Top Banner
Home And Small Business Computer Security Practical Tips You Can Use to Protect Your Identity, Your Computer and Your Network from Attack
47

Internet and PC Security Workshop 2014

Jan 14, 2015

Download

Technology

PC and Internet Security for home and small business computers
This is a presentation created for Dayton SCORE workshops by CTDayton and B2BPlanner on how to securely use the internet to protect private information and avoid identity theft.
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Internet and PC Security Workshop 2014

Home And Small Business Computer Security

Practical Tips You Can Use to Protect Your Identity, Your Computer and Your Network

from Attack

Page 2: Internet and PC Security Workshop 2014

Art Helmstetter OhioBusinessHelp.com

Cliff Brust –CTDayton.com

• Started and Grew two businesses

• 35 years - business experience

• Education:

MBA, BS & MS Engineering,

• Trainer for Web-Based Marketing Course

• Owner B2BPlanner Ltd – business coach

About Us:

• 35 years computer experience

• Owner Computer Troubleshooters

• Education

BS Computer Science UD

• Inventor on three patents

• Edison Technology Award

Page 3: Internet and PC Security Workshop 2014

Don’t Be A Target!Home PC Security Part I

Are YOU at Risk?

Page 4: Internet and PC Security Workshop 2014

You are at risk if

Your kids use your computer You travel with your computer and

use WiFi Personal & financial information are

on your computer Business files are on your computer Family pictures and videos are on

your computerWhat would happen if your computer was gone tomorrow?

Page 5: Internet and PC Security Workshop 2014

Home Computer Cyber-Security

What is Cyber-Security?

Protecting your computer, your network, and your

information from at-home and online threats

What is Cyber-Crime?

Any crime conducted via the Internet to cause

damage and/or steal personal information

Page 6: Internet and PC Security Workshop 2014

Cyber-Crime Target The Home Computer

Why do hackers hack? Lot’s of money to be stolen To collect information! Information used to directly steal money, and identity theft

Why attack the home computer? Home computer = information! Least secure in general Unwary users

Page 7: Internet and PC Security Workshop 2014

Avenues That Subject You to Attack

Hardware Unsecured Wi-Fi (think Panera) No Router Router with default password

Software No anti-virus/anti-spyware No Firewall Old virus definitions Out of date Windows O.S.

Personal Behavior Failure to use strong passwords Clicking on unsafe links or emails Downloading questionable files Leaving computer logged on Leaving your computer accessible

Page 8: Internet and PC Security Workshop 2014

Cost of Getting A Virus

Virus Type

Impact Solution Cash Cost

Minor Virus

Lose some data2- 4 hours

Use installed anti-virus

$75-100

Major Virus

Loss of docs 5-10 hours

Use service to remove

$100-$130

Catastrophic Virus

Loss of ALL data & photos15+ hours

Use service to wipe & reload entire system

$150-175

What is YOUR time worth? $25, $50 $75?

Page 10: Internet and PC Security Workshop 2014

Multiple Defenses In Layers of Protection)

Router

Firewall

SPAM Filter

Web Filter

Anti-Malware

You!

BackupYOUR INFO!

Passwords

1

23

4. 5

.

6.

Conceal

Deny

Detect

Filter

Decide

Page 11: Internet and PC Security Workshop 2014

A Safe Network Uses a Router

GOODBAD

Page 12: Internet and PC Security Workshop 2014

Router Firewall

• Closes and locks “open doors”

• Keeps intruders and unknowns out

• Allows the recognized & trusted in

• Not perfect, Cyber-criminals exploit trusted doors

• May block desired sites

Page 13: Internet and PC Security Workshop 2014

Setting Up Router Access Password

Access Router via your web browser

Enter your Routers IP Address

Enter the default username & password

Find administration settings

Select Change/Reset Password

Tip: Default Usernames/Passwords for most routers can be found at this web site: http://portforward.com/default_username_password

Page 14: Internet and PC Security Workshop 2014

Password Protection

Rule #1 Always require a password to access your computer

Why? Prevents unauthorized access Provides a first line of defense Prevents easy access from a

network

TIP: Set up the automatic lockout for when you leave your computer that requires a

password. A good timeout value is 5 to 10 minutes.

