Computer Club Security Awareness. The Very Best Internet Security is YOU!

Slides:



Advertisements
Similar presentations
NIMAC 2.0: The Accessible Media Producer Portal NIMAC 2.0 for AMPs.
Advertisements

Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Cyber Stalking Cyber Stalking Phishing Hacker 1. Never reveal your home address !!! This rule is especially important for women who are business professionals.
To Err Is Human Presented by. Before We Get Started Please turn your cell phones to stun. Restrooms are down the hall and on the right We’ll take a 5.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
How to Keep Your PC Running Like New Bryan Nowak.
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
1 Identity Theft: What You Need to Know. 2 Identity Theft Identity theft is a crime of stealing key pieces of someone’s identifying information, such.
Computer Maintenance & Safety Spring Internet Safety Keeping your computer safe What is a computer virus? A computer program that can copy itself.
How to avoid Viruses and Malware on your Computer Use a firewall Using a firewall is like locking the front door to your house—it helps keep intruders.
Online Portfolio Development Session #56 Oct. 11, 2004 Jen Alexander.
1 I ntegrated S ite S ecurity for G rids © Members of the ISSeG Collaboration, 2008 See: ISS e G Computer Security: Advice for computer.
What is spyware? Supervisor dr. lo’ay tawalbeh Search By Mahmoud al-ashram Soufyan al-qblawe.
1 The Planning Process Creating a Business Web Site By Paul Lazarony 2 Business Web Site Design Steps in the Planning Process u Software u Purpose u.
Social Engineering PA Turnpike Commission. “Social Engineering is the practice of obtaining confidential information by manipulation of legitimate users”
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
Teach a man (person) to Phish Recognizing scams, spams and other personal security attacks July 17 th, 2013 High Tea at IT, Summer, 2013.
E-Safety Quiz Keeping safe online! A guide for parents & children.
Computer Viruses. Where the name came from This is a phrase coined from biology to describe a piece of software that behaves very much like a real virus.
“I think kids should stay safe in the internet by not giving out personal information”.Giving out personal information and giving your address could have.
1 Computer Security: Protect your PC and Protect Yourself.
TechP rt 1 An Overview of the Courses and the Books Technology Training June 2007
What Every Parent Needs to Know! Internet Safety Information for Parents Purpose: Provide practical information parents can use at home Present safety.
Windows Update Jonathan Scott. What is Windows Update? Windows Update is an online program on the Microsoft Website that updates your computer. You can.
Manjit kaur Manjit Kaur1. Why do we need to protect our computer from a virus? A reason why we need to protect our computer from a virus is because it.
Copyright ©: SAMSUNG & Samsung Hope for Youth. All rights reserved Tutorials The internet: Social networks and communities Suitable for: Improver.
Keeping Information Safe Task 4. Basic security measures Passwords Change password on regular basis Do not use names or words easily linked to yourself.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
Malicious Attack Corporate Awareness and Walk through Date 29 September 2011.
A+ You Will Learn… How to prepare and test your computer to be able to use all course materials Determine software needed to submit assignments Strategies.
Keeping Safe While Using the Internet. We live in a community. What are some safety rules we have in our community? Cyberspace is also a community. What.
Copyright ©: SAMSUNG & Samsung Hope for Youth. All rights reserved Tutorials The internet: Staying safe online Suitable for: Beginner.
TechP rt 1 An Overview of the Courses and the Books Technology Training February 2008
© All Rights Reserved What is a computer virus? A computer virus is a piece of software or programming code.
COMPUTER SECURITY BEST PRACTICES. SECURE YOUR STUFF!  Physically secure your workstation by locking your screen when away  Secure any small, easy to.
ICT & Crime Viruses & malware. What is a virus? A computer virus is a piece of software that can 'infect' a computer (install itself) and copy itself.
INTERNET: The Good, The Bad and The Ugly
Optimizing Your Computer To Run Faster Using Msconfig Technical Demonstration by: Chris Kilkenny.
Ten Common Computer Problems That Can Easily Be Fixed By: Sam Merrifield.
Garrison Commanders Conference, Europe Brussels, Belgium Taking Care of You: Time and Stress Management II (Information Management)
Activity 4 Catching Phish. Fishing If I went fishing what would I be doing? On the Internet fishing (phishing) is similar!
Virus Assignment JESS D. How viruses affect people and businesses  What is a virus? A computer virus is a code or a program that is loaded onto your.
WALT use the internet to find information. WILF Use safe internet surfing skills How to narrow a search What to do if your find something inappropriate.
Confidentiality, Integrity, Awareness What Does It Mean To You.
NIMAC for Accessible Media Producers: February 2013 NIMAC 2.0 for AMPs.
Tips to Avoid Online Scams. About Several threats are there which spreads on every computer system just to infect each system with their harmful ways.
UNIT 14 1 Websites. Starter 2 1 Starter 1 Divide the students into groups. Ask them to make lists. Ask Students to read their lists. Discuss the most.
Fix: Windows 10 Error Code 0x in Mail App u/6/b/ /alexwaston14/reimage-system-repair/ /pages/Reimage-Repair-Tool/
Computer Security Keeping you and your computer safe in the digital world.
Catching Phish. If I went fishing what would I be doing? On the Internet fishing (phishing) is similar! On the internet people might want to get your.
New Extension Educator Orientation DASNR Information Technology Division of Agricultural Sciences and Natural Resources Levi Arnold May, 2016 New Extension.
For more information on Rouge, visit:
Professional Technicians Do Provide Support For Guardian Not Scanning In Windows8 or In Other Windows. Professional Technicians Do Provide Support For.
Privacy, Security, & Scam Defense When using Social Media, The Web, and even .
Toll Free:
Internet Safety.
Avast Antivirus Technical Helpdesk Number (USA), (UK), (AUS)
The Benefits of Joining
Lesson 3 Safe Computing.
How to Fi
Tips to Download or Install Norton Security to Computer Device.
POGO CUSTOMER SERVICE Fix Pogo Sign In & No Internet Connection Issues Best Pogo Customer Service Number.
Using Your Assess System
HOW TO MAKE YOUR GMAIL ACCOUNT SECURE…. At Google, we take account security very seriously. To protect your account, we strongly recommend following the.
Lesson 2: Epic Security Considerations
Type of Energy Pros Cons Example of slide… Clip Art Picture
9 ways to avoid viruses and spyware
Lesson 2: Epic Security Considerations
Lesson 2: Epic Security Considerations
Founded in 2002, Credit Abuse Resistance Education (CARE) educates high school and college students on the responsible use of credit and other fundamentals.
Presentation transcript:

