/
IGNORANCE IGNORANCE

IGNORANCE - PowerPoint Presentation

alexa-scheidler
alexa-scheidler . @alexa-scheidler
Follow
440 views
Uploaded On 2017-09-18

IGNORANCE - PPT Presentation

IS A HACKERS BEST FRIEND An indepth look at the growing problems and evolving solutions of Internet Security Identity Theft Privacy and Data Protection Do you have specific questions Please use the blank 3x 5 cards on the tables to provide us with the following ID: 588775

malware computer software file computer malware file software sharing security password virus online browsing microsoft p2p internet program protection

Share:

Link:

Embed:

Download Presentation from below link

Download Presentation The PPT/PDF document "IGNORANCE" is the property of its rightful owner. Permission is granted to download and print the materials on this web site for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.


Presentation Transcript

Slide1

IGNORANCE IS A HACKERS BEST FRIEND

An in-depth look at the growing problems and evolving solutions of

Internet Security, Identity Theft, Privacy and Data Protection Slide2

Do you have specific questions?Please use the blank 3x 5 cards on the tables to provide us with the following:

Name:Address:Phone:Email Address:

Write any question for me on the back – we will have a Q & A at the end of this seminar.Slide3

From Eric Howes, director of research services for security firm GFI Software:

"The user is always the weak link. Even the best anti-malware protection and security patches cannot protect a PC from malware if the user sitting at the keyboard is being irresponsible while surfing the Web.“Slide4

SEMINARE OVERVIEWHackers - Why do they do it?

Understanding the LingoAssess Your Risk LevelCurrent Amador County attacks

Knowledge is PowerSocial Media & Online EntertainmentThe CloudThe GOOD news!Effective Software SolutionsPassword RulesSmarter SurfingMacsSlide5

Understanding the Lingo

Trojans

BotsBotNetsZombiesRansom ware

Virus

vs

Malware

Spyware

Scareware

Adware

Polymorphic Virus

The CloudSlide6

• TROJAN VIRUSES

A

Trojan horse, or Trojan, is a type of malwareprogram containing malicious code that carriesout actions it was programmed for, typically causing loss or

theft of data, and possible

system harm.

It typically arrives inside of

something you downloaded.Slide7

• BOTS

A ’bot’, short for robot,

is a computer virus designed to control computers from a remote location. It waits for instructions, and upon receiving them

performs a specific task on

the infected computer. Slide8

• BOTNETSHundreds, thousands, even millions of

bot-infected computers can be placed underthe control of a command-and-control serverwith an attacker at the controls.

These infected computers area a BOTNETwhich can be used for malicious purposes such as sending out massive spam email and denial-of-service attacks on servers. Slide9

BOTNET EXAMPLESlide10

• ZOMBIE COMPUTERS

“Zombie computers” are bot-infected and come alive by themselves. Typically, the zombie computer is connected to a high speed internet service.

A task is activated (brought to life) by the remote hacker, or even by instructions from another zombie computer, while the computer is not in normal use.

The purpose is to run tasks such as decrypting parts of passwords which if performed

with just one computer could take over 200 years, but with the use of thousands of

zombies can be done in just a few hours.

This is the reason why our government servers have 5 password layers, and daily the

hackers get beyond level 3, sometimes level 4. Slide11

Don’t let your computer become a Zombie

If you have not installed security software and ensured that it is kept up-to-date, your machine is likely infected with all kinds of malicious software, including bots.

The best protection is to set your anti-virus and anti-spyware programs to automatically update (if possible), and to install every patch that your operating system and browser make available.Run your security software scans monthly or sooner if you feel you may have put yourself at risk. Slide12

• VPN – Virtual Private Network

The most important thing you need to know about a VPN:

It secures your computer's internet connection to guarantee that all of the data you're sending and receiving is encrypted and secured from prying eyes

.

More on this later….Slide13

• RANSOMWARE

Ransomware is any infection that attempts to

extort money from you to remove the infection.

Some Ransomware, such as the FBI Virus can be removed without paying the ransom.

The best advice is to call your tech the moment you receive the message. In some cases you have only 72 hours to pay the ransom with Bitcoin.Slide14

• VIRUS vs MALWARE

VIRUSES Computer viruses are small software programs that are designed to spread from one computer to another and to interfere with computer operation or instruct the computer to perform a task.

