Cybersecurity For The Small Business & Home User ( Geared toward Windows, but relevant to Apple )

Similar documents
Cyber Security Basics. Presented by Darrel Karbginsky

KSI/KAI Cyber Security Policy / Procedures For Registered Reps

CERTIFIED SECURE COMPUTER USER COURSE OUTLINE

Course Outline (version 2)

Quick Heal Total Security for Android. Anti-Theft Security. Web Security. Backup. Real-Time Protection. Safe Online Banking & Shopping.

Quick recap on ing Security Recap on where to find things on Belvidere website & a look at the Belvidere Facebook page

Kaspersky Small Office Security 5. Product presentation

How to Backup Your Computer. Adele Berenstein Jan 17, 2018

What is Zemana AntiLogger?

ANDROID PRIVACY & SECURITY GUIDE ANDROID DEVICE SETTINGS

Securing the SMB Cloud Generation

File Maintenance Windows 7 Word What is File Maintenance?

Full System Restore Manually Windows 7 No Disk

Introduction to

How To Remove Personal Antivirus Security Pro Virus Manually

Quick Heal Mobile Security. Free protection for your Android phone against virus attacks, unwanted calls, and theft.

Restech. User Security AVOIDING LOSS GAINING CONFIDENCE IN THE FACE OF TODAY S THREATS

Table of Contents. User Guide

Securing Today s Mobile Workforce

How To Remove Personal Antivirus Security Pro Virus

3.5 SECURITY. How can you reduce the risk of getting a virus?

Adminsoft Accounts Basic User Guide - Installation

How Cyber-Criminals Steal and Profit from your Data

I Want To Wipe My Computer Clean And Start Over Windows 7

User s Guide. SingNet Desktop Security Copyright 2010 F-Secure Corporation. All rights reserved.

COMMON WAYS IDENTITY THEFT CAN HAPPEN:

Quick Heal Total Security for Android. Anti-Theft Security. Web Security. Backup. Real-Time Protection. Safe Online Banking & Shopping.

DEFENDING THE MOBILE WORKFORCE Karim Toubba-Vice President Product Marketing and Strategy-Security Business Unit

Security Awareness & Best Practices Best Practices for Maintaining Data Security in Your Business Environment

Safety and Security. April 2015

Have a Backup. Trainer Resource. This document is a reference and preparation sheet for the trainer, and a companion to the lesson plan.

Comodo Mobile Security for Android Software Version 2.5

Octopus Online Service Safety Guide

What is a Backup, Anyway? Why Do I Need to Backup My Files? Top 10 Files to Backup. Why Do I Need to Backup My Files?

Quick Heal AntiVirus Pro Advanced. Protects your computer from viruses, malware, and Internet threats.

How To Remove Virus From Computer Without Using Antivirus In Windows Xp

How To Sync Apple Iphone Contacts To Gmail Without Itunes >>>CLICK HERE<<<

College of Pharmacy Windows 10

Keeping Your Computer Secure Quick Reference Guide

How To Remove A Virus Manually Windows 7

Quick Heal Total Security for Mac. Simple, fast and seamless protection for Mac.

XP: Backup Your Important Files for Safety

How To Sync Iphone Contacts To Gmail Account Without Itunes

Quick Heal Total Security for Mac. Simple, fast and seamless protection for Mac.

Welcome. ScrogginsGrear clients. to Cybersecurity Education Series. Password Management & Public Wi-Fi Security

Discount Kaspersky PURE 3.0 internet download software for windows 8 ]

Vendor: CompTIA. Exam Code: Exam Name: CompTIA A+ Certification Exam (902) Version: Demo

DOWNLOAD PDF CREATOR FOR WINDOWS 8 64 BIT

ClamXav a free antivirus application for the Mac

How to Build a Culture of Security

Mobile Security for Android devices

Mobile Device Security. Image from

Bitdefender Total Security User's Guide

Home Computer and Internet User Security

How To Sync Apple Iphone Contact To Gmail Without Itunes

Staying Safe Online. My Best Internet Safety Tips. and the AgeWell Computer Education Center.

Junos Pulse for Google Android

BackUp Strategies. ApplePickers April 12, 2017

WHAT IS CORPORATE ACCOUNT TAKEOVER? HOW DOES IT HAPPEN?

Features. Product Highlights. Not just an app, but a friend for your phone. Optimization. Speed. Battery. Storage. Data Usage

(electronic mail) is the exchange of computer-stored messages by telecommunication.

BEST PRACTICES FOR PERSONAL Security

Security. Bob Shantz Director of Infrastructure & Cloud Services Computer Guidance Corporation. All Rights Reserved.

SECURITY ON PUBLIC WI-FI New Zealand. A guide to help you stay safe online while using public Wi-Fi

User Guide. This user guide explains how to use and update Max Secure Anti Virus Enterprise Client.

The 10 Disaster Planning Essentials For A Small Business Network

Employee Security Awareness Training

SPAM Malware s Super Highway. How To Protect Yourself Against Malicious s 1

Quick Heal Mobile Security. Free protection for your Android phone against virus attacks, unwanted calls, and theft.

