How to tell if you are being cyber stalked or hacked BCS, September 2017

Size: px
Start display at page:

Download "How to tell if you are being cyber stalked or hacked BCS, September 2017"

Transcription

1 How to tell if you are being cyber stalked or hacked BCS, September 2017 Paul Vlissidis - Technical Director, Senior Advisor paul.vlissidis@nccgroup.trust

2

3 Welcome Speaker Paul Vlissidis, Technical Director, Senior Advisor & Cyber Lead on C4 Hunted Experience Started NCC Group ethical hacking team in years of cyber security Hacked journalists, Hunted Contestants, Radio presenters Conference Speaking / Articles/ White Papers / TV / Radio 3

4

5 Stuff We Will Cover Hackers & Stalkers How Hackers/Stalkers work to hack you Case Study Signs to look for Defences

6 6

7 Hacking or Stalking? Hackers usually want money You have probably never met them They are usually opportunists Stalkers usually have other motives Probably know you (79% of stalkers are known to victims) Have different motives e.g. revenge porn They will take their time

8 People The Weakest Link? it s you they are hacking Make them your strongest defence!

9 How Hackers identify victims Trawling the Internet for dumps Phishing Malvertising Drivebys Dodgy downloads (apps & software) Vishing Spoofing a free wifi network Lost or Stolen phones/laptops

10 Data Breaches 4.7 Billion and rising fast Usernames (usually ) Password (sometimes encrypted but usually easy to crack with free tools) Password hints Sometimes home addresses Other data Over 4.75 Billion accounts are out there. On Hunted we got an almost 100% hit rate on breached accounts It cannot be deleted it s a tattoo Check all your family s s

11 How Stalkers Target Victims Open Source Intelligence Dumps trawl Social Media profile address Home address Mobile Anything that could help them access your accounts They may already know you so this is easy You may be making it too easy by having a rich digital footprint

12 Case Study co.uk/news/article /How-lifestolen-cyberstalkers-They-tookcash-job-keyshome-simplyhacking- s-And- Christmas-planningyou.html 12

13 The Phone Call Claudia : Me: Claudia : Me: Claudia: Hello. Can you hack me? Er. What? I want to do a piece in the Mail On Sunday on how much of someone s life a hacker can get access to so I want you to hack me. Can you start straight away? It s not quite that simple we need to discuss scope and authorisation. How tiresome. What do we need to do? Basically you can do what you like but don t delete anything and don t reset any passwords without checking first.

14 Open Source Intelligence Website mobile and Facebook - friends viewable but not much else Twitter very little but followers/followed correlated with Facebook friends Linkedin correlated connections Companies House home address Company and credit searches - addresses Domain names home address and alternate in RIPE All in all fairly slim pickings.. 14

15 What we did find Mac.com, me.com indicated apple mac user Confirmed iphone user using imessage So. itunes account - almost certainly icloud account - probably Iphone backups if we are lucky. Time to go phishing using NCC Group s Piranha Phishing Simulation platform 15

16 Phishing Phishing is a social engineering technique to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication. Spear phishing is like phishing, but tailored for a specific individual or organisation. Source: NCC Group Piranha Service

17 The Sting (spear phish) [09/Apr/2013:17:48: ] "GET /?RTWPH-P9HY8-MT6B8-R9XE6-JFHB2 HTTP/1.1" "-" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_7_5) AppleWebKit/ (KHTML, like Gecko) Version/6.0.3 Safari/ " 17

18 still the key to everything Trawled s containing the word password or welcome 66 s containing the word password and 85 s saying: Welcome. Backup of password vault was attached to an Cracked using slight variation of icloud password 18

19 Identity Theft 19

20 Challenge 1 Who am I staying with? US Embassy? /Facebook searches 20

21 Challenge 2 keys to my house Searched contacts for same street Search s/facebook for correspondence Narrowed down to 2. Guessed nearest Mobile account SMS -> neighbour Hi Pandora, I forgot that I had arranged to have someone checkout my central heating. He is due around 3pm and his name is Paul. Can you let him in? 21

22 Money transfer account number was needed for verification but this was stored in Contacts in icloud 22

23 Hiding the evidence 23

24 Phone restore icloud backup restored to a blank phone Access apps Access photo stream Spoof text to boss : I resign Geo tagged photos identified location in real-time 24

25 What have we learned? Being hacked isn t all about credit cards and money is more important than we think and deserves the best security we can muster Once they are in a cyber stalker can access some very personal aspects of your life I don t know Mr Vlissidis, but he knows just about all there is to know about me, from the financial to the personal. He has access to everything that I have stored on my computer. Every element of my life has been exposed. Claudia Joseph

26 Signs When Something Isn t Right s get marked as read or disappear Friends report getting odd messages from you on social media Your computer takes longer than usual to start up, restarts on its own or doesn't start up at all. The homepage set on your web browser has changed or web pages are slow to load. Make sure your security software is up to date and run it to check for infection. Check your security settings on , social media Check your login history and your google search history for anything that looks odd See If in doubt, seek technical help!

