SlideShare ist ein Scribd-Unternehmen logo
1 von 102
Activate protection systemsIf your operating system
comes standard with a built-in firewall, spam blocker, anti-
virus software or other security application, be sure that it's
activated. Your Internet service provider may provide an e-
mail spam filtering service that should also be turned on.
If your operating system comes standard with a built-in
firewall, spam blocker, anti-virus software or other security
application, be sure that it's activated. Your Internet service
provider may provide an e-mail spam filtering service that
should also be turned on.
#1
Upgrade your protection Using security software won't
help if it's not up to date. Be sure that you are using the latest
versions of spam, spyware and virus-detection software. The
most current software will be ready to handle the most current
on-line threats. Also remember to renew subscriptions if the
software registration expires at some point.
Using security software won't help if it's not up to date. Be
sure that you are using the latest versions of spam, spyware
and virus-detection software. The most current software will
be ready to handle the most current on-line threats. Also
remember to renew subscriptions if the software registration
expires at some point.
#2
Use anti-virus softwareYou should always have anti-virus
software on your computer. These programs scan all files
that are downloaded from e-mail or opened from the hard
drive to ensure that they are safe from malware before use.
When these programs detect a virus, they are able to isolate
and destroy it so it does not infect your computer.
You should always have anti-virus software on your computer.
These programs scan all files that are downloaded from e-
mail or opened from the hard drive to ensure that they are
safe from malware before use. When these programs detect
a virus, they are able to isolate and destroy it so it does not
infect your computer.
#3
Use anti-spyware programsJust like anti-virus programs,
spyware protection is also necessary. These programs scan
your computer for spyware, browser hijackers and other
malicious programs. Both free and commercial anti-spyware
products are available.
Just like anti-virus programs, spyware protection is also
necessary. These programs scan your computer for spyware,
browser hijackers and other malicious programs. Both free
and commercial anti-spyware products are available.
#4
Update automatically
Set both your operating system and security programs to
update automatically. Your virus-detection software needs to
adapt as new threats become known. Allowing the software to
do automatic updates will ensure that you always have the
highest level of protection
#5
Use a secure browserIf you use an older version of
Windows, upgrade your browser to Internet Explorer 7 or
Firefox 2. Both of these browsers have built-in features to
detect on-line threats.
If you use an older version of Windows, upgrade your browser
to Internet Explorer 7 or Firefox 2. Both of these browsers
have built-in features to detect on-line threats.
#6
Block Pop-upsSet your Internet browser to block pop-ups
from websites and advertisements. This will minimize spyware
and the chances of clicking on an ad that loads malware onto
your computer.
Set your Internet browser to block pop-ups from websites and
advertisements. This will minimize spyware and the chances
of clicking on an ad that loads malware onto your computer.
#7
Install a security toolbarToolbars with security features
offer an additional line of defense. Most include features that
block pop-ups, spam and known phishing sites. Some are
even able to detect potential consumer scams.
Toolbars with security features offer an additional line of
defense. Most include features that block pop-ups, spam and
known phishing sites. Some are even able to detect potential
consumer scams.
#8
Create User AccountsCreate a user account that is
separate from the default administrator account. Only log in
as the administrator when making configuration changes to
the computer. When the administrator account is used
infrequently, the access to change configurations will be more
limited to hacking. You may also want to create an individual
user account for each member of the family who uses the
computer. This will allow for each person to keep his or her
information private.
Create a user account that is separate from the default
administrator account. Only log in as the administrator when
making configuration changes to the computer. When the
administrator account is used infrequently, the access to
change configurations will be more limited to hacking. You
may also want to create an individual user account for each
member of the family who uses the computer. This will allow
for each person to keep his or her information private.
#9
Turn off your computer
When you are not actively using your computer, shut down or
disconnect from the Internet. If your computer is on-line less
frequently, the chance of access by a malicious source
decreases.
#10
Lock your computer if you step awayIf you take a break
from your computer for only a few minutes, it's enough time for
a hacker to destroy or steal your information. Locking your
computer password-protects your session until you return and
prevents anyone else from physically or remotely accessing
your information.
If you take a break from your computer for only a few minutes,
it's enough time for a hacker to destroy or steal your
information. Locking your computer password-protects your
session until you return and prevents anyone else from
physically or remotely accessing your information.
#11
Be careful with public computersAvoid banking or
conducting other personal business on public computers at
libraries, hotels and airports. Not only could the on-line
activity be intercepted, but strangers in the area could watch
your activity and remember passwords and other personal
details.
Avoid banking or conducting other personal business on
public computers at libraries, hotels and airports. Not only
could the on-line activity be intercepted, but strangers in the
area could watch your activity and remember passwords and
other personal details.
#12
Consider Apple computersSince Windows personal
computers are much more prevalent in the marketplace, most
viruses and spyware is designed to penetrate Windows
software. Mac owners still deal with spam and phishing
issues, but the odds of virus attack is much less likely.
Since Windows personal computers are much more prevalent
in the marketplace, most viruses and spyware is designed to
penetrate Windows software. Mac owners still deal with spam
and phishing issues, but the odds of virus attack is much less
likely.
#13
Be wary of downloads
Free downloads are plentiful on the Internet, and the
thousands of games, software and utility programs are very
useful. Unfortunately, many of these freebies include malware
and spyware. Try to download programs only from well-known
manufacturers and trusted sites.
#14
Consider a security suiteIf your operating system doesn't
include security features or you want extra protection, a
security software suite will include all the products required to
keep your computer safe.
If your operating system doesn't include security features or
you want extra protection, a security software suite will include
all the products required to keep your computer safe.
#15
Run your antivirus softwareSimply having antivirus
software installed will not help your computer from being
attacked. Scan for viruses on a regular basis, or set the
software to do automatic scans at a certain time daily.
Simply having antivirus software installed will not help your
computer from being attacked. Scan for viruses on a regular
basis, or set the software to do automatic scans at a certain
time daily.
#16
Double your spyware protectionSpyware can be difficult
to detect, so it can be worth your while to use two different
programs to search for spyware. Set the stronger program for
constant monitoring, and use the second for occasional scans
to verify that nothing was missed by the first program.
Spyware can be difficult to detect, so it can be worth your
while to use two different programs to search for spyware. Set
the stronger program for constant monitoring, and use the
second for occasional scans to verify that nothing was missed
by the first program.
#17
Try disposable e-mail addresses Create separate free
e-mail addresses for different purposes. Use this “disposable”
e-mail account to register for sites or complete surveys that
may result in increased spam. If the spam becomes
overwhelming, close the account and create another. This will
keep the junk mail from your regular e-mail account, as you
continue to use your regular e-mail address for business or
personal communication.
Create separate free e-mail addresses for different purposes.
Use this “disposable” e-mail account to register for sites or
complete surveys that may result in increased spam. If the
spam becomes overwhelming, close the account and create
another. This will keep the junk mail from your regular e-mail
account, as you continue to use your regular e-mail address
for business or personal communication.
#18
Use credit cardsWhen shopping on-line, credit cards offer
higher protection than debit cards or other payment options.
Credit card issuing banks offer protection against fraud that
debit cards and checking accounts do not.
When shopping on-line, credit cards offer higher protection
than debit cards or other payment options. Credit card issuing
banks offer protection against fraud that debit cards and
checking accounts do not.
#19
Devote a single credit card to online purchasesIf only
one card is used for all online transactions, misuse or identity
theft will be easier to detect than if multiple cards were used.
Using a single card will also minimize the damage you
experience if the card number is stolen.
If only one card is used for all online transactions, misuse or
identity theft will be easier to detect than if multiple cards were
used. Using a single card will also minimize the damage you
experience if the card number is stolen.
#20
Avoid saved passwordsAlthough saved passwords and
saved site default settings can be convenient, if your computer
is hacked into any saved account information becomes
available to the attacker. Limit the use of saved credit card
numbers and addresses.
Although saved passwords and saved site default settings can
be convenient, if your computer is hacked into any saved
account information becomes available to the attacker. Limit
the use of saved credit card numbers and addresses.
#21
Look for evidence of secure sitesOnly enter personal
information on sites that have the https:// prefix or a padlock
icon in your browser window. This means that the Web site is
secured and any information transmitted is encrypted and can
not be read easily by humans.
Only enter personal information on sites that have the https://
prefix or a padlock icon in your browser window. This means
that the Web site is secured and any information transmitted is
encrypted and can not be read easily by humans.
#22
Don't assume that secure and honest are the same
thing
The https:// prefix and padlock symbol are good indicators of
transmission security, but not of reputation. Ensure that you
shop from or do business with reputable companies by looking
for the Better Business Bureau logo or other positive
affiliations. Also read reviews on-line to find out what other
users have experienced with the company.
#23
Guard your personal information
Do not respond to emails requesting personal information, like
passwords, Social Security numbers and birthdates unless
you know the sender or are expecting the email. If an email
requests that you contact a telephone number, verify the
number first.
#24
Avoid clicking on hyperlinksHyperlinks in email
messages can be misleading, as the text shows one address
but the link may take you to another. Before clicking on links
in e-mails or Web pages, hold the cursor over the link and
verify that the address that appears at the bottom of your
browser window is the same one that you intend to visit
Hyperlinks in email messages can be misleading, as the text
shows one address but the link may take you to another.
Before clicking on links in e-mails or Web pages, hold the
cursor over the link and verify that the address that appears at
the bottom of your browser window is the same one that you
intend to visit
#25
Type with careOn-line criminals often create Web sites that
look similar to another site and use common misspellings of
the original site as the URL. Be sure that you are typing
accurately, or use a bookmark to visit favorite sites.
On-line criminals often create Web sites that look similar to
another site and use common misspellings of the original site
as the URL. Be sure that you are typing accurately, or use a
bookmark to visit favorite sites.
#26
Report phishingEmails that appear to be legitimate and ask
for information are forms of phishing. If you receive a phishing
e-mail, forward it to the appropriate bureaus, including the
Anti-Phishing Working Group
(reportphishing@antiphishing.org) and the Federal Trade
Commission (spam@uce.gov).
Emails that appear to be legitimate and ask for information are
forms of phishing. If you receive a phishing e-mail, forward it
to the appropriate bureaus, including the Anti-Phishing
Working Group (reportphishing@antiphishing.org) and the
Federal Trade Commission (spam@uce.gov).
#27
Review your accountsLook at your bank and credit card
statements for suspicious or unknown transactions. These are
often a signal of identity theft. Report these situations to your
bank as soon as possible.
Look at your bank and credit card statements for suspicious or
unknown transactions. These are often a signal of identity
theft. Report these situations to your bank as soon as
possible.
#28
Practice the golden ruleThe Internet is a global
community with many positive benefits. Just as in the real
world, be responsible, safe and respectful towards others.
Also respect any rules or laws that apply to your on-line
activity.
The Internet is a global community with many positive
benefits. Just as in the real world, be responsible, safe and
respectful towards others. Also respect any rules or laws that
apply to your on-line activity.
#29
Do not open unknown e-mailsDelete any e-mails from
unknown senders. Also be aware of email attachments and
do not download attachments that you are unsure about, even
if you recognize the sender. Do not forward unknown
attachments to others.
Delete any e-mails from unknown senders. Also be aware of
email attachments and do not download attachments that you
are unsure about, even if you recognize the sender. Do not
forward unknown attachments to others.
#30
Create strong, private passwordsChoose password that
would be hard for others to guess. Do not use obvious
passwords like a name or birth date. Use a combination of
letters, numbers and symbols in your password and do not
share your password with anyone.
Choose password that would be hard for others to guess. Do
not use obvious passwords like a name or birth date. Use a
combination of letters, numbers and symbols in your
password and do not share your password with anyone.
#31
Use firewall protectionInstall firewalls to prevent hackers
from gaining access to your computer. This will prevent theft
of any personal information stored on the computer. You may
choose an external or software firewall depending on your
network needs.
Install firewalls to prevent hackers from gaining access to your
computer. This will prevent theft of any personal information
stored on the computer. You may choose an external or
software firewall depending on your network needs.
#32
Do not file share with strangersSharing files can allow a
stranger to look at files stored on your computer or plant a
virus to infect the computer. Learn about the risks of file
sharing, and learn how to disable file sharing on your
operating system to prevent these risks. If a file sharing
program is installed on your computer, be sure that it does not
run automatically when you boot up your computer.
Sharing files can allow a stranger to look at files stored on
your computer or plant a virus to infect the computer. Learn
about the risks of file sharing, and learn how to disable file
sharing on your operating system to prevent these risks. If a
file sharing program is installed on your computer, be sure that
it does not run automatically when you boot up your computer.
#33
Back up your files regularlyMake a back up of your hard
drive onto an external media device. The act of making a
back up copy does not offer protection, but it is insurance that
nothing will be lost should a computer security disaster occur.
Make a back up of your hard drive onto an external media
device. The act of making a back up copy does not offer
protection, but it is insurance that nothing will be lost should a
computer security disaster occur.
#34
Protect your from power outagesUse power strips and
surge protectors to protect your computer against sudden
power outages. During a storm when a power surge is likely,
shut your computer down and unplug it to prevent any loss of
