SIG Leader: Mike Smith Host of the Mike Tech Show podcast

Slides:



Advertisements
Similar presentations
Presented by: Your Firm Name Jackson, Howard & Whatley, CPA's.
Advertisements

Helping our customers keep their computers safe.  Using your pet’s, business, family, friend’s names  Using number or letter sequences (0123, abcd)
10 Things You Can do to Secure Your PC Presented by Peter Nowak OIS Client Services Manager.
IT Induction Course UCD IT Services. Contents Help & Advice Accessing IT Services UCD Connect Printing in UCD Teaching & Learning Services Apps Services.
Presented by: Allard, LTD CPA & Financial Services.
Putting It All Together 1.  Maintaining a Hard Drive Ch 4 Lab  Hardware cleaning tips ▪ Microsoft Tips Microsoft Tips ▪ Computer Hope Tips Computer.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
1.  Hardware – what does the new examiner receive  OS – XP, Vista, Win7 32/64 bit  Office 2003/2007/2010 – compatibility issues, training required.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
Configuring your Home Network Configuring your Home Network Jay Ferron ADMT, CISM, CISSP, MCDBA, MCSE, MCT, NSA-IAM.
IDENTITY THEFT ARE YOU SAFE?. HOW DOES THIS HAPPEN TO ME? Internet “Security “ When using a public computer, never access any vital accounts like banking.
310KM – Team Assignment: OS Platform of Mobile workforce for Logistics Company Window Mobile OS: Chan Wai Kai Android Operation Systems: Chan Kwok.
UNIVERSITY OF GEORGIA Presented by: EITS Staff Summer 2015 Orientation: Parent Session.
“Customer is King” this what the company believes in and is the reason that VNS GROUP incessantly aims to achieve and excel at providing end to end IT.
Safe Computing and Internet Browsing with Free Software Aosheng Wang ( 王敖生 )
Working From Your Home Computer Safely: The Ten Commandments Stephen Jones, GSEC, A+ With special thanks to Balakrishnan Ramachandran.
Password Management Programs By SIR Phil Goff, Branch 116 Area 2 Computers and Technology April 18,
Digital Certificate Installation & User Guide For Class - 2 Certificates.
Protect Your Computer from Viruses and Other Threats! 1. Use antivirus software. 2. Run Windows updates. 3. Use a strong password. 4. Only install reputable.
Security for Seniors SeniorNet Help Desk
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Elite Networking & Consulting Presents: Everything You Wanted To Know About Data Insurance* * But Were Afraid To Ask Elite Networking & Consulting, LLC,
8/1/2015. Please Ask Questions! 2 Hacks In The News Office of Personnel Management (OPN) Flash vulnerabilities Sony Heartbleed iCloud Leaked Pictures.
Using Technology in Ministry Edward Braithwaite Seminary Student, NOBTS.
Learning In A Techno World How Safe is Your Cyberspace?
ESCCO Data Security Training David Dixon September 2014.
Securing the Human. Presented by Thomas Nee, Computer Coordinator Town of Hanover, Massachusetts hanover-ma.gov/information-technology October is Cyber.
Security Squad Keeping your Equipment and Information Safe Security Squad Keeping your Equipment and Information Safe Security Squad Video Series, Part.
 Physical protection and Simple measures  Passwords  Firewalls  Anti-Virus, Spyware and Malware  Web browsers   Patches  Wireless  Encryption.
Don’t Get Taken Judicial Information Technology Office Protecting yourself from scams, malware, and phishing.
Instructional Technology & Design Office or Digital Security Basics Presented by Mark Baldwin &
Secure Wireless Home Networks Area 2 SIR Presentation Nov. 18, 2004 Dean Steichen Br. 8.
SIG Leader: Mike Smith Host of the Mike Tech Show podcast My
Preliminary Design Review Monday, March 25 th, 2009 Project Advisor: Dr. Whit Smith Group Members - Chris A. Higginbotham -John Lewis - Nikhail Singh.
Computer Security By Rachel Gaines. Computers are used for work, play, and everything in between. So here’s how to keep it fun and protected.
Cyber Security Action against cyber crime. What is cyber security?  Cyber security standards are security standards which enable organizations to practice.
IT Essentials 1 Chapter 9 JEOPADY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
VMWare Workstation Installation. Starting Vmware Workstation Go to the start menu and start the VMware Workstation program. *Note: The following instructions.
Minding your business on the internet Kelly Trevino Regional Director October 6,2015.
Minimizing your vulnerabilities. Lets start with properly setting up your servers which includes… Hardening your servers Setting your file and folder.
DHP Agenda: How to Access Web Interface of the DHP-1320 on Access Point Mode How to Access Web Interface of the DHP-1320 on Router Mode How to Change.
Ready for prime time Final version of Windows Free upgrade until July 29, 2016 New features Works on most computers < 6 years old Windows 10.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
FILE MANAGEMENT Computer Basics 1.3. FILE EXTENSIONS.txt.pdf.jpg.bmp.png.zip.wav.mp3.doc.docx.xls.xlsx.ppt.pptx.accdb.
Home Computer Security Sponsored by NASA HQ ITCD Special Projects Training Presented by your Computer Training Center.
U3A Computing Beginners Class Leader – Brian Moore Week 10 of 10 weeks. Mondays 4:15 to 5:45 pm **** Last Class Today***
Personal Security for Advanced Users Group 18 Andrew Trusty, Gaurav Mullick.
Recommended Computing Practices Dean Steichen SIR Branch 8 February 16, 2006.
Safe Computing Practices. Outline Objective Safe Computing Defined Safe Computing Methods Summary List of References.
OCTOBER IS CYBER SECURITY AWARENESS MONTH. October is Cyber Security Awareness Month  Our Cyber Security Awareness Campaign focuses on topics such as.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Copyright © 2008 AusCERT 1 Practical Computer Security See the notes section throughout the slide presentation for additional information.
UNIVERSITY OF GEORGIA Presented by: EITS Staff Summer 2016 Orientation: Parent Presentation.
Security Fundamentals for Educational Leaders. Steve Palmer K-12 Information Systems Security Analyst EduTech.
Securing the Human. Presented by Thomas Nee, Computer Coordinator Town of Hanover, Massachusetts hanover-ma.gov/information-technology October is Cyber.
Phillip Schneider Information Services Librarian Gail Borden Public Library District Cybersecurity: Keeping Your Computers & Devices Safe.
Chapter 2 New Company Set Up and Chart of Accounts Copyright ©2017 by McGraw-Hill Education. All rights reserved. 1 of 12.
Protecting Against Cyber Attacks PLEASE TAKE A MINUTE TO LOOK AT THIS IMPORTANT MESSAGE. THIS IS HAPPENING HERE AND NOW! LET US SAVE YOU AND YOUR INFORMATION.
Tech Security for Activists ● Dimi (Climate Action Camp / CJA Belgium) ● ”Tech Tools For Activists” online book:
Technology Requirements for Online Testing Training Module Please refer to the revision log on the last slide of this presentation, updated August.
DATA SECURITY FOR MEDICAL RESEARCH
Your Computer Wants To Ruin Your Life
Secure Client Portals With NetClient CS secure portals, you can work with us anytime, from any high-speed Internet connection. It’s as easy and secure.
At The Establish Etisalat Wifi Router Password Call
How can I back up my QuickBooks file on my own computer's hard drive?
12 STEPS TO A GDPR AWARE NETWORK
Chapter 3: Protecting Your Data and Privacy
REDCap and Data Governance
Connecting Remotely Winter 2014.
Cybersecurity for Everyone
Presentation transcript:

SIG Leader: Mike Smith Host of the Mike Tech Show podcast

Topic schedule Today – Security May – Virtualization Part II after Main Meeting Part I Jun – Organizing your digital life Jul – Aug – me your suggestions for next season presentation topics.

Today’s Agenda Security Password Tip Network Hardware Operating System Websites and Applications Data and Encryption Wi-Fi - Private and Public Q & A

Password Tip 8 characters Use Upper case, lowercase, number and symbol Example: C0mput3r!

Network Install a router for your broadband internet Cable, FiOS, DSL Change the default password Use OpenDNS to protect your network

Hardware Set the BIOS password Hard drive password, administrator

Operating System Keep Operating System patched Keep programs updated (Adobe flash, Java) Set login account passwords Use Anti-virus software Microsoft Security Essentials Use MalwareBytes for all other infections

Websites and Applications Managing all of those passwords for websites KeePass - Lastpass - RoboForm - Application passwords (i.e. Quicken. Quickbooks)

Websites and Applications Activate SSL for Gmail and Facebook

Data and Encryption File passwords (Word, Excel) TrueCrypt – Hard Drive Encryption USB thumb drive Encryption Truecrypt or IronKey Password protected backup

Wi-Fi - Private and Public Private Set WPA2 password encryption Change router password Public Use LogMeIn for safe browsing Personal HotSpot MiFi, iPhone, iPad

Do you buy from AMAZON? Please use one of my Amazon links or - This is the best way to show your support. Thank you!

Q & A Thank you Check out my weekly podcast the Mike Tech Show me questions or suggestions