Internet Security Protect your computer in 4 steps. - PowerPoint PPT Presentation

1 / 24
About This Presentation
Title:

Internet Security Protect your computer in 4 steps.

Description:

... the firewall asks if you want to block or unblock (allow) the connection. ... Website Construction. Spyware Removal. Onsite Repairs. Mailing Lists. Online ... – PowerPoint PPT presentation

Number of Views:150
Avg rating:3.0/5.0
Slides: 25
Provided by: bitsandby
Category:

less

Transcript and Presenter's Notes

Title: Internet Security Protect your computer in 4 steps.


1
Internet SecurityProtect your computer in 4
steps.
Bits, Bytes Chips
  • Court Nederveld

Presented by
2
Step 1. Keep your firewall turned on
  • A firewall is a software program or piece of
    hardware that helps screen out hackers, viruses,
    and worms that try to reach your computer over
    the Internet.
  • A firewall helps protect your computer from
    hackers who might try to delete information, make
    your computer crash, or even steal personal
    information such as passwords or credit card
    numbers. You should make sure your firewall is
    always turned on.
  • if you have a small-office network, it is
    important to protect every computer. You should
    have a hardware firewall (such as a router)

3
How Firewalls Work
  • When someone on the Internet or on a network
    tries to connect to your computer, the attempt is
    called an "unsolicited request." When your
    computer gets an unsolicited request, Firewalls
    block the connection. If you run a program such
    as an instant messaging program or a multiplayer
    network game that needs to receive information
    from the Internet or a network, the firewall asks
    if you want to block or unblock (allow) the
    connection.

4
Step 2. Keep your operating system up-to-date
  • High priority updates are critical to the
    security and reliability of your computer. They
    offer the latest protection against malicious
    online activities. Microsoft provides new
    updates, as necessary, on the second Tuesday of
    the month.
  • Automatic Updates is the easiest, most reliable
    way to help protect your computer from the latest
    Internet threats by delivering security updates
    right to your computer automatically.

5
Step 3. Use updated antivirus software
  • Viruses are usually malicious software. You need
    antivirus technology to help prevent viruses, and
    you need to keep it regularly updated.
  • Here are a few primary indicators that your
    computer might be infected
  • Your computer runs more slowly than normal
  • Your computer stops responding or locks up often
  • Your computer crashes and restarts every few
    minutes
  • Your computer restarts on its own and then fails
    to run normally
  • Applications on your computer don't work
    correctly
  • Disks or disk drives are inaccessible
  • You can't print correctly
  • You see unusual error messages
  • You see distorted menus and dialog boxes

6
Step 4. Use updated antispyware technology
  • Spyware is usually malicious software. You need
    antispyware technology to help prevent spyware,
    and you need to keep it regularly updated.
  • Spyware is a general term used to describe
    software that performs certain behaviors such as
    advertising, collecting personal information, or
    changing the configuration of your computer,
    generally without appropriately obtaining your
    consent first.

7
Internet Safety Guidelines
  • Recognize phishing scams and fake e-mails
  • Phishing is a type of deception designed to steal
    your valuable personal data, such as credit card
    numbers, passwords, account data, or other
    information.
  • Con artists might send millions of fraudulent
    e-mail messages that appear to come from Web
    sites you trust, like your bank or credit card
    company, and request that you provide personal
    information.

8
Internet Safety Guidelines
  • How to handle suspicious e-mail
  • If you think you've received a phishing e-mail
    message, do not respond to it.
  • Report suspicious e-mail to the faked or
    "spoofed" organization.
  • Contact the organization directlynot through the
    e-mail you receivedand ask for confirmation. Or
    call the organization's toll-free number and
    speak to a customer service representative.
    Report the e-mail to the proper authorities,
    including the FBI, the Federal Trade Commission
    (FTC), and the Anti-Phishing Working Group. For
    more information on how to report phishing scams,
    read What to do if you've responded to a phishing
    scam.
  • Don't click links in e-mail messages.

9
Internet Safety Guidelines(continued)
  • If you need to update your account information or
    change your password, visit the Web site by using
    your personal bookmark or by typing the URL
    directly into your browser.
  • Check the security certificate before you enter
    personal or financial information into a Web
    site.
  • Links in phishing e-mail messages often take you
    to phony sites that encourage you to transmit
    personal or financial information to con artists.
    Avoid clicking a link in an e-mail message unless
    you are sure of the destination. Even if the
    address bar displays the correct Web address,
    don't risk being fooled. Con artists can display
    a fake URL in the address bar on your browser.
    Type addresses directly into your browser or use
    your personal bookmarks.
  • Make sure the site is secure before you type.

10
Anti-spam and anti-phishing technologies
  • Microsoft Phishing Filter
  • Use e-mail software that filters spam
  • Look at some of the key phrases used to get you
    to respond to a fake email.