information.
Use power strips and surge protectors to protect your
computer against sudden power outages. During a storm
when a power surge is likely, shut your computer down and
unplug it to prevent any loss of information.
#35
Evaluate your computer's securityReview the security
features and programs on your computer twice annually to be
sure that everything is working as it is supposed to. Update or
replace any programs as necessary. Do this process for all
computers in your home.
Review the security features and programs on your computer
twice annually to be sure that everything is working as it is
supposed to. Update or replace any programs as necessary.
Do this process for all computers in your home.
#36
Delete unused software programsPrograms that you do
not use take up valuable space in your computer's memory.
In addition to wasting resources, rarely-used programs are
usually not updated and may not have the security patches
that could stop a hacker from accessing your computer.
Programs that you do not use take up valuable space in your
computer's memory. In addition to wasting resources, rarely-
used programs are usually not updated and may not have the
security patches that could stop a hacker from accessing your
computer.
#37
Be wary of e-mail attachmentsDo not open email
attachments from strangers unless the security and anti-virus
software on your computer verifies that they are safe. Always
delete any spam or junk email that contains an attachment.
Do not open email attachments from strangers unless the
security and anti-virus software on your computer verifies that
they are safe. Always delete any spam or junk email that
contains an attachment.
#38
Never open certain attachmentsViruses are often sent
as email attachments. Avoid opening any file with an
extension that is .exe, .pif, .com or .bat, regardless of who
they are from. These are almost always harmful files.
Viruses are often sent as email attachments. Avoid opening
any file with an extension that is .exe, .pif, .com or .bat,
regardless of who they are from. These are almost always
harmful files.
#39
Don't click on pop-upsMany malicious sites use pop-ups
that look very similar to the ones that your operating system
may use to tell you that there is a security risk for your
computer. These are ploys to get you to click on the ad; if you
do click, the site usually installs spyware or malware on your
computer. Close these ads by clicking on the X in the top right
corner.
Many malicious sites use pop-ups that look very similar to the
ones that your operating system may use to tell you that there
is a security risk for your computer. These are ploys to get
you to click on the ad; if you do click, the site usually installs
spyware or malware on your computer. Close these ads by
clicking on the X in the top right corner.
#40
Be sure that your anti-spyware program is
authenticStick with anti-spyware products from reputable
manufacturers. Unfortunately, some products marketed as
free spyware detectors actually install spyware on your
computer.
Stick with anti-spyware products from reputable
manufacturers. Unfortunately, some products marketed as
free spyware detectors actually install spyware on your
computer.
#41
Read the license agreementBefore installing any
downloaded software, review its license agreement. Many
free downloads come with spyware and programs that you
would not want installed on your computer. Careful reading of
the agreement can help you to find them.
Before installing any downloaded software, review its license
agreement. Many free downloads come with spyware and
programs that you would not want installed on your computer.
Careful reading of the agreement can help you to find them.
#42
Avoid pornographic Web sitesThe majority of spyware is
distributed through pop-ups from pornographic sites. On-line
gambling sites are also popular locations for adware and
spyware.
The majority of spyware is distributed through pop-ups from
pornographic sites. On-line gambling sites are also popular
locations for adware and spyware.
#43
Do not use unlicensed softwarePirated software is
illegal, and the sites that distribute it are often loaded with
malware. This admonition goes beyond software, including
crack key generators, and pirated music or movies.
Unlicensed software is sometimes incompatible with patches
and can be more susceptible to viruses. It may even come
with viruses previously installed.
Pirated software is illegal, and the sites that distribute it are
often loaded with malware. This admonition goes beyond
software, including crack key generators, and pirated music or
movies. Unlicensed software is sometimes incompatible with
patches and can be more susceptible to viruses. It may even
come with viruses previously installed.
#44
Run on-line virus scansIn addition to running the anti-virus
scan scheduled on your computer, occasionally run a free on-
line scan to make sure you're your computer is not infected
with something that your installed software is not aware of.
Each program may find something that the other does not.
In addition to running the anti-virus scan scheduled on your
computer, occasionally run a free on-line scan to make sure
you're your computer is not infected with something that your
installed software is not aware of. Each program may find
something that the other does not.
#45
Visit Windows UpdateIf you use Windows, visit Windows
Update on a regular basis. The site will scan your computer
for any updates or patches that are not installed on your
computer. Then it will create a list of the items recommended
to update your computer. Download anything marked as a
critical update to keep your computer secure.
If you use Windows, visit Windows Update on a regular basis.
The site will scan your computer for any updates or patches
that are not installed on your computer. Then it will create a
list of the items recommended to update your computer.
Download anything marked as a critical update to keep your
computer secure.
#46
Password protect and encrypt sensitive files In
addition to protecting the entire computer, you may want to
encrypt or use passwords for certain files or folders that
contain confidential information.
In addition to protecting the entire computer, you may want to
encrypt or use passwords for certain files or folders that
contain confidential information.
#47
Visit Apple Security UpdatesIf you are a Mac user, check
the Apple Security Site for new updates and download them if
they are available.
If you are a Mac user, check the Apple Security Site for new
updates and download them if they are available.
#48
Protect your identityPersonal information is all that an on-
line criminal needs to begin stealing your identity. Be sure to
keep your social security number, birth date, credit card
numbers and address protected by limiting how you share the
information on-line.
Personal information is all that an on-line criminal needs to
begin stealing your identity. Be sure to keep your social
security number, birth date, credit card numbers and address
protected by limiting how you share the information on-line.
#49
Protect your kidsChildren face many unique risks with
Internet activity. Monitor your children's on-line activity and
use parental filters or other tools to protect them from threats
and security risks.
Children face many unique risks with Internet activity. Monitor
your children's on-line activity and use parental filters or other
tools to protect them from threats and security risks.
#50
Disable scripts and active contentSet your browser to
prompt you when Javascript, Java or ActiveX controls are
executed on a Web site. Malicious code is sometimes hidden
in these features. Be sure that the site is trustworthy before
enabling the content.
Set your browser to prompt you when Javascript, Java or
ActiveX controls are executed on a Web site. Malicious code
is sometimes hidden in these features. Be sure that the site is
trustworthy before enabling the content.
#51
Be mindful of the information kept on portable USB
drivesPortable USB drives are a convenient way to store
information, but their small size makes them easy to lose.
Consider encrypting the data stored on these drives, in case of
loss or theft. If you find someone else's USB drive, do not plug
it into your computer. Hand it over to authorities instead.
Portable USB drives are a convenient way to store information,
but their small size makes them easy to lose. Consider
encrypting the data stored on these drives, in case of loss or
theft. If you find someone else's USB drive, do not plug it into
your computer. Hand it over to authorities instead.
#52
Keep a log of sites visited. Have children keep a list of
any sites that they visit so you can review for potential
spyware and other risks. Do not let children register with Web
sites without permission.
Have children keep a list of any sites that they visit so you can
review for potential spyware and other risks. Do not let
children register with Web sites without permission.
#53
Use a spam filterIf your e-mail program separates spam
and junk mail, use these features. This will filter away the
scams and malicious messages so that there is no chance of
accidental response or infection.
If your e-mail program separates spam and junk mail, use
these features. This will filter away the scams and malicious
messages so that there is no chance of accidental response
or infection.
#54
Be wary of strange messagesHackers and e-mail viruses
can come in e-mails from recognized senders, so be aware of
any strange e-mails, even if the sender's name is familiar.
Examples of strange messages include attachments with odd
file extensions or incoherent words in the message body.
Treat these messages as you would ones from unknown
senders and delete them immediately.
Hackers and e-mail viruses can come in e-mails from
recognized senders, so be aware of any strange e-mails, even
if the sender's name is familiar. Examples of strange
messages include attachments with odd file extensions or
incoherent words in the message body. Treat these
messages as you would ones from unknown senders and
delete them immediately.
#55
Change passwords regularlyChanging passwords on a
regular basis can help prevent criminals from accessing your
personal information. Get in the habit of changing passwords
every 90 days. Also change your password if you feel that
there has been any type of security breach.
Changing passwords on a regular basis can help prevent
criminals from accessing your personal information. Get in the
habit of changing passwords every 90 days. Also change
your password if you feel that there has been any type of
security breach.
#56
Stay informedSubscribe to the National Cyber Alert System
at www.us-cert.gov. These updates will give you timely
information about current Internet security issues. Knowing
the risks is important to effectively protect your home and
business computers.
Subscribe to the National Cyber Alert System at www.us-
cert.gov. These updates will give you timely information about
current Internet security issues. Knowing the risks is
important to effectively protect your home and business
computers.
#57
Be cautious with chat and instant messaging
Before divulging any personal information in a chat or IM
message, be sure that you are communicating with who you
expect to communicate with. To ensure that friends are not
confused with strangers, you may want to create a password
to help you recognize an on-line friend.
#58
Forward spoof e-mails to verifyPhising e-mails often
claim to be from eBay, PayPal, or a familiar company name. If
you are unsure of the e-mail's validity, forward it to the
customer service department at the actual company the email
claims to be from. They can confirm whether or not it is real.
Phising e-mails often claim to be from eBay, PayPal, or a
familiar company name. If you are unsure of the e-mail's
validity, forward it to the customer service department at the
actual company the email claims to be from. They can
confirm whether or not it is real.
#59
Limit information given when registering for a Web
site
Although name and e-mail address are usually standard
requirements for any site registration, some require more
information, like address and phone number. Be cautious of
which sites you give the information to. When possible only
complete the required fields, often marked with an asterisk.
#60
Be safe about meeting on-line friends in personIf you
decide to meet an on-line only friend in person, meet at a
public place and tell other friends and family about your plans.
If you decide to meet an on-line only friend in person, meet at
a public place and tell other friends and family about your
plans.
#61
Protect friends' e-mail addressesTo avoid sharing e-
mail addresses of friends and family with spyware distributors
and spammers, avoid using a site's "recommend to friends"
feature unless you are sure that the Web site is reputable.
To avoid sharing e-mail addresses of friends and family with
spyware distributors and spammers, avoid using a site's
"recommend to friends" feature unless you are sure that the
Web site is reputable.
#62
Mark spam messagesAn e-mail spam filter will catch most
spam and junk mail messages, but some may still get through.
Train your e-mail service to recognize junk by marking junk
mail messages in your inbox as spam. The e-mail service will
know to direct similar messages to the spam folder in the
future.
An e-mail spam filter will catch most spam and junk mail
messages, but some may still get through. Train your e-mail
service to recognize junk by marking junk mail messages in
your inbox as spam. The e-mail service will know to direct
similar messages to the spam folder in the future.
#63
Read the fine printReview the terms and conditions for any
site you register with. Most have a checkbox for whether you
would like to receive updates and offers from sponsors. Be
sure that this box is left unchecked, or you could end up
receiving lots of junk mail and spam. Most reputable sites
include a statement explaining that they do not sell or share
your e-mail address with other companies.
Review the terms and conditions for any site you register with.
Most have a checkbox for whether you would like to receive
updates and offers from sponsors. Be sure that this box is left
unchecked, or you could end up receiving lots of junk mail and
spam. Most reputable sites include a statement explaining
that they do not sell or share your e-mail address with other
companies.
#64
Be careful about what you share with othersDon't say
anything on-line that you would not tell anyone you never met.
This is especially important for social networking sites, like
Twitter or Facebook. Be sure not to divulge addresses of
where you are or full names of who you are with. Too much
information can be an invitation for a stranger to show up at
your location.
Don't say anything on-line that you would not tell anyone you
never met. This is especially important for social networking
sites, like Twitter or Facebook. Be sure not to divulge
addresses of where you are or full names of who you are with.
Too much information can be an invitation for a stranger to
show up at your location.
#65
Practice caution with Out-Of-Office responsesAn
automated response explaining that you are unable to check
emails on vacation can be helpful, but it also acts as an
advertisement that you are away from your computer and/or
your home. If possible, modify the Out-Of-Office response
settings so the response is only sent to existing members of
your e-mail address book. Don't be too specific about the
details of where you are and why you won't check your e-mail;
leave the message simple and secure.
An automated response explaining that you are unable to
check emails on vacation can be helpful, but it also acts as an
advertisement that you are away from your computer and/or
your home. If possible, modify the Out-Of-Office response
settings so the response is only sent to existing members of
your e-mail address book. Don't be too specific about the
details of where you are and why you won't check your e-mail;
leave the message simple and secure.
#66
Know who is watching you
Be careful about your e-mail and Internet activity at work. In
most of the United States, any activity conducted on a work
computer is property of the employer. Not only could
inappropriate activity result in work-related disciplinary action,
but you could end up divulging personal information to
strangers at your place of business.
#67
Beware of public Wi-Fi access. Don't send or view
confidential information when using public wireless
connections. Other wireless users in the same location could
monitor network activity and see what you are doing.
Don't send or view confidential information when using public
wireless connections. Other wireless users in the same
location could monitor network activity and see what you are
doing.
#68
Minimize chances of mobile device theftDon't advertise
that you have a laptop by using it in public. Consider using a
non-traditional laptop carrying case and an alarm or lock to
add additional security.
Don't advertise that you have a laptop by using it in public.