Welcome. Password Management & Public Wi-Fi Security. Hosted by: Content by:

Security Awareness. Presented by OSU Institute of Technology

Introduction to the Internet. Part 1. What is the Internet?

Quick Heal Total Security Multi-Device (Mac) Simple, fast and seamless protection for Mac.

itunes What Is It Good For? 2018 Becky Diamond 1

INTERNET SAFETY* GALEN GARRETSON RASCAL MARCH 2-3, * Sources include learnfree.org, PC World, wikpedia.com, techterms.com

Managing IT Risk: What Now and What to Look For. Presented By Tina Bode IT Assurance Services

Staying Safe on the Internet. Mark Schulman

Chromebooks boot in seconds, and resume instantly. When you turn on a Chromebook and sign in, you can get online fast.

How Do I Sync My Iphone To Another Computer Without Losing Everything

Seven secrets to making the most of your computer system. Chris Jeffery Proprietor/Chief Guru CyberGuru

Retail/Consumer Client Internet Banking Awareness and Education Program

Basics Lesson Twelve Backing Up Your Data and the Computer

How To Remove A Virus Manually Windows 7 Laptop Using Antivirus Program

Presentation by Neil Schmidt

Get Max Internet Security where to buy software for students ]

Protecting Your Devices. Dr. Leon D. Chapman

Created by Eugene Stephens 2015

Level 2 Cambridge Technical in IT

WHEN YOUR COMPUTER SLOWS TO A CRAWL

Introduction to Information Security Dr. Rick Jerz

Security Issues When Preparing for Disasters

Manual Reset Button On Iphone 4 Without Itunes Or Passcode

ATTACHMENTS, INSERTS, AND LINKS...

Quick Heal Total Security

Unit A: Computer and Internet Basics

Backup and Restore Strategies

Quick Heal Mobile Security. Anti-Theft Security. Real-Time Protection. Safe Online Banking & Shopping.

Manually Backup Itunes Library To Dvd Windows Vista

Protecting Health Information

Kaspersky Internet Security - Top 10 Internet Security Software in With Best Antivirus, Firewall,

Transcription:

Cybersecurity For The Small Business & Home User ( Geared toward Windows, but relevant to Apple ) Topics: Antivirus / DSSO/ Email Computer Backups Security On The Go Mobile Safety Your first line of defense is in your computer habits!

Antivirus / DSSO Only ONE antivirus running at a time on your computer Multiple anti-virus programs tend to conflict with each other. This can cause them to miss viruses, corrupt files, and drastically slow down your machine. Check online reviews of antivirus programs to get a sense of which program may be right for you. Multiple technology sites review antivirus software both paid and free antivirus programs. PC Magazine, for example, does an annual review of both free and paid antivirus software. A good strategy for finding reviews: Look for computer magazines on bookstore magazine racks then search online to see if they do antivirus reviews. If they're in print, they likely have resources to do good ones.

DSSO: What is it? DSSO is a simple acronym I developed for reminding yourself to use good antivirus practices with ANY file coming from outside your PC. It stands for: DOWNLOAD SAVE SCAN OPEN You should make this habit as second-nature as breathing, walking, or riding a bicycle. Get to where you do it every time without thinking about it. This single habit alone will protect you from most viruses and malware. Most good antivirus programs allow you to right-click on a file and scan it. The key to protecting yourself is scanning a file from anywhere outside your PC - BEFORE EVER OPENING it.

The Download and Save process looks different depending on what web browser you're using.

Really, however, the steps are mostly the same, only the presentation is different. 1.Click a download link or button 2.Choose SAVE rather than download/open/run. 3.Decide which folder to save the file in make it somewhere you can easily find. 4.Navigate to the file and right-click on it. 5.Choose SCAN from the right-click menu. 6.If the scan comes up clean, double-left click on the file to open it. This process may look slightly different in different versions of Windows, but it is essentially the same. ALWAYS scan any file storage media you attach/insert into your PC before opening anything on it. (Portable hard drives, USB flash drives, SD & Flash memory cards, CD's, & DVD's)

E-mail Safety

Regardless of whether you use an e-mail program on your PC or webmail application, the basic rules are the same. Number-one threat is e-mail attachments Number-two threat is being scammed for information Using the same DSSO practices used for downloading files from the web can protect you from most malware & ransomware embedded in email attachments. Using common sense can protect you from most scams.

Things to think about before replying to an e-mail: Did I ever give this person or agency my e-mail address? Would this agency really do critical notifications by e-mail? Would my friend write like this? Did I order any package delivery? Typical ways scammers & spammers try to get you to give out information or open a malicious file attachment: Pretend to be your bank, credit card company, or other financial institution. Pretend to be a shipping company trying to deliver a package. Pretend to be a government agency such as a Court, Tollway Authority, the IRS, State Tax agency, or others. Pretend to be a collections agency. Pretend to be coming from someone you know.

Many viruses and other malware can: Fake the from e-mail address when sending spam Steal e-mail addresses in the address books or stored contacts on an infected PC Pretend to be an antivirus scan tool Pretend to be a PC tune-up scan tool Be embedded in questionable free software such as games, music & video players, etc. Downloading, Saving, and Scanning ANY file that comes from any source outside of your PC, every single time, automatically and without thinking about it is your first and strongest line of defense.

