SlideShare ist ein Scribd-Unternehmen logo
1 von 33
The Internet = A World of
     Opportunities

                            Look what’s at your fingertips
                            •   A way to communicate with
                                friends, family, colleagues
                            •   Access to information
                                and entertainment
                            •   A means to learn, meet
                                people, and explore



www.microsoft.com/protect
Online Security Versus
     Online Safety
     Security: We must
     secure our computers
     with technology in the
     same way that we secure
     the doors to our homes.
     Safety: We must act in
     ways that help protect us
     against the risks that
     come with Internet use.



www.microsoft.com/protect
Primary Online Risks and Threats



     To Computers           To Families        To Personal
     •   Viruses            •   Cyberbullies   Information
     •   Worms              •   File-sharing   •   Online fraud and
                                abuses             phishing
     •   Trojans
                            •   Invasion       •   Hoaxes
     •   Spyware                of privacy     •   Identity theft
                            •   Disturbing     •   Spam
                                content
                            •   Predators



www.microsoft.com/protect
Primary Threats to Computer Security




      Viruses/Worms
      Software programs
      designed to invade    Trojans
      your computer, and    Viruses that pretend to be
      copy, damage, or      helpful programs while
      delete your data.     destroying your data,
                                                         Spyware
                            damaging your computer,      Software that tracks your
                            and stealing your            online activities or
                            personal information.        displays endless ads.




www.microsoft.com/protect
Primary Online Risks for Children

                                                                    Disturbing
                                                                    Content
                                                                    If kids explore
                                                                    unsupervised, they
                                   File-share Abuse                 could stumble upon
   Cyberbullies                                                     images or information
                                   Unauthorized sharing of
                                                                    you may not want
   Both children and adults        music, video, and other
                                                                    them exposed to.
   may use the Internet to         files may be illegal,
   harass or intimidate            and download
   other people.                   malicious software.



                   Predators                      Invasion of Privacy
                   These people use the           If kids fill out online forms, they
                   Internet to trick children     may share information you
                   into meeting with them         don’t want strangers to have
                   in person.                     about them or your family.


www.microsoft.com/protect
Primary Threats to Personal
    Online Safety

                    Phishing
                    E-mail sent by online
                    criminals to trick you                        Spam
                    into going to fake Web
                    sites and revealing                           Unwanted e-mail,
                    personal information                          instant messages,
                                                                  and other online
                                                                  communication

   Identity Theft
   A crime where con                Hoaxes
   artists get your                 E-mail sent by online
   personal information             criminals to trick you into
   and access your cash             giving them money
   and/or credit



www.microsoft.com/protect
Steps You Can Take



   Your computer               Your family               Yourself
   1. Turn on Windows          1. Talk with your kids    1. Practice Internet
      Internet firewall.          about what they           behavior that lowers
   2. Use Microsoft Update        do online.                your risk.
      to keep Windows up-      2. Set clear rules for    2. Manage your personal
      to-date automatically.      Internet use.             information carefully.
   3. Install and maintain     3. Keep personal          3. Use anti-phishing and
      antivirus software.         information private.      anti-spam technology
   4. Install and maintain     4. Use family safety         built into Windows
      Microsoft Windows           settings in               Vista, Windows XP
      Defender.                   Microsoft software.       SP2, Windows Live,
                                                            and Microsoft Outlook.


www.microsoft.com/protect
Four Steps to Help Protect
    Your Computer

             Turn on Windows Internet firewall

             Use Microsoft Update to keep Windows
             up-to-date automatically
             Install and maintain antivirus software

             Install and maintain antispyware software


www.microsoft.com/protect
Turn on Windows Internet Firewall


                            An Internet firewall
                            helps create a
                            protective barrier
                            between your
                            computer and
                            the Internet




www.microsoft.com/protect
Use Automatic Updates to
    Keep Software Up-to-date

    •    Install all updates
         as soon as they
         are available
    •    Automatic updates
         provide the best
         protection




www.microsoft.com/protect
Install and Maintain Antivirus Software

                               •   Antivirus software
                                   helps to detect and
                                   remove computer
                                   viruses before they
                                   can cause damage.
                               •   For antivirus
                                   software to be
                                   effective, you must
         Don’t let it expire       keep it up-to-date.



www.microsoft.com/protect
Install and Maintain Antispyware
     Software


                            Use antispyware
                            software, like Microsoft
                            Windows Defender, so
                            unknown software cannot
                            track your online activity
                            and potentially steal your
                            information.



www.microsoft.com/protect
Other Ways to Help Protect
     Your Computer

                            Back up your files regularly

                            Read Web site
                            privacy statements

                            Close pop-ups using red “X”

                            Think before you click



www.microsoft.com/protect
Back up Your Files


                            •   Save to CD/DVD, a
                                USB drive, or other
                                external source
                            •   Use a Web-based
                                backup service




www.microsoft.com/protect
Think Before You Click


   •    Be cautious with e-mail
        attachments and links
   •    Only download
        files from Web sites
        you trust




www.microsoft.com/protect
Read Privacy Statements

    Understand what you
    are getting before you
    agree to download or
    share your personal
    information




www.microsoft.com/protect
Use the Red “X” to Close Pop-ups

                            •   Always use the red “X”
                                in the corner of a pop-
                                up screen.
                            •   Never click “yes,”
                                “accept,” or even
                                “cancel,” because it
                                could be a trick that
                                installs software on
                                your computer.



www.microsoft.com/protect
Take Steps to Help Protect
    Your Family

            Talk with your kids about what they do online

            Set clear rules for Internet use

            Keep personal information private

            Use family safety software


www.microsoft.com/protect
Talk with Your Kids
       about Online Risks
   •    Talk frankly with your kids
        about Internet risks, including
        •   Online criminals
        •   Inappropriate content
        •   Invasion of privacy
   •    Empower them by teaching
        them how their own
        behavior can reduce those
        risks and help to keep them       Helpful online resources
        safe when they are online           www.staysafe.org
                                            www.getnetwise.org
                                            www.microsoft.com/protect



www.microsoft.com/protect
Pay Attention to What
     Your Kids Do Online
    •     Keep the computer in a
          central area
    •     Get to know how your
          kids use the Internet
    •     Let your kids be the
          teacher
    •     Teach kids to trust
          their instincts
    •     Encourage them to
          report any problems


www.microsoft.com/protect
Keep Personal Information Private

    •    Teach children to check
         with you before sharing
         personal information online
    •    Monitor your children’s
         online activities
    •    Teach your children to
         report suspicious activity
    •    Help children choose
         appropriate screen names
         and e-mail addresses


www.microsoft.com/protect
Set Clear Rules for Internet Use

  •    Do not share files or
       open attachments
  •    Do not click links in e-mail
  •    Treat others the way
       you want to be treated
  •    Stand up for yourself
  •    Respect other
       people’s property
  •    Never go alone to meet an
       Internet “friend” in person


www.microsoft.com/protect
Use Family Safety Software

    •     Available in Windows
          Vista , Windows Live
                ®              ™




          OneCare Family Safety,
                      ™




          Xbox 360
                       ®




    •     Helps parents manage
          the content their children
          view, what they do, and
          who they communicate
          with online


www.microsoft.com/protect
How to Handle Problems

     •    Contact police to report any
          threat immediately
     •    Report incidents to:


                                 CyberTipline
                                 800-843-5678
                                 www.cybertipline.com



www.microsoft.com/protect
Take Steps to Help Protect
    Your Personal Information

             Practice Internet behavior that lowers
             your risk

             Manage your personal information carefully

             Use technology to reduce nuisances,
             and raise the alarm when appropriate



www.microsoft.com/protect
Practice Internet Behaviors that
     Help Reduce Your Risk


                            •   Delete spam, don’t open it
                            •   Be on the lookout for
                                online scams
                            •   Use strong passwords




www.microsoft.com/protect
Manage Personal Information
     Carefully
                            •   Do not share personal
                                information in e-mail or
                                instant messages
                            •   Use only secure and
                                trusted Web sites
                            •   Make sure you are where
                                you think you are: Web
                                sites can be faked
                            •   Avoid financial transactions
                                over wireless networks
                            •   When in public, stay private

www.microsoft.com/protect
Use Anti-Phishing and
       Anti-Spam Technology

   •     Most e-mail providers
         and programs, like
         Windows Live Hotmail
                                ®



         and Microsoft Outlook ,
                                ®



         filter most spam
   •     Phishing Filter in
         Internet Explorer 7
                            ®



         helps to block and warn
         about suspicious sites



www.microsoft.com/protect
If Your Identity is Stolen

     •    Report it
     •    Follow up in writing
     •    Change all passwords
     •    Place fraud alert on credit reports

                            Get a copy of your credit report
                            and ensure your account is marked
                            “fraud alert” and “victim’s statement”




www.microsoft.com/protect
How Does Microsoft Help Improve
     Security and Safety?



    Partnership                Technology                Guidance
    By partnering with         By developing software    By providing useful
    non-governmental           products and tools that   guidance that helps
    organizations, other       increase security and     people understand
    technology companies,      safety, helping people    online risks and what
    and governments            minimize their risk       actions they can take.
    worldwide to help          online and make
    keep people safe online.   informed choices.




www.microsoft.com/protect
For More Information


   www.microsoft.com/protect
   www.staysafe.org
   www.getnetwise.org




www.microsoft.com/protect
© 2007 Microsoft Corporation. All rights reserved.
Microsoft, Hotmail, OneCare, Outlook, Windows, Windows Vista, Xbox, Xbox 360, Xbox LIVE, and other product names are or may be registered trademarks and/or trademarks
in the U.S. and/or other countries.
The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation.
Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft,
and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation.
MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Weitere ähnliche Inhalte

Was ist angesagt?

Danger on Your Desktop
Danger on Your DesktopDanger on Your Desktop
Danger on Your DesktopAndy Smith
 
csa2014 IBC
csa2014 IBCcsa2014 IBC
csa2014 IBCapyn
 
Lesson 2 Rules of Netiquette
Lesson 2   Rules of NetiquetteLesson 2   Rules of Netiquette
Lesson 2 Rules of NetiquetteACLC Antipolo
 
HELE 4 Lesson 2: Safe and Responsible Use of ICT
HELE 4 Lesson 2: Safe and Responsible Use of ICTHELE 4 Lesson 2: Safe and Responsible Use of ICT
HELE 4 Lesson 2: Safe and Responsible Use of ICTBenandro Palor
 
EMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTE
EMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTEEMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTE
EMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTEAlminaVelasco
 
The Ten Commandments of Online Security and Privacy
The Ten Commandments of Online Security and PrivacyThe Ten Commandments of Online Security and Privacy
The Ten Commandments of Online Security and PrivacyJonathan Bacon
 
Information security and privacy
Information security and privacyInformation security and privacy
Information security and privacyJoy Chakraborty
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pestspeterhitch
 
Empowerment Technology Lesson 2
Empowerment Technology Lesson 2Empowerment Technology Lesson 2
Empowerment Technology Lesson 2alicelagajino
 
Technology Training - Security, Passwords & More
Technology Training - Security, Passwords & MoreTechnology Training - Security, Passwords & More
Technology Training - Security, Passwords & MoreWilliam Mann
 
Safe and Responsible Use of ICT
Safe and Responsible Use of ICTSafe and Responsible Use of ICT
Safe and Responsible Use of ICTRolly Franco
 
CYBERCRIME: AN OVERVIEW
CYBERCRIME: AN OVERVIEWCYBERCRIME: AN OVERVIEW
CYBERCRIME: AN OVERVIEWBilly Warero
 
CyberSecThreats_R_U_atRisk_Watson
CyberSecThreats_R_U_atRisk_WatsonCyberSecThreats_R_U_atRisk_Watson
CyberSecThreats_R_U_atRisk_WatsonPatricia M Watson
 
Bct 2 01 Terms
Bct 2 01 TermsBct 2 01 Terms
Bct 2 01 Terms02jgodsey
 
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATSJazzyNF
 

Was ist angesagt? (19)

Danger on Your Desktop
Danger on Your DesktopDanger on Your Desktop
Danger on Your Desktop
 
csa2014 IBC
csa2014 IBCcsa2014 IBC
csa2014 IBC
 
Lesson 2 Rules of Netiquette
Lesson 2   Rules of NetiquetteLesson 2   Rules of Netiquette
Lesson 2 Rules of Netiquette
 
HELE 4 Lesson 2: Safe and Responsible Use of ICT
HELE 4 Lesson 2: Safe and Responsible Use of ICTHELE 4 Lesson 2: Safe and Responsible Use of ICT
HELE 4 Lesson 2: Safe and Responsible Use of ICT
 
EMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTE
EMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTEEMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTE
EMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTE
 
The Ten Commandments of Online Security and Privacy
The Ten Commandments of Online Security and PrivacyThe Ten Commandments of Online Security and Privacy
The Ten Commandments of Online Security and Privacy
 
Protect
ProtectProtect
Protect
 
Information security and privacy
Information security and privacyInformation security and privacy
Information security and privacy
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pests
 
Empowerment Technology Lesson 2
Empowerment Technology Lesson 2Empowerment Technology Lesson 2
Empowerment Technology Lesson 2
 
Technology Training - Security, Passwords & More
Technology Training - Security, Passwords & MoreTechnology Training - Security, Passwords & More
Technology Training - Security, Passwords & More
 
Safe and Responsible Use of ICT
Safe and Responsible Use of ICTSafe and Responsible Use of ICT
Safe and Responsible Use of ICT
 
CYBERCRIME: AN OVERVIEW
CYBERCRIME: AN OVERVIEWCYBERCRIME: AN OVERVIEW
CYBERCRIME: AN OVERVIEW
 
CyberSecThreats_R_U_atRisk_Watson
CyberSecThreats_R_U_atRisk_WatsonCyberSecThreats_R_U_atRisk_Watson
CyberSecThreats_R_U_atRisk_Watson
 
Bct 2 01 Terms
Bct 2 01 TermsBct 2 01 Terms
Bct 2 01 Terms
 
Brochure
BrochureBrochure
Brochure
 
THESIS-2(2)
THESIS-2(2)THESIS-2(2)
THESIS-2(2)
 
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
 
Viruses and Spyware
Viruses and SpywareViruses and Spyware
Viruses and Spyware
 

Andere mochten auch

Politiche ue per combattere la discriminazione
Politiche ue per combattere la discriminazionePolitiche ue per combattere la discriminazione
Politiche ue per combattere la discriminazioneJuan Camilo
 
