Safety and Security. April 2015

Similar documents
South Central Power Stop Scams

Quick Heal Total Security for Android. Anti-Theft Security. Web Security. Backup. Real-Time Protection. Safe Online Banking & Shopping.

Online Scams. Ready to get started? Click on the green button to continue.

FAQ. Usually appear to be sent from official address

Quick Heal Mobile Security. Free protection for your Android phone against virus attacks, unwanted calls, and theft.

Quick recap on ing Security Recap on where to find things on Belvidere website & a look at the Belvidere Facebook page

Financial scams. What to look for and how to avoid them.

Best Practices Guide to Electronic Banking

Train employees to avoid inadvertent cyber security breaches

Guide to credit card security

WHAT IS CORPORATE ACCOUNT TAKEOVER? HOW DOES IT HAPPEN?

Quick Heal Mobile Security. Anti-Theft Security. Real-Time Protection. Safe Online Banking & Shopping.

How to recognize phishing s

Century Bank Mobile. Android and iphone Application Guide

Online Fraud and Identity Theft Guide. A Guide to Protecting Your Identity and Accounts

Your security on click Jobs

FAQ: Privacy, Security, and Data Protection at Libraries

COMMON WAYS IDENTITY THEFT CAN HAPPEN:

PROTECTING YOUR BUSINESS ASSETS

ELECTRONIC BANKING & ONLINE AUTHENTICATION

Common Scams and Fraud. Charlottesville/Albemarle County TRIAD Group

Enroll in Two factor Authentication - iphone

Quick Heal Total Security for Android. Anti-Theft Security. Web Security. Backup. Real-Time Protection. Safe Online Banking & Shopping.

INTERNET SAFETY IS IMPORTANT

It pays to stop and think

PRACTICING SAFE COMPUTING AT HOME

Why was an extra step of choosing a Security Image added to the sign-in process?

Quick Heal Mobile Security. Free protection for your Android phone against virus attacks, unwanted calls, and theft.

Employee Security Awareness Training

Phishing: What is it?

Course Outline (version 2)

10 Quick Tips to Mobile Security

Security Awareness & Best Practices Best Practices for Maintaining Data Security in Your Business Environment

Cyber Security Guide for NHSmail

Identity Theft, Fraud & You. PrePare. Protect. Prevent.

IMPORTANT SECURITY CHANGES LOGGING ON. We are replacing the existing enhanced authentication.

CYBER SECURITY RESOURCE GUIDE. Cyber Fraud Overview. Best Practices and Resources. Quick Reference Guide for Employees. Cyber Security Checklist

How to Build a Culture of Security

Junos Pulse for Google Android

Personal Cybersecurity

Security and Fraud Awareness

CYBER THREATS: REAL ESTATE FRAUD ADVISORY COUNCIL

Security Now. Howard Verne. Is My Private Information Safe?

Newcomer Finances Toolkit. Fraud. Worksheets

TIPS TO AVOID PHISHING SCAMS

Protecting Your Business From Hackers

"Stay Smart, Keep Cyber Scam Away" Seminar Build a Secure Cyberspace 2018

Before You Lose Your iphone

Staying Safe on the Internet. Mark Schulman

CERTIFIED SECURE COMPUTER USER COURSE OUTLINE

Octopus Online Service Safety Guide

Retail/Consumer Client Internet Banking Awareness and Education Program

Duo Travel Guide. duo.com

3.5 SECURITY. How can you reduce the risk of getting a virus?

Target Breach Overview

BEST PRACTICES FOR PERSONAL Security

ANDROID PRIVACY & SECURITY GUIDE ANDROID DEVICE SETTINGS

INTERNET SECURITY STAYING SAFE ONLINE

Page 1 of 6 Bank card and cheque fraud

A practical guide to IT security

Mobile Security for Android devices

Consumer Banking User Guide. Getting Started

Maintaining Computer. Disk cleanup, Disk Defragmenter Recycle bin, Security

Frauds & Scams. Why is the Internet so attractive to scam artists? 2006 Internet Fraud Trends. Fake Checks. Nigerian Scam

