Cyber Security Basics. Presented by Darrel Karbginsky

Similar documents
SECURITY ON PUBLIC WI-FI New Zealand. A guide to help you stay safe online while using public Wi-Fi

INTERNET SAFETY IS IMPORTANT

Cybersecurity For The Small Business & Home User ( Geared toward Windows, but relevant to Apple )

Course Outline (version 2)

How To Remove Personal Antivirus Security Pro Virus

CERTIFIED SECURE COMPUTER USER COURSE OUTLINE

Discount Kaspersky PURE 3.0 internet download software for windows 8 ]

PRACTICING SAFE COMPUTING AT HOME

Securing the SMB Cloud Generation

Web Cash Fraud Prevention Best Practices

Home Computer and Internet User Security

How To Remove Personal Antivirus Security Pro Virus Windows 8

How Cyber-Criminals Steal and Profit from your Data

AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION PROGRAM UNIT FIVE. Microsoft Windows Security.

How To Remove Personal Antivirus Security Pro Virus Manually

Staying Safe on the Internet. Mark Schulman

Kaspersky Internet Security - Top 10 Internet Security Software in With Best Antivirus, Firewall,

Seven secrets to making the most of your computer system. Chris Jeffery Proprietor/Chief Guru CyberGuru

2018 By: RemoveVirus.net. Remove A Virus From Your PC In 5 Simple Steps

Quick recap on ing Security Recap on where to find things on Belvidere website & a look at the Belvidere Facebook page

Best Practices Guide to Electronic Banking

Review Kaspersky Internet Security - multi-device 2015 online software downloader ]

Chromebooks boot in seconds, and resume instantly. When you turn on a Chromebook and sign in, you can get online fast.

Personal Cybersecurity

(electronic mail) is the exchange of computer-stored messages by telecommunication.

MUG NNAPLES MACFRIENDS USER GROUP

Quick Heal Total Security for Android. Anti-Theft Security. Web Security. Backup. Real-Time Protection. Safe Online Banking & Shopping.

Welcome. Password Management & Public Wi-Fi Security. Hosted by: Content by:

How to Build a Culture of Security

Upgrading Your Home Network Security

Welcome. ScrogginsGrear clients. to Cybersecurity Education Series. Password Management & Public Wi-Fi Security

Staying Safe Online. My Best Internet Safety Tips. and the AgeWell Computer Education Center.

Data Communication. Chapter # 5: Networking Threats. By: William Stalling

The Internet of Things. Steven M. Bellovin November 24,

Security Awareness & Best Practices Best Practices for Maintaining Data Security in Your Business Environment

Restech. User Security AVOIDING LOSS GAINING CONFIDENCE IN THE FACE OF TODAY S THREATS

ECDL / ICDL IT Security. Syllabus Version 2.0

BEST PRACTICES FOR PERSONAL Security

Guide. A small business guide to data storage and backup

Security Awareness. Presented by OSU Institute of Technology

SECURE USE OF IT Syllabus Version 2.0

XP: Backup Your Important Files for Safety

Prevx 3.0 v Product Overview - Core Functionality. April, includes overviews of. MyPrevx, Prevx 3.0 Enterprise,

Chapter 6 Network and Internet Security and Privacy

How to Backup Your Computer. Adele Berenstein Jan 17, 2018

Keeping Your PC Safe. Tips on Safe Computing from Doug Copley

NUIT Tech Talk: Spring Cleaning Remembering the Technology?

Frequently Asked Questions (FAQ)

RouterCheck Installation and Usage

Cyber Security Guidelines for Public Wi-Fi Networks

Backup everything to cloud / local storage. CloudBacko Pro. Essential steps to get started

Duplication and/or selling of the i-safe copyrighted materials, or any other form of unauthorized use of this material, is against the law.

Data Security and Privacy : Compliance to Stewardship. Jignesh Patel Solution Consultant,Oracle

5 Trends That Will Impact Your IT Planning in Layered Security. Executive Brief

HELPFUL TIPS: MOBILE DEVICE SECURITY

Selling network security. A partner guide to getting more business. // Partner Guide. Kerio Technologies

Online Security and Safety Protect Your Computer - and Yourself!

Cyber Crime Seminar. No Victim Too Small Why Small Businesses Are Low Hanging Fruit

FAQ: Privacy, Security, and Data Protection at Libraries

Simple and Powerful Security for PCI DSS

Internet of Things Toolkit for Small and Medium Businesses

Technology in Action 12/11/2014. Cybercrime and Identity Theft (cont.) Cybercrime and Identity Theft (cont.) Chapter Topics

COSC 122 Computer Fluency. Security. Dr. Ramon Lawrence University of British Columbia Okanagan

SUMMARIES OF INTERACTIVE MULTIMEDIA

PCI Compliance. What is it? Who uses it? Why is it important?

