Quick recap on ing Security Recap on where to find things on Belvidere website & a look at the Belvidere Facebook page

Similar documents
South Central Power Stop Scams

Online Security and Safety Protect Your Computer - and Yourself!

Top 5 Tips To Take A Stand Against Telephone Scams

Online Scams. Ready to get started? Click on the green button to continue.

Best Practices Guide to Electronic Banking

Your security on click Jobs

Retail/Consumer Client Internet Banking Awareness and Education Program

Cyber Security Guide for NHSmail

FAQ. Usually appear to be sent from official address

Financial scams. What to look for and how to avoid them.

It pays to stop and think

Safety and Security. April 2015

Common Scams and Fraud. Charlottesville/Albemarle County TRIAD Group

COMMON WAYS IDENTITY THEFT CAN HAPPEN:

Frauds & Scams. Why is the Internet so attractive to scam artists? 2006 Internet Fraud Trends. Fake Checks. Nigerian Scam

Security Awareness. Presented by OSU Institute of Technology

WHAT IS CORPORATE ACCOUNT TAKEOVER? HOW DOES IT HAPPEN?

PRACTICING SAFE COMPUTING AT HOME

Duplication and/or selling of the i-safe copyrighted materials, or any other form of unauthorized use of this material, is against the law.

PROTECTING YOUR BUSINESS ASSETS

The 12 scams of Christmas

How Cyber-Criminals Steal and Profit from your Data

INTERNET SAFETY IS IMPORTANT

Online Fraud and Identity Theft Guide. A Guide to Protecting Your Identity and Accounts

Introduction to

How to recognize phishing s

Web Cash Fraud Prevention Best Practices

Taking control of your finances... 5 Use these tips to manage your finances

IMPORTANT SECURITY INFORMATION PHISHING

Frequently Asked Questions (FAQ)

Newcomer Finances Toolkit. Fraud. Worksheets

TIPS TO AVOID PHISHING SCAMS

Staying Safe on the Internet. Mark Schulman

Who We Are! Natalie Timpone

Security Awareness & Best Practices Best Practices for Maintaining Data Security in Your Business Environment

Business/Commercial Client Internet Banking Awareness and Education Program

10 Quick Tips to Mobile Security

Spam Protection Guide

FAQ: Privacy, Security, and Data Protection at Libraries

Protecting your Security and Privacy on the Web. Tony Brett Head of IT Support Staff Services IT Services. 11 March 2013

Paid-for antivirus software

Personal Cybersecurity

INTERNET SAFETY* GALEN GARRETSON RASCAL MARCH 2-3, * Sources include learnfree.org, PC World, wikpedia.com, techterms.com

3.5 SECURITY. How can you reduce the risk of getting a virus?

JAPAN CYBER-SAVVINESS REPORT 2016 CYBERSECURITY: USER KNOWLEDGE, BEHAVIOUR AND ATTITUDES IN JAPAN

INTERNET SECURITY STAYING SAFE ONLINE

"Stay Smart, Keep Cyber Scam Away" Seminar Build a Secure Cyberspace 2018

Technology Basics and Social Networking Presented by Gina Lobdell Graduate Student at Purdue University

Quick Heal AntiVirus Pro Advanced. Protects your computer from viruses, malware, and Internet threats.

BRING SPEAR PHISHING PROTECTION TO THE MASSES

commtech Online Holiday Shopping Tips A Guide Presented by: CommTech Industries

FACTS WHAT DOES FARMERS STATE BANK DO WITH YOUR PERSONAL INFORMATION? WHY? WHAT? HOW? L QUESTIONS?

SECURITY ON PUBLIC WI-FI New Zealand. A guide to help you stay safe online while using public Wi-Fi

Identity Theft, Fraud & You. PrePare. Protect. Prevent.

BEST PRACTICES FOR PERSONAL Security

Keeping Your PC Safe. Tips on Safe Computing from Doug Copley

Employee Security Awareness Training

Cyber Security Guide. For Politicians and Political Parties

FRAUDULENT TRAVEL SCAMS

Webomania Solutions Pvt. Ltd. 2017

Safeguarding Your Dealership from Fraud

WEB OF DECEIT. Why are seniors targeted?

CAREERBUILDER.COM - PRIVACY POLICY

Elementary Computing CSC 100. M. Cheng, Computer Science

Train employees to avoid inadvertent cyber security breaches

Octopus Online Service Safety Guide

Internet Quick Start Guide. Get the most out of your Midco internet service with these handy instructions.

