INTERNET SAFETY IS IMPORTANT

Similar documents
BEST PRACTICES FOR PERSONAL Security

Review Kaspersky Internet Security - multi-device 2015 online software downloader ]

INTERNET SAFETY* GALEN GARRETSON RASCAL MARCH 2-3, * Sources include learnfree.org, PC World, wikpedia.com, techterms.com

Quick recap on ing Security Recap on where to find things on Belvidere website & a look at the Belvidere Facebook page

Online Security and Safety Protect Your Computer - and Yourself!

Security Awareness. Presented by OSU Institute of Technology

Online Scams. Ready to get started? Click on the green button to continue.

User s Guide. SingNet Desktop Security Copyright 2010 F-Secure Corporation. All rights reserved.

ANDROID PRIVACY & SECURITY GUIDE ANDROID DEVICE SETTINGS

Duplication and/or selling of the i-safe copyrighted materials, or any other form of unauthorized use of this material, is against the law.

ELECTRONIC BANKING & ONLINE AUTHENTICATION

Chapter 6 Network and Internet Security and Privacy

Cyber Security Basics. Presented by Darrel Karbginsky

3.5 SECURITY. How can you reduce the risk of getting a virus?

Cyber Security Guide for NHSmail

Introduction to

Safety and Security. April 2015

(electronic mail) is the exchange of computer-stored messages by telecommunication.

Staying Safe on the Internet. Mark Schulman

Security and Privacy. Xin Liu Computer Science University of California, Davis. Introduction 1-1

Chapter 12. Information Security Management

PRACTICING SAFE COMPUTING AT HOME

FAQ: Privacy, Security, and Data Protection at Libraries

SUMMARIES OF INTERACTIVE MULTIMEDIA

CS 120 Digital Literacy, Chapter 5: p

FACEBOOK SAFETY FOR JOURNALISTS. Thanks to these partners for reviewing these safety guidelines:

Introduction. Logging in. WebMail User Guide

Contents. Introduction 5. McAfee SecurityCenter 7. McAfee QuickClean 39. McAfee Shredder 45

PROTECTING YOUR BUSINESS ASSETS

Keeping Your PC Safe. Tips on Safe Computing from Doug Copley

Security and Privacy

Course Outline (version 2)

Cyber Security Practice Questions. Varying Difficulty

Elementary Computing CSC 100. M. Cheng, Computer Science

Identity Theft, Fraud & You. PrePare. Protect. Prevent.

E-companion. Quiz for IT-knowledge

COMMON WAYS IDENTITY THEFT CAN HAPPEN:

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 3 Protecting Systems

INTERNET BASICS. GETTING STARTED PAGE 02 Prerequisites What You Will Learn

Quick Heal Total Security Multi-Device (Mac) Simple, fast and seamless protection for Mac.

ATTACHMENTS, INSERTS, AND LINKS...

Secure Recipient Guide

CERTIFIED SECURE COMPUTER USER COURSE OUTLINE

TIPS TO AVOID PHISHING SCAMS

The Activist Guide to Secure Communication on the Internet. Introduction

Consumer Banking User Guide. Getting Started

Configuring Microsoft Edge Browser By Tom Krauser

Introduction to the Internet. Part 1. What is the Internet?

University of Tennessee at Chattanooga ARCS, Michael Ward, Basic Windows Security

Does Windows 10 Have Privacy Issues? February 11, Joel Ewing

Spam Protection Guide

Quick Heal Total Security for Android. Anti-Theft Security. Web Security. Backup. Real-Time Protection. Safe Online Banking & Shopping.

ECDL / ICDL IT Security. Syllabus Version 2.0

Creating and Using an Account

MU2a Authentication, Authorization & Accounting Questions and Answers with Explainations

Protecting your Security and Privacy on the Web. Tony Brett Head of IT Support Staff Services IT Services. 11 March 2013

Quick Heal AntiVirus Pro Advanced. Protects your computer from viruses, malware, and Internet threats.

SECURE USE OF IT Syllabus Version 2.0

Technology in Action 12/11/2014. Cybercrime and Identity Theft (cont.) Cybercrime and Identity Theft (cont.) Chapter Topics

Personal Cybersecurity

The process by which a user can associate specific permissions to each username.