Free antivirus software download

Kaspersky Mobile Security 9. Reviewer s Guide

The Cyber War on Small Business

Introduction to the Internet. Part 1. What is the Internet?

Cyber Security Guide. For Politicians and Political Parties

Formatting, Organising and Storing Data

BASELINE GENERAL PRACTICE SECURITY CHECKLIST Guide

Adobe Security Survey

Quick Heal Mobile Security. Free protection for your Android phone against virus attacks, unwanted calls, and theft.

Keeping Important Data Safe and Secure Online. Norm Kaufman

ANATOMY OF AN ATTACK!

Keeping Your Computer Secure Quick Reference Guide

CompTIA A+ Certification ( ) Study Guide Table of Contents

Cyber Essentials Questionnaire Guidance

NUIT Tech Talk: Spring Cleaning Keep Your Computer in Great Shape

The best for everyday PC users

Accessing CharityMaster data from another location

Education Network Security

Have a Backup. Trainer Resource. This document is a reference and preparation sheet for the trainer, and a companion to the lesson plan.

Main area: Security Additional areas: Digital Access, Information Literacy, Privacy and Reputation

Level 2 Cambridge Technical in IT

How NOT To Get Hacked

ON SCHEDULE TERMS AND CONDITIONS (September 23rd 2018)

Introduction. Read on and learn some facts about backup and recovery that could protect your small business.

5 IT security hot topics How safe are you?

Internet Quick Start Guide. Get the most out of your Midco internet service with these handy instructions.

Top 6 Mac user mistakes

INTRODUCTION TO CLOUD STORAGE

Built without compromise for users who want it all

What every attorney should know about E-security Also, ESI

Cloud Security Whitepaper

Spring Cleaning: Keep Your Computer in Great Shape

Requirements for IT Infrastructure

Uninstall Mcafee Agent Cannot Be Removed

Manual Removal Norton Internet Security Won't Open Or

Transcription:

Cyber Security Basics Presented by Darrel Karbginsky

What s to come In the following slides I am going to discuss amongst other things and in no particular order things to enlighten, frighten, educate, and hopefully... inspire you to stop being apathetic about security so that you, can use the internet with greater confidence and safety. I will recommend specific technical solutions for improved protection of personal data assets. Identify security and privacy risks. Identify the best means of avoiding or mitigating threats.

Cyber Security Basics

A safety analogy If you want to reduce driving risk: Learn the rules Read / Take a course Learn how to drive safely Get qualified instruction Develop safe driving habits Take protective measures Don t drive recklessly Wear seatbelts Get a safer car Perform regular maintenance If you want to reduce Internet risk: Learn the rules Read / Take a course Learn how to use the web safely Get qualified instruction Develop safe internet use habits Take protective measures Don t surf & click recklessly, Buy a safer computer or OS Make your computer/network safe, Perform regular maintenance

Maintenance is required Regular maintenance Clean it regularly (wash & polish) Change fluids (oil, coolant, etc.) Check for wear (brakes, tires, etc.) Replace worn parts (tires, brakes, etc.) Regular maintenance Clean it regularly (clear cache, etc) Update software & virus definitions Monitor credit and financial accounts Replace outdated hardware and software

Keep Your Software Up-To-Date One of the ways that bad guys can do damage is by taking advantage of flaws in software. These flaws allow the criminals to make the software do things it normally wouldn t, and often they ll give an attacker a way into gaining control over the computer and the files on it. That s why it s so important to update the software or apps that you use as soon as the updates are available. You wouldn t let a leaky gas tank keep dripping, would you?

Software Updaters Portable Apps Portable SUMo Software Updater Installed Apps OUTDATEFighter Kaspersky Software Updater FileHippo

Keep your system clean CCleaner, is a widely popular and free tool from Piriform software, there is also Mac OS version It improves system security by clearing cookies and other potentially security compromising files from the browser cache. It also improves system performance by cleaning up temporary files left by numerous applications and by correcting errors and optimizing the registry

Now for the Bad News Unless your computer is only a few months old, your antivirus software is outdated and may not be able to detect the newest, polymorphic viruses. Your antivirus software has two distinct parts: A computer program that scans your computer for viruses. Antivirus definitions that tell that program exactly what to look for. Updating your antivirus definitions which you should do frequently is not the same thing as updating your antivirus software.

Out with the old, in with the new. Just like you need to change the oil in your car every few months, you need to change your antivirus software every 12 to 18 months. Completely uninstall the old version (like that version of Norton Antivirus 2010 you have been using since 2010.) Purchase and install the latest version of one of the top rated security suites.

