1 / 20

Home and Business Computer Security

Home and Business Computer Security. Basics to Stay Safe in Our Computerized World. A Brief Intro. Sci-Fi Junky. Elly Poppe Live in Wisconsin , Work in Minnesota I love technology 12 years in I.T. field Work Experience – SMP, sP , ALT Alt IT Services Computer Support Personalized

yardan
Download Presentation

Home and Business Computer Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Home and Business Computer Security Basics to Stay Safe in Our Computerized World

  2. A Brief Intro Sci-Fi Junky • Elly Poppe • Live in Wisconsin, Work in Minnesota • I love technology • 12 years in I.T. field • Work Experience – SMP, sP, ALT • Alt IT Services • Computer Support Personalized • Services – Residential and Business Nerd

  3. Definitions • Router – device that switches the Internet address to an internal address – adds a layer of protection between you and the Internet • Firewall – software or hardware that limits network traffic • Cloud – General term used to refer to internet based computers/services • Public Wi-fi – Wireless Internet connections in public places, generally unsecured • Virus/Malware/Trojan – variety of softwares that are designed to cause destruction, steal data, etc.

  4. Home and Business • All (or most) of what I talk about today relates to both home and business computing. • Small Businesses often opt for ease over security • Home and business often cross over as people take laptops home or send files to work from home computers

  5. What are the Dangers? • Viruses/Malware • Bot networks, Keystroke loggers, Trojans • Fake AV/related malware(Scareware) • Identity Theft • Phishing • Data Loss • From Failed Hard drive • From Thieves • Predators/Stalkers

  6. How Do We Protect Ourselves? • Antivirus • Data Backups • Passwords • Routers/Secure Wireless • Facebook Settings • Parental Controls • Common Sense Computing

  7. Antivirus • Don’t leave home without it. • Without AV, you WILL get infected • Keep it updated! • Free or Paid Versions? • Type and amount of online activities • Do you need a Firewall? • Ease of Use? • More than one? • I have a Mac – do I need AV?

  8. Backups • Do it, Do it, Do it! • Data Should Exist in 2 Places • Manual/Automated • Software Utilities or Straight File Copy • Fbackup, GenieSoft, etc. • OnSite or OffSite (Cloud) • Flash drive, external Hard Drive, DVDs • SOSBackup, Carbonite, Mozy, or Locally hosted backups

  9. Passwords • Why Should I Use a Password? • Parental controls • Slow viruses • Protect Data • Sensitive info, calendar, addresses, photos • Don’t Use the Same Password for Everything • Don’t Put Password on Sticky on PC! • Password Managers • 1Password (Mac), Kaspersky Password Manager, LastPass, RoboForm, pwd protected Excel Sheet

  10. Wireless Networks • Password Protection is a must • Encryption • WEP vs WPA/WPA2 Encryption • Turn off WPS • Controlling who’s on your network • Protecting data on your network

  11. Public Wireless Networks • Firesheep – What is it? • Choose secured networks if possible • Will need password • In Windows – set network location as Public • Use VPN • Use Add on like httpsEverywhere • Turn on Firewall • Turn off File Sharing

  12. Facebook • Privacy Settings – Get to Know Them • Visit them regularly – They keep changing! • “Only My Friends” • Monitor tags of you • Create friends lists to filter who sees what • Limit who can find you on Facebook – turn off public search • Limit what Applications can access your info

  13. Facebook - continued • How Much Should We Share? • Personal Info • Don’t post pet’s names, children’s names, phone number, address, year of birth • Don’t Tell the World that your Home will be empty all Week! • Places – Yikes – Don’t let Everyone know where you are at all times! • Photos – don’t post potentially embarrassing or revealing photos

  14. Keeping the Kids Safe • Know the Dangers – Talk to your Kids • Stalkers, Predators, Bullys • Educate Yourself on Internet Dangers • Educate your Kids on how to stay safe – people might not be who they say they are, don’t give out personal info or passwords, etc. • Monitor/Limit their Activities • Parental Monitoring vs Parental Controls • NetNanny, iShield, Bsafe Online, Webroot Parental Controls • Sit with them sometimes • Check their privacy settings • Disable location settings on phones, iPads, etc. • Keep computer in common rooms – not kid’s bedrooms

  15. Keeping the Kids Safe • Signs of Problems • Large amounts of time spent online, especially at night • Finding porn on the computer • Kid’s getting Phone calls from people you don’t know • Child turns monitor off quickly when you come into room • Child becomes withdrawn from family • Child using online account belonging to someone you don’t know

  16. Some Basic Guidelines • Keep your Windows updated • Think Before you Click! • Mouse over links to see what they are before you click on them • Is the Cute kitty video worth a possible virus infection? • Email Attachments • Did you expect it, Do you need it? • .exe, .bat, .com, .scr – extensions that run programs • .zip, .doc, .html – can also be harmful

  17. Some Basic Guidelines • Just because it Pops up – doesn’t mean you have to click on it! • Read alerts or Pop ups carefully before deciding to click “OK” • Task Manager – use to end processes • Deal with odd behavior or obvious virus activity immediately

  18. Happy Computing ! • The Technology we have at our disposal today is incredible – but we must all take an active role in ensuring the safe use of it.

  19. Resources • Password managers http://www.pcmag.com/article2/0,2817,2407168,00.asp • https://www.sosonlinebackup.com/ • http://onguardonline.gov • http://www.fbi.gov/scams-safety/computer_protect • http://www.wikihow.com/Keep-Safe-on-Facebook • http://www.pcmag.com/article2/0,2817,2272557,00.asp • https://www.eff.org/https-everywhere

  20. My Contact Info • Elly Poppe • 902 E. 2nd St. Suite 140, Winona • epoppe@alt-itservices.com • 507-450-2707 • www.alt-itservices.com • www.facebook.com/alt.itservices

More Related