Protecting Yourself ONLINE Presented By: Dan Barker TNT Consulting Group .

38
Protecting Yourself ONLINE Presented By: Dan Barker TNT Consulting Group www.tntgroup.com

Transcript of Protecting Yourself ONLINE Presented By: Dan Barker TNT Consulting Group .

Protecting YourselfONLINE

Presented By: Dan BarkerTNT Consulting Group

www.tntgroup.com

Protecting Yourself Online

Overview

This session is designed to:

Put Your Mind At Ease

Inform and Educate

Arm You With The Tools

Make Your Internet Experience Pleasant

Issues Covered

Keeping Your Information Private

Online Shopping

Passwords

Virus Protection & Firewalls

Keeping Systems Up To Date

Protecting Yourself Online

Government Is Getting Involved

President Bush directed the development of a National Strategy to Secure Cyberspaceto ensure that America has a clear road map to protect a part of its infrastructureso essential to our way of life.

Protecting Yourself Online

The Issues

The goal is to empower the home user and smallbusiness person to protect their cyberspace by:

    • raising cybersecurity awareness of the home user and    small business, including children and students;

   • making it easier for home users and small businesses    to keep current with anti-virus software, software    patches, and firewalls;

    • encouraging and helping facilitate the installation    and use of firewalls on all broadband Internet    connections, such as cable modems, DSL, satellite    and wireless;

Protecting Yourself Online

Why Does The Government Care?

The home user and small business can be damaged severely and, in some cases, can be used to severely damage others.

The Issues

Protecting Yourself Online

Hard Drive Crashing

Identity Theft

Credit Theft

Tunneling

Extortion

Zombies/Trojans

Compromise of Private Information

The Issues

Protecting Yourself Online

Your Online Privacy

Why is my information so important to someone?

Businesses want to gain new customers and keep the customers they have. To do this, they need information.

The more information a business has about a prospect or a customer, the more likely it can meet that customer’s needs or shape its promotions to appeal to those needs.

This is called a “profile.”

Protecting Yourself Online

Your Online Privacy

Online Forms & Registrations

Websites (Traffic and Web Logs)

Newsgroups

Spyware/Adware

Online Methods Of Getting Your Data

Protecting Yourself Online

Your Online Privacy

Market additional products to you.

Sell it to a third-party company for a fee or a commission on the products it sells to you.

Trade it as barter for the use of another company's customer database.

What They Do With Your Information

This leads to unwanted email offers, more junk mail, and targeted web sites.

Protecting Yourself Online

Your Online Privacy

Don’t give out SS # or other personal information.

Don’t respond to surveys or polls unless sure of source – and then only give generic information

Weigh the importance of someone having your information

Be careful about posting any personal information online and what you sign up for.

Instruct family/employees regarding which information is ok to release online

How To Deal With This…

Protecting Yourself Online

INVASION OF SPAM

Protecting Yourself Online

Your Online Privacy

How To Deal With This…

Never Respond to Spam

Use A Throw Away Address

Use SpamCop – spamcop.net

Don’t Forward Mail With Everyone’s Address

When Filling Out Online Forms – Use Throw Away Address or Bogus Address

Use screen name not email address for Ebay, Chat Rooms, etc.

Protecting Yourself Online

Online Shopping

Protecting Yourself Online

Online Shopping

Herbal Viagra

Internet Investigator

Pump and Dump Stock Scams

Credit Scams

Nigerian Fee Scam

Counterfeit Items

To good to be true?

Protecting Yourself Online

Online Shopping

Do business with reputable firms online.

Use a credit card.

Watch for “great deals” without anyway to contact them offline.

When feasible verify by phone.

Check your statements

www.bbb.org

www.scambusters.org

Protecting Yourself Online

Password Defenses

Protecting Yourself Online

Passwords

Use a combination of characters, numbers and, if possible, symbols. Alternate the capitalization, interchanging upper case with lower case.

Don't use words that can be found in dictionaries of any language.

Don't use proper names, names of spouses or friends.

Don't use words spelled backwards.

Don't use the same password for everything.

Never give out your password to strangers.

Change passwords periodically.

Protecting Yourself Online

Viruses/Trojans

Protecting Yourself Online

VIRUS PROTECTION

Computer viruses are the "common cold" of modern technology.

E-mail viruses are now twice as prevalent as they were in 2001, with one e-mail in every 200 containing a virus.

Virus-scanning company MessageLabs said it stopped 9.3 million viruses in 2 billion e-mails this year, which equated to one virus in every 215 e-mails.

Protecting Yourself Online

VIRUS PROTECTION

Viruses enter your system via e-mail, downloads, infected floppy disks, or (occasionally) hacking.

