Download - Home and Business Computer Security 2014
![Page 1: Home and Business Computer Security 2014](https://reader036.vdocuments.mx/reader036/viewer/2022062707/55815d3ed8b42ac7228b4a62/html5/thumbnails/1.jpg)
Home And Small Business Computer Security
Practical Tips You Can Use to Protect Your Identity, Your Computer and Your Network
from Attack
![Page 2: Home and Business Computer Security 2014](https://reader036.vdocuments.mx/reader036/viewer/2022062707/55815d3ed8b42ac7228b4a62/html5/thumbnails/2.jpg)
Don’t Be A Target!Home PC Security Part I
Are YOU at Risk?
![Page 3: Home and Business Computer Security 2014](https://reader036.vdocuments.mx/reader036/viewer/2022062707/55815d3ed8b42ac7228b4a62/html5/thumbnails/3.jpg)
You are at risk if
Your kids use your computer You travel with your computer and
use WiFi Personal & financial information are
on your computer Business files are on your computer Family pictures and videos are on
your computerWhat would happen if your computer was gone tomorrow?
![Page 4: Home and Business Computer Security 2014](https://reader036.vdocuments.mx/reader036/viewer/2022062707/55815d3ed8b42ac7228b4a62/html5/thumbnails/4.jpg)
Home Computer Cyber-Security
What is Cyber-Security?
Protecting your computer, your network, and your
information from at-home and online threats
What is Cyber-Crime?
Any crime conducted via the Internet to cause
damage and/or steal personal information
![Page 5: Home and Business Computer Security 2014](https://reader036.vdocuments.mx/reader036/viewer/2022062707/55815d3ed8b42ac7228b4a62/html5/thumbnails/5.jpg)
Cyber-Crime Target The Home Computer
Why do hackers hack? Lot’s of money to be stolen To collect information! Information used to directly steal money, and identity theft
Why attack the home computer? Home computer = information! Least secure in general Unwary users
![Page 6: Home and Business Computer Security 2014](https://reader036.vdocuments.mx/reader036/viewer/2022062707/55815d3ed8b42ac7228b4a62/html5/thumbnails/6.jpg)
Avenues That Subject You to Attack
Hardware Unsecured Wi-Fi (think Panera) No Router Router with default password
Software No anti-virus/anti-spyware No Firewall Old virus definitions Out of date Windows O.S.
Personal Behavior Failure to use strong passwords Clicking on unsafe links or emails Downloading questionable files Leaving computer logged on Leaving your computer accessible
![Page 7: Home and Business Computer Security 2014](https://reader036.vdocuments.mx/reader036/viewer/2022062707/55815d3ed8b42ac7228b4a62/html5/thumbnails/7.jpg)
Cost of Getting A Virus
Virus Type
Impact Solution Cash Cost
Minor Virus
Lose some data2- 4 hours
Use installed anti-virus
$75-100
Major Virus
Loss of docs 5-10 hours
Use service to remove
$100-$130
Catastrophic Virus
Loss of ALL data & photos15+ hours
Use service to wipe & reload entire system
$150-175
What is YOUR time worth? $25, $50 $75?
![Page 8: Home and Business Computer Security 2014](https://reader036.vdocuments.mx/reader036/viewer/2022062707/55815d3ed8b42ac7228b4a62/html5/thumbnails/8.jpg)
Layered SecurityHome PC Security Part II
![Page 9: Home and Business Computer Security 2014](https://reader036.vdocuments.mx/reader036/viewer/2022062707/55815d3ed8b42ac7228b4a62/html5/thumbnails/9.jpg)
Multiple Defenses In Layers of Protection)
Router
Firewall
SPAM Filter
Web Filter
Anti-Malware
You!
BackupYOUR INFO!
Passwords
1
23
4. 5
.
6.