Digital marketing trends, content and conversions
Digital marketing trends, content and conversionsDigital marketing trends, content and conversions
Digital marketing trends, content and conversionsBig Wave Media
 
Different colors of bridesmaid dresses
Different colors of bridesmaid dressesDifferent colors of bridesmaid dresses
Different colors of bridesmaid dressesSunnyer Emily
 
Pushing marketing boundaries - Big Wave Media
Pushing marketing boundaries - Big Wave MediaPushing marketing boundaries - Big Wave Media
Pushing marketing boundaries - Big Wave MediaBig Wave Media
 

Andere mochten auch (7)

Using video effectively
Using video effectivelyUsing video effectively
Using video effectively
 
Politiche ue per combattere la discriminazione
Politiche ue per combattere la discriminazionePolitiche ue per combattere la discriminazione
Politiche ue per combattere la discriminazione
 
CU ADHD
CU ADHDCU ADHD
CU ADHD
 
Digital marketing trends, content and conversions
Digital marketing trends, content and conversionsDigital marketing trends, content and conversions
Digital marketing trends, content and conversions
 
Persunca dresses
Persunca dressesPersunca dresses
Persunca dresses
 
Different colors of bridesmaid dresses
Different colors of bridesmaid dressesDifferent colors of bridesmaid dresses
Different colors of bridesmaid dresses
 
Pushing marketing boundaries - Big Wave Media
Pushing marketing boundaries - Big Wave MediaPushing marketing boundaries - Big Wave Media
Pushing marketing boundaries - Big Wave Media
 

Ähnlich wie Microsoft protect ppt_ms_final

Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety Sadaf Walliyani
 
Information Technology - System Threats
Information Technology - System ThreatsInformation Technology - System Threats
Information Technology - System ThreatsDrishti Bhalla
 
Online Security and How to Make Money Online
Online Security and How to Make Money Online Online Security and How to Make Money Online
Online Security and How to Make Money Online Nader Alkeinay
 
Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)John Bosco Javellana, MAEd.
 
Grade 7 Chap 10 Cyber Threats and Security
Grade 7 Chap 10 Cyber Threats and SecurityGrade 7 Chap 10 Cyber Threats and Security
Grade 7 Chap 10 Cyber Threats and SecuritySultanaShaikh7
 
empowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationempowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationSheryldeVilla2
 
Cybersecurity awareness session.pptx
Cybersecurity awareness session.pptxCybersecurity awareness session.pptx
Cybersecurity awareness session.pptxUmaraZahidLecturer
 
Information security and privacy
Information security and privacyInformation security and privacy
Information security and privacyJoy Chakraborty
 
Netiquette on using internet
Netiquette  on using internetNetiquette  on using internet
Netiquette on using internetMaricrs Alfarö
 
Cybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptxCybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptxMustafa Amiri
 
Frontier Secure: Handout for small business leaders on "How to be Secure"
Frontier Secure: Handout for small business leaders on "How to be Secure" Frontier Secure: Handout for small business leaders on "How to be Secure"
Frontier Secure: Handout for small business leaders on "How to be Secure" Frontier Small Business
 
Rules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxRules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxNoelBuctot1
 

Ähnlich wie Microsoft protect ppt_ms_final (20)

Online reputation
Online reputationOnline reputation
Online reputation
 
Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Information Technology - System Threats
Information Technology - System ThreatsInformation Technology - System Threats
Information Technology - System Threats
 
Online Security and How to Make Money Online
Online Security and How to Make Money Online Online Security and How to Make Money Online
Online Security and How to Make Money Online
 
Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)
 
Grade 7 Chap 10 Cyber Threats and Security
Grade 7 Chap 10 Cyber Threats and SecurityGrade 7 Chap 10 Cyber Threats and Security
Grade 7 Chap 10 Cyber Threats and Security
 
empowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationempowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentation
 
Module 5: Safety
Module 5: SafetyModule 5: Safety
Module 5: Safety
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cybersecurity awareness session.pptx
Cybersecurity awareness session.pptxCybersecurity awareness session.pptx
Cybersecurity awareness session.pptx
 
Information security and privacy
Information security and privacyInformation security and privacy
Information security and privacy
 
cyber_security
cyber_securitycyber_security
cyber_security
 
Netiquette on using internet
Netiquette  on using internetNetiquette  on using internet
Netiquette on using internet
 
Cybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptxCybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptx
 
Frontier Secure: Handout for small business leaders on "How to be Secure"
Frontier Secure: Handout for small business leaders on "How to be Secure" Frontier Secure: Handout for small business leaders on "How to be Secure"
Frontier Secure: Handout for small business leaders on "How to be Secure"
 
Rules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxRules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
I.T Security Threats
I.T Security ThreatsI.T Security Threats
I.T Security Threats
 

Kürzlich hochgeladen

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 

Kürzlich hochgeladen (20)