Create strong passwords

GUIDE TO KEEPING YOUR SOCIAL MEDIA ACCOUNTS SECURE

IT & DATA SECURITY BREACH PREVENTION

GRANDPARENT S GUIDE TO TECHNOLOGY VOLUME 2

Guide to credit card security

Norton Online Reputation Report: Why Millennials should manage their online footprint

It is my great pleasure to inform that you have won the latest model of Ferrari Car and 4 Bed Room Villa in Palm Jumeirah for attending this Seminar

CLICK TO EDIT MASTER TITLE STYLE Fraud Overview and Mitigation Strategies

CYBER SECURITY RESOURCE GUIDE. Cyber Fraud Overview. Best Practices and Resources. Quick Reference Guide for Employees. Cyber Security Checklist

ELECTRONIC BANKING & ONLINE AUTHENTICATION

Target Breach Overview

Page 1 of 6 Bank card and cheque fraud

CUSTOMER TIPS: HOW TO GUARD AGAINST FRAUD WHEN USING ONLINE BANKING OR ATM s

Review Kaspersky Internet Security - multi-device 2015 online software downloader ]

Security Awareness. Chapter 2 Personal Security

Cyber Hygiene Guide. Politicians and Political Parties

>MESSAGELABS END USER IT SECURITY GUIDE >WHAT STEPS CAN YOU TAKE TO KEEP YOURSELF, YOUR COLLEAGUES AND YOUR COMPANY SAFE ONLINE?

Service Provider View of Cyber Security. July 2017

FREQUENTLY ASKED QUESTIONS

Keeping Your Computer Secure Quick Reference Guide

Internet Quick Start Guide. Get the most out of your Midco internet service with these handy instructions.

Quick Heal Total Security for Android. Anti-Theft Security. Web Security. Backup. Real-Time Protection. Safe Online Banking & Shopping.

KSI/KAI Cyber Security Policy / Procedures For Registered Reps

2 User Guide. Contents

Cybersecurity For The Small Business & Home User ( Geared toward Windows, but relevant to Apple )

Kaspersky Small Office Security 5. Product presentation

Cyber Security. February 13, 2018 (webinar) February 15, 2018 (in-person)

TWINSBURG COMMUNITY SERVICE BUREAU. Senior Scam Workshop. Presented by Officer Ron Fruscella and Officer Greg Kopniske

ANDROID PRIVACY & SECURITY GUIDE ANDROID DEVICE SETTINGS

Creating and Protecting Your Online Identity for Job Search. A guide for newcomers to British Columbia

Recognizing & Protecting Against Fraud

Detect, Denounce, Deter

How To Remove Personal Antivirus Security Pro Virus Manually

Transcription:

Workshop #7 Email Security Previous workshops 1. Introduction 2. Smart phones & Tablets 3. All about WatsApp 4. More on WatsApp 5. Surfing the Internet 6. Emailing Quick recap on Emailing Email Security Recap on where to find things on Belvidere website & a look at the Belvidere Facebook page

Belvidere Wifi Code Xanadu123

Content: Terminology Common scams Cyber hackers how can they open the door? 10 tips Examples of scam emails Quizz

Terminology Spam: Irrelevant or unsolicited messages sent over the Internet, typically to a large number of users, for the purposes of advertising, phishing, spreading malware, etc. Phishing: The fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers. Malware: Software which is specifically designed to disrupt, damage, or gain authorized access to a computer system. Ransomware: a type of malicious software designed to block access to a computer system until a sum of money is paid. Firewall: a part of a computer system or network which is designed to block unauthorized access while permitting outward communication.

Common scams targeting the elderly Tech support scams: There s nothing worse than being told your computer isn t working correctly. These types of scams can manifest themselves as popups that appear on your computer screen and look like legitimate offers for computer service or help. In addition, criminals could get your telephone number and call to claim they are representing a reputable company such as Microsoft. Perhaps they re selling fake software. They ask for remote access into your computer and, potentially, credit card information. They then encourage you to install malware that might steal your personal information and data. If there s a high-pressure pitch to take urgent action, that s a red flag. If you get such a call, it is best to hang up and call the company yourself to verify the person on the telephone is legitimate.

Tax scams: The tax season provides another window of opportunity for online fraudsters to take action. One common scam being perpetrated by email as well as mail is an official-looking notice for the tax year in question. SARS does issue such a notice when income or payment information doesn t match information on your tax return. The scam letter instructs that payment needs to be sent. If you get a notice like this, it is best to delete it immediately and call your local tax authority

Ransomware: One of the most frightening forms of online fraud is ransomware, a type of malicious software designed to block access to a computer system until a sum of money is paid. One of the best ways to help prevent this from happening is to ensure your system has an up-to-date antivirus system. Also, never open spam emails from unknown senders, do not download attachments from spam or suspicious emails, and avoid clicking on links in suspicious emails to help avoid these types of scams.

