>MESSAGELABS END USER IT SECURITY GUIDE >WHAT STEPS CAN YOU TAKE TO KEEP YOURSELF, YOUR COLLEAGUES AND YOUR COMPANY SAFE ONLINE?

Similar documents
PDF Spam: Spam Evolves, PDF becomes the Latest Threat

ELECTRONIC BANKING & ONLINE AUTHENTICATION

Spam Protection Guide

FAQ. Usually appear to be sent from official address

>Buyer s guide to hosted security

Cyber Security Guide for NHSmail

INTERNET SAFETY IS IMPORTANT

Quick recap on ing Security Recap on where to find things on Belvidere website & a look at the Belvidere Facebook page

Dataprise Managed Anti-Spam Console

Online Scams. Ready to get started? Click on the green button to continue.

Quick Heal Total Security Multi-Device (Mac) Simple, fast and seamless protection for Mac.

BEST PRACTICES FOR PERSONAL Security

Online Security and Safety Protect Your Computer - and Yourself!

Quick Heal Total Security for Mac. Simple, fast and seamless protection for Mac.

Quick Heal Total Security for Mac. Simple, fast and seamless protection for Mac.

Using WebQuarantine for Managing Quarantined Messages

Security Awareness. Presented by OSU Institute of Technology

3.5 SECURITY. How can you reduce the risk of getting a virus?

Introduction to

I G H T T H E A G A I N S T S P A M. ww w.atmail.com. Copyright 2015 atmail pty ltd. All rights reserved. 1

Be certain. MessageLabs Intelligence: May 2006

Risks, Threats, Solution. Nick Johnston, Software Engineer, Symantec.cloud

WHAT IS CORPORATE ACCOUNT TAKEOVER? HOW DOES IT HAPPEN?

How to recognize phishing s

It pays to stop and think

Elementary Computing CSC 100. M. Cheng, Computer Science

Introduction to

The 12 scams of Christmas

Online Fraud and Identity Theft Guide. A Guide to Protecting Your Identity and Accounts

Duplication and/or selling of the i-safe copyrighted materials, or any other form of unauthorized use of this material, is against the law.

PROTECTING YOUR BUSINESS ASSETS

Malicious s. How to Identify Them and How to Protect Yourself

SUMMARIES OF INTERACTIVE MULTIMEDIA

Paid-for antivirus software

Phishing. What do phishing s do?

TIPS TO AVOID PHISHING SCAMS

Financial scams. What to look for and how to avoid them.

Your security on click Jobs

Cyber Security Guide. For Politicians and Political Parties

Protecting your Security and Privacy on the Web. Tony Brett Head of IT Support Staff Services IT Services. 11 March 2013

Octopus Online Service Safety Guide

Cyber Security Practice Questions. Varying Difficulty

Barracuda Security Service User Guide

Course Outline (version 2)

INTERNET SECURITY STAYING SAFE ONLINE

Page 1 of 6 Bank card and cheque fraud

Introduction. Logging in. WebQuarantine User Guide

Cyber Hygiene Guide. Politicians and Political Parties

Protecting from Attack in Office 365

Junk mail, aka Spam. Unsolicited messages that are sent in huge numbers and clog your box.

CERTIFIED SECURE COMPUTER USER COURSE OUTLINE

South Central Power Stop Scams

NHS South Commissioning Support Unit

Protection Against Malware. Alan German Ottawa PC Users Group

Review Kaspersky Internet Security - multi-device 2015 online software downloader ]

Why isn t your chapter on Facebook?

IT & DATA SECURITY BREACH PREVENTION

Phishing: When is the Enemy

User s Guide. SingNet Desktop Security Copyright 2010 F-Secure Corporation. All rights reserved.

Identity Theft, Fraud & You. PrePare. Protect. Prevent.

Internet Safety Utilize the Internet without Fear

The Challenge of Spam An Internet Society Public Policy Briefing

Quick Heal AntiVirus Pro Advanced. Protects your computer from viruses, malware, and Internet threats.

The Dilemma: Junk, Spam, or Phishing? How to Classify Unwanted s and Respond Accordingly

PIN / Password Security

November 2009 Report #35

Create strong passwords

Creating and Using an Account

CUSTOMER TIPS: HOW TO GUARD AGAINST FRAUD WHEN USING ONLINE BANKING OR ATM s

Layer by Layer: Protecting from Attack in Office 365

Train employees to avoid inadvertent cyber security breaches

Augmenting existing security infrastructure to mitigate information borne risks

Staying Safe on the Internet. Mark Schulman

Quick Heal Total Security for Android. Anti-Theft Security. Web Security. Backup. Real-Time Protection. Safe Online Banking & Shopping.

Botnets: major players in the shadows. Author Sébastien GOUTAL Chief Science Officer

KASPERSKY SECURITY FOR MICROSOFT OFFICE s are sent every second. It only takes one to bring down your business.