27 10 Steps To Protect Yourself Do Lock your computer/phone/tablet when you leave it and set a PIN Do Regularly apply latest software/app updates to everything (+IoT). Do Use an anti-virus tool and keep it up to date. Do Use 2-factor authentication for your main and cloud services Do Back up your important files/photos/data - safely and daily Don t install software/apps unless you are very sure it is genuine Don t store passwords/pins in your contacts Don t share passwords between sites - Use a password manager Don t save card details on websites Do treat public Wi-Fi with suspicion use a VPN

28 NCC Group Services in this area Threat Detection Open Source Threat Intelligence against your company, executives, key staff Dark Web searches Domain Threat Intelligence to identify phishing sites Posture Improvement - Phishing Simulation (Piranha) both managed and self-service Managed Detection & Response FSB Cyber Helpline

29 @vlissidis

My Life as a Cyber Stalker MU, February 2017

My Life as a Cyber Stalker MU, February 2017 My Life as a Cyber Stalker MU, February 2017 Paul Vlissidis - Technical Director, Senior Advisor paul.vlissidis@nccgroup.trust About NCC Group 850 million FTSE listed company Cyber Security Assurance 35

More information

How to Build a Culture of Security

How to Build a Culture of Security How to Build a Culture of Security March 2016 Table of Contents You are the target... 3 Social Engineering & Phishing and Spear-Phishing... 4 Browsing the Internet & Social Networking... 5 Bringing Your

More information

Course Outline (version 2)

Course Outline (version 2) Course Outline (version 2) Page. 1 CERTIFIED SECURE COMPUTER USER This course is aimed at end users in order to educate them about the main threats to their data s security. It also equips the students

More information

Password & Tutorials Packet

Password & Tutorials Packet & Tutorials Packet Print, staple, and use this & Tutorials Packet Sign up for Secure Backup Service: visit rowleyservices.com for a free trial & setup info Follow attached: Check iphone Camera Settings

More information

CERTIFIED SECURE COMPUTER USER COURSE OUTLINE

CERTIFIED SECURE COMPUTER USER COURSE OUTLINE CERTIFIED SECURE COMPUTER USER COURSE OUTLINE Page 1 TABLE OF CONTENT 1 COURSE DESCRIPTION... 3 2 MODULE-1: INTRODUCTION TO DATA SECURITY... 4 3 MODULE-2: SECURING OPERATING SYSTEMS... 6 4 MODULE-3: MALWARE

More information

FAQ: Privacy, Security, and Data Protection at Libraries

FAQ: Privacy, Security, and Data Protection at Libraries FAQ: Privacy, Security, and Data Protection at Libraries This FAQ was developed out of workshops and meetings connected to the Digital Privacy and Data Literacy Project (DPDL) and Brooklyn Public Library

More information

Cyber Security Guide. For Politicians and Political Parties

Cyber Security Guide. For Politicians and Political Parties Cyber Security Guide For Politicians and Political Parties Indian Election Integrity Initiative Design by ccm.design Cover Image by Paul Dufour Helping to Safeguard the Integrity of the Electoral Process

More information

Instructions Hack Ipod Touch Password Without Losing Data

Instructions Hack Ipod Touch Password Without Losing Data Instructions Hack Ipod Touch Password Without Losing Data Apple has just released ios 8.4 for iphone, ipad and ipod touch, along with Apple with normal data, secure information like passwords etc. are

More information

Handbook: Carbonite Safe

Handbook: Carbonite Safe 1 Important Things to Know... 4 Carbonite Features... 5 Setting Up and Installing... 6 Starting a Trial... 7 Installing Carbonite for the First Time... 7 Buying a Subscription... 8 Subscription Pricing...

More information

Multi-Factor Authentication (MFA)

Multi-Factor Authentication (MFA) 10.10.18 1 Multi-Factor Authentication (MFA) What is it? Why should I use it? CYBERSECURITY Tech Fair 2018 10.10.18 2 Recent Password Hacks PlayStation Network (2011) 77 Million accounts hacked Adobe (2013)

More information

Assistance with University Projects? Research Reports? Writing Skills? We ve got you covered! www.assignmentstudio.net WhatsApp: +61-424-295050 Toll Free: 1-800-794-425 Email: contact@assignmentstudio.net

More information

SOCIAL NETWORKING'S EFFECT ON BUSINESS SECURITY CONTROLS

SOCIAL NETWORKING'S EFFECT ON BUSINESS SECURITY CONTROLS SOCIAL NETWORKING'S EFFECT ON BUSINESS SECURITY CONTROLS Jon Hanny Director of Information Security and Assurance, Buckley Sandler LLP Gaurav Chikara Senior Security Engineer, Cooley LLP AGENDA Social