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 

Microsoft protect ppt_ms_final

  • 1.
  • 2. The Internet = A World of Opportunities Look what’s at your fingertips • A way to communicate with friends, family, colleagues • Access to information and entertainment • A means to learn, meet people, and explore www.microsoft.com/protect
  • 3. Online Security Versus Online Safety Security: We must secure our computers with technology in the same way that we secure the doors to our homes. Safety: We must act in ways that help protect us against the risks that come with Internet use. www.microsoft.com/protect
  • 4. Primary Online Risks and Threats To Computers To Families To Personal • Viruses • Cyberbullies Information • Worms • File-sharing • Online fraud and abuses phishing • Trojans • Invasion • Hoaxes • Spyware of privacy • Identity theft • Disturbing • Spam content • Predators www.microsoft.com/protect
  • 5. Primary Threats to Computer Security Viruses/Worms Software programs designed to invade Trojans your computer, and Viruses that pretend to be copy, damage, or helpful programs while delete your data. destroying your data, Spyware damaging your computer, Software that tracks your and stealing your online activities or personal information. displays endless ads. www.microsoft.com/protect
  • 6. Primary Online Risks for Children Disturbing Content If kids explore unsupervised, they File-share Abuse could stumble upon Cyberbullies images or information Unauthorized sharing of you may not want Both children and adults music, video, and other them exposed to. may use the Internet to files may be illegal, harass or intimidate and download other people. malicious software. Predators Invasion of Privacy These people use the If kids fill out online forms, they Internet to trick children may share information you into meeting with them don’t want strangers to have in person. about them or your family. www.microsoft.com/protect
  • 7. Primary Threats to Personal Online Safety Phishing E-mail sent by online criminals to trick you Spam into going to fake Web sites and revealing Unwanted e-mail, personal information instant messages, and other online communication Identity Theft A crime where con Hoaxes artists get your E-mail sent by online personal information criminals to trick you into and access your cash giving them money and/or credit www.microsoft.com/protect
  • 8. Steps You Can Take Your computer Your family Yourself 1. Turn on Windows 1. Talk with your kids 1. Practice Internet Internet firewall. about what they behavior that lowers 2. Use Microsoft Update do online. your risk. to keep Windows up- 2. Set clear rules for 2. Manage your personal to-date automatically. Internet use. information carefully. 3. Install and maintain 3. Keep personal 3. Use anti-phishing and antivirus software. information private. anti-spam technology 4. Install and maintain 4. Use family safety built into Windows Microsoft Windows settings in Vista, Windows XP Defender. Microsoft software. SP2, Windows Live, and Microsoft Outlook. www.microsoft.com/protect
  • 9. Four Steps to Help Protect Your Computer Turn on Windows Internet firewall Use Microsoft Update to keep Windows up-to-date automatically Install and maintain antivirus software Install and maintain antispyware software www.microsoft.com/protect
  • 10. Turn on Windows Internet Firewall An Internet firewall helps create a protective barrier between your computer and the Internet www.microsoft.com/protect
  • 11. Use Automatic Updates to Keep Software Up-to-date • Install all updates as soon as they are available • Automatic updates provide the best protection www.microsoft.com/protect
  • 12. Install and Maintain Antivirus Software • Antivirus software helps to detect and remove computer viruses before they can cause damage. • For antivirus software to be effective, you must Don’t let it expire keep it up-to-date. www.microsoft.com/protect
  • 13. Install and Maintain Antispyware Software Use antispyware software, like Microsoft Windows Defender, so unknown software cannot track your online activity and potentially steal your information. www.microsoft.com/protect
  • 14. Other Ways to Help Protect Your Computer Back up your files regularly Read Web site privacy statements Close pop-ups using red “X” Think before you click www.microsoft.com/protect
  • 15. Back up Your Files • Save to CD/DVD, a USB drive, or other external source • Use a Web-based backup service www.microsoft.com/protect
  • 16. Think Before You Click • Be cautious with e-mail attachments and links • Only download files from Web sites you trust www.microsoft.com/protect
  • 17. Read Privacy Statements Understand what you are getting before you agree to download or share your personal information www.microsoft.com/protect
  • 18. Use the Red “X” to Close Pop-ups • Always use the red “X” in the corner of a pop- up screen. • Never click “yes,” “accept,” or even “cancel,” because it could be a trick that installs software on your computer. www.microsoft.com/protect
  • 19. Take Steps to Help Protect Your Family Talk with your kids about what they do online Set clear rules for Internet use Keep personal information private Use family safety software www.microsoft.com/protect
  • 20. Talk with Your Kids about Online Risks • Talk frankly with your kids about Internet risks, including • Online criminals • Inappropriate content • Invasion of privacy • Empower them by teaching them how their own behavior can reduce those risks and help to keep them Helpful online resources safe when they are online www.staysafe.org www.getnetwise.org www.microsoft.com/protect www.microsoft.com/protect
  • 21. Pay Attention to What Your Kids Do Online • Keep the computer in a central area • Get to know how your kids use the Internet • Let your kids be the teacher • Teach kids to trust their instincts • Encourage them to report any problems www.microsoft.com/protect
  • 22. Keep Personal Information Private • Teach children to check with you before sharing personal information online • Monitor your children’s online activities • Teach your children to report suspicious activity • Help children choose appropriate screen names and e-mail addresses www.microsoft.com/protect
  • 23. Set Clear Rules for Internet Use • Do not share files or open attachments • Do not click links in e-mail • Treat others the way you want to be treated • Stand up for yourself • Respect other people’s property • Never go alone to meet an Internet “friend” in person www.microsoft.com/protect
  • 24. Use Family Safety Software • Available in Windows Vista , Windows Live ® ™ OneCare Family Safety, ™ Xbox 360 ® • Helps parents manage the content their children view, what they do, and who they communicate with online www.microsoft.com/protect
  • 25. How to Handle Problems • Contact police to report any threat immediately • Report incidents to: CyberTipline 800-843-5678 www.cybertipline.com www.microsoft.com/protect
  • 26. Take Steps to Help Protect Your Personal Information Practice Internet behavior that lowers your risk Manage your personal information carefully Use technology to reduce nuisances, and raise the alarm when appropriate www.microsoft.com/protect
  • 27. Practice Internet Behaviors that Help Reduce Your Risk • Delete spam, don’t open it • Be on the lookout for online scams • Use strong passwords www.microsoft.com/protect
  • 28. Manage Personal Information Carefully • Do not share personal information in e-mail or instant messages • Use only secure and trusted Web sites • Make sure you are where you think you are: Web sites can be faked • Avoid financial transactions over wireless networks • When in public, stay private www.microsoft.com/protect
  • 29. Use Anti-Phishing and Anti-Spam Technology • Most e-mail providers and programs, like Windows Live Hotmail ® and Microsoft Outlook , ® filter most spam • Phishing Filter in Internet Explorer 7 ® helps to block and warn about suspicious sites www.microsoft.com/protect
  • 30. If Your Identity is Stolen • Report it • Follow up in writing • Change all passwords • Place fraud alert on credit reports Get a copy of your credit report and ensure your account is marked “fraud alert” and “victim’s statement” www.microsoft.com/protect
  • 31. How Does Microsoft Help Improve Security and Safety? Partnership Technology Guidance By partnering with By developing software By providing useful non-governmental products and tools that guidance that helps organizations, other increase security and people understand technology companies, safety, helping people online risks and what and governments minimize their risk actions they can take. worldwide to help online and make keep people safe online. informed choices. www.microsoft.com/protect
  • 32. For More Information www.microsoft.com/protect www.staysafe.org www.getnetwise.org www.microsoft.com/protect
  • 33. © 2007 Microsoft Corporation. All rights reserved. Microsoft, Hotmail, OneCare, Outlook, Windows, Windows Vista, Xbox, Xbox 360, Xbox LIVE, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Hinweis der Redaktion