They can cause the operation system to completely fail.Slide15

• VIRUS vs MALWARE - continued

MALWARE

The generic term "malware" essentially refers to "adware" and "spyware" programs that are loaded onto computers from the Internet, without your permission or knowledge.By nature it is malicious

Slide16

• SCAREWARE

Scareware is a form of Malware with one goal – Scare you into purchasing a product or paying a fee to avoid a worse fate.

Common Scareware:“You are infected – click here to run a scan”“You are wanted by the FBI”“Pending Hard Drive Failure – buy our repair software now!”Slide17

• ADWARE

Adware

programs often change browser settings, redirect your

browser to a new “home page”

and re-route your favorite websites

to advertising websites.

Typically, infected systems are plagued

with new tool bars and a constant barrage

of popup ads.

.Slide18

• POLYMORPHIC VIRUS – “it’s alive”

Polymorphic viruses resemble nature’s own

viruses in their ability to mutate.As they travel from computer to computer, they change (MORPH) their file name and the software code

that is normally detectable by anti-virus

protection software. This morph

allows them to slip past your anti-virus

protection software.Slide19

• POLYMORPHICS GIVE BIRTHOnce the Polymorphic virus arrives into your computer, it immediately morphs again just in case your protection software noticed it’s arrival, and then immediately creates a second (baby) version of itself (the egg), which in turn morphs one more time. The egg is hidden in a new randomly named file within the Windows OS. The name changes each time it is spread from computer to computer.

Slide20

• POLYMORPHICS RESPAWNIF you are successful in locating and removing the Mother Polymorphic, the baby will hatch from it’s little egg and re-spawn another baby egg.

It requires a computer professional familiar with Polymorphic Viruses to successfully remove the mother

and the hidden baby with proper diagnostic tools PLUS manually within the system registry, before they have a chance to re-spawn.Slide21

HACKERS – why do they do it?

In order to understand why hackers do what they do, you only need to be focused on one expression; “The Achievement”.

Recognition, money, international terror, and the ultimate achievement of the impossible – Hacking the government and THE CLOUD!Slide22

HACKERS – why do they do it?

Most people think hackers are after credit card numbers or other similar information for financial gain. The reality is that most hacks are not motivated by instant financial gain. The vast majority are done simply because

THEY CAN, and often to cause embarrassment to the hacked entity.Slide23

There is $$$$ in HackingJob offers – it is very common for large corporations and governments around the globe to hire the very same people who have hacked into their data bases.

Keep your friends close, keep your enemies closer.Slide24

There is $$$$ in HackingKevin

Mitnick, the man widely regarded to be the world’s first convicted hacker. After a public pursuit by the FBI, he was arrested in February 1995 and ultimately sentenced to prison time. He served five

years.Today, Kevin Mitnick is chief hacking officer of a company called KnowBe4, which specializes in computer security education and testing.Slide25

There is $$$$ in HackingCommissions Earned

A hacker earns the most money by creating an enticing download, video or picture – one that the general public can’t resist clicking on. He then announces to the “Dark Web” that he is seeking other hackers who have a virus or malicious program that they wish to spread on the web.

He then opens a bidding auction for the rights to piggy back along with his destructive file. Slide26

There is $$$$ in HackingCommissions Earned

The “piggy back” hackers will bid to pay him anywhere from $.05 cents to $1.00 for every computer that he is able to get THEIR file into. The more “piggy

backers” he has, the more money he makes. Note: the majority of “piggy backers” compromise your security with keystroke loggers, adware popups, and data harvesters. They make their money by selling the information they gather from your computer to marketing firms and other hackers. Slide27

HACKER STATISTICS

According to statistics, about 90% of all computers in the world are infected with malware.

80 percent of U.S. businesses have been hacked and most don’t even know it. It takes only 1-7 seconds to completely hack a password if the word is found in a dictionary.

Slide28

HACKER STATISTICS

Simply stated, firewalls and anti-virus are no longer enough. There is not an anti-virus program on the market that cannot be defeated. Don’t lose sight of that

.The best protection you have, without a doubt, Is YOU. Knowledge is Power! Slide29

PASSWORD HACKING

A password-cracking expert

in 2012 unveiled a computer cluster that can cycle through as many as 350 billion guesses per second. At that time it was an unprecedented speed that can try every possible Windows passcode in the typical enterprise in less than six hours

.

The good news is that this will not work on any website that limits the number of failed password attempts before locking the account .

