Title: Internet Security Protect your computer in 4 steps.
1Internet SecurityProtect your computer in 4
steps.
Bits, Bytes Chips
Presented by
2Step 1. Keep your firewall turned on
- A firewall is a software program or piece of
hardware that helps screen out hackers, viruses,
and worms that try to reach your computer over
the Internet. - A firewall helps protect your computer from
hackers who might try to delete information, make
your computer crash, or even steal personal
information such as passwords or credit card
numbers. You should make sure your firewall is
always turned on. - if you have a small-office network, it is
important to protect every computer. You should
have a hardware firewall (such as a router)
3How Firewalls Work
- When someone on the Internet or on a network
tries to connect to your computer, the attempt is
called an "unsolicited request." When your
computer gets an unsolicited request, Firewalls
block the connection. If you run a program such
as an instant messaging program or a multiplayer
network game that needs to receive information
from the Internet or a network, the firewall asks
if you want to block or unblock (allow) the
connection.
4Step 2. Keep your operating system up-to-date
- High priority updates are critical to the
security and reliability of your computer. They
offer the latest protection against malicious
online activities. Microsoft provides new
updates, as necessary, on the second Tuesday of
the month. - Automatic Updates is the easiest, most reliable
way to help protect your computer from the latest
Internet threats by delivering security updates
right to your computer automatically.
5Step 3. Use updated antivirus software
- Viruses are usually malicious software. You need
antivirus technology to help prevent viruses, and
you need to keep it regularly updated. - Here are a few primary indicators that your
computer might be infected - Your computer runs more slowly than normal
- Your computer stops responding or locks up often
- Your computer crashes and restarts every few
minutes - Your computer restarts on its own and then fails
to run normally - Applications on your computer don't work
correctly - Disks or disk drives are inaccessible
- You can't print correctly
- You see unusual error messages
- You see distorted menus and dialog boxes
6Step 4. Use updated antispyware technology
- Spyware is usually malicious software. You need
antispyware technology to help prevent spyware,
and you need to keep it regularly updated. - Spyware is a general term used to describe
software that performs certain behaviors such as
advertising, collecting personal information, or
changing the configuration of your computer,
generally without appropriately obtaining your
consent first.
7Internet Safety Guidelines
- Recognize phishing scams and fake e-mails
- Phishing is a type of deception designed to steal
your valuable personal data, such as credit card
numbers, passwords, account data, or other
information. - Con artists might send millions of fraudulent
e-mail messages that appear to come from Web
sites you trust, like your bank or credit card
company, and request that you provide personal
information.
8Internet Safety Guidelines
- How to handle suspicious e-mail
- If you think you've received a phishing e-mail
message, do not respond to it. - Report suspicious e-mail to the faked or
"spoofed" organization. - Contact the organization directlynot through the
e-mail you receivedand ask for confirmation. Or
call the organization's toll-free number and
speak to a customer service representative.
Report the e-mail to the proper authorities,
including the FBI, the Federal Trade Commission
(FTC), and the Anti-Phishing Working Group. For
more information on how to report phishing scams,
read What to do if you've responded to a phishing
scam. - Don't click links in e-mail messages.
9Internet Safety Guidelines(continued)
- If you need to update your account information or
change your password, visit the Web site by using
your personal bookmark or by typing the URL
directly into your browser. - Check the security certificate before you enter
personal or financial information into a Web
site. - Links in phishing e-mail messages often take you
to phony sites that encourage you to transmit
personal or financial information to con artists.
Avoid clicking a link in an e-mail message unless
you are sure of the destination. Even if the
address bar displays the correct Web address,
don't risk being fooled. Con artists can display
a fake URL in the address bar on your browser.
Type addresses directly into your browser or use
your personal bookmarks. - Make sure the site is secure before you type.
10Anti-spam and anti-phishing technologies
- Microsoft Phishing Filter
- Use e-mail software that filters spam
- Look at some of the key phrases used to get you
to respond to a fake email.
11Watch for Key Phishing Words
- "Verify your account.
- "If you don't respond within 48 hours, your
account will be closed. - "Dear Valued Customer.
