Presentation is loading. Please wait.

Presentation is loading. Please wait.

Protecting Your Information Valuables in “Cyberspace” Charlie Russell Rappahannock Rotary Club May 30, 2012.

Similar presentations


Presentation on theme: "Protecting Your Information Valuables in “Cyberspace” Charlie Russell Rappahannock Rotary Club May 30, 2012."— Presentation transcript:

1 Protecting Your Information Valuables in “Cyberspace” Charlie Russell Rappahannock Rotary Club May 30, 2012

2 Today’s Headlines Cellphone Spamming can be curtailed... Stolen Laptop Exposes Boston Hospital Patient Data

3  What’s the Most Important Information you hold?  Banking Data? (account numbers)  Mortgage information? (balance)  Healthcare and medical data? (prescriptions)  Other Financial information? (401k, loans, insurance)  How to Determine Value  What information do you use each day?  What data could you least do without?  Could it be replicated from another source? What’s an Information Asset

4  People make money from other’s people’s data (Credit, healthcare, financial)  The Web is worldwide and wild – it was not designed to be secure  Some terms you should understand:  “Phishing” – form of social engineering  Emails with attachments -.exe files  “Cookies” – ‘welcome back, Mr. Jones’  “Spam” – uneeded emails  “Virus” – malware or spurious code  Criminal emails (e.g. Nigerian newsletters)  Who can you trust? (Hint: it’s you)  Social Media Use  Linked In  Facebook  Instant Messaging (Google Talk, etc.) The “CyberSpace” Problem

5  Use Personal firewalls:  Inside your provider’s environment (e.g. Verizon, Comcast, etc.)  Within your home network  Use Antivirus, antispam, anti ‘adware’ tools  Wireless protection at home and ‘on the go’  Password Protection  Use natural, easy to recall and use, but unique  Use versions (e.g. 1.3.5)  Employ some reasoning behind your selection Some Protection Methods

6  Computer runs slow, seems to take hours to load simple software or email messages  Increase in numbers of unknown messages from unfamiliar accounts  Your ‘junk’ mail file seems to fill up rapidly  Friends say they’ve received mail from your email account that you didn’t originate  A password that worked last week no longer works  Requests for account updates arrive from previously unnamed sources Problem Symptoms

7  Don’ts: - Host critical data on computers used by students or ‘gamers’ in the family - Visit unknown or unsecure websites (gambling, pornography)  Do: - Make backup copies each month of your complete data files (memory is cheap) - Store a copy of Operating System startup files (MS Windows, Vista, MS Version 7 or XP) on another media (USB or ‘flash’ drives) then lock it up - Protect your wireless: use only WPA2 encryption or better - Employ encryption for key critical files that you transfer to others (e.g. PGP or MS) Some “Cyber” Do’s & Don’ts

8 Otherwise You’ll Be Fine!


Download ppt "Protecting Your Information Valuables in “Cyberspace” Charlie Russell Rappahannock Rotary Club May 30, 2012."

Similar presentations


Ads by Google