Download - Internet and PC Security Workshop 2014
Home And Small Business Computer Security
Practical Tips You Can Use to Protect Your Identity, Your Computer and Your Network
from Attack
Art Helmstetter OhioBusinessHelp.com
Cliff Brust –CTDayton.com
• Started and Grew two businesses
• 35 years - business experience
• Education:
MBA, BS & MS Engineering,
• Trainer for Web-Based Marketing Course
• Owner B2BPlanner Ltd – business coach
About Us:
• 35 years computer experience
• Owner Computer Troubleshooters
• Education
BS Computer Science UD
• Inventor on three patents
• Edison Technology Award
Don’t Be A Target!Home PC Security Part I
Are YOU at Risk?
You are at risk if
Your kids use your computer You travel with your computer and
use WiFi Personal & financial information are
on your computer Business files are on your computer Family pictures and videos are on
your computerWhat would happen if your computer was gone tomorrow?
Home Computer Cyber-Security
What is Cyber-Security?
Protecting your computer, your network, and your
information from at-home and online threats
What is Cyber-Crime?
Any crime conducted via the Internet to cause
damage and/or steal personal information
Cyber-Crime Target The Home Computer
Why do hackers hack? Lot’s of money to be stolen To collect information! Information used to directly steal money, and identity theft
Why attack the home computer? Home computer = information! Least secure in general Unwary users
Avenues That Subject You to Attack
Hardware Unsecured Wi-Fi (think Panera) No Router Router with default password
Software No anti-virus/anti-spyware No Firewall Old virus definitions Out of date Windows O.S.
Personal Behavior Failure to use strong passwords Clicking on unsafe links or emails Downloading questionable files Leaving computer logged on Leaving your computer accessible
Cost of Getting A Virus
Virus Type
Impact Solution Cash Cost
Minor Virus
Lose some data2- 4 hours
Use installed anti-virus
$75-100
Major Virus
Loss of docs 5-10 hours
Use service to remove
$100-$130
Catastrophic Virus
Loss of ALL data & photos15+ hours
Use service to wipe & reload entire system
$150-175
What is YOUR time worth? $25, $50 $75?
Layered SecurityHome PC Security Part II
Multiple Defenses In Layers of Protection)
Router
Firewall
SPAM Filter
Web Filter
Anti-Malware
You!
BackupYOUR INFO!
Passwords
1
23
4. 5
.
6.
Conceal
Deny
Detect
Filter
Decide
A Safe Network Uses a Router
GOODBAD
Router Firewall
• Closes and locks “open doors”
• Keeps intruders and unknowns out
• Allows the recognized & trusted in
• Not perfect, Cyber-criminals exploit trusted doors
• May block desired sites
Setting Up Router Access Password
Access Router via your web browser
Enter your Routers IP Address
Enter the default username & password
Find administration settings
Select Change/Reset Password
Tip: Default Usernames/Passwords for most routers can be found at this web site: http://portforward.com/default_username_password
Password Protection
Rule #1 Always require a password to access your computer
Why? Prevents unauthorized access Provides a first line of defense Prevents easy access from a
network
TIP: Set up the automatic lockout for when you leave your computer that requires a
password. A good timeout value is 5 to 10 minutes.
Good Password Procedures
ALWAYS Password protect your computer
Lock you cell phone Use strong passwords –
12 characters, letters, numbers and symbols Use a “coded” phrase you can remember
Do not store passwords electronically Do not write them down Use password vault plugin such as
“Lastpass”
Encryption Protection
Encryption makes files and data unreadable to anyone that does not have the encryption key
You can encrypt: Entire Computer A Disk Volume Files & Folders
Protects against theft and unauthorized access
SPAM
URL
Filters
SPAM Filters Keeps out email
from unknown senders
Catches majority of SPAM
Catches non-SPAM Allows known
email SPAM Filters aren’t
perfect!
WEB Filters Prohibits bad websites Pre-examines website
content and warns you
Catches good websites
Allows known websites
Web filters aren’t perfect!
Malware Protection
• Anti-Virus & Anti-Malware Programs
• Scans email, attachments files, & downloads
• Detects threats and Removes them
• Not perfect, does not detect everything, cannot remove all threats
Most Important Is You
You are the last line of defenseAfter all the layers of protection, you are the decision maker
Educate yourself, Google it!When in doubt DENY !!!Do I Open it?
Do I Allow it?
Home PC Security Part III
SCAM 101 - Fake Anti-Virus Program
http://www.youtube.com/watch?v=xxDm_sKhIBM
Quick Break?Home PC Security Part III
Internet Threats
Type Source Purpose ProtectionVirus Email
AdsLinksWarningsUpdates
Malicious attackDisable your computerDestroy your data
Anti-virus softwareFirewall softwareFirewall hardwareData back-up
Phishing
EmailWebsite
Steal Identity or money
Surfing behavior
Adware Ads Virus delivery, steal information
Good practices
Spyware
Steal personal information
Anti-spyware & firewall software
Tip: Have both Anti-Virus AND Anti-Spyware installed on your computer..
But DO NOT install two anti-virus programs.
Phishing, Pharming, Vishing and Smishing
These scams will come in the form of: Email (phishing) Website (pharming) Phone Call (vishing) Text Message (smishing) A Combination of These
Phishing, Pharming, Vishing and Smishing
Similar variations on a theme
Identity Theft is their goal
Tip: If you don’t see a “padlock” symbol or “https” on your browser address bar, the site is not secure for
personal or private information. Don’t enter any!