  1. The Internet is a global network that connects most of the world’s personal computers. Worldwide, every day, more than a billion people visit the Internet to work, shop, search for information and entertainment, and communicate with friends and colleagues. Online it doesn’t matter where you are located, because the Internet puts a universe of information, images, and ideas at your fingertips. You can explore world-class museums, earn a college degree, manage your personal finances, and plan vacations. You can play games, download music and movies, purchase products and services, and make new friends. The Internet has changed the way we shop and introduced new ways of socializing. It makes long-distance communication affordable and research efficient. How we learn, follow the news, share experiences, and entertain ourselves increasingly depends on being connected to the Internet through our personal computers, cell phones, and other devices. And, best of all, you can do all of this from the safety and security of your own home, right? Well, that’s the problem. T hese benefits don’t come without risks. T he online world, just like the physical world, has its share of nuisances, dangers, and untrustworthy people. We value the Internet because it provides a powerful new framework for connection, commerce, and communication, but it also brings the outside world directly into our homes. This transformation requires us to change the way we think about online security and safety. Typically, when we leave the safety of our homes and venture into the outside world, we instinctively raise our guard and become more alert to possible dangers. Once we’re back home, we lower our guard and relax. Those actions are so ingrained that we do them without thinking—but staying safe and secure online requires us to keep our guard up even when inside our homes or other places where we usually feel safe. Because the Internet transforms your computer into a doorway through which the world can enter your home, staying safe online means using the tools that can help you to control who and what comes in, and exercising your own good judgment about the people you choose to trust. Whenever you log on to the Internet, you can expose yourself to security threats and online safety risks. Those risks can be dangerous to your family, your privacy, your credit, and your computer. That’s why it is important to understand how to protect yourself when you go online.
  2. Typically, when we leave the safety of our homes and venture into the outside world, we instinctively raise our guard and become more alert to possible dangers. Once we’re back at home, we lower our guard and relax. Staying safer and more secure online means keeping your guard up whenever you’re online, just as you do in the world outside your home. Online security refers to technology and tools we can use to help protect against online threats, to help control our personal information online, and to help manage our family’s use of the Internet. What are some of the risks you need to protect against?
  3. The primary risks associated with the Internet use include viruses and other malicious software that can cripple or control your computer, compromise your privacy, and destroy valuable data. Additionally, there are people who may use the Internet to try and invade your privacy, harass you, or inappropriately contact your children. Microsoft provides you with educational content and guidance to help you protect your computer, your family, and your personal information from online security and safety risks. Leading threats to your computer’s security include : Viruses Worms Trojans Spyware Leading threats to children include : Cyberbullies File-sharing abuses Invasion of privacy Disturbing content Predators Leading threats to your personal safety include : Online fraud and phishing Hoaxes Identity theft Spam
  4. The primary online threat to your computer is malicious software such as viruses, worms, Trojans, and potentially unwanted software like spyware. Viruses Computer viruses are programs that are deliberately designed to invade your computer, to interfere with its operation, and to copy, corrupt, or delete your data. These programs are called viruses because they are designed to spread to other computers, but in most cases, they require human actions—like clicking on an e-mail attachment—to spread. Computer viruses can be hidden in what appear to be useful or entertaining programs or e-mail attachments, such as computer games, video clips, or photos. Many viruses are spread when people unwittingly send them as e-mail attachments to friends and colleagues. Worms Worms are more sophisticated viruses that automatically send themselves to other computers over a network, without any human interaction or assistance. Worms seize control of certain software programs on a computer to spread to other computers. Trojans A third type of virus, called Trojans in honor of the Trojan horse, masquerade as beneficial programs, such as a game or a spyware cleaner. Once on your computer, they can quietly destroy or steal your data. Spyware Spyware is software that tracks what you do on your computer, and either reports your actions to the software creator or to takes some action based on your activity. Spyware may bombard you with pop-up advertising related to the Web sites you visit regularly. It may collect personal information, or change the settings on your computer without your consent. Spyware can even disable your computer or enable criminals to steal your identity. Fortunately, you can take many steps to help protect your computer from malicious and potentially unwanted software.
  5. Overall, the Internet is a positive and rewarding place for kids, but the potential risks are real. By educating yourself and your family about those issues, you can team up to manage the risks and prevent problems. The Internet risks to children fall into five main categories: Cyberbullies On the Internet, as on any playground, some people play nice and some don’t. Both children and adults may use the Internet to harass or intimidate other people, which can range from name calling to physical threats. For example, kids sometimes broadcast bullying comments and embarrassing images in an instant message or blog, shaming a child in a way that’s invisible to parents or others in the community. File-sharing abuses Exchanging music, video, and other files is risky. Your kids could end up downloading inappropriate materials, computer viruses, or spyware by mistake. Some file-sharing programs even let other users access your computer any time it’s online. Exposure to disturbing content Children are curious and adventurous, and they often follow their curiosity. As they explore, they could stumble upon information or images you wouldn’t want them to see—content that is disturbing, inappropriate for children, or not in keeping with your family values. This can happen if they click an advertisement or a confusing link on a search page, or if they share files online. Child predators Child predators can use the Internet to befriend children. Their goal could be to isolate children and to persuade them to meet in person. The only information you know about people you meet online is what they tell you. Child predators use that anonymity to trick children, by pretending to be another child or someone who is trustworthy. People can also prey on teenagers’ longings for adventure or romance to build inappropriate online relationships. Invasion of privacy Some businesses use registration or contest forms to capture personal information. If children fill out forms unsupervised, they may share information about themselves or your family that you don’t want strangers to have. Or children may innocently expose personal information or photographs in blogs, on personal Web pages, or when playing games online.
  6. Many experiences that make the Internet valuable and enjoyable also require us to share information about ourselves. Sometimes a little information and sometimes a lot. It’s not always easy to tell who is asking for that information or what they intend to do with it. Sharing information can sometimes bring results you weren’t planning on and don’t want. Those unintended results may be annoying, such as unwanted e-mail. Or they could be something serious, such as an attempt to steal your identity, misuse your good credit, or take your money. Identity Theft and Online Fraud Con artists on the Internet would like nothing better than to trick you into giving them your hard-earned money, or revealing personal information that would let them steal your identity. These criminals have discovered that the Internet can help them defraud unsuspecting people, sometimes in very creative ways. Most scams aimed at online fraud and identity theft depend on you to provide personal information or send money. So by learning what to look for and what to do, you can avoid falling victim to these crimes. Phishing A particularly sneaky scam, known as phishing, begins with e-mail that appears to come from a business you trust. The forged e-mail is the “bait” and typically contains a link to a phony Web page that also looks like it is owned by the business you trust. The Web site might ask you for personal information such as your credit card number, Social Security number, or bank accounts. That’s the “hook.” If you swallow the hook, you’re sunk, because you have given an online criminal enough information to steal your identity and use it to gain access to your account, cash, or credit. Hoaxes Hoaxes are another type of scam. For example, the “Nigerian scam” is a type of advance-fee fraud that has been around for a long time. As the intended victim, you will receive e-mail from someone claiming to be a Nigerian official, business person, or the surviving spouse of a former government leader asking for help getting money out of the country. The con artists who send the e-mail will offer to transfer millions of dollars into your bank account in exchange for a small fee. If you respond to the initial offer, you may receive official looking documents or other “proofs” and typically you will be asked to provide blank letterhead, bank account numbers, and more money to cover transfer costs and attorney fees. If you continue to respond, the con artists will offer additional “evidence” to verify their claims, but emergencies will begin to come up that require more of your money and delay the transfer of the promised funds to your account. Eventually, the con artist will disappear with your money and leave you holding the bag. Another common hoax aimed at defrauding consumers is one that offers you the chance to buy tickets in an international lottery and use a “secret system” to win big. Or the e-mail may announce that you have won an international lottery—even though you never entered—and ask for your bank account number or “processing fees” so the funds can be transferred to you. Of course, there is no secret system and, in fact, many of the lotteries outlined in these e-mail scams are fake. Spam One tool that con artists and criminals use is spam—e-mail, instant messages, even electronic greeting cards—that you never asked for and don’t want. Spam can contain links to fraudulent Web sites, or advertisements for worthless products you aren’t interested in. A big part of staying safe online is paying attention, using common sense, and learning to recognize and avoid scams and online fraud.