GUIDE TO KEEPING YOUR SOCIAL MEDIA ACCOUNTS SECURE

Best Practices Guide to Electronic Banking

>MESSAGELABS END USER IT SECURITY GUIDE >WHAT STEPS CAN YOU TAKE TO KEEP YOURSELF, YOUR COLLEAGUES AND YOUR COMPANY SAFE ONLINE?

Part 1: BASIC INTERNET

Cyber Hygiene Guide. Politicians and Political Parties

Getting over Ransomware - Plan your Strategy for more Advanced Threats

Why isn t your chapter on Facebook?

Internet and Mini.K.G Senior Scientist, FRAD, CMFRI

McAfee S DO s AnD DOn ts Of Online Shopping

Cyber Security Guide. For Politicians and Political Parties

Discussion Ppt To work on completing questions you need your book and exercise copies

Using WebQuarantine for Managing Quarantined Messages

Quick Heal Total Security

How To Remove Personal Antivirus Security Pro Virus Manually

Octopus Online Service Safety Guide

Airtel PC Secure Trouble Shooting Guide

Quick Heal Total Security for Mac. Simple, fast and seamless protection for Mac.

Introduction. Logging in. WebQuarantine User Guide

Chapter 10: Security. 2. What are the two types of general threats to computer security? Give examples of each.

Data Communication. Chapter # 5: Networking Threats. By: William Stalling

FACTS WHAT DOES FARMERS STATE BANK DO WITH YOUR PERSONAL INFORMATION? WHY? WHAT? HOW? L QUESTIONS?

2013 edition (version 1.1)

GOOGLE APPS. GETTING STARTED Page 02 Prerequisites What You Will Learn. INTRODUCTION Page 03 What is Google? SETTING UP AN ACCOUNT Page 03 Gmail

Signing up for My Lahey Chart

Web Cash Fraud Prevention Best Practices

Upgrading Your Home Network Security

Windows users range in experience from people

Is Browsing Safe? Web Browser Security. Subverting the Browser. Browser Security Model. XSS / Script Injection. 1. XSS / Script Injection

ONLINE SAFETY. Messaging, , Vlogging and Sexting

Frequently Asked Questions (FAQ)

Keeping Your Computer Secure Quick Reference Guide

HIPAA Privacy & Security Training. Privacy and Security of Protected Health Information

DONE FOR YOU SAMPLE INTERNET ACCEPTABLE USE POLICY

Franzes Francisco Manila IBM Domino Server Crash and Messaging

Keep In touch Digital skills for older people itkite.wordpress.com DON T PANIC! Just keep taking your tablet (with you)

CUSTOMER TIPS: HOW TO GUARD AGAINST FRAUD WHEN USING ONLINE BANKING OR ATM s

Quick Heal Total Security for Mac. Simple, fast and seamless protection for Mac.

Internet Crimes Against Children:

Client Resources. participant guide

Transcription:

INTERNET SAFETY IS IMPORTANT Internet safety is not just the ability to avoid dangerous websites, scams, or hacking. It s the idea that knowledge of how the internet works is just as important as being aware of your internet safeguards. We all have a digital identity we need to protect, so when exploring the web or checking email, there are practices that can prevent most of the dangers that can be found online. 2

ANTIVIRUS SOFTWARE The most important step is to make sure that you have some sort of antivirus software available to you. Most PCs come with pre-installed firewall software called Windows Defender. It protects you from malware and can perform searches on your computer to scan for viruses. You can also download antivirus software to protect you against ransomware, spyware, and other harmful software attacks that can introduce viruses to your computer. 3

VOCABULARY Cookies - Small text files added to your computer by websites when you visit them. These small files track how you navigate each website. Encryption - The process of encoding a message or information in such a way that only authorized users can access it. Malware - Malicious software or code (more specifically: Trojans, worms, spyware, adware, etc.) that is designed to damage the computer or collect information. Phishing - A scam that involves sending a fraudulent email soliciting personal information from an unsuspecting user. Spam - Any unsolicited email or junk mail. Spoofing - The forgery of an email sender so that the message appears to have originated from someone or somewhere other than the actual source. Virus - A self-replicating program that typically arrives through email attachments and multiplies on the hard drive, quickly exhausting the computer s memory. 4

SOCIAL MEDIA Protecting yourself on social media is just as important as keeping your browsers and email secure. Turn off location services for photos and within apps Keep personal info to a minimum Log out of accounts when not in use on public or shared devices Perform frequent privacy setting assessments and updates. 2/6/2019 5