Consider using a non-traditional laptop carrying case and an
alarm or lock to add additional security.
#69
Always log off of secured sitesWhen using on-line
banking or other password protected sites, be sure to log off
when finished and close the browser window. This ensures
that the session is closed and information can not be viewed
by others. This is especially important if you are using a
public computer.
When using on-line banking or other password protected sites,
be sure to log off when finished and close the browser
window. This ensures that the session is closed and
information can not be viewed by others. This is especially
important if you are using a public computer.
#70
Clear your cookies frequentlyCookies are the way that
Web sites store personal information. Not all cookies are bad,
but some companies sell this information to other companies
for marketing purposes. You can delete unnecessary cookies
through the Internet options section of your browser.
Cookies are the way that Web sites store personal
information. Not all cookies are bad, but some companies sell
this information to other companies for marketing purposes.
You can delete unnecessary cookies through the Internet
options section of your browser.
#71
Secure mobile connectionsWhen using Wi-Fi, hot spots
or Internet cafes, be sure that webmail is secured with the
https:// prefix. Also be aware of those around you who may
watch you type passwords or other personal details.
When using Wi-Fi, hot spots or Internet cafes, be sure that
webmail is secured with the https:// prefix. Also be aware of
those around you who may watch you type passwords or
other personal details.
#72
Secure your home wireless connectionMake sure that
your home WiFi connection is password-protected so no one
can access your connection, even if they are in signal range.
Make sure that your home WiFi connection is password-
protected so no one can access your connection, even if they
are in signal range.
#73
Remember physical securityAll the security precautions
in the world will not protect your computer if it is physically
vulnerable to theft. Always keep your laptop in sight when
traveling. If a private computer is kept in a home with
roommates or family members, consider locking the door to
the computer room when you are not around.
All the security precautions in the world will not protect your
computer if it is physically vulnerable to theft. Always keep
your laptop in sight when traveling. If a private computer is
kept in a home with roommates or family members, consider
locking the door to the computer room when you are not
around.
#74
Watch for security cuesSecured sites should change from
the http:// prefix to https:// or shttp:// at the moment when you
are prompted to type in a user name and password.
Secured sites should change from the http:// prefix to https://
or shttp:// at the moment when you are prompted to type in a
user name and password.
#75
Review your credit reportsEach consumer is entitled to a
free copy of his or her credit report each year. Order copies of
credit reports from the three reporting bureaus annually, and
review for incorrect information or unfamiliar accounts.
Dispute any errors immediately.
Each consumer is entitled to a free copy of his or her credit
report each year. Order copies of credit reports from the three
reporting bureaus annually, and review for incorrect
information or unfamiliar accounts. Dispute any errors
immediately.
#76
Use separate computers for leisure and personal
businessIf possible, stop Web surfing on the computer that
you use for on-line banking or shopping. This will limit the
amount of cookies, spyware and monitoring and can reduce the
incidence of identity theft.
If possible, stop Web surfing on the computer that you use for
on-line banking or shopping. This will limit the amount of
cookies, spyware and monitoring and can reduce the incidence
of identity theft.
#77
Be aware of cyberstalkingCyberstalking is on-line
harassment, including threatening e-mails, identity assumption
and on-line defamation of character. If you believe you are a
victim of cyberstalking, your Internet service provider should
be able to assist you in finding the perpetrator.
Cyberstalking is on-line harassment, including threatening e-
mails, identity assumption and on-line defamation of
character. If you believe you are a victim of cyberstalking,
your Internet service provider should be able to assist you in
finding the perpetrator.
#78
Be safe on social networking sitesUse the privacy
settings on social networking sites to keep your personal
details secure. Make information like your last name, e-mail
address and phone number invisible to anyone except for
people you know and approve. Do not allow the site to
automatically accept friend requests. Instead, approve each
request personally.
Use the privacy settings on social networking sites to keep
your personal details secure. Make information like your last
name, e-mail address and phone number invisible to anyone
except for people you know and approve. Do not allow the
site to automatically accept friend requests. Instead, approve
each request personally.
#79
Keep sensitive information out of chat rooms
Even if you are talking with someone in a private chat room,
chat services often archive conversations on a server. You
have no control over what happens to archived conversations.
Even if you feel that everything is secure on your end,
remember that you don't know if the person you are chatting
with has someone watching his or her interactions with you.
#80
Browse with careBe cautious about the Web sites that you
visit, and if a site seems suspicious, close your browser and
leave the site. Most Web sites are able to track bits of
information from your computer, like IP address and the
software that you use, for marketing purposes. While this
information collection is not necessarily harmful from
trustworthy sites, Web sites that seem less legitimate can use
this information for malicious activity.
Be cautious about the Web sites that you visit, and if a site
seems suspicious, close your browser and leave the site.
Most Web sites are able to track bits of information from your
computer, like IP address and the software that you use, for
marketing purposes. While this information collection is not
necessarily harmful from trustworthy sites, Web sites that
seem less legitimate can use this information for malicious
activity.
#81
Change Wi-Fi administrator passwordsMost Wifi
routers come with a generic username and password for
equipment setup. Although password-protected, this
information is not specific to the individual and therefore well
known to hackers. Change the username and password as
soon as your wireless network is set up.
Most Wifi routers come with a generic username and
password for equipment setup. Although password-protected,
this information is not specific to the individual and therefore
well known to hackers. Change the username and password
as soon as your wireless network is set up.
#82
Enable WPA/WEP encryptionAll WiFi equipment supports
encryption to protect information sent over wireless networks.
Choose the strongest encryption option that works with your
network. It may require synchronizing the encryption settings
on all Wi-Fi devices that you and your family use.
All WiFi equipment supports encryption to protect information
sent over wireless networks. Choose the strongest encryption
option that works with your network. It may require
synchronizing the encryption settings on all Wi-Fi devices that
you and your family use.
#83
Change the default SSID name
Wi-Fi access points and routers use a network name called
the SSID, and routers often have a default SSID of the
manufacturer name. Using the generic SSID does not make
your wireless network more susceptible to threats, but it is a
sign to others that the network is poorly configured, making it
more of a target. Shange the default SSID name immediately
when configuring your wireless security.
#84
Allow MAC address filteringEach Wi-Fi component has a
unique identifier called the MAC address, and access points
and routers keep tabs on all the MAC addresses of devices
that connect to them. Many products allow the owner to type
in the MAC addresses of his or her equipment, so the etwork
will only allow connection from those approved devices.
Each Wi-Fi component has a unique identifier called the MAC
address, and access points and routers keep tabs on all the
MAC addresses of devices that connect to them. Many
products allow the owner to type in the MAC addresses of his
or her equipment, so the etwork will only allow connection
from those approved devices.
#85
Disable SSID broadcastAccess points and routers usually
broadcast the SSID name at regular intervals. This function
was originally intended for roaming, but it is unnecessary
when a wireless network is used in the home. Disable the
broadcast so others will not be able to see your network.
Access points and routers usually broadcast the SSID name
at regular intervals. This function was originally intended for
roaming, but it is unnecessary when a wireless network is
used in the home. Disable the broadcast so others will not be
able to see your network.
#86
Disable Wi-Fi auto-connectMost computers have a
setting to allow the computer to connect to any open wireless
network. Disable this setting and always connect directly to
your home network. Use the auto-connect if necessary during
temporary situations, like when traveling.
Most computers have a setting to allow the computer to
connect to any open wireless network. Disable this setting
and always connect directly to your home network. Use the
auto-connect if necessary during temporary situations, like
when traveling.
#87
Assign fixed IP addresses to wireless devicesTurn off
DHCP and assign a static IP address to your computer.
Although DHCP is easier to configure, it is also easier for
hackers to find IP addresses and intercept. Use a private
range for the IP address so the computer is not vulnerable to
being reached from the Web.
Turn off DHCP and assign a static IP address to your
computer. Although DHCP is easier to configure, it is also
easier for hackers to find IP addresses and intercept. Use a
private range for the IP address so the computer is not
vulnerable to being reached from the Web.
#88
Enable the firewalls on your routerIn addition to a
firewall on your computer, make sure that your wireless
router's firewall is turned on. This will offer an additional level
of protection for your home wireless network.
In addition to a firewall on your computer, make sure that your
wireless router's firewall is turned on. This will offer an
additional level of protection for your home wireless network.
#89
Position the router appropriately
Home Wi-Fi signals are intended to be used in the home.
While some signal may leak outdoors, keep an eye on how far
the signal reaches. The position of the router determines how
far the signal will reach, so try to place the router in the center
of the home to prevent the signal passing across streets or
into different neighborhoods.
#90
Shut down your network when it is not being
usedWhile it isn't practical to turn off a wireless network daily,
be sure that it is disconnected if you plan to be gone on
vacation or extended off-line periods.
While it isn't practical to turn off a wireless network daily, be
sure that it is disconnected if you plan to be gone on vacation
or extended off-line periods.
#91
Use third-party payment servicesWhen shopping online,
use a third-party service to pay. These services, like PayPal
and Amazon Payments, seamlessly transfer money from a
bank account to the vendor without the need to expose your
bank or credit card information to the seller.
When shopping online, use a third-party service to pay.
These services, like PayPal and Amazon Payments,
seamlessly transfer money from a bank account to the vendor
without the need to expose your bank or credit card
information to the seller.
#92
Watch out for e-mail hoaxesIf it's too good to be true, it
probably isn't. Be cautious of any easy money scams, like
promises of lottery winnings or requests to move money from
a foreign country. These scams usually ask that you send
money or personal information to sign up for the opportunity.
Steer clear of these hoaxes.
If it's too good to be true, it probably isn't. Be cautious of any
easy money scams, like promises of lottery winnings or
requests to move money from a foreign country. These
scams usually ask that you send money or personal
information to sign up for the opportunity. Steer clear of these
hoaxes.
#93
Beware of virus hoaxesSometimes e-mails that inform of a
security risk are malicious or intended to create panic. Always
verify before you act or share the information. Check with
McAfee or F-Secure to see if the virus described is a hoax
before you take any action.
Sometimes e-mails that inform of a security risk are malicious
or intended to create panic. Always verify before you act or
share the information. Check with McAfee or F-Secure to see
if the virus described is a hoax before you take any action.
#94
Avoid BotsNot everyone in a chat room is an actual person
behind a keyboard. Chat robots, or bots, are often used to
moderate chat rooms and provide news or weather updates.
Malicious bots can be set up to infiltrate your computer.
Not everyone in a chat room is an actual person behind a
keyboard. Chat robots, or bots, are often used to moderate
chat rooms and provide news or weather updates. Malicious
bots can be set up to infiltrate your computer.
#95
Take precautions with smartphonesUse the same
precautions accessing your smartphone in public as you
would any other public computer. Avoid on-line banking in
busy public spaces because strangers could shoulder-surf to
watch what you type. Also consider disabling the feature that
allows the phone to automatically connect to any open
wireless network.
Use the same precautions accessing your smartphone in
public as you would any other public computer. Avoid on-line
banking in busy public spaces because strangers could
shoulder-surf to watch what you type. Also consider disabling
the feature that allows the phone to automatically connect to
any open wireless network.
#96
Encrypt Internet phonesVoice over IP (VOIP) is a way of
communicating by voice over public internet connections, so a
risk of eavesdropping is always present. Choose a VOIP
provider that offers secure encryption services.
Voice over IP (VOIP) is a way of communicating by voice over
public internet connections, so a risk of eavesdropping is
always present. Choose a VOIP provider that offers secure
encryption services.
#97
Erase data from unwanted computersBefore tossing out
an old computer, copy all the data tha you need to keep and
erase the hard disk. Simply deleting files is not enough. Use
a program to erase all traces of personal data from the
computer before recycling or donating.
Before tossing out an old computer, copy all the data tha you
need to keep and erase the hard disk. Simply deleting files is
not enough. Use a program to erase all traces of personal
data from the computer before recycling or donating.
#98
Assume permanenceThe Internet does not have a delete
button. If you post or publish any information and then delete
it, you maintain no control over how it is copied, stored or
archived. Think before you post anything that you may regret
later.
The Internet does not have a delete button. If you post or
publish any information and then delete it, you maintain no
control over how it is copied, stored or archived. Think before
you post anything that you may regret later.
#99
Be cautious of links or attachments from chat
messagesAlthough you may feel comfortable with a person
that you share conversations with in a chat room, if you do not
really know the person, you can not be sure of his or her
intentions. Avoid clicking on any links or opening attachments
from a chat buddy that you do not know very well. This is a
common method for hackers to distribute malicious material
directly.
Although you may feel comfortable with a person that you
share conversations with in a chat room, if you do not really
know the person, you can not be sure of his or her intentions.
Avoid clicking on any links or opening attachments from a chat
buddy that you do not know very well. This is a common
method for hackers to distribute malicious material directly.
#100
Know what to do if something is wrongIf you suspect
that malware is affecting your computer, stop any on-line
activities that involve usernames, passwords or other personal
information. Scan your computer with an anti-virus software,
and delete anything that the program finds to be suspicious. If
the problem is not resolved call for professional technical help
from a repair shop or manufacturer.
If you suspect that malware is affecting your computer, stop
any on-line activities that involve usernames, passwords or
other personal information. Scan your computer with an anti-
virus software, and delete anything that the program finds to
be suspicious. If the problem is not resolved call for
professional technical help from a repair shop or
manufacturer.
#101