These method works best in OFFLINE password cracking. Slide30

PASSWORD HACKING

Example of its use: Cracking major databases of credit card numbers and user logins stored

on Windows servers for major retailers.TargetHome Depot

Lowes

Anthem Blue Cross

Linked In

Facebook

I personally have had my account hacked at three of these companies who were attacked by this very

tecnique

. Slide31

http://www.informationisbeautiful.net/visualizations

/worlds-biggest-data-breaches-hacks/ Slide32

5 MINUTE BREAKSlide33

CURRENT AMADOR COUNTY ATTACKS

RANSOMWARE:

FBIDepartment of justice PRISMCryptolockerSCAREWARE SCAMSMicrosoft Tech Support

Other tech support

Antivirus Warnings

EMAIL SCAMS

Court Appearance

Hospital notices

Payment due notices

SOFTWARE UPDATES

Adobe Reader, Java or Flash updatesSlide34

FBISlide35

FBI – VIDEO CAPTURESlide36

PRISM VIRUSSlide37

CRYPTOLOCKER - EncryptionSlide38

THREAT FINDER - EncryptionSlide39

FALSE PROGRAM – Security EssentialsSlide40

FALSE PROGRAM – NortonSlide41

FALSE PROGRAM – AVG or Windows Tech Support?Slide42

FALSE PROGRAM – AVG Anti-VirusSlide43

FALSE PROGRAM – McAfee Site AdvisorSlide44

FALSE PROGRAM – McAfee Security Scan PlusSlide45

FALSE PROGRAM – McAfee 800# ScamSlide46

SCAM – PDF reader / writerSlide47

SCAM - FLASHSlide48

SCAM - FLASHSlide49

SCAM - FlashSlide50

DRIVER UPDATER - WinZipSlide51

SCAM – PC TOOLSSlide52

SCAM - FACEBOOKSlide53

SCAM – JAVA UPDATESlide54

SCAM – TECH SUPPORTSlide55

SCAM – TECH SUPPORTSlide56

SCAM – TECH SUPPORTSlide57

SCAM – TECH SUPPORTSlide58

MICROSOFT TECH SUPPORT

MICROSOFT WILL NEVER, EVER CALL YOU!

NEVER BELIEVE THEM. HANG UP!

AND DON’T ANSWER THE PHONE WHEN THEY CALL BACK!

Never dial the “Microsoft” number they provide.

NEVER, EVER, FOR ANY REASON ALLOW THEM ACCESS INTO YOUR COMPUTER .

THEY WILL STEAL ALL YOUR DOCUMENTS, CONTACTS, PICTURES, ETC -

PLUS

INFECT YOU WITH KEY STROKE LOGGERS AND MANY OTHER MALICIOUS MALWARE!!

AND THEY WILL BILL YOUR CREDIT CARD AROUND $300 FOR THE “service”. Slide59

SCAM – Microsoft Tech SupportSlide60

How SAFE are YOU?Slide61

ASSESS YOUR RISK LEVEL!

If you participate in ANY

of the following you ARE at risk. The more you do, the higher your risk. Email – PC or WebmailShop online Click links in a web page

Have OR visit FaceBook

Download music or games

Play online games

YouTube – view, post or download

SKYPE

Visit adult sites

Download FREE stuffSlide62

ASSESS YOUR SECURITY LEVEL

How many of the following apply to you?

I have installed the following tools:

Required Monthly Maintenance

Current subscription Anti-Virus Software

Update and run

full hard drive scan

Malware Bytes Anti-Malware

Update and run

full hard drive scan

Firewall Utility

Download

updates from Microsoft or other program when available.

Current

version of Browser: not IE

Download

updates from Microsoft as available.

Microsoft OS Updates

Download

updates from Microsoft as available.

Current versions

of Flash, Java & Adobe Acrobat Reader

Download ONLY from get.adobe.com

and java.com. NOT from any other source.Slide63

TAKE 5Slide64

REALISTIC SOLUTIONSSlide65

EDUCATION IS PROTECTION

Software tools are not enough. YOU are a critical part of your defense.

This sections topics include:Email safetyOnline ShoppingWeb LinksFree stuffSlide66

eMAIL vs WEB MAIL

Is WEB Mail safer the PC Mail?Both can contain harmful links that if clicked can direct you to a website that may infect you. But email

delivered directly to your PC mail program does pose more risks of accidental infection from simply opening the message. Don't buy anything promoted in a spam message.Don't reply to spam or click on its "unsubscribe" link.

If your e-mail program has a preview pane, disable it to prevent the spam from reporting back to its sender. Also, the preview pane can enable a virus to launch without you fully opening the message.

Use one e-mail address for family and friends, another for everyone else.