More information

Welcome. Password Management & Public Wi-Fi Security. Hosted by: Content by:

Welcome. Password Management & Public Wi-Fi Security. Hosted by: Content by: Welcome Password Management & Public Wi-Fi Security Hosted by: Content by: Presenter: Ray Cool, CEO PBSI Technology Solutions Webinar will begin at 1:00 Welcome Foster & Motley Clients to Security Education

More information

ANDROID PRIVACY & SECURITY GUIDE ANDROID DEVICE SETTINGS

ANDROID PRIVACY & SECURITY GUIDE ANDROID DEVICE SETTINGS ANDROID PRIVACY & SECURITY GUIDE WESNET The Women s Services Network Smartphones store a lot of personal information, including email or social media accounts, reminders and notes, the number of steps

More information

Newcomer Finances Toolkit. Fraud. Worksheets

Newcomer Finances Toolkit. Fraud. Worksheets Newcomer Finances Toolkit Fraud Worksheets Ottawa Community Loan Fund Fonds d emprunt Communautaire d Ottawa 22 O Meara St., Causeway Work Centre, Ottawa, ON K1Y 4N6 Tel: 613-594-3535 Fax: 613-594-8118

More information

Windows 10 Setup Guide

Windows 10 Setup Guide Use the following guide before installing SnapBack or ANY programs SnapBack will guide you through the process of configuring Windows 10 for the first time. Some of these settings can't easily be changed,

More information

Welcome. ScrogginsGrear clients. to Cybersecurity Education Series. Password Management & Public Wi-Fi Security

Welcome. ScrogginsGrear clients. to Cybersecurity Education Series. Password Management & Public Wi-Fi Security Welcome ScrogginsGrear clients to Cybersecurity Education Series Password Management & Public Wi-Fi Security Presenter: Ray Cool, CEO PBSI Technology Solutions Webinar will begin at 1:00 Welcome ScrogginsGrear

More information

It is my great pleasure to inform that you have won the latest model of Ferrari Car and 4 Bed Room Villa in Palm Jumeirah for attending this Seminar

It is my great pleasure to inform that you have won the latest model of Ferrari Car and 4 Bed Room Villa in Palm Jumeirah for attending this Seminar You Won!!! It is my great pleasure to inform that you have won the latest model of Ferrari Car and 4 Bed Room Villa in Palm Jumeirah for attending this Seminar To Process and deliver your Car and Villa

More information

Manual Reset Button On Iphone 4 Without Itunes Or Passcode

Manual Reset Button On Iphone 4 Without Itunes Or Passcode Manual Reset Button On Iphone 4 Without Itunes Or Passcode i'm trying to factory reset an iphone 4s using itunes but i keep getting an error after a few minutes saying"iphone cannot reset because it has

More information

BEST PRACTICES FOR PERSONAL Security

BEST PRACTICES FOR PERSONAL  Security BEST PRACTICES FOR PERSONAL Email Security Sometimes it feels that the world of email and internet communication is fraught with dangers: malware, viruses, cyber attacks and so on. There are some simple

More information

Security Awareness & Best Practices Best Practices for Maintaining Data Security in Your Business Environment

Security Awareness & Best Practices Best Practices for Maintaining Data Security in Your Business Environment Security Awareness & Best Practices Best Practices for Maintaining Data Security in Your Business Environment Ray Colado, Information Security Analyst Raise awareness around information security to help

More information

Safety and Security. April 2015

Safety and Security. April 2015 Safety and Security April 2015 Protecting your smartphone and your data 2 Set a passcode on your smartphone For some smartphone models: 1. Go to Settings. 2. Tap ID & Passcode. 3. Set a 4-digit passcode.

More information

Eanes ios5 Upgrade Guide

Eanes ios5 Upgrade Guide Eanes ios5 Upgrade Guide These instructions are intended for people to follow on their home machine. District machines have deep freeze and older versions of itunes which could complicate the process.

More information

ipad Getting Started Guide

ipad Getting Started Guide ipad Getting Started Guide Part I - ipad Setup and Configuration For Part I You will begin to setup and configure your ipad. Please make sure you have wireless Internet access to complete this section.

More information

One of the fundamental kinds of websites that SharePoint 2010 allows

One of the fundamental kinds of websites that SharePoint 2010 allows Chapter 1 Getting to Know Your Team Site In This Chapter Requesting a new team site and opening it in the browser Participating in a team site Changing your team site s home page One of the fundamental

More information

If your Mac keeps asking for the login keychain password

If your Mac keeps asking for the login keychain password If your Mac keeps asking for the login keychain password The password of your macos user account might not match the password of your login keychain. Either create a new login keychain or update it with

More information

How to Stay Safe on Public Wi-Fi Networks

How to Stay Safe on Public Wi-Fi Networks How to Stay Safe on Public Wi-Fi Networks Starbucks is now offering free Wi-Fi to all customers at every location. Whether you re clicking connect on Starbucks Wi-Fi or some other unsecured, public Wi-Fi