Weitere ähnliche Inhalte

Was ist angesagt?

Ethical hacking & Information Security
Ethical hacking & Information SecurityEthical hacking & Information Security
Ethical hacking & Information SecurityAjay Dhamija
 
Nat'l Cyber Security Awareness Month (NCSAM) Posters
Nat'l Cyber Security Awareness Month (NCSAM) PostersNat'l Cyber Security Awareness Month (NCSAM) Posters
Nat'l Cyber Security Awareness Month (NCSAM) PostersNetLockSmith
 
General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber SecurityDominic Rajesh
 
Basic Internet Security
Basic Internet SecurityBasic Internet Security
Basic Internet Securitymfaheemakhtar
 
Computer & internet Security
Computer & internet SecurityComputer & internet Security
Computer & internet SecurityGerard Lamusse
 
CYBER ETHICS, CRIMES AND SAFTY
CYBER ETHICS, CRIMES AND SAFTYCYBER ETHICS, CRIMES AND SAFTY
CYBER ETHICS, CRIMES AND SAFTYFaMulan2
 
Internet security powerpoint
Internet security powerpointInternet security powerpoint
Internet security powerpointArifa Ali
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awarenessJason Murray
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security AwarenessInnocent Korie
 
Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?Symptai Consulting Limited
 
Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0DallasHaselhorst
 
14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awarenessMichel Bitter
 
Web Security
Web SecurityWeb Security
Web SecurityTripad M
 

Was ist angesagt? (19)

Ethical hacking & Information Security
Ethical hacking & Information SecurityEthical hacking & Information Security
Ethical hacking & Information Security
 
Nat'l Cyber Security Awareness Month (NCSAM) Posters
Nat'l Cyber Security Awareness Month (NCSAM) PostersNat'l Cyber Security Awareness Month (NCSAM) Posters
Nat'l Cyber Security Awareness Month (NCSAM) Posters
 
General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber Security
 
Basic Internet Security
Basic Internet SecurityBasic Internet Security
Basic Internet Security
 
Internet security
Internet securityInternet security
Internet security
 
Cyber security awareness presentation nepal
Cyber security awareness presentation nepalCyber security awareness presentation nepal
Cyber security awareness presentation nepal
 
Computer & internet Security
Computer & internet SecurityComputer & internet Security
Computer & internet Security
 
CYBER ETHICS, CRIMES AND SAFTY
CYBER ETHICS, CRIMES AND SAFTYCYBER ETHICS, CRIMES AND SAFTY
CYBER ETHICS, CRIMES AND SAFTY
 
Internet security
Internet securityInternet security
Internet security
 
Internet security powerpoint
Internet security powerpointInternet security powerpoint
Internet security powerpoint
 
New internet security
New internet securityNew internet security
New internet security
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awareness
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?
 
Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0
 
14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Web Security
Web SecurityWeb Security
Web Security
 
It
ItIt
It
 

Andere mochten auch

Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & securitypinkutinku26
 
Computer Education Curriculum in Nursery and Primary School
Computer Education Curriculum in Nursery and Primary SchoolComputer Education Curriculum in Nursery and Primary School
Computer Education Curriculum in Nursery and Primary SchoolOnasanya2014
 
Basic concepts in computer security
Basic concepts in computer securityBasic concepts in computer security
Basic concepts in computer securityArzath Areeff
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importanceAditya Shukla
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecuritysommerville-videos
 
cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber lawhimanshumunjal
 
An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)Chetan Bharadwaj
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber SecurityStephen Lahanas
 
Information technology act 2000
Information technology act 2000Information technology act 2000
Information technology act 2000Akash Varaiya
 
Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Imperva
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentationBijay Bhandari
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityDipesh Waghela
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.pptAeman Khan
 
Cyber security
Cyber securityCyber security
Cyber securitySiblu28
 

Andere mochten auch (20)

Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Computer Education Curriculum in Nursery and Primary School
Computer Education Curriculum in Nursery and Primary SchoolComputer Education Curriculum in Nursery and Primary School
Computer Education Curriculum in Nursery and Primary School
 
Basic concepts in computer security
Basic concepts in computer securityBasic concepts in computer security
Basic concepts in computer security
 
Security threats
Security threatsSecurity threats
Security threats
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importance
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurity
 
Basic computer class 1
Basic computer class 1Basic computer class 1
Basic computer class 1
 
cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber law
 
it act 2000
it act 2000it act 2000
it act 2000
 
An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Information technology act 2000
Information technology act 2000Information technology act 2000
Information technology act 2000
 
Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016
 
Computer Security Threats
Computer Security ThreatsComputer Security Threats
Computer Security Threats
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Cyber security
Cyber securityCyber security
Cyber security
 

Ähnlich wie 101 Internet Security Tips Slideshow - Know How To Protect Your Computer Online!