If you get

too much spam

, check your Internet service provider's filtering

features and

attempt to increase the filter.

NEVER

use your email password when creating a login for a website Slide67

EMAIL ATTACHMENTS

If you receive an e-mail with an attachment - DO NOT open it unless it's expected

(not JUST from someone you know. Examples would be: invoices for unknown purchases bank statements (which are never e-mailed)

court appearance notices, medical record notices

sweepstakes winnings

confirmation of trip reservations

Email from Microsoft (unless you signed up to receive

them).Slide68

EMAIL SCAMS - AirlinesSlide69

EMAIL SCAM – AMAZON INVOICESlide70

EMAIL SCAM – UPS OR FED EXSlide71

EMAIL SCAM – UPS OR FED EX

This is a valid notification. Note that BOTH the sender and recipient addresses are displayed, along with the tracking number.

But…… if in doubt…..Write down the tracking number and go directly to UPS.com and track the package directly from their site. Slide72

ONLINE SHOPPING There are risks to online shopping.

Infections from false websites promising a product but delivering viruses/malware.

Malicious keystroke logging software which transmits your credit card info to a hacker. Company you purchased from experiences a data breach on credit card files.Slide73

SOLUTION! ONLINE SHOPPING

Obtain a credit card that has a very low credit limit. Use this card ONLY on websites that you trust.

Open a “Private Browsing Window” or “Incognito Mode” browsing window to make your purchase.Always look for the HTTPS:// at the beginning to ensure you are on a SECURE payment site. Use a VPN – CyberGhost

is recommended - FreeSlide74

WEBSITE LINKS Even the most well know and respected websites are falling victim to hackers who swap a valid link for a dangerous one.

Cases in point: The Yahoo Weather link has been attacked by hackers resulting in the user being re-routed to a page that instantly infects them. Google Ads have been rerouted to various sites not affiliated with the actual ad. Music and video links are notorious for redirecting the user to an infected page.

SOLUTION: Hover over the link and read the text as to where it will take you – before you click!Slide75

Downloading RisksDownloading from friends can be risky.

Always use extreme caution when downloading information or files from someone whose computer is not protected – and you can never be sure anyone else’s computer is virus free. Are you even sure yours is?

Be sure the link you click on is for the program you want – often MANY download links will be on the download page – but only one is what you wanted. Mouse Hover to see the link URL.Slide76

Downloading RisksSlide77

SOCIAL MEDIA & ENTERTAINMENT

YouTube

FaceBookTwitterVideo SitesTeen sitesP2P Gaming SitesBusiness NetworkingFree Stuff DownloadsSlide78

YOUTUBE.COMCan I get infected from just watching a YouTube Video?

Not if you simply watch the videos and use the site as it was intended. It perfectly safe. YouTube re-encodes all videos into their proprietary Flash-based format, and that would remove any macro viruses that could be stored in something like a WMA file.Slide79

YOUTUBE.COM continued -1YouTube is full of links and the average human user has trouble refraining from clicking when presented with a video of cute kittens and a promise of more at the other end of a simple mouse click.

However

, don't click on links which are in the videos or in comments, because they can send you anywhere, out of reach of the Google Police.Don’t click on the Comments, Side Links, Descriptio

n Box Links, basically anywhere outside the video itself.Slide80

FACEBOOK.COM - hacked!

Facebook malware has been proven to be able to get aroundtheir website security controls and take control over accounts. It can collect

info from your account, send status updates or messages that look like they're from you, or cover your account with ads that are filled withmore infections.You can get Facebook malware from any of the following:

Trying to watch a "shocking video" in a post

Visiting a website that claims to offer special features for your

Facebook

page.

Don’t click the link. Locate the real

Facebook

features at Facebook.com

There are sites and add-ons that claim they can show you who's viewing your profile, change the color of your profile or help you remove your Timeline.

These features don't exist.Slide81

ONLINE VIDEO PLAYERSOnline videos account for a huge amount of the traffic on the Internet, and as such are one of the best conduits for malicious code that can infect your computer.

As anti-spam technology improves, hackers are finding new vehicles to deliver their viruses, with some being embedded in online video players, according to a new report from the Georgia Tech Information Security Center

.Solution: When in doubt- Don’t CLICK. Is that video REALLY worth the risk?Slide82
Slide83
Slide84
Slide85
Slide86

PHOTOS AND VIDEOSHackers often embed their malicious code in images or PDF files.

An infected computer can spread the infection through photos and videos attached to emails or posted on websites.

