SlideShare a Scribd company logo
1 of 2
Download to read offline
Michigan Investigative Group
                                                                    51194 Romeo Plank Rd, Suite 223
                                                                    Macomb, MI 48042
                                                                    (800) 723-4580 Office (586) 591-5995 Fax
                                                                    http://migpi.com      dadamczyk@migpi.com




                     Security Awareness 2010
Many businesses simply do not include Internet security as part of their day-to-day operations. It is
important, though, to develop a 'culture of security’. No matter how good your business procedures are,
people will make mistakes.

Too many times we forget to log off, do not change passwords, or neglect to download and install the latest
software patches. Raising awareness about online security is an important part of protecting your business.

Security Tips
Here are some best practices to remember when online.

    •   Keep your Operating System patches up to date. Be sure to install all updates,
    •   Be sure to install all updates to all computer protection tools as well. Install, maintain, and
        frequently perform scans with your antivirus software, firewalls and email filters.
    •   Ensure your company’s security or IT department runs regular Virus and Malware scans.
    •   Never install any programs from the Internet if you do not fully trust the source or company
        providing the software.
    •   Also, if enabled, use Ctrl-Alt-Delete on your keyboard when leaving your desk to lock your
        computer. This ensures that only you will access your systems using your secure password.

That brings us to the next topic of Password Security.

Password Security

Ultimately, you are responsible for securing data and the applications you access on the computer you use.
The use of strong passwords acts as a deterrent against password guessing. The security of each
individual user is closely related to the security of the whole system. Creating effective passwords can
provide additional means of protecting the information on your computer.

Strong Password Tips
Here are some tips for selecting a strong password.

    •   Never use any easy-to-guess phrases, such as “LetMeIn” or “MyPassword” as your password.
        Avoid using your birth date, your child’s name, your pets’ name, and your spouse’s name.
    •   Don’t select a password that a hacker could guess simply by looking around your cubicle or office.
        Dictionary-proof it: Hackers run “dictionary hacks” in which they check passwords against every
        word in the dictionary.
    •   Defeat this attack by using a number or a special character in your password. Be sure to memorize
        it and never write it down.
    •   One trick to remembering your strong password is to create a phrase that sticks in your head but is
        virtually impossible to guess.
    •   Change your password often especially if you feel someone has seen you type your password or
        you have mistakenly given it to someone. And lastly, never give out a password over the phone or
        email it along with the associated Login ID. You may be thinking, “But what are the chances that I
        would give out my password anyway?” Unfortunately, the chances may be greater than you think.

    And that brings us to our last topic: Phishing.
Security Awareness 2010

Phishing

Phishing is a growing Internet scam that uses phony emails to fool people into revealing important personal
information such as login IDs, passwords, social security numbers, even credit card numbers.

For example, an email alleging to be from a legitimate source such as your bank or your power company
claims that your account needs to be verified. The email may ask that you go to a website by clicking on a
link within the email. When you go to the site, you are asked to "update" or "confirm" personal information
such as your login ID and passwords. The website may look just like a legitimate page but is in fact bogus
and designed to steal your information.

Tips on How to Avoid Getting Phished
With this in mind, let’s discuss some important practices which will help you avoid becoming the victim of a
phisher.

    •   If you are even remotely suspicious of an email, delete it.
    •   Pay close attention to the URL of a website. Malicious websites may look identical to the
        legitimate site - graphics and layout are identical - but the URL may use a variation in spelling or
        a different domain, like .biz vs .com
    •   When accessing the website, verify the correct URL as http://www.migpi.com. When you click the
        “Account Login” button or area of interest, ensure you are being redirected to the correct website by
        checking the URL.
    •   Never login by going directly to this page. Always begin the login process by going to the website
        main URL and go through their pages to get to your login area.
    •   Never reveal personal or financial information in an email and do not respond to email
        solicitations for this information. This includes following links sent within an email.
    •   Never send sensitive information over the Internet before checking a website's security. If you are
        unsure whether an email request is legitimate, verify the request by contacting the company
        directly.
    •   However, you don’t want to use the contact information provided in the email or on the website
        connected to the request. Instead, look up contact information from a more reliable source like a
        previous statement.
    •   You can also verify a website by clicking on the padlock icon at the end of the address bar within
        your browser window.