How to Bulletproof Your Data Defenses Locally & In the Cloud
How to Bulletproof Your Data Defenses Locally & In the CloudHow to Bulletproof Your Data Defenses Locally & In the Cloud
How to Bulletproof Your Data Defenses Locally & In the CloudNordic Backup
 
Internet security
Internet securityInternet security
Internet securityrfukunaga
 
Giarritano concept paper 4
Giarritano concept paper 4Giarritano concept paper 4
Giarritano concept paper 4leahg118
 
Cybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppCybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppWeSecureApp
 
How to Protect Your PC from Malware, Ransomware, Virus
How to Protect Your PC from Malware, Ransomware, VirusHow to Protect Your PC from Malware, Ransomware, Virus
How to Protect Your PC from Malware, Ransomware, VirusHabFg
 
Computer Security Guide to Pc Security
Computer Security Guide to Pc SecurityComputer Security Guide to Pc Security
Computer Security Guide to Pc SecurityMallTake
 
Tips to remove malwares
Tips to remove malwaresTips to remove malwares
Tips to remove malwaresanthnyq
 
Document safer online for nonprofits guide
Document safer online for nonprofits guideDocument safer online for nonprofits guide
Document safer online for nonprofits guideNguyen Xuan Quang
 
10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.Khalil Jubran
 
Spyware risk it's time to get smart
Spyware risk it's time to get smartSpyware risk it's time to get smart
Spyware risk it's time to get smartKanha Sahu
 
WISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurityWISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurityWISE KIDS
 
Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual Jay Nagar
 
8 threats that even antivirus cannot catch
8 threats that even antivirus cannot catch8 threats that even antivirus cannot catch
8 threats that even antivirus cannot catchiYogi
 
Security Tips To Keep Your Laptop Safe
Security Tips To Keep Your Laptop SafeSecurity Tips To Keep Your Laptop Safe
Security Tips To Keep Your Laptop SafeNoida
 
10 most important cyber security tips for your users
10 most important cyber security tips for your users10 most important cyber security tips for your users
10 most important cyber security tips for your usersSimpliv LLC
 
IT Security Seminar Cougar CPS
IT  Security  Seminar  Cougar  CPSIT  Security  Seminar  Cougar  CPS
IT Security Seminar Cougar CPScougarcps
 
The 10 Commandments of Computer Security
The 10 Commandments of Computer SecurityThe 10 Commandments of Computer Security
The 10 Commandments of Computer SecurityTechvera
 

Ähnlich wie 101 Internet Security Tips Slideshow - Know How To Protect Your Computer Online! (20)

How to Bulletproof Your Data Defenses Locally & In the Cloud
How to Bulletproof Your Data Defenses Locally & In the CloudHow to Bulletproof Your Data Defenses Locally & In the Cloud
How to Bulletproof Your Data Defenses Locally & In the Cloud
 
Internet security
Internet securityInternet security
Internet security
 
Giarritano concept paper 4
Giarritano concept paper 4Giarritano concept paper 4
Giarritano concept paper 4
 
Cybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppCybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureApp
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
How to Protect Your PC from Malware, Ransomware, Virus
How to Protect Your PC from Malware, Ransomware, VirusHow to Protect Your PC from Malware, Ransomware, Virus
How to Protect Your PC from Malware, Ransomware, Virus
 
Computer Security Guide to Pc Security
Computer Security Guide to Pc SecurityComputer Security Guide to Pc Security
Computer Security Guide to Pc Security
 
Tips to remove malwares
Tips to remove malwaresTips to remove malwares
Tips to remove malwares
 
Guide to pc_security
Guide to pc_securityGuide to pc_security
Guide to pc_security
 
Document safer online for nonprofits guide
Document safer online for nonprofits guideDocument safer online for nonprofits guide
Document safer online for nonprofits guide
 
10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.
 
Secure End User
Secure End UserSecure End User
Secure End User
 
Spyware risk it's time to get smart
Spyware risk it's time to get smartSpyware risk it's time to get smart
Spyware risk it's time to get smart
 
WISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurityWISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurity
 
Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual
 
8 threats that even antivirus cannot catch
8 threats that even antivirus cannot catch8 threats that even antivirus cannot catch
8 threats that even antivirus cannot catch
 
Security Tips To Keep Your Laptop Safe
Security Tips To Keep Your Laptop SafeSecurity Tips To Keep Your Laptop Safe
Security Tips To Keep Your Laptop Safe
 
10 most important cyber security tips for your users
10 most important cyber security tips for your users10 most important cyber security tips for your users
10 most important cyber security tips for your users
 
IT Security Seminar Cougar CPS
IT  Security  Seminar  Cougar  CPSIT  Security  Seminar  Cougar  CPS
IT Security Seminar Cougar CPS
 
The 10 Commandments of Computer Security
The 10 Commandments of Computer SecurityThe 10 Commandments of Computer Security
The 10 Commandments of Computer Security
 

Kürzlich hochgeladen

『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书rnrncn29
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predieusebiomeyer
 
ETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxNIMMANAGANTI RAMAKRISHNA
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书zdzoqco
 
Company Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxCompany Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxMario
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxDyna Gilbert
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119APNIC
 
TRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxTRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxAndrieCagasanAkio
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书rnrncn29
 
Unidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxUnidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxmibuzondetrabajo
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa494f574xmv
 

Kürzlich hochgeladen (11)

『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predi
 
ETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptx
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
 
Company Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxCompany Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptx
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptx
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119
 
TRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxTRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptx
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
 
Unidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxUnidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptx
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa
 