Recommended solutions: view them but don’t click on or save them. OR… save them to a memory key and then instruct your Security Software to scan the key BEFORE you either open the file or transfer it to your Pictures or Videos folder on Drive C. Slide87

DOWNLOADS - GAMES / MUSIC / SCREEN SAVERS

The term “Nothing in life is FREE” is especiallytrue when it comes to the internet.

Just ask yourself one question – Why would asoftware programmer with skills spend hisvaluable time designing software for FREE?Answer – Someone else is paying him to

deliver the software into your computer

Who is it

?Slide88

The HIDDEN MOTIVE in FREE

A hacker needs a delivery method to get his virus/spyware/malware into YOUR computer.

The most common way for malware to work its way into your system is to piggyback on a free program that is downloaded from the Internet.Statistics show that 84% of “free downloads” contain other programs bundled inside - the infamous Trojan Horse concept. Give them a gift and then declare war on their computer!Slide89

The HIDDEN MOTIVE in FREE

Most users click on an "I agree" or "I accept" button without reading the long and complex license agreement that expresses consent to place the malware onto their systems.

Solution – Download the “free” item to a memory key and scan it for infections BEFORE you install it to your computer. Slide90

TAKE 5Slide91

P2P - PEER TO PEER

P2P file sharing is the process of sharing and transferring digital files from one PEER (computer) to another PEER (computer) over the internet, without going through an intermediary server.

Slide92

P2P Examples

Napster was an early and famous example of P2P file sharing. They have since done away with risky P2P and now only offer downloads from their protected servers.

If you use SKYPE, you are using P2P technology.TOR is a technology that allows computers to pass files between each other via an internet connection. (Windows 10 has the ability to use TOR to spread its updates to the world). Slide93

FILE SHARING P2P NETWORKS

File Sharing DangersFile-sharing peer-to-peer networks like Kazaa , Morpheus , iMesh, eDonkey, Gnutella, LimeWire and Grokster accounts for thousands of illegally downloaded music files, games, movies and software.

Computer security experts warn that use of file-sharing operations usually leads to situations in which computers -- and even networks -- are infected with spyware, malware and backdoors left ajar for hackers.Slide94

BE CAREFUL IN a P2P NETWORK

DISCLAIMER - I NEVER RECOMMEND P2P FILE SHARING. IT’S JUST TOO RISKY. BUT IF YOU MUST DO IT….

Before you start, make sure your computer’s security software is up-to-dateCheck that your firewall hasn’t been disabled Stick to legal file-sharing services

Joost, Miro, Babelgum, and BBC’s iPlayer

Use your computer’s security software to scan downloads

If any files are flagged as risky, quarantine and/or delete them immediately.

Don’t upload (or download) copyrighted material

Want to share your digital copy of Iron Man 3 with the world? Your generosity could get you into costly legal trouble. One famous case was

Sony BMG Entertainment v. Tenebaum

, which went all the way to the Supreme Court. Slide95

Continued…

Pay attention when you install P2P programs

Make sure you’re clear which folders on your computer will be made public – you could be exposing private data on your hard drive. Close the P2P connection when you’re finishedWhen you close a file-sharing software program’s window, your connection to the P2P network may remain active. This could give others access to your shared files and increase your risks.

Refrain from using P2P file sharing at work

Employers often have policies against using P2P programs on work computers.

Make sure your kids understand the risks

Youth often feel invincible and believe “it won’t happen to me, my parents are paranoid”.

P2P file sharing has its advantages, but it does come with dangers, so proceed cautiously. Keep our tips in mind when you’re utilizing P2P programs.

And if you have any doubts, just don’t do it.Slide96

PEER-TO-PEER MUSIC SITES

Spyware is a by-product of peer-to-peer file-sharing. People are generally unaware of how easily spyware gets into their computers.

The programs required to participate in peer-to-peer networks do not just help people share music files. They share whatever they can find on the hard drive and the network.Slide97

P2P FILE SHARING SERVICES TO AVOID – OR USE WITH

GREAT

CAUTIONKazaaMorpheusGroksterBearShareLimeWire

LimeRunner

LimeZilla

LuckyWire

Vuze

Warez

Nodezilla

VIP Torrent

Blubster

BitTorrentSlide98

Safer MUSIC SITES – (NOT P2P)

iTunes

Rhapsody (Napster)Spotify AmazonMP3.comPandoraSoundcloudSlide99

ITUNES.COM

Can I get a virus from ITunes?