Chapter 6 Network and Internet Security and Privacy

Who We Are! Natalie Timpone

Review Kaspersky Internet Security - multi-device 2015 online software downloader ]

/ 1. Online Banking User Guide SouthStateBank.com / (800)

Identity Theft and Account Takeover Prevention

WiFi Security User Guide

Bitdefender Mobile Security & Antivirus User's Guide

Online Services User Guide

Downloaded from manuals search engine. Quick Start

Web Cash Fraud Prevention Best Practices

LCNB National Bank mymobilemoneyaccess Quick Reference Guide. Getting Set Up

FACTS WHAT DOES FARMERS STATE BANK DO WITH YOUR PERSONAL INFORMATION? WHY? WHAT? HOW? L QUESTIONS?

Online Services USER GUIDE. First Time Log In

Mobility Manager 9.5. Users Guide

Top 5 Tips To Take A Stand Against Telephone Scams

/ 1. Online Banking User Guide SouthStateBank.com / (800)

Google 2 factor authentication User Guide

Virtual Product Fair. Protect your agency data protect your business

CREDITS Web-version 2 Web-version specification CREDITS Desktop Client vs. Web-client What is the CREDITS Wallet? 2 1.

How to Encrypt Files Containing Sensitive Data (using 7zip software or Microsoft password protection) How to Create Strong Passwords

Credit Card Frauds Sept.08, 2016

Card Reader User Guide

Client Resources. participant guide

Identity Theft and Online Security

Fix Three Common Accounting Firm Data Vulnerabilities

Features. Product Highlights. Not just an app, but a friend for your phone. Optimization. Speed. Battery. Storage. Data Usage

(electronic mail) is the exchange of computer-stored messages by telecommunication.

Getting Started with Duo Security Two-Factor Authentication (2FA)

What is Mobile Deposit? What items can be deposited via Mobile Deposit? What items cannot

The purpose of this document is to help you to get started with your ipad to access Lilly resources such as , calendar, Lilly apps and more.

Mobile Banking Frequently Asked Questions

Online Security and Safety Protect Your Computer - and Yourself!

CUSTOMER TIPS: HOW TO GUARD AGAINST FRAUD WHEN USING ONLINE BANKING OR ATM s

How Cyber-Criminals Steal and Profit from your Data

How Enterprise Tackles Phishing. Nelson Yuen Technology Manager, Cybersecurity Microsoft Hong Kong

How to Keep Your Personal Information Secure

Transcription:

Safety and Security April 2015

Protecting your smartphone and your data 2

Set a passcode on your smartphone For some smartphone models: 1. Go to Settings. 2. Tap ID & Passcode. 3. Set a 4-digit passcode. For other smartphone models: 1. From the home screen, tap Apps. 2. Swipe to, then tap Settings. 3. From the "My device" tab, tap Lock screen. 4. Tap Password. 5. Enter the desired password, then tap Continue. 6. Confirm your new password, then tap OK. 3

Change a passcode on your smartphone For some smartphone models: 1. Tap Passcode. 2. Enter your 4-digit passcode. 3. Tap Change Passcode. 4. Enter your new Set a 4-digit passcode. For other smartphone models: 1. From the home screen, tap Apps. 2. Swipe to, then tap Settings. 3. From the "My device" tab, tap Lock screen. 4. Tap Screen lock. 5. Enter your password, then tap Continue. 6. Tap the desired new lock screen. 4

A sampling of free security apps Anti-Theft Alarm: Triggers a siren when a phone is moved or when the charger is disconnected. AT&T Mobile Locate: Lock, back up and wipe your device and restore your data remotely. Google Authenticator: Creates a two-step verification code on phones that helps prevent thieves from accessing accounts and other information. Hidden Anti Theft: Tracks the location of iphones and has the ability to covertly take real time photos from the phone so users can see who has it and where they are. KeepMyIdentities: Increase the security of Microsoft accounts by generating random passcodes and securely storing users login information. Keeper: Protects users by encrypting login, financial and other digital information and using two-factor authentication. Lookout: Locate lost or stolen devices, set off an alarm, download contacts to a new device and more. 5

