minimizing technology-related risks · 2013-10-04 · netbooks/ultra laptops tablets memory – as...
TRANSCRIPT
Minimizing Technology Related Minimizing Technology-Related Risks
NAN STENZELNAN STENZELR E G I O N A L I T C O O R D I N A T O R
U N I V E R S I T Y O F M A R Y L A N D E X T E N S I O NF E B R U A R Y 2 0 1 2
Current Computer Topics
Buying a New Computery g p In-home Wireless Security – Be Safe Onliney Protection – Updates Cleaning Tools and Resources
Backup your Files eXtension Social Networking
Buying a new computer?
Many Choices – Desktop Laptop Netbooks/Ultra Laptops Tablets
Memory – As much as you can afford!!!!
Hard Drive Permanent Storage Hard Drive – Permanent Storage 250gb, 320gb, 500gb, 1 tb
Screen Size Desktop – Widescreen (width vs. height) Laptop – 13in, 14in, 15in, 17in vs. Weight Tablets – 7” – 10”
Warranty/Repair – Where, How, and How Long
Netbook vs. Laptop vs. Tablets
Issues to considero o Keyboard size (lack of) Weight / Screen size May need online/ external
storage What will you use it for?y
Word Processing ? Internet? Email? Electronic Books/Mags? Electronic Books/Mags? Specific Applications?
Tablets Wireless or Cellular
connection required
In-Home Wireless
Wireless Capability – So you want to go wireless in your h ?house? You still need to have access to the internet somehow. Then you add a wireless router. y
DSL/Cable Modems may also be wireless already Each additional computer needs to have a wireless card/device Your wireless router should be set up with a secured Your wireless router should be set up with a secured
password/passphrase to prevent others from picking up the signal without your knowledge.
Also, make sure you change the name (SSID) of the network., y g ( )
Security – Be Safe Online
Viruses Worms and Trojan horsesViruses, Worms, and Trojan horses These are small programs that can infect computers and destroy
valuable information, forward viruses to everyone in your address book or even corrupt your hard drivebook, or even corrupt your hard drive.
Hoaxes If you get an email from a friend warning about a virus determine If you get an email from a friend warning about a virus… determine
if it is a hoax first before sending it on. Check it out first on http://vil.nai.com/vil/hoaxes.aspx or www.snopes.com
Phi hi Phishing An email message that looks like it comes from a legitimate
site/service that contains links that you are asked to click on. You yare brought to a fraudulent website (that may look like the real one)
Misleading Applications/Spyware
Many "free" programs downloaded from the web install f h k b h i d di l dsoftware that tracks your behavior and displays unwanted
advertisements. Examples: Free Screensavers, Web Search Toolbars
Latest Attacks Antivirus 2011/2012, Spyware Protect 2011/2012
F d l t S ft S $$ d I f t t Fraudulent Software – Scam $$ and Infect your computer Takes over your computer with false warnings, pop-ups, trying
to get you to buy software which doesn’t do anything.
Often comes from searching and clicking on suggested links that lead you to a malicious website or a site with malicious advertisements.malicious advertisements.
Ways to be Safe
Don’t click on any links in email messages. Retype the link in your browser.
Save any attachments to your desktop first before opening them. Keep your software up-to-date Keep your software up to date Type the web address directly into the browser Look for https:// and/or lock on status bar if you’re purchasing
onlineonline Legitimate companies will never send you an unsolicited request
for information they already have! Do not accept or open suspicious error dialog boxes from within Do not accept or open suspicious error dialog boxes from within
the browser. Don’t click on any buttons or even the X in the upper corner
Use Task Manager to close pop-up windows (press Ctrl+Alt+Del)g p p p (p )
Protection & Updating
Often malware takes advantage of users not having up-to-date i l d finternet-related software.
The best defense is to make sure you are using the latest version and all updates are installed
Use the Latest Browser Internet Explorer 8 or 9 (Win7)/ Firefox 10
Windows Security Updates Windows Security Updates http://www.update.microsoft.com Available in your Start Menu as well
Anti - Virus Program - Don’t let your subscription expire Microsoft Security Essentials – Free Anti-Virus
http://www microsoft com/security http://www.microsoft.com/security
Protection and Updating - continued
Adobe Downloads www.adobe.com/downloads Acrobat Reader X, FlashPlayer, Shockwave
QuickTime QuickTime http://www.apple.com/quicktime/download/
JAVA http://www java com http://www.java.com Click on the “Do I Have Java?” link and verify version Uninstall all OLD versions of Java / JRE using Add/Remove
PPrograms Install Web of Trust - http://www.mywot.com/ Install separate versions for Firefox and Internet Explorer
Web of Trust – Example
Cleaning Resources and Tools
Free software to clean: You may need to download these from a clean computer www.malwarebytes.org
Needs to be installed and updated before scanning Needs to be installed and updated before scanning www.superantispyware.com/portable
Does not need to be installed or updated but you need to download a new version every time you runa new version every time you run
http://www.surfright.nl/en/downloads Hitman Pro 3.5 30 day Trial – can be used one time or purchased
There are other cleaning tools available online for specific malware problems.p
Backup your files
OptionsB E l H d D i
Disaster-Proof Your Data with Online Backup http://www.pcmag.com/article2/0,2817,2288745,00.aspAugust 2011
Buy External Hard Drive Online Backup Services DropBox / Google Docs
August, 2011
DropBox / Google Docs
Things to backup My Documents Quicken / Quickbooks
files Email Files Email Files Favorites / Bookmarks Music / Pictures
Social Networking
Online social networking services Networking with communities of people who share interests and activities. Provide various ways for users to interact
chat, messaging, email, picture/video sharing, blogging, etc.
Most Common – Facebook, Myspace, Twitter, YouTube, LinkedIn Benefits Keeping in touch with distant friends & familyp g y Reconnecting with people Meeting new people with similar interests Easy way to share pictures and updates Easy way to share pictures and updates Professional Networking Connecting with your community and interests
Social Networking – cont.
Some Issues Particularly for younger users
Sexual predators and Cyber bullies
Online behavior – Online behavior
Posting inappropriate pictures or messages/illegal behavior
Identity Theft
Rules of Engagement Make sure your security/privacy settings are what you want them to be
Don’t post what you don’t want others to see & you can customize each post re: who can see it
Only let people be friends if you know them in person
Post as few identifying facts as possible
Questions???