11
Watch for Key Phishing Words
  • "Verify your account.
  • "If you don't respond within 48 hours, your
    account will be closed.
  • "Dear Valued Customer.
  • "Click the link below to gain access to your
    account.
  • Slightly modified URLs
  • www.micosoft.com www.mircosoft.com
    www.verify-microsoft.com

12
Protect your personal information
  • Create strong passwords
  • Make it lengthy
  • Combine letters, numbers, and symbols
  • Avoid your login name
  • Test your password at http//www.microsoft.com/ath
    ome/security/privacy/password_checker.mspx
  • Use online payment services
  • Use a third-party payment service to pay for
    things online

13
Beyond the basics, how to protect yourself and
your data.
  • ID theft
  • Social engineering is a way for criminals to gain
    access to your computer. The purpose of social
    engineering is usually to secretly install
    spyware or other malicious software or to trick
    you into handing over your passwords or other
    sensitive financial or personal information.
  • Use Strong Passwords
  • Recognize Spam and Phishing

14
Phishing!
  • Phishing is a form of Internet fraud that aims
    to steal valuable information such as credit
    cards, social security numbers, user IDs and
    passwords
  • Refers to the stealing of personal identifiers
    such as Pin numbers, Credit card numbers and
    passwords via a spoof web site or email.

15
Spam
  • Unsolicited, unwanted, irrelevant, or
    inappropriate messages, especially commercial
    advertising in mass quantities
  • Spam also eats up a lot of network bandwidth

16
Mobile devices and wireless5 safety tips for
using a public computer
  • Don't save your logon information. Always log out
    of Web sites by clicking "log out" on the site.
    It's not enough to simply close the browser
    window or type in another address
  • Don't leave the computer unattended with
    sensitive information on the screen.
  • Erase your tracks
  • Heres how

17
How to remove your presence.
  • To disable the feature that stores
    passwordsBefore you go to the Web, turn off the
    Internet Explorer feature that "remembers" your
    passwords.1. In Internet Explorer, click Tools,
    and then click Internet Options.2. Click the
    Content tab, and then click AutoComplete.3.
    Click to clear both check boxes having to do with
    passwords.To delete your temporary Internet
    files and your historyWhen you finish your use
    of a public computer, you should delete all the
    temporary files and your Internet history.1. In
    Internet Explorer, click Tools, and then click
    Internet Options.2. On the General tab, under
    Temporary Internet files, click Delete Files, and
    then click Delete Cookies.3. Under History,
    click Clear History.

18
5 safety tips for using a public computer
(continued)
  • Watch for over-the-shoulder snoops.
  • Don't enter sensitive information into a public
    computer. These measures provide some protection
    against casual hackers who use a public computer
    after you have.
  • If you really want to be safe, avoid typing your
    credit card number or any other financial or
    otherwise sensitive information into any public
    computer.

19
Malware
  • Software designed to infiltrate or damage a
    computer system without the owner's informed
    consent
  • It can hijack your browser, redirect your search
    attempts, serve up nasty pop-up ads, track what
    web sites you visit
  • Usually poorly-programmed and can cause a
    computer to become unbearably slow and unstable
  • Can reinstall themselves even after you think you
    have removed them

20
Lets Review.
  • Keep your operating system current with the most
    recent updates.
  • Use a Firewall
  • Use an Anti-Virus program and keep it updated.
  • Use an Anti-Spyware program and keep it updated.
  • Use an Anti-Spam program and keep it updated.

21
Where do I get the tools I need?
  • Many ISPs provide Anti-Virus with your
    subscription. Comcast, Embarq, AOL just to name a
    few. BUT! It must be downloaded and installed.
  • There are many Anti-Spyware programs but
    Microsoft makes Windows Defender available at no
    charge to users of Windows XP and it is included
    in Vista.

22
Where do I get the tools I need?
  • Many companies offer Anti-Phishing capabilities
    but Microsoft includes it in Internet Explorer 7.
  • Firewalls are often a feature of Anti-virus
    programs but if not, turn on the Windows Firewall
    built into XP and Vista.
  • And finally, the most powerful protection
    available!

23
Where do I get the tools I need?
  • Common Sense.
  • If it sounds to good to be true..
  • If the program is FREE, read the EULA
  • Do not respond to bogus Emails
  • Do not click on links in Emails to other sites
  • Passwords, Passwords, Passwords
  • Watch for encryption signals. Padlocks and
    Certificates.

24
Court Nederveld 626-3285
  • Hardware Repair and Support
  • Software Installation
  • Firmware Upgrades
  • Virus Removal
  • Email
  • Internet Setup
  • Memory Upgrade
  • Training
  • Ebay, Clean out your garage!
  • Networks
  • Data Backup
  • Remote Support Available
  • Billing Services
  • Website Construction
  • Spyware Removal
  • Onsite Repairs
  • Mailing Lists
  • Online Shopping Carts

House Calls!
Write a Comment
User Comments (0)
About PowerShow.com