  7. By taking four basic steps, you can help protect your computer from many malicious software attacks. Those four simple steps are: Use an Internet firewall and keep it turned on Keep your operating system up to date, preferably by using automatic update features in Windows Install and maintain antivirus software Install and maintain antispyware software, such as Windows Defender Protecting your family when they use the Internet means understanding the risks, talking openly and often with your children, providing clear guidance for healthy online behavior, and using technology where it can help to reduce your family’s exposure to online risks. There are four basic steps you to help protect your family online: Talk with your kids about what they do online. Set clear rules for Internet use. Keep personal information private. Use family safety software. Protecting your personal information on the Internet means following safe Internet practices, managing or eliminating the nuisances, and guarding against more serious concerns such as identity theft. To do this you need to: Be smart online, by practicing Internet behavior that helps to reduce your risk. Manage your personal information carefully. Use technology to reduce nuisances and raise the alarm when appropriate. Let’s take a closer look at the four steps to help protect your computer.
  8. Four Steps to Help Protect Your Computer The good news about viruses, worms, spyware, and other malicious and potentially unwanted software is that with an ounce of prevention and a little knowledge, you can reduce your risk of falling victim to them and diminish their potential impact. By taking four basic steps, you can help secure your computer from many malicious software attacks. Those steps are: Use an Internet firewall and keep it turned on Keep your operating system up to date, preferably by using automatic update features in Windows Install and maintain antivirus software Install and maintain antispyware software, such as Windows Defender Let’s take a closer look at each of these four steps.
  9. Use a Firewall You wouldn’t leave your house unlocked with all your valuables inside, so why take that chance with your computer? A firewall creates a barrier between your computer and the Internet, a kind of security checkpoint that information and software must pass through before it can enter or leave your computer. The firewall is your first line of defense in protecting your computer, because it helps to obscure your computer to online attackers and many types of malicious software. A firewall can also help to prevent the software on your computer from accepting updates or modifications from the Internet without your permission. There are three kinds of firewalls you can use: software firewall, hardware firewalls, and wireless routers. The simplest way to use an Internet firewall is to turn the software firewall built into Windows Vista or Windows XP SP2. In Windows Vista, the firewall is turned on by default.
  10. Keep Your Operating System and Software Updated One of the most important things you can do to help protect your computer is also one of the easiest. Just keep your system up to date with the latest software. Online criminals are constantly at work devising new ways to attack your computer and invade your privacy. Fortunately, software companies work even harder to counter those threats and to provide you with updated tools that you can use to protect your computer. You should regularly update your computer operating system with security updates provided by the manufacturer. The same goes for your Web browser and other important applications, including your antivirus and antispyware programs. Check the Web sites of software companies for information about updating the programs on your computer. If you use a Windows operating system from Microsoft, you can help protect your computer automatically by using the automatic updating feature available as part of Windows Vista or Windows XP SP2. You can manually update your Microsoft software by going to update.microsoft.com. When you turn on automatic updating, your computer will check for, download, and install updates on the schedule you choose. The Benefits of Automatic Security Updates As with human viruses, the best treatment for computer viruses is to avoid getting them in the first place. Every time you log on to the Internet, your security risk increases. Having up-to-date security features already installed as part of your computer system helps to ensure that you have the highest level of protection available.
  11. Install and Maintain Antivirus Software Antivirus software helps to protect your computer by scanning e-mail, applications, and data that resides on your computer. Strong antivirus programs can detect and remove thousands of specific viruses before they have a chance to damage your computer. Most antivirus software uses signatures to identify malicious software, much like the police use fingerprints to identify criminals. To ensure that your antivirus software is using the most current signatures, make sure to subscribe to an antivirus update service, and regularly install all updates from the manufacturer to keep the software current. Windows Live OneCare —an always-on, all-in-one PC care service—offers antivirus protection while also helping to keep your computer tuned up and running at top speed.
  12. Install and Maintain Antispyware Software Antispyware software, such as Windows Defender from Microsoft, can detect and help you take action against any spyware or potentially unwanted software on your computer. It can also help to keep your computer running smoothly and prevent further intrusion. As with your operating system and antivirus software, it is essential that you keep your antispyware software up-to-date. Windows Defender is included with Windows Vista, and is available as a free download for computers running Windows XP SP2.
  13. Now that you have your firewall turned on, your operating system updating automatically, and your antivirus and antispyware programs installed, what else can you do to protect your computer? Here are four additional steps that can help you protect your computer and keep it more secure: Back up your files. Think before you click. Read Web site privacy statements. Close pop-ups using red X. Let’s look at these steps in more detail.
  14. Back Up Your Files First, because no security method is guaranteed to be 100% effective, it is important to regularly back up your critical files, before you encounter a virus or other problems that may damage your computer and delete some or all of your data. Many methods exist for backing up your files—from saving them to CD or DVD, to copying them to an external device, to trusting them to a Web-based backup service. Windows Live OneCare helps backup key files as part of its computer care service. To learn how to protect your data by backing up your files, visit www.microsoft.com/protect.
  15. Think Before you Click Think twice before you click on an e-mail attachment or link. And the same advice applies to clicking on banner ads or pop-up windows on the Web. Never open an e-mail attachment from someone you don't know. For that matter, be very cautious when opening an e-mail attachment from people you DO know, unless you know exactly what the attachment contains. Criminals can imitate a friend’s e-mail address, or your friend’s computer may be infected with a virus that is automatically sending e-mails. Links in e-mail can look like they lead to a legitimate business or Web site. However, criminals can create code behind these links to send you to a fake site without your knowledge. It’s best to always type a Web address into your Web browser, rather than clicking on links in e-mail.
  16. Read Privacy Statements In addition to installing and maintaining antivirus and antispyware software, only download files or programs from Web sites you trust. Make sure you understand what you are getting before you agree to download. Read privacy statements and license agreements for all Web sites you visit regularly and programs you download.
  17. Use the Red “X” to Close Pop-ups While you are surfing the Internet, if you see a pop-up window, never click any buttons in the window to close the window. Always use the red “X” in the corner of the pop-up window. Even though the pop-up window shows buttons saying “No,” or “Cancel,” criminals can program these buttons to trigger an action you don’t expect. Clicking any button, or even clicking anywhere in the pop-up window, could cause your computer to download unwanted software. The red “X,” usually found in the upper right corner of the pop-up window, is controlled by the browser program and is a safe way to close pop-up windows. With Internet Explorer 7, you can also press ALT+F4 to manually close a pop-up window.
  18. Protecting your family when they use the Internet means understanding the dangers, talking openly and often with your children, providing clear guidance for healthy online behavior, and using technology where it can help to reduce your family’s exposure to online risks. There are four basic steps you need to take to help protect your family online: Talk with your kids about what they do online. Set clear rules for Internet use. Keep personal information private. Use family safety software. Let’s take a look at each step in more detail. OPTIONAL [For children, the Internet is both a classroom and a virtual playground—perfect for exploration and learning, and also a great place to have fun. As children get older, the Internet often becomes a place where they form social networks—sending e-mail and instant messages to friends, posting and reading blogs, creating personal Web pages, sharing music and videos, and playing games. Many of these social activities can help kids develop healthy communication skills and learn to express themselves with greater self-confidence. Unfortunately, these same activities may be the source of serious issues for children, including risks to their personal safety and privacy as well as theft and computer security. While the Internet is undeniably a great resource for children, there are some places online that are not good for kids, just as there are places in every city that are unsafe or inappropriate for children. There are also certain Internet activities that may be fine for adults but not for children, and others that are OK for some children and not for others. The person best qualified to make decisions about what is right for your children is you. Being aware of the risks your children may encounter online, and what you can do to reduce or eliminate those risks, will enable you to make informed decisions about your children’s Internet use and help you to keep your family safe online.]