Page 15: Internet and PC Security Workshop 2014

Good Password Procedures

ALWAYS Password protect your computer

Lock you cell phone Use strong passwords –

12 characters, letters, numbers and symbols Use a “coded” phrase you can remember

Do not store passwords electronically Do not write them down Use password vault plugin such as

“Lastpass”

Page 16: Internet and PC Security Workshop 2014

Encryption Protection

Encryption makes files and data unreadable to anyone that does not have the encryption key

You can encrypt: Entire Computer A Disk Volume Files & Folders

Protects against theft and unauthorized access

Page 17: Internet and PC Security Workshop 2014

SPAM

URL

Filters

SPAM Filters Keeps out email

from unknown senders

Catches majority of SPAM

Catches non-SPAM Allows known

email SPAM Filters aren’t

perfect!

WEB Filters Prohibits bad websites Pre-examines website

content and warns you

Catches good websites

Allows known websites

Web filters aren’t perfect!

Page 18: Internet and PC Security Workshop 2014

Malware Protection

• Anti-Virus & Anti-Malware Programs

• Scans email, attachments files, & downloads

• Detects threats and Removes them

• Not perfect, does not detect everything, cannot remove all threats

Page 19: Internet and PC Security Workshop 2014

Most Important Is You

You are the last line of defenseAfter all the layers of protection, you are the decision maker

Educate yourself, Google it!When in doubt DENY !!!Do I Open it?

Do I Allow it?

Home PC Security Part III

Page 20: Internet and PC Security Workshop 2014

SCAM 101 - Fake Anti-Virus Program

http://www.youtube.com/watch?v=xxDm_sKhIBM

Page 22: Internet and PC Security Workshop 2014

Internet Threats

Type Source Purpose ProtectionVirus Email

AdsLinksWarningsUpdates

Malicious attackDisable your computerDestroy your data

Anti-virus softwareFirewall softwareFirewall hardwareData back-up

Phishing

EmailWebsite

Steal Identity or money

Surfing behavior

Adware Ads Virus delivery, steal information

Good practices

Spyware

Steal personal information

Anti-spyware & firewall software

Tip: Have both Anti-Virus AND Anti-Spyware installed on your computer..

But DO NOT install two anti-virus programs.

Page 23: Internet and PC Security Workshop 2014

Phishing, Pharming, Vishing and Smishing

These scams will come in the form of: Email (phishing) Website (pharming) Phone Call (vishing) Text Message (smishing) A Combination of These

Page 24: Internet and PC Security Workshop 2014

Phishing, Pharming, Vishing and Smishing

Similar variations on a theme

Identity Theft is their goal

Tip: If you don’t see a “padlock” symbol or “https” on your browser address bar, the site is not secure for

personal or private information. Don’t enter any!

May direct you to call a number to “unlock” or “reactivate” your account by entering personal info

May direct you to a website to enter personal info

Page 25: Internet and PC Security Workshop 2014

Email Phishing Warning Flags

Requests personal information?

Contains grammatical errors or misspellings?

How do they address you? Is it too good to be true? Have you checked the link?

Tip: You can “Mouse Over” a link and check a website Does the website URL look legitimate?

Tip: Legitimate companies will NEVER ask you for personal or confidential information via email, a website, telephone, or

text message.

Page 26: Internet and PC Security Workshop 2014

Websites

Tip: When installing programs pay attention to installation options. They make you think

you’re declining, but you’re approving!

Beware of search engine results

Do not download unknown or free software

“Unclick”/DECLINE any OPTIONAL Downloads or Toolbars

Use Sucuri Site Check

http://sitecheck.sucuri.net/

Page 27: Internet and PC Security Workshop 2014

Browser Security Settings

Tip: Don’t use your browser to store passwords, not secure.

Page 28: Internet and PC Security Workshop 2014

Identity Theft on Social Media

Do NOT friend, link, or message people you don’t know

Do not allow untrusted applications to access your account

Do not click on posted videosNEVER POST

• You or your family’s full birthdates or places of birth

• Your mother’s maiden name

• The names of young family members

• Your relationship status

Page 29: Internet and PC Security Workshop 2014

Identity Theft on Social Media

NEVER POST

Your vacation plans

Your home address

Your current location

That your home alone

Pictures of kids/grandkids tagged with their names

A description of your home

Page 30: Internet and PC Security Workshop 2014

Diagnosis and Action If you get a virusHome PC Security Part IV

Page 32: Internet and PC Security Workshop 2014

Signs of Infection

Boots very slowly or hangs up Responds slowly, crashes Programs won’t run or crash Popups, website redirection Broken antivirus or security

Tip: You can “right click” on the task bar and select the “Task Manager” to see the memory and CPU usage that is currently taking place on your computer. Should not be constantly 100%.