iTunes is not a P2P file sharing program, when you download from ITunes, you don't download from other people, you download from Apple's server. The short answer is YES, but HIGHLY unlikely. There is the potential to get viruses from iTunes. They are careful but it has happened. However, it requires a hacker to attack the iTunes server. Very low risk level compared to open share servers like LimeWire or MP3 Juices.Slide100

RISKY ONLINE GAMING SITES

AddictingGames.com – adware plus known infections that prevent system from booting

POGO.com –hacker target and occasional infectionsMiniClip.com – requires you accept a MiniClip toolbar that promotes advertisers and their websites

Kongregate.com

– online complaints in forums regarding infections after playing online games at this site.Slide101

CLOUD FILE SHARING SERVICESSlide102

What is a FILE SHARING SERVICE?

A file hosting service allows you to share large files securely over the internet.

Uploading large files or images to server where you can share access with friends and family is the most popular form of sharing files online. It's easy and free. Slide103

FILE SHARING SERVICES – security

One of the most important security tools to require of a file sharing service is the

remote wipe. With remote wipe, you can make sure that you can remotely delete files from any device attached to your account. If an employee leaves your company or a device is stolen, you can remove the files even though you don't have access to the device. Slide104

ONLINE FILE SHARING SERVICES – OVERALL PERFORMANCE REVIEW

Online File Sharing Services: Our Verdict and Recommendations

The best file sharing service in our review is Hightail. Not only does this service offer unlimited storage, but it also provides unlimited bandwidth. When you combine this with the comprehensive sharing features, security and file tracking, it's the clear winner of our Gold Award. Slide105

ONLINE FILE SHARING SERVICES –SECURITY REVIEWSlide106

THE CLOUD

The Cloud has great potential to simplify all our technology and enable great leaps in advancement of communication, science, and areas still undiscovered…

OR…create a tremendous technology disaster world wide. Slide107

WHAT IS “THE CLOUD”

The cloud can be compared to an apartment building in which multiple tenants live and share the public resources of the complex.

The prime difference is that in an apartment building you can see and meet your neighbor. You can visually evaluate the apartment complex and the neighborhood to determine if you would feel safe living there. With The Cloud, you are required to make your selection based only on their advertisements and internet reviews, which can be misleading. Slide108

COMMON CLOUD USESBACKUP:

Services such as Carbonite and BaracudaPersonal file sharing space: Dropbox, Mozy,

Google Drive, photos, work projects, etc.PROGRAM ACCESS:Microsoft OfficeAdobe PhotoshopQuicken / QuickBooksSlide109

CLOUD RISKS- UNKNOWN UKNOWNS

To quote former U.S. Secretary of Defense Donald Rumsfeld:

“ There are known knowns; things we know we know. We also know there are known unknowns; that is to say, we know there are some things we do not know. But there are also unknown unknowns -- the ones we don't know we don't know.Slide110

FAITH IN THE CLOUDI believe that most public cloud vendors do a far better job securing data than their customers do. But you need to know where your cloud vendor stands and the measures it takes to mitigate risk as compared to what you or your company alone could provide

.

I offer a full seminar on Data Back Options where this topic if further explored. Slide111

LAST BREAKSlide112

THE GOOD NEWS!!!Just as hackers are evolving, so is prevention technology

Software solutions get stronger every dayNations are uniting to put a stop to the global terrorism that exists on the web

YOU are 90% of the solution!Slide113

TOP 6 WAYS TO STAY SAFE ONLINE

From

Roger Thompsonchief research officer, PC security firm AVG:

"Good software designed to detect this stuff helps, but unfortunately, these are areas where the problem is in relative infancy, and is going to get much worse." 

Stay up-to-date, stay paranoid, stay protected. That's the message from the security experts.

Here

are a few of their top tips and suggestions for protecting your computer against malware and hackers.

Keep up on

patches

Be

password

smart

Use

security

software

Don’t Over Google It!

If it sounds too good to be true... well, you know the

rest

Assume

that everyone's out to get

you

– It’s OK to be skeptical!Slide114

HOW TO TURN OFF THE MICROSOFT “TOR” FILE SHARINGSlide115

HOW TO TURN OFF THE MICROSOFT “TOR” FILE SHARINGSlide116

HOW TO TURN OFF THE MICROSOFT “TOR” FILE SHARINGSlide117

HOW TO TURN OFF THE MICROSOFT “TOR” FILE SHARINGSlide118

HOW TO TURN OFF THE MICROSOFT “TOR” FILE SHARINGSlide119

PASSWORD RULESSlide120

PASSWORD DO’SCreate your own “style” of password - for example1 upper case letter, 2 numbers, 1 unique character, 4 lower case

letters. Example for Amazon.com password –

Arf26@az! ( this is translated from a r

ain

f

orest

2

01

6

(at

@

)

a

ma

z

on

!