Computer Club Security Awareness

The Very Best Internet Security is YOU!

Don’t Don’t visit suspicious sites Don’t open suspicious attachments Don’t click on suspicious links Suspicious: causing a feeling that something is wrong or that someone is behaving wrongly

Would you allow this?

Hello. May I come in to your apartment and use your computer, please?

How about this?

Click here so we can help make your computer faster and fix the many problems you might have. We’re authorized Microsoft support agents. STARR Suport Specalists

Snake Oil !

Click here so we can help make your computer faster and fix the many problems you might have. We’re authorized Microsoft support agents. STARR Suport Specalists

Is this suspicious?

How about this?

Phone Call Hello. Is this the owner of the computer? We’ve noticed many errors on your computer. We can fix them for $29.95 and control of your computer. It’s OK. We’re certified Windows technical support specialists. The accent? I just moved to Los Angeles, Iowa from out of the country.

Phone Call Hello. Is this the owner of the computer? We’ve noticed many errors on your computer. We can fix them for $29.95 and control of your computer. It’s OK. We’re certified Windows technical support specialists. The accent? I just moved to Los Angeles, Iowa from out of the country.

Things You Can Do Microsoft, Adobe, Apple, Dell, and HP will never cold call. Don’t respond to unsolicited phone calls. HANG UP!

What Can I Do? Don’t click on pop ups that aren’t from recognized companies or that sound too good to be true. Use Alt + F4 to dismiss them. Use Alt+F4 to close suspicious programs or web pages.

What Can I Do? Keep Anti-Virus and Anti-Malware software up to date. Keep the operating system up to date. Keep your data backed up.

What Can I Do? Avoid multiple security programs unless you’re an advanced user. Use a Kiosk to open any suspicious or to click on suspicious links.

What Can I Do? Ask a knowledgeable person what you should do. Use SiteAdvisor.com to check suspicious sites

What Can I Do? NEVER pay for help unless it’s from a local professional. NEVER pay for “Snake Oil” programs

Bottom Line YOU are the best Internet security – be smart

Bottom Line YOU are the best Internet security – be smart Things to do Don’t agree to help from unsolicited phone calls Don’t click on pop up ads offering help Don’t click on suspicious links

Bottom Line YOU are the best Internet security – be smart Things to do Don’t agree to help from unsolicited phone calls Don’t click on pop up ads offering help Don’t click on suspicious links Do keep software up to date Do use a Kiosk for suspicious items Do ask a knowledgeable person

The Computer Club Recommends Microsoft Security Essentials Free Not needed with Windows 8 MalwareBytes Pro $24.95 one time charge