealing with Know who your dealing with Use security software that updates automatically Use security software that updates automatically Use security software that updates automatically Use security software that updates automatically Keep your operating system and web browser up-to-date, and learn about their security features. Keep your operating system and web browser up-to-date, and learn about their security features. Keep your operating system and web browser up-to-date, and learn about their security features. Keep your operating system and web browser up-to-date, and learn about their security features. Protect you password Protect you password Protect you password Protect you password Back up important files Back up important files Back up important files Back up important files Learn what to do in an e-mergency Learn what to do in an e-mergency Learn what to do in an e-mergency Learn what to do in an e-mergency

Protect your personal information It can provide access to your identity. It can provide access to your identity. ANYONE can be an identity theft. ANYONE can be an identity theft. Criminals lie about who they are. Criminals lie about who they are. Don’t reply or respond Don’t reply or respond Find out how your info is going to be used before giving it out. Find out how your info is going to be used before giving it out. Read website privacy policies. Read website privacy policies.

Know who your dealing with Unfamiliar site – call the seller’s phone number Unfamiliar site – call the seller’s phone number Search the site Search the site Use a software toolbar that rates websites Use a software toolbar that rates websites When file sharing read End User Licensing When file sharing read End User Licensing

Use security software that updates automatically Keep it active and current Keep it active and current Scam artist distribute malware disguised as anti-spyware software Scam artist distribute malware disguised as anti-spyware software Anti-virus – protects your computer from viruses Anti-virus – protects your computer from viruses Anti-spyware – monitors or controls your computers use Anti-spyware – monitors or controls your computers use Firewall – keeps hackers from using your computer Firewall – keeps hackers from using your computer Recent News!

Free anti-virus protection spurs robust options Protect your PC Protect your PC Free protection is not enough Free protection is not enough Free trials turn into paid subscriptions Free trials turn into paid subscriptions Get an all in one suite Get an all in one suite Bryon Acohido, USA Today. “Free anti-virus protection spurs more robust options” [Online] Sep 21, / antivirus22_CV_N.htm?loc=interstitialskip / antivirus22_CV_N.htm?loc=interstitialskip / antivirus22_CV_N.htm?loc=interstitialskip

Keep you operating system and web browser up-to-date Hackers take advantage of web browsers Hackers take advantage of web browsers Download and install security patches automatically Download and install security patches automatically Disconnect your internet when not using your computer Disconnect your internet when not using your computer

Protect your password Keep secure Keep secure Don’t share on internet, , or phone Don’t share on internet, , or phone Make it tough to hackers to get Make it tough to hackers to get Use 8 characters, numbers, or symbolsUse 8 characters, numbers, or symbols Longer the tougherLonger the tougher Avoid common wordsAvoid common words Don’t use personal infoDon’t use personal info Change regularlyChange regularly different password for each online accountdifferent password for each online account

Back up important files No system is completely secure No system is completely secure Remove important files to an external hard drive Remove important files to an external hard drive Store in safe place Store in safe place

Learn what to do in an e- mergency Suspect malware – stop putting personal info online Suspect malware – stop putting personal info online Security software up-to-date Security software up-to-date Call a professional to help Call a professional to help Share the seven practices for safer computing Share the seven practices for safer computing

If you follow those seven steps, your computer will be safer and more secure.

Sources OnGuard Online. 7 Practices for Computer Security. [Online] /computer-security.aspx OnGuard Online. 7 Practices for Computer Security. [Online] /computer-security.aspx /computer-security.aspx /computer-security.aspx