Top rated antivirus software programs

Best Free Antivirus Programs

Back It Up So much of our lives are on our computers and phones now, from precious photos and videos of loved ones to crucial files and finances for work. For almost all of us, it would be devastating if suddenly we couldn t access these files, or if these files were lost completely. The easy solution here is to make sure you keep backups of your files, either via a dedicated cloud backup service on a cloud storage device (e.g. icloud or Dropbox) or on an external hard drive that you own (e.g. TimeMachine). Better yet, on a mixture of all three!

Implement a backup strategy Accounts and login credentials Family photos (digital, of course) Music library Videos (personal and commercial) Documents and Spreadsheets Email, browser bookmarks, and everything else! And, don t forget the value of your time spent trying to recover from a loss When the inevitable day comes that your hard drive crashes, your data will be gone if you haven t prepared Backup is your most important protection A 4TB drive, dedicated to backups costs less than $100

Best Backup Software & Services

Back It Up The key thing is that you backup your files somewhere off the device where those files normally live, so if something happens to that device you lose it, it breaks, or it gets infected with ransomware copies of your files are still safe and sound elsewhere. Don t keep your local backup device connected to your computer. A ransomware attack will also encrypt all connected devices. Connect Backup Disconnect

Remember The Cloud is just someone else s computer

Use encryption Data encryption allows us to protect data even when we cannot control who has access to it High security = good algorithm + strong key (longer = stronger) You can encrypt data for communication and for storage. You can encrypt an entire storage device, a folder, or a single file. Unlike simple password protection, which can be cracked, if you forget an encryption key, you cannot retrieve the data without a brute force attack.

Encrypting communication To protect your log-in credentials when using wireless networks, public networks, or public computers. Used by banking and most shopping websites, but less often by others. You should also use it for your e-mail and Social Networking, especially when you are not on a safe network. Cannot protect against keyloggers!

Encrypting stored data You can encrypt an entire storage device, a folder, or a single file. Full drive encryption is good, but has some drawbacks. MacOS comes with FileVault Windows 10 Professional comes with BitLocker You can purchase encryptable external storage devices

Encryption Tools

People and passwords Basic problems with people and passwords/encryption keys: Long passwords and keys with random characters are often too hard to remember. We don t like typing long, complex passwords or keys. We cannot remember more than a few passwords/keys, so we reuse the same ones over and over. All reasons to use a Password Manager

Password Generators

The Worst Password Ever The worst password is the one you forget.

Use Multi-factor Authentication Use multi-factor authentication when ever possible Multi-factor authentication (MFA) is a method of computer access control in which a user is granted access only after successfully presenting several separate pieces of evidence to an authentication mechanism typically at least two of the following categories: Knowledge (something they know) Possession (something they have) Inherence (something they are). Source: Wikipedia

Multi-factor Authentication

Select a browser and security add-ons Both of these browsers are: OS dependant Have add-ons with top notch security Open source Free Large user base Very large number of add-ons

Use Virtual Private Networking VPN stands for Virtual Private Network, it is a technology that creates a secure network connection over the unsecure Internet. All traffic over a VPN is encrypted to secure data integrity, privacy and prevent any unintentional interception of data. A VPN will help defend against mass surveillance by governments, corporations or hackers. It will keep your real IP address and location private and your Internet Service Provider (ISP) or public WiFi-hotspot cannot decipher your internet traffic or know which websites you have visited.

VPN Services

Lock down your home network Secure your local network, your computers, and your smartphones Start with your router: Change the log-in credentials from the default Ensure you set a strong password If you have wireless, enable encryption with a strong encryption key and turn off ID broadcasting Use an alternative DNS provider Ensure the NAT firewall is enabled Update the firmware

Perform scheduled system maintenance Daily Update anti-virus definitions Weekly Run virus scan System backup Data backup Apply software maintenance Clean system Monthly Take a copy of backups to an off-site location

Perform scheduled account and credit monitoring Daily Save charge and debit card receipts Weekly, bi-weekly, or monthly Compare debit and credit purchases to on-line records Note discrepancies and address Clean system Three times a year Obtain free copy of credit report and examine for mistakes and new accounts you did not open

Identity Theft Protection There are a number of identity theft protection services with varying cost structures. You might seriously consider signing up for one. I know from personal experience the up-front cost is well worth the services provided when you need them.

Portable Apps Portable apps might better be described as portable software. It is software that does not require installation to the computer, you run the software from a flash drive. Settings and configuration are with the software and not the PC. It leaves no (or virtually no) footprint on the computer (no registry keys or temporary files). There are apps for both Windows and a limited number for Mac OS systems. Best of all, it is open source most apps are free.

PDF of This Presentation Found At http://faculty.chemeketa.edu/dkarbgin

Fair Use Disclaimer This presentation was created following the Fair Use Guidelines for Educational Multimedia. Certain materials are included under the Fair Use exemption of the U.S. Copyright Law. Further use of these materials and this presentation falls under the following terms.