Conceal
Deny
Detect
Filter
Decide
![Page 10: Home and Business Computer Security 2014](https://reader036.vdocuments.mx/reader036/viewer/2022062707/55815d3ed8b42ac7228b4a62/html5/thumbnails/10.jpg)
A Safe Network Uses a Router
GOODBAD
![Page 11: Home and Business Computer Security 2014](https://reader036.vdocuments.mx/reader036/viewer/2022062707/55815d3ed8b42ac7228b4a62/html5/thumbnails/11.jpg)
Router Firewall
• Closes and locks “open doors”
• Keeps intruders and unknowns out
• Allows the recognized & trusted in
• Not perfect, Cyber-criminals exploit trusted doors
• May block desired sites
![Page 12: Home and Business Computer Security 2014](https://reader036.vdocuments.mx/reader036/viewer/2022062707/55815d3ed8b42ac7228b4a62/html5/thumbnails/12.jpg)
Setting Up Router Access Password
Access Router via your web browser
Enter your Routers IP Address
Enter the default username & password
Find administration settings
Select Change/Reset Password
Tip: Default Usernames/Passwords for most routers can be found at this web site: http://portforward.com/default_username_password
![Page 13: Home and Business Computer Security 2014](https://reader036.vdocuments.mx/reader036/viewer/2022062707/55815d3ed8b42ac7228b4a62/html5/thumbnails/13.jpg)
Password Protection
Rule #1 Always require a password to access your computer
Why? Prevents unauthorized access Provides a first line of defense Prevents easy access from a
network
TIP: Set up the automatic lockout for when you leave your computer that requires a
password. A good timeout value is 5 to 10 minutes.
![Page 14: Home and Business Computer Security 2014](https://reader036.vdocuments.mx/reader036/viewer/2022062707/55815d3ed8b42ac7228b4a62/html5/thumbnails/14.jpg)
Good Password Procedures
ALWAYS Password protect your computer
Lock you cell phone Use strong passwords –
12 characters, letters, numbers and symbols Use a “coded” phrase you can remember
Do not store passwords electronically Do not write them down Use password vault plugin such as
“Lastpass”
![Page 15: Home and Business Computer Security 2014](https://reader036.vdocuments.mx/reader036/viewer/2022062707/55815d3ed8b42ac7228b4a62/html5/thumbnails/15.jpg)
Encryption Protection
Encryption makes files and data unreadable to anyone that does not have the encryption key
You can encrypt: Entire Computer A Disk Volume Files & Folders
Protects against theft and unauthorized access
![Page 16: Home and Business Computer Security 2014](https://reader036.vdocuments.mx/reader036/viewer/2022062707/55815d3ed8b42ac7228b4a62/html5/thumbnails/16.jpg)
SPAM
URL
Filters
SPAM Filters Keeps out email
from unknown senders
Catches majority of SPAM
Catches non-SPAM Allows known
email SPAM Filters aren’t
perfect!
WEB Filters Prohibits bad websites Pre-examines website
content and warns you
Catches good websites
Allows known websites
Web filters aren’t perfect!
![Page 17: Home and Business Computer Security 2014](https://reader036.vdocuments.mx/reader036/viewer/2022062707/55815d3ed8b42ac7228b4a62/html5/thumbnails/17.jpg)
Malware Protection
• Anti-Virus & Anti-Malware Programs
• Scans email, attachments files, & downloads
• Detects threats and Removes them
• Not perfect, does not detect everything, cannot remove all threats
![Page 18: Home and Business Computer Security 2014](https://reader036.vdocuments.mx/reader036/viewer/2022062707/55815d3ed8b42ac7228b4a62/html5/thumbnails/18.jpg)
Most Important Is You
You are the last line of defenseAfter all the layers of protection, you are the decision maker
Educate yourself, Google it!When in doubt DENY !!!Do I Open it?
Do I Allow it?