- "Click the link below to gain access to your
account. - Slightly modified URLs
- www.micosoft.com www.mircosoft.com
www.verify-microsoft.com
12Protect your personal information
- Create strong passwords
- Make it lengthy
- Combine letters, numbers, and symbols
- Avoid your login name
- Test your password at http//www.microsoft.com/ath
ome/security/privacy/password_checker.mspx - Use online payment services
- Use a third-party payment service to pay for
things online
13Beyond the basics, how to protect yourself and
your data.
- ID theft
- Social engineering is a way for criminals to gain
access to your computer. The purpose of social
engineering is usually to secretly install
spyware or other malicious software or to trick
you into handing over your passwords or other
sensitive financial or personal information. - Use Strong Passwords
- Recognize Spam and Phishing
14Phishing!
- Phishing is a form of Internet fraud that aims
to steal valuable information such as credit
cards, social security numbers, user IDs and
passwords - Refers to the stealing of personal identifiers
such as Pin numbers, Credit card numbers and
passwords via a spoof web site or email.
15Spam
- Unsolicited, unwanted, irrelevant, or
inappropriate messages, especially commercial
advertising in mass quantities - Spam also eats up a lot of network bandwidth
16Mobile devices and wireless5 safety tips for
using a public computer
- Don't save your logon information. Always log out
of Web sites by clicking "log out" on the site.
It's not enough to simply close the browser
window or type in another address - Don't leave the computer unattended with
sensitive information on the screen. - Erase your tracks
- Heres how
17How to remove your presence.
- To disable the feature that stores
passwordsBefore you go to the Web, turn off the
Internet Explorer feature that "remembers" your
passwords.1. In Internet Explorer, click Tools,
and then click Internet Options.2. Click the
Content tab, and then click AutoComplete.3.
Click to clear both check boxes having to do with
passwords.To delete your temporary Internet
files and your historyWhen you finish your use
of a public computer, you should delete all the
temporary files and your Internet history.1. In
Internet Explorer, click Tools, and then click
Internet Options.2. On the General tab, under
Temporary Internet files, click Delete Files, and
then click Delete Cookies.3. Under History,
click Clear History.
185 safety tips for using a public computer
(continued)
- Watch for over-the-shoulder snoops.
- Don't enter sensitive information into a public
computer. These measures provide some protection
against casual hackers who use a public computer
after you have. - If you really want to be safe, avoid typing your
credit card number or any other financial or
otherwise sensitive information into any public
computer.
19Malware
- Software designed to infiltrate or damage a
computer system without the owner's informed
consent - It can hijack your browser, redirect your search
attempts, serve up nasty pop-up ads, track what
web sites you visit - Usually poorly-programmed and can cause a
computer to become unbearably slow and unstable - Can reinstall themselves even after you think you
have removed them
20Lets Review.
- Keep your operating system current with the most
recent updates. - Use a Firewall
- Use an Anti-Virus program and keep it updated.
- Use an Anti-Spyware program and keep it updated.
- Use an Anti-Spam program and keep it updated.
21Where do I get the tools I need?
- Many ISPs provide Anti-Virus with your
subscription. Comcast, Embarq, AOL just to name a
few. BUT! It must be downloaded and installed. - There are many Anti-Spyware programs but
Microsoft makes Windows Defender available at no
charge to users of Windows XP and it is included
in Vista.
22Where do I get the tools I need?
- Many companies offer Anti-Phishing capabilities
but Microsoft includes it in Internet Explorer 7. - Firewalls are often a feature of Anti-virus
programs but if not, turn on the Windows Firewall
built into XP and Vista. - And finally, the most powerful protection
available!
23Where do I get the tools I need?
- Common Sense.
- If it sounds to good to be true..
- If the program is FREE, read the EULA
- Do not respond to bogus Emails
- Do not click on links in Emails to other sites
- Passwords, Passwords, Passwords
- Watch for encryption signals. Padlocks and
Certificates.
24Court Nederveld 626-3285
- Hardware Repair and Support
- Software Installation
- Firmware Upgrades
- Virus Removal
- Email
- Internet Setup
- Memory Upgrade
- Training
- Ebay, Clean out your garage!
- Networks
- Data Backup
- Remote Support Available
- Billing Services
- Website Construction
- Spyware Removal
- Onsite Repairs
- Mailing Lists
- Online Shopping Carts
House Calls!