Use a different password for every siteSlide121

PASSWORD DO’S – test your password!

Want to know how fast a hacker can crack YOUR password?

Visit http://random-ize.com/how-long-to-hack-pass/ This site enables you to enter your password in an analyzer field to determine just how long it will take to crack YOUR chosen password!

Awesome Tool!

Save in your FAVORITE sitesSlide122

PASSWORD DONTSYou are advised to never…

Use anything that is pubic record – your name, address, phone number, SS #, DL #, Never use common words, it’s too easy to decode

NEVER use your email password anywhere else than for email accessNever use anything that can be found in social sites (pet’s name, favorite movie, favorite song)AND NEVER use the same password twiceSlide123

PASSWORD MANAGEMENTSlide124

PROTECTION TOOLS Use It or Loose It

It is important to remember the importance of

updating anti-malware and anti-virus programs. New malware is designed every day, and whenever an update to a protection software program is released, it is only a matter of time before the malware designers find creative ways around it. This continuous game requires you to

constantly update your protective software. Slide125

HOW TO CHOOSE PROTECTION

This is a personal choice depending upon:

CostNumber of computers / devices to protectProtection (virus, malware, identity)Performance (negative impact on computer/device)

Usability by novice computer user

Visit this link for a complete review of 22 programs.

https://www.av-test.org/en/antivirus/home-windows/windows-10

/

Slide126

VIRUS PROTECTION REVIEW 2017Slide127

Another opinion…..Slide128
Slide129

CONSUMER REPORTSSecurity Software Buyers Guide

A step-by-step buyer’s guide to selecting the right Security Software for YOU can be found at:

www.consumerreports.org/cro/security-software/buying-guide.htmlSlide130

MALWARE BYTES ANTI-MALWARE

Older Logo

NEW LOGOSlide131

Malware Bytes – DashboardSlide132

Malware Bytes – Threat ScanSlide133

Malware Bytes - scan resultsSlide134

Malware Bytes - scan optionsSlide135

Malware Bytes – Custom ScanSlide136

Malware Bytes – SettingsSlide137

Malware Bytes – Ransom Blocker

https://forums.malwarebytes.org/topic/177751-introducing-malwarebytes-anti-ransomware-betaSlide138

Malware Bytes – Ransom BlockerSlide139

PASSWORD MGR - featuresSlide140

PASSWORD MGR – Browsers & OSSlide141

PASSWORD MGR – Mobile DevicesSlide142

SMARTER SURFINGSANDBOXIEONLINE BANKING TIPS

BROWSER REVIEWSPRIVATE SURFINGW.O.T.

MAC COMPUTERSSlide143

PLAYING IN THE SANDBOXieA Sandbox is a utility that protects your computer software from viruses, spyware and malware by containing your entire browsing experience inside the box.

Nothing leaks out.

Configure your own sandboxes to meet your specific needs - install new software directly into a sandbox. What happens in the Sandbox stays in the Sandboxhttp://www.sandboxie.com/Slide144

ONLINE BANKING TIPSUse a safe browser in privacy mode

Change your password frequently

Check your online bank balance daily – weekly at the very leastNEVER do online banking with Internet Explorer NEVER do online banking at a hotel, public eatery, coffee shop, library, or any other public

WiFi

. Slide145

PRIVATE BROWSINGSlide146

PRIVATE BROWSING

FIREFOX: Private Window BrowsingGOOGLE CHROME: Incognito ModeEDGE:

In-Private BrowsingImportant: Private Browsing doesn't make you anonymous on the Internet. Your Internet service provider, employer, or the sites themselves can still track what pages you visit. Private Browsing also doesn't protect you from keyloggers or spyware

that may be installed on your computer.Slide147

PRIVATE BROWSING

Private Browsing Will:

allow you to browse the Internet without saving ON YOUR COMPUTER any information about which sites and pages you’ve visited. Private Browsing also includes Tracking Protection in Private Browsing

, which prevents companies from tracking your browsing history across multiple sites.

A shield icon will appear in your address bar whenever Firefox blocks tracking domains.

Slide148

GOOGLE CHROME - IncognitoIn the top-right corner of the browser window, touch the Chrome menu icon (lo0ks like 4 bars).

