Minding your business on the internet Kelly Trevino Regional Director October 6,2015.

Slides:



Advertisements
Similar presentations
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Advertisements

What is Bad ? Spam, Phishing, Scam, Hoax and Malware distributed via
Internet Safety Gleneagles Computer Club February 16, 2015 by Deborah Benson.
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Internet Safety Basics Never share names, schools, ages, phone numbers, or addresses. Never open an from a stranger – it may contain viruses that.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
Computer Hardware Software 1.Introduction 2.Internet research and security Basic online protection 3.Use PC safely and efficiently 4.Purchase decisions.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
Scams Stevie's Scam School videos
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Internet safety By Lydia Snowden.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Over 3,000 computers are affected monthly by Malware and Phishing.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
© 2006 Consumer Jungle Minimizing Online Risks. © 2006 Consumer Jungle 15 Steps to Minimizing Online Risks 1.Update your operating system 2.Use a firewall.
Security 101 Harper P. Johnson Information Technology Services Director of Information Security.
Welcome to e-safety Training Friday 3 rd Oct 2014.
JMU GenCyber Boot Camp Summer, Cyberspace Risks and Defenses Facebook Snapchat P2P filesharing Apps Craigslist Scams JMU GenCyber Boot Camp© 2015.
Have Fun, Be Safe Strategies for Internet and Social Media Safety.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
The Internet Netiquette and Dangers. Outline Netiquette Dangers of the Internet.
Stay Safe & Secure Online. Outline Passwords Everyday Security Security Physical Security Protecting Personal Information.
Scams & Schemes Common Sense Media.
Computer Security By: MacKenzie Olson. To be safer and more secure online, make these seven practices part of your online routine.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
IT security By Tilly Gerlack.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
Safeguarding Your Privacy Section 1.3. Safeguarding Your Privacy 1. What is Identity Theft? 2. Research a story on identity theft and be prepared to report.
Computer Security By Rachel Gaines. Computers are used for work, play, and everything in between. So here’s how to keep it fun and protected.
Etiquette – a list of rules that we observe Phishing - sending an to a user falsely claiming to be a legitimate company to scam the user into providing.
Internet and Social Media Security. Outline Statistics Facebook Hacking and Security Data Encryption Cell Phone Hacking.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Digital Citizenship Grade Create a map that shows all of the places your family goes online and with whom you connect With a parent, find three.
Malware and Phishing By: Sydney Langley. MALWARE- includes viruses and spyware to steal your personal information PHISHING- is an internet scam sending.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
SCAMS & SCHEMES PROTECTING YOUR IDENTITY. SCAMS WHAT IS A SCAM? ATTEMPT TO TRICK SOMEONE, USUALLY WITH THE INTENTION OF STEALING MONEY OR PRIVATE INFORMATION.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
Internet Security and Your Computer Welcome to Boot Camp.
Internet Safety Internet Safety LPM
What is Spam? d min.
Scams and Schemes Essential Question: What is identity theft, and how can you protect yourself from it?
Activity 4 Protecting Ourselves. Keeping Safe There are lots of different ways we can be at risk on the Internet. How can we protect ourselves and keep.
Cyber Safety Jamie Salazar.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Cybersecurity Test Review Introduction to Digital Technology.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Unit Five Your Money – Keeping It Safe and Secure Identity Theft Part II Resource: NEFE High School Financial Planning Program.
Return to the PC Security web page Lesson 4: Increasing Web Browser Security.
Safe Computing Practices. Outline Objective Safe Computing Defined Safe Computing Methods Summary List of References.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Presented By: Jennifer Thayer, SPHR, SHRM-SCP.  Identify CyberCrime and Types  Identify Steps to Take to Prevent Identity Theft  Learn Tips and Tricks.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Smart, Safe, and Secure Online Spam commercial messages that you didn’t ask for (a company trying to sell things by sending out thousands of messages at.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Identity Theft: Protect Yourself Ronald J. Leach.
Computer Security Keeping you and your computer safe in the digital world.
Intro to Digital Technology Review for Final Introduction to Digital Technology Finals Seniors Monday, 5/16 – 2 nd Tuesday 5/17 – 1 st,3 rd Underclassmen.
Unit 4 IT Security.
Types of Cyber Crimes Phishing - is a scam to steal your online username and password. Phishing attacks work by tricking you into entering your username.
Information Security 101 Richard Davis, Rob Laltrello.
Unit 4 IT Security.
Cybersecurity Awareness
Internet Safety – Social Media
Presentation transcript:

Minding your business on the internet Kelly Trevino Regional Director October 6,2015

Common Online Scams Work-at-home scams Lotteries and Sweepstakes Scams Bogus Apartment Rentals Online Dating Scams

Avoiding Online Scams What to do -Know who you’re dealing with -Wiring money is like sending cash -Read your monthly statements What not to do -Do not send money to someone you don’t know -Don’t agree to deposit a check and wire money back -Don’t reply to messages for personal or financial information Report online scams FTC/econsumer.gov

Spam How to reduce the amount of spam you get -use filter -limit your exposure -choose a unique address How to reduce spam for everyone -don’t let spammers use your computer -download software from sites you trust Report spam

Phishing How to deal with phishing scams Action steps Report phishing s

Computer Security -Use security software that updates automatically -Treat your personal information like it’s cash -Check out companies to find out who you’re dealing with -Give personal information over encrypted websites only -Protect your passwords -Back up your files

Malware -Avoiding malware -keep software updated -don’t click on any links unless you know what it is -download only from websites you trust -use a pop-up blocker -Detecting malware -monitor your computer -Getting rid of it -stop activities that involve user names, passwords, or sensitive info -Update security software -Reporting it -

Securing Your Wireless Network - Understand how a wireless network works -Use encryption -Don’t assume that public Wi-Fi networks are secure

P2P File-Sharing Risks -Install reputable security software -Limit what you share and how often -know what folders you’re sharing -create separate user accounts

Laptop Security Don’t: Leave your laptop unattended-even for just a moment Leave your laptop in a car Put your laptop on the floor Keep passwords with your laptop or its case Do: Treat your laptop like cash Lock your laptop with a security cable Consider an alarm for your laptop Consider carrying your laptop in something less obvious than a laptop case

Disposing of Old Computers How to clean a hard drive Save the files you want to keep How to dispose of your computer Recycle Donate Sell

Use IP Cameras Safely Before buying an IP camera Using security features

Cookies: Leaving a Trail on the Web - Understanding cookies - Controlling cookies - “Private browsing”

Comparing Products Online -Think before you shop -Use search engines -Check comparison shopping sites -Consider coupons -Read reviews & be skeptical -What if there’s a problem?

Protect Kids Online Remind kids that online actions have consequences Tell kids to limit what they share Limit access to your kids’ profiles

Connect with us! facebook.com/YourBBB twitter.com/CentralTexasBBB