101 Internet Security Tips Slideshow - Know How To Protect Your Computer Online!

  • 1.
  • 2. Activate protection systemsIf your operating system comes standard with a built-in firewall, spam blocker, anti- virus software or other security application, be sure that it's activated. Your Internet service provider may provide an e- mail spam filtering service that should also be turned on. If your operating system comes standard with a built-in firewall, spam blocker, anti-virus software or other security application, be sure that it's activated. Your Internet service provider may provide an e-mail spam filtering service that should also be turned on. #1
  • 3. Upgrade your protection Using security software won't help if it's not up to date. Be sure that you are using the latest versions of spam, spyware and virus-detection software. The most current software will be ready to handle the most current on-line threats. Also remember to renew subscriptions if the software registration expires at some point. Using security software won't help if it's not up to date. Be sure that you are using the latest versions of spam, spyware and virus-detection software. The most current software will be ready to handle the most current on-line threats. Also remember to renew subscriptions if the software registration expires at some point. #2
  • 4. Use anti-virus softwareYou should always have anti-virus software on your computer. These programs scan all files that are downloaded from e-mail or opened from the hard drive to ensure that they are safe from malware before use. When these programs detect a virus, they are able to isolate and destroy it so it does not infect your computer. You should always have anti-virus software on your computer. These programs scan all files that are downloaded from e- mail or opened from the hard drive to ensure that they are safe from malware before use. When these programs detect a virus, they are able to isolate and destroy it so it does not infect your computer. #3
  • 5. Use anti-spyware programsJust like anti-virus programs, spyware protection is also necessary. These programs scan your computer for spyware, browser hijackers and other malicious programs. Both free and commercial anti-spyware products are available. Just like anti-virus programs, spyware protection is also necessary. These programs scan your computer for spyware, browser hijackers and other malicious programs. Both free and commercial anti-spyware products are available. #4
  • 6. Update automatically Set both your operating system and security programs to update automatically. Your virus-detection software needs to adapt as new threats become known. Allowing the software to do automatic updates will ensure that you always have the highest level of protection #5
  • 7. Use a secure browserIf you use an older version of Windows, upgrade your browser to Internet Explorer 7 or Firefox 2. Both of these browsers have built-in features to detect on-line threats. If you use an older version of Windows, upgrade your browser to Internet Explorer 7 or Firefox 2. Both of these browsers have built-in features to detect on-line threats. #6
  • 8. Block Pop-upsSet your Internet browser to block pop-ups from websites and advertisements. This will minimize spyware and the chances of clicking on an ad that loads malware onto your computer. Set your Internet browser to block pop-ups from websites and advertisements. This will minimize spyware and the chances of clicking on an ad that loads malware onto your computer. #7
  • 9. Install a security toolbarToolbars with security features offer an additional line of defense. Most include features that block pop-ups, spam and known phishing sites. Some are even able to detect potential consumer scams. Toolbars with security features offer an additional line of defense. Most include features that block pop-ups, spam and known phishing sites. Some are even able to detect potential consumer scams. #8
  • 10. Create User AccountsCreate a user account that is separate from the default administrator account. Only log in as the administrator when making configuration changes to the computer. When the administrator account is used infrequently, the access to change configurations will be more limited to hacking. You may also want to create an individual user account for each member of the family who uses the computer. This will allow for each person to keep his or her information private. Create a user account that is separate from the default administrator account. Only log in as the administrator when making configuration changes to the computer. When the administrator account is used infrequently, the access to change configurations will be more limited to hacking. You may also want to create an individual user account for each member of the family who uses the computer. This will allow for each person to keep his or her information private. #9
  • 11. Turn off your computer When you are not actively using your computer, shut down or disconnect from the Internet. If your computer is on-line less frequently, the chance of access by a malicious source decreases. #10
  • 12. Lock your computer if you step awayIf you take a break from your computer for only a few minutes, it's enough time for a hacker to destroy or steal your information. Locking your computer password-protects your session until you return and prevents anyone else from physically or remotely accessing your information. If you take a break from your computer for only a few minutes, it's enough time for a hacker to destroy or steal your information. Locking your computer password-protects your session until you return and prevents anyone else from physically or remotely accessing your information. #11
  • 13. Be careful with public computersAvoid banking or conducting other personal business on public computers at libraries, hotels and airports. Not only could the on-line activity be intercepted, but strangers in the area could watch your activity and remember passwords and other personal details. Avoid banking or conducting other personal business on public computers at libraries, hotels and airports. Not only could the on-line activity be intercepted, but strangers in the area could watch your activity and remember passwords and other personal details. #12
  • 14. Consider Apple computersSince Windows personal computers are much more prevalent in the marketplace, most viruses and spyware is designed to penetrate Windows software. Mac owners still deal with spam and phishing issues, but the odds of virus attack is much less likely. Since Windows personal computers are much more prevalent in the marketplace, most viruses and spyware is designed to penetrate Windows software. Mac owners still deal with spam and phishing issues, but the odds of virus attack is much less likely. #13
  • 15. Be wary of downloads Free downloads are plentiful on the Internet, and the thousands of games, software and utility programs are very useful. Unfortunately, many of these freebies include malware and spyware. Try to download programs only from well-known manufacturers and trusted sites. #14
  • 16. Consider a security suiteIf your operating system doesn't include security features or you want extra protection, a security software suite will include all the products required to keep your computer safe. If your operating system doesn't include security features or you want extra protection, a security software suite will include all the products required to keep your computer safe. #15
  • 17. Run your antivirus softwareSimply having antivirus software installed will not help your computer from being attacked. Scan for viruses on a regular basis, or set the software to do automatic scans at a certain time daily. Simply having antivirus software installed will not help your computer from being attacked. Scan for viruses on a regular basis, or set the software to do automatic scans at a certain time daily. #16
  • 18. Double your spyware protectionSpyware can be difficult to detect, so it can be worth your while to use two different programs to search for spyware. Set the stronger program for constant monitoring, and use the second for occasional scans to verify that nothing was missed by the first program. Spyware can be difficult to detect, so it can be worth your while to use two different programs to search for spyware. Set the stronger program for constant monitoring, and use the second for occasional scans to verify that nothing was missed by the first program. #17
  • 19. Try disposable e-mail addresses Create separate free e-mail addresses for different purposes. Use this “disposable” e-mail account to register for sites or complete surveys that may result in increased spam. If the spam becomes overwhelming, close the account and create another. This will keep the junk mail from your regular e-mail account, as you continue to use your regular e-mail address for business or personal communication. Create separate free e-mail addresses for different purposes. Use this “disposable” e-mail account to register for sites or complete surveys that may result in increased spam. If the spam becomes overwhelming, close the account and create another. This will keep the junk mail from your regular e-mail account, as you continue to use your regular e-mail address for business or personal communication. #18
  • 20. Use credit cardsWhen shopping on-line, credit cards offer higher protection than debit cards or other payment options. Credit card issuing banks offer protection against fraud that debit cards and checking accounts do not. When shopping on-line, credit cards offer higher protection than debit cards or other payment options. Credit card issuing banks offer protection against fraud that debit cards and checking accounts do not. #19
  • 21. Devote a single credit card to online purchasesIf only one card is used for all online transactions, misuse or identity theft will be easier to detect than if multiple cards were used. Using a single card will also minimize the damage you experience if the card number is stolen. If only one card is used for all online transactions, misuse or identity theft will be easier to detect than if multiple cards were used. Using a single card will also minimize the damage you experience if the card number is stolen. #20
  • 22. Avoid saved passwordsAlthough saved passwords and saved site default settings can be convenient, if your computer is hacked into any saved account information becomes available to the attacker. Limit the use of saved credit card numbers and addresses. Although saved passwords and saved site default settings can be convenient, if your computer is hacked into any saved account information becomes available to the attacker. Limit the use of saved credit card numbers and addresses. #21
  • 23. Look for evidence of secure sitesOnly enter personal information on sites that have the https:// prefix or a padlock icon in your browser window. This means that the Web site is secured and any information transmitted is encrypted and can not be read easily by humans. Only enter personal information on sites that have the https:// prefix or a padlock icon in your browser window. This means that the Web site is secured and any information transmitted is encrypted and can not be read easily by humans. #22
  • 24. Don't assume that secure and honest are the same thing The https:// prefix and padlock symbol are good indicators of transmission security, but not of reputation. Ensure that you shop from or do business with reputable companies by looking for the Better Business Bureau logo or other positive affiliations. Also read reviews on-line to find out what other users have experienced with the company. #23
  • 25. Guard your personal information Do not respond to emails requesting personal information, like passwords, Social Security numbers and birthdates unless you know the sender or are expecting the email. If an email requests that you contact a telephone number, verify the number first. #24
  • 26. Avoid clicking on hyperlinksHyperlinks in email messages can be misleading, as the text shows one address but the link may take you to another. Before clicking on links in e-mails or Web pages, hold the cursor over the link and verify that the address that appears at the bottom of your browser window is the same one that you intend to visit Hyperlinks in email messages can be misleading, as the text shows one address but the link may take you to another. Before clicking on links in e-mails or Web pages, hold the cursor over the link and verify that the address that appears at the bottom of your browser window is the same one that you intend to visit #25
  • 27. Type with careOn-line criminals often create Web sites that look similar to another site and use common misspellings of the original site as the URL. Be sure that you are typing accurately, or use a bookmark to visit favorite sites. On-line criminals often create Web sites that look similar to another site and use common misspellings of the original site as the URL. Be sure that you are typing accurately, or use a bookmark to visit favorite sites. #26
  • 28. Report phishingEmails that appear to be legitimate and ask for information are forms of phishing. If you receive a phishing e-mail, forward it to the appropriate bureaus, including the Anti-Phishing Working Group (reportphishing@antiphishing.org) and the Federal Trade Commission (spam@uce.gov). Emails that appear to be legitimate and ask for information are forms of phishing. If you receive a phishing e-mail, forward it to the appropriate bureaus, including the Anti-Phishing Working Group (reportphishing@antiphishing.org) and the Federal Trade Commission (spam@uce.gov). #27
  • 29. Review your accountsLook at your bank and credit card statements for suspicious or unknown transactions. These are often a signal of identity theft. Report these situations to your bank as soon as possible. Look at your bank and credit card statements for suspicious or unknown transactions. These are often a signal of identity theft. Report these situations to your bank as soon as possible. #28
  • 30. Practice the golden ruleThe Internet is a global community with many positive benefits. Just as in the real world, be responsible, safe and respectful towards others. Also respect any rules or laws that apply to your on-line activity. The Internet is a global community with many positive benefits. Just as in the real world, be responsible, safe and respectful towards others. Also respect any rules or laws that apply to your on-line activity. #29
  • 31. Do not open unknown e-mailsDelete any e-mails from unknown senders. Also be aware of email attachments and do not download attachments that you are unsure about, even if you recognize the sender. Do not forward unknown attachments to others. Delete any e-mails from unknown senders. Also be aware of email attachments and do not download attachments that you are unsure about, even if you recognize the sender. Do not forward unknown attachments to others. #30
  • 32. Create strong, private passwordsChoose password that would be hard for others to guess. Do not use obvious passwords like a name or birth date. Use a combination of letters, numbers and symbols in your password and do not share your password with anyone. Choose password that would be hard for others to guess. Do not use obvious passwords like a name or birth date. Use a combination of letters, numbers and symbols in your password and do not share your password with anyone. #31
  • 33. Use firewall protectionInstall firewalls to prevent hackers from gaining access to your computer. This will prevent theft of any personal information stored on the computer. You may choose an external or software firewall depending on your network needs. Install firewalls to prevent hackers from gaining access to your computer. This will prevent theft of any personal information stored on the computer. You may choose an external or software firewall depending on your network needs. #32
  • 34. Do not file share with strangersSharing files can allow a stranger to look at files stored on your computer or plant a virus to infect the computer. Learn about the risks of file sharing, and learn how to disable file sharing on your operating system to prevent these risks. If a file sharing program is installed on your computer, be sure that it does not run automatically when you boot up your computer. Sharing files can allow a stranger to look at files stored on your computer or plant a virus to infect the computer. Learn about the risks of file sharing, and learn how to disable file sharing on your operating system to prevent these risks. If a file sharing program is installed on your computer, be sure that it does not run automatically when you boot up your computer. #33
  • 35. Back up your files regularlyMake a back up of your hard drive onto an external media device. The act of making a back up copy does not offer protection, but it is insurance that nothing will be lost should a computer security disaster occur. Make a back up of your hard drive onto an external media device. The act of making a back up copy does not offer protection, but it is insurance that nothing will be lost should a computer security disaster occur. #34