More information

Personal Internet Security Basics. Dan Ficker Twin Cities DrupalCamp 2018

Personal Internet Security Basics. Dan Ficker Twin Cities DrupalCamp 2018 Personal Internet Security Basics Dan Ficker Twin Cities DrupalCamp 2018 Overview Security is an aspiration, not a state. Encryption is your friend. Passwords are very important. Make a back-up plan. About

More information

Cyber Hygiene Guide. Politicians and Political Parties

Cyber Hygiene Guide. Politicians and Political Parties Cyber Hygiene Guide Politicians and Political Parties Canadian Election Integrity Initiative Design by ccm.design Cover Image by Songquan Deng Helping to Safeguard the Integrity of the Electoral Process

More information

COMMON WAYS IDENTITY THEFT CAN HAPPEN:

COMMON WAYS IDENTITY THEFT CAN HAPPEN: COMMON WAYS IDENTITY THEFT CAN HAPPEN: OLD FASHIONED STEALING / DUMPSTER DIVING Thieves typically steal wallets and purses. They also steal mail such as credit card and bank statements, pre-approved credit

More information

Cyber Security Basics. Presented by Darrel Karbginsky

Cyber Security Basics. Presented by Darrel Karbginsky Cyber Security Basics Presented by Darrel Karbginsky What s to come In the following slides I am going to discuss amongst other things and in no particular order things to enlighten, frighten, educate,

More information

Password & Tutorials Packet

Password & Tutorials Packet & Tutorials Packet Print, staple, and use this & Tutorials Packet Sign up for Secure Backup Service: visit rowleyservices.com for a free trial & setup info Follow attached: Check iphone Camera Settings

More information

COMPUTING FUNDAMENTALS I

COMPUTING FUNDAMENTALS I FALL 2017 / COMPUTER SCIENCE 105 COMPUTING FUNDAMENTALS I DAY 2 27 SEPTEMBER 2017 COURSE ADMIN COURSE ADMIN NOTECARDS - ATTENDANCE & FEEDBACK Name Student ID One of: What did you learn or find most interesting?

More information

Security of End User based Cloud Services Sang Young

Security of End User based Cloud Services Sang Young Security of End User based Cloud Services Sang Young Chairman, Mobile SIG Professional Information Security Association sang.young@pisa.org.hk Cloud Services you can choose Social Media Business Applications

More information

Syncios Data Recovery User Guide

Syncios Data Recovery User Guide Syncios Data Recovery User Guide Overview Tutorials Introduction Recover from ios device Key Features Recover from itunes backup System Requirements Recover from icloud backup Purchase & Registration FAQ

More information

Multi-Factor Authentication FAQs

Multi-Factor Authentication FAQs General FAQs What is Multi-factor Authentication (MFA)? Multi-factor authentication (MFA) seeks to decrease the likelihood that others can access your data. Specifically, it enhances the security of your

More information

"Stay Smart, Keep Cyber Scam Away" Seminar Build a Secure Cyberspace 2018

Stay Smart, Keep Cyber Scam Away Seminar Build a Secure Cyberspace 2018 "Stay Smart, Keep Cyber Scam Away" Seminar Build a Secure Cyberspace 2018 2018-05-25 16:00 16:30 Lecture Theatre, Hong Kong Central Library Frankie Leung Program Director, PISA (2015-2018) Email: frankie.leung@pisa.org.hk

More information

Instructions I Lost My Iphone 4 Password Yahoo

Instructions I Lost My Iphone 4 Password Yahoo Instructions I Lost My Iphone 4 Password Yahoo Linux software Android Apps Blackberry Apps iphone Apps Windows Phone Apps Report Niash- Mar 4, 2014 02:48PM I have faced a problem. i forgot my yahoo id

More information

6 TIPS FOR IMPROVING YOUR WEB PRESENCE

6 TIPS FOR IMPROVING YOUR WEB PRESENCE 6 TIPS FOR IMPROVING YOUR WEB PRESENCE 6 TIPS FOR IMPROVING YOUR WEB PRESENCE We all want to get noticed on the web. If you are running a business you want to be on the first page in Google via organic

More information

Syncios Data Recovery User Guide

Syncios Data Recovery User Guide Syncios Data Recovery User Guide Overview Tutorials Introduction Key Features System Requirements Recover from ios device Recover from itunes backup Recover from icloud backup Purchase & Registration FAQ

More information

Security Awareness. Presented by OSU Institute of Technology

Security Awareness. Presented by OSU Institute of Technology Security Awareness Presented by OSU Institute of Technology Information Technologies Division Security Awareness Topics Social Engineering Phishing Social Networks Displaying Sensitive Information Wireless

More information

Ios 7 Manual Restore From Icloud Slow >>>CLICK HERE<<<

Ios 7 Manual Restore From Icloud Slow >>>CLICK HERE<<< Ios 7 Manual Restore From Icloud Slow Learn how to stop an icloud Restore that is stuck in progress in less than a minute. the content, maybe up to a day on a slow connection and an almost full iphone,

More information

DATA DISASTER AVERTED! HOW TO BACK UP YOUR ANDROID SMARTPHONE

DATA DISASTER AVERTED! HOW TO BACK UP YOUR ANDROID SMARTPHONE DATA DISASTER AVERTED! HOW TO BACK UP YOUR ANDROID SMARTPHONE Planning ahead is the easiest way to make sure your data isn t lost to the ether, even if your phone is destroyed. Luckily, Google automatically

More information

Definitions Know What I Mean?