  19. Talk with your kids about online risks Talk frankly with your kids about Internet risks, including inappropriate content, invasion of privacy, and inappropriate communication—whether from other kids or from adults. Teach them how their own behavior can reduce those risks and help to keep them safe when they are online. That knowledge is very empowering for kids. If you want help preparing to speak with your children or learning what to educate them about, try these helpful online resources: www.staysafe.org www.getnetwise.org www.microsoft.com/protect/
  20. Pay attention to what your kids do online Keep online devices in a central location Place all Internet-connected computers and devices that your children to use in a central location, such as the living room or family room. That includes all gaming devices. When your kids are online, you should be able to easily see and hear what they’re doing. Get to know how your kids use the Internet It is important to understand what your kids do when they are online, how they use the Internet, and what they experience. Get to know what games your kids play, and play with them to really understand things. Check out their blogs from time to time, and become familiar with the chat rooms they visit. Read their profiles on social networking sites to see how they represent themselves online and to make sure they are not revealing too much personal information. Let your kids be the teacher Ask your children to show you what they’re doing and who they’re meeting on the Internet. Encouraging your children to teach you about their world is a great way to communicate with them. Teach kids to trust their instincts and report any problems. Children often know instinctively when something isn’t quite right. Teach your kids to trust their instincts and to tell you at once if they ever feel uncomfortable, threatened, or scared by anything they encounter online. Let them know they won’t lose their computer privileges or invite other punishment by talking with you about their concerns.
  21. Keep personal information private Teach children to check with you before sharing personal information online unless you give them permission. Personal information includes facts—such as your child’s real name, age, gender, phone number, address, school, sports team, and favorite places to play—and it also includes photos and feelings. Predators look for expressions of vulnerability, such as sadness, loneliness, or anger. And they know how to use seemingly disconnected information to locate people. Monitor your children’s online activities Make sure you understand who your kids are sharing information with through instant messaging, blogging sites, and other social networks. Are they friends, friends of friends, or the general public? Teach your children to report suspicious activity Encourage your children to tell you immediately if someone starts asking personal questions or wants to arrange to meet them in person. And make sure your kids know they should never respond to e-mail asking for personal information such as Social Security, credit card or bank account numbers. Help children choose appropriate screen names and e-mail addresses Help your children choose screen names and e-mail addresses that reveal nothing personal and are not suggestive—musicfan or sportsnut instead of john13 or sexysusie.
  22. Set clear rules for Internet use As soon as your children begin to explore the Internet, you need to set clear rules about when and how they can use it, just as you did when they got their first bicycle. Explain the risks and why it is important to have family rules to avoid problems and keep the Internet fun for everyone. Consider the following guidelines to help create a safer online experience for your family: Do not share files, open attachments, or click links in e-mail You teach your kids not to accept gifts from strangers in the physical world; the same rule applies online. If children open an attachment that comes with an e-mail message, click a link in an instant message or blog, or share music or video files, they could be opening a virus, or downloading malicious software or a disturbing image. Unfortunately, even messages that appear to come from friends can be dangerous. Online criminals can masquerade as someone your child knows, or their friend’s computer could be infected with a virus that is sending e-mail without their knowledge. Treat others as you want to be treated This is a basic rule of all human relationships. Give out what you want to get back. Trying to embarrass or intimidate other people with nasty comments is both rude and wrong. Besides the issue of common courtesy, however, bullying people online can be a crime if taken too far. Stand up for yourself If someone is disrespectful or tries to bully you, ignore them and use software to block them from contacting you or playing the same game. If the situation is bad, report it to the Web site administrator or other authorities. Respect other people’s property Just because content is easy to find and enjoy on the Internet doesn’t mean it is free to be copied or reposted. Remind your kids that unauthorized copying and sharing music, games, and other copyrighted downloads is piracy. Plagiarism and hacking into computers are also illegal. Never go alone to meet an Internet “friend” in person. The people your children meet online may not be who they say they are. If your child insists on a meeting, you should go along and make sure the meeting takes place in a busy public place.
  23. Use family safety software to help manage your children’s Internet use Windows Vista, Windows Live OneCare Family Safety, and Xbox 360 all provide family safety settings to help you monitor and control your children’s Internet use. Using these settings, you can decide which Web sites, programs, video games, and DVD movies your children can use and play. You can establish limits based on content, title, recommendations from independent ratings boards, or your own preferences. Family safety software also enables you to create individual, age-appropriate settings for each family member. Learn more about available tools for families No single technology solution meets the needs of every family, so explore the many different tools that can help you keep your children safe online. For a list of popular family safety tools, see http://kids.getnetwise.org/tools/
  24. How to Handle Problems Report any threat immediately If someone harasses, threatens, or bullies your kids, or if someone attempts to lure them into face-to-face meetings for illicit purposes, report them to the proper authorities immediately. If you believe your child is in immediate danger, call 911 to get your local police involved. In the US, you can report incidents to the CyberTipline, at 800-843-5678 or www.cybertipline.com, which is hosted by the National Center for Missing & Exploited Children. If you believe the perpetrator abused a Microsoft service, contact Microsoft at abuse@microsoft.com.
  25. Protecting yourself and your personal information on the Internet means managing or eliminating online nuisances, such as spam, and guarding against more serious concerns such as identity theft. To do this you need to: Practice online behavior that reduces your risk Manage your personal information carefully Use technology to minimize nuisances and raise the alarm when appropriate The following slides cover best practices to help you lower your risks online. OPTIONAL [Many experiences that make the Internet so valuable and enjoyable also require us to share information about ourselves. Sometimes a little information and sometimes a lot. It’s not always easy to tell who is asking for that information or what they intend to do with it. Sharing information can sometimes bring results you weren’t planning on and don’t want. Those unintended results may be annoying, such as unwanted spam e-mail. Or they could be very serious, such as an attempt to steal your identity, misuse your good credit, or take your money.]
  26. Practice Internet Behaviors that Help to Reduce Your Risk: Delete Spam, Don’t Open It This one action will spare you a lot of potential trouble. Besides being annoying, spam can pose real threats to your online safety and security. Spam may contain viruses or spyware, and can be used by con artists to trick you into giving them your money or personal information. Never reply to spam, not even to ask to be removed from the mailing list. The same goes for clicking on a link in the spam e-mail. This just confirms to spammers that your e-mail address reaches a real person. Also, don’t take any actions based on spam mail. Don’t buy anything or invest in anything based on e-mail, and don’t give to money to charities in response to e-mail solicitations. Instead, contact organizations directly if you are interested in the product or charity. Be on the Lookout for Online Scams Watch out for spam scams—and ignore them. Con artists on the Internet are ready to take your money or steal your identity. To fight scams, pay attention, listen to your common sense, and watch out for these signs: Alarming messages and threats of account closures. Promises of big bucks for little or no effort. Deals that sound too good to be true. Misspellings and grammatical errors. The best defense against spam and phishing scams is your own good judgment. Any time you receive an alarming message from a company, or a threat to close your account unless you verify personal information right away, be wary. Legitimate companies don’t do business this way over the Internet. If there is a real problem with one of your accounts, you won’t be asked to reveal personal information online. E-mail that promises big money for little or no effort are most likely scams. Deals that sound too good to be true probably are, just like in the physical world. Misspellings and grammatical errors in e-mail may also indicate spam that could lead to problems if you respond. Never share sensitive personal information in an e-mail or instant message. Even if the e-mail looks like it comes from a reputable company, be wary because it could be from a scammer. Call the company or go to their Web site by typing the Web address into your browser if you want to confirm a warning mail. Use Strong Passwords You may have important personal information in a variety of electronic and Internet locations, such as online bank and auction accounts, blogs, files on your computer, online shopping sites, etc. One way to help protect your information is by using strong passwords to block access to your computer and accounts. When criminals decipher passwords, they usually use a computer program that runs many character combinations at high speed. Criminals do not usually just guess at a password. Because of this, strong passwords are at least eight characters long , and they include upper and lowercase letters, numbers, and a few symbols—such as the dollar sign, pound sign, or exclamation point. Long, complex passwords are harder to break—even for high-speed computer programs—because there are so many possible combinations. Never share your passwords, even with friends, and never send passwords over e-mail.