Home PC Security Part III
![Page 19: Home and Business Computer Security 2014](https://reader036.vdocuments.mx/reader036/viewer/2022062707/55815d3ed8b42ac7228b4a62/html5/thumbnails/19.jpg)
SCAM 101 - Fake Anti-Virus Program
http://www.youtube.com/watch?v=xxDm_sKhIBM
![Page 20: Home and Business Computer Security 2014](https://reader036.vdocuments.mx/reader036/viewer/2022062707/55815d3ed8b42ac7228b4a62/html5/thumbnails/20.jpg)
Online ThreatsHome PC Security Part III
![Page 21: Home and Business Computer Security 2014](https://reader036.vdocuments.mx/reader036/viewer/2022062707/55815d3ed8b42ac7228b4a62/html5/thumbnails/21.jpg)
Internet Threats
Type Source Purpose ProtectionVirus Email
AdsLinksWarningsUpdates
Malicious attackDisable your computerDestroy your data
Anti-virus softwareFirewall softwareFirewall hardwareData back-up
Phishing
EmailWebsite
Steal Identity or money
Surfing behavior
Adware Ads Virus delivery, steal information
Good practices
Spyware
Steal personal information
Anti-spyware & firewall software
Tip: Have both Anti-Virus AND Anti-Spyware installed on your computer..
But DO NOT install two anti-virus programs.
![Page 22: Home and Business Computer Security 2014](https://reader036.vdocuments.mx/reader036/viewer/2022062707/55815d3ed8b42ac7228b4a62/html5/thumbnails/22.jpg)
Phishing, Pharming, Vishing and Smishing
These scams will come in the form of: Email (phishing) Website (pharming) Phone Call (vishing) Text Message (smishing) A Combination of These
![Page 23: Home and Business Computer Security 2014](https://reader036.vdocuments.mx/reader036/viewer/2022062707/55815d3ed8b42ac7228b4a62/html5/thumbnails/23.jpg)
Phishing, Pharming, Vishing and Smishing
Similar variations on a theme
Identity Theft is their goal
Tip: If you don’t see a “padlock” symbol or “https” on your browser address bar, the site is not secure for
personal or private information. Don’t enter any!
May direct you to call a number to “unlock” or “reactivate” your account by entering personal info
May direct you to a website to enter personal info
![Page 24: Home and Business Computer Security 2014](https://reader036.vdocuments.mx/reader036/viewer/2022062707/55815d3ed8b42ac7228b4a62/html5/thumbnails/24.jpg)
Email Phishing Warning Flags
Requests personal information?
Contains grammatical errors or misspellings?
How do they address you? Is it too good to be true? Have you checked the link?
Tip: You can “Mouse Over” a link and check a website Does the website URL look legitimate?
Tip: Legitimate companies will NEVER ask you for personal or confidential information via email, a website, telephone, or
text message.
![Page 25: Home and Business Computer Security 2014](https://reader036.vdocuments.mx/reader036/viewer/2022062707/55815d3ed8b42ac7228b4a62/html5/thumbnails/25.jpg)
Websites
Tip: When installing programs pay attention to installation options. They make you think
you’re declining, but you’re approving!
Beware of search engine results
Do not download unknown or free software
“Unclick”/DECLINE any OPTIONAL Downloads or Toolbars
Use Sucuri Site Check
http://sitecheck.sucuri.net/
![Page 26: Home and Business Computer Security 2014](https://reader036.vdocuments.mx/reader036/viewer/2022062707/55815d3ed8b42ac7228b4a62/html5/thumbnails/26.jpg)
Browser Security Settings
Tip: Don’t use your browser to store passwords, not secure.