Definitions Know What I Mean? Definitions Know What I Mean? The list below contains words you will read about in this resource and that your children probably use regularly as they are a normal part of their school world (if not their

More information

Main area: Security Additional areas: Digital Access, Information Literacy, Privacy and Reputation

Main area: Security Additional areas: Digital Access, Information Literacy, Privacy and Reputation Public Wi Fi Created: March 2016 Last Updated: July 2018 Estimated time: Group or individual activity: Ages: 60 minutes [10 minutes] Activity #1 [15 minutes] Activity #2 [10 minutes] Activity #3 [10 minutes]

More information

Contents. 3 Procedures. 3 ipad given to a new user. 3 Syncing. 3 Requesting a New App. 4 ipad Setup. 7 Apple ID Creation. 9 Setup Account

Contents. 3 Procedures. 3 ipad given to a new user. 3 Syncing. 3 Requesting a New App. 4 ipad Setup. 7 Apple ID Creation. 9 Setup  Account By: Kevin Lay Contents 3 Procedures 3 ipad given to a new user 3 Syncing 3 Requesting a New App 4 ipad Setup 7 Apple ID Creation 9 Setup Email Account 10 icloud 10 icloud Overview 11 icloud Setup and Backup

More information

Security and Privacy. Xin Liu Computer Science University of California, Davis. Introduction 1-1

Security and Privacy. Xin Liu Computer Science University of California, Davis. Introduction 1-1 Security and Privacy Xin Liu Computer Science University of California, Davis Introduction 1-1 What is network security? Confidentiality: only sender, intended receiver should understand message contents

More information

Setting up a new ipad

Setting up a new ipad Setting up a new ipad This is a very brief guide to setting up an ipad for the first time. This is not the only way of setting up an ipad and there are many variables at play. If you have trouble at any

More information

How To Sync Apple Iphone Contacts To Gmail Without Itunes >>>CLICK HERE<<<

How To Sync Apple Iphone Contacts To Gmail Without Itunes >>>CLICK HERE<<< How To Sync Apple Iphone Contacts To Gmail Without Itunes Open itunes to buy and download apps. This is the #1 app for syncing Gmail contacts with the iphone/ipad/ipod both in terms of reviews & sales.

More information

Restech. User Security AVOIDING LOSS GAINING CONFIDENCE IN THE FACE OF TODAY S THREATS

Restech. User Security AVOIDING LOSS GAINING CONFIDENCE IN THE FACE OF TODAY S THREATS Restech User Security AVOIDING LOSS GAINING CONFIDENCE IN THE FACE OF TODAY S THREATS Your presenter: Vince Gremillion, CISSP 30+ years technical and customer service experience Founder/Co-Owner RESTECH

More information

DER GOBBLE. Good Secure Crypto Wallet Practices. What is your wallet?

DER GOBBLE. Good Secure Crypto Wallet Practices. What is your wallet? DER GOBBLE Good Secure Crypto Wallet Practices When it comes to crypto currencies and securing your money, the absolute best 99% guaranteed security for your wallets is YOU. You are the one that will expose

More information

Keep Track of Your Passwords Easily

Keep Track of Your Passwords Easily Keep Track of Your Passwords Easily K 100 / 1 The Useful Free Program that Means You ll Never Forget a Password Again These days, everything you do seems to involve a username, a password or a reference

More information

Cyber security tips and self-assessment for business

Cyber security tips and self-assessment for business Cyber security tips and self-assessment for business Last year one in five New Zealand SMEs experienced a cyber-attack, so it s essential to be prepared. Our friends at Deloitte have put together this

More information

Who We Are! Natalie Timpone

Who We Are! Natalie Timpone Who We Are! Natalie Timpone Manager of Security Business Management Office Enterprise Security Awareness Manager Carmelo Walsh Security, Risk, and Compliance Security Awareness Subject Matter Expert Who

More information

Best Practices Guide to Electronic Banking

Best Practices Guide to Electronic Banking Best Practices Guide to Electronic Banking City Bank & Trust Company offers a variety of services to our customers. As these services have evolved over time, a much higher percentage of customers have

More information

Securing today s identity and transaction systems:! What you need to know! about two-factor authentication!