Tips for protecting your information Back up your data Be careful with sensitive information when using public Wi-Fi 6

How to protect yourself when using an unsecure Wi-Fi connection Avoid connecting to suspicious Wi-Fi networks. Install a mobile antivirus and security app from your device app store and update its settings to automatically scan for viruses. Select apps that use encryption and are well rated in your app store. Connect to a Virtual Private Network (VPN) for maximum security protection. Ensure your Web-based email is secure. 7

Password Tips Long and strong (when possible). Mix of upper and lowercase letters, numbers and symbols. No sharing! Make your password unique to your life and not something that is easily guessed Have a different password for each online account. If you write down your password, store it in a safe place away from your computer. Change your password several times a year. 8

Scams and Shams 9

Email Fraud/Phishing 1. Read your emails carefully: make sure you know the sender and be suspicious of any email that asks for your personal or financial information. 2. Be very cautious when downloading any attachments or files from an email, unless you know and trust the sender. 3. Pay close attention to the URL to see if it s organized in an unusual way. 4. Look for poor grammar or spelling. 5. Check for a lack or incorrect use of trademarked symbols. 6. Be wary of links that lead to unfamiliar pages. 7. No reputable institution or organization will ask you to email them sensitive information (financial, health, etc.). Do not hit the reply button and send the information. 10

Government Agency Scam What it is: Someone calls you claiming to be a government agency, such as the IRS, and asks you to provide sensitive personal information. They often threaten you with legal action if you don t. What you should do: Do not engage hang up immediately. If you suspect that such an obligation exists, contact the government agency at their published phone number(s) to verify. For the IRS-related scam: For more information: http://www.irs.gov/uac/newsroom/irs-repeats-warning-about- Phone-Scams To report the scam to the Treasury Inspector General s Office: http://www.treasury.gov/tigta/contact_report_scam.shtml 11

PC Technical Support Scam What it is: Someone contacts you claiming to be a computer technician with a technical support company or affiliated with your internet service provider. They may tell you they have detected viruses or malware on your computer or offer a free security scan on your computer. Once you provide them with remote access to your computer they either attach malware which can steal your sensitive data or lock your computer and demand payment to unlock. What you should do: Never provide remote access to your computer under these circumstances. In all cases, never engage such services without first verifying that the company is in fact genuine. For more info: http://www.consumer.ftc.gov/articles/0346-tech-support-scams. 12

Fake Website Phishing Scam What it is: You receive a call, text or email enticing you to visit a website that appears to have an affiliation with a well-known company. For example, once at a fraudulent AT&T website, you are prompted to log in with your MyATT account credentials. The fraudster then uses the information obtained from the fake site to log into your account and make changes to the account or place orders. What you should do: Ignore it. Never use your AT&T account information to log into any website other than the AT&T website listed on your statement. Customers can report this activity to AT&T at abuse@att.net. For unwanted text messages, forward the message to short code 7726 (SPAM) and AT&T will investigate. If you already have been a victim of phishing, you should file a complaint with the Internet Crime Complaint Center (IC3) at www.ic3.gov. 13

One-Ring Callback Scam What it is: Fraudsters use call generators to place calls to a large volume of phone numbers. The calls typically ring once. The number displayed on the recipient s caller ID is a high-cost international number, usually located in the Caribbean. If you call the number back you re greeted with a message designed to keep you on the line, such as Hello, you have reached the operator, please hold. The longer you stay on the line, the more revenue fraudsters generate. What you should do: Do not answer or return calls from numbers you do not recognize or initiate a return call. You will not be charged for receiving the calls. Companies that do not conduct business with companies in the above-mentioned countries may want to consider blocking these area codes to avoid this type of charge. If you have been victimized by this scam, you can file a complaint at www.ftc.gov and www.ic3.gov. 14