        If you have further security questions or concerns, call our Customer Service Department at
        1- 800-723-4580. We’re confident that the tips and best practices discussed here will help ensure a
        safer online experience for you, your business, and ours.




                                                 2 of 2

More Related Content

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 

Featured

How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
ThinkNow
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 

Featured (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

Internet Security Awareness

  • 1. Michigan Investigative Group 51194 Romeo Plank Rd, Suite 223 Macomb, MI 48042 (800) 723-4580 Office (586) 591-5995 Fax http://migpi.com dadamczyk@migpi.com Security Awareness 2010 Many businesses simply do not include Internet security as part of their day-to-day operations. It is important, though, to develop a 'culture of security’. No matter how good your business procedures are, people will make mistakes. Too many times we forget to log off, do not change passwords, or neglect to download and install the latest software patches. Raising awareness about online security is an important part of protecting your business. Security Tips Here are some best practices to remember when online. • Keep your Operating System patches up to date. Be sure to install all updates, • Be sure to install all updates to all computer protection tools as well. Install, maintain, and frequently perform scans with your antivirus software, firewalls and email filters. • Ensure your company’s security or IT department runs regular Virus and Malware scans. • Never install any programs from the Internet if you do not fully trust the source or company providing the software. • Also, if enabled, use Ctrl-Alt-Delete on your keyboard when leaving your desk to lock your computer. This ensures that only you will access your systems using your secure password. That brings us to the next topic of Password Security. Password Security Ultimately, you are responsible for securing data and the applications you access on the computer you use. The use of strong passwords acts as a deterrent against password guessing. The security of each individual user is closely related to the security of the whole system. Creating effective passwords can provide additional means of protecting the information on your computer. Strong Password Tips Here are some tips for selecting a strong password. • Never use any easy-to-guess phrases, such as “LetMeIn” or “MyPassword” as your password. Avoid using your birth date, your child’s name, your pets’ name, and your spouse’s name. • Don’t select a password that a hacker could guess simply by looking around your cubicle or office. Dictionary-proof it: Hackers run “dictionary hacks” in which they check passwords against every word in the dictionary. • Defeat this attack by using a number or a special character in your password. Be sure to memorize it and never write it down. • One trick to remembering your strong password is to create a phrase that sticks in your head but is virtually impossible to guess. • Change your password often especially if you feel someone has seen you type your password or you have mistakenly given it to someone. And lastly, never give out a password over the phone or email it along with the associated Login ID. You may be thinking, “But what are the chances that I would give out my password anyway?” Unfortunately, the chances may be greater than you think. And that brings us to our last topic: Phishing.
  • 2. Security Awareness 2010 Phishing Phishing is a growing Internet scam that uses phony emails to fool people into revealing important personal information such as login IDs, passwords, social security numbers, even credit card numbers. For example, an email alleging to be from a legitimate source such as your bank or your power company claims that your account needs to be verified. The email may ask that you go to a website by clicking on a link within the email. When you go to the site, you are asked to "update" or "confirm" personal information such as your login ID and passwords. The website may look just like a legitimate page but is in fact bogus and designed to steal your information. Tips on How to Avoid Getting Phished With this in mind, let’s discuss some important practices which will help you avoid becoming the victim of a phisher. • If you are even remotely suspicious of an email, delete it. • Pay close attention to the URL of a website. Malicious websites may look identical to the legitimate site - graphics and layout are identical - but the URL may use a variation in spelling or a different domain, like .biz vs .com • When accessing the website, verify the correct URL as http://www.migpi.com. When you click the “Account Login” button or area of interest, ensure you are being redirected to the correct website by checking the URL. • Never login by going directly to this page. Always begin the login process by going to the website main URL and go through their pages to get to your login area. • Never reveal personal or financial information in an email and do not respond to email solicitations for this information. This includes following links sent within an email. • Never send sensitive information over the Internet before checking a website's security. If you are unsure whether an email request is legitimate, verify the request by contacting the company directly. • However, you don’t want to use the contact information provided in the email or on the website connected to the request. Instead, look up contact information from a more reliable source like a previous statement. • You can also verify a website by clicking on the padlock icon at the end of the address bar within your browser window. If you have further security questions or concerns, call our Customer Service Department at 1- 800-723-4580. We’re confident that the tips and best practices discussed here will help ensure a safer online experience for you, your business, and ours. 2 of 2