Workshop #7 Email Security Previous workshops 1. Introduction 2. Smart phones & Tablets 3. All about WatsApp 4. More on WatsApp 5. Surfing the Internet 6. Emailing Quick recap on Emailing Email Security Recap on where to find things on Belvidere website & a look at the Belvidere Facebook page
Belvidere Wifi Code Xanadu123
Content: Terminology Common scams Cyber hackers how can they open the door? 10 tips Examples of scam emails Quizz
Terminology Spam: Irrelevant or unsolicited messages sent over the Internet, typically to a large number of users, for the purposes of advertising, phishing, spreading malware, etc. Phishing: The fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers. Malware: Software which is specifically designed to disrupt, damage, or gain authorized access to a computer system. Ransomware: a type of malicious software designed to block access to a computer system until a sum of money is paid. Firewall: a part of a computer system or network which is designed to block unauthorized access while permitting outward communication.
Common scams targeting the elderly Tech support scams: There s nothing worse than being told your computer isn t working correctly. These types of scams can manifest themselves as popups that appear on your computer screen and look like legitimate offers for computer service or help. In addition, criminals could get your telephone number and call to claim they are representing a reputable company such as Microsoft. Perhaps they re selling fake software. They ask for remote access into your computer and, potentially, credit card information. They then encourage you to install malware that might steal your personal information and data. If there s a high-pressure pitch to take urgent action, that s a red flag. If you get such a call, it is best to hang up and call the company yourself to verify the person on the telephone is legitimate.
Tax scams: The tax season provides another window of opportunity for online fraudsters to take action. One common scam being perpetrated by email as well as mail is an official-looking notice for the tax year in question. SARS does issue such a notice when income or payment information doesn t match information on your tax return. The scam letter instructs that payment needs to be sent. If you get a notice like this, it is best to delete it immediately and call your local tax authority
Ransomware: One of the most frightening forms of online fraud is ransomware, a type of malicious software designed to block access to a computer system until a sum of money is paid. One of the best ways to help prevent this from happening is to ensure your system has an up-to-date antivirus system. Also, never open spam emails from unknown senders, do not download attachments from spam or suspicious emails, and avoid clicking on links in suspicious emails to help avoid these types of scams.
False debt collectors: False debt collection emails often come as official-looking documents and the tone of the emails is threatening and urgent. The opportunity to take care of this voluntarily is coming to an end. We would hate for you to lose the option of resolving this before it goes to the next step, which is a lawsuit. Consider these tips to avoid these types of scams: Do not respond to these emails, open any attachments or click on any links. Delete these emails. If you re concerned about whether you owe money, contact any creditors directly to find out if they sent the emails.
Sweepstakes scams: A sweepstakes scam often will want you to pay to receive your prize. By the same token, you could have a giving heart that always wants to help those in need but check out all charities before you give. Sweepstakes and charities scams prey on emotions. Scam charities often have names similar to real charities. However, they usually cannot provide important documentation of their identity and mission nor can they provide proof of tax-deductible contribution. Another clue that a scam attempt is in progress is if the email comes from a free account such as gmail or hotmail. Charity scams often will ask for bank or credit card information. If you believe the charity is legitimate, you can check it out by looking up the number and calling it.
A trusting nature That man in Nigeria sounds desperate, and I could make some money! Scammers and spammers may target older adults for several reasons. One is financial security and the other a trusting nature. One popular phishing scam is a con artist posing as a Nigerian prince who wants you to help him smuggle millions out of his country. You ll help and get a cut of the proceeds by providing your personal and financial information and paying a small fee.
Cyber hackers how can they open the door? Clicking on bad email links Emails, even those that seemingly come from friends, could contain viruses and malware or links to malicious websites. The experts warn not to click on links in any emails that look suspicious. Always be wary of emails from financial institutions, internet service providers and other organizations that ask you to provide them personal or financial information. Searching for weaknesses in computer systems Cybercriminals sometimes send out mass emails in an effort to compromise weak computer systems. Make sure that your computer security systems are up-todate and functioning properly.
10 TIPS 1. Create passwords and make them strong. 2. Secure access to your accounts. 3. Think before you act. 4. When in doubt, throw it out. 5. Share with care. 6. Use security software. 7. Adjust your browser safety settings. 8. Use the default firewall security protection on your computer. 9. Log out. 10. Consider support.
1. Passwords Lock all of your devices including computer, tablet and smartphone with secure passwords. That will keep prying eyes out and add a line of defense in case your devices are lost or stolen. A strong password is at least 12 characters long. Strong password tips include the use a mix of letters, numbers and symbols, and try not to include personal information.
2. Two-step login Since passwords can be stolen, adding two-step authentication to accounts provides a second layer of protection. Many online services, including apps and websites, offer free options that could help you protect your information and ensure it s actually you trying to access your account not just someone with your password.
3. Think before you act Emails and communication that create a sense of urgency such as a problem with your bank account or taxes is likely a scam. Consider reaching out directly to the company by phone to determine if the email is legitimate or not.
4. When in doubt throw it out Clicking on links in emails is often how scammers get access to personal information. If an email looks unusual, even if you know the person who sent it, it s best to delete it. Remember that scammers can commandeer friends email addresses and send you messages posing as them. Turn on spam filters for your email account to help filter suspicious messages.
5. Share with CARE Be aware of what you share publically on social media sites like Facebook. Adjust your privacy settings to limit who can see your information.
6. Use security software. Install security software on your devices from a reliable source and keep it updated. Old technology is less secure! It is best to run the anti-virus and anti-spyware software regularly. Be wary of security updates from pop-up ads or emails. They may actually be malware that could infect your computer.
7. Adjust your browser safety settings. You likely search for news, information and products by using an internet browser such as Firefox, Google Chrome, Internet Explorer and Safari. Adjust your settings in each of those browsers to set your options for optimum security. Those menus can often be found in the upper right corner of your browser. Consider clearing your browsing history at the end of your session so you don t leave a trail of sensitive data.
8. Use the default firewall security protection on your computer. Your operating system (OS) likely has default firewall settings that will protect your computer without needing adjustment. If your antivirus software includes additional firewall protection that you can adjust separately, consider contacting a computer professional for assistance to ensure you re safely protected without over-blocking sites and programs you use regularly.
9. Log-out Log out. Remember to log out of apps and websites when you are done using them. Leaving them open on your computer screen could make you vulnerable to security and privacy risks.
10. Consider support. If you live alone or spend a lot of time by yourself, consider a trusted source to serve as a second set of eyes and ears. Adult family members and grandchildren who are computer savvy may be willing to help.