Securing today s identity and transaction systems:! What you need to know! about two-factor authentication! Securing today s identity and transaction systems:! What you need to know! about two-factor authentication! 1 Today s Speakers! Alex Doll! CEO OneID Jim Fenton! Chief Security Officer OneID 2 Contents!

More information

I VE BEEN INFECTED! Ellen Freedman, CLM 2016 Freedman Consulting, Inc.

I VE BEEN INFECTED! Ellen Freedman, CLM 2016 Freedman Consulting, Inc. ! Ellen Freedman, CLM 2016 Two recent articles in ABA Journal entitled Lawyer resigns himself to paying ransom for release of computer files and Ransomware software attacks stymie law firms made their

More information

Mobile App User Guide

Mobile App User Guide Download the Mobile App iphone and ipad To find our Freedom Credit Union Mobile App just scan the appropriate QR code to the right with your Apple device: iphone Download Or you can find it through the

More information

Your . A setup guide. Last updated March 7, Kingsford Avenue, Glasgow G44 3EU

Your  . A setup guide. Last updated March 7, Kingsford Avenue, Glasgow G44 3EU fuzzylime WE KNOW DESIGN WEB DESIGN AND CONTENT MANAGEMENT 19 Kingsford Avenue, Glasgow G44 3EU 0141 416 1040 hello@fuzzylime.co.uk www.fuzzylime.co.uk Your email A setup guide Last updated March 7, 2017

More information

Guidelines for Using the Hello Brain Health App

Guidelines for Using the Hello Brain Health App Guidelines for Using the Hello Brain Health App 1 Welcome! These guidelines have been designed to show you how to use the Hello Brain Health app. We will bring you through all of the processes involved

More information

Apple Device Management

Apple Device Management A COMPREHENSIVE GUIDE Apple Device Management FOR SMALL AND MEDIUM BUSINESSES With a renewed focus on mobile devices in the work environment, Apple has become the device of choice in small and medium businesses.

More information

How To Change My Wordpress Database

How To Change My Wordpress Database How To Change My Wordpress Database Password On Instagram Account Built by one of the world's largest Instagram browsers INK361, this comprehensive widget that can showcase your Instagram account in the

More information

Personal Cybersecurity

Personal Cybersecurity Personal Cybersecurity The Basic Principles Jeremiah School, CEO How big is the issue? 9 8 7 6 5 4 3 2 1 Estimated global damages in 2018 0 2016 2018 2020 2022 2024 2026 2028 2030 Internet Users Billions

More information

Configuring Mobile Devices at Micah

Configuring Mobile Devices at Micah Configuring Mobile Devices at Micah Contents I. Introduction... 2 II. Scenarios... 3 A. New Device New Service Line... 4 B. New Device, same team member, existing Service Line... 5 C. Same device, same

More information

How To Factory Reset Iphone 4 When Locked Out Without A Computer

How To Factory Reset Iphone 4 When Locked Out Without A Computer How To Factory Reset Iphone 4 When Locked Out Without A Computer Learn what to do if you have forgotten your ios device passcode, or if your device displays a If you enter the wrong passcode into an ios

More information

Password & Tutorials Packet

Password & Tutorials Packet & Tutorials Packet Print, staple, and use this & Tutorials Packet Sign up for Secure Backup Service: visit rowleyservices.com for a free trial & setup info Follow attached: iphone users that use a Windows

More information

Hello. Quick Start Guide

Hello. Quick Start Guide Hello. Quick Start Guide Welcome to your new MacBook Pro. Let us show you around. This guide shows you what s on your Mac, helps you set it up, and gets you up and running with tips for the apps you ll

More information

Duo Travel Guide. duo.com

Duo Travel Guide. duo.com Duo Travel Guide duo.com Overview As a member of an organization protected by Duo, you already have secure access to applications and assets. This guide is designed to help you maintain that trusted access

More information

Facetime Manual Iphone 4s Without Wifi >>>CLICK HERE<<<

Facetime Manual Iphone 4s Without Wifi >>>CLICK HERE<<< Facetime Manual Iphone 4s Without Wifi Jailbreak Instructions on how to enable FaceTime on iphone 4s sold in the Middle East or other Very fast service and cheap, now i can update to any version without

More information

2 User Guide. Contents

2  User Guide. Contents E-mail User Guide 2 E-mail User Guide Contents Logging in to your web mail... 3 Changing your password... 5 Editing your signature... 6 Adding an e-mail account to Outlook 2010/2013/2016... 7 Adding an

More information

Keeping Your PC Safe. Tips on Safe Computing from Doug Copley

Keeping Your PC Safe. Tips on Safe Computing from Doug Copley Keeping Your PC Safe Tips on Safe Computing from Doug Copley Don t be an Administrator Administrator is an account that can do ANYTHING on the PC Most computers start with 1 account with administrator

More information

If you sync with your home machine, you may update there. The best solution is for you to update to ios5 with the computer you sync the device with.