By definition, a virus must be able to self-replicate (make copies of itself) to spread.

Virus behavior can range from annoying to destructive.

Antivirus software can detect nearly all types of known viruses, but it must be updated regularly to maintain effectiveness.

Protecting Yourself Online

VIRUS PROTECTION

Install Antivirus Software and Keep It Up To Date.

Activate full-time protection.

Make sure “All Files” are scanned.

Turn On Automatic Updating

Use a personal firewall – (Hardware/Software)

Keep regular backups of important data.

Keep your operating system up to date.

Be cautious of email attachments even if you know the sender.

Protecting Yourself Online

VIRUS PROTECTION

                                                                       

           

                            

                          

Protecting Yourself Online

VIRUS PROTECTION

PestPatrol defeats the threatby detecting and removing:

Spyware/Adware

Remote Access Trojans

Keystroke Loggers

Protecting Yourself Online

VIRUS PROTECTION

FIREWALLS

An Internet Router, which is installed between your Internet connection and the rest of your network, protects your network by making your individual computers virtually invisible to the outside world

Protecting Yourself Online

System Updates

Protecting Yourself Online

KEEPING SYSTEMS HEALTHY

Windows Security Certificates Vulnerable to Attack

Microsoft Warns of Windows Vulnerability—Again

Protecting Yourself Online

Safety Checklist

Protecting Yourself Online

Safety Checklist

Use anti-virus software that will scan incoming mail messages and files on-access automatically.

Update anti-virus software definitions weekly, if not more often (ideally, the AV software should update the virus definitions automatically.)

Learn how to identify virus hoaxes from real threats.

Install a firewall,

Protecting Yourself Online

Do not open attachments unless absolutely necessary.

Do not open EXE, BAT, VBS, and SCR type attachments ever, since they are common vectors for virus/malware infections.

Avoid the use of insecure network programs such as ICQ, AIM or IRC for discussing private information.

Perform system manufacturer security patch updates on a regular basis.

Safety Checklist

Protecting Yourself Online

Backup your files regularly on ZIP disk or CD-ROM.

Ensure that effective passwords are used. Passwords should also be changed on a regular basis.

Set up company or family rules of use to ensure everyone has a safe experience.

Safety Checklist

Protecting Yourself Online

Sources

Government’s Initiative on Cyber Safetywww.whitehouse.gov/pcipb

  

Protecting Your Information

Privacy Net – Check Your Machinewww.privacy.net/analyze

Federal Trade Commission on Privacywww.ftc.gov/privacy

Tracking Spyware on Your Systemwww.grc.com

Protecting Yourself Online

SourcesFederal Trade Commission’s Safe Harborwww.ftc.gov/privacy

Consumer Reports On Identity Theftwww.consumer.gov/idtheft

Federal Trade CommissionWhen Bad Things Happen To Your Good Namewww.ftc.gov/bcp/conline/pubs/credit/idtheft.pdf

Identity Theft Assistancewww.VictimsAssistanceofAmerica.org 

Run A Credit Reporthttps://www.econsumer.equifax.com

Protecting Yourself Online

SourcesSPAMCoalition Against Unsolicited Commercial Emailwww.cauce.org

Network Abuse Clearinghousewww.abuse.net

SpamCop - punish spammers www.spamcop.net

SpamCon Foundationwww.spamcon.org

SpamTrail – Email Filtering Servicewww.spamtrail.com

Protecting Yourself Online

SourcesOnline Shopping

Better Business Bureausearch.bbb.org/search.html

ScamBusterswww.scambusters.org/Scambusters48.html

FTC’s Guide to Buying and Selling on the Netwww.ftc.gov/bcp/conline/pubs/online/auctions.htm

Fighting Online Fraudwww.fraud.org

Card Cops – Check Your Credit Card For Theftwww.cardcops.com

Consumer Sentinelwww.consumer.gov/sentinel

Protecting Yourself Online

SourcesVirus Protection & Firewalls

Antionline - Fight Back Against Hackerswww.antionline.com/fight-back

Pest Patrol – Solutions for Spyware/Adwarewww.pestpatrol.com

Gibson Research – Check your firewallswww.grc.com

McAfee Antivirus Norton Anti-Viruswww.mcafee.com www.norton.com

F-Secure Trend Micro – PC-Cillianwww.f-secure.com  www.trendmicro.com

Vmyths – Virus Myths & Hoaxeswww.vmyths.com

Protecting Yourself Online

Sources

Keeping Your Systems Up To Date

 

Microsoft’s Update Toolwindowsupdate.microsoft.com

Insecure.Org - Check system Security Holeswww.insecure.org/

Protecting Yourself Online

www.tntgroup.com

Questions?