Safety and Security. April 2015

Web Mail and e-scout Instructions

How to Build a Culture of Security

Best Practices Guide to Electronic Banking

Unit 2 Assignment 2. Software Utilities?

to Stay Out of the Spam Folder

Choic Anti-Spam Quick Start Guide

Security Gap Analysis: Aggregrated Results

WITH INTEGRITY

Bank of america report phishing

It is my great pleasure to inform that you have won the latest model of Ferrari Car and 4 Bed Room Villa in Palm Jumeirah for attending this Seminar

Top 10 Global Threat Rank by Source

Security Protection

SECURING INFORMATION SYSTEMS

WHITEPAPER: Remote workers and mobility. Remote workers and mobility

Conveying Emotion. Chapter 12: Computers In Polite Society: Social Implications of IT. Improving the Effectiveness of . Problems with

Student E-Safety Induction

Symantec Protection Suite Add-On for Hosted Security

Download firefox with virus protection

Symantec Hosted Mail Security Console and Spam Quarantine User s Guide

How to Stay Compliant with SMS Marketing

ONLINE SAFETY. Messaging, , Vlogging and Sexting

FACTS WHAT DOES FARMERS STATE BANK DO WITH YOUR PERSONAL INFORMATION? WHY? WHAT? HOW? L QUESTIONS?

Best Practice Guide. Encryption and Secure File Transfer

Transcription:

>MESSAGELABS END USER IT SECURITY GUIDE >WHAT STEPS CAN YOU TAKE TO KEEP YOURSELF, YOUR COLLEAGUES AND YOUR COMPANY SAFE ONLINE?

>CONTENTS >WHAT IS MESSAGING AND WEB SECURITY? >P1 >EMAIL THREATS >P1 >VIRUSES >P1 >SPAM >P1 >PHISHING >P2 >DOS & DON TS >P3 >WEB THREATS >P4 >SPYWARE >P4 >DOS & DON TS >P4 >IM THREATS >INSTANT MESSAGING >P5 >DOS & DON TS >P5

>WHAT IS MESSAGING AND WEB SECURITY? AND WHY IS IT IMPORTANT? Email, the web and instant messaging are all important methods of communicating and exchanging vital business information. While the benefits of these technologies are great, enabling us to communicate and exchange information with practically anyone, they also present a real threat to our security, productivity and profitability. This short guide to messaging and web security outlines the main dangers and the steps you can take to make sure you and your company stay secure. >EMAIL THREATS AND HOW TO PROTECT AGAINST THEM >VIRUSES Viruses are one of the most common threats from email. You may also have heard the terms worm or trojan, these are essentially different types of viruses. In essence, a virus is a program or programming code that replicates itself by being copied, or initiating its own copying, to another program, document or part of your computer. >MYDOOM >EMAIL WORM Most viruses spread by enticing people to open an innocent looking email and/or attachment, which actually contains the virus. Viruses are particularly dangerous because they often arrive in emails from people you know, sending themselves on to all of the people in your address book. >SPAM Billions of spam emails are sent every day, making it a huge problem. Spam has become such a familiar, not to mention annoying, feature of the email landscape that it s easy to forget the damage it does to a business. >RUSSIAN3 >SUBJECT: EVER HEARD THAT YOU RE GETTING FAT? >TEXT AND IMAGE-BASED SPAM Put simply, spam is no longer just a nuisance. It significantly affects business efficiency and productivity. Think of the amount of time you spend during the course of a year identifying and deleting spam emails. These messages clog up your inbox, requiring more expense and effort to safeguard against the relentless tide of spam. ALL IMAGES ARE GENERATED USING SOURCE CODE FROM ACTUAL THEATS PAGE 1

>PHISHING A phishing email is designed to look like a genuine email from your bank or other financial institution. However, it will in fact lure you to a fraudulent website where you will be asked to enter your bank account or credit card details. Phishing emails are particularly dangerous because they are a social engineering technique and will in many cases look like the real thing. Remember, no bank or financial institution will ever ask you to confirm your account number and login details in an email. >PHISHING5 >SUBJECT: ACCOUNT NOTIFICATION! The email design is spoofed to resemble a well known brand (in this example we have simulated a bank) Phishing emails will often direct you to a false site and ask you to confirm your account information The false site is made to look like the real website The web address is actually a graphic, overlaid onto the screen to make you think it s the correct address A graphic simulates the padlock symbol ALL IMAGES ARE GENERATED USING SOURCE CODE FROM ACTUAL THEATS PAGE 2