Page 33: Internet and PC Security Workshop 2014

You Have a Virus!(what do you do now?)

Tip:

A foolproof way to keep a virus from

stealing your personal info - disconnect the network cable or turn off the Wi-Fi. THEN

take action.

Page 34: Internet and PC Security Workshop 2014

Serious Infections Need Professional Help

(When to call for help) Anti-virus can’t remove it

Computer is not unusable

Your files are missing

You must manually edit Windows

Your not absolutely sure your actions won’t make matters worse!

Page 36: Internet and PC Security Workshop 2014

Back-up Options

External Hard Drive Backup Windows Backup Time Machine (Mac)

Cloud Backup Carbonite CrashPlan

File Sync Service (not really a backup)

Dropbox Google Drive

REGULAR BACKUPJUST DO IT.

Page 37: Internet and PC Security Workshop 2014

How to Backup Windows 7

Page 38: Internet and PC Security Workshop 2014

Be Careful Not to Overwrite Information

Keeps Current File

Keeps Current File & Adds File from

Backup

Overwrites Current File

Page 39: Internet and PC Security Workshop 2014

Final Notes on Windows 7 Backup

Backup saves/restores just YOUR data files

Backup also creates a separate system image for restoring programs & Windows Overwrites EVERYTHING when restored Can only be used if the system repair

disk was created

Page 40: Internet and PC Security Workshop 2014

Infection Prevention

Prevention begins and ends with you

Never use pirate websites for apps, music, movies or games (e.g. www.piratebay.com) Loaded with adware/spyware/viruses Opening these will infect your computer Much of these sites content is illegal

Page 41: Internet and PC Security Workshop 2014

Avoid the “RISK” In Your Email

R eceived Before?

I nside Links?

S ensible Message?

K now sender?

This email link delivers a Trojan

Virus right to your computer

Page 42: Internet and PC Security Workshop 2014

“STOP Virus Infection From Downloads

S ource of file?

T ype & size of file?

O thers recommend?

P repared to scan?

This is a fake anti-virus program. Once loaded it claims your computer is infected and directs you to a website to buy the program via credit card.

Page 43: Internet and PC Security Workshop 2014

Tips for Using the Internet

Only login or send personal information to websites you know are encrypted

A website is encrypted when you see a “lock” symbol or https://

Beware of websites using encryption only on the login page

Page 44: Internet and PC Security Workshop 2014

Tips for Using the Internet

Don't stay signed in to accounts When you are done, log out

Don’t do sensitive business on public WiFi Don’t use the same password, vary it e.g. H1T0w3r! / P@$$w0rd!! / !P@inT3r! Keep your browser(s) and plug-ins up-to-

date Keep Windows up to date

Page 45: Internet and PC Security Workshop 2014

Five things you MUST do

1. Regularly Backup of your files and data2. Use a Router, it hides your computer/network3. Make sure the Windows Firewall is enabled4. Use strong passwords on your Router and

Computer5. Use anti-virus/anti-spyware to detect/remove

malware

And, practice safe surfing: if you aren’t sure, don’t click!

Tip: By protecting your computer, hackers and Internet criminals “move on” to easier targets. Stay vigilant!

Page 46: Internet and PC Security Workshop 2014

Minimum Cost of Prevention

Hardware orSoftware

Cost of Requir

ed

Suggested Source

Router $50 Various – Netgear, Linksys, Belcan, et. Al.

Cloud drive backup or

External Hard Drive

$60/year or

$75 once

Carbonite - www.carbonite.comor

Windows Backup Software

Anti-Virus $40/year AVG Antivirus – www.avg.com

Firewall $0 Windows Firewall

Anti-Spyware $0 Malwarebytes – www.malwarebytes.org

Anti-spam $0 Built in to Apple Mail & Outlook, need setup

Password vault $0 Great, but dangerous - Lastpass

Total cost $150 -$165

Do it yourself cost (Complete packages, installation, and

training available from Computer Troubleshooters)

Page 47: Internet and PC Security Workshop 2014

Surf Safely and Securely

(937) 458-2000

www.CTDayton.com [email protected]

“For All Your Computing Needs in Dayton”