How Backups Can Help You If Malware Gets Through

Backing up your entire PC is a very low-cost insurance policy. Once you have a portable hard drive (Often under $100), the software tools to perform backups have been included in Windows for several versions now. A full system image is a snapshot of everything on your PC all the files and folders, all the installed programs, all the software updates, and all the Windows updates. If you backed up your PC with a system image a week or two prior to getting a ransomware infection, you can restore your computer from the system image, and lose a week or two of work instead of everything. Keeping a backup at home can protect your data in the case of fire, floods, earthquakes, or theft of a computer. Cloud storage backups will not back up your installed programs, or Windows backups & software updates.

Cloud storage can take up to a few days to recover all your files from, depending on your Internet Provider's limit policies on the amount of data you can use in a single day. There are two main types of local backups you can do with only Windows and a portable hard drive. 1.Full System Image backs up the entire PC. 2.File backup only backs up your files and folders. You should do BOTH. Here's why: System Image: Can only restore everything or nothing. Can not be used with a different make/model of PC all the hardware on the machine being restored must be identical to the one the System Image was created from.

File and Folder Backup: Doesn't backup software updates or Windows updates Doesn't backup installed programs Doing both types of backup will let you: Recover to a point before a malware infection including ransomware Recover if your hard disk drive fails & you need to install a new blank hard drive Migrate to a newer computer while keeping all your documents, pictures, video, and music. Recover in the case of fire, flood, earthquake, or theft of your PC.

Backups should be: Done about every two weeks. Rotated out keep one copy at home, and one at the office. Swap them monthly. Portable hard drives should be: Scanned for viruses as soon as attached to the PC. Detached from the PC unless actually in the process of backing up or recovering. Rotated out keep one copy at home, and one at the office. Swap them monthly. Protected from strong magnets and extreme temperatures. Protected from shock or impacts. USB Flash / Thumb / Jump / Pen drives, CD's, DVD's, SD cards, and Flash Memory Cards do not generally have sufficient storage to back up an entire PC or do a System Image.

To start a backup in Windows: Click or right-click the Start button. Go to the Control Panel Select Backup and Restore Connect a portable hard drive, preferably to a USB 3.0 port for better speed. Look for the prompts in Backup and Restore You can search Youtube for how-to videos on doing the particular type of backup you wish to do, and for how-to videos specific to your version of Windows.

Mobile Security Laptop/Notebook, Netbook PC Tablet PC Smartphone

Mobile computing can be quite freeing, but it comes with risks that you need to know how to handle: Unsecured free WiFi internet can be monitored. Mobile devices can be stolen. People can look over your shoulder. The first issue, unsecured free WiFi, can allow nefarious persons to monitor your online activity with a device or software program called a WiFi Sniffer. WiFi is simply an internet connection that uses radio instead of wires. Just like in old war movies, the enemy can be listening to your transmissions!

Just like in World War II, you need to talk in code if you don't want the bad guys knowing things they shouldn't. In the case of WiFi, there is a tool called VPN, or Virtual Private Network that uses strong encryption of your WiFi connection to put everything in an unreadable code. This prevents people from monitoring what you're doing online. I personally use Avast Secureline VPN on both my smartphone and laptop. It costs around $35.00 per year on each device.

Lock Your Devices! Mobile device security

The first thing you should do is make sure that your device is locked somehow. Android, ios (Apple), and Windows all have methods of locking a computing device. In the case of both Android and ios, a locked device is also encrypted. Instructions: http://www.redmondpie.com/how-to-enable-encryptionon-iphone-ipad-or-android-device/ In Windows, you can also encrypt the device, but it's more work. You should at the least set a Windows password and use a screensaver with on resume, require logon prompt checked in the screensaver settings. Windows 10 Mobile encryption: http://www.windowscentral.com/howenable-device-encryption-windows-10-mobile

Windows Laptop / Notebook Encryption: The best answer here is It's complicated. It's quite doable to encrypt a Windows PC, but you'll need a Professional version of Windows for the best results. See this article: http://www.howtogeek.com/234826/how-to-enable-full-disk-encryptionon-windows-10/ Additionally, many smartphones have applications available to track their location and remotely wipe all data on them should they be stolen. The last item, folks looking over your shoulder that just requires being aware of your surroundings, sitting in a spot that makes it difficult, and checking on what people around you are doing fairly often. Think strategically about where you're sitting before settling in.

Additional Basic Computer Security Considerations NEVER insert a USB flash / jump / pen / thumb drive you found into your computer. It can be full of malware by intent, or because its owner wasn't aware it was infected. It can also be a device designed to electronically fry a PC. If you work for a company with confidential information, be careful of social engineering attempts. People can pretend to be innocent or have some need for documents or other information that shouldn't be shared. https://digitalguardian.com/blog/socialengineering-attacks-common-techniques-how-prevent-attack

Presented by: Cybersecurity For The Small Business & Home User ( Geared toward Windows, but relevant to Apple ) Contact us for a security evaluation! 20% off for course attendees!