  • 36. Protect your from power outagesUse power strips and surge protectors to protect your computer against sudden power outages. During a storm when a power surge is likely, shut your computer down and unplug it to prevent any loss of information. Use power strips and surge protectors to protect your computer against sudden power outages. During a storm when a power surge is likely, shut your computer down and unplug it to prevent any loss of information. #35
  • 37. Evaluate your computer's securityReview the security features and programs on your computer twice annually to be sure that everything is working as it is supposed to. Update or replace any programs as necessary. Do this process for all computers in your home. Review the security features and programs on your computer twice annually to be sure that everything is working as it is supposed to. Update or replace any programs as necessary. Do this process for all computers in your home. #36
  • 38. Delete unused software programsPrograms that you do not use take up valuable space in your computer's memory. In addition to wasting resources, rarely-used programs are usually not updated and may not have the security patches that could stop a hacker from accessing your computer. Programs that you do not use take up valuable space in your computer's memory. In addition to wasting resources, rarely- used programs are usually not updated and may not have the security patches that could stop a hacker from accessing your computer. #37
  • 39. Be wary of e-mail attachmentsDo not open email attachments from strangers unless the security and anti-virus software on your computer verifies that they are safe. Always delete any spam or junk email that contains an attachment. Do not open email attachments from strangers unless the security and anti-virus software on your computer verifies that they are safe. Always delete any spam or junk email that contains an attachment. #38
  • 40. Never open certain attachmentsViruses are often sent as email attachments. Avoid opening any file with an extension that is .exe, .pif, .com or .bat, regardless of who they are from. These are almost always harmful files. Viruses are often sent as email attachments. Avoid opening any file with an extension that is .exe, .pif, .com or .bat, regardless of who they are from. These are almost always harmful files. #39
  • 41. Don't click on pop-upsMany malicious sites use pop-ups that look very similar to the ones that your operating system may use to tell you that there is a security risk for your computer. These are ploys to get you to click on the ad; if you do click, the site usually installs spyware or malware on your computer. Close these ads by clicking on the X in the top right corner. Many malicious sites use pop-ups that look very similar to the ones that your operating system may use to tell you that there is a security risk for your computer. These are ploys to get you to click on the ad; if you do click, the site usually installs spyware or malware on your computer. Close these ads by clicking on the X in the top right corner. #40
  • 42. Be sure that your anti-spyware program is authenticStick with anti-spyware products from reputable manufacturers. Unfortunately, some products marketed as free spyware detectors actually install spyware on your computer. Stick with anti-spyware products from reputable manufacturers. Unfortunately, some products marketed as free spyware detectors actually install spyware on your computer. #41
  • 43. Read the license agreementBefore installing any downloaded software, review its license agreement. Many free downloads come with spyware and programs that you would not want installed on your computer. Careful reading of the agreement can help you to find them. Before installing any downloaded software, review its license agreement. Many free downloads come with spyware and programs that you would not want installed on your computer. Careful reading of the agreement can help you to find them. #42
  • 44. Avoid pornographic Web sitesThe majority of spyware is distributed through pop-ups from pornographic sites. On-line gambling sites are also popular locations for adware and spyware. The majority of spyware is distributed through pop-ups from pornographic sites. On-line gambling sites are also popular locations for adware and spyware. #43
  • 45. Do not use unlicensed softwarePirated software is illegal, and the sites that distribute it are often loaded with malware. This admonition goes beyond software, including crack key generators, and pirated music or movies. Unlicensed software is sometimes incompatible with patches and can be more susceptible to viruses. It may even come with viruses previously installed. Pirated software is illegal, and the sites that distribute it are often loaded with malware. This admonition goes beyond software, including crack key generators, and pirated music or movies. Unlicensed software is sometimes incompatible with patches and can be more susceptible to viruses. It may even come with viruses previously installed. #44
  • 46. Run on-line virus scansIn addition to running the anti-virus scan scheduled on your computer, occasionally run a free on- line scan to make sure you're your computer is not infected with something that your installed software is not aware of. Each program may find something that the other does not. In addition to running the anti-virus scan scheduled on your computer, occasionally run a free on-line scan to make sure you're your computer is not infected with something that your installed software is not aware of. Each program may find something that the other does not. #45
  • 47. Visit Windows UpdateIf you use Windows, visit Windows Update on a regular basis. The site will scan your computer for any updates or patches that are not installed on your computer. Then it will create a list of the items recommended to update your computer. Download anything marked as a critical update to keep your computer secure. If you use Windows, visit Windows Update on a regular basis. The site will scan your computer for any updates or patches that are not installed on your computer. Then it will create a list of the items recommended to update your computer. Download anything marked as a critical update to keep your computer secure. #46
  • 48. Password protect and encrypt sensitive files In addition to protecting the entire computer, you may want to encrypt or use passwords for certain files or folders that contain confidential information. In addition to protecting the entire computer, you may want to encrypt or use passwords for certain files or folders that contain confidential information. #47
  • 49. Visit Apple Security UpdatesIf you are a Mac user, check the Apple Security Site for new updates and download them if they are available. If you are a Mac user, check the Apple Security Site for new updates and download them if they are available. #48
  • 50. Protect your identityPersonal information is all that an on- line criminal needs to begin stealing your identity. Be sure to keep your social security number, birth date, credit card numbers and address protected by limiting how you share the information on-line. Personal information is all that an on-line criminal needs to begin stealing your identity. Be sure to keep your social security number, birth date, credit card numbers and address protected by limiting how you share the information on-line. #49
  • 51. Protect your kidsChildren face many unique risks with Internet activity. Monitor your children's on-line activity and use parental filters or other tools to protect them from threats and security risks. Children face many unique risks with Internet activity. Monitor your children's on-line activity and use parental filters or other tools to protect them from threats and security risks. #50
  • 52. Disable scripts and active contentSet your browser to prompt you when Javascript, Java or ActiveX controls are executed on a Web site. Malicious code is sometimes hidden in these features. Be sure that the site is trustworthy before enabling the content. Set your browser to prompt you when Javascript, Java or ActiveX controls are executed on a Web site. Malicious code is sometimes hidden in these features. Be sure that the site is trustworthy before enabling the content. #51
  • 53. Be mindful of the information kept on portable USB drivesPortable USB drives are a convenient way to store information, but their small size makes them easy to lose. Consider encrypting the data stored on these drives, in case of loss or theft. If you find someone else's USB drive, do not plug it into your computer. Hand it over to authorities instead. Portable USB drives are a convenient way to store information, but their small size makes them easy to lose. Consider encrypting the data stored on these drives, in case of loss or theft. If you find someone else's USB drive, do not plug it into your computer. Hand it over to authorities instead. #52
  • 54. Keep a log of sites visited. Have children keep a list of any sites that they visit so you can review for potential spyware and other risks. Do not let children register with Web sites without permission. Have children keep a list of any sites that they visit so you can review for potential spyware and other risks. Do not let children register with Web sites without permission. #53
  • 55. Use a spam filterIf your e-mail program separates spam and junk mail, use these features. This will filter away the scams and malicious messages so that there is no chance of accidental response or infection. If your e-mail program separates spam and junk mail, use these features. This will filter away the scams and malicious messages so that there is no chance of accidental response or infection. #54
  • 56. Be wary of strange messagesHackers and e-mail viruses can come in e-mails from recognized senders, so be aware of any strange e-mails, even if the sender's name is familiar. Examples of strange messages include attachments with odd file extensions or incoherent words in the message body. Treat these messages as you would ones from unknown senders and delete them immediately. Hackers and e-mail viruses can come in e-mails from recognized senders, so be aware of any strange e-mails, even if the sender's name is familiar. Examples of strange messages include attachments with odd file extensions or incoherent words in the message body. Treat these messages as you would ones from unknown senders and delete them immediately. #55
  • 57. Change passwords regularlyChanging passwords on a regular basis can help prevent criminals from accessing your personal information. Get in the habit of changing passwords every 90 days. Also change your password if you feel that there has been any type of security breach. Changing passwords on a regular basis can help prevent criminals from accessing your personal information. Get in the habit of changing passwords every 90 days. Also change your password if you feel that there has been any type of security breach. #56
  • 58. Stay informedSubscribe to the National Cyber Alert System at www.us-cert.gov. These updates will give you timely information about current Internet security issues. Knowing the risks is important to effectively protect your home and business computers. Subscribe to the National Cyber Alert System at www.us- cert.gov. These updates will give you timely information about current Internet security issues. Knowing the risks is important to effectively protect your home and business computers. #57
  • 59. Be cautious with chat and instant messaging Before divulging any personal information in a chat or IM message, be sure that you are communicating with who you expect to communicate with. To ensure that friends are not confused with strangers, you may want to create a password to help you recognize an on-line friend. #58
  • 60. Forward spoof e-mails to verifyPhising e-mails often claim to be from eBay, PayPal, or a familiar company name. If you are unsure of the e-mail's validity, forward it to the customer service department at the actual company the email claims to be from. They can confirm whether or not it is real. Phising e-mails often claim to be from eBay, PayPal, or a familiar company name. If you are unsure of the e-mail's validity, forward it to the customer service department at the actual company the email claims to be from. They can confirm whether or not it is real. #59
  • 61. Limit information given when registering for a Web site Although name and e-mail address are usually standard requirements for any site registration, some require more information, like address and phone number. Be cautious of which sites you give the information to. When possible only complete the required fields, often marked with an asterisk. #60
  • 62. Be safe about meeting on-line friends in personIf you decide to meet an on-line only friend in person, meet at a public place and tell other friends and family about your plans. If you decide to meet an on-line only friend in person, meet at a public place and tell other friends and family about your plans. #61
  • 63. Protect friends' e-mail addressesTo avoid sharing e- mail addresses of friends and family with spyware distributors and spammers, avoid using a site's "recommend to friends" feature unless you are sure that the Web site is reputable. To avoid sharing e-mail addresses of friends and family with spyware distributors and spammers, avoid using a site's "recommend to friends" feature unless you are sure that the Web site is reputable. #62
  • 64. Mark spam messagesAn e-mail spam filter will catch most spam and junk mail messages, but some may still get through. Train your e-mail service to recognize junk by marking junk mail messages in your inbox as spam. The e-mail service will know to direct similar messages to the spam folder in the future. An e-mail spam filter will catch most spam and junk mail messages, but some may still get through. Train your e-mail service to recognize junk by marking junk mail messages in your inbox as spam. The e-mail service will know to direct similar messages to the spam folder in the future. #63
  • 65. Read the fine printReview the terms and conditions for any site you register with. Most have a checkbox for whether you would like to receive updates and offers from sponsors. Be sure that this box is left unchecked, or you could end up receiving lots of junk mail and spam. Most reputable sites include a statement explaining that they do not sell or share your e-mail address with other companies. Review the terms and conditions for any site you register with. Most have a checkbox for whether you would like to receive updates and offers from sponsors. Be sure that this box is left unchecked, or you could end up receiving lots of junk mail and spam. Most reputable sites include a statement explaining that they do not sell or share your e-mail address with other companies. #64
  • 66. Be careful about what you share with othersDon't say anything on-line that you would not tell anyone you never met. This is especially important for social networking sites, like Twitter or Facebook. Be sure not to divulge addresses of where you are or full names of who you are with. Too much information can be an invitation for a stranger to show up at your location. Don't say anything on-line that you would not tell anyone you never met. This is especially important for social networking sites, like Twitter or Facebook. Be sure not to divulge addresses of where you are or full names of who you are with. Too much information can be an invitation for a stranger to show up at your location. #65
  • 67. Practice caution with Out-Of-Office responsesAn automated response explaining that you are unable to check emails on vacation can be helpful, but it also acts as an advertisement that you are away from your computer and/or your home. If possible, modify the Out-Of-Office response settings so the response is only sent to existing members of your e-mail address book. Don't be too specific about the details of where you are and why you won't check your e-mail; leave the message simple and secure. An automated response explaining that you are unable to check emails on vacation can be helpful, but it also acts as an advertisement that you are away from your computer and/or your home. If possible, modify the Out-Of-Office response settings so the response is only sent to existing members of your e-mail address book. Don't be too specific about the details of where you are and why you won't check your e-mail; leave the message simple and secure. #66
  • 68. Know who is watching you Be careful about your e-mail and Internet activity at work. In most of the United States, any activity conducted on a work computer is property of the employer. Not only could inappropriate activity result in work-related disciplinary action, but you could end up divulging personal information to strangers at your place of business. #67
  • 69. Beware of public Wi-Fi access. Don't send or view confidential information when using public wireless connections. Other wireless users in the same location could monitor network activity and see what you are doing. Don't send or view confidential information when using public wireless connections. Other wireless users in the same location could monitor network activity and see what you are doing. #68
  • 70. Minimize chances of mobile device theftDon't advertise that you have a laptop by using it in public. Consider using a non-traditional laptop carrying case and an alarm or lock to add additional security. Don't advertise that you have a laptop by using it in public. Consider using a non-traditional laptop carrying case and an alarm or lock to add additional security. #69