If you sync with your home machine, you may update there. The best solution is for you to update to ios5 with the computer you sync the device with. ios5.1.0 UPDATE INSTRUCTIONS BELTON ISD These instructions are made for Belton ISD teachers and staff to update ipads and computers to ios5. If you sync with your home machine, you may update there. The

More information

You will still be required to do the assignments in class as if you had an ipad.

You will still be required to do the assignments in class as if you had an ipad. NCA ipad FAQ Introduction Our 1:1 ipad program is a natural extension of our mission to enrich the academic experience of students. The following are common questions and answers concerning ipads, followed

More information

A practical guide to IT security

A practical guide to IT security Data protection A practical guide to IT security Ideal for the small business The Data Protection Act states that appropriate technical and organisational measures shall be taken against unauthorised or

More information

PROTECTING YOUR BUSINESS ASSETS

PROTECTING YOUR BUSINESS ASSETS PROTECTING YOUR BUSINESS ASSETS How to Spot Danger Before Your Computer Gets Infected, Your Site Hosts Malware, and Your Credit Card Number Gets Stolen A MyNAMS Presentation by Regina Smola @2012 Regina

More information

Guide to credit card security

Guide to credit card security Contents Click on a title below to jump straight to that section. What is credit card fraud? Types of credit card fraud Current scams Keeping your card and card details safe Banking and shopping securely

More information

Handbook: Carbonite Safe

Handbook: Carbonite Safe 1 Welcome to Carbonite! Important Things to Know...4 Carbonite Features...5 Setting Up and Installing...6 Starting a Trial... 7 Installing Carbonite for the First Time... 7 Buying a Subscription...9 Subscription

More information

Manually Create Phishing Page For Facebook 2014

Manually Create Phishing Page For Facebook 2014 Manually Create Phishing Page For Facebook 2014 While you are creating phishing page manually you have to do a lot of work Web Templates -- For importing premade template for Gmail, Facebook from SET.

More information

COMPREHENSIVE LIST OF CASHLESS FAQs (GUESTS)

COMPREHENSIVE LIST OF CASHLESS FAQs (GUESTS) COMPREHENSIVE LIST OF CASHLESS FAQs (GUESTS) Credit Q. How do I top up my credit? You must create an account online and link your wristband to that account. You can also purchase your credit at the event

More information

Manual Sync Contacts On My Iphone To Gmail Account Without Itunes

Manual Sync Contacts On My Iphone To Gmail Account Without Itunes Manual Sync Contacts On My Iphone To Gmail Account Without Itunes You can keep contacts from your Google account up to date on your ios device. Apple Store Mac iphone Watch ipad ipod itunes Support not

More information

GUIDE TO KEEPING YOUR SOCIAL MEDIA ACCOUNTS SECURE

GUIDE TO KEEPING YOUR SOCIAL MEDIA ACCOUNTS SECURE GUIDE TO KEEPING YOUR SOCIAL MEDIA ACCOUNTS SECURE TABLE OF CONTENTS PROTECTIVE MEASURES... 2 PREPARATION CHECKLIST... 2 IF YOU SUSPECT YOUR ACCOUNT IS COMPROMISED, THE FOLLOWING ACTIONS ARE ADVISED:...

More information

Guide Install Ios 7 On Iphone 4s Without Itunes >>>CLICK HERE<<<

Guide Install Ios 7 On Iphone 4s Without Itunes >>>CLICK HERE<<< Guide Install Ios 7 On Iphone 4s Without Itunes Learn how to update your ios device wirelessly or using itunes. updates introduce new features that let you do even more with your iphone, ipad, or ipod

More information

Dammit Jim, I m a Mac Admin, not a Web Developer

Dammit Jim, I m a Mac Admin, not a Web Developer Dammit Jim, I m a Mac Admin, not a Web Developer WordPress Basics for Mac Admins PSU Mac Admins Conference July 11, 2018 Tiffany Bridge Baxbridge Digital 1 WordPress Bridge Wi-Fi Bridge Who am I? The Best

More information

Hello. Quick Start Guide

Hello. Quick Start Guide Hello. Quick Start Guide Welcome to your new MacBook Pro. Let us show you around. This guide shows you what s on your Mac, helps you set it up, and gets you up and running with tips for the apps you ll

More information

Factory Reset Locked Iphone 4 Without Computer

Factory Reset Locked Iphone 4 Without Computer Factory Reset Locked Iphone 4 Without Computer Factory reset iphone should be a hard decision, because all of things on iphone will be lost. of the easiest methods to restore iphone to factory settings

More information

CLIENT ONBOARDING PLAN & SCRIPT

CLIENT ONBOARDING PLAN & SCRIPT CLIENT ONBOARDING PLAN & SCRIPT FIRST STEPS Receive Order form from Sales Representative. This may come in the form of a BPQ from client Ensure the client has an account in Reputation Management and in

More information

I DO NOT OWN ITUNES OR ANYTHING IN THE THUMBNAIL THIS IS ALL OWNED BY APPLE.