Select New Incognito Window

.Tips:You can also use the keyboard shortcuts Ctrl+Shift+N.If you're using a Chromebook, you can use the

guest browsing

feature as an alternative to incognito mode.  Slide149

EDGE: In-Private Browsing

To open: Click the Tools button , point to Safety, and then click InPrivate Browsing.

What InPrivate Browsing does:Dumps cookies, temporary internet files, browsing historyWhat InPrivate Browsing doesn't do:It doesn't prevent someone on your network—such as a family member, network administrator or hacker—from seeing where you went.

It doesn't provide you with anonymity. Websites might be able to identify you through your web address, and anything you do or enter on a website can be recorded by that website.

It doesn't remove any favorites or feeds that you add when you close your InPrivate Browsing session. Changes to Internet Explorer settings, such as adding a new home page, are also retained after you close your InPrivate Browsing session.Slide150

BROWSER REVIEWSSlide151

BROWSER REVIEWSSlide152

FIREFOX – TOP RECOMMENDEDSlide153

FIRE FOX – SECURITY OPTIONS

To access the

FireFox Security options…Left click on the three bars in the top right hand corner. The menu will display.Select OPTIONS to access the security features.

Note: This is also where you can click on NEW PRIVATE WINDOW to browse without your history being saved in the computer. Slide154

FIRE FOX – SECURITY OPTIONSSlide155

FIRE FOX – MASTER PASSWORDSlide156

FIRE FOX – SAVED PASSWORDSSlide157

FIRE FOX – PRIVACY OPTIONSSlide158

BROWSER SAFETY TOOLSWeb Of Trust- W.O.T.

protects you against scams, untrustworthy links and rogue web stores Reputation ratings guide you to find trustworthy sites

It's fast, easy to use and free! https://www.mywot.com/Slide159

Web Of Trust - reputation guidesSlide160

Web Of Trust – warning screensSlide161

CyberGhost VPN – FREE – No Acct!

The most important thing you need to know about a VPN:

It secures your computer's internet connection to guarantee that all of the data you're sending and receiving is encrypted and secured from prying eyes.Slide162

CyberGhost VPN – Download SiteSlide163

CyberGhost VPN – Wait QueSlide164

CyberGhost VPN – Connecting…Slide165

CyberGhost VPN – Ready to UseSlide166

AD BLOCK PLUS – FREE!Available for all Windows Browsers:

FireFox, Edge, ChromeSlide167

“I LOVE MY MAC”Slide168

APPLE/MAC INFECTIONSBusting The Myth:

Apple MACs Do Get Viruses!

However, the likelihood of an Apple Macintosh user getting a virus when compared to a Microsoft Windows

user is very little to none. In fact,

many of the Apple Macintosh users don't even run an

antivirus protection program.Slide169

WHY MACs ARE SAFER…

Below are some of the reasons why Apple Macintosh computers donot have as many viruses as Microsoft Windows.

Newer Macintosh operating systems, such as the Mac OS X, is built on the Unix kernel, which is one of the oldest and most secure operating systems available.Microsoft Windows is used by a lot more people than the Apple Mac OS. Because more people use Microsoft Windows, it is a much better target and makes it easier for viruses to spread.

Most of the computer virus writers are more familiar with the IBM platform and Microsoft Windows, which means its easier for them create a virus for that platform.

Many of the tools, scripts, and code used to create viruses or other malware are designed for Microsoft Windows. Slide170

I’M INFECTED! Now What?

Run all the protection software recommended in this seminar.If still infected, or if system does not perform normally after removal of infections, call CPU Computers or another professional computer repair company right away. Otherwise, you are likely spreading the infection to friends and family.Slide171

FINAL CONCLUSIONS…The internet is a wonderful tool.

I cannot imagine our society going forward without it.I realize the risks and accept them as necessary part of my life

. I am the BEST protection!I will empower myself with knowledge and explore all the web has to offer…. SAFELY.Slide172

UPCOMING SEMINARS…

I wish to thank all of you for joining me today!Our next

seminar topic in November will be:PERSONAL DATA BACKUPS Who, What, When, Where, Why and How?

Please visit

http://cpu-onsite.com

for event dates. Slide173

Access additional BONUS material at our website…cpu-onsite.com

Visit the SEMINARS

linkThank you for joining me today!

Presenter: Tori Moody 209-296-0660 CPU Onsite Computer Services

All rights reserved. Copyright 2016. Reproduction or distribution of this

presentation is strictly prohibited without written consent from Tori Moody