May direct you to call a number to “unlock” or “reactivate” your account by entering personal info
May direct you to a website to enter personal info
Email Phishing Warning Flags
Requests personal information?
Contains grammatical errors or misspellings?
How do they address you? Is it too good to be true? Have you checked the link?
Tip: You can “Mouse Over” a link and check a website Does the website URL look legitimate?
Tip: Legitimate companies will NEVER ask you for personal or confidential information via email, a website, telephone, or
text message.
Websites
Tip: When installing programs pay attention to installation options. They make you think
you’re declining, but you’re approving!
Beware of search engine results
Do not download unknown or free software
“Unclick”/DECLINE any OPTIONAL Downloads or Toolbars
Use Sucuri Site Check
http://sitecheck.sucuri.net/
Browser Security Settings
Tip: Don’t use your browser to store passwords, not secure.
Identity Theft on Social Media
Do NOT friend, link, or message people you don’t know
Do not allow untrusted applications to access your account
Do not click on posted videosNEVER POST
• You or your family’s full birthdates or places of birth
• Your mother’s maiden name
• The names of young family members
• Your relationship status
Identity Theft on Social Media
NEVER POST
Your vacation plans
Your home address
Your current location
That your home alone
Pictures of kids/grandkids tagged with their names
A description of your home
Diagnosis and Action If you get a virusHome PC Security Part IV
Is My Computer Infected?
http://www.youtube.com/watch?v=LGtq_el4p_8
Signs of Infection
Boots very slowly or hangs up Responds slowly, crashes Programs won’t run or crash Popups, website redirection Broken antivirus or security
Tip: You can “right click” on the task bar and select the “Task Manager” to see the memory and CPU usage that is currently taking place on your computer. Should not be constantly 100%.
You Have a Virus!(what do you do now?)
Tip:
A foolproof way to keep a virus from
stealing your personal info - disconnect the network cable or turn off the Wi-Fi. THEN
take action.
Serious Infections Need Professional Help
(When to call for help) Anti-virus can’t remove it
Computer is not unusable
Your files are missing
You must manually edit Windows
Your not absolutely sure your actions won’t make matters worse!
What to Do To Protect YourselfHome PC Security Part V
Back-up Options
External Hard Drive Backup Windows Backup Time Machine (Mac)
Cloud Backup Carbonite CrashPlan
File Sync Service (not really a backup)
Dropbox Google Drive
REGULAR BACKUPJUST DO IT.
How to Backup Windows 7
Be Careful Not to Overwrite Information
Keeps Current File
Keeps Current File & Adds File from
Backup
Overwrites Current File
Final Notes on Windows 7 Backup
Backup saves/restores just YOUR data files
Backup also creates a separate system image for restoring programs & Windows Overwrites EVERYTHING when restored Can only be used if the system repair
disk was created
Infection Prevention
Prevention begins and ends with you
Never use pirate websites for apps, music, movies or games (e.g. www.piratebay.com) Loaded with adware/spyware/viruses Opening these will infect your computer Much of these sites content is illegal
Avoid the “RISK” In Your Email
R eceived Before?
I nside Links?
S ensible Message?
K now sender?
This email link delivers a Trojan
Virus right to your computer
“STOP Virus Infection From Downloads
S ource of file?
T ype & size of file?
O thers recommend?
P repared to scan?
This is a fake anti-virus program. Once loaded it claims your computer is infected and directs you to a website to buy the program via credit card.
Tips for Using the Internet
Only login or send personal information to websites you know are encrypted
A website is encrypted when you see a “lock” symbol or https://
Beware of websites using encryption only on the login page
Tips for Using the Internet
Don't stay signed in to accounts When you are done, log out
Don’t do sensitive business on public WiFi Don’t use the same password, vary it e.g. H1T0w3r! / P@$$w0rd!! / !P@inT3r! Keep your browser(s) and plug-ins up-to-
date Keep Windows up to date
Five things you MUST do
1. Regularly Backup of your files and data2. Use a Router, it hides your computer/network3. Make sure the Windows Firewall is enabled4. Use strong passwords on your Router and
Computer5. Use anti-virus/anti-spyware to detect/remove
malware
And, practice safe surfing: if you aren’t sure, don’t click!
Tip: By protecting your computer, hackers and Internet criminals “move on” to easier targets. Stay vigilant!
Minimum Cost of Prevention
Hardware orSoftware
Cost of Requir
ed
Suggested Source
Router $50 Various – Netgear, Linksys, Belcan, et. Al.
Cloud drive backup or
External Hard Drive
$60/year or
$75 once
Carbonite - www.carbonite.comor
Windows Backup Software
Anti-Virus $40/year AVG Antivirus – www.avg.com
Firewall $0 Windows Firewall
Anti-Spyware $0 Malwarebytes – www.malwarebytes.org
Anti-spam $0 Built in to Apple Mail & Outlook, need setup
Password vault $0 Great, but dangerous - Lastpass
Total cost $150 -$165
Do it yourself cost (Complete packages, installation, and
training available from Computer Troubleshooters)
Surf Safely and Securely
(937) 458-2000
www.CTDayton.com [email protected]
“For All Your Computing Needs in Dayton”