  27. Manage Personal Information Carefully Do not share sensitive or personal information in an e-mail or instant message . That includes filling out e-mail forms, or clicking on links in an e-mail to get to a Web page where you’re asked to provide personal information. Don’t even share sensitive information with a trusted friend over e-mail or IM, because the message may be intercepted and your personal information could be retrieved by other people. Use only secure and trusted Web sites . Be careful who you do business with online. Read the privacy statement on a Web site before you share personal information, and check for signs that the Web site protects sensitive data. Look for https (“s” for secure) in the Web address and for security icons, such as a closed padlock or unbroken key. Make sure you are where you think you are . Unfortunately, the padlock or key icons can be faked. Double-click on them to look for a match between the name in the Web address and on the security certificate. If the name differs, you may be on a faked site. Avoid wireless transactions . If you have a wireless laptop computer, avoid making financial transactions over an unsecured wireless network, such as those offered by many cafes and coffee shops. A thief with a wireless connection might be able to pick up some of your information, even if he is in another room or building. When in public, stay private. Never use public computers, such as those in libraries or Internet cafes, for online purchases or banking. Stick to e-mail or general Web surfing on those computers. You don't want people looking over your shoulder-either literally or electronically. And since you can't know what software has been installed on a public computer, why take the risk?
  28. Use Anti-Phishing and Anti-Spam Technology Internet service providers, e-mail programs, and Web browsers get better all the time. They block billions of spam e-mails daily. For example, spam filters in Microsoft Outlook, Windows Live Hotmail, and Windows Live Messenger provide strong defenses against unwanted junk e-mail, instant messages, and images. Microsoft Outlook helps reduce the amount of spam in your Inbox by filtering junk mail into a special folder. You can review the mail in this folder to make sure no legitimate mail got filtered by accident, and you can add these legitimate senders to your approved sender list to make sure they don’t get filtered again. You should delete the rest of the mail in your junk mail folder without opening it. Internet Explorer 7 includes Phishing Filter technology, which blocks access to known fraudulent sites and warns you about potentially suspicious sites. You can also use Phishing Filter to report sites that you are suspicious about, so that these sites can be reviewed. OPTIONAL For example, Microsoft is using technical innovations to help prevent spam and phishing scams from ever reaching peoples’ inboxes. Safer e-mail : Microsoft is building e-mail technology that can be used in other products and services, which stops criminals from spoofing legitimate Web sites and hiding their identities. Currently, this technology helps to protect more than 200 million Windows Live Hotmail customers worldwide against online scams. Filtered e-mail : Microsoft uses technology to identify and remove vast quantities of spam before it is ever delivered. SmartScreen filtering technology blocks more than 3.2 billion spam e-mail messages per day worldwide in Hotmail alone. In addition, Microsoft provides monthly updates to the Outlook junk mail filters, to help customers better protect and manage their inboxes from spam and other e-mail-perpetrated scams.
  29. If Your Identity is Stolen On the Internet, as in life, an ounce of prevention is worth a pound of cure. But what if you do make a mistake and run into problems? To report phishing : Forward the e-mail message to your Internet service provider (ISP). File a complaint with the U.S. Federal Trade Commission (FTC). Go to onguardonline.gov, and click File a Complaint. Forward the spam to the company that is being misrepresented. It may have a special address to report such abuse—for example, abuse@microsoft.com. If you believe that you are a victim of identity theft : Speak with the security or fraud department about any fraudulently accessed or opened accounts at every bank or financial institution you deal with, including credit card companies, utilities, Internet service providers, and other places where you regularly use your credit card. Follow up with a letter and save a copy for yourself. When you open new accounts use strong passwords, not passwords such as your mother's maiden name, along with a new account number. Change the passwords on all online accounts, starting with any that are related to financial institutions or information. Place a fraud alert on your credit reports. Make sure your account is flagged with a "fraud alert" tag and a "victim's statement," and insist that the alert remain active for the maximum of seven years. In the United States, you can contact these three credit bureaus: Equifax (800) 525-6285 Experian (888) 397-3742 TransUnion (800) 680-7289 Get a copy of your report and ask that no new credit be granted without your approval. Send these requests in writing and keep copies for yourself. When you receive your reports, review them carefully. Look for things like inquiries you didn't initiate, accounts you didn't open, and unexplained debts.
  30. Microsoft works with non-governmental organizations, technology companies, and governments around the world to help you find solutions for many issues related to computer and Internet use, including keeping children safe online. Internet Service Providers : Microsoft founded an alliance of the largest ISPs from around the world to improve communications with consumers and increase their Internet safety and security. Members of this group share information to improve the way they protect customers, and coordinate to alert people to critical security and safety issues. Schools : Microsoft partners with non-profit organizations that creates school curriculum on online security and safety. This includes the development of Internet based training, in English, so any teacher can freely learn about the issues and help their students. ICMEC : Microsoft partners with the International Centre for Missing & Exploited Children and Interpol to provide law enforcement training sessions in combating computer-facilitated crimes against children. NCMEC : Microsoft has worked with the National Center for Missing & Exploited Children and their NetSmartz program to develop content intended to educate parents on safe Internet usage. GetNetWise : Microsoft is a founding partner of this industry organization offering the getnetwise.org web site full of educational information about Internet safety for parents. National Cyber Safety Alliance : Microsoft is a founding partner this government/industry organization, which offers staysafeonline.info about computing security. Staysafe.org : Microsoft created www.staysafe.org to provide a forum where non-profit organizations and child safety issue experts can contribute content that helps kids, teens, parents, and educators address online security and safety issues. Content sharing : Microsoft freely shares information and guidance with non-profit organizations, governments, and commercial partners because it is important for customers to find this information wherever they look. Partnering on Public Policy : Microsoft engages with governments and communities worldwide on Internet safety to provide technical assistance to local, state, and federal legislatures drafting bills on spam, phishing, and malicious and deceptive software. Microsoft also supports laws with penalties that are commensurate with crimes against children. American Academy of Pediatrics: Microsoft worked with the American Academy of Pediatrics in the US to provide age-based guidelines directly to parents in the Family Safety Settings service, and on http://aap.safetynet.org. Law enforcement: Microsoft is collaborating with law enforcement around the world to stop criminals who create and release malicious or potentially unwanted software that might harm computers or put personal information at risk.
  31. Microsoft, other technology companies, public agencies, and nonprofit organizations provide resources where you can learn more about how to protect yourself, your family and your computer online. The Internet is a fascinating and valuable resource. Knowing how to stay safe and secure online can help you ensure a better Internet experience for everyone in your family.
  32. For a short presentation (10-15 minutes), which highlights the issues and actions for consumers, use: slide 1 (welcome) slide 2 (introduction) slide 4 (online risks) slide 8 (steps to take) slide 31 (Microsoft effort) slide 32 (more information) slide 33 (close) For a mid-length presentation (30 minutes), which more fully covers the action steps, use: slide 1 (welcome) slide 2 (introduction) slide 4 (online risks) slide 8 (steps to take) slide 9 (protect your computer) slide 19 (protect your family) slide 26 (protect your personal information) slide 31 (Microsoft effort) slide 32 (more information) slide 33 (close) For a full presentation (1 hour), use the full slide deck to provide detailed information about each action step that consumers can take.