I DO NOT OWN ITUNES OR ANYTHING IN THE THUMBNAIL THIS IS ALL OWNED BY APPLE. How Can I Add Music To My Ipod Without Deleting Everything Learn how to manually manage music and movies if you want to quickly sync a Choose the content that you want to add to your device from your itunes

More information

Managing Devices and Corporate Data on ios

Managing Devices and Corporate Data on ios Managing Devices and Corporate Data on ios Overview Businesses everywhere are empowering their employees with iphone and ipad. Contents Overview Management Basics Separating Work and Personal Data Flexible

More information

How To Reset Locked Ipod Touch To Factory Settings Without Computer

How To Reset Locked Ipod Touch To Factory Settings Without Computer How To Reset Locked Ipod Touch To Factory Settings Without Computer Most settings, The date and time unless your ipod lost power and reset when Don't reset your ipod if you plugged it into your computer

More information

CLIENT ONBOARDING PLAN & SCRIPT

CLIENT ONBOARDING PLAN & SCRIPT CLIENT ONBOARDING PLAN & SCRIPT FIRST STEPS Receive Order form from Sales Representative. This may come in the form of a BPQ from client Ensure the client has an account in Reputation Management and in

More information

Any conversation about virtualization for small- and medium-sized businesses (SMBs) usually starts around

Any conversation about virtualization for small- and medium-sized businesses (SMBs) usually starts around E-NEWS www.e-safetech.om 1-412-944-2402 2018 E-Safe Technologies All rights reserved. September 2018 In this issue Choose from 5 Virtualization Options 5 Cyber Security Measures Barracuda and E-Safe Top

More information

Topic Course Activities

Topic Course Activities The Absolute Basics What is a computer? 1. What is a computer? 2. What is a screen? 3. What is a keyboard? 4. What is a mouse? What is a laptop? 1. What is a laptop? 2. Using the touchpad 3. How to charge

More information

Mike Howard IT Works Computer Solutions 10/17/2017

Mike Howard IT Works Computer Solutions 10/17/2017 Mike Howard IT Works Computer Solutions 10/17/2017 About Me - IT Consultant since 2004, specializing in Macs in Small-Medium Business - Work closely with the Apple as member of Apple Consultants Network

More information

Financial scams. What to look for and how to avoid them.

Financial scams. What to look for and how to avoid them. Financial scams What to look for and how to avoid them. Keep your money secure We take the security and wellbeing of our customers very seriously. So we ve created this guide to highlight the most common

More information

Keeping Important Data Safe and Secure Online. Norm Kaufman

Keeping Important Data Safe and Secure Online. Norm Kaufman Keeping Important Data Safe and Secure Online Norm Kaufman Examples of Important Data Passwords and Secret Answers Personal Documents (Licenses, Passports, Insurance Cards, Credit Cards) Social Security

More information

Sync Manually Greyed Out Iphone Options >>>CLICK HERE<<<

Sync Manually Greyed Out Iphone Options >>>CLICK HERE<<< Sync Manually Greyed Out Iphone Options How to fix: Grayed Out Songs on the iphone, ipod and itunes you try to sync music to iphone, deleted or missed songs displays as grayed out songs. On your ios device

More information

HSBC INTRODUCES A SOCIAL P2P PAYMENT APP TO HONG KONG Easy to use and available to everyone

HSBC INTRODUCES A SOCIAL P2P PAYMENT APP TO HONG KONG Easy to use and available to everyone News Release 7 February 2017 HSBC INTRODUCES A SOCIAL P2P PAYMENT APP TO HONG KONG Easy to use and available to everyone HSBC today announced PayMe, a simple and secure social payment app that allows HSBC

More information

PRACTICING SAFE COMPUTING AT HOME

PRACTICING SAFE COMPUTING AT HOME PRACTICING SAFE COMPUTING AT HOME WILLIAM (THE GONZ) FLINN M.S. INFORMATION SYSTEMS SECURITY MANAGEMENT; COMPTIA SECURITY+, I-NET+, NETWORK+; CERTIFIED PATCHLINK ENGINEER ENTERPRISE INFORMATION SYSTEMS

More information

Security Automation Best Practices

Security Automation Best Practices WHITEPAPER Security Automation Best Practices A guide to making your security team successful with automation TABLE OF CONTENTS Introduction 3 What Is Security Automation? 3 Security Automation: A Tough

More information

/ 1. Online Banking User Guide SouthStateBank.com / (800)

/ 1. Online Banking User Guide SouthStateBank.com / (800) / 1 Online Banking User Guide SouthStateBank.com / (800) 277-2175 06132017 Welcome Thank you for using South State s Online Banking. Whether you are a first time user or an existing user, this guide will

More information