![Page 27: Home and Business Computer Security 2014](https://reader036.vdocuments.mx/reader036/viewer/2022062707/55815d3ed8b42ac7228b4a62/html5/thumbnails/27.jpg)
Identity Theft on Social Media
Do NOT friend, link, or message people you don’t know
Do not allow untrusted applications to access your account
Do not click on posted videosNEVER POST
• You or your family’s full birthdates or places of birth
• Your mother’s maiden name
• The names of young family members
• Your relationship status
![Page 28: Home and Business Computer Security 2014](https://reader036.vdocuments.mx/reader036/viewer/2022062707/55815d3ed8b42ac7228b4a62/html5/thumbnails/28.jpg)
Identity Theft on Social Media
NEVER POST
Your vacation plans
Your home address
Your current location
That your home alone
Pictures of kids/grandkids tagged with their names
A description of your home
![Page 29: Home and Business Computer Security 2014](https://reader036.vdocuments.mx/reader036/viewer/2022062707/55815d3ed8b42ac7228b4a62/html5/thumbnails/29.jpg)
Diagnosis and Action If you get a virusHome PC Security Part IV
![Page 30: Home and Business Computer Security 2014](https://reader036.vdocuments.mx/reader036/viewer/2022062707/55815d3ed8b42ac7228b4a62/html5/thumbnails/30.jpg)
Is My Computer Infected?
http://www.youtube.com/watch?v=LGtq_el4p_8
![Page 31: Home and Business Computer Security 2014](https://reader036.vdocuments.mx/reader036/viewer/2022062707/55815d3ed8b42ac7228b4a62/html5/thumbnails/31.jpg)
Signs of Infection
Boots very slowly or hangs up Responds slowly, crashes Programs won’t run or crash Popups, website redirection Broken antivirus or security
Tip: You can “right click” on the task bar and select the “Task Manager” to see the memory and CPU usage that is currently taking place on your computer. Should not be constantly 100%.
![Page 32: Home and Business Computer Security 2014](https://reader036.vdocuments.mx/reader036/viewer/2022062707/55815d3ed8b42ac7228b4a62/html5/thumbnails/32.jpg)
You Have a Virus!(what do you do now?)
Tip:
A foolproof way to keep a virus from
stealing your personal info - disconnect the network cable or turn off the Wi-Fi. THEN
take action.
![Page 33: Home and Business Computer Security 2014](https://reader036.vdocuments.mx/reader036/viewer/2022062707/55815d3ed8b42ac7228b4a62/html5/thumbnails/33.jpg)
Serious Infections Need Professional Help
(When to call for help) Anti-virus can’t remove it
Computer is not unusable
Your files are missing
You must manually edit Windows
Your not absolutely sure your actions won’t make matters worse!
![Page 34: Home and Business Computer Security 2014](https://reader036.vdocuments.mx/reader036/viewer/2022062707/55815d3ed8b42ac7228b4a62/html5/thumbnails/34.jpg)
What to Do To Protect YourselfHome PC Security Part V
![Page 35: Home and Business Computer Security 2014](https://reader036.vdocuments.mx/reader036/viewer/2022062707/55815d3ed8b42ac7228b4a62/html5/thumbnails/35.jpg)
Back-up Options
External Hard Drive Backup Windows Backup Time Machine (Mac)
Cloud Backup Carbonite CrashPlan
File Sync Service (not really a backup)
Dropbox Google Drive
REGULAR BACKUPJUST DO IT.
![Page 36: Home and Business Computer Security 2014](https://reader036.vdocuments.mx/reader036/viewer/2022062707/55815d3ed8b42ac7228b4a62/html5/thumbnails/36.jpg)
How to Backup Windows 7
![Page 37: Home and Business Computer Security 2014](https://reader036.vdocuments.mx/reader036/viewer/2022062707/55815d3ed8b42ac7228b4a62/html5/thumbnails/37.jpg)
Be Careful Not to Overwrite Information
Keeps Current File
Keeps Current File & Adds File from
Backup
Overwrites Current File
![Page 38: Home and Business Computer Security 2014](https://reader036.vdocuments.mx/reader036/viewer/2022062707/55815d3ed8b42ac7228b4a62/html5/thumbnails/38.jpg)
Final Notes on Windows 7 Backup
Backup saves/restores just YOUR data files
Backup also creates a separate system image for restoring programs & Windows Overwrites EVERYTHING when restored Can only be used if the system repair
disk was created
![Page 39: Home and Business Computer Security 2014](https://reader036.vdocuments.mx/reader036/viewer/2022062707/55815d3ed8b42ac7228b4a62/html5/thumbnails/39.jpg)
Infection Prevention
Prevention begins and ends with you
Never use pirate websites for apps, music, movies or games (e.g. www.piratebay.com) Loaded with adware/spyware/viruses Opening these will infect your computer Much of these sites content is illegal
![Page 40: Home and Business Computer Security 2014](https://reader036.vdocuments.mx/reader036/viewer/2022062707/55815d3ed8b42ac7228b4a62/html5/thumbnails/40.jpg)
Avoid the “RISK” In Your Email
R eceived Before?