>DOS & DON TS: Do make sure you download the latest security updates. Do look out for words or language used which would not actually be used by the sender. Don t open it if you think you have received a virus, don t open it or even view it using your email preview pane. Do report any viruses to your IT department and/or delete them immediately. Don t open or forward a spam email, delete it immediately. Don t reply to spam, or any email you are unsure about, even if it s to unsubscribe this will only validate your email address to the sender. Do ignore delivery failure receipts for messages you didn t send. Do consider having a secondary email address this can be used when filling out registration forms, surveys, subscribing to newsletters etc. Don t open an unsolicited message unless it is from someone you know and trust. This rule applies to avoiding security breaches in general don t forget that spam can contain viruses and other malicious software. Don t post your email address on your website or in newsgroups many spammers trawl the Internet for as many addresses as they can find. Don t give your email address to anyone or any website you don t trust. Don t click on any of the links in a suspicious email. Do delete any potential phishing email immediately. Do contact your bank or financial institution if you can t be certain whether an email seemingly from them is genuine. PAGE 3

>WEB THREATS AND HOW TO PROTECT AGAINST THEM >SPYWARE >GHOST >KEYLOGGER Spyware is a catch-all term for unwanted software that either secretly monitors your online activity to aid advertising and marketing, or in its more sinister form steals private information from your PC. This can include searching for your banking details, logging your key strokes, or even allowing outsiders to control your computer. Spyware can get onto your computer in a number of ways; downloading seemingly legitimate software or freeware on the web, clicking agree to the small print of a download form, signing up for a new tool bar, smiles or similar offer, or even just visiting a particularly unscrupulous site, can all lead to you falling victim. Spyware is a major risk because it isn t easy to detect and can do untold damage before being discovered. Some telltale signs that you have spyware on your computer include: regular pop ups appearing, your computer running slowly, or automatically being directed to a site you didn t want to visit every time you go online. Your IT department will be able to tell immediately if you have spyware on your computer. If you are in any doubt, contact them at once. >DOS & DON TS: Do comply with your company s acceptable usage policy. Do make sure your browser is up-to-date with the latest security patches. Do only visit websites you know and trust. Don t follow links to sites from email or instant messages that you are not sure of. Do check the destination of links. If you hover your cursor over a link it will highlight the destination in the bottom left of your browser window. Do be careful if you use social networking sites like Facebook, LinkedIn or MySpace. Be very wary of friend requests from people you don t know. Many unsolicited friend requests are bogus and will try to lure you into downloading spyware. Do contact your IT department immediately if you think you have spyware on your computer. ALL IMAGES ARE GENERATED USING SOURCE CODE FROM ACTUAL THEATS PAGE 4

>IM THREATS AND HOW TO PROTECT AGAINST THEM >INSTANT MESSAGING As instant messaging (IM) becomes more popular, the risks of using it have increased dramatically. IM systems can receive attachments either containing, or linking to, malware or spyware in just the same way as email. In fact IM can be even more dangerous because it is even more immediate. >DOS & DON TS: >ROGUEWARE SPYSHERIFF >FAKE ANTI-SPYWARE PROGRAM Don t follow links sent to you by IM. If you must follow a link, cut and paste it into your Internet browser. Do be wary of IM from friends or colleagues that direct you to a website. Their computer may be infected with a virus that sends out these messages. For more information on any of the web and messaging security threats detailed in this guide, and for a copy of your company s email and web acceptable usage policy, please contact your IT department. ALL IMAGES ARE GENERATED USING SOURCE CODE FROM ACTUAL THEATS PAGE 5

>WWW.MESSAGELABS.COM >INFO@MESSAGELABS.COM >FREEPHONE US +1 866 460 0000 Americas AMERICAS HEADQUARTERS 512 Seventh Avenue 6th Floor New York, NY 10018 USA T +1 646 519 8100 F +1 646 452 6570 CENTRAL REGION 7760 France Avenue South Suite 1100 Bloomington, MN 55435 USA T +1 952 830 1000 F +1 952 831 8118 Asia Pacific HONG KONG 1601 Tower II 89 Queensway Admiralty Hong Kong T +852 2111 3650 F +852 2111 9061 AUSTRALIA Level 14 90 Arthur Street North Sydney NSW 2060 Australia T +61 2 9409 4360 F +61 2 9955 5458 SINGAPORE Level 14 Prudential Tower 30 Cecil Street Singapore 049712 T +65 6232 2855 F +65 6232 2300 Europe HEADQUARTERS 1270 Lansdowne Court Gloucester Business Park Gloucester, GL3 4AB United Kingdom T +44 (0) 1452 627 627 F +44 (0) 1452 627 628 LONDON 3rd Floor 1 Great Portland Street London, W1W 8PZ United Kingdom T +44 (0) 207 291 1960 F +44 (0) 207 291 1937 NETHERLANDS Teleport Towers Kingsfordweg 151 1043 GR Amsterdam Netherlands T +31 (0) 20 491 9600 F +31 (0) 20 491 7354 BELGIUM / LUXEMBOURG Culliganlaan 1B B-1831 Diegem Belgium T +32 (0) 2 403 12 61 F +32 (0) 2 403 12 12 DACH Feringastraße 9 85774 Unterföhring Munich Germany T +49 (0) 89 189 43 990 F +49 (0) 89 189 43 999 PAGE 6