  • 71. Always log off of secured sitesWhen using on-line banking or other password protected sites, be sure to log off when finished and close the browser window. This ensures that the session is closed and information can not be viewed by others. This is especially important if you are using a public computer. When using on-line banking or other password protected sites, be sure to log off when finished and close the browser window. This ensures that the session is closed and information can not be viewed by others. This is especially important if you are using a public computer. #70
  • 72. Clear your cookies frequentlyCookies are the way that Web sites store personal information. Not all cookies are bad, but some companies sell this information to other companies for marketing purposes. You can delete unnecessary cookies through the Internet options section of your browser. Cookies are the way that Web sites store personal information. Not all cookies are bad, but some companies sell this information to other companies for marketing purposes. You can delete unnecessary cookies through the Internet options section of your browser. #71
  • 73. Secure mobile connectionsWhen using Wi-Fi, hot spots or Internet cafes, be sure that webmail is secured with the https:// prefix. Also be aware of those around you who may watch you type passwords or other personal details. When using Wi-Fi, hot spots or Internet cafes, be sure that webmail is secured with the https:// prefix. Also be aware of those around you who may watch you type passwords or other personal details. #72
  • 74. Secure your home wireless connectionMake sure that your home WiFi connection is password-protected so no one can access your connection, even if they are in signal range. Make sure that your home WiFi connection is password- protected so no one can access your connection, even if they are in signal range. #73
  • 75. Remember physical securityAll the security precautions in the world will not protect your computer if it is physically vulnerable to theft. Always keep your laptop in sight when traveling. If a private computer is kept in a home with roommates or family members, consider locking the door to the computer room when you are not around. All the security precautions in the world will not protect your computer if it is physically vulnerable to theft. Always keep your laptop in sight when traveling. If a private computer is kept in a home with roommates or family members, consider locking the door to the computer room when you are not around. #74
  • 76. Watch for security cuesSecured sites should change from the http:// prefix to https:// or shttp:// at the moment when you are prompted to type in a user name and password. Secured sites should change from the http:// prefix to https:// or shttp:// at the moment when you are prompted to type in a user name and password. #75
  • 77. Review your credit reportsEach consumer is entitled to a free copy of his or her credit report each year. Order copies of credit reports from the three reporting bureaus annually, and review for incorrect information or unfamiliar accounts. Dispute any errors immediately. Each consumer is entitled to a free copy of his or her credit report each year. Order copies of credit reports from the three reporting bureaus annually, and review for incorrect information or unfamiliar accounts. Dispute any errors immediately. #76
  • 78. Use separate computers for leisure and personal businessIf possible, stop Web surfing on the computer that you use for on-line banking or shopping. This will limit the amount of cookies, spyware and monitoring and can reduce the incidence of identity theft. If possible, stop Web surfing on the computer that you use for on-line banking or shopping. This will limit the amount of cookies, spyware and monitoring and can reduce the incidence of identity theft. #77
  • 79. Be aware of cyberstalkingCyberstalking is on-line harassment, including threatening e-mails, identity assumption and on-line defamation of character. If you believe you are a victim of cyberstalking, your Internet service provider should be able to assist you in finding the perpetrator. Cyberstalking is on-line harassment, including threatening e- mails, identity assumption and on-line defamation of character. If you believe you are a victim of cyberstalking, your Internet service provider should be able to assist you in finding the perpetrator. #78
  • 80. Be safe on social networking sitesUse the privacy settings on social networking sites to keep your personal details secure. Make information like your last name, e-mail address and phone number invisible to anyone except for people you know and approve. Do not allow the site to automatically accept friend requests. Instead, approve each request personally. Use the privacy settings on social networking sites to keep your personal details secure. Make information like your last name, e-mail address and phone number invisible to anyone except for people you know and approve. Do not allow the site to automatically accept friend requests. Instead, approve each request personally. #79
  • 81. Keep sensitive information out of chat rooms Even if you are talking with someone in a private chat room, chat services often archive conversations on a server. You have no control over what happens to archived conversations. Even if you feel that everything is secure on your end, remember that you don't know if the person you are chatting with has someone watching his or her interactions with you. #80
  • 82. Browse with careBe cautious about the Web sites that you visit, and if a site seems suspicious, close your browser and leave the site. Most Web sites are able to track bits of information from your computer, like IP address and the software that you use, for marketing purposes. While this information collection is not necessarily harmful from trustworthy sites, Web sites that seem less legitimate can use this information for malicious activity. Be cautious about the Web sites that you visit, and if a site seems suspicious, close your browser and leave the site. Most Web sites are able to track bits of information from your computer, like IP address and the software that you use, for marketing purposes. While this information collection is not necessarily harmful from trustworthy sites, Web sites that seem less legitimate can use this information for malicious activity. #81
  • 83. Change Wi-Fi administrator passwordsMost Wifi routers come with a generic username and password for equipment setup. Although password-protected, this information is not specific to the individual and therefore well known to hackers. Change the username and password as soon as your wireless network is set up. Most Wifi routers come with a generic username and password for equipment setup. Although password-protected, this information is not specific to the individual and therefore well known to hackers. Change the username and password as soon as your wireless network is set up. #82
  • 84. Enable WPA/WEP encryptionAll WiFi equipment supports encryption to protect information sent over wireless networks. Choose the strongest encryption option that works with your network. It may require synchronizing the encryption settings on all Wi-Fi devices that you and your family use. All WiFi equipment supports encryption to protect information sent over wireless networks. Choose the strongest encryption option that works with your network. It may require synchronizing the encryption settings on all Wi-Fi devices that you and your family use. #83
  • 85. Change the default SSID name Wi-Fi access points and routers use a network name called the SSID, and routers often have a default SSID of the manufacturer name. Using the generic SSID does not make your wireless network more susceptible to threats, but it is a sign to others that the network is poorly configured, making it more of a target. Shange the default SSID name immediately when configuring your wireless security. #84
  • 86. Allow MAC address filteringEach Wi-Fi component has a unique identifier called the MAC address, and access points and routers keep tabs on all the MAC addresses of devices that connect to them. Many products allow the owner to type in the MAC addresses of his or her equipment, so the etwork will only allow connection from those approved devices. Each Wi-Fi component has a unique identifier called the MAC address, and access points and routers keep tabs on all the MAC addresses of devices that connect to them. Many products allow the owner to type in the MAC addresses of his or her equipment, so the etwork will only allow connection from those approved devices. #85
  • 87. Disable SSID broadcastAccess points and routers usually broadcast the SSID name at regular intervals. This function was originally intended for roaming, but it is unnecessary when a wireless network is used in the home. Disable the broadcast so others will not be able to see your network. Access points and routers usually broadcast the SSID name at regular intervals. This function was originally intended for roaming, but it is unnecessary when a wireless network is used in the home. Disable the broadcast so others will not be able to see your network. #86
  • 88. Disable Wi-Fi auto-connectMost computers have a setting to allow the computer to connect to any open wireless network. Disable this setting and always connect directly to your home network. Use the auto-connect if necessary during temporary situations, like when traveling. Most computers have a setting to allow the computer to connect to any open wireless network. Disable this setting and always connect directly to your home network. Use the auto-connect if necessary during temporary situations, like when traveling. #87
  • 89. Assign fixed IP addresses to wireless devicesTurn off DHCP and assign a static IP address to your computer. Although DHCP is easier to configure, it is also easier for hackers to find IP addresses and intercept. Use a private range for the IP address so the computer is not vulnerable to being reached from the Web. Turn off DHCP and assign a static IP address to your computer. Although DHCP is easier to configure, it is also easier for hackers to find IP addresses and intercept. Use a private range for the IP address so the computer is not vulnerable to being reached from the Web. #88
  • 90. Enable the firewalls on your routerIn addition to a firewall on your computer, make sure that your wireless router's firewall is turned on. This will offer an additional level of protection for your home wireless network. In addition to a firewall on your computer, make sure that your wireless router's firewall is turned on. This will offer an additional level of protection for your home wireless network. #89
  • 91. Position the router appropriately Home Wi-Fi signals are intended to be used in the home. While some signal may leak outdoors, keep an eye on how far the signal reaches. The position of the router determines how far the signal will reach, so try to place the router in the center of the home to prevent the signal passing across streets or into different neighborhoods. #90
  • 92. Shut down your network when it is not being usedWhile it isn't practical to turn off a wireless network daily, be sure that it is disconnected if you plan to be gone on vacation or extended off-line periods. While it isn't practical to turn off a wireless network daily, be sure that it is disconnected if you plan to be gone on vacation or extended off-line periods. #91
  • 93. Use third-party payment servicesWhen shopping online, use a third-party service to pay. These services, like PayPal and Amazon Payments, seamlessly transfer money from a bank account to the vendor without the need to expose your bank or credit card information to the seller. When shopping online, use a third-party service to pay. These services, like PayPal and Amazon Payments, seamlessly transfer money from a bank account to the vendor without the need to expose your bank or credit card information to the seller. #92
  • 94. Watch out for e-mail hoaxesIf it's too good to be true, it probably isn't. Be cautious of any easy money scams, like promises of lottery winnings or requests to move money from a foreign country. These scams usually ask that you send money or personal information to sign up for the opportunity. Steer clear of these hoaxes. If it's too good to be true, it probably isn't. Be cautious of any easy money scams, like promises of lottery winnings or requests to move money from a foreign country. These scams usually ask that you send money or personal information to sign up for the opportunity. Steer clear of these hoaxes. #93
  • 95. Beware of virus hoaxesSometimes e-mails that inform of a security risk are malicious or intended to create panic. Always verify before you act or share the information. Check with McAfee or F-Secure to see if the virus described is a hoax before you take any action. Sometimes e-mails that inform of a security risk are malicious or intended to create panic. Always verify before you act or share the information. Check with McAfee or F-Secure to see if the virus described is a hoax before you take any action. #94
  • 96. Avoid BotsNot everyone in a chat room is an actual person behind a keyboard. Chat robots, or bots, are often used to moderate chat rooms and provide news or weather updates. Malicious bots can be set up to infiltrate your computer. Not everyone in a chat room is an actual person behind a keyboard. Chat robots, or bots, are often used to moderate chat rooms and provide news or weather updates. Malicious bots can be set up to infiltrate your computer. #95
  • 97. Take precautions with smartphonesUse the same precautions accessing your smartphone in public as you would any other public computer. Avoid on-line banking in busy public spaces because strangers could shoulder-surf to watch what you type. Also consider disabling the feature that allows the phone to automatically connect to any open wireless network. Use the same precautions accessing your smartphone in public as you would any other public computer. Avoid on-line banking in busy public spaces because strangers could shoulder-surf to watch what you type. Also consider disabling the feature that allows the phone to automatically connect to any open wireless network. #96
  • 98. Encrypt Internet phonesVoice over IP (VOIP) is a way of communicating by voice over public internet connections, so a risk of eavesdropping is always present. Choose a VOIP provider that offers secure encryption services. Voice over IP (VOIP) is a way of communicating by voice over public internet connections, so a risk of eavesdropping is always present. Choose a VOIP provider that offers secure encryption services. #97
  • 99. Erase data from unwanted computersBefore tossing out an old computer, copy all the data tha you need to keep and erase the hard disk. Simply deleting files is not enough. Use a program to erase all traces of personal data from the computer before recycling or donating. Before tossing out an old computer, copy all the data tha you need to keep and erase the hard disk. Simply deleting files is not enough. Use a program to erase all traces of personal data from the computer before recycling or donating. #98
  • 100. Assume permanenceThe Internet does not have a delete button. If you post or publish any information and then delete it, you maintain no control over how it is copied, stored or archived. Think before you post anything that you may regret later. The Internet does not have a delete button. If you post or publish any information and then delete it, you maintain no control over how it is copied, stored or archived. Think before you post anything that you may regret later. #99
  • 101. Be cautious of links or attachments from chat messagesAlthough you may feel comfortable with a person that you share conversations with in a chat room, if you do not really know the person, you can not be sure of his or her intentions. Avoid clicking on any links or opening attachments from a chat buddy that you do not know very well. This is a common method for hackers to distribute malicious material directly. Although you may feel comfortable with a person that you share conversations with in a chat room, if you do not really know the person, you can not be sure of his or her intentions. Avoid clicking on any links or opening attachments from a chat buddy that you do not know very well. This is a common method for hackers to distribute malicious material directly. #100
  • 102. Know what to do if something is wrongIf you suspect that malware is affecting your computer, stop any on-line activities that involve usernames, passwords or other personal information. Scan your computer with an anti-virus software, and delete anything that the program finds to be suspicious. If the problem is not resolved call for professional technical help from a repair shop or manufacturer. If you suspect that malware is affecting your computer, stop any on-line activities that involve usernames, passwords or other personal information. Scan your computer with an anti- virus software, and delete anything that the program finds to be suspicious. If the problem is not resolved call for professional technical help from a repair shop or manufacturer. #101