False debt collectors: False debt collection emails often come as official-looking documents and the tone of the emails is threatening and urgent. The opportunity to take care of this voluntarily is coming to an end. We would hate for you to lose the option of resolving this before it goes to the next step, which is a lawsuit. Consider these tips to avoid these types of scams: Do not respond to these emails, open any attachments or click on any links. Delete these emails. If you re concerned about whether you owe money, contact any creditors directly to find out if they sent the emails.

Sweepstakes scams: A sweepstakes scam often will want you to pay to receive your prize. By the same token, you could have a giving heart that always wants to help those in need but check out all charities before you give. Sweepstakes and charities scams prey on emotions. Scam charities often have names similar to real charities. However, they usually cannot provide important documentation of their identity and mission nor can they provide proof of tax-deductible contribution. Another clue that a scam attempt is in progress is if the email comes from a free account such as gmail or hotmail. Charity scams often will ask for bank or credit card information. If you believe the charity is legitimate, you can check it out by looking up the number and calling it.

A trusting nature That man in Nigeria sounds desperate, and I could make some money! Scammers and spammers may target older adults for several reasons. One is financial security and the other a trusting nature. One popular phishing scam is a con artist posing as a Nigerian prince who wants you to help him smuggle millions out of his country. You ll help and get a cut of the proceeds by providing your personal and financial information and paying a small fee.

Cyber hackers how can they open the door? Clicking on bad email links Emails, even those that seemingly come from friends, could contain viruses and malware or links to malicious websites. The experts warn not to click on links in any emails that look suspicious. Always be wary of emails from financial institutions, internet service providers and other organizations that ask you to provide them personal or financial information. Searching for weaknesses in computer systems Cybercriminals sometimes send out mass emails in an effort to compromise weak computer systems. Make sure that your computer security systems are up-todate and functioning properly.

10 TIPS 1. Create passwords and make them strong. 2. Secure access to your accounts. 3. Think before you act. 4. When in doubt, throw it out. 5. Share with care. 6. Use security software. 7. Adjust your browser safety settings. 8. Use the default firewall security protection on your computer. 9. Log out. 10. Consider support.

1. Passwords Lock all of your devices including computer, tablet and smartphone with secure passwords. That will keep prying eyes out and add a line of defense in case your devices are lost or stolen. A strong password is at least 12 characters long. Strong password tips include the use a mix of letters, numbers and symbols, and try not to include personal information.

2. Two-step login Since passwords can be stolen, adding two-step authentication to accounts provides a second layer of protection. Many online services, including apps and websites, offer free options that could help you protect your information and ensure it s actually you trying to access your account not just someone with your password.

3. Think before you act Emails and communication that create a sense of urgency such as a problem with your bank account or taxes is likely a scam. Consider reaching out directly to the company by phone to determine if the email is legitimate or not.

4. When in doubt throw it out Clicking on links in emails is often how scammers get access to personal information. If an email looks unusual, even if you know the person who sent it, it s best to delete it. Remember that scammers can commandeer friends email addresses and send you messages posing as them. Turn on spam filters for your email account to help filter suspicious messages.

5. Share with CARE Be aware of what you share publically on social media sites like Facebook. Adjust your privacy settings to limit who can see your information.

6. Use security software. Install security software on your devices from a reliable source and keep it updated. Old technology is less secure! It is best to run the anti-virus and anti-spyware software regularly. Be wary of security updates from pop-up ads or emails. They may actually be malware that could infect your computer.

7. Adjust your browser safety settings. You likely search for news, information and products by using an internet browser such as Firefox, Google Chrome, Internet Explorer and Safari. Adjust your settings in each of those browsers to set your options for optimum security. Those menus can often be found in the upper right corner of your browser. Consider clearing your browsing history at the end of your session so you don t leave a trail of sensitive data.

8. Use the default firewall security protection on your computer. Your operating system (OS) likely has default firewall settings that will protect your computer without needing adjustment. If your antivirus software includes additional firewall protection that you can adjust separately, consider contacting a computer professional for assistance to ensure you re safely protected without over-blocking sites and programs you use regularly.

9. Log-out Log out. Remember to log out of apps and websites when you are done using them. Leaving them open on your computer screen could make you vulnerable to security and privacy risks.

10. Consider support. If you live alone or spend a lot of time by yourself, consider a trusted source to serve as a second set of eyes and ears. Adult family members and grandchildren who are computer savvy may be willing to help.