SOCIAL MEDIA Don t post that you are away from home. Don t tag people in photos without permission. Confirm with someone before you give their personal information to someone else. Do not friend people that you do not know or trust. Discover how to block or unfriend followers on social media. 6 2/6/2019

PASSWORDS Passwords are primary way to secure your online accounts. Here are some tips to follow: Length of at least 6 characters, more are better Mix upper and lower cases with numbers and special characters Avoid using dictionary terms or oneword passwords Do not share your passwords with anyone Do not include personal details in passwords Follow new password guidelines If compromised, change your password immediately Tip: Use a sentence, phrase, or line from a song and add some numbers to create great passwords. 7

PASSWORDS A password manager can keep track of your passwords and generate passwords for you if you need a stronger one. Some password managers include: Dashlane, Keeper Security, LogMeOnce Password, and Sticky Password. Most importantly of all, most password managers include a feature called Two- Factor Authentication. Two-Factor Authentication is an extra layer of security for your accounts that requires not only the password and username credentials, but a supplemental piece of information that fall into at least two of the following categories: Knowledge: something you know Possession: something you have Inherence: something you are (like fingerprint reader, voice recognition, retina scanners) 8

EMAIL SAFETY Spam emails are unsolicited, anonymous, wide-spread mass mailings with malicious intent. They may request sensitive information or financial data from users by advertising contest rewards, health supplements, mysterious package shipment information, unclaimed offshore wealth, and a host of other unrealistic claims. Approximately 60% of all email is spam. Think of spam like the junk mail you receive everyday in the mail 2/6/2019 9

EMAIL SAFETY There s no way to have an email inbox completely free of spam, but there are things you can do to keep your inbox tidy. If an unsolicited email sounds too good to be true it probably is! So read the email subject line carefully before deleting it. Do not give out your email too often Have more than one email address to separate business and personal accounts Search for unsubscribing tools to roll all of those pesky subscriptions into one email so that you can unsubscribe safely: - Unroll.Me - Unsubscriber - Sanebox - Unlistr 10

SURFING SECURELY In today s digital world, we now have a wide range of access to the internet from a handful of browsers: Internet Explorer, Google Chrome, Mozilla Firefox, and many more. Each browser has its own kind of protections in place to make you feel safer about who and what you may encounter on the internet. As you explore the internet, keep some things in mind: Implement features that give you security without compromising your convenience. Fit your security to your needs and habits. Trust your intuition. 11

SURFING SECURELY Each browser has a combination of these features and settings that you can set to create a safe, secure searching environment. But it s important to understand what these features do in order to use them effectively. Browsing history: A log of all of your activity while using a browser Pop-up blockers: Prevent pop-up windows by closing them immediately Location services: Allow or deny websites to know where you re located for statistical purposes In-Private Searching: A mode in a browser that prohibits the collecting of your activity in your browser history, cookies, or site data that you input into forms 12

SECURED SITES When entering personal information on a website, turning on private browsing, or creating strong passwords and usernames, there are a few things that you can do to be a safe internet user. Make sure a website is secure before entering any personal information. Look for the following characteristics: A secured site uses encryption to protect your information from phishing scams and fraudulent activity. To be a secured site, there are two elements that must be present: a URL that begins with HTTPS rather than HTTP and a closed padlock icon location depending on the browser. 13

SECURED SITES Before entering your information in an unsecure site, ask yourself: Is it sensitive information? What could happen if somebody intercepted it? 14

PRIVATE BROWSING Accessing private browsing windows will differ on each browser. They are a great tool if you share devices or use public computers and don t want your personal information saved in the browsing history and cookies. But, remember, they won t hide internet activity from people with administration rights to your computer like your school, employer, or internet service provider. 15

PRIVATE BROWSING Settings and more > New InPrivate window OR Keyboard shortcut: Ctrl + Shift + P More menu > New Incognito Window OR Keyboard shortcut: Ctrl + Shift+ N Open Menu > New Private Window OR Keyboard shortcut: Ctrl + Shift + P 16

PASSWORD TIPS Take time to retire your passwords every two months. Avoid using the same password for every account. Find out if your accounts have been compromised: haveibeenpwned.com. Delete old accounts if you re not using them. They can be a liability if someone gains access to your personal information, even if you haven t used them in a while. To find out how to delete old accounts, backgroundchecks.org/justdeleteme can assist you. 2/6/2019 17