I nside Links?
S ensible Message?
K now sender?
This email link delivers a Trojan
Virus right to your computer
![Page 41: Home and Business Computer Security 2014](https://reader036.vdocuments.mx/reader036/viewer/2022062707/55815d3ed8b42ac7228b4a62/html5/thumbnails/41.jpg)
“STOP Virus Infection From Downloads
S ource of file?
T ype & size of file?
O thers recommend?
P repared to scan?
This is a fake anti-virus program. Once loaded it claims your computer is infected and directs you to a website to buy the program via credit card.
![Page 42: Home and Business Computer Security 2014](https://reader036.vdocuments.mx/reader036/viewer/2022062707/55815d3ed8b42ac7228b4a62/html5/thumbnails/42.jpg)
Tips for Using the Internet
Only login or send personal information to websites you know are encrypted
A website is encrypted when you see a “lock” symbol or https://
Beware of websites using encryption only on the login page
![Page 43: Home and Business Computer Security 2014](https://reader036.vdocuments.mx/reader036/viewer/2022062707/55815d3ed8b42ac7228b4a62/html5/thumbnails/43.jpg)
Tips for Using the Internet
Don't stay signed in to accounts When you are done, log out
Don’t do sensitive business on public WiFi Don’t use the same password, vary it e.g. H1T0w3r! / P@$$w0rd!! / !P@inT3r! Keep your browser(s) and plug-ins up-to-
date Keep Windows up to date
![Page 44: Home and Business Computer Security 2014](https://reader036.vdocuments.mx/reader036/viewer/2022062707/55815d3ed8b42ac7228b4a62/html5/thumbnails/44.jpg)
Five things you MUST do
1. Regularly Backup of your files and data2. Use a Router, it hides your computer/network3. Make sure the Windows Firewall is enabled4. Use strong passwords on your Router and
Computer5. Use anti-virus/anti-spyware to detect/remove
malware
And, practice safe surfing: if you aren’t sure, don’t click!
Tip: By protecting your computer, hackers and Internet criminals “move on” to easier targets. Stay vigilant!
![Page 45: Home and Business Computer Security 2014](https://reader036.vdocuments.mx/reader036/viewer/2022062707/55815d3ed8b42ac7228b4a62/html5/thumbnails/45.jpg)
Minimum Cost of Prevention
Hardware orSoftware
Cost of Requir
ed
Suggested Source
Router $50 Various – Netgear, Linksys, Belcan, et. Al.
Cloud drive backup or
External Hard Drive
$60/year or
$75 once
Carbonite - www.carbonite.comor
Windows Backup Software
Anti-Virus $40/year AVG Antivirus – www.avg.com
Firewall $0 Windows Firewall
Anti-Spyware $0 Malwarebytes – www.malwarebytes.org
Anti-spam $0 Built in to Apple Mail & Outlook, need setup
Password vault $0 Great, but dangerous - Lastpass
Total cost $150 -$165
Do it yourself cost (Complete packages, installation, and
training available from Computer Troubleshooters)
![Page 46: Home and Business Computer Security 2014](https://reader036.vdocuments.mx/reader036/viewer/2022062707/55815d3ed8b42ac7228b4a62/html5/thumbnails/46.jpg)
Surf Safely and Securely
(937) 458-2000
www.CTDayton.com [email protected]
“For All Your Computing Needs in Dayton”